The Effect of an X Forewarning on the Detection and Likelihood to Follow a Social Bot, and the Moderating Role of Mutual Friends and Privacy Concerns | Amsterdam University Press Journals Online
2004
Volume 52, Issue 3
  • ISSN: 1384-6930
  • E-ISSN: 1875-7286

Samenvatting

Samenvatting

Deze studie toont, volgens de , de doeltreffendheid van een X-(voor)waarschuwing op social bot-geletterdheid; specifiek een succesvolle detectie van bots en de verminderde kans om deze te volgen. Op deze laatste relatie wordt bovendien een significant modererend effect gevonden van gemeenschappelijke volgers en privacyzorgen. Dit breidt voor het eerst de Inoculation Theory uit naar de context van social bots.

Loading

Article metrics loading...

/content/journals/10.5117/TCW2024.3.004.WITT
2024-07-01
2024-07-22
Loading full text...

Full text loading...

/deliver/fulltext/13846930/52/3/TCW2024.3.004.WITT.html?itemId=/content/journals/10.5117/TCW2024.3.004.WITT&mimeType=html&fmt=ahah

References

  1. Assenmacher, D., Clever, L., Frischlich, L., Quandt, T., Trautmann, H., & Grimme, C. (2020). Demystifying social bots: On the intelligence of automated social media actors. Social Media + Society, 6(3), 205630512093926.
    [Google Scholar]
  2. Barbati, J. L., Rains, S. A., Ivanov, B., & Banas, J. A. (2021). Evaluating classic and contemporary ideas about persuasion resistance in inoculation theory: Argument strength, refutation strength, and forewarning. Communication Research Reports, 38(4), 272–281.
    [Google Scholar]
  3. Barth, S., Ionita, D., De Jong, M., Hartel, P., & Junger, M. (2021). Privacy rating: A user-centered approach for visualizing data handling practices of online services. IEEE Transactions on Professional Communication, 64(4), 354–373.
    [Google Scholar]
  4. Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review: Privacy concerns meta-analysis. Journal of Communication, 67(1), 26–53.
    [Google Scholar]
  5. Boman, C. D. (2023). Protecting against disinformation: Using inoculation to cultivate reactance towards astroturf attacks. Journal of Public Relations Research, 35(3), 162–181.
    [Google Scholar]
  6. Bond, S. (2020, October9). Twitter expands warning labels to slow spread of election misinformation. NPR. https://www.npr.org/2020/10/09/922028482/twitter-expands-warning-labels-to-slow-spread-of-election-misinformation
    [Google Scholar]
  7. Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2013). Design and analysis of a social botnet. Computer Networks, 57(2), 556–578.
    [Google Scholar]
  8. Chen, C.-F., Shi, W., Yang, J., & Fu, H.-H. (2021). Social bots’ role in climate change discussion on Twitter: Measuring standpoints, topics, and interaction strategies. Advances in Climate Change Research, 12(6), 913–923.
    [Google Scholar]
  9. Chen, J., Luo, Y., & Du, R. (2020). The impact of privacy seal on users’ perception in network transactions. Computer Systems Science and Engineering, 35(3), 199–206.
    [Google Scholar]
  10. Cialdini, R. B. (2007). Influence: The psychology of persuasion (Rev. ed.). Collins Business.
    [Google Scholar]
  11. Clayton, K., Blair, S., Busam, J. A., Forstner, S., Glance, J., Green, G., Kawata, A., Kovvuri, A., Martin, J., Morgan, E., Sandhu, M., Sang, R., Scholz-Bright, R., Welch, A. T., Wolff, A. G., Zhou, A., & Nyhan, B. (2020). Real solutions for fake news? Measuring the effectiveness of general warnings and fact-check tags in reducing belief in false stories on social media. Political Behavior, 42(4), 1073–1095.
    [Google Scholar]
  12. Compton, J., Jackson, B., & Dimmock, J. A. (2016). Persuading others to avoid persuasion: Inoculation theory and resistant health attitudes. Frontiers in Psychology, 7. https://doi.org/10.3389/fpsyg.2016.00122
    [Google Scholar]
  13. Cook, J., Lewandowsky, S., & Ecker, U. K. H. (2017). Neutralizing misinformation through inoculation: Exposing misleading argumentation techniques reduces their influence. PLOS ONE, 12(5), e0175799.
    [Google Scholar]
  14. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.
    [Google Scholar]
  15. De Vries, E. L. E. (2019). When more likes is not better: The consequences of high and low likes-to-followers ratios for perceived account credibility and social media marketing effectiveness. Marketing Letters, 30(3), 275–291.
    [Google Scholar]
  16. De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454.
    [Google Scholar]
  17. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80.
    [Google Scholar]
  18. Dixon, S. J. (2022). Global Twitter user age distribution 2021. Statista. https://www.statista.com/statistics/283119/age-distribution-of-global-twitter-users/
    [Google Scholar]
  19. Elyashar, A., Fire, M., Kagan, D., & Elovici, Y. (2013). Homing socialbots: Intrusion on a specific organization’s employee using Socialbots. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 1358–1365.
    [Google Scholar]
  20. Elyashar, A., Fire, M., Kagan, D., & Elovici, Y. (2016). Guided socialbots: Infiltrating the social networks of specific organizations’ employees. AI Communications, 29(1), 87–106.
    [Google Scholar]
  21. Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96–104.
    [Google Scholar]
  22. Grady, R. H., Ditto, P. H., & Loftus, E. F. (2021). Nevertheless, partisanship persisted: Fake news warnings help briefly, but bias returns with time. Cognitive Research: Principles and Implications, 6(1), 52.
    [Google Scholar]
  23. Guilbeault, D. (2016). Automation, algorithms, and politics| Growing bot security: An ecological view of bot agency. International Journal of Communication, 10(0), Article 0.
    [Google Scholar]
  24. Hameleers, M. (2022). Separating truth from lies: Comparing the effects of news media literacy interventions and fact-checkers in response to political misinformation in the US and Netherlands. Information, Communication & Society, 25(1), 110–126.
    [Google Scholar]
  25. Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.
    [Google Scholar]
  26. Howard, P. N., Woolley, S., & Calo, R. (2018). Algorithms, bots, and political communication in the US 2016 election: The challenge of automated political communication for election law and administration. Journal of Information Technology & Politics, 15(2), 81–93.
    [Google Scholar]
  27. Hudders, L., De Pauw, P., Cauberghe, V., Panic, K., Zarouali, B., & Rozendaal, E. (2017). Shedding new light on how advertising literacy can affect children’s processing of embedded advertising formats: A future research agenda. Journal of Advertising, 46(2), 333–349.
    [Google Scholar]
  28. Hwang, E. H., & Lee, S. (2021). A nudge to credible information as a countermeasure to misinformation: Evidence from Twitter. SSRN Electronic Journal.
    [Google Scholar]
  29. Jayakumar, T. (2017). Behavioural economics perspective of “demonetisation.”Economic and Political Weekly, 52(41), 41–46.
    [Google Scholar]
  30. Kim, K., & Kim, J. (2011). Third-party privacy certification as an online advertising strategy: An investigation of the factors affecting the relationship between third-party certification and initial trust. Journal of Interactive Marketing, 25(3), 145–158.
    [Google Scholar]
  31. Kim, Y., Kim, S. H., Peterson, R. A., & Choi, J. (2023). Privacy concern and its consequences: A meta-analysis. Technological Forecasting and Social Change, 196, 122789.
    [Google Scholar]
  32. King, T., Aggarwal, N., Taddeo, M., & Floridi, L. (2018). Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3183238
    [Google Scholar]
  33. Klumpe, J., Koch, O. F., & Benlian, A. (2020). How pull vs. push information delivery and social proof affect information disclosure in location based services. Electronic Markets, 30(3), 569–586.
    [Google Scholar]
  34. Larose, R., & Rifon, N. J. (2007). Promoting i-Safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs, 41(1), 127–149.
    [Google Scholar]
  35. Lewandowsky, S., & Van Der Linden, S. (2021). Countering misinformation and fake news through inoculation and prebunking. European Review of Social Psychology, 32(2), 348–384.
    [Google Scholar]
  36. Lin, X., Spence, P. R., & Lachlan, K. A. (2016). Social media and credibility indicators: The effect of influence cues. Computers in Human Behavior, 63, 264–271.
    [Google Scholar]
  37. Lins, S., Schneider, D., Benlian, A., & Sunyaev, A. (2017, December10). The shifts of fortune test the reliability of friends – The brittle nature of signal reliability in cloud service markets.
    [Google Scholar]
  38. McGuire, W. J. (1964). Some contemporary approaches. In Advances in Experimental Social Psychology (Vol. 1, pp. 191–229). Elsevier.
    [Google Scholar]
  39. Miyazaki, A. D., & Krishnamurthy, S. (2002). Internet seals of approval: Effects on online privacy policies and consumer perceptions. Journal of Consumer Affairs, 36(1), 28–49.
    [Google Scholar]
  40. Muscanell, N. L., Guadagno, R. E., & Murphy, S. (2014). Weapons of influence misused: A social influence analysis of why people fall prey to internet scams. Social and Personality Psychology Compass, 8(7), 388–396.
    [Google Scholar]
  41. Orabi, M., Mouheb, D., Al Aghbari, Z., & Kamel, I. (2020). Detection of bots in social media: A systematic review. Information Processing & Management, 57(4), 102250.
    [Google Scholar]
  42. Pedrazzi, S., & Oehmer, F. (2021). Bot or No Bot? Digital Media Literacy als Governance-Instrument für die Identifikation von und den Umgang mit Social Bots. In G.Keel & W.Weber (Eds.), Media Literacy (pp. 189–206). Nomos Verlagsgesellschaft mbH & Co. KG.
    [Google Scholar]
  43. Roethke, K., Klumpe, J., Adam, M., & Benlian, A. (2020). Social influence tactics in e-commerce onboarding: The role of social proof and reciprocity in affecting user registrations. Decision Support Systems, 131, 113268.
    [Google Scholar]
  44. Roth, Y., & Pickles, N. (2020, May11). Updating our approach to misleading information. https://blog.twitter.com/en_us/topics/product/2020/updating-our-approach-to-misleading-information
    [Google Scholar]
  45. Schmuck, D., & Von Sikorski, C. (2020). Perceived threats from social bots: The media’s role in supporting literacy. Computers in Human Behavior, 113, 106507.
    [Google Scholar]
  46. Schramm-Klein, H., Mau, G., Steffen, C., Steinmann, S., Behrens, E., & Kuffel, A. (2012). Warning labels on foods: How useful they are for children and adolescents?Das Gesundheitswesen, 74.
    [Google Scholar]
  47. Shao, C., Ciampaglia, G. L., Varol, O., Yang, K.-C., Flammini, A., & Menczer, F. (2018). The spread of low-credibility content by social bots. Nature Communications, 9(1), 4787.
    [Google Scholar]
  48. Shepherd, J. (2023, June16). 23 Essential Twitter Statistics You Need to Know in 2023. https://thesocialshepherd.com/blog/twitter-statistics
    [Google Scholar]
  49. Stieglitz, S., Brachten, F., Ross, B., & Jung, A.-K. (2017). Do social bots dream of electric sheep? A categorisation of social media bot accounts (arXiv:1710.04044). arXiv.
    [Google Scholar]
  50. Varol, O., Ferrara, E., Davis, C. A., Menczer, F., & Flammini, A. (2017). Online human– bot interactions: Detection, estimation, and characterization (arXiv:1703.03107). arXiv. http://arxiv.org/abs/1703.03107
    [Google Scholar]
  51. Wogalter, M. S., Conzola, V. C., & Smith-Jackson, T. L. (2002). Research-based guidelines for warning design and evaluation. Applied Ergonomics, 33(3), 219–230.
    [Google Scholar]
  52. Wood, W., & Quinn, J. M. (2003). Forewarned and forearmed? Two meta-analysis syntheses of forewarnings of influence appeals. Psychological Bulletin, 129(1), 119–138.
    [Google Scholar]
  53. Yan, H. Y., Yang, K.-C., Menczer, F., & Shanahan, J. (2021). Asymmetrical perceptions of partisan political bots. New Media & Society, 23(10), 3016–3037.
    [Google Scholar]
  54. Yang, K., Kim, H. M., & Tanoff, L. (2020). Signaling trust: Cues from Instagram posts. Electronic Commerce Research and Applications, 43, 100998. https://doi.org/10.1016/j.elerap.2020.100998
    [Google Scholar]
  55. Yang, K.-C., Ferrara, E., & Menczer, F. (2022). Botometer 101: Social bot practicum for computational social scientists. Journal of Computational Social Science, 5(2), 1511–1528.
    [Google Scholar]
  56. Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418.
    [Google Scholar]
  57. Zarouali, B., Helberger, N., & de Vreese, C. H. (2021). Investigating algorithmic misconceptions in a media context: Source of a new digital divide?Media and Communication, 9(4), 134–144.
    [Google Scholar]
  58. Zarouali, B., Poels, K., Ponnet, K., & Walrave, M. (2021). The influence of a descriptive norm label on adolescents’ persuasion knowledge and privacy-protective behavior on social networking sites. Communication Monographs, 88(1), 5–25.
    [Google Scholar]
  59. Zhang, Y., Song, W., Shao, J., Abbas, M., Zhang, J., Koura, Y. H., & Su, Y. (2023). Social bots’ role in the COVID-19 pandemic discussion on Twitter. International Journal of Environmental Research and Public Health, 20(4), Article 4.
    [Google Scholar]
  60. Zimmerman, S., Thorpe, A., Fox, C., & Kruschwitz, U. (2019). Investigating the interplay between searchers’ privacy concerns and their search behavior. Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 953–956.
    [Google Scholar]
http://instance.metastore.ingenta.com/content/journals/10.5117/TCW2024.3.004.WITT
Loading
/content/journals/10.5117/TCW2024.3.004.WITT
Loading

Data & Media loading...

Dit is een verplicht veld
Graag een geldig e-mailadres invoeren
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error