Building Trusted Social Media Communities: A Research Roadmap for Promoting Credible Content

A growing body of literature and inspirational examples provides guidance for aspiring social media community leaders. We know that design principles for websites can make a substantial difference in getting first-time users to return and to trust commercial, academic, government, and other websites. By contrast, building credible social media communities requires large numbers of regular content contributors guided by inspirational and committed leaders. This chapter offers a defining framework for discussing the social, technical, and content foundations that encourage trusted contributors to contribute credible content to social media communities. Each component of the framework—the trusted contributors, credible content, reliable resources, and responsible organizations—can be undermined. Therefore, researchers and community leaders who attend to each component have a higher chance to produce positive outcomes. This framework provides a road map for research on and management of credible communities.

[1]  Brandon Van Der Heide,et al.  A social network as information: The effect of system generated reports of connectedness on credibility on Twitter , 2012, Comput. Hum. Behav..

[2]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[3]  Charles J. Kacmar,et al.  Factors and effects of information credibility , 2007, ICEC.

[4]  Alan Mislove,et al.  Iolaus: securing online content rating systems , 2013, WWW.

[5]  Jonathan Lazar,et al.  Understanding Web Credibility: A Synthesis of the Research Literature , 2007, Found. Trends Hum. Comput. Interact..

[6]  C. Dwork,et al.  Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment , 2008 .

[7]  B. Shneiderman,et al.  The Reader-to-Leader Framework: Motivating Technology-Mediated Social Participation , 2009 .

[8]  Steve Harrison,et al.  Time: a method of detecting the dynamic variances of trust , 2010, WICOW '10.

[9]  Ben Shneiderman,et al.  Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[10]  Jennifer Golbeck,et al.  Analyzing the Social Web , 2013 .

[11]  Sheizaf Rafaeli,et al.  Predictors of answer quality in online Q&A sites , 2008, CHI.

[12]  Aniket Kittur,et al.  Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia , 2008, CSCW.

[13]  Victoria L. Rubin On deception and deception detection: Content analysis of computer-mediated stated beliefs , 2010, ASIST.

[14]  Batya Friedman,et al.  Trust online , 2000, CACM.

[15]  Adam Jatowt,et al.  Proceedings of the 4th workshop on Information credibility , 2010, WWW 2010.

[16]  Baldwin Fd In Web we trust , 2000 .

[17]  Daniel Gooch,et al.  Communications of the ACM , 2011, XRDS.

[18]  Ben Shneiderman,et al.  “In Web We Trust”: Establishing Strategic Trust Among Online Customers Irina Ceaparu, Dina Demner, Edward Hung, , 2016 .

[19]  Jyh-Jeng Wu,et al.  Factors affecting members' trust belief and behaviour intention in virtual communities , 2008, Behav. Inf. Technol..

[20]  Jacob Ratkiewicz,et al.  Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.

[21]  B. J. Fogg,et al.  Elements that affect web credibility: early results from a self-report study , 2000, CHI Extended Abstracts.

[22]  Jeffrey Nichols,et al.  Analyzing the quality of information solicited from targeted strangers on social media , 2013, CSCW '13.

[23]  Jacob Ratkiewicz,et al.  Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.

[24]  B. J. Fogg,et al.  The elements of computer credibility , 1999, CHI '99.

[25]  Ben Shneiderman,et al.  Designing trust into online experiences , 2000, CACM.

[26]  Jacob Ratkiewicz,et al.  Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams , 2010, ArXiv.

[27]  Jennifer Golbeck,et al.  Computing with Social Trust , 2008, Human-Computer Interaction Series.

[28]  Ben Shneiderman,et al.  Analyzing Social Media Networks with NodeXL: Insights from a Connected World , 2010 .

[29]  B. J. Fogg,et al.  Persuasive technology: using computers to change what we think and do , 2002, UBIQ.

[30]  C. Batson,et al.  Four Motives for Community Involvement , 2002 .

[31]  Venkatesan Guruswami,et al.  CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.

[32]  Bongwon Suh,et al.  So you know you're getting the best possible information: a tool that increases Wikipedia credibility , 2009, CHI.

[33]  Michael Hicks,et al.  Defeating script injection attacks with browser-enforced embedded policies , 2007, WWW '07.