Using a Heuristic-Systematic Model to assess the Twitter user profile's impact on disaster tweet credibility

Abstract Journalists, emergency responders, and the general public use Twitter during disasters as an effective means to disseminate emergency information. However, there is a growing concern about the credibility of disaster tweets. This concern negatively influences Twitter users’ decisions about whether to retweet information, which can delay the dissemination of accurate—and sometimes essential—communications during a crisis. Although verifying information credibility is often a time-consuming task requiring considerable cognitive effort, researchers have yet to explore how people manage this task while using Twitter during disaster situations. To address this, we adopt the Heuristic-Systematic Model of information processing to understand how Twitter users make retweet decisions by categorizing tweet content as systematically processed information and a Twitter user’s profile as heuristically processed information. We then empirically examine tweet content and Twitter user profiles, as well as how they interact to verify the credibility of tweets collected during two disaster events: the 2011 Queensland floods, and the 2013 Colorado floods. Our empirical results suggest that using a Twitter profile as source-credibility information makes it easier for Twitter users to assess the credibility of disaster tweets. Our study also reveals that the Twitter user profile is a reliable source of credibility information and enhances our understanding of timely communication on Twitter during disasters.

[1]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[2]  Axel Bruns,et al.  Gatewatching, Not Gatekeeping: Collaborative Online News , 2003 .

[3]  H. Raghav Rao,et al.  Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises , 2013, MIS Q..

[4]  Leysia Palen,et al.  Supporting disaster reconnaissance with social media data: A design-oriented case study of the 2013 Colorado floods , 2014, ISCRAM.

[5]  G. Klimis,et al.  Blogs and Social Media: The New Word of Mouth and its Impact on the Reputation of Banks and on their Profitability , 2013 .

[6]  Adam Acar,et al.  Twitter for crisis communication: lessons learned from Japan's tsunami disaster , 2011, Int. J. Web Based Communities.

[7]  Paul Skalski,et al.  The Role of Social Presence in Interactive Agent-Based Persuasion , 2007 .

[8]  Alice E. Marwick,et al.  To See and Be Seen: Celebrity Practice on Twitter , 2011 .

[9]  Brooke Fisher Liu,et al.  Social media use during disasters: a review of the knowledge base and gaps. , 2012 .

[10]  Benjamin Kehrwald,et al.  Understanding social presence in text‐based online learning environments , 2008 .

[11]  Dennis S. Mileti,et al.  Communication of Emergency Public Warnings: A Social Science Perspective and State-of-the-Art Assessment , 1990 .

[12]  J. Walther Computer-Mediated Communication , 1996 .

[13]  Leida Chen,et al.  An empirical study of brand microblog users' unfollowing motivations: The perspective of push-pull-mooring model , 2020, Int. J. Inf. Manag..

[14]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[15]  Ed H. Chi,et al.  Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network , 2010, 2010 IEEE Second International Conference on Social Computing.

[16]  Robert Thomson,et al.  Trusting tweets: The Fukushima disaster and information source credibility on Twitter , 2012, ISCRAM.

[17]  G. Vining,et al.  Data Analysis: A Model-Comparison Approach , 1989 .

[18]  Miriam J. Metzger,et al.  Social and Heuristic Approaches to Credibility Evaluation Online , 2010 .

[19]  R. Rice,et al.  Electronic Emotion , 1987 .

[20]  S. Shyam Sundar,et al.  Effects of Online Health Sources on Credibility and Behavioral Intentions , 2010, Commun. Res..

[21]  Jintae Lee,et al.  Understanding the uncertainty of disaster tweets and its effect on retweeting: The perspectives of uncertainty reduction theory and information entropy , 2019, J. Assoc. Inf. Sci. Technol..

[22]  James J. Gibson,et al.  The Ecological Approach to Visual Perception: Classic Edition , 2014 .

[23]  Miriam J. Metzger Making sense of credibility on the Web: Models for evaluating online information and recommendations for future research , 2007 .

[24]  S. West,et al.  Multiple Regression: Testing and Interpreting Interactions. , 1994 .

[25]  Carter T. Butts,et al.  What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response , 2015, PloS one.

[26]  Casper Lassenius,et al.  Reflecting the choice and usage of communication tools in global software development projects with media synchronicity theory , 2012, J. Softw. Evol. Process..

[27]  Craig W. Fisher,et al.  Criticality of data quality as exemplified in two disasters , 2001, Inf. Manag..

[28]  Yogesh Kumar Dwivedi Social media marketing and advertising , 2015 .

[29]  Yogesh Kumar Dwivedi,et al.  Social media in marketing: A review and analysis of the existing literature , 2017, Telematics Informatics.

[30]  W. W. Muir,et al.  Regression Diagnostics: Identifying Influential Data and Sources of Collinearity , 1980 .

[31]  D. Hoffman,et al.  Can You Measure the ROI of Your Social Media Marketing , 2010 .

[32]  A. Bruns,et al.  #qldfloods and @QPSMedia: Crisis Communication on Twitter in the 2011 South East Queensland Floods , 2012 .

[33]  I. Hutchby Technologies, Texts and Affordances , 2001 .

[34]  Sean Fitzhugh,et al.  Terse message amplification in the Boston bombing response , 2014, ISCRAM.

[35]  R. Rubin,et al.  Internet and face‐to‐face communication: Not functional alternatives , 1998 .

[36]  Brendan T. O'Connor,et al.  Improved Part-of-Speech Tagging for Online Conversational Text with Word Clusters , 2013, NAACL.

[37]  Arkaitz Zubiaga,et al.  Real‐time classification of Twitter trends , 2014, J. Assoc. Inf. Sci. Technol..

[38]  Chang Sup Park,et al.  Does Twitter motivate involvement in politics? Tweeting, opinion leadership, and political engagement , 2013, Comput. Hum. Behav..

[39]  Keith D Paulsen,et al.  Log transformation benefits parameter estimation in microwave tomographic imaging. , 2007, Medical physics.

[40]  Miriam J. Metzger,et al.  Credibility and trust of information in online environments: The use of cognitive heuristics , 2013 .

[41]  A. McCallum,et al.  Topical N-Grams: Phrase and Topic Discovery, with an Application to Information Retrieval , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).

[42]  Mark J. Stein The critical period of disasters: Insights from sense-making and psychoanalytic theory , 2004 .

[43]  Stephanie Watts,et al.  Capitalizing on Content: Information Adoption in Two Online communities , 2008, J. Assoc. Inf. Syst..

[44]  M. Lynne Markus,et al.  Designing for Digital Transformation: Lessons for Information Systems Research from the Study of ICT and Societal Challenges , 2016, MIS Q..

[45]  S. Chaiken Heuristic versus systematic information processing and the use of source versus message cues in persuasion. , 1980 .

[46]  Jintae Lee,et al.  Content features of tweets for effective communication during disasters: A media synchronicity theory perspective , 2019, Int. J. Inf. Manag..

[47]  Leysia Palen,et al.  Twitter adoption and use in mass convergence and emergency events , 2009 .

[48]  A. Hermida TWITTERING THE NEWS , 2010 .

[49]  Dennis S. Mileti,et al.  The Study of Mobile Public Warning Messages: A Research Review and Agenda , 2015 .

[50]  John W. Tukey,et al.  Data Analysis and Regression: A Second Course in Statistics , 1977 .

[51]  Jan vom Brocke,et al.  Text Mining For Information Systems Researchers: An Annotated Topic Modeling Tutorial , 2016, Commun. Assoc. Inf. Syst..

[52]  Shelly Chaiken,et al.  The Heuristic-Systematic Model of Social Information Processing , 2002 .

[53]  Lu Liu,et al.  Determinants of information retweeting in microblogging , 2012, Internet Res..

[54]  Eric Gilbert,et al.  A longitudinal study of follow predictors on twitter , 2013, CHI.

[55]  Erica D Kuligowski,et al.  A review of public response to short message alerts under imminent threat , 2018 .

[56]  Matthew S. Eastin,et al.  Credibility Assessments of Online Health Information: The Effects of Source Expertise and Knowledge of Content , 2006, J. Comput. Mediat. Commun..

[57]  Miriam J. Metzger,et al.  Credibility for the 21st Century: Integrating Perspectives on Source, Message, and Media Credibility in the Contemporary Media Environment , 2003 .

[58]  Carter T. Butts,et al.  Warning tweets: serial transmission of messages during the warning phase of a disaster event , 2014 .

[59]  Annie Lang,et al.  The limited capacity model of mediated message processing , 2000 .

[60]  Jing Song,et al.  Assessment of Tweet Credibility with LDA Features , 2015, WWW.

[61]  Leysia Palen,et al.  Microblogging during two natural hazards events: what twitter may contribute to situational awareness , 2010, CHI.

[62]  Stephanie Watts,et al.  Videoconferencing in the Field: A Heuristic Processing Model , 2008, Manag. Sci..

[63]  D. McQuail McQuail's Mass Communication Theory , 2000 .

[64]  Hamilton Bean,et al.  Disaster Warnings in Your Pocket: How Audiences Interpret Mobile Alerts for an Unfamiliar Hazard , 2016 .

[65]  Sibel Adali,et al.  Credibility in Context: An Analysis of Feature Distributions in Twitter , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[66]  S. Chaiken,et al.  Heuristic processing can bias systematic processing: effects of source credibility, argument ambiguity, and task importance on attitude judgment. , 1994, Journal of personality and social psychology.

[67]  Carter T. Butts,et al.  A cross-hazard analysis of terse message retransmission on Twitter , 2015, Proceedings of the National Academy of Sciences.

[68]  H. White A Heteroskedasticity-Consistent Covariance Matrix Estimator and a Direct Test for Heteroskedasticity , 1980 .

[69]  Yogesh Kumar Dwivedi,et al.  Advances in Social Media Research: Past, Present and Future , 2017, Information Systems Frontiers.

[70]  Brandon Van Der Heide,et al.  Social Media as Information Source: Recency of Updates and Credibility of Information , 2014, J. Comput. Mediat. Commun..

[71]  Miriam J. Metzger,et al.  Perceptions of Internet Information Credibility , 2000 .

[72]  Claudio Vitari,et al.  Affordance Theory in the IS Discipline: a Review and Synthesis of the Literature , 2014, AMCIS.

[73]  Mike Schmierbach,et al.  A Little Bird Told Me, So I Didn't Believe It: Twitter, Credibility, and Issue Perceptions , 2012 .

[74]  Lisl Zach,et al.  Use of microblogging for collective sense-making during violent crises: A study of three campus shootings , 2012, J. Assoc. Inf. Sci. Technol..

[75]  M. Lindell,et al.  Crisis Communications: Ethnic Differentials in Interpreting and Acting on Disaster Warnings. , 1982 .

[76]  Barbara Poblete,et al.  Predicting information credibility in time-sensitive social media , 2013, Internet Res..

[77]  Amit P. Sheth,et al.  What kind of #conversation is Twitter? Mining #psycholinguistic cues for emergency coordination , 2013, Comput. Hum. Behav..

[78]  Hiroko Wilensky,et al.  Twitter as a navigator for stranded commuters during the great east Japan earthquake , 2014, ISCRAM.

[79]  Jonathan E. Butner,et al.  Compliance with a Request in Two Cultures: The Differential Influence of Social Proof and Commitment/Consistency on Collectivists and Individualists , 1999 .

[80]  Li Zeng,et al.  Rumors at the Speed of Light? Modeling the Rate of Rumor Transmission During Crisis , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[81]  Austin S.Babrow,et al.  Managing Uncertainty in Illness Explanation: An Application of Problematic Integration Theory , 1999 .

[82]  Annie Ross,et al.  Tweet! - And I Can Tell How Many Followers You Have , 2014, IC2IT.

[83]  Taekyung Kim,et al.  Observation on copying and pasting behavior during the Tohoku earthquake: Retweet pattern changes , 2014, Int. J. Inf. Manag..

[84]  G. Bente,et al.  Avatar-Mediated Networking: Increasing Social Presence and Interpersonal Trust in Net-Based Collaborations , 2008 .

[85]  P H Ellaway,et al.  Cumulative sum technique and its application to the analysis of peristimulus time histograms. , 1978, Electroencephalography and clinical neurophysiology.

[86]  Wenlin Yao,et al.  Social media for intelligent public information and warning in disasters: An interdisciplinary review , 2019, Int. J. Inf. Manag..