Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2818048.2819964acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

How Information Snowballs: Exploring the Role of Exposure in Online Rumor Propagation

Published: 27 February 2016 Publication History

Abstract

In this paper we highlight three distinct approaches to studying rumor dynamics-volume, exposure, and content production. Expanding upon prior work, which has focused on rumor volume, we argue that considering the size of the exposed population is a vital component of understanding rumoring. Additionally, by combining all three approaches we discover subtle features of rumoring behavior that would have been missed by applying each approach in isolation. Using a case study of rumoring on Twitter during a hostage crisis in Sydney, Australia, we apply a mixed-methods framework to explore rumoring and its consequences through these three lenses, focusing on the added dimension of exposure in particular. Our approach demonstrates the importance of considering both rumor content and the people engaging with rumor content to arrive at a more holistic understanding of communication dynamics. These results have implications for emergency responders and official use of social media during crisis management.

References

[1]
Gordon W. Allport and Leo Postman. 1947. The Psychology of Rumor. Oxford, England: Henry Holt.
[2]
Susan Anthony. 1973. Anxiety and Rumor. The Journal of Social Psychology 89, No. 1, 91-98.
[3]
Allen H. Barton. 1969. Communities in Disaster: A Sociological Analysis of Collective Stress Situations. Garden City, New York: Doubleday and Company, Inc.
[4]
Theodore Caplow. 1947. Rumors in War. Social Forces, 298-302.
[5]
Meeyoung Cha, Hamed Haddai, Fabricio Benevenuto, and Krishna P. Gummadi. 2010. Measuring User Influence in Twitter: The Million Follower Fallacy. International AAAI Conference on Weblogs and Social Media, 10–17. http://doi.org/10.1.1.167.192
[6]
William J. Corvey, Sarah Vieweg, Travis Rood, and Martha Palmer. 2010. Twitter in Mass Emergency: What NLP Techniques can Contribute. In Proceedings of the NAACL HLT 2010 Workshop on Computational Linguistics in a World of Social Media. Association for Computational Linguistics, June, 23–24. http://doi.org/10.1186/1750-1326-4-10
[7]
Stuart C. Dodd. 1953. Testing Message Diffusion in Controlled Experiments: Charting the Distance and Time Factors in the Interactance Hypothesis. American Sociological Review, 18(4): 410-416.
[8]
Joseph L. Fleiss. 1971. Measuring nominal scale agreement among many raters. Psychological Bulletin 76, 378–382. http://doi.org/10.1037/h0031619
[9]
Bradley Greenberg. 1964. Diffusion of News of the Kennedy Assassination. Public Opinion Quarterly 28, 2, 225–232. http://doi.org/10.1086/267239
[10]
Kashmir Hill. 2012. Hurricane Sandy, @ ComfortablySmug, and the Flood of Social Media Misinformation. Forbes. Com.
[11]
Starr R. Hiltz, Jane Kushma, and Linda Plotnick. 2014. Use of Social Media by US Public Sector Emergency Managers: Barriers and Wish Lists. In Proceedings of ISCRAM (2014).
[12]
Amanda L. Hughes, Lise A. A. St. Denis, Leysia Palen, and Kenneth M. Anderson. 2014. Online public communications by police & fire services during the 2012 Hurricane Sandy. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems, pp. 1505-1514.
[13]
Amanda L. Hughes and Leysia Palen. 2009. Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6, 248. http://doi.org/10.1504/IJEM.2009.031564
[14]
Amanda L. Hughes and Leysia Palen. 2012. The Evolving Role of the Public Information Officer: An Examination of Social Media in Emergency Management. Journal of Homeland Security and Emergency Management 9, 1.
[15]
Jean-Noël Kapferer. 1989. A Mass Poisoning Rumor in Europe. Public Opinion Quarterly 53, 4, 467–481. Retrieved from http://www.jstor.org/stable/2749354
[16]
Kwon Kwon, Meeyoung Cha, Kyomin Jung, Wei Chen, and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In IEEE 13th International Conference on Data Mining, (ICDM), 1103-1108.
[17]
Kristina Lerman, Rumi Ghosh, and Tawan Surachawala. 2010. Social Contagion: An Empirical Study of Information Spread on Digg and Twitter Follower Graphs. In Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, 90–97.
[18]
Qinying Liao and Lei Shi. 2013. She gets a sports car from our donation. In Proceedings of the 2013 conference on Computer supported cooperative work CSCW '13, 587. http://doi.org/10.1145/2441776.2441842
[19]
Jim Maddock, Kate Starbird, Haneen Al-Hassani, Daniel E. Sandoval, Mania Orand, and Robert M. Mason. 2015. Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures. In Proceedings of 18th ACM Computer Supported Cooperative Work and Social Computing (CSCW'15).
[20]
Marcelo Mendoza, Barbara Poblete, and Carlos Castillo. 2010. Twitter Under Crisis: Can we trust what we RT? Workshop on Social Media Analytics, 9. http://doi.org/10.1145/1964858.1964869
[21]
Andrew Noymer. 2001. The transmission and persistence of 'urban legends': Sociological application of age' structured epidemic models. The Journal of Mathematical Sociology 25, 299–323. http://doi.org/10.1080/0022250X.2001.9990256
[22]
Onook Oh, Kyounghee H. Kwon, and H. Raghav Rao. 2010. An exploration of social media in extreme events: rumor theory and twitter during the Haiti earthquake. International Conference on Information Systems (ICIS), 231.
[23]
Alexandra Olteanu, Sarah Vieweg, and Carlos Castillo. 2015. What to Expect When the Unexpected Happens: Social Media Communications Across Crises. In Proceedings of 18th ACM Computer Supported Cooperative Work and Social Computing (CSCW'15), No. EPFL-CONF-203562. 2015.
[24]
Leysia Palen, Kenneth M. Anderson, Gloria Mark, James Martin, Douglas Sicker, Martha Palmer, and Dirk Grunwald. 2010. A vision for technologymediated support for public participation & assistance in mass emergencies & disasters. In Proceedings of the 2010 ACM BCS Visions of Computer Science Conference, 1–12.
[25]
Vahed Qazvinian, Emily Rosengren, Dragomir R. Radev, and Qiaozhu Mei. 2011. Rumor has it: Identifying Misinformation in Microblogs. In Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing (EMNLP), 1589–1599.
[26]
Joseph Scanlon. 2007. Sampling unknown universe: Problems of researching mass casualty incidents (a history of ECRU's field research). Statistics in Medicine 26, 1812–1823. http://doi.org/10.1002/sim.2800
[27]
Tamotsu Shibutani. 1969. Improvised News: A Sociological Study of Rumor. American Sociological Review 34, 781. http://doi.org/10.2307/2092353
[28]
Emma S. Spiro, Jeannette Sutton, Matt Greczek, Sean Fitzhugh, Nicole Pierski, and Carter T. Butts. 2012. Rumoring During Extreme Events: A Case Study of Deepwater Horizon 2010. In Proceedings of the ACM Web Science 2012 Conference (WebSci12), 275–283. http://doi.org/10.1145/2380718.2380754
[29]
Kate Starbird, Jim Maddock, Mania Orand, Peg Achterman, and Robert M. Mason. 2014. Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 Boston marathon bombing. In Proceedings of iConference 2014, 654-662.
[30]
Kate Starbird, Leysia Palen, Amanda L. Hughes, and Sarah Vieweg. 2010. Chatter on the red: what hazards threat reveals about the social life of microblogged information. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, 241-250. http://doi.org/10.1145/1718918.1718965
[31]
Kate Starbird and Leysia Palen. 2012. (How) will the revolution be retweeted?: information diffusion and the 2011 Egyptian uprising. In Proceedings of the ACM 2012 conference on computer supported cooperative work, 7–16. http://doi.org/10.1145/2145204.2145212
[32]
Jeannette Sutton, Leysia Palen, and Irina Shklovski. 2008. Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires. In Proceedings of the 5th International ISCRAM Conference, 1–9.
[33]
Jeannette Sutton, Emma S. Spiro, Britta Johnson, Sean Fitzhugh, Ben Gibson, and Carter T. Butts. 2013. Warning Tweets: Serial Transmission of Messages During the Warning Phase of a Disaster Event. Information, Communication & Society 17, 6, 765– 787. http://doi.org/10.1080/1369118X.2013.862561
[34]
Jeannette Sutton, Emma S. Spiro, Britta Johnson, Sean Fitzhugh, Ben Gibson, and Carter T. Butts. 2014. Terse message amplification in the Boston Bombing Response. In Proceedings of the 11th International ISCRAM Conference, 612-621.
[35]
Sydney Siege: How the Hostage Drama Played Out. The Sydney Morning Herald. Accessed May 13, 2015. http://www.smh.com.au/nsw/sydney-siege-how-thehostage-drama-played-out-20141220-12b1km.html
[36]
The Australian. (n.d.). Retrieved May 4, 2015, from http://en.wikipedia.org/wiki/The_Australian

Cited By

View all
  • (2024)Low credibility URL sharing on Twitter during reporting linking rare blood clots with the Oxford/AstraZeneca COVID-19 vaccinePLOS ONE10.1371/journal.pone.029644419:1(e0296444)Online publication date: 19-Jan-2024
  • (2024)Leveraging Exposure Networks for Detecting Fake News SourcesProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671539(5635-5646)Online publication date: 25-Aug-2024
  • (2024)Unveiling the Life Cycle of User Feedback: Best Practices from Software PractitionersProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623309(1-13)Online publication date: 20-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CSCW '16: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing
February 2016
1866 pages
ISBN:9781450335928
DOI:10.1145/2818048
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 February 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Rumoring
  2. Twitter
  3. crisis informatics
  4. disaster response
  5. information contagion
  6. information diffusion

Qualifiers

  • Research-article

Funding Sources

  • NSF Grants

Conference

CSCW '16
Sponsor:
CSCW '16: Computer Supported Cooperative Work and Social Computing
February 27 - March 2, 2016
California, San Francisco, USA

Acceptance Rates

CSCW '16 Paper Acceptance Rate 142 of 571 submissions, 25%;
Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

Upcoming Conference

CSCW '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)9
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Low credibility URL sharing on Twitter during reporting linking rare blood clots with the Oxford/AstraZeneca COVID-19 vaccinePLOS ONE10.1371/journal.pone.029644419:1(e0296444)Online publication date: 19-Jan-2024
  • (2024)Leveraging Exposure Networks for Detecting Fake News SourcesProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671539(5635-5646)Online publication date: 25-Aug-2024
  • (2024)Unveiling the Life Cycle of User Feedback: Best Practices from Software PractitionersProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623309(1-13)Online publication date: 20-May-2024
  • (2023)Predicting abnormal trading behavior from internet rumor propagation: a machine learning approachFinancial Innovation10.1186/s40854-022-00423-99:1Online publication date: 3-Jan-2023
  • (2023)Powering an AI Chatbot with Expert Sourcing to Support Credible Health Information AccessProceedings of the 28th International Conference on Intelligent User Interfaces10.1145/3581641.3584031(2-18)Online publication date: 27-Mar-2023
  • (2023)Understanding Motivational Factors in Social Media News Sharing DecisionsProceedings of the ACM on Human-Computer Interaction10.1145/35795387:CSCW1(1-30)Online publication date: 16-Apr-2023
  • (2023)Spotlight Tweets: A Lens for Exploring Attention Dynamics within Online Sensemaking During Crisis EventsACM Transactions on Social Computing10.1145/35772136:1-2(1-33)Online publication date: 26-Jun-2023
  • (2023)Understanding the Influence of Social Hubs in Diffusion Processes Driven by Incentivized Friend InvitationIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.318439210:4(1491-1502)Online publication date: Aug-2023
  • (2023)Leveraging User Feedback for Requirements Through Trend and Narrative Analysis2023 IEEE 31st International Requirements Engineering Conference (RE)10.1109/RE57278.2023.00060(386-390)Online publication date: Sep-2023
  • (2023)Cross-Genre Retrieval for Information Integrity: A COVID-19 Case StudyAdvanced Data Mining and Applications10.1007/978-3-031-46677-9_34(495-509)Online publication date: 5-Nov-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media