Experience

Governance of misinformation is a serious concern in social media platforms. Based on experiences gathered from different case studies, we offer insights for the policymakers on managing misinformation in social media. These platforms are widely used for not just communication but also content consumption. Managing misinformation is thus a challenge for policymakers and the platforms. This article explores the factors of rapid propagation of misinformation based on our experiences in the domain. An average of about 1.5 million tweets were analysed in each of the three different cases surrounding misinformation. The findings indicate that the tweet emotion and polarity plays a significant role in determining whether the shared content is authentic or not. A deeper exploration highlights that a higher element of surprise combined with other emotions is present in such tweets. Further, the tweets that show case-neutral content often lack the possibilities of virality when it comes to misinformation. The second case explores whether the misinformation is being propagated intentionally by means of the identified fake profiles or it is done by authentic users, which can also be either intentional, for gaining attention, or unintentional, under the assumption that the information is correct. Last, network attributes, including topological analysis, community, and centrality analysis, also catalyze the propagation of misinformation. Policymakers can utilize these findings in this experience study for the governance of misinformation. Tracking and disruption in any one of the identified drivers could act as a control mechanism to manage misinformation propagation.

[1]  Dervis Karaboga,et al.  A comprehensive survey: artificial bee colony (ABC) algorithm and applications , 2012, Artificial Intelligence Review.

[2]  D. Watts,et al.  Origins of Homophily in an Evolving Social Network1 , 2009, American Journal of Sociology.

[3]  Lada A. Adamic,et al.  Social influence and the diffusion of user-created content , 2009, EC '09.

[4]  Dries F. Benoit,et al.  Identifying influencers in a social network: The value of real referral data , 2016, Decis. Support Syst..

[5]  Yogesh Kumar Dwivedi,et al.  Measuring social media influencer index- insights from facebook, Twitter and Instagram , 2019, Journal of Retailing and Consumer Services.

[6]  Kevin Driscoll,et al.  The diffusion of misinformation on social media: Temporal pattern, message, and source , 2018, Comput. Hum. Behav..

[7]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[8]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[9]  Karen E. Fisher,et al.  A social diffusion model of misinformation and disinformation for understanding human information behaviour , 2013, Inf. Res..

[10]  Jordan L. Boyd-Graber,et al.  Mr. LDA: a flexible large scale topic modeling package using variational inference in MapReduce , 2012, WWW.

[11]  Ravi Kumar,et al.  Influence and correlation in social networks , 2008, KDD.

[12]  R. Wyer Cognitive Organization and Change: An Information Processing Approach , 2019 .

[13]  Arkaitz Zubiaga,et al.  Making the Most of Tweet-Inherent Features for Social Spam Detection on Twitter , 2015, #MSM.

[14]  P. Vigneswara Ilavarasan,et al.  Exploring Content Virality in Facebook: A Semantic Based Approach , 2017, I3E.

[15]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[16]  Yogesh Kumar Dwivedi,et al.  Search engine marketing is not all gold: Insights from Twitter and SEOClerks , 2018, Int. J. Inf. Manag..

[17]  Daniel M. Romero,et al.  Influence and passivity in social media , 2010, ECML/PKDD.

[18]  Satya Prakash Ghrera,et al.  Identifying buzz in social media: a hybrid approach using artificial bee colony and k-nearest neighbors for outlier detection , 2017, Social Network Analysis and Mining.

[19]  P. Hsu Contribution to the theory of "Student's" t-test as applied to the problem of two samples. , 1938 .

[20]  B. Chae,et al.  Insights from hashtag #supplychain and Twitter Analytics: Considering Twitter and Twitter data for supply chain practice and research , 2015 .

[21]  M. Gentzkow,et al.  Social Media and Fake News in the 2016 Election , 2017 .

[22]  Ullrich K. H. Ecker,et al.  Misinformation and Its Correction , 2012, Psychological science in the public interest : a journal of the American Psychological Society.

[23]  Steven E. Stemler,et al.  An Overview of Content Analysis. , 2001 .

[24]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.

[25]  Kyomin Jung,et al.  Prominent Features of Rumor Propagation in Online Social Media , 2013, 2013 IEEE 13th International Conference on Data Mining.

[26]  Adam J. Mills Virality in social media: the SPIN Framework , 2012 .

[27]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[28]  P. Vigneswara Ilavarasan,et al.  Detection of Spammers in Twitter marketing: A Hybrid Approach Using Social Media Analytics and Bio Inspired Computing , 2017, Information Systems Frontiers.

[29]  Amir Hossein Gandomi,et al.  Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems , 2011, Engineering with Computers.

[30]  Clay Shirky The political power of social media: Technology, the public sphere, and political change , 2011 .

[31]  Kate Starbird,et al.  Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing , 2014 .

[32]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[33]  Alex Hai Wang,et al.  Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.

[34]  Arkaitz Zubiaga,et al.  Detection and Resolution of Rumours in Social Media , 2017, ACM Comput. Surv..

[35]  R. Ehrenberg Social media sway: Worries over political misinformation on Twitter attract scientists' attention , 2012 .

[36]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[37]  P. Kumaraguru,et al.  $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter , 2013, 2013 APWG eCrime Researchers Summit.

[38]  Gilad Mishne,et al.  Finding high-quality content in social media , 2008, WSDM '08.

[39]  S. P. Ghrera,et al.  A Novel Approach to Outlier Detection using Modified Grey Wolf Optimization and k-Nearest Neighbors Algorithm , 2016 .

[40]  C. Manski Identification of Endogenous Social Effects: The Reflection Problem , 1993 .

[41]  Jure Leskovec,et al.  The dynamics of viral marketing , 2005, EC '06.

[42]  N. Dalkey,et al.  An Experimental Application of the Delphi Method to the Use of Experts , 1963 .

[43]  Xin-She Yang,et al.  Firefly algorithm, stochastic test functions and design optimisation , 2010, Int. J. Bio Inspired Comput..

[44]  Barbara Poblete,et al.  Twitter under crisis: can we trust what we RT? , 2010, SOMA '10.

[45]  Jong Kim,et al.  Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.

[46]  G. Geethakumari,et al.  Detecting misinformation in online social networks using cognitive psychology , 2014, Human-centric Computing and Information Sciences.

[47]  A. Lindgreen,et al.  Why Pass on Viral Messages? Because They Connect Emotionally , 2007 .

[48]  Joshua A. Tucker,et al.  Political Knowledge and Misinformation in the Era of Social Media: Evidence From the 2015 UK Election , 2020, British Journal of Political Science.

[49]  Arpan Kumar Kar,et al.  Swarm Intelligence: A Review of Algorithms , 2017 .

[50]  Filippo Menczer,et al.  The spread of fake news by social bots , 2017, ArXiv.

[51]  Scott Counts,et al.  Tweeting is believing?: understanding microblog credibility perceptions , 2012, CSCW.

[52]  Arpan Kumar Kar,et al.  "Technology enabled Health" - Insights from twitter analytics with a socio-technical perspective , 2018, Int. J. Inf. Manag..

[53]  Lada A. Adamic,et al.  The role of social networks in information diffusion , 2012, WWW.

[54]  Daniel Z. Levin,et al.  The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..

[55]  P. Vigneswara Ilavarasan,et al.  Review of Discussions on Internet of Things (IoT): Insights from Twitter Analytics , 2017, J. Glob. Inf. Manag..

[56]  Arpan Kumar Kar,et al.  Bio inspired computing - A review of algorithms and scope of applications , 2016, Expert Syst. Appl..

[57]  François Nemo,et al.  Relevance: Communication and cognition: Dan Sperber and Deirdre Wilson, Oxford: Basil Blackwell, 1986. 279 pp. £8.50 (paperback), £27.50 (hardback). , 1988 .

[58]  Dervis Karaboga,et al.  A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm , 2007, J. Glob. Optim..

[59]  P. Vigneswara Ilavarasan,et al.  Social Media Analytics: Literature Review and Directions for Future Research , 2017, Decis. Anal..

[60]  Ellen M Cotter,et al.  Influence of Emotional Content and Perceived Relevance on Spread of Urban Legends: A Pilot Study , 2008, Psychological reports.

[61]  S. P. Ghrera,et al.  Identifying Popular Online News: An Approach Using Chaotic Cuckoo Search Algorithm , 2017, 2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS).

[62]  Adrian K. Ho,et al.  Social media patient testimonials in implant dentistry: information or misinformation? , 2017, Clinical oral implants research.

[63]  Susan T. Dumais,et al.  Resonance on the web: web dynamics and revisitation patterns , 2009, CHI.

[64]  Alexandra Marin,et al.  Are respondents more likely to list alters with certain characteristics?: Implications for name generator data , 2004, Soc. Networks.

[65]  Arun Sundararajan,et al.  Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks , 2009, Proceedings of the National Academy of Sciences.

[66]  Anupam Joshi,et al.  Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy , 2013, WWW.

[67]  Sushil Jajodia,et al.  Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.

[68]  David J. Brenes,et al.  Overcoming Spammers in Twitter – A Tale of Five Algorithms1 , 2010 .

[69]  Simon Fong,et al.  Integrating nature-inspired optimization algorithms to K-means clustering , 2012, Seventh International Conference on Digital Information Management (ICDIM 2012).

[70]  Chuan Yu,et al.  Trends in the diffusion of misinformation on social media , 2018, Research & Politics.

[71]  Barbara Poblete,et al.  Information credibility on twitter , 2011, WWW.

[72]  Chang-Tien Lu,et al.  Misinformation Propagation in the Age of Twitter , 2014, Computer.

[73]  Andrew Lewis,et al.  Grey Wolf Optimizer , 2014, Adv. Eng. Softw..

[74]  Seyed Mohammad Mirjalili How effective is the Grey Wolf optimizer in training multi-layer perceptrons , 2014, Applied Intelligence.

[75]  Vern Paxson,et al.  Detecting and Analyzing Automated Activity on Twitter , 2011, PAM.

[76]  Y. Kashima,et al.  Talking about Others: Emotionality and the Dissemination of Social Information , 2009 .

[77]  Jonah A. Berger Arousal Increases Social Transmission of Information , 2011, Psychological science.

[78]  Ponnurangam Kumaraguru,et al.  Credibility ranking of tweets during high impact events , 2012, PSOSM '12.

[79]  G. Caldarelli,et al.  The spreading of misinformation online , 2016, Proceedings of the National Academy of Sciences.

[80]  Sushil Jajodia,et al.  Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.

[81]  Kyounghee Hazel Kwon,et al.  An Exploration of Social Media in Extreme Events: Rumor Theory and Twitter during the Haiti Earthquake 2010 , 2010, ICIS.

[82]  J. Gastwirth,et al.  The impact of Levene’s test of equality of variances on statistical theory and practice , 2009, 1010.0308.

[83]  Amanda Lee Hughes,et al.  Social Media in Disaster Communication , 2018 .

[84]  Jacob Ratkiewicz,et al.  Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.

[85]  Virgílio A. F. Almeida,et al.  Detecting Spammers on Twitter , 2010 .

[86]  Katherine L. Milkman,et al.  Social Transmission, Emotion, and the Virality of Online Content , 2010 .

[87]  Gözde Özbal,et al.  Exploring Text Virality in Social Networks , 2011, ICWSM.

[88]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[89]  Alex Hai Wang,et al.  Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[90]  Elia Gabarron,et al.  Ebola, Twitter, and misinformation: a dangerous combination? , 2014, BMJ : British Medical Journal.

[91]  J. Aaker,et al.  Dimensions of Brand Personality , 1997 .

[92]  Norbert Schwarz,et al.  Judgment in a Social Context: Biases, Shortcomings, and the Logic of Conversation , 1994 .