Social Media's Caustic Influence on Southeast Asia's Fragile Republics
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How the Chinese Government Fabricates Social Media Posts
American Political Science Review (2017) 111, 3, 484–501 doi:10.1017/S0003055417000144 c American Political Science Association 2017 How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument GARY KING Harvard University JENNIFER PAN Stanford University MARGARET E. ROBERTS University of California, San Diego he Chinese government has long been suspected of hiring as many as 2 million people to surrep- titiously insert huge numbers of pseudonymous and other deceptive writings into the stream of T real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim https://doi.org/10.1017/S0003055417000144 . or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime. -
Information Systems in Great Power Competition with China
STRATEGIC STUDIES QUARTERLY - PERSPECTIVE Decide, Disrupt, Destroy: Information Systems in Great Power Competition with China AINIKKI RIIKONEN Abstract Technologies for creating and distributing knowledge have impacted international politics and conflict for centuries, and today the infrastructure for communicating knowledge has expanded. These technologies, along with attempts to exploit their vulnerabilities, will shape twenty-first- century great power competition between the US and China. Likewise, great power competition will shape the way China develops and uses these technologies across the whole spectrum of competition to make decisions, disrupt the operational environment, and destroy adversary capabilities. ***** he 2018 US National Defense Strategy (NDS) cites Russia and the People’s Republic of China (PRC) as “revisionist powers” that “want to shape a world consistent with their authoritarian model— gaining veto authority over other nations’ economic, diplomatic, and secu- T 1 rity decisions.” It describes these countries as competitors seeking to use “other areas of competition short of open warfare to achieve their [au- thoritarian] ends” and to “optimize their targeting of our battle networks and operational concepts.”2 The NDS assesses that competition will occur along the entire spectrum of statecraft from peace to open conflict and that Russia and the PRC will align their foreign policies with their models of governance. If this assessment is correct, and if technology plays a sig- nificant role in international politics, then technology will affect the whole spectrum of great power competition and conflict. Information architec- ture—the structures of technology that collect and relay information worldwide—is innately connected to power projection. The PRC has been innovating in this area, and its expanded information capabilities—and risks to US capabilities—will shape competition in the twenty- first cen- tury. -
Freedom on the Net 2016
FREEDOM ON THE NET 2016 China 2015 2016 Population: 1.371 billion Not Not Internet Freedom Status Internet Penetration 2015 (ITU): 50 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 18 18 Political/Social Content Blocked: Yes Limits on Content (0-35) 30 30 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 40 40 TOTAL* (0-100) 88 88 Press Freedom 2016 Status: Not Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • A draft cybersecurity law could step up requirements for internet companies to store data in China, censor information, and shut down services for security reasons, under the aus- pices of the Cyberspace Administration of China (see Legal Environment). • An antiterrorism law passed in December 2015 requires technology companies to cooperate with authorities to decrypt data, and introduced content restrictions that could suppress legitimate speech (see Content Removal and Surveillance, Privacy, and Anonymity). • A criminal law amendment effective since November 2015 introduced penalties of up to seven years in prison for posting misinformation on social media (see Legal Environment). • Real-name registration requirements were tightened for internet users, with unregistered mobile phone accounts closed in September 2015, and app providers instructed to regis- ter and store user data in 2016 (see Surveillance, Privacy, and Anonymity). • Websites operated by the South China Morning Post, The Economist and Time magazine were among those newly blocked for reporting perceived as critical of President Xi Jin- ping (see Blocking and Filtering). www.freedomonthenet.org FREEDOM CHINA ON THE NET 2016 Introduction China was the world’s worst abuser of internet freedom in the 2016 Freedom on the Net survey for the second consecutive year. -
Integrity: Its Causes and Cures
Fordham Law Review Volume 72 Issue 2 Article 4 2003 Integrity: Its Causes and Cures David Luban Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Law Commons Recommended Citation David Luban, Integrity: Its Causes and Cures, 72 Fordham L. Rev. 279 (2003). Available at: https://ir.lawnet.fordham.edu/flr/vol72/iss2/4 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. INTEGRITY: ITS CAUSES AND CURES David Luban* Integrity is a good thing, isn't it? In ordinary parlance, we sometimes use it as a near synonym for honesty, but the word means much more than honesty alone. It means wholeness or unity of person, an inner consistency between deed and principle. "Integrity" shares etymology with other unity-words-integer, integral, integrate, integration. All derive from the Latin integrare,to make whole. And the person of integrity is the person whose conduct and principles operate in happy harmony. Our psyches always seek that happy harmony. When our conduct and principles clash with each other, the result, social psychology teaches us, is cognitive dissonance. And dissonance theory hypothesizes that one of our fundamental psychic mechanisms is the drive to reduce dissonance. You can reduce dissonance between conduct and principles in two ways. The high road, if you choose to take it, requires you to conform your conduct to your principles. -
Society Persuasion In
PERSUASION IN SOCIETY HERBERT W. SIMONS with JOANNE MORREALE and BRUCE GRONBECK Table of Contents List of Artwork in Persuasion in Society xiv About the Author xvii Acknowledgments xix Preface xx Part 1: Understanding Persuasion 1. The Study of Persuasion 3 Defining Persuasion 5 Why Is Persuasion Important? 10 Studying Persuasion 14 The Behavioral Approach: Social-Scientific Research on the Communication-Persuasion Matrix 15 The Critical Studies Approach: Case Studies and “Genre-alizations” 17 Summary 20 Questions and Projects for Further Study 21 2. The Psychology of Persuasion: Basic Principles 25 Beliefs and Values as Building Blocks of Attitudes 27 Persuasion by Degrees: Adapting to Different Audiences 29 Schemas: Attitudes as Knowledge Structures 32 From Attitudes to Actions: The Role of Subjective Norms 34 Elaboration Likelihood Model: Two Routes to Persuasion 34 Persuasion as a Learning Process 36 Persuasion as Information Processing 37 Persuasion and Incentives 38 Persuasion by Association 39 Persuasion as Psychological Unbalancing and Rebalancing 40 Summary 41 Questions and Projects for Further Study 42 3. Persuasion Broadly Considered 47 Two Levels of Communication: Content and Relational 49 Impression Management 51 Deception About Persuasive Intent 51 Deceptive Deception 52 Expression Games 54 Persuasion in the Guise of Objectivity 55 Accounting Statements and Cost-Benefit Analyses 55 News Reporting 56 Scientific Reporting 57 History Textbooks 58 Reported Discoveries of Social Problems 59 How Multiple Messages Shape Ideologies 59 The Making of McWorld 63 Summary 66 Questions and Projects for Further Study 68 Part 2: The Coactive Approach 4. Coactive Persuasion 73 Using Receiver-Oriented Approaches 74 Being Situation Sensitive 76 Combining Similarity and Credibility 79 Building on Acceptable Premises 82 Appearing Reasonable and Providing Psychological Income 85 Using Communication Resources 86 Summary 88 Questions and Projects for Further Study 89 5. -
How the Vietnamese State Uses Cyber Troops to Shape Online Discourse
ISSUE: 2021 No. 22 ISSN 2335-6677 RESEARCHERS AT ISEAS – YUSOF ISHAK INSTITUTE ANALYSE CURRENT EVENTS Singapore | 3 March 2021 How The Vietnamese State Uses Cyber Troops to Shape Online Discourse Dien Nguyen An Luong* A Vietnamese youth checks his mobile phone on the century-old Long Bien Bridge in Hanoi on September 3, 2019. Vietnamese authorities have handled public political criticism - both online and in real life - with a calibrated mixture of toleration, responsiveness and repression. Photo: Manan VATSYAYANA, AFP. * Dien Nguyen An Luong is Visiting Fellow with the Media, Technology and Society Programme of the ISEAS – Yusof Ishak Institute. A journalist with significant experience as managing editor at Vietnam’s top newsrooms, his work has also appeared in the New York Times, the Washington Post, the Guardian, South China Morning Post, and other publications. 1 ISSUE: 2021 No. 22 ISSN 2335-6677 EXECUTIVE SUMMARY • The operations of Vietnam’s public opinion shapers and cyber-troops reveal that the online discourse is manipulated to enforce the Communist Party’s line. • Vietnamese authorities constantly grapple with the vexing question: How to strike a delicate balance between placating critical public sentiment online while ensuring that it does not spill over into protests against the regime. • When it comes to methods, targets and motives, there appears to be significant crossover between public opinion shapers and the government’s cyber troops. • The Vietnamese state cyber-troops have been encouraged to use real accounts to mass- report content. This helps explain why it is the only Southeast Asian state to publicly acknowledge having a military cyber unit. -
Chinese Computational Propaganda: Automation, Algorithms and the Manipulation of Information About Chinese Politics on Twitter and Weibo
This is a repository copy of Chinese computational propaganda: automation, algorithms and the manipulation of information about Chinese politics on Twitter and Weibo. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/136994/ Version: Accepted Version Article: Bolsover, G orcid.org/0000-0003-2982-1032 and Howard, P (2019) Chinese computational propaganda: automation, algorithms and the manipulation of information about Chinese politics on Twitter and Weibo. Information, Communication & Society, 22 (14). pp. 2063-2080. ISSN 1369-118X https://doi.org/10.1080/1369118X.2018.1476576 © 2018 Informa UK Limited, trading as Taylor & Francis Group. This is an Accepted Manuscript of an article published by Taylor & Francis in Information, Communication & Society on 24 May 2018, available online: https://doi.org/10.1080/1369118X.2018.1476576 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Chinese computational propaganda: automation, algorithms and the manipulation of information about Chinese politics on Twitter and Weibo Gillian Bolsover and Philip Howard1 Oxford Internet Institute, University of Oxford, Oxford, UK. -
Influence of Social Proof Bias on the Investment Decision Making Process – an Investors Perception
AEGAEUM JOURNAL ISSN NO: 0776-3808 Influence of Social Proof Bias on the Investment Decision Making Process – An Investors Perception Dr. Mahesha. V* & Dr. Sukanya. R** Abstract Making decisions in our daily life is complicated and making investment decisions is all the more complicated. The traditional theories of finance stated that the investors are very rational in making their investment decisions. However, this is far from reality. A new paradigm of finance has developed, known as the Behavioral Finance Theory which clearly states that it is not only the social and economic factors which affect the investors decision making process, whereas there are several behavioural factors which may influence the investment decisions made by individual investors. However, many investors are unaware of the fact that behavioural factors affect investment decisions. Many of the behavioural biases like anchoring bias, social proof bias, cognitive dissonance bias, mental accounting bias, endowment bias, choice paralysis bias etc. Among the various behavioural biases influencing the investment decisions of the investor’s, social proof bias is also a predominant one. Social proof bias is the tendency of investors to follow the opinion, advice of others predominantly in making investment decisions. It is also called as the herd mentality. People have a tendency to follow the crowd in making investment decisions. The research study aims to investigate the influence of social proof bias by considering gender as the basis for the study. The study is relevant as there is a need to identify if social proof bias influences the investors in the true sense and if it has an influence there is a need to find out ways of getting rid of the bias to avoid mistakes committed in making investment decisions. -
Forbidden Feeds: Government Controls on Social Media in China
FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and -
Social Influence: Obedience & Compliance Classic Studies
Social Influence: Obedience & Compliance Psy 240; Fall 2006 Purdue University Dr. Kipling Williams Classic Studies • Milgram’s obedience experiments Psy 240: Williams 2 1 What Breeds Obedience? • Escalating Commitment • Emotional distance of the victim • Closeness and legitimacy of the authority • Institutional authority • The liberating effects of group influence © Stanley Milgram, 1965, From the film Obedience, distributed by the Pennsylvania State University Psy 240: Williams 3 Reflections on the Classic Studies • Behavior and attitudes • The power of the situation • The fundamental attribution error Psy 240: Williams 4 2 Social Impact Theory Latané, 1980 Multiplication Division Psy 240: Williams 5 SocialSocial InfluenceInfluence Have I got a deal for you… 3 Defining Social Influence • People affecting other people. • Conformity: Do what others are doing (without the others trying to get you to do it!) • Social inhibition: Stopping doing something you’d normally do because others are present. • Compliance: Getting you to do something you wouldn’t have done otherwise • Obedience: Ordering others to behave in ways they might not ordinarily do • Excellent book and reference: – Cialdini, R. (1996). Influence (4th edition). HarperCollins College Publishers. Psy 240: Williams 7 Weapons of influence Useful metaphors… • Click, Whirr… – these weapons work best on us when we are on “auto-pilot” - not processing the message carefully. • Jujitsu – Compliance professionals get you to do their work for them…they provide the leverage, you do the work Psy 240: Williams 8 4 Six weapons of influence • Reciprocity • Commitment and consistency • Social proof • Liking • Authority • Scarcity Psy 240: Williams 9 Weapon #1: Reciprocity Free hot dogs and balloons for the little ones! • The not-so-free sample • Reciprocal concessions (“door-in-the-face”) large request first (to which everyone would say “no”) followed by the target request. -
Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People’S Republic of China
Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People’s Republic of China Rong-Ching Chang Chun-Ming Lai [email protected] [email protected] Tunghai University Tunghai University Taiwan Taiwan Kai-Lai Chang Chu-Hsing Lin [email protected] [email protected] Tunghai University Tunghai University Taiwan Taiwan ABSTRACT ACM Reference Format: The digital media, identified as computational propaganda provides Rong-Ching Chang, Chun-Ming Lai, Kai-Lai Chang, and Chu-Hsing Lin. a pathway for propaganda to expand its reach without limit. State- 2021. Dataset of Propaganda Techniques of the State-Sponsored Informa- tion Operation of the People’s Republic of China. In KDD ’21: The Sec- backed propaganda aims to shape the audiences’ cognition toward ond International MIS2 Workshop: Misinformation and Misbehavior Min- entities in favor of a certain political party or authority. Further- ing on the Web, Aug 15, 2021, Virtual. ACM, New York, NY, USA, 5 pages. more, it has become part of modern information warfare used in https://doi.org/10.1145/nnnnnnn.nnnnnnn order to gain an advantage over opponents. Most of the current studies focus on using machine learning, quantitative, and qualitative methods to distinguish if a certain piece 1 INTRODUCTION of information on social media is propaganda. Mainly conducted Propaganda has the purpose of framing and influencing opinions. on English content, but very little research addresses Chinese Man- With the rise of the internet and social media, propaganda has darin content. From propaganda detection, we want to go one step adopted a powerful tool for its unlimited reach, as well as multiple further to providing more fine-grained information on propaganda forms of content that can further drive engagement online and techniques that are applied. -
The Impact of Social Proof on Participant Response Bias
“You Can Always Do Better!” The Impact of Social Proof on Participant Response Bias Aditya Vashistha† Fabian Okeke§ Richard Anderson† Nicola Dell§ †University of Washington §The Jacobs Institute, Cornell Tech {adityav,anderson}@cs.washington.edu {fno2,nixdell}@cornell.edu ABSTRACT culture, language, education, and technical expertise. Unfor- Evaluations of technological artifacts in HCI4D contexts are tunately, these differences have been shown to substantially known to suffer from high levels of participant response bias— impact researchers’ efforts to evaluate their new designs or where participants only provide positive feedback that they interventions. In particular, usability studies and field evalua- think will please the researcher. This paper describes a practi- tions frequently suffer from high levels of participant response cal, low-cost intervention that uses the concept of social proof bias [15], defined as the extent to which participants provide to influence participant response bias and successfully elicit researchers with feedback or results that will please the re- critical feedback from study participants. We subtly exposed searchers or help to achieve the research goals [22, 46]. As participants to feedback that they perceived to be provided by a result, many researchers have found it challenging to ob- people ‘like them’, and experimentally controlled the tone and tain critical or negative feedback from participants that could content of the feedback to provide either positive, negative, or help them to improve their designs or interventions [2, 26]. no social proof. We then measured how participants’ quanti- Although participant response bias is present in all studies tative and qualitative evaluations of an HCI artifact changed with human participants, its effects have been shown to be based on the feedback to which they were exposed.