Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation

Published: 20 April 2016 Publication History

Abstract

Social media platforms provide an increasingly popular means for individuals to share content online. Whilst this produces undoubted societal benefits, the ability for content to be spontaneously posted and reposted creates an ideal environment for rumour and false/malicious information to spread rapidly. When this occurs it can cause significant harm and can be characterised as a “digital wildfire.” In this article, we demonstrate that the propagation and regulation of digital wildfires form important topics for research and conduct an overview of existing work in this area. We outline the relevance of a range of work from the computational and social sciences, including a series of insights into the propagation of rumour and false/malicious information. We argue that significant research gaps remain—for instance, there is an absence of systematic studies on the effects of digital wildfires and there is a need to combine empirical research with a consideration of how the responsible governance of social media can be determined. We propose an agenda for research that establishes a methodology to explore in full the propagation and regulation of unverified content on social media. This agenda promotes high-quality interdisciplinary research that will also inform policy debates.

References

[1]
A. Adam. 2001. Computer ethics in a different voice. Information and Organization 11, 4 (2001), 235--261.
[2]
M. Adler and E. Ziglio (Eds.). 1996. Gazing into the Oracle: The Delphi Method and its Application to Social Policy and Public Health. Jessica Kingsley Publishers.
[3]
R. Albert and A. L. Barabasi. 2002. Statistical mechanics of complex networks. Reviews of Modern Physics 74, 1 (2001), 47--97.
[4]
F. H. Allport and M. Lepkin. 1945. Wartime rumors of waste and special privilege: Why some people believe them. Journal of Abnormal and Social Psychology 40 (1945), 3--36.
[5]
S. Aral, L. Muchnik, and A. Sundararajan. 2009. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. In Proceedings of the National Academy of Sciences 106, 51 (2009), 21544--21549.
[6]
I. Awan. 2014. Islamophobia and Twitter: A typology of online hate against muslims on social media. Policy & Internet 6, 2 (2014) 133--150.
[7]
L. Backstrom, J. Kleinberg, L. Lee, and C. Danescu-niculescu-mizil. 2013. Characterizing and curating conversation threads: Expansion, focus, volume, re-entry. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining.
[8]
S. A. Baker. 2012. From the criminal crowd to the “mediated crowd”: The impact of social media on the 2011 English riots. Safer Communities 11, 1 (2012), 40--49.
[9]
R. Bandari, S. Asur, and B. A. Huberman. 2012. The pulse of news in social media: Forecasting popularity, CoRR. abs/1202.0332 (2012).
[10]
Y. Bao, C. Yi, Y. Xue, and Y. A. Dong. 2013. New rumor propagation model and control strategy on social networks. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’13). ACM, New York, NY, 1472--1473.
[11]
B. Barrat, M. Barthelemy, and A. Vespignani. 2008. Dynamical Processes on Complex Networks. Cambridge University Press, Cambridge.
[12]
L. Bassell. 2012. Media and the riots—A call for action, citizen journalism educational trust and the latest.com. Retrieved from http://www.the-latest.com/riots-and-media-report.
[13]
BBC NEWS. 2015. China punishes 197 over stock market and Tianjin ‘rumours’, bbc.co.uk/news 30 Aug. 2015. Retrieved 30 August 2015 from http://www.bbc.co.uk/news/world-asia-china-34104114.
[14]
B. Blanchard, H. Li, and P. Carsten. 2013. China threatens tough punishment for online rumour spreading, reuters.com 9 Sep 2013 (2013). Retrieved August 17, 2015 from http://www.reuters.com/article/2013/09/09/us-china-internet-idUSBRE9880CQ20130909.
[15]
A. Bruns. 2008. Blogs, Wikipedia, second life, and beyond: From production to produsage, Digital Formations, Vol. 45. Peter Lang.
[16]
P. Burnap and M. Williams. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7, 2 (2015).
[17]
P. Burnap, O. Rana, N. Avis, M. L. Williams, W. Housley, A. Edwards, J. Morgan, and L. Sloan. 2013. Detecting tension in online communities with computational twitter analysis. Technological Forecasting and Social Change. (2013). Retrieved August 17, 2015 from http://www.sciencedirect.com/science/article/pii/S0040162513000899.
[18]
P. Burnap, M. L. Williams, L. Sloan, O. Rana, W. Housley, A. Edwards, V. Knight, R. Procter, and A. Voss. 2014. Tweeting the terror: Modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, 1 (2014).
[19]
T. W. Bynum and S. Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. Wiley Blackwell, New York.
[20]
A. A. Casilli and P. Tubaro. 2011. Why net censorship in times of political unrest results in more violent uprisings: A social simulation experiment on the UK riots. SSRN Elibrary 14, (2011).
[21]
S. L. Chei and M. Long. 2012. News sharing in social media: The effect of gratifications and prior experience. Computers in Human Behavior 28, 2 (2011), 331--339.
[22]
F. Chierichetti, S. Lattanzi, and A. Panconesi. 2009. Rumour spreading in social networks. Automata, Languages and Programming. Springer, Berlin, 375--386.
[23]
S. Cohen. 1973. Folk Devils and Moral Panics the Creation of the Mods and Rockers. Paladin, London.
[24]
M. Coulthard. 1977. An Introduction to Discourse Analysis. Longman, London.
[25]
Crown Prosecution Service. 2013. Guidelines on prosecuting cases involving communications sent via social media, CPS. (2013). Retrieved March 24, 2015 from http://www.cps.gov.uk/legal/a_to_c/communications_sent_via_social_media/.
[26]
P. Dahlgren. 2014. Political participation via the web: Structural and subjective contingencies. Interactions: Studies in Communication and Culture 5, 3 (2014), 255--269.
[27]
J. Davison. 2013. Amateur online sleuthing: Does it do more harm than good? CBC News April 19, 2013. Retrieved August 12, 2015 from http://www.cbc.ca/news/technology/amateur-online-sleuthing-does-it-do-more-harm-than-good-1.1412039.
[28]
R. Dawkins. 1989. Memes: The new replicators. In The Selfish Gene (2nd. ed.). Oxford University Press, Oxford.
[29]
L. Dechun and X. Chen. 2011. Rumor propagation in online social networks like Twitter—A simulation study. In Proceedings of the 3rd International Conference on Multimedia Information Networking and Security (MINES), 278, 282.
[30]
L. Derczynski, K. Bontcheva, M. Lukasik, T. Declerck, A. Scharl, G. Georgiev, R. Procter, P. Tolmie, A. Zubiaga, and M. Liakata. 2015. PHEME: Computing Veracity—The Fourth Challenge of Big Social Data (2015). Retrieved August 16, 2015 from http://derczynski.com/sheffield/papers/pheme-eswc-pn.pdf.
[31]
T. Van Dijk (Ed.). 1985. Handbook of Discourse Analysis, Vol. 3: Discourse and Dialogue. Academic, London.
[32]
R. Dingwall. 2001. Contemporary legends, rumours and collective behaviour: Some neglected resources for medical sociology? Sociology of Health & Illness 23, 2 (2001), 180--202.
[33]
B. Doerr, M. Fouz, and T. Friedrich. 2012. Why rumors spread so quickly in social networks, Communications of the ACM 55, 6 (2012), 70--75.
[34]
S. Doshi. 2014. Building a safer Twitter, twitter.com Dec. 2, 2014. Retrieved Jan. 15, 2015 from https://blog.twitter.com/2014/building-a-safer-twitter.
[35]
A. Edwards, W. Housley, M. Williams, L. Sloan, and M. Williams. 2013. Digital social research, social media and the sociological imagination: Surrogacy, augmentation and re-orientation. International Journal of Social Research Methodology 16, 3 (2013), 245--260.
[36]
L. Floridi. 2010. Information ethics. In The Cambridge Handbook of Information and Computer Ethics, L. Floridi (Ed.). Cambridge University Press, Cambridge, 77--97.
[37]
I. Gagliardone, D. Gal, T. Alves, and G. Martinez. 2015. Countering Online Hate Speech. UNESCO Series on Internet Freedom. United Nations Educational, Scientific and Cultural Organisation, Paris.
[38]
E. Goffman. 1981. Forms of Talk. University of Pennsylvania Press, Pennsylvania.
[39]
H. Gil De Zúñiga, N. Jung, and S. Valenzuela. 2012. Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of Computer-Mediated Communication 17 (2012), 319--336.
[40]
J. Goldenberg, B. Libai, and E. Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 3, 12 (2001), 211--223.
[41]
A. Guille and H. A. Hacid. 2012. Predictive model for the temporal dynamics of information diffusion in online social networks. In Proceedings of the 21st International Conference Companion on World Wide Web.
[42]
Gulf Centre for Human Rights. 2014. Qatar: New cyber crime law poses real threat to freedom of expression, gc4hr.org Sep. 17, 2014. Retrieved August 17, 2015 from http://www.gc4hr.org/news/view/747.
[43]
A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi. 2015. Faking Sandy: Characterising and identifying fake images on Twitter during Hurricane Sandy. In Proceedings of the 2nd International Workshop on Privacy and Security on Social Media (PSOSM).
[44]
C. Hardaker. 2010. Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions. Journal of Politeness Research 6, 2 (2010), 215--242.
[45]
Her Majesty's Inspectorate of Constabulary. 2011a. The Rules of Engagement: A Review of the August 2011 Disorders. HMIC, London.
[46]
Her Majesty's Inspectorate of Constabulary. 2011b. Policing Public Order: An Overview and Review of Progress Against the Recommendations of Adapting to Protest and Nurturing the British Model of Policing. HMIC, London.
[47]
W. Housley, R. Procter, A. Edwards, P. Burnap, M. Williams, L. Sloan, O. Rana, J. Morgan, A. Voss, and G. Greenhill. 2014. Big and broad social data and the sociological imagination: A collaborative response. Big Data & Society 1, 2 (2014).
[48]
House of Lords. 2014. Social Media and Criminal Offences: 1st report of Session 2014--2015. The Stationery Office Limited, London. Retrieved December 20, 2015 from http://www.publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/3702.htm.
[49]
M. Innes. 2004. Signal crimes and signal disorders: Notes on deviance as communicative action. British Journal of Sociology 55, 3 (2004), 335--355.
[50]
A. Java, X. Song, T. Finin, and B. Tseng. 2007. Why we Twitter: Understanding microblogging usage and communities. In Proceedings of the ACM 9th WebKDD and 1st SNA-KDD Workshop on Web Mining and Social Network Analysis. 56--65.
[51]
D. G. Johnson. 1985. Computer Ethics (1st. ed.). Prentice Hall, Upper Saddle River, New Jersey.
[52]
K. A. L. Kjølberg. 2010. The Notion of “Responsible Development” in New Approaches to Governance of Nanosciences and Nanotechnologies. Doctoral dissertation. The University of Bergen.
[53]
J. Kostka, Y. A. Oswald, and R. Wattenhofer. 2008. Word of mouth: Rumor dissemination in social networks. Structural Information and Communication Complexity. Springer, Berlin, 185--196.
[54]
S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang. 2013. Prominent features of rumor propagation in online social media. In Proceedings of the 13th International Conference on Data Mining (ICDM’13), IEEE, 1103--1108.
[55]
P. Lewis, T. Newburn, M. Taylor, C. Mcgillivray, A. Greenhill, H. Frayman, and R. Procter. 2015. Reading the Riots: Investigating England's Summer of Disorder. (2011). Retrieved March 24, 2015 from http://www.guardian.co.uk/uk/series/reading-the-riots.
[56]
B. D. Loader and D. Mercea (Eds.). 2012. Social Media and Democracy. Routledge, London.
[57]
G. Lotan, E. Graeff, M. Ananny, D. Gaffney, I. Pearce, and D. Boyd. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication 5 (Special Issue) (2011), 1375--1405.
[58]
V. Luckerson. 2014. Fear, misinformation and social media complicate ebola fight, Time Oct. 8, 2014. Retrieved March 24, 2015 from http://time.com/3479254/ebola-social-media/.
[59]
D. Lupton. 2015. Digital Sociology. Routledge, London.
[60]
S. Macskassy and M. Michelson. Why do people retweet? Antihomophily wins the day. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM).
[61]
A. McCosker. 2014. Trolling as provocation YouTube's agonistic publics. Convergence: The International Journal of Research into New Media Technologies 20, 2 (2014), 201--217.
[62]
T. Mcenery, M. Mcglashan, and R. Love. 2015. Press and media reaction to ideologically inspired murder: The case of Lee Rigby. Discourse and Communication 9, 2 (2015), 237--259.
[63]
M. Mendoza, B. Poblete, and C. Castillo. 2010. Twitter under crisis: Can we trust what we RT? In 1st Workshop on Social Media Analytics (SOMA’10). ACM.
[64]
B. Miller. 2013. UK petition calls on Twitter to tackle abuse after Caroline Criado-Perez subjected to violent tweets, abc.net July 27, 2013. Retrieved Jan. 12, 2015 from http://www.abc.net.au/news/2013-07-29/thousands-sign-petition-to-stop-abusive-tweets/4849780.
[65]
S. Morris. 2000. Contagion. Review of Economic Studies 67, 1 (2000), 57--78.
[66]
K. Mossberger, C. J. Tolbert, and R. S. McNeal. 2008. Digital citizenship: The Internet. In Society and Participation. MIT Press, MA.
[67]
L. Munson. 2015. India strikes down controversial “Section 66A” social media policing law, nakedsecurity.com March 25, 2015. Retrieved August 17, 2015 from https://nakedsecurity.sophos.com/2015/03/25/india-strikes-down-controversial-section-66a-social-media-policing-law/.
[68]
D. Murthy. 2012a. Towards a sociological understanding of social media: Theorizing Twitter. Sociology 46, 6 (2012), 1059--1073.
[69]
D. Murthy. 2012b. Twitter: Social Communication in the Twitter Age. Polity Press, Cambridge, UK.
[70]
M. Nekovee, Y. Moreno, G. Bianconi, and M. Marsili. 2007. Theory of rumour spreading in complex social networks. Physica A: Statistical Mechanics and Its Applications 374, 1 (2007), 457--470.
[71]
M. E. J. Newman and J. Park. 2003. Why social networks are different from other types of networks. Physical Review E 68, 3 (2003), 036122.
[72]
R. Owen, P. Macnaghten, and J. Stilgoe. 2012. Responsible research and innovation: From science in society to science for society, with society. Science and Public Policy 39 (2012), 751--760.
[73]
N. Pickles. 2016. Safer internet day: Protecting the global town square of Twitter. The Guardian, Feb. 9, 2016. Retrieved Feb. 9, 2016 from http://www.theguardian.com/technology/2016/feb/08/twitter-safer-internet-day-nick-pickles-online-diversity?CMP=share_btn_tw.
[74]
R. Procter, F. Vis, and A. Voss. 2013a. Reading the riots on Twitter: Methodological innovation for the analysis of big data. International Journal of Social Research Methodology 16, 3 (2013), 197--214.
[75]
R. Procter, J. Crump, S. Karstedt, A. Voss, and M. Cantijoch. 2013b. Reading the riots: What were the police doing on Twitter? Policing and Society 23, 4 (2013), 1--24.
[76]
J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, S. Patil, A. Flammini, and F. Menczer. 2011. Truthy: Mapping the spread of astroturf in microblog streams. In Proceedings of the 20th International Conference Companion on World Wide Web. ACM, 249--252.
[77]
M. C. Roco, B. Harthorn, D. Guston, and P. Shapira. 2011. Innovative and responsible governance of nanotechnology for societal development. Journal of Nanoparticle Research 13 (2011), 3557--3590.
[78]
D. M. Romero, B. Meeder, and J. Kleinberg. 2011. Differences in the mechanics of information diffusion across topics: Idioms, political hashtags and complex contagion on twitter. In Proceedings of the International Conference on World Wide Web (WWW).
[79]
E. Ruppert, J. Law, and M. Savage. 2013. Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society 30, 4 (2013), 22--46.
[80]
H. Sacks, E. A. Schegloff, and G. A. Jefferson. 1974. Simplest systematics for the organization of turn-taking for conversation. Language (1974), 696--735.
[81]
T. Shibutani. 1996. Improvised news: A sociological study of rumor. Bobbs-Merrill, Indianapolis.
[82]
B. C. Stahl. 2015. Morality, ethics and reflection: A categorisation of normative research in is research. Journal of the Association for Information Systems 13, 8 (2012), 636--656.
[83]
B. C. Stahl, G. Eden, M. Jirotka, and M. Coeckelbergh. 2014. From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems. Information & Management 51, 6 (2014), 810--818.
[84]
J. Stilgoe, R. Owen, and P. Macnaghten. 2013. Developing a framework for responsible innovation. Research Policy 42, 9 (2013), 1568--1680.
[85]
B. Suh, L. Hong, P. Pirolli, and E. Chi. 2011. Want to be retweeted? Large scale analytics on factors impacting retweet in Twitter network. In Proceedings of the IEEE 2nd Conference on SocialCom.
[86]
P. Tolmie, R. Procter, M. Rouncefield, M. Liakata, and A. Zubiaga. 2015. Microblog Analysis as a Programme of Work. Submitted to ACM Transactions on Computer-Human Interaction. Available from arXiv:1511.03193.
[87]
E. Tonkin, H. D. Pfeiffer, and G. Tourte. 2012. Twitter, information sharing and the London riots? Bulletin of the American Society for Information Science and Technology 38, 2 (2012), 49--57.
[88]
D. Trottier. 2012. Social Media as Surveillance. Ashgate, Surrey, England.
[89]
R. Trenholm. 2011. Cameron considers blocking Twitter, Facebook, BBM after riots, CNET August 11, 2011. Retrieved March 26, 2015 from http://www.cnet.com/uk/news/cameron-considers-blocking-twitter-facebook-bbm-after-riots/.
[90]
O. Tsur and A. Rappoport. 2012. What's in a hashtag?: Content based prediction of the spread of ideas in microblogging communities. In Proceedings of the 5th ACM International Conference on Web Search and Data Mining.
[91]
P. Tweed. 2012. Lord McAlpine and the high cost of tweeting gossip. The Guardian. Nov. 27, 2012. Retrieved March 21, 2015 from http://www.theguardian.com/law/2012/nov/27/lord-mcalpine-twitter-libel.
[92]
G. Tuysuz. 2015. Turkey blocks social media websites, CNN.com April 6, 2015. Retrieved August 17, 2015 from http://edition.cnn.com/2015/04/06/world/turkey-social-media-blocked/.
[93]
UK Safer Internet Centre. 2015. Safer Internet day 2015, saferinternet.org Feb. 10, 2015. Retrieved March 24, 2015 from http://www.saferinternet.org.uk/safer-internet-day/2015.
[94]
WAM. Harrassment of women on Twitter? We’re on it!, Women Action and the Media. Nov. 6, 2014. Retrieved Jan. 20, 2015 from http://www.womenactionmedia.org/2014/11/06/harassment-of-women-on-twitter-were-on-it/.
[95]
D. Watts and P. Dodds. 2009. Threshold models of social influence. In Oxford Handbook of Analytical Sociology, P. Hedstrom and P. S. Bearman (Eds.). Oxford University Press, Oxford, 475--497.
[96]
H. Webb, M. Jirotka, B. Carsten Stahl, W. Housley, A. Edwards, M. Williams, R. Procter, O. Rana, and P. Burnap. 2015. Digital wildfires: Hyper-connectivity, havoc and a global ethos to govern social media. Computers and Society 45, 3 (2015), 193--201. Retrieved Oct. 20, 2015 from http://www.dmu.ac.uk/documents/research-documents/technology/ccsr/20-years-of-ethicomp-si.pdf.
[97]
C. Wendling, J. Radisch, and S. Jacobzone. 2013. The use of social media in risk and crisis communication. In OECD Working Papers on Public Governance, No. 24, OECD Publishing.
[98]
L. Wilkins. 1967. Social Deviance. Tavistock Publications, London.
[99]
M. L. Williams and P. Burnap. 2015. Cyberhate on social media in the aftermath of Woolwich: A case study in computational criminology and big data. British Journal of Criminology 56, 2 (2015), 211--238.
[100]
M. L. Williams, A. Edwards, W. Housley, P. Burnap, O. Rana, N. Avis, J. Morgan, and L. Sloan. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing & Society 24, 4 (2013), 461--481.
[101]
World Economic Forum. 2013. Digital wildfires in a hyperconnected world. Global Risks Report, World Economic Forum. Retrieved Nov. 20, 2014 from http://reports.weforum.org/global-risks-2013/risk-case-1/digital-wildfires-in-a-hyperconnected-world/.
[102]
J. Yang and S. Counts. 2010. Predicting the speed, scale, and range of information diffusion in Twitter. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM).
[103]
T. Zaman, R. Herbrich, J. Van Gael, and D. Stern. 2010. Predicting information spreading in Twitter. In Proceedings of the Workshop on Computational Social Science and the Wisdom of Crowds (NIPS).
[104]
T. Zaman, E. Fox, and E. A. Bradlow. 2013. Bayesian Approach for Predicting the Popularity of Tweets, CoRR. (2013).
[105]
A. Zubiaga, M. Liakata, R. Procter, K. Bontcheva, and P. Tolmie. 2015a. Towards detecting rumours in social media. In Proceedings of the AAAI Workshop on AI for Cities.
[106]
A. Zubiaga, D. Spina, R. Martínez, and V. Fresno. 2015b. Real-time classification of Twitter trends. Journal of the Association for Information Science and Technology 66 (2015), 462--473.
[107]
A. Zubiaga, M. Liakata, R. Procter, P. Tolmie, and G. Wong Sak Hoi. 2016. Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS One (2016). Available from arXiv:1511.07487.

Cited By

View all
  • (2024)Focusing on Relevant Responses for Multi-Modal Rumor DetectionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.338969436:11(6225-6236)Online publication date: 1-Nov-2024
  • (2024)The impact of emotional vs rational message framing on social media users' detection and sharing of misinformation: an experimental studyJournal of Information, Communication and Ethics in Society10.1108/JICES-10-2023-012422:3(321-330)Online publication date: 25-Jun-2024
  • (2024)Combatting Climate Change Misinformation: Current Strategies and Future DirectionsEnvironmental Communication10.1080/17524032.2023.229975618:1-2(184-190)Online publication date: 8-Jan-2024
  • Show More Cited By

Index Terms

  1. Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation

    Recommendations

    Reviews

    Brad D. Reid

    "Digital wildfire" describes the rapid spread of "rumor and false/malicious information." The authors provide an excellent review of research concerning how this occurs and where the gaps are in contemporary research. They subsequently discuss their own research agendas. Digital wildfires is truly an interdisciplinary topic, and both students and researchers in the computational and social sciences will want to read this excellent paper. The authors proceed in a very logical and easy-to-read format with major headings and subtopics. The major headings are "Introduction: Social Media, Unverified Content, and Digital Wildfires"; "The Propagation of Digital Wildfires on Social Media"; "Responses to Digital Wildfires by Individuals and Agencies"; "Ethical Dimensions of Digital Wildfires and Social Media Governance"; "Addressing Gaps in the Responsible Governance of Social Media: A Research Agenda"; and a "Conclusion." The authors provide excellent summaries of past research literature and open questions for future research. The authors state: "it is necessary to build on an empirically grounded methodology for the study and advancement of the responsible governance of social media. This requires an interdisciplinary approach that incorporates relevant contemporary developments in computational science, the social sciences, computer ethics, and RRI [responsible research and innovation]." They briefly outline six of their own research activities. These include the following: "scoping ethical questions in relation to digital wildfires"; "scoping existing governance mechanisms, their limitations, and possibilities for further mechanisms"; "continuing case studies of digital wildfires through the quantitative and qualitative examination of social media data sets"; "a Delphi panel" [stakeholder groups look for areas of consensus]; "ethnographic interviews and observations"; and an "ethical security map" [a practical tool to aid policy decision making]. The paper concludes with an exhaustive list of references. This presentation is worthy of your time. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Information Systems
    ACM Transactions on Information Systems  Volume 34, Issue 3
    Special Issue on Trust and Veracity of Information in Social Media
    May 2016
    110 pages
    ISSN:1046-8188
    EISSN:1558-2868
    DOI:10.1145/2915200
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 April 2016
    Accepted: 01 February 2016
    Revised: 01 February 2016
    Received: 01 March 2015
    Published in TOIS Volume 34, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Social media
    2. rumour

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Economic and Social Research Council

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)77
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Focusing on Relevant Responses for Multi-Modal Rumor DetectionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.338969436:11(6225-6236)Online publication date: 1-Nov-2024
    • (2024)The impact of emotional vs rational message framing on social media users' detection and sharing of misinformation: an experimental studyJournal of Information, Communication and Ethics in Society10.1108/JICES-10-2023-012422:3(321-330)Online publication date: 25-Jun-2024
    • (2024)Combatting Climate Change Misinformation: Current Strategies and Future DirectionsEnvironmental Communication10.1080/17524032.2023.229975618:1-2(184-190)Online publication date: 8-Jan-2024
    • (2024)SNSMiner_VAC: Analyzing vaccination based on social network service data for safety surveillanceExpert Systems with Applications10.1016/j.eswa.2024.124684(124684)Online publication date: Jul-2024
    • (2024)Rumor identification and diffusion impact analysis in real-time text stream using deep learningThe Journal of Supercomputing10.1007/s11227-023-05726-x80:6(7993-8037)Online publication date: 1-Apr-2024
    • (2024)Sociotechnical governance of misinformation: An Annual Review of Information Science and Technology (ARIST) paperJournal of the Association for Information Science and Technology10.1002/asi.24953Online publication date: 3-Oct-2024
    • (2023)Challenging social media threats using collective well-being-aware recommendation algorithms and an educational virtual companionFrontiers in Artificial Intelligence10.3389/frai.2022.6549305Online publication date: 9-Jan-2023
    • (2023)Mechanisms of True and False Rumor Sharing in Social Media: Collective Intelligence or Herd Behavior?Proceedings of the ACM on Human-Computer Interaction10.1145/36100787:CSCW2(1-38)Online publication date: 4-Oct-2023
    • (2023)Moving Beyond Benchmarks and Competitions: Towards Addressing Social Media Challenges in an Educational ContextDatenbank-Spektrum10.1007/s13222-023-00436-323:1(27-39)Online publication date: 24-Feb-2023
    • (2022)Frugal Living for Our Collective and Mutual #Bestlife on a Distributed and Global Electronic Hive MindResearch Anthology on Usage, Identity, and Impact of Social Media on Society and Culture10.4018/978-1-6684-6307-9.ch040(736-768)Online publication date: 10-Jun-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media