3,290 research outputs found

    How Rumors Spread and Stop over Social Media: a Multi-Layered Communication Model and Empirical Analysis

    Get PDF
    In this paper, we present a multi-layered communication (MLC) model that includes a trust-constructing procedure that can be used to explain how rumors spread and stop over social media. We define two structures in our MLC model: the social structure (SS) in the social layer, and the communication structure (CS) in the communicating layer. We propose two trust-building mechanisms (TBM): the social-based TBM (SBTBM) and the communicating-aimed TBM (CATBM). We discuss the trust-constructing procedure to demonstrate that an individual will sequentially decide to spread information based on three factors: the opinion environment, the individual’s social influence, and the cost to confirm the information. The model predicts that individuals will tend to create links with others in social layers to extend their social structures (social clustering principle) when they use social media. Thus, a rumor will spread because a spreading core is formed in the CS. However, a rumor will be stopped by interactions that occur in the SS. Our empirical case supports this prediction. We analyzed the topology of CS to indicate how a spreading core forms and CS evolves, and how a rumor stops spreading because social behaviors in SS encourage the development of more accurate information based on reality

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work
    • 

    corecore