Tea Party pushes GOP past Dems in social net use
HeadCount.org says Republican candidates now have far more Facebook, Twitter friends than their Democratic rivals
Computerworld - Social networking transformed the 2008 presidential election and that burst of online campaigning has spread significantly in this year's mid-term elections.
Social networks, which have become part of our day-to-day lives over the past few years, are fast becoming a critical part of political life as well. In fact, three out of five people who describe themselves as "somewhat politically active" use a social network, according to a recent study by the E-Voter Institute, a non-partisan association focused on politics and the Internet.
And of those politically minded social networkers, 70% say they expect to vote in Tuesday's mid-term elections. The E-Voter study was based on a June survey of 1,581 people.
"Social networking makes a lot of sense in this political environment," said Ezra Gottheil, an analyst with Technology Business Research. "Parties and groups of supporters are social networks. Politics is a group process. You don't just watch the news, send your contribution, and vote. You participate -- together with other people."
Before and during the 2008 election, Democrats in general and then-candidate Barack Obama in particular showed a lot of online savvy by connecting with younger voters on social networks like Facebook. The Republican party has more than caught up to the Democrats this year, according to HeadCount.org, a non-partisan group focused on registering getting people to vote.
As of late September, Republican candidates for the U.S. Senate had more than 1.43 million fans on Facebook, compared to just under 300,000 for Democrats, noted HeadCount.org. And on Twitter, Republican Senatorial candidates collectively counted 520,000 followers, far more than the 90,000 followers of Democratic candidates.
"Candidates associated with the Tea Party are clearly responsible for much of the social media activity, most notably South Carolina Republican Senator Jim DeMint," reported HeadCount.org. "Hailed as one of the most new media savvy elected officials, he has more Twitter Followers than any incumbent and more Facebook fans than any incumbent other than [Sen. John] McCain."
HeadCount.org also found that candidates in California and Florida had the strongest social media following.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is email@example.com.
- NYC wants its old mechanical-lever voting machines back
- Twitter a big winner in 2012 presidential election
- E-voting machine swaps Obama vote for Romney; taken offline
- Ruling expected shortly in Ohio e-voting lawsuit
- Update: Lawsuit filed in Ohio over software updates to vote tabulation machines
- States rebut RNC complaints about e-voting systems
- Despite e-voting improvements, audits still needed for ballot integrity
- Obama, Romney cite Apple, tech issues in debate
- Twitter becomes new debate spin room
- IT offshoring: Romney vs. Obama
Read more about Web Apps in Computerworld's Web Apps Topic Center.
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Web Apps White Papers | Webcasts