skip to main content
research-article

Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation

Published:20 April 2016Publication History
Skip Abstract Section

Abstract

Social media platforms provide an increasingly popular means for individuals to share content online. Whilst this produces undoubted societal benefits, the ability for content to be spontaneously posted and reposted creates an ideal environment for rumour and false/malicious information to spread rapidly. When this occurs it can cause significant harm and can be characterised as a “digital wildfire.” In this article, we demonstrate that the propagation and regulation of digital wildfires form important topics for research and conduct an overview of existing work in this area. We outline the relevance of a range of work from the computational and social sciences, including a series of insights into the propagation of rumour and false/malicious information. We argue that significant research gaps remain—for instance, there is an absence of systematic studies on the effects of digital wildfires and there is a need to combine empirical research with a consideration of how the responsible governance of social media can be determined. We propose an agenda for research that establishes a methodology to explore in full the propagation and regulation of unverified content on social media. This agenda promotes high-quality interdisciplinary research that will also inform policy debates.

References

  1. A. Adam. 2001. Computer ethics in a different voice. Information and Organization 11, 4 (2001), 235--261.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Adler and E. Ziglio (Eds.). 1996. Gazing into the Oracle: The Delphi Method and its Application to Social Policy and Public Health. Jessica Kingsley Publishers.Google ScholarGoogle Scholar
  3. R. Albert and A. L. Barabasi. 2002. Statistical mechanics of complex networks. Reviews of Modern Physics 74, 1 (2001), 47--97.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. H. Allport and M. Lepkin. 1945. Wartime rumors of waste and special privilege: Why some people believe them. Journal of Abnormal and Social Psychology 40 (1945), 3--36.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Aral, L. Muchnik, and A. Sundararajan. 2009. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. In Proceedings of the National Academy of Sciences 106, 51 (2009), 21544--21549.Google ScholarGoogle ScholarCross RefCross Ref
  6. I. Awan. 2014. Islamophobia and Twitter: A typology of online hate against muslims on social media. Policy & Internet 6, 2 (2014) 133--150.Google ScholarGoogle ScholarCross RefCross Ref
  7. L. Backstrom, J. Kleinberg, L. Lee, and C. Danescu-niculescu-mizil. 2013. Characterizing and curating conversation threads: Expansion, focus, volume, re-entry. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. A. Baker. 2012. From the criminal crowd to the “mediated crowd”: The impact of social media on the 2011 English riots. Safer Communities 11, 1 (2012), 40--49.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. Bandari, S. Asur, and B. A. Huberman. 2012. The pulse of news in social media: Forecasting popularity, CoRR. abs/1202.0332 (2012).Google ScholarGoogle Scholar
  10. Y. Bao, C. Yi, Y. Xue, and Y. A. Dong. 2013. New rumor propagation model and control strategy on social networks. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’13). ACM, New York, NY, 1472--1473. DOI:http://doi.acm.org/10.1145/2492517.2492599 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Barrat, M. Barthelemy, and A. Vespignani. 2008. Dynamical Processes on Complex Networks. Cambridge University Press, Cambridge. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Bassell. 2012. Media and the riots—A call for action, citizen journalism educational trust and the latest.com. Retrieved from http://www.the-latest.com/riots-and-media-report.Google ScholarGoogle Scholar
  13. BBC NEWS. 2015. China punishes 197 over stock market and Tianjin ‘rumours’, bbc.co.uk/news 30 Aug. 2015. Retrieved 30 August 2015 from http://www.bbc.co.uk/news/world-asia-china-34104114.Google ScholarGoogle Scholar
  14. B. Blanchard, H. Li, and P. Carsten. 2013. China threatens tough punishment for online rumour spreading, reuters.com 9 Sep 2013 (2013). Retrieved August 17, 2015 from http://www.reuters.com/article/2013/09/09/us-china-internet-idUSBRE9880CQ20130909.Google ScholarGoogle Scholar
  15. A. Bruns. 2008. Blogs, Wikipedia, second life, and beyond: From production to produsage, Digital Formations, Vol. 45. Peter Lang.Google ScholarGoogle Scholar
  16. P. Burnap and M. Williams. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7, 2 (2015).Google ScholarGoogle Scholar
  17. P. Burnap, O. Rana, N. Avis, M. L. Williams, W. Housley, A. Edwards, J. Morgan, and L. Sloan. 2013. Detecting tension in online communities with computational twitter analysis. Technological Forecasting and Social Change. (2013). Retrieved August 17, 2015 from http://www.sciencedirect.com/science/article/pii/S0040162513000899.Google ScholarGoogle Scholar
  18. P. Burnap, M. L. Williams, L. Sloan, O. Rana, W. Housley, A. Edwards, V. Knight, R. Procter, and A. Voss. 2014. Tweeting the terror: Modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, 1 (2014).Google ScholarGoogle Scholar
  19. T. W. Bynum and S. Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. Wiley Blackwell, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. A. Casilli and P. Tubaro. 2011. Why net censorship in times of political unrest results in more violent uprisings: A social simulation experiment on the UK riots. SSRN Elibrary 14, (2011).Google ScholarGoogle Scholar
  21. S. L. Chei and M. Long. 2012. News sharing in social media: The effect of gratifications and prior experience. Computers in Human Behavior 28, 2 (2011), 331--339. DOI:http://dx.doi.org/10.1016/j.chb.2011.10.002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. F. Chierichetti, S. Lattanzi, and A. Panconesi. 2009. Rumour spreading in social networks. Automata, Languages and Programming. Springer, Berlin, 375--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Cohen. 1973. Folk Devils and Moral Panics the Creation of the Mods and Rockers. Paladin, London.Google ScholarGoogle Scholar
  24. M. Coulthard. 1977. An Introduction to Discourse Analysis. Longman, London.Google ScholarGoogle Scholar
  25. Crown Prosecution Service. 2013. Guidelines on prosecuting cases involving communications sent via social media, CPS. (2013). Retrieved March 24, 2015 from http://www.cps.gov.uk/legal/a_to_c/communications_sent_via_social_media/.Google ScholarGoogle Scholar
  26. P. Dahlgren. 2014. Political participation via the web: Structural and subjective contingencies. Interactions: Studies in Communication and Culture 5, 3 (2014), 255--269. DOI:http://dx.doi.org/10.1386/iscc.5.3.255_1Google ScholarGoogle Scholar
  27. J. Davison. 2013. Amateur online sleuthing: Does it do more harm than good? CBC News April 19, 2013. Retrieved August 12, 2015 from http://www.cbc.ca/news/technology/amateur-online-sleuthing-does-it-do-more-harm-than-good-1.1412039.Google ScholarGoogle Scholar
  28. R. Dawkins. 1989. Memes: The new replicators. In The Selfish Gene (2nd. ed.). Oxford University Press, Oxford.Google ScholarGoogle Scholar
  29. L. Dechun and X. Chen. 2011. Rumor propagation in online social networks like Twitter—A simulation study. In Proceedings of the 3rd International Conference on Multimedia Information Networking and Security (MINES), 278, 282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. Derczynski, K. Bontcheva, M. Lukasik, T. Declerck, A. Scharl, G. Georgiev, R. Procter, P. Tolmie, A. Zubiaga, and M. Liakata. 2015. PHEME: Computing Veracity—The Fourth Challenge of Big Social Data (2015). Retrieved August 16, 2015 from http://derczynski.com/sheffield/papers/pheme-eswc-pn.pdf.Google ScholarGoogle Scholar
  31. T. Van Dijk (Ed.). 1985. Handbook of Discourse Analysis, Vol. 3: Discourse and Dialogue. Academic, London.Google ScholarGoogle Scholar
  32. R. Dingwall. 2001. Contemporary legends, rumours and collective behaviour: Some neglected resources for medical sociology? Sociology of Health & Illness 23, 2 (2001), 180--202.Google ScholarGoogle ScholarCross RefCross Ref
  33. B. Doerr, M. Fouz, and T. Friedrich. 2012. Why rumors spread so quickly in social networks, Communications of the ACM 55, 6 (2012), 70--75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. S. Doshi. 2014. Building a safer Twitter, twitter.com Dec. 2, 2014. Retrieved Jan. 15, 2015 from https://blog.twitter.com/2014/building-a-safer-twitter.Google ScholarGoogle Scholar
  35. A. Edwards, W. Housley, M. Williams, L. Sloan, and M. Williams. 2013. Digital social research, social media and the sociological imagination: Surrogacy, augmentation and re-orientation. International Journal of Social Research Methodology 16, 3 (2013), 245--260. DOI:10.1080/13645579.2013.774185Google ScholarGoogle ScholarCross RefCross Ref
  36. L. Floridi. 2010. Information ethics. In The Cambridge Handbook of Information and Computer Ethics, L. Floridi (Ed.). Cambridge University Press, Cambridge, 77--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. I. Gagliardone, D. Gal, T. Alves, and G. Martinez. 2015. Countering Online Hate Speech. UNESCO Series on Internet Freedom. United Nations Educational, Scientific and Cultural Organisation, Paris.Google ScholarGoogle Scholar
  38. E. Goffman. 1981. Forms of Talk. University of Pennsylvania Press, Pennsylvania.Google ScholarGoogle Scholar
  39. H. Gil De Zúñiga, N. Jung, and S. Valenzuela. 2012. Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of Computer-Mediated Communication 17 (2012), 319--336. DOI:10.1111/j.1083--6101.2012.01574 Google ScholarGoogle ScholarCross RefCross Ref
  40. J. Goldenberg, B. Libai, and E. Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 3, 12 (2001), 211--223.Google ScholarGoogle ScholarCross RefCross Ref
  41. A. Guille and H. A. Hacid. 2012. Predictive model for the temporal dynamics of information diffusion in online social networks. In Proceedings of the 21st International Conference Companion on World Wide Web. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Gulf Centre for Human Rights. 2014. Qatar: New cyber crime law poses real threat to freedom of expression, gc4hr.org Sep. 17, 2014. Retrieved August 17, 2015 from http://www.gc4hr.org/news/view/747.Google ScholarGoogle Scholar
  43. A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi. 2015. Faking Sandy: Characterising and identifying fake images on Twitter during Hurricane Sandy. In Proceedings of the 2nd International Workshop on Privacy and Security on Social Media (PSOSM).Google ScholarGoogle Scholar
  44. C. Hardaker. 2010. Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions. Journal of Politeness Research 6, 2 (2010), 215--242.Google ScholarGoogle ScholarCross RefCross Ref
  45. Her Majesty's Inspectorate of Constabulary. 2011a. The Rules of Engagement: A Review of the August 2011 Disorders. HMIC, London.Google ScholarGoogle Scholar
  46. Her Majesty's Inspectorate of Constabulary. 2011b. Policing Public Order: An Overview and Review of Progress Against the Recommendations of Adapting to Protest and Nurturing the British Model of Policing. HMIC, London.Google ScholarGoogle Scholar
  47. W. Housley, R. Procter, A. Edwards, P. Burnap, M. Williams, L. Sloan, O. Rana, J. Morgan, A. Voss, and G. Greenhill. 2014. Big and broad social data and the sociological imagination: A collaborative response. Big Data & Society 1, 2 (2014).Google ScholarGoogle Scholar
  48. House of Lords. 2014. Social Media and Criminal Offences: 1st report of Session 2014--2015. The Stationery Office Limited, London. Retrieved December 20, 2015 from http://www.publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/3702.htm.Google ScholarGoogle Scholar
  49. M. Innes. 2004. Signal crimes and signal disorders: Notes on deviance as communicative action. British Journal of Sociology 55, 3 (2004), 335--355.Google ScholarGoogle ScholarCross RefCross Ref
  50. A. Java, X. Song, T. Finin, and B. Tseng. 2007. Why we Twitter: Understanding microblogging usage and communities. In Proceedings of the ACM 9th WebKDD and 1st SNA-KDD Workshop on Web Mining and Social Network Analysis. 56--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. D. G. Johnson. 1985. Computer Ethics (1st. ed.). Prentice Hall, Upper Saddle River, New Jersey. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. K. A. L. Kjølberg. 2010. The Notion of “Responsible Development” in New Approaches to Governance of Nanosciences and Nanotechnologies. Doctoral dissertation. The University of Bergen.Google ScholarGoogle Scholar
  53. J. Kostka, Y. A. Oswald, and R. Wattenhofer. 2008. Word of mouth: Rumor dissemination in social networks. Structural Information and Communication Complexity. Springer, Berlin, 185--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang. 2013. Prominent features of rumor propagation in online social media. In Proceedings of the 13th International Conference on Data Mining (ICDM’13), IEEE, 1103--1108.Google ScholarGoogle Scholar
  55. P. Lewis, T. Newburn, M. Taylor, C. Mcgillivray, A. Greenhill, H. Frayman, and R. Procter. 2015. Reading the Riots: Investigating England's Summer of Disorder. (2011). Retrieved March 24, 2015 from http://www.guardian.co.uk/uk/series/reading-the-riots.Google ScholarGoogle Scholar
  56. B. D. Loader and D. Mercea (Eds.). 2012. Social Media and Democracy. Routledge, London.Google ScholarGoogle Scholar
  57. G. Lotan, E. Graeff, M. Ananny, D. Gaffney, I. Pearce, and D. Boyd. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication 5 (Special Issue) (2011), 1375--1405.Google ScholarGoogle Scholar
  58. V. Luckerson. 2014. Fear, misinformation and social media complicate ebola fight, Time Oct. 8, 2014. Retrieved March 24, 2015 from http://time.com/3479254/ebola-social-media/.Google ScholarGoogle Scholar
  59. D. Lupton. 2015. Digital Sociology. Routledge, London.Google ScholarGoogle Scholar
  60. S. Macskassy and M. Michelson. Why do people retweet? Antihomophily wins the day. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM).Google ScholarGoogle Scholar
  61. A. McCosker. 2014. Trolling as provocation YouTube's agonistic publics. Convergence: The International Journal of Research into New Media Technologies 20, 2 (2014), 201--217.Google ScholarGoogle ScholarCross RefCross Ref
  62. T. Mcenery, M. Mcglashan, and R. Love. 2015. Press and media reaction to ideologically inspired murder: The case of Lee Rigby. Discourse and Communication 9, 2 (2015), 237--259.Google ScholarGoogle ScholarCross RefCross Ref
  63. M. Mendoza, B. Poblete, and C. Castillo. 2010. Twitter under crisis: Can we trust what we RT? In 1st Workshop on Social Media Analytics (SOMA’10). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. B. Miller. 2013. UK petition calls on Twitter to tackle abuse after Caroline Criado-Perez subjected to violent tweets, abc.net July 27, 2013. Retrieved Jan. 12, 2015 from http://www.abc.net.au/news/2013-07-29/thousands-sign-petition-to-stop-abusive-tweets/4849780.Google ScholarGoogle Scholar
  65. S. Morris. 2000. Contagion. Review of Economic Studies 67, 1 (2000), 57--78.Google ScholarGoogle ScholarCross RefCross Ref
  66. K. Mossberger, C. J. Tolbert, and R. S. McNeal. 2008. Digital citizenship: The Internet. In Society and Participation. MIT Press, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. L. Munson. 2015. India strikes down controversial “Section 66A” social media policing law, nakedsecurity.com March 25, 2015. Retrieved August 17, 2015 from https://nakedsecurity.sophos.com/2015/03/25/india-strikes-down-controversial-section-66a-social-media-policing-law/.Google ScholarGoogle Scholar
  68. D. Murthy. 2012a. Towards a sociological understanding of social media: Theorizing Twitter. Sociology 46, 6 (2012), 1059--1073. DOI:10.1177/0038038511422553Google ScholarGoogle Scholar
  69. D. Murthy. 2012b. Twitter: Social Communication in the Twitter Age. Polity Press, Cambridge, UK.Google ScholarGoogle Scholar
  70. M. Nekovee, Y. Moreno, G. Bianconi, and M. Marsili. 2007. Theory of rumour spreading in complex social networks. Physica A: Statistical Mechanics and Its Applications 374, 1 (2007), 457--470. DOI:http://dx.doi.org/10.1016/j.physa.2006.07.017Google ScholarGoogle ScholarCross RefCross Ref
  71. M. E. J. Newman and J. Park. 2003. Why social networks are different from other types of networks. Physical Review E 68, 3 (2003), 036122.Google ScholarGoogle ScholarCross RefCross Ref
  72. R. Owen, P. Macnaghten, and J. Stilgoe. 2012. Responsible research and innovation: From science in society to science for society, with society. Science and Public Policy 39 (2012), 751--760.Google ScholarGoogle ScholarCross RefCross Ref
  73. N. Pickles. 2016. Safer internet day: Protecting the global town square of Twitter. The Guardian, Feb. 9, 2016. Retrieved Feb. 9, 2016 from http://www.theguardian.com/technology/2016/feb/08/twitter-safer-internet-day-nick-pickles-online-diversity?CMP=share_btn_tw.Google ScholarGoogle Scholar
  74. R. Procter, F. Vis, and A. Voss. 2013a. Reading the riots on Twitter: Methodological innovation for the analysis of big data. International Journal of Social Research Methodology 16, 3 (2013), 197--214. DOI:10.1080/13645579.2013.774172Google ScholarGoogle ScholarCross RefCross Ref
  75. R. Procter, J. Crump, S. Karstedt, A. Voss, and M. Cantijoch. 2013b. Reading the riots: What were the police doing on Twitter? Policing and Society 23, 4 (2013), 1--24. DOI:10.1080/10439463.2013.780223Google ScholarGoogle ScholarCross RefCross Ref
  76. J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, S. Patil, A. Flammini, and F. Menczer. 2011. Truthy: Mapping the spread of astroturf in microblog streams. In Proceedings of the 20th International Conference Companion on World Wide Web. ACM, 249--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. M. C. Roco, B. Harthorn, D. Guston, and P. Shapira. 2011. Innovative and responsible governance of nanotechnology for societal development. Journal of Nanoparticle Research 13 (2011), 3557--3590.Google ScholarGoogle ScholarCross RefCross Ref
  78. D. M. Romero, B. Meeder, and J. Kleinberg. 2011. Differences in the mechanics of information diffusion across topics: Idioms, political hashtags and complex contagion on twitter. In Proceedings of the International Conference on World Wide Web (WWW). Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. E. Ruppert, J. Law, and M. Savage. 2013. Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society 30, 4 (2013), 22--46.Google ScholarGoogle ScholarCross RefCross Ref
  80. H. Sacks, E. A. Schegloff, and G. A. Jefferson. 1974. Simplest systematics for the organization of turn-taking for conversation. Language (1974), 696--735.Google ScholarGoogle Scholar
  81. T. Shibutani. 1996. Improvised news: A sociological study of rumor. Bobbs-Merrill, Indianapolis.Google ScholarGoogle Scholar
  82. B. C. Stahl. 2015. Morality, ethics and reflection: A categorisation of normative research in is research. Journal of the Association for Information Systems 13, 8 (2012), 636--656.Google ScholarGoogle ScholarCross RefCross Ref
  83. B. C. Stahl, G. Eden, M. Jirotka, and M. Coeckelbergh. 2014. From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems. Information & Management 51, 6 (2014), 810--818. DOI:10.1016/j.im.2014.01.001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. J. Stilgoe, R. Owen, and P. Macnaghten. 2013. Developing a framework for responsible innovation. Research Policy 42, 9 (2013), 1568--1680. DOI:http://dx.doi.org/10.1016/j.respol.2013.05.008Google ScholarGoogle ScholarCross RefCross Ref
  85. B. Suh, L. Hong, P. Pirolli, and E. Chi. 2011. Want to be retweeted? Large scale analytics on factors impacting retweet in Twitter network. In Proceedings of the IEEE 2nd Conference on SocialCom. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. P. Tolmie, R. Procter, M. Rouncefield, M. Liakata, and A. Zubiaga. 2015. Microblog Analysis as a Programme of Work. Submitted to ACM Transactions on Computer-Human Interaction. Available from arXiv:1511.03193.Google ScholarGoogle Scholar
  87. E. Tonkin, H. D. Pfeiffer, and G. Tourte. 2012. Twitter, information sharing and the London riots? Bulletin of the American Society for Information Science and Technology 38, 2 (2012), 49--57.Google ScholarGoogle ScholarCross RefCross Ref
  88. D. Trottier. 2012. Social Media as Surveillance. Ashgate, Surrey, England.Google ScholarGoogle Scholar
  89. R. Trenholm. 2011. Cameron considers blocking Twitter, Facebook, BBM after riots, CNET August 11, 2011. Retrieved March 26, 2015 from http://www.cnet.com/uk/news/cameron-considers-blocking-twitter-facebook-bbm-after-riots/.Google ScholarGoogle Scholar
  90. O. Tsur and A. Rappoport. 2012. What's in a hashtag?: Content based prediction of the spread of ideas in microblogging communities. In Proceedings of the 5th ACM International Conference on Web Search and Data Mining. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. P. Tweed. 2012. Lord McAlpine and the high cost of tweeting gossip. The Guardian. Nov. 27, 2012. Retrieved March 21, 2015 from http://www.theguardian.com/law/2012/nov/27/lord-mcalpine-twitter-libel.Google ScholarGoogle Scholar
  92. G. Tuysuz. 2015. Turkey blocks social media websites, CNN.com April 6, 2015. Retrieved August 17, 2015 from http://edition.cnn.com/2015/04/06/world/turkey-social-media-blocked/.Google ScholarGoogle Scholar
  93. UK Safer Internet Centre. 2015. Safer Internet day 2015, saferinternet.org Feb. 10, 2015. Retrieved March 24, 2015 from http://www.saferinternet.org.uk/safer-internet-day/2015.Google ScholarGoogle Scholar
  94. WAM. Harrassment of women on Twitter? We’re on it!, Women Action and the Media. Nov. 6, 2014. Retrieved Jan. 20, 2015 from http://www.womenactionmedia.org/2014/11/06/harassment-of-women-on-twitter-were-on-it/.Google ScholarGoogle Scholar
  95. D. Watts and P. Dodds. 2009. Threshold models of social influence. In Oxford Handbook of Analytical Sociology, P. Hedstrom and P. S. Bearman (Eds.). Oxford University Press, Oxford, 475--497.Google ScholarGoogle Scholar
  96. H. Webb, M. Jirotka, B. Carsten Stahl, W. Housley, A. Edwards, M. Williams, R. Procter, O. Rana, and P. Burnap. 2015. Digital wildfires: Hyper-connectivity, havoc and a global ethos to govern social media. Computers and Society 45, 3 (2015), 193--201. Retrieved Oct. 20, 2015 from http://www.dmu.ac.uk/documents/research-documents/technology/ccsr/20-years-of-ethicomp-si.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. C. Wendling, J. Radisch, and S. Jacobzone. 2013. The use of social media in risk and crisis communication. In OECD Working Papers on Public Governance, No. 24, OECD Publishing. DOI:http://dx.doi.org/10.1787/5k3v01fskp9s-enGoogle ScholarGoogle Scholar
  98. L. Wilkins. 1967. Social Deviance. Tavistock Publications, London.Google ScholarGoogle Scholar
  99. M. L. Williams and P. Burnap. 2015. Cyberhate on social media in the aftermath of Woolwich: A case study in computational criminology and big data. British Journal of Criminology 56, 2 (2015), 211--238.Google ScholarGoogle ScholarCross RefCross Ref
  100. M. L. Williams, A. Edwards, W. Housley, P. Burnap, O. Rana, N. Avis, J. Morgan, and L. Sloan. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing & Society 24, 4 (2013), 461--481.Google ScholarGoogle ScholarCross RefCross Ref
  101. World Economic Forum. 2013. Digital wildfires in a hyperconnected world. Global Risks Report, World Economic Forum. Retrieved Nov. 20, 2014 from http://reports.weforum.org/global-risks-2013/risk-case-1/digital-wildfires-in-a-hyperconnected-world/.Google ScholarGoogle Scholar
  102. J. Yang and S. Counts. 2010. Predicting the speed, scale, and range of information diffusion in Twitter. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM).Google ScholarGoogle Scholar
  103. T. Zaman, R. Herbrich, J. Van Gael, and D. Stern. 2010. Predicting information spreading in Twitter. In Proceedings of the Workshop on Computational Social Science and the Wisdom of Crowds (NIPS).Google ScholarGoogle Scholar
  104. T. Zaman, E. Fox, and E. A. Bradlow. 2013. Bayesian Approach for Predicting the Popularity of Tweets, CoRR. (2013).Google ScholarGoogle Scholar
  105. A. Zubiaga, M. Liakata, R. Procter, K. Bontcheva, and P. Tolmie. 2015a. Towards detecting rumours in social media. In Proceedings of the AAAI Workshop on AI for Cities.Google ScholarGoogle Scholar
  106. A. Zubiaga, D. Spina, R. Martínez, and V. Fresno. 2015b. Real-time classification of Twitter trends. Journal of the Association for Information Science and Technology 66 (2015), 462--473.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. A. Zubiaga, M. Liakata, R. Procter, P. Tolmie, and G. Wong Sak Hoi. 2016. Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS One (2016). Available from arXiv:1511.07487.Google ScholarGoogle Scholar

Index Terms

  1. Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation

    Recommendations

    Reviews

    Brad D. Reid

    "Digital wildfire" describes the rapid spread of "rumor and false/malicious information." The authors provide an excellent review of research concerning how this occurs and where the gaps are in contemporary research. They subsequently discuss their own research agendas. Digital wildfires is truly an interdisciplinary topic, and both students and researchers in the computational and social sciences will want to read this excellent paper. The authors proceed in a very logical and easy-to-read format with major headings and subtopics. The major headings are "Introduction: Social Media, Unverified Content, and Digital Wildfires"; "The Propagation of Digital Wildfires on Social Media"; "Responses to Digital Wildfires by Individuals and Agencies"; "Ethical Dimensions of Digital Wildfires and Social Media Governance"; "Addressing Gaps in the Responsible Governance of Social Media: A Research Agenda"; and a "Conclusion." The authors provide excellent summaries of past research literature and open questions for future research. The authors state: "it is necessary to build on an empirically grounded methodology for the study and advancement of the responsible governance of social media. This requires an interdisciplinary approach that incorporates relevant contemporary developments in computational science, the social sciences, computer ethics, and RRI [responsible research and innovation]." They briefly outline six of their own research activities. These include the following: "scoping ethical questions in relation to digital wildfires"; "scoping existing governance mechanisms, their limitations, and possibilities for further mechanisms"; "continuing case studies of digital wildfires through the quantitative and qualitative examination of social media data sets"; "a Delphi panel" [stakeholder groups look for areas of consensus]; "ethnographic interviews and observations"; and an "ethical security map" [a practical tool to aid policy decision making]. The paper concludes with an exhaustive list of references. This presentation is worthy of your time. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Information Systems
      ACM Transactions on Information Systems  Volume 34, Issue 3
      Special Issue on Trust and Veracity of Information in Social Media
      May 2016
      110 pages
      ISSN:1046-8188
      EISSN:1558-2868
      DOI:10.1145/2915200
      Issue’s Table of Contents

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 April 2016
      • Revised: 1 February 2016
      • Accepted: 1 February 2016
      • Received: 1 March 2015
      Published in tois Volume 34, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader