Hostname: page-component-745bb68f8f-hvd4g Total loading time: 0 Render date: 2025-02-06T02:53:41.494Z Has data issue: false hasContentIssue false

Spontaneous Collective Action: Peripheral Mobilization During the Arab Spring

Published online by Cambridge University Press:  19 April 2017

ZACHARY C. STEINERT-THRELKELD*
Affiliation:
University of California, Los Angeles
*
Zachary C. Steinert-Threlkeld is Assistant Professor, Department of Public Policy, University of California, Los Angeles, Los Angles, CA 90095, www.zacharyst.com (zst@luskin.ucla.edu).
Rights & Permissions [Opens in a new window]

Abstract

Who is responsible for protest mobilization? Models of disease and information diffusion suggest that those central to a social network (the core) should have a greater ability to mobilize others than those who are less well-connected. To the contrary, this article argues that those not central to a network (the periphery) can generate collective action, especially in the context of large-scale protests in authoritarian regimes. To show that those in the core of a social network have no effect on levels of protest, this article develops a dataset of daily protests across 16 countries in the Middle East and North Africa over 14 months from 2010 through 2011. It combines that dataset with geocoded, individual-level communication from the same period and measures the number of connections of each person. Those on the periphery are shown to be responsible for changing levels of protest, with some evidence suggesting that the core’s mobilization efforts lead to fewer protests. These results have implications for a wide range of social choices that rely on interdependent decision making.

Type
Research Article
Copyright
Copyright © American Political Science Association 2017 

INTRODUCTION

Large groups of people acting without centralized leadership can organize protests. Protests occur as a result of decentralized coordination of individuals, and this coordination helps explain fluctuating levels of protest. Individuals in the core of a social network—those such as activists, members of the media, or civil society organizations—do not mobilize protests. Instead, those on the periphery of the network communicate with each other about the near future (where and when to protest) as well as events as they unfold (the presence of police, what the police are doing, supplies needed, and so on). While those at the center of the network do engage in the same behavior as others, their effect is washed out in comparison to that of the masses they try to lead. I call the ability of the periphery to mobilize spontaneous collective action.

There exist two competing explanations for how individuals decide to undertake action. Whether deciding to vote (Downs Reference Downs1957; Quattrone and Tversky Reference Quattrone and Tversky1988; Riker and Ordeshook Reference Riker and Ordeshook1968), join a political organization (González-Bailón, Borge-Holthoefer, Rivero and Moreno Reference González-Bailón, Borge-Holthoefer, Rivero and Moreno2011; Klandermans and Oegema Reference Klandermans and Oegema1987; McAdam Reference McAdam1986), or protest (Goldstone Reference Goldstone2001; Lichbach Reference Lichbach1998; Moore Reference Moore1995), individuals may decide to do so as a result of effort from centralized, well-connected individuals (the core) or those on the periphery. Those at the center of a social network can provide focal points for action, alternative policies for voters, new information about policies, or demonstrate a regime is weaker than previously thought, all contributing to individuals taking collective action (Dalton, Greene, Beck and Huckfeldt Reference Dalton, Greene, Beck and Huckfeldt2002; Gerber, Karlan and Bergan Reference Gerber, Karlan and Bergan2006; Shachar and Nalebuff Reference Shachar and Nalebuff1999; Taylor Reference Taylor and Taylor1988). On the other hand, individuals can decide to vote (or protest or join a movement) based on the influence of those they know (Gerber, Green and Larimer Reference Gerber, Green and Larimer2008; Schussman and Soule Reference Schussman and Soule2005), beliefs in their own ability to affect an outcome (Finkel, Muller and Opp Reference Finkel, Muller and Opp1989; Goldstone Reference Goldstone1994; Opp Reference Opp2012), or from observing the behavior of others (Granovetter Reference Granovetter1978; Lohmann Reference Lohmann1994). These others are the peripheral members.

This argument is tested using data from the Arab Spring, the protests which started in Tunisia in December 2010 and soon spread through North Africa and the Middle East. The events of the Arab Spring, the most prominent large-scale, widespread protests since the collapse of the Soviet Union, provide an ideal situation in which to test this theory. “Arab Spring” refers to the series of protests which started in Tunisia on December 14, 2010 (leading to the resignation of that country’s president), slowly spread to neighboring countries over the following six weeks, and inspired massive turnout in Egypt that caused President Hosni Mubarak to resign on February 11, 2011. This article will show that these protests were not driven by the people who had tried for years to organize them. Instead, they were organized by large groups of individuals discussing amongst themselves where to go, how to get there, when to go, and what was going on once there. This article does not seek to explain the Arab Spring, but it does, in the course of developing the spontaneous collective action theory, present the first large-scale, systematic evidence on how individuals behaved in each country.

To test the core versus peripheral hypotheses, this article connects two large-scale datasets. First, a machine-coded events dataset, the Integrated Conflict Early Warning System (ICEWS), is combed to measure the number of protests per day across 16 countries from November 1, 2010 through December 31, 2011. Second, a dataset of geolocated tweets in the same countries from the same period is built. These 13,754,998 tweets show what was being said, when it was being said, where, and how many connections each tweet author had. Combining these datasets and using a wide range of models and operationalizations, mass mobilization is shown to occur through peripheral individuals.

This article proceeds in eight sections. The following section compares and contrasts existing theories of protest mobilization with the one developed here. The article then presents the empirical strategy, followed with the main findings and a battery of robustness checks to reinforce them. A closer look at Egypt presents another strategy for identifying core actors, and the article concludes with final thoughts and suggestions for future research.

THEORY

Coordination drives protest mobilization, and peripheral members of a network drive coordination. Coordination consists of two components.

First, individuals deciding to protest must receive a credible signal that large numbers of people are protesting, suggesting that the cost of protesting is low. Second, once protests have commenced, information about upcoming protests—when a protest will occur, where protesters will convene, routes to take, supplies needed, and so on—needs to be provided. Members on the periphery of a social network better provide both components of coordination than those in the core. Individuals at the core of a network—those connected to many more people than the median person—are socially distant from most of those connections and few in number. This distance attenuates the weight of the signal the core sends (Centola and Macy Reference Centola and Macy2007, 725–6), while their rarity limits the influence of their action and relevance of the protest information they provide.

Networks provide a framework for understanding how a phenomenon spreads between items; when these items are people, the network is a social network, and connections represent two people between whom a phenomenon can spread. These phenomena fall into two categories, simple and complex. A simple contagion is a phenomenon which can spread between individuals after one exposure, such as illness or information about job opportunities (Granovetter Reference Granovetter1973). Disease transmission or news are canonical examples: John only needs to meet one person with the flu to catch it, and Jane only needs to talk with one person to learn tomorrow’s weather. John does not become more sick from meeting a second infected person, and Jane does not become more knowledgeable receiving the same weather report from a second person. Except for rare cases, simple contagions always spread in a network (Newman Reference Newman2003). Simple contagions spread quickest when core nodes are affected since those nodes can spread the phenomenon in question to many nodes at once, regardless of the structure of the underlying network (Watts Reference Watts2004, 257–60). In simple contagion models, diffusion of a phenomenon is less likely when the diffusion starts on the periphery.

Complex phenomena are those whose transmission requires an individual to observe that phenomenon in two or more people. Contact with two or more sources is required when the phenomenon possesses positive externalities, gains credibility or legitimacy when multiple people partake, or have an emotional component (Centola and Macy Reference Centola and Macy2007, 707–8). Models of complex contagion are often called threshold models since they require an individual to be exposed to a defined amount of other people in the network before switching states (Granovetter Reference Granovetter1978; Schelling Reference Schelling1978).Footnote 1 The existence of thresholds makes the spread of complex contagions less certain, as network structure—the distribution of thresholds—can cause a contagion to stay trapped in one part of the network (Watts Reference Watts2002). Because contact with more than one source is required for complex contagion’s spread, core members do not automatically lead to the spread of the phenomenon in question. The existence of that phenomenon in peripheral parts of the network becomes essential for its spread throughout the network.

Protests are a complex contagion phenomenon because increasing participation makes others more likely to join. Individuals are more likely to protest as others protest, since the cost of protesting decreases as a function of group size. Individuals are especially more likely to protest when they know others who are protesting (Opp and Gern Reference Opp and Gern1993), and those on the periphery of a network are more likely to know others on the periphery than in the core (Kwak, Lee, Park and Moon Reference Kwak, Lee, Park and Moon2010; McPherson, Smith-Lovin and Cook Reference McPherson, Smith-Lovin and Cook2001). Since there exist many more individuals on the periphery of a network than in the core, protest is therefore more likely to occur when those on the periphery of a network mobilize.

The first mechanism through which the periphery of a social network mobilizes protest is through providing a credible signal about participation in the protest. Peripheral members mobilize other participants better than those in the core because they provide a more credible signal that the protest enjoys widespread participation. If a protest is dominated by core members, the signal suggests that the policy disagreement does not affect many people who do not usually protest. This insight is similar to that made by Susanne Lohmann: she argues that unexpected participation of “moderate activists” drives protest mobilization because “extreme activists” always protest, so their participation is not a credible signal about the severity of a grievance (Lohmann Reference Lohmann1994). A larger than expected turnout of “moderate activists” signals to others that grievances are widely shared, leading to the expectation that one’s action will decisively lead to a policy change. In discussing the effect of network structure on collective action, David Siegel explains that:

[. . .] the people at the bottom of the network—the proletariat, if you will—can [mobilize] if they have enough connections among themselves. The key here is to obtain a sufficiently large and well-connected group of people at the bottom of the hierarchy who [. . .] are highly internally motivated to participate. If these requirements are achieved, the bottom of the hierarchy can spur the network on to very high levels of participation. (Siegel Reference Siegel2009, 134–5)

The second mechanism through which the periphery of a social network mobilizes protest is by providing more information about a protest as it unfolds, and this information has the effect of coordinating protestor movement and tactics. One type of information is situational awareness, knowledge about unfolding events, and peripheral members, because of their number, provide this awareness in ways the core cannot. Situational awareness entails knowing the size of the police presence, which routes police block, whether or not police engage with protesters, paths around police, and where other protest groups find themselves. Protesters are also more likely to reach and hold onto their desired site if they can approach it from multiple directions and coordinate their action, as doing so makes it harder for police to contain the protesters (Gunning and Baron Reference Gunning and Baron2013, 168–74). But, since there exists a finite supply of core individuals, splitting a protest into subcomponents means that the ability of core members, who are few in number, to control them is lessened.

Moreover, once engagement with state forces commences, order often dissolves; a protest is a quickly shifting series of actions occurring in an area too big to be observed by a few individuals. During a street engagement with government forces, protesters may require reinforcements on some streets and not others, while supplies such as gas masks necessary in one place but not elsewhere. If a group is able to cause police to retreat, communicating that advantage to nearby protesters can provide reinforcements to exploit this development. But relying on core members, who are few in number, to coordinate these reactions decreases the efficacy with which protesters can react to new developments. Situational awareness therefore increases the likelihood of protest success, and situational awareness is increased when information flows from and between as many individuals as possible.

Situational awareness also entails providing logistical support for a protest. During the initial march to a protest site, one key piece of information is what kind of equipment individuals need. Gas masks, onions, and soda mitigate the effect of tear gas, while hammers, slingshots, and shields are necessary if projectiles are to be employed. Individuals also need to know to where these supplies need to be delivered, as some groups of protesters may be marching peacefully while others in different neighborhoods confront the police. The same logic holds once a protest site, such as a city’s main square, is established. At this point, the protest site becomes a miniature city; the provision of food, medical supplies, sanitation, communications equipment, and security all require coordination.

A comparison with military tactics clarifies the importance of situational awareness. The chief advantage of German armored divisions at the start of World War II was coordination enabled by new communication technology. Equipped with radios, unit commanders could communicate with their tanks in real time, maintaining tactical awareness throughout a battle and so allowing them to exploit enemy weaknesses or cover their own (Citino Reference Citino2004). Iraqi forces in the first Gulf War had not learned this lesson: battlefield commands flowed through centralized headquarters in Baghdad, and Coalition forces were able to bomb these facilities, hindering the ability of Iraqi frontline forces to respond to battlefield developments (Press Reference Press2001). In protests, it is the police who have traditionally had the coordination advantage because of their distributed communication, while protesters have often lacked a similar ability.

Peripheral individuals are better positioned to coordinate than the core. Even in an authoritarian setting, the existence of widespread discontent is often not a surprise. In Tunisia and Egypt, for example, it was widely known that the regimes were unpopular. In Tunisia, oligarchic elites and weak rule of law alienated large segments of society, from students to the working class, especially outside of Tunis, and desperation suicides were not uncommon events (Al-Zubaidi and Cassel Reference Al-Zubaidi and Cassel2013; Breuer Reference Breuer2012). In Egypt, police indiscretion, religious persecution, and economic instability similarly dispirited a majority of the population (Gunning and Baron Reference Gunning and Baron2013, 97–127). It was well understood in these countries that dissent was widespread and a minority of a society benefited from current policies at the expense of most others. Widespread, commonly understood dissatisfaction means that latent desires for policy change are known to exist, rendering the task one of coordinating protest. The periphery then drives mobilization because it signals that disparate, numerous groups of individuals are acting on this discontent.

Signalling and situational awareness allow peripheral members to coordinate their action. For example, a message such as “#jan25 protests will take place all throughout cairo, including shubra, mohendessin, in front of cairo university and on arab league street” issued on the morning January 25 th , the first major day of protests in Egypt, provides information about where individuals who want to protest can join others (Idle and Nunns Reference Idle and Nunns2011, 33). Information less explicitly about coordination can also have a coordinating effect. A large amount of the communication leading up to a protest focuses on supplies needed, how to dress, how to behave towards the police, and the identity of protesters. This communication does not tell people when or where to go, but it helps them estimate levels of support in the population and danger they may face (Gerbaudo Reference Gerbaudo2012; Lohmann Reference Lohmann1994). The more people that provide this information, the easier protest coordination becomes.

The importance of signalling and protest information leads to a primary hypothesis that can be broken down into constituent parts.

H1 As coordination from the periphery of a social network increases, more protests should occur.

H2 As coordination from the core of a social network increases, there should be no change in the number of protests.

The importance of peripheral participation as a signal of broad support is found in the experience of Egyptian mobilization on January 25. As groups of protesters marched through outlying neighborhoods, they urged onlookers to leave their shops, apartments, and workplaces. Many did, and the protest size snowballed (Cambanis Reference Cambanis2015, 51). Protesters also emphasized the different parts of society they represented, with particular care taken to recruit outside of the middle class as well as emphasize independence from the Muslim Brotherhood (Gunning and Baron Reference Gunning and Baron2013, 180). The initial mobilization therefore included youth, members of football fan clubs, the poor and working class, in addition to individuals who were habitual protesters. Moreover, habitual protesters situated in the core of the Egyptian social network had tried to initially protest on January 18; only five activists protested, reflecting the importance of mobilization from the periphery (Gunning and Baron Reference Gunning and Baron2013, 91).

That peripheral members of a social network provide more information than the core finds support in other settings as well. In a study of diffusion on Facebook, Bakshy et al. (2012) find that weak ties are responsible for most information diffusion because they are more numerous than strong ties (individuals who interact frequently), just as those on the periphery are more numerous than those in the core. Recruitment to Spain’s indignados movement, which started less than four months after Egypt’s first protests, was characterized by individuals’ exposure to the same information from different sources (González-Bailón, Borge-Holthoefer, Rivero and Moreno Reference González-Bailón, Borge-Holthoefer, Rivero and Moreno2011). Adoption of political attitudes is also increased after exposures from different sources (Romero, Meeder and Kleinberg Reference Romero, Meeder and Kleinberg2011), and controlled experiments have confirmed the importance of multiple sources of exposure for changing health attitudes (Centola Reference Centola2010). Complex contagion also drove mobilization processes during the collapse of the Soviet Union (Opp and Gern Reference Opp and Gern1993) and the American Civil Rights movement (McAdam Reference McAdam1986), though scholars at the time did not use that language. Finally, this spontaneous collective action might be the process which drives mass urban mobilizations that bring together disparate groups of individuals who previously did not engage in antiregime behaviors (Beissinger Reference Beissinger2013; Tufekci Reference Tufekci2014).

That protest is a complex contagion explains why many states have large domestic intelligence apparatuses and fear mass public gatherings. If an individual desiring to protest is concerned that sharing that information will lead to punishment, individuals are less likely to form connections with other individuals. In network terms, there will be fewer bridges between communities, inhibiting the spread of protest mobilization information. (If protest were a simple contagion phenomenon, a small number of protesters could have a large effect, and governments would have to make the costs of protest very high to prevent any display of antiregime sentiment.) Large public gatherings therefore provide one of the few occasions individuals have of bridging their immediate social communities; these bridges may cause individuals’ protest thresholds to be surpassed, and a chain reaction of protests may ensue. For example, protests in Egypt against the Iraq War and marking the third anniversary of the Second Intifada led to the first large-scale public chants against Hosni Mubarak and started the process by which previously disconnected groups of individuals began to coordinate their antiregime actions (Gunning and Baron Reference Gunning and Baron2013, 39–47). In Russia in 1917, an industrial lockout, International Women’s Day, and military leave brought together tens of thousands of workers, women, and disgruntled soldiers into the streets of St. Petersburg; the Romanovs fled four days later (Kuran Reference Kuran1989, 63). China even allows criticism of government officials and policy so long as it does not lead to appeals for collective action (King, Pan and Roberts Reference King, Pan and Roberts2013).

That protest is a complex contagion phenomenon also does not mean core members are unimportant in terms of protest mobilization. There are at least three mechanisms by which core members can facilitate protests: convincing individuals to blame their dissatisfaction on government policies, revealing the state is weaker than commonly believed, and fostering group identity. First, a core member can help those on the periphery ascribe their policy dissatisfaction to specific policies of those in power because the information to assign blame is a simple contagion phenomenon. As Javeline summarizes: “individuals faced with any grievance should be more likely to protest if they can make specific attributions of blame for the grievance and that one mechanism by which entrepreneurs [core individuals] might solve collection action problems is by first solving blame attribution problems” (Javeline Reference Javeline2003, 119). Second, core members can engage in violence which, if not terminated, reveals that antiregime preferences are widespread and the regime may be weak (Bueno de Mesquita Reference Bueno de Mesquita2010). Third, core members can create norms of solidarity, causing individuals to calculate their participation based on group gains (Goldstone Reference Goldstone1994). Once individuals see themselves as part of a larger group, the benefits of protest increase while the costs decrease, making them more likely to mobilize when the opportunity arises.

These core-based mechanisms are not related to protest mobilization, however, as they occur before mass protests. They predispose individuals to be ready to mobilize, but they do not directly mobilize. In the language of Timur Kuran, they cause preferences to change, but they do not provide the initial spark (Kuran Reference Kuran1989, 63–6). The theory of spontaneous collective action also treats the spark as exogenous.

Scope Conditions

There are two primary scope conditions to the application of the theory to the Arab Spring. First, a country’s regime type may determine whether or not protest is a complex contagion phenomenon. Arrests, perfunctory trials, and long jail terms were standard state practices from Morocco to Bahrain (Bellin Reference Bellin2012; Gunning and Baron Reference Gunning and Baron2013; Khatib and Lust Reference Khatib and Lust2014), making it difficult for some core social network members to organize collective action. Second, mobilization is bounded by the costs a state imposes on protesting. Libya, Saudi Arabia, Bahrain, Syria, and Egypt in 2013 engaged in sustained violent repression of collective action, with heterogenous outcomes.

Authoritarian regimes are likely to repress individuals who impugn them, as targeted repression is a more effective tactic than indiscriminate killing (Siegel Reference Siegel2011). Arbitrary jailing, torture, forced exile, and threats to family are all common tactics used to silence antiregime individuals. In countries where those who desire policy change and are central to a network are routinely intimidated or silenced, they may not have the ability or desire to engage in coordination activities, and coordination would necessarily occur through those on the periphery. Moreover, in countries tolerant of mass gatherings, individuals may have lower thresholds of participation since they do not fear repression. If an individual does not expect protest to be large to be safe, he or she may join a protest alone or after hearing about it from a core social network member. In these cases, protest is more likely to be a simple contagion event and so be more affected by core members of a social network.

Second, any state can stop protests if it is willing to impose high enough costs (Blaydes and Lo Reference Blaydes and Lo2011). In March of 1988 in Burma, protests started over an event just as random as a Tunisian fruit vendor lighting himself on fire: a youth arrested for fighting other youth was released from jail through political connections. Tension boiled over the summer, a general strike started on August 8, and the state engaged in ambiguous amounts of repression. On September 18, repression became less ambiguous as a result of an army coup; the ensuing repression resulted in at least 1,000 deaths in Rangoon, 3,000 nationwide (Ferrara Reference Ferrara2003). Protests, which had been stronger throughout August but were tapering by mid-September, ceased. In 1989, a protest movement in China grew over the course of several months; by the end of May, Beijing hosted 250,000 soldiers, and multiday violent repression began on June 3. That repression, in conjunction with the arrest of party leaders and Communist Party reformers, squelched the movement. In 2011 in Egypt, individuals soon realized that the armed forces were not going to repress protests, yet in August 2013, the Egyptian army massacred hundreds, perhaps thousands, of pro-Muslim Brotherhood supporters who were staging long-term sit-ins at two Cairo squares after the July 3 coup against President Mohamed Morsi (Meirowitz and Tucker Reference Meirowitz and Tucker2013). Repression against secular activists also increased, with those continuing to protest facing lengthy jail sentences or death (Mackey Reference Mackey2015). Bahrain’s security forces killed protesters at the Pearl Roundabout, after welcoming a coalition of forces from Gulf states; leaders of al-Wefaq, the main Shia opposition party that participated in government before the start of protests, are now in jail, and the party’s leader faces a four year sentence for inciting violence against the monarchy (Kerr Reference Kerr2015). While a state faces internal and external costs from repression, the ultimate success of any protest mobilization depends on the state’s willingness to repress.

DATA

The Integrated Conflict Early Warning System, a machine-coded events dataset that reads newspaper articles, provides the dependent variable, number of protests, across 16 countries in the Middle East and North Africa from November 1, 2010 through December 31, 2011(Boschee, Lautenschlager, O’Brien, Shellman, Starz and Ward Reference Boschee, Lautenschlager, O’Brien, Shellman, Starz and Ward2015). ICEWS codes 20 categories of events of increasing severity, from public statements through unconventional mass violence. All events coded as protests in one of these 16 countries country are kept. These countries are Morocco, Algeria, Tunisia, Libya, Egypt, Lebanon, Syria, Jordan, Saudi Arabia, Oman, Yemen, Bahrain, the United Arab Emirates, Kuwait, Iraq, and Qatar; Israel is excluded. Figure 1 shows the ICEWS recording of protest in two high-protest (Egypt, Bahrain) and low-protest (Morocco, Qatar) countries.

Notes: This figure shows that ICEWS captures different levels of intensity of each country’s protests, both temporally and in cross section. Egypt, which experienced sustained, widespread protest, has the most recorded protests of any country in the dataset, but it has fewer per person than Bahrain. Morocco had a sustained protest campaign that did not mobilize as many people as Egypt or Bahrain, and Qatar experienced no protests. ICEWS’ count of protests also varies during days they are expected to.

FIGURE 1. Protests per Million Inhabitants

Social media data are ideal for understanding protest, for three reasons. First, in states that control information disseminated through newspapers, radio, and television, social media are one of the few independent sources of information (Edmond Reference Edmond2013). Social media have therefore become a tool for citizens to gather and disseminate information in information-scarce environments such as authoritarian regimes. In this way, social media may have a similar effect as independent media (Egorov, Guriev and Sonin Reference Egorov, Guriev and Sonin2009) or the disclosure of economic data by an autocrat (Hollyer, Rosendorff and Vreeland Reference Hollyer, Rosendorff and Vreeland2015). Second, state actors belatedly realized the power of social media, leaving it unregulated; lack of regulation made social media an attractive tool for anyone seeking independent information, and the information contained in social media therefore more closely reflected the offline world than did official news sources (Hamdy and Gomaa Reference Hamdy and Gomaa2012). Social media has therefore become a critical component of many protest movements, starting with the 2009 Iran election protests and continuing through the Ukraine civil war (Burns and Eltham Reference Burns and Eltham2009; Rahimi Reference Rahimi2011). Third, it provides the best temporal resolution of any data source. It is therefore one of the few sources available to researchers interested in dynamic processes that can provide microlevel information on these processes.

Twitter, a global social media platform, provides data on daily, individual-level communication. It is a global social network with over 500 million users generating almost 500 million daily messages (tweets). Anyone with an internet connection or phone can access it, and most users create and consume content using their mobile devices; contrary to popular belief, one can compose and consume tweets from any kind of phone, though smartphones greatly facilitate the process. The company does not edit or censor its users’ tweets, so the content of the network reflects what individuals are discussing at any moment.Footnote 2 Only China and North Korea have completely blocked access to it, though countries have temporarily blocked it at different times.

There are four reasons to prefer Twitter as a data source to other social media platforms. First, it is one of the most used social media platforms, usually second only to Facebook (Duggan and Smith Reference Duggan and Smith2013). Second, it is often used during crisis events to disseminate information, including during protests (Earl, McKee Hurwitz, Mejia Mesinas, Tolan and Arlotti Reference Earl, Hurwitz, Mesinas, Tolan and Arlotti2013; Tonkin, Pfeiffer and Tourte Reference Tonkin, Pfeiffer and Tourte2011). Third, though it is used to discuss political events such as protests, it is also used to engage in quotidian topics like celebrity gossip, the weather, and sports (Boyd, Golder and Lotan Reference Boyd, Golder and Lotan2010; Sinha, Dyer, Gimpel and Smith Reference Sinha, Dyer, Gimpel and Smith2013). In the sample of tweets used later to train a naïve bayes classifier, almost 75% were not about political events. Fourth, Twitter provides a large amount of its data through two programming interfaces, making Twitter data easier to obtain than Facebook’s. While other sites with social networking components, such as YouTube or reddit, are also relatively easy to gather data from, none are also used as comprehensively as Twitter.

Moreover, the norms of communication on Twitter makes it the most reliable way to measure coordination across so many countries and days. There are four ways a user can modify a plaintext tweet. The most common is the # symbol, known as the hashtag. Individuals will affix a hashtag to the front of a word to associate it with a certain conversation, e.g., “Eyewitnesses: NDP thugs throwing molotov cocktails inside the Egyptian Museum. I repeat NDP thugs, NOT anti-Mubarak protesters. #Jan25 #fb”. If a different user then searches for messages containing “#Jan25” or “#fb”, this tweet will be returned; employing a hashtag therefore makes the information in one’s message more likely to spread beyond just one’s social network (Romero, Meeder and Kleinberg Reference Romero, Meeder and Kleinberg2011). Users quickly converge on a few hashtags to use for an event, whether that event is a protest, sporting event, or pop culture meme (Bruns and Burgess Reference Bruns and Burgess2011; Lehmann, Gonçalves, Ramasco and Cattuto Reference Lehmann, Gonçalves, Ramasco and Cattuto2012).

Twitter makes it easy to find all tweets containing a hashtag. A user interested in upcoming protests could therefore search, from her smartphone or a computer, for “#jan25”, “#egypt”, or other hashtags and retrieve every tweet containing those hashtags.Footnote 3 That person is therefore quickly exposed to vastly more information than she could gain from traditional interpersonal communication, and she knows that everyone else searching those hashtags will see the same tweets. She is therefore confident that when she reads about the meeting in Batal Ahmed street, many others have read about it as well, and others who search for “#jan25” know that others have seen that tweet as well. The prevalent use of hashtags, convergence to very few during major events, and ease of finding information related to the hashtag make tweets with hashtags the key coordination mechanism.

Twitter data come courtesy of researchers at Northeastern University’s Laboratory for the Modeling of Biological and Socio-Technical Systems (Mocanu, Baronchelli, Perra, Vespignani, Goncalves and Zhang Reference Mocanu, Baronchelli, Perra, Vespignani, Goncalves and Zhang2013; Steinert-Threlkeld, Mocanu, Vespignani and Fowler Reference Steinert-Threlkeld, Mocanu, Vespignani and Fowler2015). The tweets involved in this analysis were extracted from Twitter’s 10% API, an unbiased sample of 10% of all public activity on the platform. There are two ways in which country of origin was identified. First, if a Twitter user has enabled location sharing, the tweet will have GPS coordinates, and Twitter will assign a two letter country code to those tweets. Each tweet is then read for a two letter code corresponding to one of the 16 countries and saved if there is a match. Second, users can report their location as part of their profile, and that location is reported as metadata with each tweet. The user-reported location is then compared to a dictionary of cities and country names to assign each tweet to a city or country; if that location is part of this study, the tweet is saved.Footnote 4 Unlike previous studies that analyze contentious events, tweets in this dataset were not selected based on hashtags, providing a representative sample of what Twitter users were actually talking about, e.g., protests or the weather, during this period. Only 19.74% of all tweets in this sample contain a hashtag, and most are apolitical.

1.95% of tweets in this sample have GPS coordinates, with the location information of the rest coming from user-reported location. These numbers correspond with other work that finds more than an order of magnitude more tweets when using self-reported location (Leetaru, Wang, Cao, Padmanabhan and Shook Reference Leetaru, Wang, Cao, Padmanabhan and Shook2013). It is worth nothing that tweets in the United States with GPS coordinates exhibit bias towards urban areas, nonwhites, and high-income groups (Malik, Lamba, Nakos and Pfeffer Reference Malik, Lamba, Nakos and Pfeffer2015), and there is some evidence that users of Twitter in Egypt tend to be well-off individuals in cities (Tufekci and Wilson Reference Tufekci and Wilson2012). Malik et al. (Reference Malik, Lamba, Nakos and Pfeffer2015) do not include tweets with user-reported location and Tufekci and Wilson (Reference Tufekci and Wilson2012) do not ask whether users geotag their tweets, so it is unclear if using user-reported location removes these biases.

For a comprehensive of review of Twitter as a data source and a tutorial on how to use it for social science research, see Steinert-Threlkeld (Reference Steinert-Threlkeld2017).

MEASURES

Coordination

A Gini coefficient for hashtags operationalizes coordination. The Gini coefficient, which ranges from zero to one, usually measures income inequality, but it can be used on any orderable discrete quantity. Instead of measuring wealth per person, it here measures occurrences per hashtag per day per country; a one means that one hashtag accounts for all hashtags used in that country on that day, a zero that every observed hashtag occurs the same number of times. This measure is labeled Coordination i, t for the rest of the article, and the Supplementary Material provides a graphical explanation of the operationalization.

Equation (1) shows this calculation. For each day t in each country i, there exist n unique hashtags. Coordination i, t counts the number of times each hashtag j occurs (cj ) and uses those counts to calculate the Lorenz Curve of (hashtag) inequality, for i = 1, . . ., 16 and j = 1, . . ., 426.

(1) $$\begin{equation} Coordination_{i,t} =\frac{2\sum _{j=1}^{n}jc_j}{n\sum _{j=1}^{n}c_j} - \frac{n+1}{n}. \end{equation}$$

Three other Twitter behaviors that may impact coordination are measured. Retweets, equivalent to forwarding an email to one’s entire contact list, can also promote coordination. An example of a retweet is, “RT @Ekramibrahim: Police, specially in civil clothes are holding electricity sticks. #jan25”. Ekramibrahim is the author of the message after the colon, but the person who sent the tweet read Ekramibrahim’s message and retweeted it to her followers. This secondary message is the retweet, and the reader knows it was seen by at least the followers of Ekramibrahim and the person who retweeted it. A message can be retweeted an infinite number of times, though a user who sees a retweet only knows that at least one person retweeted it; in practice, most tweets are not retweeted, those that are are not retweeted often, and the retweet rate decays to almost 0% after 24 hours (Kwak, Lee, Park and Moon Reference Kwak, Lee, Park and Moon2010; Liere Reference Liere2010; Starbird and Palen Reference Starbird and Palen2012).Footnote 5

A message can also contain a user mention or a link. A message that directly refers to another user by name is said to contain a user mention. If a user writes, “@ramezm i noticed a debate: #25jan or #jan25”, @ramezm will receive a personal notification about the message; a tweet with a user mention is still viewable by the followers of the original author. Tweets also often contain links to photos and articles, though those messages are rarely retweeted (Suh, Hong, Pirolli and Chi Reference Suh, Hong, Pirolli and Chi2010).

Retweets, links, and mentions are not as effective at promoting coordination as hashtags. While more retweets of one tweet means that more people have seen the same set of information, the prevalence of hashtags means the information in a retweet is also available to those searching for hashtags that the retweet happen to contain. The same logic is true of links: if a link is meant to provide coordinating information, it will almost certainly contain a hashtag that is also relevant to coordination. While it is possible that user mentions have a strong coordinating effect outside of their employment of hashtags, they are dyadic and tend to be part of conversations—they are not used to mobilize protesters.

Equation (2) shows the calculation of these other measures of potential coordination. For each day t and country i, the measure counts the number of tweets, K, and tweets with measure Mk . m is a count of tweets with a link, mention of another user, or that are a retweet, depending on the measure in question. Dividing the measure by the number of tweets that day in that country quantifies the amount of other possible coordination that could have occurred in addition to Coordination i, t ,

(2) $$\begin{equation} MPercent_{i,t} = \sum _{i=1}^{16}\sum _{t=1}^{426}\frac{1}{K}*\sum _{k=1}^{K}m_{k}. \end{equation}$$

Note that Coordination i, t is one variable that encompasses the two mechanisms, signalling and protest information provision. This measurement choice was made for four reasons. First, Coordination i, t should measure information protest information provision because it measures hashtag concentration, and individuals on Twitter use hashtags to quickly identify their tweets as being about a specific topic. During periods of heightened political awareness, the most common hashtags are most likely to be about politics; a tweet with “#jan25” is not likely to be about sports or the weather, for example. While this measure could create false positives—days that appear to have high coordination but are really people talking about something else like a meme or a cultural event—the Supplementary Material’s case study shows that this is not the case.

Second, Coordination i, t is preferred to a supervised learning model of protest information provision because it scales easily and is directly comparable across countries. Tweets often contain slang that varies by country, so making a supervised learning model for each country is a large project in its own right. Aside from requiring much more labor, creating a content model, whether supervised or unsupervised, risks constricting results to words or topics that the researcher has an a priori expectation will matter (Grimmer and Stewart Reference Grimmer and Stewart2013). A hashtag Gini, on the other hand, is agnostic to what words people say or how many topics they discuss; caring only about the hashtags, it will measure any hashtag used (not just the ones thought of in advance), revealing after the fact which hashtags are most salient.

Third, Coordination i, t is preferred to selecting specific hashtags because it scales easily and is directly comparable across countries. The hashtags used to coordinate an event are different in each country and change over time. Determining which hashtags to use for a given period of time therefore requires subject matter expertise on the digital arena of many countries over many months, which is not feasible for a large cross-national study. Moreover, because individuals pool on certain hashtags during protest periods, measuring hashtag concentration picks up on the most common protest hashtags. This behavior is explored in more detail in the Supplementary Material.

Fourth, Coordination i, t is preferred over a direct measure of signalling because it is not clear how to measure signalling on Twitter. The best approach would be to separate out the amount of signalling and protest information tweets which come from the periphery and the core. But it is not clear how to classify a “signal” tweet, and a more precise method of measuring protest information tweets does not scale well, as discussed in the previous paragraph. In addition, the three other coordinating behaviors discussed above can each signal peripheral participation. A link to a news article about the mass protests is not the same as a user saying, “I will protest tomorrow and I have never protested before,” even if both tweets come from the same account. Similarly with a photo showing a diverse crowd at a protest. In Table 4, an attempt is made to measure the signal component of coordination, and the next subsection discusses how to tease apart that Coordination i, t which is from the core.

Core Coordination

To measure coordination from the core, one has to first identify individuals at the center the network. Identifying this core is difficult. There are too many users—20,094 in Bahrain and 79,235 in Egypt alone—in the Twitter data to assign manually an identity to each one, and that attempt would result in a low identification rate because Twitter does not require individuals to publicly disclose any identification information. One can measure, however, the number of followers each account has; this measure, in-degree centrality, is not as precise a measure of centrality as those created with complete network data (Kwak, Lee, Park and Moon Reference Kwak, Lee, Park and Moon2010; Pei, Muchnik, Andrade Jr., Zheng and Makse Reference Pei, Muchnik, Andrade, Zheng and Makse2014), but complete network data are not available. Those in the core are therefore approximated based on the distribution of popularity in each country. For the main model, a tweet belongs to a core member if its author’s number of followers are at or above the 95th percentile for all users in country i. More formally,

(3) $$\begin{equation} Core = \left\lbrace \begin{array}{l@{\quad}l}1 & \text{if PR$_i$(f)} \ge 0.95\\ 0 & \text{if PR$_i$(f)} < 0.95 \end{array}, \right. \end{equation}$$

where PR(f) is the percentile ranking of the tweet based on the number of followers.

Previous work that manually identified a random sample of users from Tunisia and Egypt informed the selection of this threshold (Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff Reference Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff2011). Table 1 compares the number of followers and tweet production for the categories identified in Lotan et al. (Reference Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff2011) with this article’s primary popularity threshold; the threshold used later is bolded. In Tunisia, the core measure appears to roughly be most similar to bloggers; in Egypt, to bloggers and activists, though the manually identified accounts in Egypt are much more popular than any of the popularity measures. Mainstream media accounts and employees of mainstream media are the most central in each country and skew the country-level results upwards. The Results section shows that varying the follower threshold does not change the result. The Supplementary Material also shows how tweet production and the ratio of the core’s followers to the periphery’s followers varies by country and threshold; users at the 95% threshold account for 10% of all tweets in Kuwait, up to 50% in Syria.

TABLE 1. Comparing Core Measure with Hand-coded Accounts

Notes: Categories are borrowed from Lotan et al. (Reference Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff2011). They coded for accounts associated with mainstream media organizations, mainstream new media organizations (news sites that exist only online), mainstream media employees, any organization that is not a media organization (Vodafone and Wikileaks are their examples), bloggers, activists, digerati, political actors, celebrities, researchers, bots, and a residual category. Any of those categories not identified here means that no account from that category was found in the data. The bold rows represent the category used to identify core members. Other categories are used in robustness checks, with no changes to the results. For a discussion of the Blackout row, please see the Egypt case study.

Having identified tweets produced from those in the core, one can then identify when the core engages in coordination. Because hashtags are the primary method of coordination and high levels of coordination lead to protest, the percentage of hashtags per country per day produced from the core is interacted that with the coordination measure. The percent of tweets with hashtags that are created in the core is defined as

(4) $$\begin{eqnarray} &&Core\, Coordination_{i,t} = Coordination_{i,t}\nonumber\\ &&\quad*\frac{1}{K}*\sum _{k=1}^{K}Core_{k}*Hashtag_{k}. \end{eqnarray}$$

For each country i on each day t, each of the K tweets is read for whether it contains a hashtag and is from a core account. The number of those tweets is divided by the number of tweets in that country-day and interacted that with that country-day’s level of coordination, resulting in a core coordination measure for that country-day. The regression results leave the constituent parts of the variable as the variable name to ease interpretation; the summary statistics use the shortened name to save space.

In-degree—the number of followers an account has—is chosen to measure core position for three reasons. First, it is the only network centrality measure which does not require complete network data. Twitter imposes limits on how often one can download data, making it impossible to create the adjacency matrix necessary to create measures like Eigenvector or k-core centrality. Second, one could approximate a complete network by inferring ties when a retweet or mention occurs, but that requires pooling data, losing the time component necessary for this theory (Barberá, Wang, Bonneau, Jost, Nagler, Tucker and González-Bailón Reference Barberá, Wang, Bonneau, Jost, Nagler, Tucker and González-Bailón2015). Finding “hidden influentials,” those who follow many more people than follow them (normal Twitter behavior) and who are mentioned much more than they mention others (which happens for well-known accounts like celebrities or politicians) is another strategy, but it again relies on pooling across time (Gonzalez-Bailon, Borge-Holthoefer and Moreno Reference Gonzalez-Bailon, Borge-Holthoefer and Moreno2013). Third, this article’s theory is about how position in a social network correlates with protest mobilization. If in-degree does not identify those who influence protest, then that means those in the network core do not influence protest. Future work should then find ways to identify individual accounts that are influential; one approach, handcoding accounts by profession, is explored in Table 5.

MODEL

The base model is

(5) $$\begin{eqnarray} Protests_{i,t} &=& \beta _0 + \beta _1*\Omega _{i,t-1}\nonumber\\ &&+ {\bm \beta }*{\bf X}_{i,t-1} + Protests_{i,t-1} + \epsilon _{i,t}, \end{eqnarray}$$

where Ω represents the independent variables of interest in each model, X represents a series of controls, and ε is a stochastic error term. Because the dependent variable is a count of protests, it is an integer always greater than or equal to zero. Since Protests i, t is overdispersed and the zeroes are true zeroes, a negative binomial model instead of a Poisson or zero-inflated negative binomial is used.

Because high levels of coordination are colinear with high levels of hashtag usage, the model controls for the percent of a day’s tweets that have hashtags, ensuring that it measures actual coordination and not a coincidental increase in hashtag usage. The models of peripheral coordination control for the percent of a day’s tweets which are retweets, contain links, or mention another user because those features may have some coordination effect. The models of core coordination similarly control for the percent of all tweets with at least one hashtag that are from accounts of the core; the percent of all tweets that are retweets which are from core members; and so on for links and mentions.

There are three nonindividual controls: country fixed-effects, a lagged dependent variable, and a lagged measure of the number of repression events as measured by ICEWS. Repression is any event with a CAMEO code of exhibiting military posture (event root code 15), coercion (17), using unspecified unconventional violence (18), a physical assault (182), torture (1822), or death by physical assault (1823).

Every variable on the right-hand side is lagged by one day to mitigate any simultaneity effects. All models include country fixed effects but no day fixed effects, as the latter bias the errors and lead to underestimates of protests. Finally, all models are run with country-clustered standard errors.

Table 2 shows the correlation between the main independent variables, and Table 3 shows the average value of each variable per country (along with each’s total tweets and protests).

TABLE 2. Variable Correlation

TABLE 3. Variables by Country

TESTS

Results

The main results are presented in Table 4. Columns 1 and 2 show coordination only from the periphery, and columns 3 and 4 build the models for core coordination in the same way. The main model, used throughout the rest of the article, is shown in column 5. Across most models, Coordination i, t − 1, the measure for peripheral coordination, is significant with a p value much less than 0.01. The only other significant variables are a lagged dependent variable (positive), intercept (negative), lagged repression (weakly positive), and noninfluential hashtag percent (positive). Note that Model 5, the full model, suggests that coordination from the core is inversely associated with protests.

TABLE 4. Peripheral Coordination and Protest

Notes: *p < 0.1; **p < 0.05; ***p < 0.01. Model 3 includes Coordination i, t and Core Hashtag i, t − 1 because those are the constituent parts of the measure of influential coordination.

Because the model is not linear, coefficients do not directly translate into changes in the outcome variable. The marginal effects of Coordination i, t − 1 & Coordination i, t − 1*Core Hashtag % i, t − 1 are shown in Figure 2. Going from no coordination to the maximum observed values leads to about two additional protests, a 400% increase, while there exists no effect for core coordination.

FIGURE 2. Marginal Effects of Peripheral and Core Coordination

A series of time series diagnostic tests confirm the model specification.Footnote 6 A Durbin-Watson test for serial correlation returns a test statistic of 1.9741 and p value of 0.1303, suggesting no serial correlation. The Dickey-Fuller coefficient is − 11.25 and has a p value less than 0.01, so the dependent variable is stationary (visual inspection also confirms the stationarity). The Breusch-Pagan test statistic is 539.09 with a p value almost at 0; to control for the heteroskedasticity, I use country-clustered standard errors. Finally, a Lagrange-Multiplier test with the King & Wu test for two-way fixed effects returns a chi-square value of − 0.81, so it is safe to avoid using time fixed effects.

Verification

There are three possibilities that may undercut these findings. First, the models may use the wrong measure of coordination, both for the core and the periphery. Second, the operationalization of core members may be wrong. Third, reliance on machine-coded data may bias in favor of finding results.

Figure 3 allays the first concern. To confirm that Coordination i, t measures coordination, a supervised learning model for Egypt and Bahrain was created. Those two countries were chosen because they experienced widespread protest and have too many tweets to code individually. For each country, 3,000 tweets were randomly selected and coded into overlapping categories, one of which was protest information. A naïve bayes classifier was trained on a random 95% of each country’s coded tweets; the other 5% was used to validate out of sample performance. This process was repeated 30 times, and the results were averaged into a final model; this process is known as bagging and is akin to bootstrapping in regression. The resulting model is applied to each country’s tweets, creating a classification for every single tweet in the sample from Egypt and Bahrain. Once protest information tweets are identified, they are aggregated by country-day and compared to the Coordination i, t measure. That result is shown in Figure 3: there is a strong positive relationship between the measure of coordination and the actual number of protest information tweets. See the Supplementary Material for the codebook and more details on the supervised learning model.

FIGURE 3. Verifying Operationalization of Coordination

Two placebo tests also address concerns about Coordination i, t . The first test shows that the correlation of Coordination i, t − 1 and Protest i, t decreases substantially as an increasing number of the most popular hashtags on a country-day are removed, suggesting that coordination on nonprotest hashtags does not drive subsequent protest. The second test shows that the correlation of Coordination i, t and Protest i, t peaks with a one-day lag and decreases monotonically before and after. The Placebo Tests subsection addresses these tests in more detail.

Table 5 addresses the second concern. In column 1, accounts from Lotan et al. (Reference Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff2011) in this sample are identified and controlled for. Accounts from activists or bloggers are called “Online Actors,” while there are not variables for politician, researcher, digerati, or celebrity accounts because those were not found in the sample from either country. It appears that mainstream media accounts (official accounts of news organizations) do positively correlate with subsequent protest. The main coordination measure is still strongly significant, as is retweet percentage; links appear to decrease in rate leading up to protests. The second and third columns of Table 5 show alternative measures of coordination in the core. Core Reachout % i, t − 1 measures the percent of all retweets and mentions that come from those in the core. Core coordination may occur through those in the core engaging with specific individuals (mentions) or acting as information brokers (finding important tweets and retweeting them), not through hashtags. Column 2 controls for this possibility. On the other hand, the core may have a coordination effect simply by being active leading up to protests; their activity may signal a breakdown of support for the regime, a willingness to incur high personal costs that inspires the periphery, or they just may not use hashtags. There appears to be some effect for tweets from the core—Core Tweet % i, t − 1 is significant at p ⩽ 1—but their tweet activity on high coordination days does not correlate with subsequent protest. In all three models, coordination from the periphery is still significant and coordination from the core is not.

TABLE 5. Robust to Operationalization of Core, Periphery

*p < 0.1; **p < 0.05; ***p < 0.01

To confirm the 95% threshold used to identity the core, the threshold was varied from the 80th percentile to the 99.9th, and Model 5 from Table 4 is rerun for each threshold. Figure 4 shows how the significance level of Coordination i, t − 1*Core Hashtag % i, t − 1 varies as the percentile threshold changes; the vertical lines are at ± 1.96 to show significance at the 5% level. Figure 4a shows the result from 10 models, where model 1 uses a cutoff at the 99.9th percentile and model 10 is at the 99th; Figure 4b shows the result from 20 models, where model 1 uses a 99th percentile threshold and the 20th uses the 80th percentile. In all iterations, Coordination i, t − 1, Repression i, t − 1, and Protest i, t − 1 remain significant.

FIGURE 4. Change in Effect Size as Function of Core Threshold

The results in Figure 4 are intriguing. The effect of core coordination hovers around zero for most of the threshold’s range and is distinguishable from zero at the 99th and 99.1st percentiles, as well as at the 95th percentile. On the other hand, at the upper extreme of the follower distribution, the 99.7th percentile and above, the sign on Core Coordination i, t − 1 is positive and significant using a 95% confidence interval.

The apparent positive effect from core coordination above the 99.7th percentile should not, however, be assigned much weight, for three reasons. First, these models also find that Core Link % i, t − 1 is negative and significant, with an effect from half as strong to equal with that of core coordination. Second, the pooled results are driven by outlier countries with few tweets and users at or above the 99.7th percentile threshold. Whether the threshold is 99.7, 99.8, or 99.9, the effect disappears when the model is rerun using only Bahrain, Egypt, Jordan, Lebanon, Qatar, Saudi Arabia, and the United Arab Emirates, the only countries with more than 10,000 tweets from users at or above the 99.7th percentile. All these countries are also the only ones with more than 25 users at this point in the distribution (except for Morocco, with 30). Because the final dataset is at the country-day level, it does not distinguish between a day in Egypt that may have 500 tweets from 20 accounts in the 99.7th percentile core from one in Algeria that has 1 tweets from 1 of the 2 accounts above the same cutoff. The resulting models therefore overweight Algerian core users. Rerunning the main model with only the seven countries just described therefore provides a more accurate understanding of the dynamics this far into the followers’ distribution, and models on these seven countries show no effect for members of the core. Third, it is more likely than not that these accounts represent institutions such as news outlets or nonprofit organizations than people.Footnote 7 As Table 6 shows, these accounts are frequent tweeters, and those tweets are more likely to contain hashtags or links. Such behavior is most similar to how news organizations use Twitter (Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff Reference Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff2011); Table 1 in the Measures section compares the 99.9th percentile core users to confirmed news accounts in Tunisia and Egypt, showing similarity between the two. The probability that these accounts are news organizations is further increased by rerunning the main model using only Arabic tweets. Using only Arabic tweets when the core is defined at the 99.7th, 99.8th, or 99.9th thresholds, Coordination i, t − 1*Core Hashtag % i, t − 1 is not statistically significant. Overall, the positive effect suggested in Figure 4a is probably driven by a few media accounts in countries with less Twitter data than others in the sample.

TABLE 6. Core Threshold Descriptive Statistics Across Countries

Table 7 verifies the ICEWS dependent variable. ICEWS relies on news reports, and these reports have well-known biases in coverage (Davenport and Ball Reference Davenport and Ball2002; Eck Reference Eck2012; Herkenrath and Knoll Reference Herkenrath and Knoll2011). Machine-coded events data can suffer from event duplication (Caren Reference Caren2014; Hammond and Weidmann Reference Hammond and Weidmann2014), though one of ICEWS’ strengths is its focus on event deduplication. The results could therefore be driven by news media’s bias towards major, unexpected events and duplicated events. In the first column of Table 7, ICEWS’ count of public statements is the dependent variable. If ICEWS simply picks up news activity, it should record a surge in public statements along with protest, and coordination will then correlate with public statements. Column 1 shows that coordination does not correlate with public statements, suggesting that Protest i, t actually captures protest.Footnote 8

TABLE 7. Robust to Dependent Variable

*p < 0.1; **p < 0.05; ***p < 0.01

The second column shows that the results do not appear to be driven by duplication. The dependent variable is Protest Rate i, t , the number of protests on a country-day divided by the number of ICEWS events at that time. If ICEWS duplicates, then the protest rate should not change across the sample and there will be no correlation between Coordination i, t − 1 and Protest Rate i, t . Coordination i, t − 1 is still significant and Coordination i, t − 1*Core Hashtag % i, t − 1, in line with the main results.Footnote 9

Columns 3 and 4 in Table 7 present the final verification of ICEWS’ protest count. Since newspapers overreport major events and ICEWS overreports newspapers, it is possible that the results are driven by the upper end of the protest distribution. Column 3 drops all protest-days that have protests three standard deviations above the country’s average, and column 4 drops all protest-days in the upper quartile of each country’s protest distribution. In both cases, Coordination i, t − 1 is significant while elite coordination is not. The main finding of this article, that coordination occurs along the periphery of a network, is not an artifact of using machine-coded data.Footnote 10

Further verification of the dependent variable is shown in Figure 5, which shows that ICEWS’ count of protests strongly correlates with hand-coded data. The Armed Conflict Location and Event Dataset (ACLED) is hand-coded and contains data on the number of riots and protests in Algeria, Egypt, Libya, Morocco, and Tunisia for 2010 and 2011 (Raleigh, Linke, Hegre and Karlsen Reference Raleigh, Linke, Hegre and Karlsen2010). ACLED provides greater event granularity than the Social Conflict in Africa Dataset, another hand-coded events dataset that contains protests (Hendrix, Hamner, Case, Linebarger, Stull and Williams Reference Hendrix, Hamner, Case, Linebarger, Stull and Williams2012). The two measures have a Pearson’s correlation coefficient of 0.468.

FIGURE 5. ICEWS Correlates with Handcoded Data

The Supplementary Material contains further analysis. To make sure the model is not sensitive to specific countries, the main model is run while throwing out countries that may have overly influenced results. Removing the five countries with the highest levels of protests per capita, the results hold. Removing the five countries with the lowest levels of protests per capita, the results hold. Removing the five countries with the most tweets per capita, the results hold. Removing the five countries with the fewest tweets per capita, the results hold. I also include a fixed effect for Fridays, as protests commonly followed Friday prayers; there is a Friday effect, but it does not change the effects of coordination or core coordination. These results suggest that the coordination patterns are widespread throughout the dataset and not dependent on a few countries or specific days.

To address concerns about machine-coded data, it uses the ACLED measures as a dependent variable and shows that coordination may still occur without the core’s coordination, though ACLED’s little variation on the dependent variable means most results do not attain traditional levels of statistical significance. In results not presented, ICEWS is shown to correlate with GDELT (Leetaru and Schrodt Reference Leetaru and Schrodt2013), another machine-coded events dataset; their Pearson correlation coefficient is 0.785. All models presented here and in the Supplementary Material were rerun using GDELT, and all results hold. Finally, the Supplementary Material shows that the number of protests recorded on a country-day in ICEWS correlates with the estimated number of people who protested in a country on that day, as recorded by the Social Conflict in Africa Dataset (Saleyhyan and Hendrix Reference Salehyan, Cullen, Jesse, Christina, Christopher, Emily and Jennifer2012).

To make sure that domestic actors seeking to draw international attention do not drive coordination, the Twitter-based variables are generated using only Arabic tweets. The results hold.

The Supplementary Material also shows the internal validity of the dependent variable and treatment. ICEWS records different numbers of protest across countries and days in ways that accord with those countries’ protest periods. For example, ICEWS records Morocco’s initial protests on February 20, 2011 as well as subsequent flares throughout the year. It reveals, however, that Morocco experienced fewer protests than Egypt and Bahrain, reflecting perhaps the regime’s greater legitimacy or more adroit handling of the protests (Benchemsi Reference Benchemsi, Khatib and Lust2014). ICEWS shows that Qatar experienced very little protest, with the recorded incidences probably reflecting noise in the coding process. Moreover, tracking the most common hashtags per day shows that they were protest related hashtags. In other words, Coordination i, t measures protest hashtags, not popular hashtags about nonprotest activity.

Placebo Tests

Two placebo tests confirm that the results on coordination are not a result of measurement error.

First, the coordination measure is calculated for each country-day while excluding the top 5, 10, and 20 most common hashtags for each day. The resulting coordination is therefore the coordination that occurs on less common hashtags, which are more likely to be nonprotest hashtags. (Hashtags were not manually identified so that the measure could scale easily across countries and days.) If coordination on less common hashtags correlates with protest as much as coordination on all hashtags, then the operationalization has mistaken chatter focused on nonprotest hashtags with protest coordination.

The results in Table 8 confirm that the original Coordination i, t measures protest coordination. The table shows the results of models where an increasing number of the most common hashtags per day—5, 10, then 20—are excluded from Coordination i, t . The coefficient on Coordination i, t ranges from 39.3% to 43.6% smaller (it is 2.575 when not excluding hashtags) and decreases as an increasing number of hashtags are removed. At the same time, the coefficient on Hashtag % i, t − 1 is now significant in each model (it was not significant in the original model), increases as more hashtags are removed, and almost triples is size compared to the full model. Not measuring the coordinating effect of the most popular hashtags pushes the correlation to Hashtag % i, t − 1. Note as well that the signs, coefficient size, and results on the other coefficients are very similar to their values in the original model.

TABLE 8. Coordination in the Hashtag Long Tail

*p < 0.1; **p < 0.05; ***p < 0.01

Second, the main model, Model 5 from Table 4, is rerun with different lags and leads on Coordination i, t − 1; if Coordination i, t − 1 does not measure coordination, there should be no change in coefficient size as the lags and leads change. In fact, as Figure 6 shows, the effect size is much larger for a one-day lag than it is for two- or three-day lags, and thereafter it decreases monotonically. The models suggest a positive correlation between a day’s protest and future correlation, but this correlation is never as strong as it is for a one-day lag, and it decreases as the future moves further away. These results are consistent with the theory of spontaneous collective action, as the theory does not say protest cannot affect future coordination, only that past coordination affects future protest. As Table 3 of the Supplementary Material shows, controlling for past protests does not change the results on Coordination i, t − 1.

FIGURE 6. Coordination i, t Peaks with One-day Lag

EXOGENOUS IDENTIFICATION OF THE CORE IN EGYPT

This section takes advantage of a sudden increase in the difficulty of accessing the internet in Egypt to identify core members of the Egyptian social network. Those who could access the internet during this period are more likely to be in the core than those who could not, so tracking their communicative behavior throughout the study should more precisely identify any role for the core. Those in the core according to this identification strategy also do not lead to protest mobilization.

Egypt’s January 25 protests surprised everyone—activists, bystanders, and state authorities—with its large mobilization and brief occupation of Tahrir Square. The Mubarak regime had spent the previous days denying that the events in Tunisia would spread to their country, despite a spate of imitation immolations (Khalil Reference Khalil2011, 127). Many Muslim Brotherhood leaders, despite not having sanctioned the protests, were summarily jailed, as the government assumed only it could mobilize such a crowd. With the next major protest called for January 28 after Friday prayers, the government suspended cell phone service and internet access just after midnight on January 28 (the morning of the 28th). The government appears to have figured that people would not protest if they could not communicate with one another; the plan backfired, as Egyptians had no way to communicate except by going outdoors. Instead, the blackout led to more protests (Hassanpour Reference Hassanpour2014).

Contrary to conventional wisdom, digital communication was not completely severed. One internet service provider, Noor, functioned through the end of January 31; it provided connectivity for critical government functions, the Cairo stock exchange, and several international hotels (Glanz and Markoff Reference Glanz and Markoff2011). Individuals who knew to go to hotels or who had friends with access to Noor could therefore use Twitter; even on the one day without any internet access, February 1, one could use landlines, dial-up modems, and Google’s “Speak to Tweet” service to get online (Gunning and Baron Reference Gunning and Baron2013, 286). The blackout therefore increased the cost of accessing the internet, limiting it to those with expertise or social connections with those who still had access.

Anyone observed tweeting from Egypt between January 28 through February 1 can therefore reasonably be classified as belonging to the core of Egypt’s network, regardless of their Lotan et al. coding or number of followers. This dataset observed 740 accounts that used Twitter from Egypt during the blackout, with a maximum of 338 tweeting on February 1. In terms of Twitter behavior, they are most similar to Egyptian bloggers and activists or those in the 99th percentile of the follower distribution. These users, who I call the blackout core, have an average of 8046 followers, and are responsible for an average of 650 tweets and 12.05% of all tweets. How they use Twitter differs, however: they retweet less often (4.74% of their tweets are retweets) than bloggers and activists (8% and 7%) but about as often as those in the 99th percentile, and they mention other users very infrequently—at 21.66%, less frequently than any other group in the sample. They use hashtags less frequently, in 21.66% of tweets, than bloggers, activists, or those in the 99th percentile. Yet 59.36% of their tweets contain a link, more than any other Egyptian group except Mainstream Media. That the blackout identification accords with the follower-based measure of influence used throughout the article provides reassurance about the validity of those measures.

Figure 7 shows how the blackout accounts’ coordination correlates with Coordination i, t and Core Coordination i, t and protest (size of each point). Blackout Core Coordination t was calculated the same way as Core Coordination i, t except that having tweeted during the blackout, not number of followers, is the grouping variable. For both measures, shown respectively in Figures 7a and 7b, there is strong correlation in the early part of new measure and the other two coordination variables. The day with the lowest level of lagged blackout coordination is January 28, the first day of the blackout; this result makes sense since January 27 was a more representative sample of Egyptian Twitter users than later days would be. The key is to pay attention to the distribution of the size of the points: days with many protests occur across a range of Blackout Coordination t values.

FIGURE 7. Blackout Influentials and Protest (a) Blackout Influentials and Protest (b) Blackout, Nonblackout Influentials

Replicating the main models from the Main Results section confirms that peripheral coordination drives protest mobilization. Table 9 shows these results: Blackout Coordination i, t − 1 is not significant in any model. The only stable result from the models is Blackout Mention i, t − 1, which is positive and significant. Though they infrequently mention other accounts, in comparison to the other categories used to delineate the core, they are more likely to do so during protest events.

TABLE 9. Blackout Accounts do not Provide Coordination

*p < 0.1; **p < 0.05; ***p < 0.01

DISCUSSION

This article claims that coordination occurs through those with few social connections, and this coordination leads to protest mobilization. These peripheral network individuals outweigh those in the core because protests diffuse through a complex contagion process, a process which, in the context of protests, requires distributed coordination to spread. These results join a growing body of quantitative work at the intersection of information and communication technology and state repression. Jan Pierskalla and Florian Hollenbach find that, in Africa, cell phone coverage increases the probability of violent conflict (Pierskalla and Hollenbach Reference Pierskalla and Hollenbach2013). Jacob Shapiro and Nils Weidmann find the opposite effect in Iraq; using time-variant data on new cell phone coverage, they find that the provision of cellular coverage decreases insurgent violence (Shapiro and Weidmann Reference Shapiro and Weidmann2011). Gary King, Jennifer Pan, and Molly Roberts measure censorship on Chinese blogs; they find that Chinese censors target posts which could generate collective action but are more permissive of writings critical of the Communist Party (King, Pan and Roberts Reference King, Pan and Roberts2013).

Focusing on modern authoritarian countries may restrict the generalizability of this finding. It may also be that modern telecommunication technologies—phones, fax machines, and mass media, not just social media—facilitates mobilization by making it easier for peripheral members to learn of other protests or coordinate without core social network actors (Hale Reference Hale2013; Warren Reference Warren2014; Weyland Reference Weyland2012); if that is the case, core social network members may have driven mobilization in earlier centuries. In countries where the state engages in less repression, especially before the start of protests, it may be that core social network members mobilize the periphery. Core network members may also behave in ways not recorded in events or social media data. Each possibility represents an intriguing avenue for subsequent research.

This article uses Twitter data to make claims about off-Twitter behavior, but the usage of Twitter data introduces two sampling concerns. First, services exist which allow individuals to buy followers, so those accounts here identified as belonging to the core may therefore not be true core members. In fact, the accounts most likely to buy followers are those desiring to be in the core and so behaving like core members: politicians, celebrities, or small businesses (Stringhini, Wang, Egele, Kruegel, Vigna, Zheng and Zhao Reference Stringhini, Wang, Egele, Kruegel, Vigna, Zheng and Zhao2013). Moreover, these types of accounts are likely to engage in more tweet and hashtag production than others, increasing the amount of coordination coming from the core (Wu, Hofman, Mason and Watts Reference Wu, Hofman, Mason and Watts2011). While the buying of followers does not appear to have been a systematic practice in any of the countries during this study’s period, that practice would bias in favor of finding core coordination.

Second, it is possible that individuals in the offline core select out of the Twitter core to avoid state repression, so the peripheral coordination may derive from peripheral Twitter accounts that belong to core members outside of Twitter. Though possible, work that has manually identified accounts in Tunisia and Egypt has been able to identify accounts belonging to political activists, suggesting online evasion may not be extensive (Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff Reference Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff2011). Identification of users from Lotan et al. (Reference Lotan, Ananny, Gaffney, Boyd, Pearce and Graeff2011) in these data show that their tweets correlate negatively with subsequent protest (see Table 5, Model 1). Ethnographic work from Egypt shows that certain individuals believed their social network accounts to be monitored, but they did not respond by creating more social media accounts (Gunning and Baron Reference Gunning and Baron2013, 284–7).

Despite the reliance on social media data, this article does not address whether they, or telecommunications more broadly, affect protest. On one hand, social media may increase subsequent protest if it causes more individuals to learn about the state’s actions and those individuals protest when they would not have without the knowledge-providing role of social media. Yet the knowledge-providing role could have counterbalancing effects: as more people learn the resolve of the state against protesters, fewer individuals may protest than otherwise would have. Appropriately answering this question requires data with very precise location information, preferably with temporal variation of social media presence. These data exist and have been used to test violence in Africa (Pierskalla and Hollenbach Reference Pierskalla and Hollenbach2013) and Iraq (Shapiro and Siegel Reference Shapiro and Siegel2015; Shapiro and Weidmann Reference Shapiro and Weidmann2011), but the results are contradictory.

The article assumes that behavior on online networks parallels that of offline interpersonal ones, allowing researchers to make inferences on heretofore hidden behaviors; research comparing behavior on Twitter to behavior off it lends credence to this assumption. Large analyses of Twitter show that user behaviors are the same as those observed offline: the distribution of followers follows a power-law distribution (Kwak, Lee, Park and Moon Reference Kwak, Lee, Park and Moon2010), users connect to people who look like them (homophily) (Zamal, Liu, and Ruths Reference Zamal, Liu and Ruths2012), friends offline follow each other on Twitter (Xie, Li, Zhu, Lim and Gong Reference Xie, Li, Zhu, Lim and Gong2012), Dunbar’s number applies to users on Twitter (Dunbar, Arnaboldi, Conti and Passarella Reference Dunbar, Arnaboldi, Conti and Passarella2015), and interaction decreases with geographic distance (Kulshrestha, Kooti, Nikravesh and Gummadi Reference Kulshrestha, Kooti, Nikravesh and Gummadi2012). Substantively, survey work on activists in the U.S. Civil Rights movement and East Germany’s 1989 protests shows that knowing others who had protested is the strongest correlate with a respondent’s decision to participate (McAdam Reference McAdam1986; Opp and Gern Reference Opp and Gern1993), and surveys of protesters in Tahrir Square show that individuals learned about the protests primarily through interpersonal connections or satellite television (Tufekci and Wilson Reference Tufekci and Wilson2012). Using Twitter data allows the researcher to observe these patterns across more spaces and time than before, but using the data does not reveal whether Twitter, and online social networks more generally, affects offline interpersonal networks.

No work has been able to show if social media cause protest, as it is very difficult to know which countries or regions of countries do or do not have a social media platform and then compare those areas to similar places without social media. Because of the difficulty of isolating social media’s affect, this article has chosen not to ask that question. The point of using social media data is to better understand our world. Social media data, especially that which is publicly available, resolves the temporal resolution problem facing previous work, but connecting those data with detailed spatial data is still a challenge. Because of limits in the data for protests and the paucity of tweets from these 16 countries with GPS coordinates, for example, analysis here was restricted to the country level.

This article demonstrates the contributions big data can make to understanding processes of social influence in social networks. Researchers have begun to understand how these data can provide new insights into political phenomena such as voting (Bond, Fariss, Jones, Kramer, Marlow, Settle and Fowler Reference Bond, Fariss, Jones, Kramer, Marlow, Settle and Fowler2012) or ideological sorting (Barbera Reference Barbera2015). These data primarily come from online social networks such as Facebook or Twitter, though anonymized call records, YouTube, or discussion boards (Nielsen Reference Nielsen2012) are often used. While an ideal research design would randomly assign treatments in order to measure influence (Aral and Walker Reference Aral and Walker2012; Muchnik, Aral and Taylor Reference Muchnik, Aral and Taylor2013), observational studies on these new datasets may allow researchers to observe and measure otherwise hidden mechanisms (Grimmer Reference Grimmer2015; Monroe, Pan, Roberts, Sen and Sinclair Reference Monroe, Pan, Roberts, Sen and Sinclair2015; Shah, Cappella and Neuman Reference Shah, Cappella and Neuman2015). For example, studies of protest mobilization have relied on post hoc surveys, but social media allow one to observe how individuals behaved, not how individuals reported they behaved.

Properly used, social media data should become another tool for researchers, and it is most likely to generate knowledge when used as a window into already existing processes (Bennett and Segerberg Reference Bennett and Segerberg2013). It is not clear that social media create new behaviors or fundamentally change social relations. Its main effect is to lower the cost of communication, and lowering the cost of communication also lowers the cost of data gathering. But lower costs do not clearly favor one group of actors over another: the printing press created Martin Luther’s 95 Theses as well as Russia’s Pravda, and states have learned how to use the internet and social media to repress (Hoffman Reference Hoffman2015; Rod and Weidmann Reference Rod and Weidmann2015). Using social media data to understand social behavior is therefore the main benefit of “big data.” If social scientists have been stuck looking for keys under a streetlight, they now have access to stadium lights. Even stadium lights leave much of the world in the shadows.

Footnotes

I would like to thank the anonymous reviewers and editorial staff who provided excellent feedback. This article has also benefitted from the generous attention and brainstorming of Lawrence Broz, James Fowler, Emilie Hafner-Burton, David Lake, and Barbara Walter. Derrick Cogburn, Jesse Driscoll, Erik Gartzke, Philip N. Howard, and Nils Weidmann provided needed encouragement along the way. Nathan Combes, Scott Guenther, Maya Oren, and Aditya Ranganath have known this article since it was just an idea, and our group sessions were integral to its success. Many thanks as well go to Jason Jones, who provided the original idea for measuring coordination. The article benefitted from active participants at many conferences over too many years, as well as the patience of the Human Nature Group and the UCSD International Relations Workshop. This article would not be possible without the assistance of Alessandro Vespignani and Delia Mocanu. All remaining errors are mine.

1 The threshold is sometimes defined as a constant and sometimes as a fraction of network size. This distinction matters for small networks but not large ones. For example, in a network of eight individuals, a threshold of 1/8 does not represent complex contagion because an individual will switch states when only 1 person it knows has has; in a network of 800,000, a threshold of 1/8 would correspond to a late mover. Because mass protest involves large groups of people, the difference between numeric and proportional thresholds is moot. See Centola and Macy 2007 for an extended discussion on the difference between fractional and numeric thresholds.

2 Twitter will censor tweets to comply with countries’ laws. For example, it has censored a neo-Nazi group’s tweets in Germany and has started to delete accounts from the Islamic State of Iraq and Syria that are deemed to incite violence.

3 This search is not case sensitive: a user searching for “#jan25” will see the same results as one searching for “#Jan25”. The searched term will not return tweets that use the character string without a hashtag, e.g., a tweet that says “police thugs r everywhere in egypt jan25” will not show up in search results.

4 For more detail, see the Materials and Methods section of Mocanu et al. (Reference Mocanu, Baronchelli, Perra, Vespignani, Goncalves and Zhang2013). That article uses only tweets from that stream with GPS coordinates for its analysis, whereas I use tweets with GPS coordinates or user-reported location because there were not enough tweets with GPS coordinates in the countries in this study.

5 With one extra click, a user can see how many times the original tweet was retweeted, but there is no way for the researcher to observe if a user knows how many times a tweet was retweeted.

6 A panel OLS model is used for the diagnostics to ease calculation of the test statistics. Robustness checks show that the panel OLS results match those of the negative binomial.

7 I cannot know for sure because the data are anonymized.

8 Columns 1 and 2 use an ordinary-least squares estimator because the dependent variable is no longer a count.

9 The Supplementary Material visualizes the protest rate and shows that it varies in tandem with real-world events.

10 Two new machine-coded projects, the University of Illinois’ Social, Political, Economic Event Database (SPEED) and the Open Event Data Alliance’s Phoenix project, are exciting events data projects. SPEED combines machine-coded data with human verification to achieve human-level accuracy with machine-coded breadth (Nardulli, Althaus and Hayes Reference Nardulli, Althaus and Hayes2015). The Phoenix project, an open source system associated with Pennsylvania State University and Parus Analytical Systems, is a major evolution of the TABARI system. Phoenix’s main advantage over ICEWS, which also uses a heavily modified version of TABARI, is that it releases new data daily, while ICEWS releases monthly on a one year delay. As of this writing, SPEED’s public data only go through 2005, and Phoenix’s data starts on June 20, 2014. Phoenix’s Github page is https://github.com/openeventdata.

References

REFERENCES

Al-Zubaidi, Layla, and Cassel, Matthew, eds. 2013. Diaries of an Unfinished Revolution: Voices from Tunis to Damascus. New York: Penguin Books.Google Scholar
Aral, Sinan, and Walker, Dylan. 2012. “Identifying Influential and Susceptible Members of Social Networks.” Science 337 (6092): 337–41.CrossRefGoogle ScholarPubMed
Bakshy, Eytan, Cameron, Marlow, Itamar, Rosenn, and Lada, Adamic. 2012. “The Role of Social Networks in Information Diffusion.” In Proceedings of the 21st International Conference on World Wide Web. Lyon: 519–28.CrossRefGoogle Scholar
Barbera, Pablo. 2015. “Birds of the Same Feather Tweet Together: Bayesian Ideal Point Estimation Using Twitter Data.” Political Analysis 23 (1): 7691.CrossRefGoogle Scholar
Barberá, Pablo, Wang, Ning, Bonneau, Richard, Jost, John T., Nagler, Jonathan, Tucker, Joshua, and González-Bailón, Sandra. 2015. “The Critical Periphery in the Growth of Social Protests.” PloS ONE 10 (11): 115.CrossRefGoogle ScholarPubMed
Beissinger, Mark R. 2013. “The Semblance of Democratic Revolution: Coalitions in Ukraine’s Orange Revolution.” American Political Science Review 107 (3): 574–92.CrossRefGoogle Scholar
Bellin, Eva. 2012. “Reconsidering the Robustness of Authoritarianism in the Middle East: Lessons from the Arab Spring.” Comparative Political Studies 44 (2): 127–49.Google Scholar
Benchemsi, Ahmed. 2014. “Morocco’s Makhzen and the Haphazard Activists.” In Taking to the Streets: The Transformationof Arab Activism, eds. Khatib, Lina and Lust, Ellen. Baltimore: Johns Hopkins University Press, 199236.Google Scholar
Bennett, W. Lance, and Segerberg, Alexandra. 2013. The Logic of Connective Action. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Blaydes, L., and Lo, J.. 2011. “One Man, One Vote, One Time? A Model of Democratization in the Middle East.” Journal of Theoretical Politics 24 (1): 110–46.CrossRefGoogle Scholar
Bond, Robert M., Fariss, Christopher J., Jones, Jason J., Kramer, Adam D.I., Marlow, Cameron, Settle, Jaime E., and Fowler, James H. 2012. “A 61-Million-Person Experiment in Social Influence and Political Mobilization.” Nature (London) 489 (7415): 295–8.CrossRefGoogle ScholarPubMed
Boschee, Elizabeth, Lautenschlager, Jennifer, O’Brien, Sean, Shellman, Steve, Starz, James, and Ward, Michael. 2015. “ICEWS Coded Event Data.” http://dx.doi.org/10.7910/DVN/28075 CrossRefGoogle Scholar
Boyd, Dannah, Golder, Scott, and Lotan, Gilad. 2010. “Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter.” In 43rd Hawaii International Conference on System Sciences. IEEE, 110.Google Scholar
Breuer, Anita. 2012. “The Role of Social Media in Mobilizing Political Protest: Evidence from the Tunisian Revolution.” Technical report, German Development Institute, Bonn.CrossRefGoogle Scholar
Bruns, Axel, and Burgess, Jean E. 2011. “The Use of Twitter Hashtags in the Formation of Ad Hoc Publics.” In 6th European Consortium for Political Research Conference. Reykjavik: 110.Google Scholar
Bueno de Mesquita, Ethan. 2010. “Regime Change and Revolutionary Entrepreneurs.” American Political Science Review 104 (3): 446–66.CrossRefGoogle Scholar
Burns, Alex, and Eltham, Ben. 2009. “Twitter Free Iran: An Evaluation of Twitter’s Role in Public Diplomacy and Information Operations in Iran’s 2009 Election Crisis.” In Communications Policy & Research Forum 2009. Sydney: 298310.Google Scholar
Cambanis, Thanassis. 2015. Once Upon a Revolution: An Egyptian Story. New York: Simon and Schuster.Google Scholar
Caren, Neal. 2014. “It is Time to get Rid of the E in GDELT.” http://badhessian.org/2014/05/it-is-time-to-get-rid-of-the-e-in-gdelt/ Google Scholar
Centola, Damon. 2010. “The Spread of Behavior in an Online Social Network Experiment.” Science 329 (September): 1194–8.CrossRefGoogle Scholar
Centola, Damon, and Macy, Michael. 2007. “Complex Contagion and the Weakness of Long Ties.” American Journal of Sociology 113 (3): 702–34.CrossRefGoogle Scholar
Citino, Robert. 2004. “Beyond Fire and Movement: Command, Control and Information in the German Blitzkrieg.” Journal of Strategic Studies 27 (2): 324–44.CrossRefGoogle Scholar
Dalton, Russell J., Greene, Steven, Beck, Paul Allen, and Huckfeldt, Robert. 2002. “The Social Calculus of Voting: Interpersonal, Media, and Organizational Influences on Presidential Choices.” The American Political Science Review 96 (1): 5773.Google Scholar
Davenport, Christian, and Ball, Patrick. 2002. “Views to a Kill: Exploring the Implications of Source Selection in the Case of Guatemalan State Terror, 1977-1995.” Journal of Conflict Resolution 46 (3): 427–50.CrossRefGoogle Scholar
Downs, Anthony. 1957. An Economic Theory of Democracy. New York: Harper and Row.Google Scholar
Duggan, Maeve, and Smith, Aaron. 2013. “Social Media Update 2013.” Technical Report, Pew Research Center.Google Scholar
Dunbar, R. I. M., Arnaboldi, Valerio, Conti, Marco, and Passarella, Andrea. 2015. “The Structure of Online Social Networks Mirrors those in the Offline World.” Social Networks 43: 3947.CrossRefGoogle Scholar
Earl, Jennifer, Hurwitz, Heather McKee, Mesinas, Analicia Mejia, Tolan, Margaret, and Arlotti, Ashley. 2013. “This Protest Will Be Tweeted: Twitter and Protest Policing during the Pittsburgh G20.” Information, Communication & Society 16 (4): 459–78.CrossRefGoogle Scholar
Eck, Kristine. 2012. “In Data we Trust? A Comparison of UCDP GED and ACLED Conflict Events Datasets.” Cooperation and Conflict 47 (1): 124–41.CrossRefGoogle Scholar
Edmond, Chris. 2013. “Information Manipulation, Coordination, and Regime Change.” Review of Economic Studies 80 (4): 1422–58.CrossRefGoogle Scholar
Egorov, Georgy, Guriev, Sergei, and Sonin, Konstantin. 2009. “Why Resource-poor Dictators Allow Freer Media: A Theory and Evidence from Panel Data.” American Political Science Review 103 (4): 645–68.CrossRefGoogle Scholar
Ferrara, F. 2003. “Why Regimes Create Disorder: Hobbes’s Dilemma During a Rangoon Summer.” Journal of Conflict Resolution 47 (3): 302–25.Google Scholar
Finkel, Steven E., Muller, Edward N., and Opp, Karl-Dieter. 1989. “Personal Influence, Collective Rationality, and Mass Political Action.” American Political Science Review 83 (3): 885903.CrossRefGoogle Scholar
Gerbaudo, Paolo. 2012. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto Press.Google Scholar
Gerber, Alan, Karlan, Dean, and Bergan, Daniel. 2006. “Does The Media Matter? A Field Experiment Measuring the Effect of Newspapers on Voting Behavior and Political Opinions.” Working Paper.Google Scholar
Gerber, Alan S., Green, Donald P., and Larimer, Christopher W.. 2008. “Social Pressure and Voter Turnout: Evidence from a Large-Scale Field Experiment.” American Political Science Review 102 (1): 3348.CrossRefGoogle Scholar
Glanz, James, and Markoff, John. 2011. “Egypt Leaders Found ’Off’ Switch for Internet.” http://www.nytimes.com/2011/02/16/technology/16internet.html?_r=1&hp=&pagewanted=all Google Scholar
Goldstone, Jack A. 1994. “Is Revolution Individually Rational?: Groups and Individuals in Revolutionary Collective Action.” Rationality and Society 6 (1): 139–66.CrossRefGoogle Scholar
Goldstone, Jack A. 2001. “Toward a Fourth Generation of Revolutionary Theory.” Annual Review of Political Science 4: 139–87.CrossRefGoogle Scholar
González-Bailón, Sandra, Borge-Holthoefer, Javier, Rivero, Alejandro, and Moreno, Yamir. 2011. “The Dynamics of Protest Recruitment through an Online Network.” Scientific Reports 1 (197): 17.CrossRefGoogle ScholarPubMed
Gonzalez-Bailon, Sandra, Borge-Holthoefer, Javier, and Moreno, Yamir. 2013. “Broadcasters and Hidden Influentials in Online Protest Diffusion.” American Behavioral Scientist 57 (7): 943–65.CrossRefGoogle Scholar
Granovetter, Mark. 1973. “The Strength of Weak Ties.” American Journal of Sociology 78 (6): 1360–80.CrossRefGoogle Scholar
Granovetter, Mark. 1978. “Threshold Models of Collective Behavior.” American Journal of Sociology 83 (6): 1420–43.CrossRefGoogle Scholar
Grimmer, Justin. 2015. “We Are All Social Scientists Now: How Big Data, Machine Learning, and Causal Inference Work Together.” PS: Political Science & Politics 48 (1): 80–3.Google Scholar
Grimmer, Justin, and Stewart, Brandom M.. 2013. “Text as Data: The Promise and Pitfalls of Automatic Content Analysis Methods for Political Texts.” Political Analysis 21 (3): 267–97.CrossRefGoogle Scholar
Gunning, Jeroen, and Baron, Ilan Zvi. 2013. Why Occupy a Square: People, Protests and Movements in the Egyptian Revolution. London: Hurst Publishers.Google Scholar
Hale, Henry E. 2013. “Regime Change Cascades: What We Have Learned from the 1848 Revolutions to the 2011 Arab Uprisings.” Annual Review of Political Science 16 (1): 331–53.CrossRefGoogle Scholar
Hamdy, Naila, and Gomaa, Ehab H.. 2012. “Framing the Egyptian Uprising in Arabic Language Newspapers and Social Media.” Journal of Communication 62 (2): 195211.CrossRefGoogle Scholar
Hammond, Jesse, and Weidmann, Nils B.. 2014. “Using Machine-coded Event Data for the Micro-level Study of Political Violence.” Research & Politics 1 (2): 18.CrossRefGoogle Scholar
Hassanpour, Navid. 2014. “Media Disruption and Revolutionary Unrest: Evidence From Mubarak’s Quasi-Experiment.” Political Communication 31 (1): 124.CrossRefGoogle Scholar
Hendrix, Cullen, Hamner, Jesse, Case, Christina, Linebarger, Chris, Stull, Emily, and Williams, Jennifer. 2012. “Social Conflict in Africa: A New Database.” International Interactions 38 (4): 503–11.Google Scholar
Herkenrath, M., and Knoll, A.. 2011. “Protest Events in International Press Coverage: An Empirical Critique of Cross-national Conflict Databases.” International Journal of Comparative Sociology 52 (3): 163–80.CrossRefGoogle Scholar
Hoffman, Mike. 2015. “US Air Force Targets and Destroys ISIS HQ Building Using Social Media.”Google Scholar
Hollyer, James R., Rosendorff, B. Peter, and Vreeland, James Raymond. 2015. “Transparency, Protest, and Autocratic Instability.” American Political Science Review 109 (4): 764–84.CrossRefGoogle Scholar
Idle, Nadia, and Nunns, Alex, eds. 2011. Tweets from Tahrir. New York: OR Books.Google Scholar
Javeline, Debra. 2003. “The Role of Blame in Collective Action: Evidence from Russia.” American Political Science Review 97 (1): 107.CrossRefGoogle Scholar
Kerr, Simeon. 2015. “Bahrain Main Shia Opposition Leader Jailed for 4 Years.”Google Scholar
Khalil, Ashraf. 2011. Liberation Square: Inside the Egyptian Revolution and the Rebirth of a Nation. New York: St. Martin’s Press.Google Scholar
Khatib, Lina, and Lust, Ellen, eds. 2014. Taking to the Streets: The Transformation of Arab Activism. Baltimore: Johns Hopkins University Press.CrossRefGoogle Scholar
King, Gary, Pan, Jennifer, and Roberts, Margaret E.. 2013. “How Censorship in China Allows Government Criticism but Silences Collective Expression.” American Political Science Review 107 (2): 326–43.CrossRefGoogle Scholar
Klandermans, Bert, and Oegema, Dirk. 1987. “Potentials, Networks, Motivations, and Barriers: Steps Towards Participation in Social Movements.” American Sociological Review 52 (4): 519–31.CrossRefGoogle Scholar
Kulshrestha, Juhi, Kooti, Farshad, Nikravesh, Ashkan, and Gummadi, Krishna P. 2012. “Geographic Dissection of the Twitter Network.” In Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media. 202–9.Google Scholar
Kuran, Timur. 1989. “Sparks and Prairie Fires: A Theory of Unanticipated Political Revolution.” Public Choice 61 (1): 4174.CrossRefGoogle Scholar
Kwak, Haewoon, Lee, Changhyun, Park, Hosung, and Moon, Sue. 2010. “What is Twitter, a Social Network or a News Media?” In International World Wide Conference. 591600.CrossRefGoogle Scholar
Leetaru, Kalev H., Wang, Shaowen, Cao, Guofeng, Padmanabhan, Anand, and Shook, Eric. 2013. “Mapping the Global Twitter Heartbeat: The Geography of Twitter.” First Monday 18 (5–6): 133.Google Scholar
Leetaru, Kalev, and Schrodt, Philip. 2013. “GDELT: Global Data on Events, Language, and Tone, 1979–2012.” International Studies Association.Google Scholar
Lehmann, Janette, Gonçalves, Bruno, Ramasco, José J., and Cattuto, Ciro. 2012. “Dynamical Classes of Collective Attention in Twitter.” Proceedings of the 21st International Conference on World Wide Web - WWW ’12, 251–60.Google Scholar
Lichbach, Mark I. 1998. “Contending Theories of Contentious Politics and the Structure-Action Problem of Social Order.” Annual Review of Political Science 1: 401–24.CrossRefGoogle Scholar
Liere, Diederik Van. 2010. “How Far Does a Tweet Travel? Information Brokers in the Twitterverse.” In Proceedings of the International Workshop on Modeling Social Media. Toronto: 14.Google Scholar
Lohmann, Susanne. 1994. “The Dynamics of Informational Cascades: The Monday Demonstrations in Leipzig, East Germany, 1989–91.” World Politics 47 (1): 42101.CrossRefGoogle Scholar
Lotan, Gilad, Ananny, Mike, Gaffney, Devin, Boyd, Danah, Pearce, Ian, and Graeff, Erhardt. 2011. “The Revolutions Were Tweeted: Information Flows During the 2011 Tunisian and Egyptian Revolutions Web.” International Journal of Communications 5: 1375–406.Google Scholar
Mackey, Robert. 2015. “Egyptian Police Attack Marchers Carrying Flowers to Tahrir Square, Killing Protester.” http://www.nytimes.com/2015/01/25/world/middleeast/egypt-woman-is-killed-in-peaceful-cairo-protest.html Google Scholar
Malik, Momin M., Lamba, Hemank, Nakos, Constantine, and Pfeffer, Jurgen. 2015. “Population Bias in Geotagged Tweets.” In 9th International AAAI Conference on Weblogs and Social Media. 1827.Google Scholar
McAdam, Doug. 1986. “Recruitment to High-Risk Activism: The Case of Freedom Summer.” American Journal of Sociology 92 (1): 6490.CrossRefGoogle Scholar
McPherson, Miller, Smith-Lovin, Lynn, and Cook, James M.. 2001. “Birds of a Feather: Homophily in Social Networks.” Annual Review of Sociology 27 (August): 415–44.CrossRefGoogle Scholar
Meirowitz, Adam, and Tucker, Joshua A.. 2013. “People Power or a One-Shot Deal? A Dynamic Model of Protest.” American Journal of Political Science 57 (2): 478–90.CrossRefGoogle Scholar
Mocanu, Delia, Baronchelli, Andrea, Perra, Nicola, Vespignani, Alessandro, Goncalves, Bruno, and Zhang, Qian. 2013. “The Twitter of Babel: Mapping World Languages through Microblogging Platforms.” PLOS One 8 (4): e61981.CrossRefGoogle ScholarPubMed
Monroe, Burt L., Pan, Jennifer, Roberts, Margaret E., Sen, Maya, and Sinclair, Betsy. 2015. “No! Formal Theory, Causal Inference, and Big Data Are Not Contradictory Trends in Political Science.” PS: Political Science & Politics 48 (01): 71–4.Google Scholar
Moore, Will H. 1995. “Rational Rebels: Overcoming the Free-Rider Problem.” Political Research Quarterly 48 (2): 417–54.CrossRefGoogle Scholar
Muchnik, L., Aral, S., and Taylor, S. J.. 2013. “Social Influence Bias: A Randomized Experiment.” Science 341 (6146): 647–51.CrossRefGoogle Scholar
Nardulli, Peter F., Althaus, Scott L., and Hayes, Matthew. 2015. “A Progressive Supervised-learning Approach to Generating Rich Civil Strife Data.” Social Methodology 45 (1):148–83.CrossRefGoogle Scholar
Newman, M. E. J. 2003. “The Structure and Function of Complex Networks.” SIAM Review 45 (2): 167256.CrossRefGoogle Scholar
Nielsen, Richard. 2012. “Jihadi Radicalization of Muslim Clerics.” Working PaperGoogle Scholar
Opp, Karl-Dieter. 2012. “Collective Identity, Rationality and Collective Political Action.” Rationality and Society 24 (1): 73105.CrossRefGoogle Scholar
Opp, Karl-Dieter, and Gern, Christiane. 1993. “Dissident Groups, Personal Networks, and Spontaneous Cooperation: The East German Revolution of 1989.” American Sociological Review 58 (5): 659–80.CrossRefGoogle Scholar
Pei, Sen, Muchnik, Lev, Andrade, José S. Jr., Zheng, Zhiming, and Makse, Hernán A.. 2014. “Searching for Superspreaders of Information in Real-world Social Media.” Scientific Reports 4 (c): 5547.CrossRefGoogle ScholarPubMed
Pierskalla, Jan H., and Hollenbach, Florian M.. 2013. “Technology and Collective Action: The Effect of Cell Phone Coverage on Political Violence in Africa.” American Political Science Review 107 (2): 207–24.CrossRefGoogle Scholar
Press, Daryl G. 2001. “The Myth of Air Power in the Persian Gulf War and the Future of Warfare.” International Security 26 (2): 544.CrossRefGoogle Scholar
Quattrone, George A., and Tversky, Amos. 1988. “Contrasting Rational and Psychological Analyses of Political Choice.” The American Political Science Review 82 (3): 719.CrossRefGoogle Scholar
Rahimi, Babak. 2011. “The Agonistic Social Media: Cyberspace in the Formation of Dissent and Consolidation of State Power in Postelection Iran.” The Communication Review 14 (3): 158–78.CrossRefGoogle Scholar
Raleigh, Clionadh, Linke, Andrew, Hegre, Havard, and Karlsen, Joakim. 2010. “Introducing ACLED: An Armed Conflict Location and Event Dataset: Special Data Feature.” Journal of Peace Research 47 (5): 651–60.CrossRefGoogle Scholar
Riker, William H., and Ordeshook, Peter C.. 1968. “A Theory of the Calculus of Voting.” The American Political Science Review 62 (1): 2542.CrossRefGoogle Scholar
Rod, Espen Geelmuyden, and Weidmann, Nils B.. 2015. “Empowering Activists or Autocrats? The Internet in Authoritarian Regimes.” Journal of Peace Research 52 (3): 338–51.CrossRefGoogle Scholar
Romero, Daniel M., Meeder, Brendan, and Kleinberg, Jon. 2011. “Differences in the Mechanics of Information Diffusion Across Topics: Idioms, Political Hashtags, and Complex Contagion on Twitter.” In Proceedings of the 20th International Conference on the World Wide Web. 695704.CrossRefGoogle Scholar
Salehyan, Idean Cullen, S. Hendrix Jesse, Hamner, Christina, Case, Christopher, Linebarger, Emily, Stull, and Jennifer, Williams. 2012. “Social conflict in Africa: A new database.” International Interactions 38 (4): 503–11.CrossRefGoogle Scholar
Schelling, Thomas C. 1978. Micromotives and Macrobehavior. New York: W.W. Norton & Company.Google Scholar
Schussman, Alan, and Soule, Sarah Anne. 2005. “Process and Protest: Accounting for Individual Protest Participation.” Social Forces 84 (2): 1083–108.CrossRefGoogle Scholar
Shachar, Ron, and Nalebuff, Barry. 1999. “Follow the Leader: Theory and Evidence on Political Participation.” The American Economic Review 89 (3): 525–47.CrossRefGoogle Scholar
Shah, Dhavan V., Cappella, Joseph N., and Neuman, W. Russell. 2015. “Big Data, Digital Media, and Computational Social Science: Possibilities and Perils.” The ANNALS of the American Academy of Political and Social Science 659 (1): 613.CrossRefGoogle Scholar
Shapiro, Jacob N., and Siegel, David A. 2015. “Coordination and Security: How Mobile Communications affect Insurgency.” Journal of Peace Research 52 (3): 312–22.CrossRefGoogle Scholar
Shapiro, Jacob N., and Weidmann, Nils B.. 2011. “Talking About Killing: Cell Phones, Collective Action, and Insurgent Violence in Iraq.” Working PaperCrossRefGoogle Scholar
Siegel, David A. 2009. “Social Networks and Collective Action.” American Journal of Political Science 53 (1): 122–38.CrossRefGoogle Scholar
Siegel, David A. 2011. “When Does Repression Work? Collective Action in Social Networks.” The Journal of Politics 73 (04): 9931010.CrossRefGoogle Scholar
Sinha, Shiladitya, Dyer, Chris, Gimpel, Kevin, and Smith, Noah A. 2013. “Predicting the NFL Using Twitter.” Working Paper.Google Scholar
Starbird, Kate and Palen, Leysia. 2012. “(How) Will the Revolution be Retweeted? Information Diffusion and the 2011 Egyptian Uprising.” In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. Seattle:.Google Scholar
Steinert-Threlkeld, Zachary C. 2017. Twitter as Data. Under Review.CrossRefGoogle Scholar
Steinert-Threlkeld, Zachary C., Mocanu, Delia, Vespignani, Alessandro, and Fowler, James. 2015. “Online Social Networks and Offline Protest.” EPJ Data Science 4 (1): 19.CrossRefGoogle Scholar
Stringhini, Gianluca, Wang, Gang, Egele, Manuel, Kruegel, Christopher, Vigna, Giovanni, Zheng, Haitao, and Zhao, Ben Y.. 2013. “Follow the Green: Growth and Dynamics in Twitter Follower Markets.” In Proceedings of the 2013 Conference on Internet Measurement Conference. 163–76.CrossRefGoogle Scholar
Suh, Bongwon, Hong, Lichan, Pirolli, Peter, and Chi, Ed H.. 2010. “Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network.” In IEEE Second International Conference on Social Computing. 177184.Google Scholar
Taylor, Michael. 1988. “Rationality and Revolutionary Collective Action.” In Rationality and Revolution, ed. Taylor, Michael. Cambridge, UK: Cambridge University Press, 6397.Google Scholar
Tonkin, Emma, Pfeiffer, Heather D., and Tourte, Greg. 2011. “Twitter, Information Sharing and the London Riots?Bulletin of the American Society for Information Science and Technology 38 (2): 4957.CrossRefGoogle Scholar
Tufekci, Zeynep. 2014. “Social Movements and Governments in the Digital Age: Evaluating a Complex Landscape.” Journal of International Affairs 68 (1): 118.Google Scholar
Tufekci, Zeynep, and Wilson, Christopher. 2012. “Social Media and the Decision to Participate in Political Protest: Observations From Tahrir Square.” Journal of Communication 62 (2): 363–79.CrossRefGoogle Scholar
Warren, T. Camber. 2014. “Not by the Sword Alone: Soft Power, Mass Media, and the Production of State Sovereignty.” International Organization 68 (01): 111–41.CrossRefGoogle Scholar
Watts, Duncan J. 2002. “A Simple Model of Global Cascades on Random Networks.” Proceedings of the National Academy of Sciences 99 (9): 5766–771.CrossRefGoogle ScholarPubMed
Watts, Duncan J. 2004. “The New Science of Networks.” Annual Review of Sociology 30 (1): 243–70.CrossRefGoogle Scholar
Weyland, Kurt. 2012. “The Arab Spring: Why the Surprising Similarities with the Revolutionary Wave of 1848?Perspectives on Politics 10 (04): 917–34.CrossRefGoogle Scholar
Wu, Shaomei, Hofman, Jake M., Mason, Winter A., and Watts, Duncan J.. 2011. “Who Says What to Whom on Twitter.” Proceedings of the 20th International Conference on World Wide Web - WWW ’11, 705–14.Google Scholar
Xie, Wei, Li, Cheng, Zhu, Feida, Lim, Ee-Peng, and Gong, Xueqing. 2012. “When a Friend in Twitter is a Friend in Life.” In Proceedings of the 4th Annual ACM Web Science Conference. New York: ACM Press, 344347.CrossRefGoogle Scholar
Zamal, Faiyaz Al, Liu, Wendy, and Ruths, Derek. 2012. “Homophily and Latent Attribute Inference: Inferring Latent Attributes of Twitter Users from Neighbors.” In Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media. 387–90.Google Scholar
Figure 0

FIGURE 1. Protests per Million Inhabitants

Notes: This figure shows that ICEWS captures different levels of intensity of each country’s protests, both temporally and in cross section. Egypt, which experienced sustained, widespread protest, has the most recorded protests of any country in the dataset, but it has fewer per person than Bahrain. Morocco had a sustained protest campaign that did not mobilize as many people as Egypt or Bahrain, and Qatar experienced no protests. ICEWS’ count of protests also varies during days they are expected to.
Figure 1

TABLE 1. Comparing Core Measure with Hand-coded Accounts

Figure 2

TABLE 2. Variable Correlation

Figure 3

TABLE 3. Variables by Country

Figure 4

TABLE 4. Peripheral Coordination and Protest

Figure 5

FIGURE 2. Marginal Effects of Peripheral and Core Coordination

Figure 6

FIGURE 3. Verifying Operationalization of Coordination

Figure 7

TABLE 5. Robust to Operationalization of Core, Periphery

Figure 8

FIGURE 4. Change in Effect Size as Function of Core Threshold

Figure 9

TABLE 6. Core Threshold Descriptive Statistics Across Countries

Figure 10

TABLE 7. Robust to Dependent Variable

Figure 11

FIGURE 5. ICEWS Correlates with Handcoded Data

Figure 12

TABLE 8. Coordination in the Hashtag Long Tail

Figure 13

FIGURE 6. Coordinationi, t Peaks with One-day Lag

Figure 14

FIGURE 7. Blackout Influentials and Protest (a) Blackout Influentials and Protest (b) Blackout, Nonblackout Influentials

Figure 15

TABLE 9. Blackout Accounts do not Provide Coordination

Supplementary material: File

Steinert-Threlkeld supplementary material

Steinert-Threlkeld supplementary material

Download Steinert-Threlkeld supplementary material(File)
File 281.6 KB
Submit a response

Comments

No Comments have been published for this article.