Kidnapping WhatsApp - Rumors during the search and rescue operation of three kidnapped youth

During terror attacks, information with unknown credibility might circulate and people use rumors to compensate for information gaps. On 06.12.2014, three teenagers were kidnapped from a bus station in the West Bank and found dead after several days. A gag order was issued, causing interest in alternative sources of information. This study investigated how information spread through WhatsApp during the search operation using a participatory research approach. 13 rumors circulating on WhatsApp were collected, nine of which were verified, and found to be true. A web-based survey revealed that 61.1% of 419 respondents received information regarding the kidnapping through WhatsApp; 38.9% through Facebook. Sources of two rumors and participation of emergency authorities in rumor dissemination were identified. Some rumors originated from the family and community of the abductees, while other WhatsApp messages included information and names of two abductees, which were not public at the time. When emergency authorities share unconfirmed information, it is perceived as more credible than information spread by citizens. During the operation, official representatives did not correct or refute any rumors. Locating the source of a rumor is challenging and thus it is important to actively investigate rumors in real-time in order to locate the source. 13 rumors where collected, 9 of which (69%) were verified, and found to be true.5 of the 9 rumors identified the names of the teenagers, information under a gag order.During the event we found first responders who shared and forwarded rumors.40.4% of respondents received the false rumor about the successful rescue via WhatsApp.Respondents perceived WhatsApp to be significantly more private than Facebook.

[1]  D. Glik Risk communication for public health emergencies. , 2007, Annual review of public health.

[2]  Dennis S. Mileti,et al.  The Role of Searching in Shaping Reactions to Earthquake Risk Information , 1997 .

[3]  Deep Background: Journalists, Sources, and the Perils of Leaking , 2008 .

[4]  Barbara Poblete,et al.  Twitter under crisis: can we trust what we RT? , 2010, SOMA '10.

[5]  Scott R. Tilley,et al.  Finding family and friends in the aftermath of a disaster using federated queries on social networks and websites , 2011, 2011 13th IEEE International Symposium on Web Systems Evolution (WSE).

[6]  Shuigeng Zhou,et al.  Rumor Evolution in Social Networks , 2011 .

[7]  Yong Lu,et al.  Information exchange in virtual communities under extreme disaster conditions , 2011, Decis. Support Syst..

[8]  T. J. Scanlon,et al.  Post-Disaster Rumor Chains - Case-Study , 1977 .

[9]  Anupam Joshi,et al.  Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy , 2013, WWW.

[10]  Deanne Bird,et al.  Flooding Facebook - the use of social media during the Queensland and Victorian floods , 2012 .

[11]  Lisl Zach,et al.  Use of microblogging for collective sense-making during violent crises: A study of three campus shootings , 2012, J. Assoc. Inf. Sci. Technol..

[12]  N. ben-yehuda,et al.  Terror, Media, and Moral Boundaries , 2005 .

[13]  Ralph L. Rosnow,et al.  Belief in rumor and likelihood of rumor transmission , 1986 .

[14]  Ringo Ma,et al.  Spread of SARS and War-Related Rumors through New Media in China , 2008 .

[15]  V. Cane A Note on the Size of Epidemics and the Number of People Hearing a Rumour , 1966 .

[16]  Christine Hagar Crisis Informatics: Perspectives of Trust - Is Social Media a Mixed Blessing? , 2012 .

[17]  Kenneth R. Ahern,et al.  Rumor Has It: Sensationalism in Financial Media , 2014 .

[18]  Kate Starbird,et al.  Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing , 2014 .

[19]  Kyomin Jung,et al.  Aspects of Rumor Spreading on a Microblog Network , 2013, SocInfo.

[20]  Vincent A. Knight,et al.  Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack , 2014, Social Network Analysis and Mining.

[21]  J. Brownstein,et al.  Twitter as a Sentinel in Emergency Situations: Lessons from the Boston Marathon Explosions , 2013, PLoS currents.

[22]  Dhavan V. Shah,et al.  Information Seeking and Emotional Reactions to the September 11 Terrorist Attacks , 2004 .

[23]  Keri A. Jupka,et al.  Communicating with the public about emerging health threats: lessons from the Pre-Event Message Development Project. , 2008, American journal of public health.

[24]  Rodrigo de Oliveira,et al.  What's up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS , 2013, MobileHCI '13.

[25]  Yamir Moreno,et al.  Emergence of Influential Spreaders in Modified Rumor Models , 2012, Journal of Statistical Physics.

[26]  Melinda Laituri,et al.  On Line Disaster Response Community: People as Sensors of High Magnitude Disasters Using Internet GIS , 2008, Sensors.

[27]  Liaquat Hossain,et al.  Social Networks Perspective of Firefighters' Adaptive Behaviour and Coordination among Them , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[28]  L. Aharonson-Daniel,et al.  Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya , 2014, PloS one.

[29]  Robert P. Wolensky,et al.  Toward a Broader Conceptualization of Volunteerism in Disaster , 1979 .

[30]  Irina Shklovski,et al.  Finding community through information and communication technology in disaster response , 2008, CSCW.

[31]  Stephan Lewandowsky,et al.  Misinformation, disinformation, and violent conflict: from Iraq and the "War on Terror" to future threats to peace. , 2013, The American psychologist.

[32]  Sophia B. Liu,et al.  Citizen communications in crisis: anticipating a future of ICT-supported public participation , 2007, CHI.