skip to main content
research-article
Public Access

Disinformation as Collaborative Work: Surfacing the Participatory Nature of Strategic Information Operations

Published:07 November 2019Publication History
Skip Abstract Section

Abstract

In this paper, we argue that strategic information operations (e.g. disinformation, political propaganda, and other forms of online manipulation) are a critical concern for CSCW researchers, and that the CSCW community can provide vital insight into understanding how these operations function-by examining them as collaborative "work" within online crowds. First, we provide needed definitions and a framework for conceptualizing strategic information operations, highlighting related literatures and noting historical context. Next, we examine three case studies of online information operations using a sociotechnical lens that draws on CSCW theories and methods to account for the mutual shaping of technology, social structure, and human action. Through this lens, we contribute a more nuanced understanding of these operations (beyond "bots" and "trolls") and highlight a persistent challenge for researchers, platform designers, and policy makers-distinguishing between orchestrated, explicitly coordinated, information operations and the emergent, organic behaviors of an online crowd.

References

  1. Norah Abokhodair, Daisy Yoo, and David W. McDonald. 2016. Dissecting a Social Botnet: Growth, Content and Influence in Twitter. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '16). ACM, New York, NY, USA, 839--851. DOI: https://doi.org/10.1145/2675133.2675208Google ScholarGoogle Scholar
  2. Ahmer Arif, John J. Robinson, Stephanie A. Stanek, Elodie S. Fichet, Paul Townsend, Zena Worku, and Kate Starbird. 2017. A closer look at the self-correcting crowd: Examining corrections in online rumors. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 155--168. DOI: https://doi.org/10.1145/2998181.2998294Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ahmer Arif, Leo G. Stewart, and Kate Starbird. (2018). Acting the Part: Examining Information Operations within #BlackLivesMatter Discourse. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 20 (November 2018), 27 pages. DOI: https://doi.org/10.1145/3274289Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dan Arnaudo. 2017. Computational Propaganda in Brazil: Social Bots during Elections. Computational Propaganda Research Project. Oxford University, Oxford, UK.Google ScholarGoogle Scholar
  5. Karla Badillo-Urquiola, Yaxing Yao, Oshrat Ayalon, Bart Knijnenurg, Xinru Page, Eran Toch, Yang Wang, and Pamela J. Wisniewski. 2018. Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design. In Proceedings of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '18). ACM, New York, NY, 425--431. DOI: https://doi.org/10.1145/3272973.3273012Google ScholarGoogle Scholar
  6. Ronald M. Baecker, Jonathan Grudin, William A. S. Buxton, and Saul Greenberg (Ed.). 1995. Groupware and social dynamics: Eight challenges for developers. Readings in Human--Computer Interaction. DOI: https://doi.org/10.1016/B978-0-08-051574--8.50079-0.Google ScholarGoogle Scholar
  7. Christine A. Barry, Nicky Britten, Nick Barber, Colin Bradley, and Fiona Stevenson. 1999. Using reflexivity to optimize teamwork in qualitative research. Qualitative health research 9, no. 1 (1999): 26--44.Google ScholarGoogle Scholar
  8. Ladislav Bittman. 1972. The Deception Game: Czechoslovak Intelligence in Soviet Political Warfare. Syracuse University Press, Syracuse. NY.Google ScholarGoogle Scholar
  9. Ladislav Bittman. 1985. The KGB and Soviet Disinformation: An Insider's View. Pergamon-Brassey's, Washington, DC.Google ScholarGoogle Scholar
  10. Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. In Proceedings of the ACM on Human Computer Interaction 1, CSCW, Article 24 (November 2017). DOI: https://dx.doi.org/10.1145/3134659Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Samantha Bradshaw and Phillip N. Howard. 2018. Challenging truth and trust: A global inventory of organized social media manipulation. Computational Propaganda Research Project. Oxford University, Oxford, UK.Google ScholarGoogle Scholar
  12. Samantha Bradshaw and Phillip N. Howard. 2018. Why does Junk News Spread So Quickly Across Social Media? Algorithms, Advertising and Exposure in Public Life. Knight Foundation. Retrieved from https://kf-site -production.s3.amazonaws.com/media_elements/files/000/000/142/original/Topos_KF_ White-Paper_Howard_V1_ado.pdfGoogle ScholarGoogle Scholar
  13. Randall L. Bytwerk. 2010. Grassroots propaganda in the Third Reich: The Reich ring for National Socialist propaganda and public enlightenment. German Studies Review 33 (2010). 93--118. DOI: http://dx.doi.org/10.2307/40574929Google ScholarGoogle Scholar
  14. Carole Cadwalladr. 2017. The great British Brexit robbery: how our democracy was hijacked. (May 2017). Retrieved April 3, 2019 from https://www.theguardian.com/technology/2017/may/07/the-great-british-brexit-robbery-hijacked-democracyGoogle ScholarGoogle Scholar
  15. Kathy Charmaz. 2014. Constructing Grounded Theory. Sage, Thousand Oaks, CA.Google ScholarGoogle Scholar
  16. Norman K. Denzin and Yvonna S. Lincoln (Eds.). 1994. Grounded Theory Methodology: An Overview. Anselm Strauss and Juliet Corbin. Handbook of Qualitative Research. Sage, Thousand Oaks, CA.Google ScholarGoogle Scholar
  17. Renee DiResta, Dr. Kris Shaffer, Becky Ruppel, David Sullivan, Robert Matney, Ryan Fox, Dr. Jonathan Albright, and Ben Johnson. The Tactics & Tropes of the Internet Research Agency. New Knowledge. Retrieved from https://disinformationreport.blob.core.windows.net/disinformation-report/NewKnowledge-Disinformation-Report-Whitepaper.pdfGoogle ScholarGoogle Scholar
  18. Paul Dourish and Victoria Bellotti. 1992. Awareness and Coordination in Shared Workspaces. In Proceedings of the 1992 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '92). ACM, New York, NY, USA, 107--114 . DOI: https://doi.org/10.1145/143457.143468Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Adam B. Ellick and Adam Westbrook. 2018. Operation Infektion. Russian Disinformation: From Cold War to Kanye. Retrieved April 3, 2019 from https://www.nytimes.com/2018/11/12/opinion/russia-meddling-disinformation-fake-news-elections.htmlGoogle ScholarGoogle Scholar
  20. English Oxford Living Dictionaries. Disinformation. Retrieved April 3, 2019 from https://en.oxforddictionaries.com/definition/disinformationGoogle ScholarGoogle Scholar
  21. Robert M. Faris, Hal Roberts, Bruce Etling, Nikki Bourassa, Ethan Zuckerman, and Yochai Benkler. 2017. Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election. Berkman Klein Center for Internet & Society Research. Harvard University, Cambridge, Massachusetts, United States.Google ScholarGoogle Scholar
  22. Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The Rise of Social Bots. Communications of the ACM 59, 7 (2016). 96--104. DOI: https://doi.org/10.1145/2818717Google ScholarGoogle Scholar
  23. Vijaya Gadde and Yoel Roth. 2018. Enabling further research of information operations on Twitter. (October 2018). Retrieved April 3, 2019 from https://blog.twitter.com/en_us/topics/company/2018/enabling-further-research-of-information-operations-on-twitter.htmlGoogle ScholarGoogle Scholar
  24. Clifford Geertz. 1975. The interpretation of cultures. Chicago: Chicago University Press.Google ScholarGoogle Scholar
  25. R. Stuart Geiger and David Ribes. 2011. Trace ethnography: Following coordination through documentary practices. In Proceedings of the Annual Hawaii International Conference on System Sciences. 1--10. DOI: https://doi.org/10.1109/HICSS.2011.455Google ScholarGoogle Scholar
  26. Anthony Giddens. 1984. The Constitution of Society: Outline of the Theory of Structuration. University of California Press, Berkeley, CA.Google ScholarGoogle Scholar
  27. Sam Gill. 2019. The price of progress: How "Digital Pollution" is poisoning democracy and what we can do about it. (January 2019). Retrieved April 3, 2019 from https://knightfoundation.org/articles/the-price-of-progress-how-digital-pollution-is-poisoning-democracy-and-what-we-can-do-about-itGoogle ScholarGoogle Scholar
  28. Nathaniel Gleicher. 2019. Coordinated Inauthentic Behavior Explained. Facebook Newsroom. (December 2018). Retrieved June 26, 2019 from https://newsroom.fb.com/news/2018/12/inside-feed-coordinated-inauthentic-behavior/Google ScholarGoogle Scholar
  29. Nathaniel Gleicher. 2019. Removing Coordinated Inauthentic Behavior and Spam From India and Pakistan. (April 2019) Retrieved April 3, 2019 from https://newsroom.fb.com/news/2019/04/cib-and-spam-from-india-pakistan/Google ScholarGoogle Scholar
  30. Joseph Goebbels. 1938. Der Rundfunk als achte Großmacht. Signale der neuen Zeit. 25 ausgewählte Reden von Dr. Joseph Goebbels. 197--207.Google ScholarGoogle Scholar
  31. Marilys Guillemin and Lynn Gillam. 2004. Ethics, reflexivity, and "ethically important moments" in research. Qualitative inquiry, 10.2 (2004): 261--280.Google ScholarGoogle Scholar
  32. Jessica Guynn. 2019. Ted Cruz threatens to regulate Facebook, Google and Twitter over charges of anti-conservative bias. USA Today. (April 2019). Retrieved June 26, 2019 from https://www.usatoday.com/story/news/2019/04/10/ted-cruz-threatens-regulate-facebook-twitter-over-alleged-bias/3423095002/Google ScholarGoogle Scholar
  33. Jürgen Habermas. 1984. The theory of communicative action, Vol. 2. Beacon press, Boston, MA.Google ScholarGoogle Scholar
  34. Rongbin Han. 2015. Manufacturing consent in cyberspace: China's "fifty-cent army'. Journal of Current Chinese Affairs 44, 2 (2015). 105--134.Google ScholarGoogle ScholarCross RefCross Ref
  35. Del Harvey and David Gasca. 2018. Serving Healthy Conversation. Twitter Blog. (May 2018). Retrieved June 26, 2019 from https://blog.twitter.com/en_us/topics/product/2018/Serving_Healthy_Conversation.htmlGoogle ScholarGoogle Scholar
  36. Philip N. Howard. 2002. Network ethnography and the hypermedia organization: New media, new organizations, new methods. New Media & Society 4, 4 (2002). 550--574. DOI: https://doi.org/10.1177/146144402321466813Google ScholarGoogle Scholar
  37. Y. Linlin Huang, Kate Starbird, Mania Orand, Stephanie A. Stanek, and Heather T. Pedersen. 2015. Connected through crisis: Emotional proximity and the spread of misinformation online. In Proceedings of the 2015 ACM Conference on Computer-Supported Cooperative Work (CSCW '15). ACM, New York, USA, 969--980. DOI: https://doi.org/10.1145/2675133.2675202Google ScholarGoogle Scholar
  38. Amanda Lee Hughes and Leysia Palen. 2009. Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6, 3--4 (2009). 248--260.Google ScholarGoogle ScholarCross RefCross Ref
  39. Edwin Hutchins. 1995. Cognition in the Wild. MIT press, Cambridge, MA.Google ScholarGoogle Scholar
  40. Caroline Jack. 2017. Lexicon of lies: Terms for problematic information. Data & Society. Retrieved from https://datasociety.net/output/lexicon-of-lies/Google ScholarGoogle Scholar
  41. Steven J. Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The policy knot: Re-integrating policy, practice and design in CSCW studies of social computing. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14), ACM, New York, USA, 588--602. DOI: https://doi.org/10.1145/2531602.2531674Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Kathleen Hall Jamieson. 2018. Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know. Oxford University Press, 2018.Google ScholarGoogle Scholar
  43. Shagun Jhaver, Sucheta Ghoshal, Amy Bruckman, and Eric Gilbert. 2018. Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI 2018) 25, no. 2 (2018):12. DOI: https://doi.org/10.1145/3185593Google ScholarGoogle Scholar
  44. Joint Chiefs of Staff. 2014. Information Operations. Joint Publication 3--13. Department of Defense, United States. Retrieved from http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdfGoogle ScholarGoogle Scholar
  45. Simon M. Kaplan, William J. Tolone, Douglas P. Bogia, and Celsina Bignoli. 1992. Flexible, Active Support for Collaborative Work with Conversation Builder. In Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work (CSCW '92). ACM, New York, USA, 378--385. DOI: https://doi.org/10.1145/143457.143552Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Elihu Katz, Paul F. Lazarsfeld, and Elmo Roper. 2017. Personal influence: The part played by people in the flow of mass communications. Routledge, London, UK.Google ScholarGoogle Scholar
  47. Gary King, Jennifer Pan, and Margaret E. Roberts. 2017. How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American Political Science Review 111, 3 (2017). 484--501.Google ScholarGoogle ScholarCross RefCross Ref
  48. Arjun Kharpal. 2017. Facebook doesn't want to be the 'arbiter of the truth', top exec Sheryl Sandberg says, amid fake news criticism. CNBC.com. (April 2017). Retrieved June 26, 2019 from https://www.cnbc.com/2017/04/24/facebook-fake-news-sheryl-sanberg.htmlGoogle ScholarGoogle Scholar
  49. Audrey M. Kleinsasser. 2000. Researchers, reflexivity, and good data: Writing to unlearn. Theory into practice 39.3 (2000): 155--162.Google ScholarGoogle Scholar
  50. Matthew Levinger. 2018. Master Narratives of Disinformation Campaigns. Journal of International Affairs 71, 1.5 (2018). 125--134.Google ScholarGoogle Scholar
  51. John Leyden. 2018. Kremlin social media trolls aren't actually that influential, study finds. (Jan 2018). Retrieved April 3, 2019 from https://www.theregister.co.uk/2018/01/30/russian_troll_influence/Google ScholarGoogle Scholar
  52. Herbert S. Lin and Jaclyn Kerr. 2017. On Cyber-Enabled Information/Influence Warfare and Manipulation. Oxford University Press, UK.Google ScholarGoogle Scholar
  53. Jim Maddock, Kate Starbird, Haneen J. Al-Hassani, David E. Sandoval, Mania Orand, and Robert M. Mason. 2015. Characterizing online rumoring behavior using multi-dimensional signatures. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, New York, NY, 228--241. DOI: https://doi.org/10.1145/2675133.2675280Google ScholarGoogle Scholar
  54. Alice E. Marwick. 2018. Why do People Share Fake News? A Sociotechnical Model of Media Effects. Georgetown Law Technology Review 2, 474 (2018). 474--512.Google ScholarGoogle Scholar
  55. Alice E. Marwick and danah boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2011), 114--133. DOI: https://doi.org/10.1177/1461444810365313Google ScholarGoogle ScholarCross RefCross Ref
  56. Jolie Myers and Monika Evstatieva. 2018. Meet The Activist Who Uncovered The Russian Troll Factory Named In The Mueller Probe. NPR: Parallels-Many Stories, One World. (March 2018). Retrieved June 26, 2016 from https://www.npr.org/sections/parallels/2018/03/15/594062887/some-russians-see-u-s-investigation-into-russian-election-meddling-as-a-soap-opeGoogle ScholarGoogle Scholar
  57. Yiftach Nagar. 2012. What do you think?: The Structuring of an Online Community as a Collective-Sensemaking Process. In Proceedings of the 2012 ACM Conference on Computer-Supported Cooperative Work (CSCW '12). ACM, New York, USA, 393--402. DOI: https://doi.org/10.1145/2145204.2145266Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Office of the Director of National Intelligence. 2017. Assessing Russian activities and intentions in recent US elections. National Intelligence Council. (January 2017). Retrieved April 3, 2019 from https://www.dni.gov/files/documents/ICA_2017_01.pdfGoogle ScholarGoogle Scholar
  59. Jonathan Corpus Ong and Jason Vincent A. Cabanes. 2018. Architects of Networked Disinformation. The Newton Tech4Dev Network. University of Leeds, Leeds, UK. Retrieved from http://newtontechfordev.com/wp-content/uploads/2018/02/ARCHITECTS-OF-NETWORKED-DISINFORMATION-FULL-REPORT.pdfGoogle ScholarGoogle Scholar
  60. Wanda J. Orlikowski.1992. The duality of technology: Rethinking the concept of technology in organizations. Organization science 3, 3 (1992). 398--427.Google ScholarGoogle Scholar
  61. Wanda J. Orlikowski. 2007. Sociomaterial practices: Exploring technology at work. Organization studies 28, 9 (2007). 1435--1448.Google ScholarGoogle Scholar
  62. Stuart Oskamp and P. Wesley Schultz. 2005. Attitudes and Opinions (3rd ed.). Lawrence Erlbaum, Mahwah, NJ.Google ScholarGoogle Scholar
  63. Leysia Palen and Kenneth M. Anderson. 2016. Crisis informatics - New data for extraordinary times. Science 353, 6296 (2016). 224--225. DOI: https://doi.org/10.1126/science.aag2579Google ScholarGoogle Scholar
  64. Leysia Palen and Sophia B. Liu. 2007. Citizen Communications in Crisis: Anticipating a Future of ICT-Supported Public Participation. In Proceedings of the 2007 CHI Conference on Human Factors in Computing Systems (CHI '07). ACM, New York, NY, 727--736.Google ScholarGoogle Scholar
  65. Alicia Parlapiano and Jasmine C. Lee. 2018. The propaganda tools used by Russians to influence the 2016 election. (February 2018). Retrieved April 3, 2019 from https://www.nytimes.com/interactive/2018/02/16/us/politics/russia-propaganda-election-2016.htmlGoogle ScholarGoogle Scholar
  66. Christopher Paul and Miriam Matthews. 2016. The Russian "Firehose of Falsehood" Propaganda Model. Rand Corporation, Santa Monica, CA. DOI: https://doi.org/10.7249/PE198Google ScholarGoogle Scholar
  67. Joel Penney. 2017. The citizen marketer: Promoting political opinion in the social media age. Oxford University Press, Oxford, UK.Google ScholarGoogle Scholar
  68. Peter Pomerantsev. The Kremlin's information war. Journal of Democracy 26, 4 (2015). 40--50.Google ScholarGoogle Scholar
  69. Peter Pomerantsev and Michael Weiss. 2014. The menace of unreality: How the Kremlin weaponizes information, culture and money. Institute of Modern Russia, New York, NY.Google ScholarGoogle Scholar
  70. David Rees. 1984. Soviet Active Measure: The Propaganda War. Institute for the Study of Conflict, London, UK.Google ScholarGoogle Scholar
  71. Aleksandra Sarcevic, Leysia Palen, Joanne White, Kate Starbird, Mossaab Bagdouri, and Kenneth Anderson. 2012. "Beacons of Hope" in Decentralized Coordination: Learning from On-the-Ground Medical Twitterers During the 2010 Haiti Earthquake. In Proceedings of the 2012 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '12). ACM, New York, NY, 47--56. DOI: https://doi.org/10.1145/2145204.2145217Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Jeffrey K. Sawyer. 1990. Printed poison: Pamphlet propaganda, faction politics, and the public sphere in early seventeenth-century France. Univ of California Press, Berkeley, CA.Google ScholarGoogle Scholar
  73. Phoebe Sengers, John McCarthy, and Paul Dourish. 2006. Reflective HCI: articulating an agenda for critical practice. In Proceedings of the CHI'06 extended abstracts on Human Factors in Computing Systems. ACM, New York, NY, 1683--1686. DOI: https://doi.org/10.1145/1125451.1125762Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. David K. Shipler. 1986. After they defect? (December 1986). Retrieved April 3, 2019 from https://www.nytimes.com/1986/12/07/magazine/after-they-defect.htmlGoogle ScholarGoogle Scholar
  75. Craig Silverman. 2018. Russian Trolls Ran Wild On Tumblr And The Company Refuses To Say Anything About It. (Feb. 2018). Retrieved April 17, 2018 from https://www.buzzfeed.com/craigsilverman/russian-trolls-ran-wild-on-tumblr-and-the-company-refuses?utm_term=.ad65gb5jz#.rdwOw8O6ZGoogle ScholarGoogle Scholar
  76. Robert Soden and Leysia Palen. 2018. Informating Crisis: Expanding Critical Perspectives in Crisis Informatics. In Proceedings of the ACM on Human-Computer Interaction 2, CSCW, Article 162 (November 2018). DOI: https://doi.org/10.1145/3274431Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Olivia Solon. 2017. How Syria's White Helmets became victims of an online propaganda machine. (December 2017). Retrieved April 3, 2019 from https://www.theguardian.com/world/2017/dec/18/syria-white-helmets-conspiracy-theoriesGoogle ScholarGoogle Scholar
  78. Andrei Soshnikov. 2015. The capital of political trolling. MR7.ru. (March 2015). Retrieved June 26, 2016 from https://mr-7.ru/articles/112478/Google ScholarGoogle Scholar
  79. Alexander Spangher, Gireeja Ranade, Besmira Nushi, Adam Fourney, and Eric Horvitz. 2018. Analysis of Strategy and Spread of Russia-sponsored Content in the US in 2017. arXiv:1810.10033. Retrieved from https://arxiv.org/abs/1810.10033Google ScholarGoogle Scholar
  80. Supraja Srinivasan. 2018. We don't want to be arbiters of truth: YouTube CBO Robert Kyncl. Economic Times/India Times. (March 2018). Retrieved June 26, 2019 from https://tech.economictimes.indiatimes.com/news/internet/we-dont-want-to-be-arbiters-of-truth-youtube-cbo-robert-kyncl/63438805Google ScholarGoogle Scholar
  81. Alex Stamos. 2018. Authenticity Matters: The IRA Has No Place on Facebook. (Apr. 2018) Retrieved April 17, 2018 from https://newsroom.fb.com/news/2018/04/authenticity-matters/Google ScholarGoogle Scholar
  82. Kate Starbird. 2013. Delivering Patients to Sacré Coeur: Collective Intelligence in Digital Volunteer Communities. In Proceedings of the 2013 CHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, 801--810. DOI: https://doi.org/10.1145/2470654.2470769Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Kate Starbird. 2017. Examining the Alternative Media Ecosystem through the Production of Alternative Narratives of Mass Shooting Events on Twitter. In 11th International AAAI Conference on Web and Social Media (ICWSM 2017), Montreal, Canada, (pp. 230--339).Google ScholarGoogle Scholar
  84. Kate Starbird, Ahmer Arif, Tom Wilson, Katherine Van Koevering, Katya Yefimova, and Daniel Scarnecchia. (2018). Ecosystem or Echo-System? Exploring Content Sharing across Alternative Media Domains. In 12th International AAAI Conference on Web and Social Media (ICWSM 2018), Stanford, CA, (pp. 365--374).Google ScholarGoogle Scholar
  85. Kate Starbird and Leysia Palen. 2011. Voluntweeters: Self-Organizing by Digital Volunteers in Times of Crisis. In Proceedings of the 2011 CHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 1071--1080. DOI: https://doi.org/10.1145/1978942.1979102Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Kate Starbird and Leysia Palen. 2013. Working and Sustaining the Virtual Disaster Desk. In Proceedings of the 2013 ACM Conference on Computer-Supported Cooperative Work (CSCW '13). ACM, New York, USA, 491--502. DOI: https://doi.org/10.1145/2441776.2441832Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Leo Graiden Stewart, Ahmer Arif, A. Conrad Nied, Emma S. Spiro, and Kate Starbird. 2017. Drawing the lines of contention: Networked frame contests within #BlackLivesMatter discourse. In Proceedings of ACM Human-Computer Interaction 1, CSCW, Article 96 (December 2017), 23 pages. DOI: https://doi.org/10.1145/3134920Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Cass R. Sunstein. 2014. Conspiracy Theories and Other Dangerous Ideas. Simon and Schuster, New York, NY.Google ScholarGoogle Scholar
  89. Jonathan Supovitz, Alan J. Daly, Miguel del Fresno, and Christian Kolouch. 2017. #CommonCore Project. Retrieved April 3, 2019 from www.hashtagcommoncore.comGoogle ScholarGoogle Scholar
  90. The Internet Archive. About the Internet Archive. Retrieved April 17, 2018 from https://archive.org/about/Google ScholarGoogle Scholar
  91. Rod Thornton. 2007. Asymmetric warfare: Threat and response in the 21st century. Polity, Cambridge, UK.Google ScholarGoogle Scholar
  92. Tumblr Help Center. 2018. Public Record of Usernames Linked to State-Sponsored Disinformation Campaigns. (Mar. 2018). Retrieved April 17, 2018 from https://tumblr.zendesk.com/hc/en-us/articles/360002280214Google ScholarGoogle Scholar
  93. Twitter. 2018. Update on Twitter's Review of the 2016 U.S. Election. (Jan. 2018) Retrieved April 17, 2018 from https://blog.twitter.com/official/en_us/topics/company/2018/2016-election-update.htmlGoogle ScholarGoogle Scholar
  94. United States House of Representatives Permanent Select Committee on Intelligence. 2017. Exhibit B (Nov. 2017). https://democrats-intelligence.house.gov/uploadedfiles/exhibit_b.pdfGoogle ScholarGoogle Scholar
  95. Sarah Vieweg, Amanda L. Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. In Proceedings of the 2010 CHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, 1079--1088. DOI: https://doi.org/10.1145/1753326.1753486Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Morgan Vigil-Hayes, Marisa Duarte, Nicholet Deschine Parkhurst, and Elizabeth Belding. 2017. #Indigenous: Tracking the Connective Actions of Native American Advocates on Twitter. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 1387--1399. DOI: https://doi.org/10.1145/2998181.2998194Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, USA, 1231--1245. DOI: https://doi.org/10.1145/2998181.2998337.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Shaun Walker. 2017. Russian troll factory paid US activists to help fund protests during election. The Guardian. Available at: https://www.theguardian.com/world/2017/oct/17/russian-troll-factory-activists-protests-us-electionGoogle ScholarGoogle Scholar
  99. Yiran Wang and Gloria Mark. 2017. Engaging with Political and Social Issues on Facebook in College Life. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 433--445. DOI: https://doi.org/10.1145/2998181.2998295Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Clair Wardle and Hossein Derakhshan. 2017. Information Disorder: Toward an Interdisciplinary Framework for Research and Policy Making. Council of Europe Report.Google ScholarGoogle Scholar
  101. Jen Weedon, William Nuland and Alex Stamos. 2017. Information Operations and Facebook. (Apr. 2017) Retrieved March 17th, 2019 from https://fbnewsroomus.files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdfGoogle ScholarGoogle Scholar
  102. Tom Wilson, Kaitlyn Zhou, and Kate Starbird. 2018. Assembling Strategic Narratives: Information Operations as Collaborative Work within an Online Community. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 183 (November 2018), 26 pages. DOI: https://doi.org/10.1145/3274452Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Samuel C. Woolley and Philip N. Howard. 2016. Political communication, computational propaganda, and autonomous agents: Introduction. International Journal of Communication 10 (2016).Google ScholarGoogle Scholar
  104. Volker Wulf, Kaoru Misaki, Meryem Atam, and David Randall. 2013. 'On the ground'in Sidi Bouzid: Investigating Social Media Use During the Tunisian Revolution. In Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '13). ACM, New York, USA, 1409--1418. DOI: https://doi.org/10.1145/2441776.2441935Google ScholarGoogle Scholar
  105. Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web. arXiv:1801.09288. Retrieved from https://arxiv.org/abs/1801.09288Google ScholarGoogle Scholar
  106. YouTube. 2019. Our Ongoing Work to Tackle Hate. Official Blog. (June 2019). Retrieved June 26, 2019 from https://youtube.googleblog.com/2019/06/our-ongoing-work-to-tackle-hate.htmlGoogle ScholarGoogle Scholar
  107. Mark Zuckerberg. 2019. Mark Zuckerberg: The Internet needs new rules. Let's start in these four areas. (March 2019). Retrieved April 3, 2019 from https://www.washingtonpost.com/opinions/mark-zuckerberg-the-internet-needs-new-rules-lets-start-in-these-four-areas/2019/03/29/9e6f0504--521a-11e9-a3f7--78b7525a8d5f_story.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Disinformation as Collaborative Work: Surfacing the Participatory Nature of Strategic Information Operations

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Proceedings of the ACM on Human-Computer Interaction
        Proceedings of the ACM on Human-Computer Interaction  Volume 3, Issue CSCW
        November 2019
        5026 pages
        EISSN:2573-0142
        DOI:10.1145/3371885
        Issue’s Table of Contents

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2019
        Published in pacmhci Volume 3, Issue CSCW

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader