Reviewing the landscape of research on the threats to the quality of user‐generated content

The objective of the paper is to review and synthesize scholarly articles on the threats to the quality of usergenerated content (UGC). In this paper, threats to the quality of UGC are defined as the perpetration of misleading information caused by the lack of editorial control. They include deception, disinformation, manipulation, misinformation and rumors whose veracity cannot be easily established. In particular, this paper identifies (a) the research objectives that had been investigated, (b) the research methods that had been employed, and (c) the disciplines that studied the threats to the quality of UGC. The dominant research objective includes investigating the dynamics of threats. The most widely adopted research methods include quantitative analysis of real world data. This area of research was found to attract both intra‐disciplinary and inter‐disciplinary scholarly attention. It even attracted attention from practitioners affiliated to non‐academic institutes. Finally, this paper serves as a call for scholars to identify possible ways to mitigate the threats to the quality of UGC. It also encourages the use of qualitative approaches.

[1]  Ping Yu Hsu,et al.  Detecting Fake Review with Rumor Model- Case Study in Hotel Review , 2015, IScIDE.

[2]  Olusola Oyeyinka Oyewo Rumour: An Alternative Means Of Communication In A Developing Nation: The Nigerian Example , 2009 .

[3]  Kent Marett,et al.  The Decision to Share Information and Rumors: Examining the Role of Motivation in an Online Discussion Forum , 2009, Commun. Assoc. Inf. Syst..

[4]  Grant Michelson,et al.  ‘You Didn't Hear it From Us But…’: Towards an Understanding of Rumour and Gossip in Organisations , 2002 .

[5]  M. Patton Qualitative evaluation and research methods, 2nd ed. , 1990 .

[6]  Panagiotis Takis Metaxas,et al.  Using TwitterTrails.com to Investigate Rumor Propagation , 2015, CSCW Companion.

[7]  Chang-Tien Lu,et al.  Misinformation Propagation in the Age of Twitter , 2014, Computer.

[8]  Jiajia Wang,et al.  SIRaRu rumor spreading model in complex networks , 2014 .

[9]  Rick Delbridge,et al.  News From Behind My Hand: Gossip in Organizations , 1993 .

[10]  Arjun Mukherjee,et al.  Spotting fake reviewer groups in consumer reviews , 2012, WWW.

[11]  Geoffrey C. Layman,et al.  A Muslim President? Misperceptions of Barack Obama's Faith in the 2008 Presidential Campaign , 2014 .

[12]  Dev K. Dalal,et al.  I Heard That … : Do Rumors Affect Hiring Decisions? , 2015 .

[13]  Matthew L. Jensen,et al.  Judging the Credibility of Information Gathered from Face-to-Face Interactions , 2010, JDIQ.

[14]  Antonio López Peláez,et al.  Social work and netnography: The case of Spain and generic drugs , 2014 .

[15]  Naiding Yang,et al.  Financial rumors on investor sentiment in the emerging e-commerce network , 2005, ICEC '05.

[16]  B. Crabtree,et al.  A Template Approach to Text Analysis: Developing and Using Codebooks , 1992 .

[17]  Avner Caspi,et al.  Online Deception: Prevalence, Motivation, and Emotion , 2006, Cyberpsychology Behav. Soc. Netw..

[18]  Sei-Ching Joanna Sin,et al.  'Misinformation? What of it?' Motivations and individual differences in misinformation sharing on social media , 2013, ASIST.

[19]  Christopher C. Yang,et al.  The shift towards multi-disciplinarity in information science , 2008, J. Assoc. Inf. Sci. Technol..

[20]  Jenna Burrell,et al.  User Agency in the Middle Range: Rumors and the Reinvention of the Internet in Accra, Ghana , 2011 .

[21]  Lei Shi,et al.  She gets a sports car from our donation: rumor transmission in a Chinese microblogging community , 2013, CSCW.

[22]  Blair Thompson,et al.  Communication in the face of a school crisis: Examining the volume and content of social media mentions during active shooter incidents , 2015, Comput. Hum. Behav..

[23]  Gee-Woo Bock,et al.  A Study On The Factors Affecting The Behavior Of Spreading Online Rumors: Focusing On The Rumor Recipient's Emotions , 2011, PACIS.

[24]  David K. Perry,et al.  Viral Marketing or Electronic Word-of-Mouth Advertising: Examining Consumer Responses and Motivations to Pass Along Email , 2004, Journal of Advertising Research.

[25]  Miguel P Caldas,et al.  Research design: qualitative, quantitative, and mixed methods approaches , 2003 .

[26]  Yin Leng Theng,et al.  Deterring the spread of misinformation on social network sites: A social cognitive theory‐guided intervention , 2015, ASIST.

[27]  D A Asch,et al.  The content of social media's shared images about Ebola: a retrospective study. , 2015, Public health.

[28]  L. Giddings Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 2d ed , 2005 .

[29]  Dong Jenn Yang,et al.  The Communication Effects Of Internet Rumor On College Students , 2014 .

[30]  Yejin Choi,et al.  Distributional Footprints of Deceptive Product Reviews , 2012, ICWSM.

[31]  Gina Lai,et al.  The tie effect on information dissemination: the spread of a commercial rumor in Hong Kong , 2002, Soc. Networks.

[32]  Andrew J. Younge,et al.  SOCIALSENSE: Graphical user interface design considerations for social network experiment software , 2010, Comput. Hum. Behav..

[33]  Alton Yeow-Kuan Chua,et al.  Using supervised learning to classify authentic and fake online reviews , 2015, IMCOM.

[34]  Yasuaki Sakamoto,et al.  Toward a Social-Technological System that Inactivates False Rumors through the Critical Thinking of Crowds , 2013, 2013 46th Hawaii International Conference on System Sciences.

[35]  Leman Akoglu,et al.  Discovering Opinion Spammer Groups by Network Footprints , 2015, ECML/PKDD.

[36]  J. Malbon Taking Fake Online Consumer Reviews Seriously , 2013 .

[37]  Jonathan Wareham,et al.  Doctors' online information needs, cognitive search strategies, and judgments of information quality and cognitive authority: How predictive judgments introduce bias into cognitive search models , 2010, J. Assoc. Inf. Sci. Technol..

[38]  Gregor Stiglic,et al.  Enhancing Identification of Opinion Spammer Groups , 2013, MindTrek.

[39]  Yan Zhang,et al.  Quality of health information for consumers on the web: A systematic review of indicators, criteria, tools, and evaluation results , 2015, J. Assoc. Inf. Sci. Technol..

[40]  Meihua Zhou,et al.  Empirical Study on Credibility of Electronic Word of Mouth , 2010, 2010 International Conference on Management and Service Science.

[41]  Jean M. Bartunek,et al.  Academic-practitioner collaboration need not require joint or relevant research: Toward a relational scholarship of integration. , 2007 .

[42]  Zhilin Luo,et al.  On Burst Detection and Prediction in Retweeting Sequence , 2015, PAKDD.

[43]  J. Nunamaker,et al.  Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .

[44]  Huaye Li,et al.  Combating Rumor Spread on Social Media: The Effectiveness of Refutation and Warning , 2015, 2015 48th Hawaii International Conference on System Sciences.

[45]  Jiajia Wang,et al.  SIR rumor spreading model in the new media age , 2013 .

[46]  Jimmie Manning,et al.  Construction of Values in Online and Offline Dating Discourses: Comparing Presentational and Articulated Rhetorics of Relationship Seeking , 2014, J. Comput. Mediat. Commun..

[47]  Adrian Bangerter,et al.  The Mozart effect: tracking the evolution of a scientific legend. , 2004, The British journal of social psychology.

[48]  H. Raghav Rao,et al.  Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises , 2013, MIS Q..

[49]  Alton Yeow-Kuan Chua,et al.  Understanding the process of writing fake online reviews , 2014, Ninth International Conference on Digital Information Management (ICDIM 2014).

[50]  R. Chandramouli,et al.  Emerging social media threats: Technology and policy perspectives , 2011, 2011 Second Worldwide Cybersecurity Summit (WCS).

[51]  Eiji Aramaki,et al.  How do rumors spread during a crisis?: Analysis of rumor expansion and disaffirmation on Twitter after 3.11 in Japan , 2014, Int. J. Web Inf. Syst..

[52]  Jeffrey T. Hancock,et al.  What Lies Beneath: The Linguistic Traces of Deception in Online Dating Profiles , 2012 .

[53]  Khaled Hassanein,et al.  A macro model of online information quality perceptions: A review and synthesis of the literature , 2016, Comput. Hum. Behav..

[54]  M. Patton,et al.  Qualitative evaluation and research methods , 1992 .

[55]  A. Chua,et al.  A Linguistic Framework to Distinguish between Genuine and Deceptive Online Reviews , 2014 .

[56]  Robert M. Mason,et al.  Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures , 2015, CSCW.

[57]  Jonathan M. Hollister,et al.  Guess who? An empirical study of gender deception and detection in computer-mediated communication , 2013, ASIST.

[58]  Kate Starbird,et al.  How Information Snowballs: Exploring the Role of Exposure in Online Rumor Propagation , 2016, CSCW.

[59]  Zili Zhang,et al.  Predictors of the authenticity of Internet health rumours. , 2015, Health information and libraries journal.

[60]  Lina Zhou,et al.  A Social Network Based Analysis of Deceptive Communication in Online Chat , 2011, WEB.

[61]  Christos Faloutsos,et al.  Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.

[62]  Alton Yeow-Kuan Chua,et al.  Analyzing Users' Trust for Online Health Rumors , 2015, ICADL.

[63]  Prashant Bordia,et al.  Source Characteristics in Denying Rumors of Organizational Closure: Honesty Is the Best Policy , 2000 .

[64]  Philip S. Yu,et al.  Review Graph Based Online Store Review Spammer Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.

[65]  Mike Burmester,et al.  Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).