Countering Rumours in Online Social Media

Total Page:16

File Type:pdf, Size:1020Kb

Countering Rumours in Online Social Media Delft University of Technology Countering Rumours in Online Social Media Ebrahimi Fard, A. DOI 10.4233/uuid:bf835c87-da7b-4dd7-bfad-41fd1bb537c0 Publication date 2021 Document Version Final published version Citation (APA) Ebrahimi Fard, A. (2021). Countering Rumours in Online Social Media. https://doi.org/10.4233/uuid:bf835c87-da7b-4dd7-bfad-41fd1bb537c0 Important note To cite this publication, please use the final published version (if applicable). Please check the document version above. Copyright Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons. Takedown policy Please contact us and provide details if you believe this document breaches copyrights. We will remove access to the work immediately and investigate your claim. This work is downloaded from Delft University of Technology. For technical reasons the number of authors shown on this cover page is limited to a maximum of 10. COUNTERING RUMOURSIN ONLINE SOCIAL MEDIA COUNTERING RUMOURSIN ONLINE SOCIAL MEDIA Dissertation for the purpose of obtaining the degree of doctor at Delft University of Technology by the authority of the Rector Magnificus, Prof. dr. ir. T. H. J. J. van der Hagen, chair of the Board for Doctorates to be defended publicly on Tuesday 9 March 2021 at 15:00 o’clock by Amir EBRAHIMI FARD Master of Science in Management and Economics, Sharif University of Technology, Iran born in Qom, Iran. This dissertation has been approved by the promotors. Composition of the doctoral committee: Rector Magnificus, Chairperson Prof. dr. B.A. van de Walle Delft University of Technology and UNU-MERIT, promotor Prof. dr. D. Helbing Delft University of Technology and ETH Zurich, promotor Dr. ir. T. Verma Delft University of Technology, copromotor Independent members: Prof. dr. M.J. van den Hoven Delft University of Technology Prof. dr. ir. A. Bozzon Delft University of Technology Prof. dr. H. Alani The Open University Dr. ir. I. Lefter Delft University of Technology Keywords: Rumours, social media, recommender systems, counter-strategies, one-class classification, social manipulation. Printed by: Gilderprint Cover design: Amir Ebrahimi Fard (Based on a design first published in the "Die Karikatur und Satire in der Medizin: Medico-Kunsthistorische Studie von Professor Dr. Eugen Holländer, 2nd edn (Stuttgart:Ferdinand Enke, 1921), fig. 79 (p. 171)." (The original design is in the public do- main)) © Copyright Amir Ebrahimi Fard, 2021. All rights reserved. ISBN 978-94-6419-147-9 An electronic version of this dissertation is available at http://repository.tudelft.nl/. The research in this dissertation was funded by Delft University of Technology. To Maman o Baba ACKNOWLEDGEMENTS This book has come to an end (but) the story yet remains Sa’di Although my name is written as the author of this manuscript, my PhD was a #col- lective_effort, and a stellar group of people tremendously supported me. My deepest gratitude goes to @Maman, @Baba, and @Reza, three gems in my life. Thank you for your eternal encouragement and endless support in everything I do. You always pushed me to become the best version of myself, remain #hopeful, and face chal- lenges. I learned #patience, #perseverance, and #dedication from you. Thank you for always being there for me . To @Bartel, @Dirk, @Trivik, and @Scott, I was privileged to do my PhD under your su- pervision. You lit up my research path and helped me to #grow in academia and become an #independent_researcher. You gave me the #freedom to #explore from Coase theo- rem and industrial districts to rumour spreading. You always encouraged me to choose a research topic that I am really attached to. I would not stand where I am now without your support. My sincere and heartfelt gratitude and appreciation to you for providing me with the guidance and counsel I needed to succeed in my PhD . @Bartel, you were not only my promotor, you were also my #role_model and the source of #inspira- tion during my PhD journey, I will miss being your student. @Dirk, every time you came up with an idea, you blew my mind. I wish my PhD days had more than 24 hours to spend on those #brilliant_ideas. @Trivik, I cannot emphasise how much I learned from you; whether about #technical or #soft_subjects. I am very grateful for all this support. @Scott, you helped me to start my PhD and formulate my research. You also provided me with several great #collaboration_opportunities. Thank you so much for all of them. How could I possibly finish my PhD without my #fantastic_friends @Natasa, @João, @Annebeth, @Majid, @Javanshir, @Vivian, @Farzam, @Sharlene, @Shantanu, @Arthur, @Vittorio, @Ioanna, I was extremely fortunate that my path crossed yours. @Natasa and @Annebeth, you are the yardstick of #friendship. I am so glad that we shared an office, a neighbourhood, and a PhD graduation team . @Majid, I am very lucky to be a friend of a bright yet humble person like you. I truly appreciate all your support during my PhD journey. Perhaps if I want to continue this acknowledgement letter, it will not end anytime soon, as many people kindly supported me in this journey. By all means, thank you . Amir Ebrahimi Fard Delft, March 2021 vii CONTENTS Acknowledgements vii List of Tables xiii List of Figures xv Summary xix Samenvatting xxi 1 Introduction1 1.1 An Overview on the Phenomenon of Rumour Spreading..........2 1.2 Research Objective and Research Questions................3 1.3 Contributions and Guide to Readers....................6 1.4 Engineering Social Technologies for a Responsible Digital Future......8 2 Conceptualisation of False and Unverified Information 11 2.1 Introduction................................ 12 2.2 The variations of false and unverified information............. 12 2.2.1 Rumour............................... 12 2.2.2 Gossip................................ 13 2.2.3 Legend................................ 14 2.2.4 Propaganda............................. 14 2.2.5 Conspiracy Theory.......................... 15 2.2.6 Fake-news.............................. 15 2.2.7 Pseudoscience............................ 16 2.2.8 Misinformation........................... 17 2.2.9 The Comparison of False and Unverified Information........ 17 2.3 Process-based Perspective......................... 17 2.4 What has to be curbed?........................... 19 2.5 Conclusion................................. 20 3 The Landscape of Rumour Spreading 21 3.1 Introduction................................ 22 3.2 Communication and Rumour Spreading.................. 22 3.3 The Role of Communication technologies in rumour spreading...... 24 3.4 Recommendation systems under Scrutiny................. 26 3.4.1 Methodology and Data Collection.................. 26 3.4.2 Analysis............................... 29 3.5 Conclusion................................. 38 ix x CONTENTS 4 Countering rumours 39 4.1 Introduction................................ 40 4.2 Counter Rumour Strategies......................... 40 4.2.1 Senders Strategies.......................... 42 4.2.2 Channel Strategies.......................... 42 4.2.3 Receivers Strategies......................... 45 4.3 Evaluation of Strategies........................... 48 4.3.1 Evaluation framework........................ 48 4.3.2 Strategies effectiveness........................ 49 4.4 Conclusion................................. 50 5 An Assessment of Academic Efforts regarding Rumour Confrontation 53 5.1 Introduction................................ 54 5.2 Scientific emergence............................ 54 5.3 Method................................... 55 5.3.1 Data collection............................ 56 5.3.2 Emergence operationalization.................... 60 5.4 Results................................... 60 5.4.1 Novelty................................ 60 5.4.2 Growth................................ 65 5.4.3 Coherence.............................. 69 5.4.4 Impact................................ 77 5.5 Discussion................................. 81 5.6 Conclusion................................. 83 6 Computational Rumour Detection using One-Class Classification 85 6.1 Introduction................................ 86 6.2 Computational Rumour detection..................... 88 6.3 Data..................................... 90 6.3.1 Building the datasets......................... 90 6.3.2 Available datasets.......................... 93 6.4 Feature Extraction............................. 95 6.4.1 Linguistic & content features..................... 98 6.4.2 User features............................. 101 6.4.3 Meta-message features........................ 102 6.5 Classification................................ 102 6.5.1 Problem Statement......................... 102 6.5.2 One-class Classification Approach.................. 106 6.5.3 Experiments............................. 110 6.6 Conclusion................................. 120 7 Modelling Rumour Campaigns: A Proactive Approach 123 7.1 Introduction................................ 124 7.2 Research Background............................ 125 7.2.1 Deliberate Rumour Spreading as a Means of Information Operation. 125 7.2.2 Misinformation Machine...................... 126 7.2.3 Cyber Operations Model....................... 127 CONTENTS xi 7.3 Model development............................. 127 7.3.1 The Block Diagram.......................... 130 7.3.2 The Operationalisation of the Model................. 130 7.3.3 The Data Model..........................
Recommended publications
  • Collection and Analysis of a Longitudinal Twitter Sentiment Dataset
    The emojification of sentiment on social media: Collection and analysis of a longitudinal Twitter sentiment dataset Wenjie Yin, Rabab Alkhalifa, Arkaitz Zubiaga Queen Mary University of London, UK {w.yin,r.a.a.alkhalifa,a.zubiaga}@qmul.ac.uk Abstract Social media, as a means for computer-mediated communication, has been extensively used to study the sentiment expressed by users around events or topics. There is however a gap in the longitudinal study of how sentiment evolved in social media over the years. To fill this gap, we develop TM-Senti, a new large-scale, distantly su- pervised Twitter sentiment dataset with over 184 million tweets and covering a time period of over seven years. We describe and assess our methodology to put together a large-scale, emoticon- and emoji-based labelled sentiment analysis dataset, along with an analysis of the re- sulting dataset. Our analysis highlights interesting temporal changes, among others in the increasing use of emojis over emoticons. We pub- licly release the dataset for further research in tasks including sentiment analysis and text classification of tweets. The dataset can be fully rehy- drated including tweet metadata and without missing tweets thanks to the archive of tweets publicly available on the Internet Archive, which the dataset is based on. 1 Introduction Social media research (Ngai, Tao, & Moon, 2015) and sentiment analysis (Poria, Hazarika, Majumder, & Mihalcea, 2020) have gained popularity in the last decade, both separately and jointly. Sentiment analysis of social media content is a fertile research area in a wide variety of fields including natural language processing (Wilson, Wiebe, & Hoffmann, 2005), computa- tional social science (Vydiswaran et al., 2018), information science (Zimbra, Ghiassi, & Lee, 2016) and beyond.
    [Show full text]
  • History's Mysteries
    History’s Mysteries: Research, Discuss and Solve some of History's Biggest Puzzles ISBN: 978-1-956159-00-4 (print) 978-1-956159-01-1 (ebook) Copyright 2021 Taylor Sapp, Catherine Noble, Peter Lacy, Mina Gavell, and Andrew Lawrence All rights reserved. Our authors, editors, and designers work hard to develop original, high-quality content. They deserve compensation. Please respect their efforts and their rights under copyright law. Do not copy, photocopy, or reproduce this book or any part of this book (unless the page is marked PHOTOCOPIABLE) for use inside or outside the classroom, in commercial or non-commercial settings. It is also forbidden to copy, adapt, or reuse this book or any part of this book for use on websites, blogs, or third-party lesson-sharing websites. For permission requests, write to the publisher at “ATTN: Permissions”, at the address below: 1024 Main St. #172 Branford, CT 06405 USA [email protected] www.AlphabetPublishingBooks.com Discounts on class sets and bulk orders available upon inquiry. Edited by Walton Burns Interior and Cover Design by Red Panda Editorial Services Country of Manufacture Specified on Last Page First Printing 2021 Table of Contents Other Creative Writing Books by Alphabet Publishing ii Table of Contents v How to Use this Collection viii Section I - Monsters and Mysterious Creatures What Happened to the Dinosaurs? 2 The Loch Ness Monster 7 The Elusive Ivory-billed Woodpecker 13 Bigfoot: Ancient Ape of The Northwest 18 It’saBird?It’saPlane?It’saPicasso 23 Section II - Heroes and Villains Genghis Khan: Villain or Hero 31 The Children’s Crusade 37 Artist or Monster? Stop Adolf Hitler 44 Lyuh Woon-hyung and the Division of Korea 50 Who Killed Tupac? 55 Section III - Famous Unsolved Crimes and Criminals Who Was Jack the Ripper? 61 The Osage Indian Murders 67 D.
    [Show full text]
  • Table of Contents
    Table of Contents The Opening Salvo 21 What Are Negotiations? 21 Why Are Negotiations Important? 25 When Do Negotiations Take Place? 26 Are Negotiations Limited to the Purview of Rocket Scientists? 30 Should Negotiators Always Seek to Vanquish Opponents? 31 Costs and Risks of Negotiations 36 Some Negotiators are Duplicitous 45 Risks of Borrowing Money from Partners and Customers 47 Avoiding Negotiations 63 You Are Always Negotiating 63 Fundamental Tensions in Negotiations 67 Negotiations Are Pervasive and Eternal 74 LEVERAGE IN NEGOTIATIONS 79 The Importance of Leverage in Negotiations 80 Creating Negotiating Leverage 85 Plan Your Exit at the Beginning 85 Importance of Choosing Partners Wisely 87 Gaining Leverage Through Third Parties 89 Business Models Are a Factor in Successful Negotiations 93 The Anatomy of Argumentation 97 Lincolnian Argumentation 98 The Power of Process 101 Harmonizing the Negotiating Process 103 Voting Architecture 105 Selected Negotiating Process Issues 107 Preemptively Setting the Framework for Resolving Disputes 108 Auctions Versus Direct Negotiations 113 Benefits of Auctions Over Direct Negotiations 113 Benefits of Direct Negotiations Over Auctions 115 The Strategic Negotiator I 1 Sequencing Negotiations 118 Sequencing Contentious Issues 118 Negotiating Downrange 129 Hold-Up Tactics 132 PREPARING FOR NEGOTIATIONS 143 Conducting Due Diligence on Individuals 148 Conducting Due Diligence on Institutions 152 Conducting Due Diligence on Individuals Within Institutions 154 Elicitation Strategies 157 Heimlich Maneuvers
    [Show full text]
  • From Logic to Rhetoric: a Contextualized Pedagogy for Fallacies
    Current Issue From the Editors Weblog Editorial Board Editorial Policy Submissions Archives Accessibility Search Composition Forum 32, Fall 2015 From Logic to Rhetoric: A Contextualized Pedagogy for Fallacies Anne-Marie Womack Abstract: This article reenvisions fallacies for composition classrooms by situating them within rhetorical practices. Fallacies are not formal errors in logic but rather persuasive failures in rhetoric. I argue fallacies are directly linked to successful rhetorical strategies and pose the visual organizer of the Venn diagram to demonstrate that claims can achieve both success and failure based on audience and context. For example, strong analogy overlaps false analogy and useful appeal to pathos overlaps manipulative emotional appeal. To advance this argument, I examine recent changes in fallacies theory, critique a-rhetorical textbook approaches, contextualize fallacies within the history and theory of rhetoric, and describe a methodology for rhetorically reclaiming these terms. Today, fallacy instruction in the teaching of written argument largely follows two paths: teachers elevate fallacies as almost mathematical formulas for errors or exclude them because they don’t fit into rhetorical curriculum. Both responses place fallacies outside the realm of rhetorical inquiry. Fallacies, though, are not as clear-cut as the current practice of spotting them might suggest. Instead, they rely on the rhetorical situation. Just as it is an argument to create a fallacy, it is an argument to name a fallacy. This article describes an approach in which students must justify naming claims as successful strategies and/or fallacies, a process that demands writing about contexts and audiences rather than simply linking terms to obviously weak statements.
    [Show full text]
  • A System for Cherry-Picked Trendlines Detection
    MithraDetective: A System for Cherry-picked Trendlines Detection Yoko Nagafuchi∗, Yin Liny, Kaushal Mamgain{, Abolfazl Asudeh∗∗, H. V. Jagadishx, You (Will) Wuk, Cong Yuz ∗,y,xUniversity of Michigan; {,∗∗University of Illinois at Chicago; k,zGoogle Research; {yokon,irenelin,jag}@umich.edu; {kmamga2,asudeh}@uic.edu; {wuyou,congyu}@google.com; ABSTRACT come out with the fantasy-like statement that: The northern Given a data set, misleading conclusions can be drawn from hemisphere summers are colder than winters. For example, a it by cherry picking selected samples. One important class of cherry-picked summer day of Ann Arbor (MI, USA) on Aug. 퐹 conclusions is a trend derived from a data set of values over 18 had an average temperature of 58° , which is 8 degrees time. Our goal is to evaluate whether the ‘trends’ described lower than its average temperature on Mar. 15 (a winter by the extracted samples are representative of the true sit- day). In fact, both of the seasonal aggregation results and uation represented in the data. We demonstrate MithraDe- the validation [3] indicate that such cherry-picked trendline tective, a system to compute a support score to indicate how statements are not a fair representation of the truth. cherry-picked a statement is; that is, whether the reported Cherry-picked claims can aggravate public panic and lead trend is well-supported by the data. The system can also be to potentially dangerous outcomes in policy-making, as shown used to discover more supported alternatives. MithraDetec- in the next example. tive provides an interactive visual interface for both tasks.
    [Show full text]
  • 2019 27Th Annual Poets House Showcase Exhibition Catalog
    2019 27th Annual Poets House Showcase Exhibition Catalog Poets House | 10 River Terrace | New York, NY 10282 | poetshouse.org ELCOME to the 2019 Poets House Showcase, our annual, all-inclusive exhibition of the most recent poetry books, chapbooks, broadsides, artists’ books, and multimedia works published in the United States and W abroad. This year marks the 27th anniversary of the Poets House Showcase and features over 3,300 books from more than 800 different presses and publishers. For 27 years, the Showcase has helped to keep our collection current and relevant, building one of the most extensive collections of poetry in our nation—an expansive record of the poetry of our time, freely available and open to all. Building the Exhibit and the Poets House Library Collection Every year, Poets House invites poets and publishers to participate in the annual Showcase by donating copies of poetry titles released since January of the previous year. This year’s exhibit highlights poetry titles published in 2018 and the first part of 2019. Books have been contributed by the entire poetry community, from the publishers who send on their titles as they’re released, to the poets who mail us signed copies of their newest books, to library visitors donating books when they visit us. Every newly published book is welcomed, appreciated, and featured in the Showcase. The Poets House Showcase is the mechanism through which we build our library: a comprehensive, inclusive collection of over 70,000 poetry works, all free and open to the public. To make it as extensive as possible, we reach out to as many poetry communities and producers as we can, bringing together poetic voices of all kinds to meet the different needs and interests of our many library patrons.
    [Show full text]
  • Administering Avaya Social Media Manager
    Administering Avaya Social Media Manager Release 6.2.x July 2016 © 2012-2016, Avaya, Inc. IF YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Notice SERVICE. While reasonable efforts have been made to ensure that the Licenses information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED “Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN such modifications, additions, or deletions were performed by or on AVAYA AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA the express behalf of Avaya.
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Social Construction of Privacy: Reddit Case Study
    Social Construction of Privacy: Reddit Case Study December 13, 2020 A Thesis Prospectus Submitted to the Faculty of the School of Engineering and Applied Science University of Virginia ² Charlottesville, Virginia In Partial Fulfillment of the Requirements of the Degree Bachelor of Science, School of Engineering Rajiv Sarvepalli 1 1 INTRODUCTION In the technological age of today, privacy becomes a more and more valuable commod- ity. With so many companies that live off the idea that information is money, it becomes increasingly concerning the amount of an individual’s information that is public. It is public in every sense of the word, not just to a group of people, but to the whole world. Consider the constant data scandals that plague our technological world. Whether it is Facebook, Google, or governments, someone is always getting caught selling, collecting, or losing data that many consider infringes on their privacy. Therefore, as stewards of these technologies, we must develop preemptive ways of protecting the privacy of the individual in an information-based world focused on the collective. The heterogeneous nature of society, especially with respect to privacy, makes the perspective vary greatly from person to person. This study shall focus on Reddit, an anonymous social media since individuals within anonymous social media communities tend to view anonymity as some form of privacy and therefore tend to care about in some manner about privacy. In order to understand the perspective and definitions of privacy, privacy needs to be analyzed in the context of a society. The conundrum of our information society is the constant complaints of lack of privacy, yet no privacy-invasive companies change their conduct.
    [Show full text]
  • Guحadel Usuario User Guide
    E R D I E S U U G MFL67235901(1.0) MW U G This booklet is made from 60% post-consumer paper. recycled booklet ismade from This U S This booklet is printed with soy ink. with soy booklet isprinted This U Í A A D R Printed inMexico Printed E I O L Copyright©2011 LG Electronics, Inc. All rights reserved. TM Enlighten is registered trademark of Verizon Wireless and its related entities. All other trademarks are the property of their respective owners. Important Customer Information 1 When using this product, the safety precautions below must be taken to avoid possible legal liabilities and damages. Retain and follow all product safety and operating instructions. Observe all warnings in the product operating instructions. To reduce the risk of bodily injury, electric shock, fire, and damage to the equipment, observe the following precautions. ELECTRICAL SAFETY This product is intended for use when supplied with power from the designated battery or power supply unit. Other usage may be dangerous and will invalidate any approval given to this product. SAFETY PRECAUTIONS FOR PROPER GROUNDING INSTALLATION CAUTION: Connecting to improperly grounded equipment can result in an electric shock to your device. This product is equipped with a USB Cable for connecting to a desktop or notebook computer. Be sure your computer is properly grounded (earthed) before connecting this product to the computer. The power supply cord of a desktop or notebook computer has an equipment-grounding conductor and a grounding plug. The plug must be plugged into an appropriate outlet which is properly installed and grounded in accordance with all local codes and ordinances.
    [Show full text]
  • Geopolitics of Emerging and Disruptive Technologies
    GEOPOLITICS OF EMERGING AND DISRUPTIVE TECHNOLOGIES 1 GEOPOLITICS OF EMERGING AND DISRUPTIVE TECHNOLOGIES Michał Rekowski, ToMasz PiekaRz, BaRBaRa szTokfisz, RoBert siudak, izaBela alBRychT, PRzeMysław Roguski, Paweł kosTkiewicz, Maciej siciaRek, kRzyszTof silicki, Magdalena wRzosek, ToMasz dylik, TeodoR BuchneR, joanna ŚwiąTkowska, andRea g. RodRíguez, kaMil Mikulski EDITORS: izaBela alBRychT, Michał Rekowski, kaMil Mikulski AUTHORS: Michał Rekowski TABle of conTenTS International Competition in the Digital Age Tomasz Piekarz Digital Technologies as an Element of Power Barbara Sztokfisz Cyberdiplomacy – a Tool for Building Digital Peace introduCTION ��������������������������������������������������������������������������������������������������������������������� 7 Robert Siudak New Entities in a Multilateral Cyber World Izabela Albrycht OPENING REMARKS ������������������������������������������������������������������������������������������������������������ 10 The Power of Digital Data Przemysław Roguski, PhD International competition IN The digital age ������������������������������������������ 13 The Geopolitics of Cloud Computing Paweł Kostkiewicz, Maciej Siciarek, Krzysztof Silicki, Magdalena Wrzosek, PhD digital technologies AS AN ELEMENT of power ������������������������������������������ 27 Certification and Standardisation in the Context of Digital Sovereignty Tomasz Dylik Cyberdiplomacy – a tool for BuILDING digital peace ����������������������������� 41 Geopolitics of Digital Belts and Roads Teodor Buchner, PhD NEW ENTITIES
    [Show full text]
  • Characterizing Anonymous Social Media Content
    The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correa†, Leandro Araújo Silva‡, Mainack Mondal†, Fabrício Benevenuto‡, Krishna P. Gummadi† † Max Planck Institute for Software Systems (MPI-SWS), Germany ‡ Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]