Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People’S Republic of China

Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People’S Republic of China

Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People’s Republic of China Rong-Ching Chang Chun-Ming Lai [email protected] [email protected] Tunghai University Tunghai University Taiwan Taiwan Kai-Lai Chang Chu-Hsing Lin [email protected] [email protected] Tunghai University Tunghai University Taiwan Taiwan ABSTRACT ACM Reference Format: The digital media, identified as computational propaganda provides Rong-Ching Chang, Chun-Ming Lai, Kai-Lai Chang, and Chu-Hsing Lin. a pathway for propaganda to expand its reach without limit. State- 2021. Dataset of Propaganda Techniques of the State-Sponsored Informa- tion Operation of the People’s Republic of China. In KDD ’21: The Sec- backed propaganda aims to shape the audiences’ cognition toward ond International MIS2 Workshop: Misinformation and Misbehavior Min- entities in favor of a certain political party or authority. Further- ing on the Web, Aug 15, 2021, Virtual. ACM, New York, NY, USA, 5 pages. more, it has become part of modern information warfare used in https://doi.org/10.1145/nnnnnnn.nnnnnnn order to gain an advantage over opponents. Most of the current studies focus on using machine learning, quantitative, and qualitative methods to distinguish if a certain piece 1 INTRODUCTION of information on social media is propaganda. Mainly conducted Propaganda has the purpose of framing and influencing opinions. on English content, but very little research addresses Chinese Man- With the rise of the internet and social media, propaganda has darin content. From propaganda detection, we want to go one step adopted a powerful tool for its unlimited reach, as well as multiple further to providing more fine-grained information on propaganda forms of content that can further drive engagement online and techniques that are applied. offline without disclosing the writers’ identity. Computational pro- In this research, we aim to bridge the information gap by pro- paganda is defined as propaganda being created or distributed using viding a multi-labeled propaganda techniques dataset in Mandarin computational or technical means [5]. Exploiting social media is based on a state-backed information operation dataset provided considered as one of the low-cost and high-impact techniques in in- by Twitter. In addition to presenting the dataset, we apply a multi- formation warfare, driving and manipulating human behavior with label text classification using fine-tuned BERT. Potentially this could various psychological manipulations [1]. How information is con- help future research in detecting state-backed propaganda online veyed is by using propaganda techniques. Propaganda techniques especially in a cross-lingual context and cross platforms identity are not only used for political content, but also for marketing, and consolidation. religious content for persuasion purpose. Propaganda techniques, commonly used in disinformation and misinformation, are the way CCS CONCEPTS that propaganda is conveyed [10], such detection allows <requires?> for more fine-grained analysis and detection, not only distinguish- • Social and professional topics ! Political speech. ing if it is propaganda, but characterizing where it might come from. The propaganda activity launched by foreign adversaries could be KEYWORDS particularly concerning to a country as the usual goal may include arXiv:2106.07544v1 [cs.SI] 14 Jun 2021 steering discord, spreading fear, influencing beliefs and behaviors, propaganda, information operation, social media diminishing trust, and threatening the stability of a country [1]. Various state-backed official and unofficial departments, organiza- tions, and agencies were established to address information warfare include the Internet Research Agency of Russia [12], 50 Cent Party [15][14] of Chinese Communist Party (CCP) and the Public Opinion Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed Brigades of the Communist Party of Vietnam [6]. for profit or commercial advantage and that copies bear this notice and the full citation Most of the recent work has been focused on propaganda detec- on the first page. Copyrights for components of this work owned by others than ACM tion, in other word, identifying if the information is propaganda or must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a not. This has been done using various methods such as qualitative fee. Request permissions from [email protected]. analysis, quantitative analysis [4], and machine learning [20][7]. KDD ’21, Aug 15, 2021, Virtual The main features for this detection task could be divided into two © 2021 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 parts, content-driven, and network-driven. Some of the current https://doi.org/10.1145/nnnnnnn.nnnnnnn propaganda text corpora open data sets on document levels include KDD ’21, Aug 15, 2021, Virtual Chang, Lai, et al. Rashkin et al. [18] which labeled texts into trusted, satire, hoax, and (5) Obfuscation, intentional vagueness, confusion propaganda on news. Barrón-Cedeno et al. [3] further increased Purposefully being vague with the intention for the audience the corpus [18] with more propaganda articles and metadata of to develop false recognition toward the subject. the articles. The currently available fine-grained propaganda tech- (6) Appeal to authority nique dataset is the one presented by Da San Martino et al. [10]. Supporting the opinion or clam unconditionally as long as it From news articles, they labeled 18 propaganda techniques on a comes from the government or an expert. word-by-word sentence level, so that the position of where the (7) Black-and-white Fallacy propaganda technique was applied from start to end was being Presenting only two opposite possibilities, one favoring a documented. All of the mentioned data sets are in English. Baisa certain party and one presented by the opponent. et al. [2] released a propaganda technique dataset for Czech based (8) Stereotyping, name-calling, labeling on newspaper. Another open data source is Twitter, a popular so- Labeling the target with the intention of arousing prejudices cial media platform, the dataset discloses state-linked information or making an association with stereotypes. operations that took place on their platform. However, the Twitter (9) Loaded Language dataset is not labeled with propaganda techniques but the Twitter Using emotional words to influence audience opinions. account metadata and media information only. The previously la- (10) Exaggeration or Minimisation beled propaganda technique in news article texts could be quite Overly amplifying or reducing the importance of something. different linguistically compared to texts on social media. Tweets, (11) Flag-waving messages posted on Twitter, tend to be more casual with slang and Justifying or presenting as a nation or group or idea. In emoji. They are also shorter as the platform has a text length limit. our case, we also consider Flag-waving when one person is In the literature Da San Martino et al. [9] who conducted a survey presented as their opinion represents the entire nation or of computational propaganda, mentioned that there is limited pro- group. paganda detection research based on text features due to the lack (12) Doubt of annotated data sets. Yet we think text content is an important Questioning or steering uncertainty or trust toward some- feature for performing cross-platform detection, in user-identity thing, an entity, or a group. linking, and in information origin tracing. Since the network fea- (13) Appeal to fear or prejudice ture may differ from platform to platform, text content ismore Spreading a sense of anxiety, fear, or panic toward the audi- consistent in that regard. To our knowledge, there is no existing ence or entity. propaganda technique dataset for Mandarin Chinese. (14) Slogans To address such a gap, we present our dataset1 that focuses A brief sentence that includes labeling, stereotyping or cer- on propaganda techniques in Mandarin based on a state-linked tain cognitive belief. information operations dataset from the PRC released by Twitter in (15) Thought-terminating cliché July 2019. The dataset consists of multi-label propaganda techniques Using simple and generic sentences to discourage detail in of the sampled tweets. Additionally, we employed a fine-tuned BERT discussions. model for the multi-label classification task. (16) Bandwagon Persuading the audience to align with the bigger crowd who 2 PROPAGANDA TECHNIQUES appear to have an advantage or better situation, or implying a certain entity will lose or have a worse situation. Below we explained a list of selected propaganda techniques we (17) Guilt by association or Reductio ad Hitlerum have considered based on various studies [10][2][21]. Using the Associating an opponent or target with the usually disliked same assumption as [10], we labeled our data based on the linguistic object or group. and language use that can be judged directly without retrieving (18) Repetition extra information. The propaganda techniques we considered are Repeating the same message or idea several times. as follows: (1) Presenting Irrelevant Data Also called Red Herring. Introducing irrelevant information Additional to the usual propaganda techniques, we

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us