Abstract
Social media platforms provide an increasingly popular means for individuals to share content online. Whilst this produces undoubted societal benefits, the ability for content to be spontaneously posted and reposted creates an ideal environment for rumour and false/malicious information to spread rapidly. When this occurs it can cause significant harm and can be characterised as a “digital wildfire.” In this article, we demonstrate that the propagation and regulation of digital wildfires form important topics for research and conduct an overview of existing work in this area. We outline the relevance of a range of work from the computational and social sciences, including a series of insights into the propagation of rumour and false/malicious information. We argue that significant research gaps remain—for instance, there is an absence of systematic studies on the effects of digital wildfires and there is a need to combine empirical research with a consideration of how the responsible governance of social media can be determined. We propose an agenda for research that establishes a methodology to explore in full the propagation and regulation of unverified content on social media. This agenda promotes high-quality interdisciplinary research that will also inform policy debates.
- A. Adam. 2001. Computer ethics in a different voice. Information and Organization 11, 4 (2001), 235--261.Google ScholarCross Ref
- M. Adler and E. Ziglio (Eds.). 1996. Gazing into the Oracle: The Delphi Method and its Application to Social Policy and Public Health. Jessica Kingsley Publishers.Google Scholar
- R. Albert and A. L. Barabasi. 2002. Statistical mechanics of complex networks. Reviews of Modern Physics 74, 1 (2001), 47--97.Google ScholarCross Ref
- F. H. Allport and M. Lepkin. 1945. Wartime rumors of waste and special privilege: Why some people believe them. Journal of Abnormal and Social Psychology 40 (1945), 3--36.Google ScholarCross Ref
- S. Aral, L. Muchnik, and A. Sundararajan. 2009. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. In Proceedings of the National Academy of Sciences 106, 51 (2009), 21544--21549.Google ScholarCross Ref
- I. Awan. 2014. Islamophobia and Twitter: A typology of online hate against muslims on social media. Policy & Internet 6, 2 (2014) 133--150.Google ScholarCross Ref
- L. Backstrom, J. Kleinberg, L. Lee, and C. Danescu-niculescu-mizil. 2013. Characterizing and curating conversation threads: Expansion, focus, volume, re-entry. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining. Google ScholarDigital Library
- S. A. Baker. 2012. From the criminal crowd to the “mediated crowd”: The impact of social media on the 2011 English riots. Safer Communities 11, 1 (2012), 40--49.Google ScholarCross Ref
- R. Bandari, S. Asur, and B. A. Huberman. 2012. The pulse of news in social media: Forecasting popularity, CoRR. abs/1202.0332 (2012).Google Scholar
- Y. Bao, C. Yi, Y. Xue, and Y. A. Dong. 2013. New rumor propagation model and control strategy on social networks. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’13). ACM, New York, NY, 1472--1473. DOI:http://doi.acm.org/10.1145/2492517.2492599 Google ScholarDigital Library
- B. Barrat, M. Barthelemy, and A. Vespignani. 2008. Dynamical Processes on Complex Networks. Cambridge University Press, Cambridge. Google ScholarDigital Library
- L. Bassell. 2012. Media and the riots—A call for action, citizen journalism educational trust and the latest.com. Retrieved from http://www.the-latest.com/riots-and-media-report.Google Scholar
- BBC NEWS. 2015. China punishes 197 over stock market and Tianjin ‘rumours’, bbc.co.uk/news 30 Aug. 2015. Retrieved 30 August 2015 from http://www.bbc.co.uk/news/world-asia-china-34104114.Google Scholar
- B. Blanchard, H. Li, and P. Carsten. 2013. China threatens tough punishment for online rumour spreading, reuters.com 9 Sep 2013 (2013). Retrieved August 17, 2015 from http://www.reuters.com/article/2013/09/09/us-china-internet-idUSBRE9880CQ20130909.Google Scholar
- A. Bruns. 2008. Blogs, Wikipedia, second life, and beyond: From production to produsage, Digital Formations, Vol. 45. Peter Lang.Google Scholar
- P. Burnap and M. Williams. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7, 2 (2015).Google Scholar
- P. Burnap, O. Rana, N. Avis, M. L. Williams, W. Housley, A. Edwards, J. Morgan, and L. Sloan. 2013. Detecting tension in online communities with computational twitter analysis. Technological Forecasting and Social Change. (2013). Retrieved August 17, 2015 from http://www.sciencedirect.com/science/article/pii/S0040162513000899.Google Scholar
- P. Burnap, M. L. Williams, L. Sloan, O. Rana, W. Housley, A. Edwards, V. Knight, R. Procter, and A. Voss. 2014. Tweeting the terror: Modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, 1 (2014).Google Scholar
- T. W. Bynum and S. Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. Wiley Blackwell, New York. Google ScholarDigital Library
- A. A. Casilli and P. Tubaro. 2011. Why net censorship in times of political unrest results in more violent uprisings: A social simulation experiment on the UK riots. SSRN Elibrary 14, (2011).Google Scholar
- S. L. Chei and M. Long. 2012. News sharing in social media: The effect of gratifications and prior experience. Computers in Human Behavior 28, 2 (2011), 331--339. DOI:http://dx.doi.org/10.1016/j.chb.2011.10.002 Google ScholarDigital Library
- F. Chierichetti, S. Lattanzi, and A. Panconesi. 2009. Rumour spreading in social networks. Automata, Languages and Programming. Springer, Berlin, 375--386. Google ScholarDigital Library
- S. Cohen. 1973. Folk Devils and Moral Panics the Creation of the Mods and Rockers. Paladin, London.Google Scholar
- M. Coulthard. 1977. An Introduction to Discourse Analysis. Longman, London.Google Scholar
- Crown Prosecution Service. 2013. Guidelines on prosecuting cases involving communications sent via social media, CPS. (2013). Retrieved March 24, 2015 from http://www.cps.gov.uk/legal/a_to_c/communications_sent_via_social_media/.Google Scholar
- P. Dahlgren. 2014. Political participation via the web: Structural and subjective contingencies. Interactions: Studies in Communication and Culture 5, 3 (2014), 255--269. DOI:http://dx.doi.org/10.1386/iscc.5.3.255_1Google Scholar
- J. Davison. 2013. Amateur online sleuthing: Does it do more harm than good? CBC News April 19, 2013. Retrieved August 12, 2015 from http://www.cbc.ca/news/technology/amateur-online-sleuthing-does-it-do-more-harm-than-good-1.1412039.Google Scholar
- R. Dawkins. 1989. Memes: The new replicators. In The Selfish Gene (2nd. ed.). Oxford University Press, Oxford.Google Scholar
- L. Dechun and X. Chen. 2011. Rumor propagation in online social networks like Twitter—A simulation study. In Proceedings of the 3rd International Conference on Multimedia Information Networking and Security (MINES), 278, 282. Google ScholarDigital Library
- L. Derczynski, K. Bontcheva, M. Lukasik, T. Declerck, A. Scharl, G. Georgiev, R. Procter, P. Tolmie, A. Zubiaga, and M. Liakata. 2015. PHEME: Computing Veracity—The Fourth Challenge of Big Social Data (2015). Retrieved August 16, 2015 from http://derczynski.com/sheffield/papers/pheme-eswc-pn.pdf.Google Scholar
- T. Van Dijk (Ed.). 1985. Handbook of Discourse Analysis, Vol. 3: Discourse and Dialogue. Academic, London.Google Scholar
- R. Dingwall. 2001. Contemporary legends, rumours and collective behaviour: Some neglected resources for medical sociology? Sociology of Health & Illness 23, 2 (2001), 180--202.Google ScholarCross Ref
- B. Doerr, M. Fouz, and T. Friedrich. 2012. Why rumors spread so quickly in social networks, Communications of the ACM 55, 6 (2012), 70--75. Google ScholarDigital Library
- S. Doshi. 2014. Building a safer Twitter, twitter.com Dec. 2, 2014. Retrieved Jan. 15, 2015 from https://blog.twitter.com/2014/building-a-safer-twitter.Google Scholar
- A. Edwards, W. Housley, M. Williams, L. Sloan, and M. Williams. 2013. Digital social research, social media and the sociological imagination: Surrogacy, augmentation and re-orientation. International Journal of Social Research Methodology 16, 3 (2013), 245--260. DOI:10.1080/13645579.2013.774185Google ScholarCross Ref
- L. Floridi. 2010. Information ethics. In The Cambridge Handbook of Information and Computer Ethics, L. Floridi (Ed.). Cambridge University Press, Cambridge, 77--97. Google ScholarDigital Library
- I. Gagliardone, D. Gal, T. Alves, and G. Martinez. 2015. Countering Online Hate Speech. UNESCO Series on Internet Freedom. United Nations Educational, Scientific and Cultural Organisation, Paris.Google Scholar
- E. Goffman. 1981. Forms of Talk. University of Pennsylvania Press, Pennsylvania.Google Scholar
- H. Gil De Zúñiga, N. Jung, and S. Valenzuela. 2012. Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of Computer-Mediated Communication 17 (2012), 319--336. DOI:10.1111/j.1083--6101.2012.01574 Google ScholarCross Ref
- J. Goldenberg, B. Libai, and E. Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 3, 12 (2001), 211--223.Google ScholarCross Ref
- A. Guille and H. A. Hacid. 2012. Predictive model for the temporal dynamics of information diffusion in online social networks. In Proceedings of the 21st International Conference Companion on World Wide Web. Google ScholarDigital Library
- Gulf Centre for Human Rights. 2014. Qatar: New cyber crime law poses real threat to freedom of expression, gc4hr.org Sep. 17, 2014. Retrieved August 17, 2015 from http://www.gc4hr.org/news/view/747.Google Scholar
- A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi. 2015. Faking Sandy: Characterising and identifying fake images on Twitter during Hurricane Sandy. In Proceedings of the 2nd International Workshop on Privacy and Security on Social Media (PSOSM).Google Scholar
- C. Hardaker. 2010. Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions. Journal of Politeness Research 6, 2 (2010), 215--242.Google ScholarCross Ref
- Her Majesty's Inspectorate of Constabulary. 2011a. The Rules of Engagement: A Review of the August 2011 Disorders. HMIC, London.Google Scholar
- Her Majesty's Inspectorate of Constabulary. 2011b. Policing Public Order: An Overview and Review of Progress Against the Recommendations of Adapting to Protest and Nurturing the British Model of Policing. HMIC, London.Google Scholar
- W. Housley, R. Procter, A. Edwards, P. Burnap, M. Williams, L. Sloan, O. Rana, J. Morgan, A. Voss, and G. Greenhill. 2014. Big and broad social data and the sociological imagination: A collaborative response. Big Data & Society 1, 2 (2014).Google Scholar
- House of Lords. 2014. Social Media and Criminal Offences: 1st report of Session 2014--2015. The Stationery Office Limited, London. Retrieved December 20, 2015 from http://www.publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/3702.htm.Google Scholar
- M. Innes. 2004. Signal crimes and signal disorders: Notes on deviance as communicative action. British Journal of Sociology 55, 3 (2004), 335--355.Google ScholarCross Ref
- A. Java, X. Song, T. Finin, and B. Tseng. 2007. Why we Twitter: Understanding microblogging usage and communities. In Proceedings of the ACM 9th WebKDD and 1st SNA-KDD Workshop on Web Mining and Social Network Analysis. 56--65. Google ScholarDigital Library
- D. G. Johnson. 1985. Computer Ethics (1st. ed.). Prentice Hall, Upper Saddle River, New Jersey. Google ScholarDigital Library
- K. A. L. Kjølberg. 2010. The Notion of “Responsible Development” in New Approaches to Governance of Nanosciences and Nanotechnologies. Doctoral dissertation. The University of Bergen.Google Scholar
- J. Kostka, Y. A. Oswald, and R. Wattenhofer. 2008. Word of mouth: Rumor dissemination in social networks. Structural Information and Communication Complexity. Springer, Berlin, 185--196. Google ScholarDigital Library
- S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang. 2013. Prominent features of rumor propagation in online social media. In Proceedings of the 13th International Conference on Data Mining (ICDM’13), IEEE, 1103--1108.Google Scholar
- P. Lewis, T. Newburn, M. Taylor, C. Mcgillivray, A. Greenhill, H. Frayman, and R. Procter. 2015. Reading the Riots: Investigating England's Summer of Disorder. (2011). Retrieved March 24, 2015 from http://www.guardian.co.uk/uk/series/reading-the-riots.Google Scholar
- B. D. Loader and D. Mercea (Eds.). 2012. Social Media and Democracy. Routledge, London.Google Scholar
- G. Lotan, E. Graeff, M. Ananny, D. Gaffney, I. Pearce, and D. Boyd. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication 5 (Special Issue) (2011), 1375--1405.Google Scholar
- V. Luckerson. 2014. Fear, misinformation and social media complicate ebola fight, Time Oct. 8, 2014. Retrieved March 24, 2015 from http://time.com/3479254/ebola-social-media/.Google Scholar
- D. Lupton. 2015. Digital Sociology. Routledge, London.Google Scholar
- S. Macskassy and M. Michelson. Why do people retweet? Antihomophily wins the day. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM).Google Scholar
- A. McCosker. 2014. Trolling as provocation YouTube's agonistic publics. Convergence: The International Journal of Research into New Media Technologies 20, 2 (2014), 201--217.Google ScholarCross Ref
- T. Mcenery, M. Mcglashan, and R. Love. 2015. Press and media reaction to ideologically inspired murder: The case of Lee Rigby. Discourse and Communication 9, 2 (2015), 237--259.Google ScholarCross Ref
- M. Mendoza, B. Poblete, and C. Castillo. 2010. Twitter under crisis: Can we trust what we RT? In 1st Workshop on Social Media Analytics (SOMA’10). ACM. Google ScholarDigital Library
- B. Miller. 2013. UK petition calls on Twitter to tackle abuse after Caroline Criado-Perez subjected to violent tweets, abc.net July 27, 2013. Retrieved Jan. 12, 2015 from http://www.abc.net.au/news/2013-07-29/thousands-sign-petition-to-stop-abusive-tweets/4849780.Google Scholar
- S. Morris. 2000. Contagion. Review of Economic Studies 67, 1 (2000), 57--78.Google ScholarCross Ref
- K. Mossberger, C. J. Tolbert, and R. S. McNeal. 2008. Digital citizenship: The Internet. In Society and Participation. MIT Press, MA. Google ScholarDigital Library
- L. Munson. 2015. India strikes down controversial “Section 66A” social media policing law, nakedsecurity.com March 25, 2015. Retrieved August 17, 2015 from https://nakedsecurity.sophos.com/2015/03/25/india-strikes-down-controversial-section-66a-social-media-policing-law/.Google Scholar
- D. Murthy. 2012a. Towards a sociological understanding of social media: Theorizing Twitter. Sociology 46, 6 (2012), 1059--1073. DOI:10.1177/0038038511422553Google Scholar
- D. Murthy. 2012b. Twitter: Social Communication in the Twitter Age. Polity Press, Cambridge, UK.Google Scholar
- M. Nekovee, Y. Moreno, G. Bianconi, and M. Marsili. 2007. Theory of rumour spreading in complex social networks. Physica A: Statistical Mechanics and Its Applications 374, 1 (2007), 457--470. DOI:http://dx.doi.org/10.1016/j.physa.2006.07.017Google ScholarCross Ref
- M. E. J. Newman and J. Park. 2003. Why social networks are different from other types of networks. Physical Review E 68, 3 (2003), 036122.Google ScholarCross Ref
- R. Owen, P. Macnaghten, and J. Stilgoe. 2012. Responsible research and innovation: From science in society to science for society, with society. Science and Public Policy 39 (2012), 751--760.Google ScholarCross Ref
- N. Pickles. 2016. Safer internet day: Protecting the global town square of Twitter. The Guardian, Feb. 9, 2016. Retrieved Feb. 9, 2016 from http://www.theguardian.com/technology/2016/feb/08/twitter-safer-internet-day-nick-pickles-online-diversity?CMP=share_btn_tw.Google Scholar
- R. Procter, F. Vis, and A. Voss. 2013a. Reading the riots on Twitter: Methodological innovation for the analysis of big data. International Journal of Social Research Methodology 16, 3 (2013), 197--214. DOI:10.1080/13645579.2013.774172Google ScholarCross Ref
- R. Procter, J. Crump, S. Karstedt, A. Voss, and M. Cantijoch. 2013b. Reading the riots: What were the police doing on Twitter? Policing and Society 23, 4 (2013), 1--24. DOI:10.1080/10439463.2013.780223Google ScholarCross Ref
- J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, S. Patil, A. Flammini, and F. Menczer. 2011. Truthy: Mapping the spread of astroturf in microblog streams. In Proceedings of the 20th International Conference Companion on World Wide Web. ACM, 249--252. Google ScholarDigital Library
- M. C. Roco, B. Harthorn, D. Guston, and P. Shapira. 2011. Innovative and responsible governance of nanotechnology for societal development. Journal of Nanoparticle Research 13 (2011), 3557--3590.Google ScholarCross Ref
- D. M. Romero, B. Meeder, and J. Kleinberg. 2011. Differences in the mechanics of information diffusion across topics: Idioms, political hashtags and complex contagion on twitter. In Proceedings of the International Conference on World Wide Web (WWW). Google ScholarDigital Library
- E. Ruppert, J. Law, and M. Savage. 2013. Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society 30, 4 (2013), 22--46.Google ScholarCross Ref
- H. Sacks, E. A. Schegloff, and G. A. Jefferson. 1974. Simplest systematics for the organization of turn-taking for conversation. Language (1974), 696--735.Google Scholar
- T. Shibutani. 1996. Improvised news: A sociological study of rumor. Bobbs-Merrill, Indianapolis.Google Scholar
- B. C. Stahl. 2015. Morality, ethics and reflection: A categorisation of normative research in is research. Journal of the Association for Information Systems 13, 8 (2012), 636--656.Google ScholarCross Ref
- B. C. Stahl, G. Eden, M. Jirotka, and M. Coeckelbergh. 2014. From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems. Information & Management 51, 6 (2014), 810--818. DOI:10.1016/j.im.2014.01.001 Google ScholarDigital Library
- J. Stilgoe, R. Owen, and P. Macnaghten. 2013. Developing a framework for responsible innovation. Research Policy 42, 9 (2013), 1568--1680. DOI:http://dx.doi.org/10.1016/j.respol.2013.05.008Google ScholarCross Ref
- B. Suh, L. Hong, P. Pirolli, and E. Chi. 2011. Want to be retweeted? Large scale analytics on factors impacting retweet in Twitter network. In Proceedings of the IEEE 2nd Conference on SocialCom. Google ScholarDigital Library
- P. Tolmie, R. Procter, M. Rouncefield, M. Liakata, and A. Zubiaga. 2015. Microblog Analysis as a Programme of Work. Submitted to ACM Transactions on Computer-Human Interaction. Available from arXiv:1511.03193.Google Scholar
- E. Tonkin, H. D. Pfeiffer, and G. Tourte. 2012. Twitter, information sharing and the London riots? Bulletin of the American Society for Information Science and Technology 38, 2 (2012), 49--57.Google ScholarCross Ref
- D. Trottier. 2012. Social Media as Surveillance. Ashgate, Surrey, England.Google Scholar
- R. Trenholm. 2011. Cameron considers blocking Twitter, Facebook, BBM after riots, CNET August 11, 2011. Retrieved March 26, 2015 from http://www.cnet.com/uk/news/cameron-considers-blocking-twitter-facebook-bbm-after-riots/.Google Scholar
- O. Tsur and A. Rappoport. 2012. What's in a hashtag?: Content based prediction of the spread of ideas in microblogging communities. In Proceedings of the 5th ACM International Conference on Web Search and Data Mining. Google ScholarDigital Library
- P. Tweed. 2012. Lord McAlpine and the high cost of tweeting gossip. The Guardian. Nov. 27, 2012. Retrieved March 21, 2015 from http://www.theguardian.com/law/2012/nov/27/lord-mcalpine-twitter-libel.Google Scholar
- G. Tuysuz. 2015. Turkey blocks social media websites, CNN.com April 6, 2015. Retrieved August 17, 2015 from http://edition.cnn.com/2015/04/06/world/turkey-social-media-blocked/.Google Scholar
- UK Safer Internet Centre. 2015. Safer Internet day 2015, saferinternet.org Feb. 10, 2015. Retrieved March 24, 2015 from http://www.saferinternet.org.uk/safer-internet-day/2015.Google Scholar
- WAM. Harrassment of women on Twitter? We’re on it!, Women Action and the Media. Nov. 6, 2014. Retrieved Jan. 20, 2015 from http://www.womenactionmedia.org/2014/11/06/harassment-of-women-on-twitter-were-on-it/.Google Scholar
- D. Watts and P. Dodds. 2009. Threshold models of social influence. In Oxford Handbook of Analytical Sociology, P. Hedstrom and P. S. Bearman (Eds.). Oxford University Press, Oxford, 475--497.Google Scholar
- H. Webb, M. Jirotka, B. Carsten Stahl, W. Housley, A. Edwards, M. Williams, R. Procter, O. Rana, and P. Burnap. 2015. Digital wildfires: Hyper-connectivity, havoc and a global ethos to govern social media. Computers and Society 45, 3 (2015), 193--201. Retrieved Oct. 20, 2015 from http://www.dmu.ac.uk/documents/research-documents/technology/ccsr/20-years-of-ethicomp-si.pdf. Google ScholarDigital Library
- C. Wendling, J. Radisch, and S. Jacobzone. 2013. The use of social media in risk and crisis communication. In OECD Working Papers on Public Governance, No. 24, OECD Publishing. DOI:http://dx.doi.org/10.1787/5k3v01fskp9s-enGoogle Scholar
- L. Wilkins. 1967. Social Deviance. Tavistock Publications, London.Google Scholar
- M. L. Williams and P. Burnap. 2015. Cyberhate on social media in the aftermath of Woolwich: A case study in computational criminology and big data. British Journal of Criminology 56, 2 (2015), 211--238.Google ScholarCross Ref
- M. L. Williams, A. Edwards, W. Housley, P. Burnap, O. Rana, N. Avis, J. Morgan, and L. Sloan. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing & Society 24, 4 (2013), 461--481.Google ScholarCross Ref
- World Economic Forum. 2013. Digital wildfires in a hyperconnected world. Global Risks Report, World Economic Forum. Retrieved Nov. 20, 2014 from http://reports.weforum.org/global-risks-2013/risk-case-1/digital-wildfires-in-a-hyperconnected-world/.Google Scholar
- J. Yang and S. Counts. 2010. Predicting the speed, scale, and range of information diffusion in Twitter. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM).Google Scholar
- T. Zaman, R. Herbrich, J. Van Gael, and D. Stern. 2010. Predicting information spreading in Twitter. In Proceedings of the Workshop on Computational Social Science and the Wisdom of Crowds (NIPS).Google Scholar
- T. Zaman, E. Fox, and E. A. Bradlow. 2013. Bayesian Approach for Predicting the Popularity of Tweets, CoRR. (2013).Google Scholar
- A. Zubiaga, M. Liakata, R. Procter, K. Bontcheva, and P. Tolmie. 2015a. Towards detecting rumours in social media. In Proceedings of the AAAI Workshop on AI for Cities.Google Scholar
- A. Zubiaga, D. Spina, R. Martínez, and V. Fresno. 2015b. Real-time classification of Twitter trends. Journal of the Association for Information Science and Technology 66 (2015), 462--473.Google ScholarDigital Library
- A. Zubiaga, M. Liakata, R. Procter, P. Tolmie, and G. Wong Sak Hoi. 2016. Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS One (2016). Available from arXiv:1511.07487.Google Scholar
Index Terms
- Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation
Recommendations
Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media
Special Issue on EthicompThe last 5--10 years have seen a massive rise in the popularity of social media platforms such as Twitter, Facebook, Tumblr etc. These platforms enable users to post and share their own content instantly, meaning that material can be seen by multiple ...
'Digital Wildfires': a challenge to the governance of social media?
WebSci '15: Proceedings of the ACM Web Science ConferenceThe increasing popularity of social media platforms such as Facebook, Twitter, Instagram and Tumblr has been accompanied by concerns over the growing prevalence of 'harmful' online interactions. The term 'digital wildfire' has been coined to ...
Sharing (mis) information on social networking sites. An exploration of the norms for distributing content authored by others
AbstractThis article explores the norms that govern regular users’ acts of sharing content on social networking sites. Many debates on how to counteract misinformation on Social Networking Sites focus on the epistemic norms of testimony, implicitly ...
Comments