Abstract
In this paper, we argue that strategic information operations (e.g. disinformation, political propaganda, and other forms of online manipulation) are a critical concern for CSCW researchers, and that the CSCW community can provide vital insight into understanding how these operations function-by examining them as collaborative "work" within online crowds. First, we provide needed definitions and a framework for conceptualizing strategic information operations, highlighting related literatures and noting historical context. Next, we examine three case studies of online information operations using a sociotechnical lens that draws on CSCW theories and methods to account for the mutual shaping of technology, social structure, and human action. Through this lens, we contribute a more nuanced understanding of these operations (beyond "bots" and "trolls") and highlight a persistent challenge for researchers, platform designers, and policy makers-distinguishing between orchestrated, explicitly coordinated, information operations and the emergent, organic behaviors of an online crowd.
- Norah Abokhodair, Daisy Yoo, and David W. McDonald. 2016. Dissecting a Social Botnet: Growth, Content and Influence in Twitter. In Proceedings of the 2016 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '16). ACM, New York, NY, USA, 839--851. DOI: https://doi.org/10.1145/2675133.2675208Google Scholar
- Ahmer Arif, John J. Robinson, Stephanie A. Stanek, Elodie S. Fichet, Paul Townsend, Zena Worku, and Kate Starbird. 2017. A closer look at the self-correcting crowd: Examining corrections in online rumors. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, 155--168. DOI: https://doi.org/10.1145/2998181.2998294Google ScholarDigital Library
- Ahmer Arif, Leo G. Stewart, and Kate Starbird. (2018). Acting the Part: Examining Information Operations within #BlackLivesMatter Discourse. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 20 (November 2018), 27 pages. DOI: https://doi.org/10.1145/3274289Google ScholarDigital Library
- Dan Arnaudo. 2017. Computational Propaganda in Brazil: Social Bots during Elections. Computational Propaganda Research Project. Oxford University, Oxford, UK.Google Scholar
- Karla Badillo-Urquiola, Yaxing Yao, Oshrat Ayalon, Bart Knijnenurg, Xinru Page, Eran Toch, Yang Wang, and Pamela J. Wisniewski. 2018. Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design. In Proceedings of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '18). ACM, New York, NY, 425--431. DOI: https://doi.org/10.1145/3272973.3273012Google Scholar
- Ronald M. Baecker, Jonathan Grudin, William A. S. Buxton, and Saul Greenberg (Ed.). 1995. Groupware and social dynamics: Eight challenges for developers. Readings in Human--Computer Interaction. DOI: https://doi.org/10.1016/B978-0-08-051574--8.50079-0.Google Scholar
- Christine A. Barry, Nicky Britten, Nick Barber, Colin Bradley, and Fiona Stevenson. 1999. Using reflexivity to optimize teamwork in qualitative research. Qualitative health research 9, no. 1 (1999): 26--44.Google Scholar
- Ladislav Bittman. 1972. The Deception Game: Czechoslovak Intelligence in Soviet Political Warfare. Syracuse University Press, Syracuse. NY.Google Scholar
- Ladislav Bittman. 1985. The KGB and Soviet Disinformation: An Insider's View. Pergamon-Brassey's, Washington, DC.Google Scholar
- Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. In Proceedings of the ACM on Human Computer Interaction 1, CSCW, Article 24 (November 2017). DOI: https://dx.doi.org/10.1145/3134659Google ScholarDigital Library
- Samantha Bradshaw and Phillip N. Howard. 2018. Challenging truth and trust: A global inventory of organized social media manipulation. Computational Propaganda Research Project. Oxford University, Oxford, UK.Google Scholar
- Samantha Bradshaw and Phillip N. Howard. 2018. Why does Junk News Spread So Quickly Across Social Media? Algorithms, Advertising and Exposure in Public Life. Knight Foundation. Retrieved from https://kf-site -production.s3.amazonaws.com/media_elements/files/000/000/142/original/Topos_KF_ White-Paper_Howard_V1_ado.pdfGoogle Scholar
- Randall L. Bytwerk. 2010. Grassroots propaganda in the Third Reich: The Reich ring for National Socialist propaganda and public enlightenment. German Studies Review 33 (2010). 93--118. DOI: http://dx.doi.org/10.2307/40574929Google Scholar
- Carole Cadwalladr. 2017. The great British Brexit robbery: how our democracy was hijacked. (May 2017). Retrieved April 3, 2019 from https://www.theguardian.com/technology/2017/may/07/the-great-british-brexit-robbery-hijacked-democracyGoogle Scholar
- Kathy Charmaz. 2014. Constructing Grounded Theory. Sage, Thousand Oaks, CA.Google Scholar
- Norman K. Denzin and Yvonna S. Lincoln (Eds.). 1994. Grounded Theory Methodology: An Overview. Anselm Strauss and Juliet Corbin. Handbook of Qualitative Research. Sage, Thousand Oaks, CA.Google Scholar
- Renee DiResta, Dr. Kris Shaffer, Becky Ruppel, David Sullivan, Robert Matney, Ryan Fox, Dr. Jonathan Albright, and Ben Johnson. The Tactics & Tropes of the Internet Research Agency. New Knowledge. Retrieved from https://disinformationreport.blob.core.windows.net/disinformation-report/NewKnowledge-Disinformation-Report-Whitepaper.pdfGoogle Scholar
- Paul Dourish and Victoria Bellotti. 1992. Awareness and Coordination in Shared Workspaces. In Proceedings of the 1992 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '92). ACM, New York, NY, USA, 107--114 . DOI: https://doi.org/10.1145/143457.143468Google ScholarDigital Library
- Adam B. Ellick and Adam Westbrook. 2018. Operation Infektion. Russian Disinformation: From Cold War to Kanye. Retrieved April 3, 2019 from https://www.nytimes.com/2018/11/12/opinion/russia-meddling-disinformation-fake-news-elections.htmlGoogle Scholar
- English Oxford Living Dictionaries. Disinformation. Retrieved April 3, 2019 from https://en.oxforddictionaries.com/definition/disinformationGoogle Scholar
- Robert M. Faris, Hal Roberts, Bruce Etling, Nikki Bourassa, Ethan Zuckerman, and Yochai Benkler. 2017. Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election. Berkman Klein Center for Internet & Society Research. Harvard University, Cambridge, Massachusetts, United States.Google Scholar
- Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The Rise of Social Bots. Communications of the ACM 59, 7 (2016). 96--104. DOI: https://doi.org/10.1145/2818717Google Scholar
- Vijaya Gadde and Yoel Roth. 2018. Enabling further research of information operations on Twitter. (October 2018). Retrieved April 3, 2019 from https://blog.twitter.com/en_us/topics/company/2018/enabling-further-research-of-information-operations-on-twitter.htmlGoogle Scholar
- Clifford Geertz. 1975. The interpretation of cultures. Chicago: Chicago University Press.Google Scholar
- R. Stuart Geiger and David Ribes. 2011. Trace ethnography: Following coordination through documentary practices. In Proceedings of the Annual Hawaii International Conference on System Sciences. 1--10. DOI: https://doi.org/10.1109/HICSS.2011.455Google Scholar
- Anthony Giddens. 1984. The Constitution of Society: Outline of the Theory of Structuration. University of California Press, Berkeley, CA.Google Scholar
- Sam Gill. 2019. The price of progress: How "Digital Pollution" is poisoning democracy and what we can do about it. (January 2019). Retrieved April 3, 2019 from https://knightfoundation.org/articles/the-price-of-progress-how-digital-pollution-is-poisoning-democracy-and-what-we-can-do-about-itGoogle Scholar
- Nathaniel Gleicher. 2019. Coordinated Inauthentic Behavior Explained. Facebook Newsroom. (December 2018). Retrieved June 26, 2019 from https://newsroom.fb.com/news/2018/12/inside-feed-coordinated-inauthentic-behavior/Google Scholar
- Nathaniel Gleicher. 2019. Removing Coordinated Inauthentic Behavior and Spam From India and Pakistan. (April 2019) Retrieved April 3, 2019 from https://newsroom.fb.com/news/2019/04/cib-and-spam-from-india-pakistan/Google Scholar
- Joseph Goebbels. 1938. Der Rundfunk als achte Großmacht. Signale der neuen Zeit. 25 ausgewählte Reden von Dr. Joseph Goebbels. 197--207.Google Scholar
- Marilys Guillemin and Lynn Gillam. 2004. Ethics, reflexivity, and "ethically important moments" in research. Qualitative inquiry, 10.2 (2004): 261--280.Google Scholar
- Jessica Guynn. 2019. Ted Cruz threatens to regulate Facebook, Google and Twitter over charges of anti-conservative bias. USA Today. (April 2019). Retrieved June 26, 2019 from https://www.usatoday.com/story/news/2019/04/10/ted-cruz-threatens-regulate-facebook-twitter-over-alleged-bias/3423095002/Google Scholar
- Jürgen Habermas. 1984. The theory of communicative action, Vol. 2. Beacon press, Boston, MA.Google Scholar
- Rongbin Han. 2015. Manufacturing consent in cyberspace: China's "fifty-cent army'. Journal of Current Chinese Affairs 44, 2 (2015). 105--134.Google ScholarCross Ref
- Del Harvey and David Gasca. 2018. Serving Healthy Conversation. Twitter Blog. (May 2018). Retrieved June 26, 2019 from https://blog.twitter.com/en_us/topics/product/2018/Serving_Healthy_Conversation.htmlGoogle Scholar
- Philip N. Howard. 2002. Network ethnography and the hypermedia organization: New media, new organizations, new methods. New Media & Society 4, 4 (2002). 550--574. DOI: https://doi.org/10.1177/146144402321466813Google Scholar
- Y. Linlin Huang, Kate Starbird, Mania Orand, Stephanie A. Stanek, and Heather T. Pedersen. 2015. Connected through crisis: Emotional proximity and the spread of misinformation online. In Proceedings of the 2015 ACM Conference on Computer-Supported Cooperative Work (CSCW '15). ACM, New York, USA, 969--980. DOI: https://doi.org/10.1145/2675133.2675202Google Scholar
- Amanda Lee Hughes and Leysia Palen. 2009. Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6, 3--4 (2009). 248--260.Google ScholarCross Ref
- Edwin Hutchins. 1995. Cognition in the Wild. MIT press, Cambridge, MA.Google Scholar
- Caroline Jack. 2017. Lexicon of lies: Terms for problematic information. Data & Society. Retrieved from https://datasociety.net/output/lexicon-of-lies/Google Scholar
- Steven J. Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The policy knot: Re-integrating policy, practice and design in CSCW studies of social computing. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14), ACM, New York, USA, 588--602. DOI: https://doi.org/10.1145/2531602.2531674Google ScholarDigital Library
- Kathleen Hall Jamieson. 2018. Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know. Oxford University Press, 2018.Google Scholar
- Shagun Jhaver, Sucheta Ghoshal, Amy Bruckman, and Eric Gilbert. 2018. Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI 2018) 25, no. 2 (2018):12. DOI: https://doi.org/10.1145/3185593Google Scholar
- Joint Chiefs of Staff. 2014. Information Operations. Joint Publication 3--13. Department of Defense, United States. Retrieved from http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdfGoogle Scholar
- Simon M. Kaplan, William J. Tolone, Douglas P. Bogia, and Celsina Bignoli. 1992. Flexible, Active Support for Collaborative Work with Conversation Builder. In Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work (CSCW '92). ACM, New York, USA, 378--385. DOI: https://doi.org/10.1145/143457.143552Google ScholarDigital Library
- Elihu Katz, Paul F. Lazarsfeld, and Elmo Roper. 2017. Personal influence: The part played by people in the flow of mass communications. Routledge, London, UK.Google Scholar
- Gary King, Jennifer Pan, and Margaret E. Roberts. 2017. How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American Political Science Review 111, 3 (2017). 484--501.Google ScholarCross Ref
- Arjun Kharpal. 2017. Facebook doesn't want to be the 'arbiter of the truth', top exec Sheryl Sandberg says, amid fake news criticism. CNBC.com. (April 2017). Retrieved June 26, 2019 from https://www.cnbc.com/2017/04/24/facebook-fake-news-sheryl-sanberg.htmlGoogle Scholar
- Audrey M. Kleinsasser. 2000. Researchers, reflexivity, and good data: Writing to unlearn. Theory into practice 39.3 (2000): 155--162.Google Scholar
- Matthew Levinger. 2018. Master Narratives of Disinformation Campaigns. Journal of International Affairs 71, 1.5 (2018). 125--134.Google Scholar
- John Leyden. 2018. Kremlin social media trolls aren't actually that influential, study finds. (Jan 2018). Retrieved April 3, 2019 from https://www.theregister.co.uk/2018/01/30/russian_troll_influence/Google Scholar
- Herbert S. Lin and Jaclyn Kerr. 2017. On Cyber-Enabled Information/Influence Warfare and Manipulation. Oxford University Press, UK.Google Scholar
- Jim Maddock, Kate Starbird, Haneen J. Al-Hassani, David E. Sandoval, Mania Orand, and Robert M. Mason. 2015. Characterizing online rumoring behavior using multi-dimensional signatures. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, New York, NY, 228--241. DOI: https://doi.org/10.1145/2675133.2675280Google Scholar
- Alice E. Marwick. 2018. Why do People Share Fake News? A Sociotechnical Model of Media Effects. Georgetown Law Technology Review 2, 474 (2018). 474--512.Google Scholar
- Alice E. Marwick and danah boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2011), 114--133. DOI: https://doi.org/10.1177/1461444810365313Google ScholarCross Ref
- Jolie Myers and Monika Evstatieva. 2018. Meet The Activist Who Uncovered The Russian Troll Factory Named In The Mueller Probe. NPR: Parallels-Many Stories, One World. (March 2018). Retrieved June 26, 2016 from https://www.npr.org/sections/parallels/2018/03/15/594062887/some-russians-see-u-s-investigation-into-russian-election-meddling-as-a-soap-opeGoogle Scholar
- Yiftach Nagar. 2012. What do you think?: The Structuring of an Online Community as a Collective-Sensemaking Process. In Proceedings of the 2012 ACM Conference on Computer-Supported Cooperative Work (CSCW '12). ACM, New York, USA, 393--402. DOI: https://doi.org/10.1145/2145204.2145266Google ScholarDigital Library
- Office of the Director of National Intelligence. 2017. Assessing Russian activities and intentions in recent US elections. National Intelligence Council. (January 2017). Retrieved April 3, 2019 from https://www.dni.gov/files/documents/ICA_2017_01.pdfGoogle Scholar
- Jonathan Corpus Ong and Jason Vincent A. Cabanes. 2018. Architects of Networked Disinformation. The Newton Tech4Dev Network. University of Leeds, Leeds, UK. Retrieved from http://newtontechfordev.com/wp-content/uploads/2018/02/ARCHITECTS-OF-NETWORKED-DISINFORMATION-FULL-REPORT.pdfGoogle Scholar
- Wanda J. Orlikowski.1992. The duality of technology: Rethinking the concept of technology in organizations. Organization science 3, 3 (1992). 398--427.Google Scholar
- Wanda J. Orlikowski. 2007. Sociomaterial practices: Exploring technology at work. Organization studies 28, 9 (2007). 1435--1448.Google Scholar
- Stuart Oskamp and P. Wesley Schultz. 2005. Attitudes and Opinions (3rd ed.). Lawrence Erlbaum, Mahwah, NJ.Google Scholar
- Leysia Palen and Kenneth M. Anderson. 2016. Crisis informatics - New data for extraordinary times. Science 353, 6296 (2016). 224--225. DOI: https://doi.org/10.1126/science.aag2579Google Scholar
- Leysia Palen and Sophia B. Liu. 2007. Citizen Communications in Crisis: Anticipating a Future of ICT-Supported Public Participation. In Proceedings of the 2007 CHI Conference on Human Factors in Computing Systems (CHI '07). ACM, New York, NY, 727--736.Google Scholar
- Alicia Parlapiano and Jasmine C. Lee. 2018. The propaganda tools used by Russians to influence the 2016 election. (February 2018). Retrieved April 3, 2019 from https://www.nytimes.com/interactive/2018/02/16/us/politics/russia-propaganda-election-2016.htmlGoogle Scholar
- Christopher Paul and Miriam Matthews. 2016. The Russian "Firehose of Falsehood" Propaganda Model. Rand Corporation, Santa Monica, CA. DOI: https://doi.org/10.7249/PE198Google Scholar
- Joel Penney. 2017. The citizen marketer: Promoting political opinion in the social media age. Oxford University Press, Oxford, UK.Google Scholar
- Peter Pomerantsev. The Kremlin's information war. Journal of Democracy 26, 4 (2015). 40--50.Google Scholar
- Peter Pomerantsev and Michael Weiss. 2014. The menace of unreality: How the Kremlin weaponizes information, culture and money. Institute of Modern Russia, New York, NY.Google Scholar
- David Rees. 1984. Soviet Active Measure: The Propaganda War. Institute for the Study of Conflict, London, UK.Google Scholar
- Aleksandra Sarcevic, Leysia Palen, Joanne White, Kate Starbird, Mossaab Bagdouri, and Kenneth Anderson. 2012. "Beacons of Hope" in Decentralized Coordination: Learning from On-the-Ground Medical Twitterers During the 2010 Haiti Earthquake. In Proceedings of the 2012 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '12). ACM, New York, NY, 47--56. DOI: https://doi.org/10.1145/2145204.2145217Google ScholarDigital Library
- Jeffrey K. Sawyer. 1990. Printed poison: Pamphlet propaganda, faction politics, and the public sphere in early seventeenth-century France. Univ of California Press, Berkeley, CA.Google Scholar
- Phoebe Sengers, John McCarthy, and Paul Dourish. 2006. Reflective HCI: articulating an agenda for critical practice. In Proceedings of the CHI'06 extended abstracts on Human Factors in Computing Systems. ACM, New York, NY, 1683--1686. DOI: https://doi.org/10.1145/1125451.1125762Google ScholarDigital Library
- David K. Shipler. 1986. After they defect? (December 1986). Retrieved April 3, 2019 from https://www.nytimes.com/1986/12/07/magazine/after-they-defect.htmlGoogle Scholar
- Craig Silverman. 2018. Russian Trolls Ran Wild On Tumblr And The Company Refuses To Say Anything About It. (Feb. 2018). Retrieved April 17, 2018 from https://www.buzzfeed.com/craigsilverman/russian-trolls-ran-wild-on-tumblr-and-the-company-refuses?utm_term=.ad65gb5jz#.rdwOw8O6ZGoogle Scholar
- Robert Soden and Leysia Palen. 2018. Informating Crisis: Expanding Critical Perspectives in Crisis Informatics. In Proceedings of the ACM on Human-Computer Interaction 2, CSCW, Article 162 (November 2018). DOI: https://doi.org/10.1145/3274431Google ScholarDigital Library
- Olivia Solon. 2017. How Syria's White Helmets became victims of an online propaganda machine. (December 2017). Retrieved April 3, 2019 from https://www.theguardian.com/world/2017/dec/18/syria-white-helmets-conspiracy-theoriesGoogle Scholar
- Andrei Soshnikov. 2015. The capital of political trolling. MR7.ru. (March 2015). Retrieved June 26, 2016 from https://mr-7.ru/articles/112478/Google Scholar
- Alexander Spangher, Gireeja Ranade, Besmira Nushi, Adam Fourney, and Eric Horvitz. 2018. Analysis of Strategy and Spread of Russia-sponsored Content in the US in 2017. arXiv:1810.10033. Retrieved from https://arxiv.org/abs/1810.10033Google Scholar
- Supraja Srinivasan. 2018. We don't want to be arbiters of truth: YouTube CBO Robert Kyncl. Economic Times/India Times. (March 2018). Retrieved June 26, 2019 from https://tech.economictimes.indiatimes.com/news/internet/we-dont-want-to-be-arbiters-of-truth-youtube-cbo-robert-kyncl/63438805Google Scholar
- Alex Stamos. 2018. Authenticity Matters: The IRA Has No Place on Facebook. (Apr. 2018) Retrieved April 17, 2018 from https://newsroom.fb.com/news/2018/04/authenticity-matters/Google Scholar
- Kate Starbird. 2013. Delivering Patients to Sacré Coeur: Collective Intelligence in Digital Volunteer Communities. In Proceedings of the 2013 CHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, 801--810. DOI: https://doi.org/10.1145/2470654.2470769Google ScholarDigital Library
- Kate Starbird. 2017. Examining the Alternative Media Ecosystem through the Production of Alternative Narratives of Mass Shooting Events on Twitter. In 11th International AAAI Conference on Web and Social Media (ICWSM 2017), Montreal, Canada, (pp. 230--339).Google Scholar
- Kate Starbird, Ahmer Arif, Tom Wilson, Katherine Van Koevering, Katya Yefimova, and Daniel Scarnecchia. (2018). Ecosystem or Echo-System? Exploring Content Sharing across Alternative Media Domains. In 12th International AAAI Conference on Web and Social Media (ICWSM 2018), Stanford, CA, (pp. 365--374).Google Scholar
- Kate Starbird and Leysia Palen. 2011. Voluntweeters: Self-Organizing by Digital Volunteers in Times of Crisis. In Proceedings of the 2011 CHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, 1071--1080. DOI: https://doi.org/10.1145/1978942.1979102Google ScholarDigital Library
- Kate Starbird and Leysia Palen. 2013. Working and Sustaining the Virtual Disaster Desk. In Proceedings of the 2013 ACM Conference on Computer-Supported Cooperative Work (CSCW '13). ACM, New York, USA, 491--502. DOI: https://doi.org/10.1145/2441776.2441832Google ScholarDigital Library
- Leo Graiden Stewart, Ahmer Arif, A. Conrad Nied, Emma S. Spiro, and Kate Starbird. 2017. Drawing the lines of contention: Networked frame contests within #BlackLivesMatter discourse. In Proceedings of ACM Human-Computer Interaction 1, CSCW, Article 96 (December 2017), 23 pages. DOI: https://doi.org/10.1145/3134920Google ScholarDigital Library
- Cass R. Sunstein. 2014. Conspiracy Theories and Other Dangerous Ideas. Simon and Schuster, New York, NY.Google Scholar
- Jonathan Supovitz, Alan J. Daly, Miguel del Fresno, and Christian Kolouch. 2017. #CommonCore Project. Retrieved April 3, 2019 from www.hashtagcommoncore.comGoogle Scholar
- The Internet Archive. About the Internet Archive. Retrieved April 17, 2018 from https://archive.org/about/Google Scholar
- Rod Thornton. 2007. Asymmetric warfare: Threat and response in the 21st century. Polity, Cambridge, UK.Google Scholar
- Tumblr Help Center. 2018. Public Record of Usernames Linked to State-Sponsored Disinformation Campaigns. (Mar. 2018). Retrieved April 17, 2018 from https://tumblr.zendesk.com/hc/en-us/articles/360002280214Google Scholar
- Twitter. 2018. Update on Twitter's Review of the 2016 U.S. Election. (Jan. 2018) Retrieved April 17, 2018 from https://blog.twitter.com/official/en_us/topics/company/2018/2016-election-update.htmlGoogle Scholar
- United States House of Representatives Permanent Select Committee on Intelligence. 2017. Exhibit B (Nov. 2017). https://democrats-intelligence.house.gov/uploadedfiles/exhibit_b.pdfGoogle Scholar
- Sarah Vieweg, Amanda L. Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. In Proceedings of the 2010 CHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, 1079--1088. DOI: https://doi.org/10.1145/1753326.1753486Google ScholarDigital Library
- Morgan Vigil-Hayes, Marisa Duarte, Nicholet Deschine Parkhurst, and Elizabeth Belding. 2017. #Indigenous: Tracking the Connective Actions of Native American Advocates on Twitter. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 1387--1399. DOI: https://doi.org/10.1145/2998181.2998194Google ScholarDigital Library
- Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, USA, 1231--1245. DOI: https://doi.org/10.1145/2998181.2998337.Google ScholarDigital Library
- Shaun Walker. 2017. Russian troll factory paid US activists to help fund protests during election. The Guardian. Available at: https://www.theguardian.com/world/2017/oct/17/russian-troll-factory-activists-protests-us-electionGoogle Scholar
- Yiran Wang and Gloria Mark. 2017. Engaging with Political and Social Issues on Facebook in College Life. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 433--445. DOI: https://doi.org/10.1145/2998181.2998295Google ScholarDigital Library
- Clair Wardle and Hossein Derakhshan. 2017. Information Disorder: Toward an Interdisciplinary Framework for Research and Policy Making. Council of Europe Report.Google Scholar
- Jen Weedon, William Nuland and Alex Stamos. 2017. Information Operations and Facebook. (Apr. 2017) Retrieved March 17th, 2019 from https://fbnewsroomus.files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdfGoogle Scholar
- Tom Wilson, Kaitlyn Zhou, and Kate Starbird. 2018. Assembling Strategic Narratives: Information Operations as Collaborative Work within an Online Community. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 183 (November 2018), 26 pages. DOI: https://doi.org/10.1145/3274452Google ScholarDigital Library
- Samuel C. Woolley and Philip N. Howard. 2016. Political communication, computational propaganda, and autonomous agents: Introduction. International Journal of Communication 10 (2016).Google Scholar
- Volker Wulf, Kaoru Misaki, Meryem Atam, and David Randall. 2013. 'On the ground'in Sidi Bouzid: Investigating Social Media Use During the Tunisian Revolution. In Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '13). ACM, New York, USA, 1409--1418. DOI: https://doi.org/10.1145/2441776.2441935Google Scholar
- Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web. arXiv:1801.09288. Retrieved from https://arxiv.org/abs/1801.09288Google Scholar
- YouTube. 2019. Our Ongoing Work to Tackle Hate. Official Blog. (June 2019). Retrieved June 26, 2019 from https://youtube.googleblog.com/2019/06/our-ongoing-work-to-tackle-hate.htmlGoogle Scholar
- Mark Zuckerberg. 2019. Mark Zuckerberg: The Internet needs new rules. Let's start in these four areas. (March 2019). Retrieved April 3, 2019 from https://www.washingtonpost.com/opinions/mark-zuckerberg-the-internet-needs-new-rules-lets-start-in-these-four-areas/2019/03/29/9e6f0504--521a-11e9-a3f7--78b7525a8d5f_story.htmlGoogle Scholar
Index Terms
- Disinformation as Collaborative Work: Surfacing the Participatory Nature of Strategic Information Operations
Recommendations
Disinformation as Infrastructure: Making and Maintaining the QAnon Conspiracy on Italian Digital Media
CSCW1Building from sociotechnical studies of disinformation and of information infrastructures, we examine how - over a period of eleven months - Italian QAnon supporters designed and maintained a distributed, multi-layered "infrastructure of disinformation" ...
Interactions with Potential Mis/Disinformation URLs Among U.S. Users on Facebook, 2017-2019
FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the InternetMisinformation and disinformation online---and on social media in particular--- have become a topic of widespread concern. Recently, Facebook and Social Science One released a large, unique, privacy-preserving dataset to researchers that contains data on ...
On the Misinformation Beat: Understanding the Work of Investigative Journalists Reporting on Problematic Information Online
CSCWJournalists are increasingly investigating and reporting on problematic online content such as misinformation, disinformation, and conspiracy theories, leading to the creation of a new misinformation beat. The process of collecting, analyzing, and ...
Comments