Browse Definitions :
Definition

Twitter essay

Contributor(s): Ivy Wigmore

A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets

Twitter essays are created on the microblogging platform or an associated application. Tweets that form the essay are written individually but the accumulated tweets may be assembled on a site such as Tumblr or Storify. Because Twitter essays are published as separate tweets, they can be collaborative works, either by design or as a result of the format. As each tweet is published, it reaches the writer's social network. As a result, an essay's direction and focus -- and even the central argument -- may change as a result of input from replies.

The brief nature of tweets (optimally about 120 characters, to allow for retweets and perhaps comments) means that they tend to be concise. Each tweet must also be at least somewhat coherent on its own. Taken together, these constraints mean that a Twitter essay is not likely to have the flow of a traditional essay. In a Twitter essay collated in The Globe and Mail, Jeet Heer -- who popularized the form -- commented that a Twitter essay is not so much an argument as the skeleton of an argument.

This was last updated in November 2014

Continue Reading About Twitter essay

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Some of my favorite Twitter essayists are Gene Demby (@GeeDee215) and Teju Cole (@tejucole).
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close