Adversarial Behavior in Collaboration and Social Media Systems
Permanent URI for this collectionhttps://hdl.handle.net/10125/107399
Browse
Recent Submissions
Item type: Item , Characterizing Multimedia Adoption and its Role on Mobilization in Social Movements(2024-01-03) Shaik, Mainuddin; Cakmak, Mert Can; Spann, Billy; Agarwal, NitinThis research investigates the vital role of multimedia (images and videos) serve in fostering connective action in contemporary social movements, particularly focusing on the recent political protests in Brazil and Peru between November 2022 and February 2023. Utilizing a dual approach grounded in Diffusion of Innovations (DOI) theory and an analysis of mobilization processes through social networks. This study explores the varying levels of multimedia adoption throughout different social movements phases. The analysis, based on an extensive dataset with 664,865 tweets, 76,867 images, 51,913 videos and 1,256,884 retweets (images and videos) revealed distinct patterns of multimedia usage across DOI stages of the social movements. Notably, the Brazil anti-government social movement showed a preference for images initially, shifting to video usage during significant events, whereas the Brazil pro-government social movement predominantly utilized images. In Peru, the anti-government social movement's media preferences fluctuated between DOI stages.Item type: Item , The Effects of Email Illegitimacy and Phishing Behavior Training on Eye Movement Behavior in Spear Phishing Detection(2024-01-03) Zhou, Lina; Lim, Jaewan; Zhang, DongsongEmail phishing, such as spear phishing attacks, has become increasingly sophisticated. Automatic phishing detection models and anti-phishing education and awareness programs remain insufficient in guarding against general phishing attacks, which are even more ineffective in dealing with spear phishing. Understanding human receivers’ interaction behavior with phishing emails can be instrumental in improving the effectiveness of anti-phishing training and human phishing detection. To this end, eye movement behavior can serve as a lens reflecting human cognitive processes and attention. This study focuses on examining the effects of email legitimacy and phishing behavior training on receivers’ eye movement behavior by analyzing their eye-tracking data. The findings have implications for developing spear phishing training programs and improving phishing detection models that can improve online safety of human users.Item type: Item , Why Are People Duped by Healthcare Disinformation Campaigns?(2024-01-03) George, Joey F.; Mannina, SophiaHealth disinformation campaigns pose a serious threat to societal well-being. To better understand how these campaigns are propagated, this research evaluates how successful people are at identifying false health-related content. Using a survey methodology, a sample of 71 university students was asked to review 10 pairs of social media posts and determine their veracity. Mixed models were used to analyze successful detection of disinformation. Factors that affected participants’ judgements were qualitatively assessed. Participants demonstrated a 90% success rate when differentiating between true and false posts, indicating a high level of success when confronted with a choice between two posts. Commonly used indicators of honest and dishonest content were also identified. These insights offer a nuanced understanding of social media users’ evaluations of online content and can inform mitigation strategies designed to combat health disinformation campaigns.Item type: Item , How Doxing on Social Media Leads to Social Stigma and Perceived Dignity(2024-01-03) Shan, Guohou; Pu, Wenxi; Thatcher, Jason Bennet; Roth, PhilipDoxing is the practice of publicly postings someone else's personal information online (e.g., on social media) without their consent. Doxing on social media can damage the social image of doxing victims (doxees). Three types of doxing (deanonymizing, targeting, and delegitimizing) are documented in the literature. To better understand and mitigate the harmful consequences, in this research, we use social identity threat theory to propose a research model. We aim to understand whether doxing leads to social stigma and loss of perceived dignity, whether types of doxing result in different outcomes, and to unpack the mechanisms of doxing impact. Through two online experiments, we establish that doxing leads to social stigma and loss of perceived dignity; only delegitimizing doxing matters and perceived trustworthiness can help explain the effects of doxing on perceived dignity, but not on social stigma.Theoretical and practical implications are discussed in the paper.Item type: Item , What Makes Doxing Good or Bad? Exploring Bystanders’ Appraisal and Responses to the Malicious Disclosure of Personal Information(2024-01-03) Schuster, Julian; Franz, Anjuli; Benlian, AlexanderDoxing, the disclosure of an individual’s personal information with malicious intent, has emerged as a global phenomenon aimed at punishing, threatening, or silencing individuals. The response from the public and media to doxing varies widely, ranging from condemning it as a harmful practice that disregards the fundamental right to privacy to regarding it as a means to hold wrongdoers accountable. However, research on how and why individuals observing a doxing incident (i.e., bystanders) form their opinions is scant. This study focuses on bystanders’ appraisal of and reactions to doxing incidents. Drawing on a qualitative vignette study (n=14) employing two doxing scenarios (person-based and issue-based), we identify crucial factors that influence bystanders’ evaluation of doxing attacks. Additionally, our research sheds light on the motivations and circumstances that prompt bystanders to take action when witnessing a doxing incident. The findings of this study have important implications for both research and practice.Item type: Item , Introduction to the Minitrack on Adversarial Behavior in Collaboration and Social Media Systems(2024-01-03) Cheung, Christy; Risius, Marten; Lee, Matthew; Wagner, Christian
