The Anatomy of Conspirators: Unveiling Traits using a Comprehensive
Twitter Dataset
- URL: http://arxiv.org/abs/2308.15154v2
- Date: Mon, 5 Feb 2024 10:11:37 GMT
- Title: The Anatomy of Conspirators: Unveiling Traits using a Comprehensive
Twitter Dataset
- Authors: Margherita Gambini, Serena Tardelli, Maurizio Tesconi
- Abstract summary: We present a novel methodology for constructing a Twitter dataset that encompasses accounts engaged in conspiracy-related activities throughout the year 2022.
This comprehensive collection effort yielded a total of 15K accounts and 37M tweets extracted from their timelines.
We conduct a comparative analysis of the two groups across three dimensions: topics, profiles, and behavioral characteristics.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The discourse around conspiracy theories is currently thriving amidst the
rampant misinformation in online environments. Research in this field has been
focused on detecting conspiracy theories on social media, often relying on
limited datasets. In this study, we present a novel methodology for
constructing a Twitter dataset that encompasses accounts engaged in
conspiracy-related activities throughout the year 2022. Our approach centers on
data collection that is independent of specific conspiracy theories and
information operations. Additionally, our dataset includes a control group
comprising randomly selected users who can be fairly compared to the
individuals involved in conspiracy activities. This comprehensive collection
effort yielded a total of 15K accounts and 37M tweets extracted from their
timelines. We conduct a comparative analysis of the two groups across three
dimensions: topics, profiles, and behavioral characteristics. The results
indicate that conspiracy and control users exhibit similarity in terms of their
profile metadata characteristics. However, they diverge significantly in terms
of behavior and activity, particularly regarding the discussed topics, the
terminology used, and their stance on trending subjects. In addition, we find
no significant disparity in the presence of bot users between the two groups.
Finally, we develop a classifier to identify conspiracy users using features
borrowed from bot, troll and linguistic literature. The results demonstrate a
high accuracy level (with an F1 score of 0.94), enabling us to uncover the most
discriminating features associated with conspiracy-related accounts.
Related papers
- Unveiling Online Conspiracy Theorists: a Text-Based Approach and Characterization [42.242551342068374]
We conducted a comprehensive analysis of two distinct X datasets: one comprising users with conspiracy theorizing patterns and another made of users lacking such tendencies.
Our findings reveal marked differences in the lexicon and language adopted by conspiracy theorists with respect to other users.
We developed a machine learning classifier capable of identifying users who propagate conspiracy theories based on a rich set of 871 features.
arXiv Detail & Related papers (2024-05-21T08:07:38Z) - Classifying Conspiratorial Narratives At Scale: False Alarms and Erroneous Connections [4.594855794205588]
This work establishes a general scheme for classifying discussions related to conspiracy theories.
We leverage human-labeled ground truth to train a BERT-based model for classifying online CTs.
We present the first large-scale classification study using posts from the most active conspiracy-related Reddit forums.
arXiv Detail & Related papers (2024-03-29T20:29:12Z) - On mission Twitter Profiles: A Study of Selective Toxic Behavior [5.0157204307764625]
This study aims to characterize profiles potentially used for influence operations, termed 'on-mission profiles'
Longitudinal data from 138K Twitter or X, profiles and 293M tweets enables profiling based on theme diversity.
arXiv Detail & Related papers (2024-01-25T15:42:36Z) - Where the Earth is flat and 9/11 is an inside job: A comparative
algorithm audit of conspiratorial information in web search results [62.997667081978825]
We examine the distribution of conspiratorial information in search results across five search engines: Google, Bing, DuckDuckGo, Yahoo and Yandex.
We find that all search engines except Google consistently displayed conspiracy-promoting results and returned links to conspiracy-dedicated websites in their top results.
Most conspiracy-promoting results came from social media and conspiracy-dedicated websites while conspiracy-debunking information was shared by scientific websites and, to a lesser extent, legacy media.
arXiv Detail & Related papers (2021-12-02T14:29:21Z) - Characterizing Online Engagement with Disinformation and Conspiracies in
the 2020 U.S. Presidential Election [9.63004143218094]
Persistent manipulation of social media has resulted in increased concerns regarding the 2020 U.S. Presidential Election.
We apply a detection model to separate factual from unreliable (or conspiratorial) claims analyzing a dataset of 242 million election-related tweets.
We characterize account engagements with unreliable and conspiracy tweets, and with the QAnon conspiracy group, by political leaning and tweet types.
arXiv Detail & Related papers (2021-07-17T22:11:13Z) - News consumption and social media regulations policy [70.31753171707005]
We analyze two social media that enforced opposite moderation methods, Twitter and Gab, to assess the interplay between news consumption and content regulation.
Our results show that the presence of moderation pursued by Twitter produces a significant reduction of questionable content.
The lack of clear regulation on Gab results in the tendency of the user to engage with both types of content, showing a slight preference for the questionable ones which may account for a dissing/endorsement behavior.
arXiv Detail & Related papers (2021-06-07T19:26:32Z) - Misleading Repurposing on Twitter [3.0254442724635173]
We present the first in-depth and large-scale study of misleading repurposing.
A malicious user changes the identity of their social media account via, among other things, changes to the profile attributes in order to use the account for a new purpose while retaining their followers.
We propose a definition for the behavior and a methodology that uses supervised learning on data mined from the Internet Archive's Twitter Stream Grab to flag repurposed accounts.
arXiv Detail & Related papers (2020-10-20T20:19:01Z) - Information Consumption and Social Response in a Segregated Environment:
the Case of Gab [74.5095691235917]
This work provides a characterization of the interaction patterns within Gab around the COVID-19 topic.
We find that there are no strong statistical differences in the social response to questionable and reliable content.
Our results provide insights toward the understanding of coordinated inauthentic behavior and on the early-warning of information operation.
arXiv Detail & Related papers (2020-06-03T11:34:25Z) - Echo Chambers on Social Media: A comparative analysis [64.2256216637683]
We introduce an operational definition of echo chambers and perform a massive comparative analysis on 1B pieces of contents produced by 1M users on four social media platforms.
We infer the leaning of users about controversial topics and reconstruct their interaction networks by analyzing different features.
We find support for the hypothesis that platforms implementing news feed algorithms like Facebook may elicit the emergence of echo-chambers.
arXiv Detail & Related papers (2020-04-20T20:00:27Z) - Contrastive Examples for Addressing the Tyranny of the Majority [83.93825214500131]
We propose to create a balanced training dataset, consisting of the original dataset plus new data points in which the group memberships are intervened.
We show that current generative adversarial networks are a powerful tool for learning these data points, called contrastive examples.
arXiv Detail & Related papers (2020-04-14T14:06:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.