Abstract
Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and manmade crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural interventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Secondly, it discusses automatic cultural interventions realised via social bots (e.g. astroturfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural interventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
Recommended Reading
Cheong, M., & Lee, V. C. S. (2011). A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Information Systems Frontiers, 13(1), 45–59. https://doi.org/10.1007/s10796-010-9273-x.
Reuter, C., Hartwig, K., Kirchner, J., & Schlegel, N. (2019). Fake News Perception in Germany: A Representative Study of People’s Attitudes and Approaches to Counteract Disinformation. In Proceedings of the International Conference on Wirtschaftsinformatik (WI). Siegen.
Stieglitz, S., Brachten, F., Ross, B., & Jung, A.-K. (2017). Do Social Bots Dream of Electric Sheep? A Categorisation of Social Media Bot Accounts. Proceedings of the Australasian Conference on Information Systems, 1–11.
Bibliography
Abokhodair, N., Yoo, D., & McDonald, D. W. (2015). Dissecting a Social Botnet. Proceedings of the Conference on Computer Supported Cooperative Work & Social Computing (CSCW), 839–851. https://doi.org/10.1145/2675133.2675208
Al-Rawi, A. (2016). Anti-ISIS Humor: Cultural Resistance of Radical Ideology. Politics, Religion & Ideology, 7689(May), 1–17. https://doi.org/10.1080/21567689.2016.1157076
Allcott, H., & Gentzkow, M. (2017). Social Media and Fake News in the 2016 Election. Journal of Economic Perspectives, 31(2), 211–236. https://doi.org/10.1257/jep.31.2.211
Almaatouq, A., Shmueli, E., Nouh, M., Alabdulkareem, A., Singh, V. K., Alsaleh, M., … Pentland, A. (2016). If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. International Journal of Information Security, 15(5), 475–491. https://doi.org/10.1007/s10207-016-0321-5
Appling, D. S., & Briscoe, E. J. (2017). The Perception of Social Bots by Human and Machine. In Proceedings of the Thirtieth International Florida Artificial Intelligence Research Society Conference (pp. 20–25).
Barzilai-Nahon, K. (2009). Gatekeeping: A critical review. Annual Review of Information Science and Technology, 43(1), 1–79. https://doi.org/10.1002/aris.2009.1440430117
Becker, B. W. (2016). The Librarian’s Information War. Behavioral & Social Sciences Librarian, 35(4), 188–191. https://doi.org/10.1080/01639269.2016.1284525
Campbell, P. J., MacKinnon, A. S., & Stevens, C. (2010). An Introduction to Global Studies. Wiley-Blackwell.
Cheong, M., & Lee, V. C. S. (2011). A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Information Systems Frontiers, 13(1), 45–59. https://doi.org/10.1007/s10796-010-9273-x
Cho, C. H., Martens, M. L., Kim, H., Rodrigue, M., Journal, S., December, N., … Rodrigue, M. (2011). Astroturfing Global Warming: It Isn’t Always Greener on the Other Side of the Fence. Journal of Business Ethics, 104(4), 571–587. https://doi.org/10.1007/s10551-011-0950-6
Christoph, S. (2015). Funktionslogik terroristischer Propaganda im bewegten Bild. Journal for Deradicalization, Fall/15(4), 145–205.
Cooke, N. A. (2017). Posttruth, Truthiness, and Alternative Facts: Information Behavior and Critical Information Consumption for a New Age. The Library Quarterly, 87(3), 211–221. https://doi.org/10.1086/692298
Faktenfinder. (2017). AfD spokesman Christian Lüth in an interview with Faktenfinder. Retrieved from http://faktenfinder.tagesschau.de/inland/falsches-antifa-foto-101.html
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The Rise of Social Bots. Communications of the ACM, 59(7), 96–104.
Freedman, L. (2006). The Transformation of Strategic Affairs. Routledge.
Galtung, J. (1969). Violence, Peace, and Peace Research. Journal of Peace Research, 6(3), 167–191.
Galtung, J. (2007). Frieden mit friedlichen Mitteln. Friede und Konflikt, Entwicklung und Kultur. Münster: Agenda Verlag.
Gao, P., Gong, N. Z., Kulkarni, S., Thomas, K., & Mittal, P. (2015). SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection. In Computing Research Repository.
Gartenstein-Ross, D. (2015). Social Media in the Next Evolution of Terrorist Recruitment. Hearing before the Senate Committee on Homeland Security & Governmental Affairs, Foundation for Defense of Democracies, 1–11.
Gates, S., & Podder, S. (2015). Social Media, Recruitment, Allegiance and the Islamic State. Perspectives on Terrorism, 9(4), 107–116.
Gundelach, P. (1979). Grass Roots Organizations. Acta Sociologica, 22(2), 187–189. https://doi.org/10.1177/000169937902200206
Hancock, J. T., Curry, L. E., Goorha, S., & Woodworth, M. (2008). On lying and being lied to: A linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45(1), 1–23. https://doi.org/10.1080/01638530701739181
Hartwig, K., & Reuter, C. (2019). TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter. In Proceedings of the International Conference on Wirtschaftsinformatik (WI). Siegen.
Hügel, S. (2017). Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. Retrieved from https://www.fiff.de/
Hussain, G., & Saltman, E. M. (2014). Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it. Quilliam. Retrieved from https://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jihad-trending-quilliam-report.pdf
Jaho, E., Tzoannos, E., Papadopoulos, A., & Sarris, N. (2014). Alethiometer: A Framework for Assessing Trustworthiness and Content Validity in Social Media. In Proceedings of the 23rd International Conference on World Wide Web - WWW ’14 Companion (pp. 749–752). New York, NY: ACM Press. https://doi.org/10.1145/2567948.2579324
Jeberson, W., & Sharma, L. (2015). Survey on counter Web Terrorism. COMPUSOFT, An International Journal of Advanced Computer Technology, 4(5), 1744–1747.
Jiang, M., Cui, P., Beutel, A., Faloutsos, C., & Yang, S. (2016). Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach. ACM Trans. Knowl. Discov. Data, 10(4), 35:1----35:27. https://doi.org/10.1145/2746403
Kang, C. (2016). Fake News Onslaught Targets Pizzeria as Nest of Child-Trafficking. Retrieved from https://www.nytimes.com/2016/11/21/technology/fact-check-this-pizzeria-is-not-a-child-trafficking-site.html
Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59–68. https://doi.org/10.1016/j.bushor.2009.09.003
Kaufhold, M.-A., Gizikis, A., Reuter, C., Habdank, M., & Grinko, M. (2019). Avoiding Chaotic Use of Social Media during Emergencies: Evaluation of Citizens’ Guidelines. Journal of Contingencies and Crisis Management (JCCM), 1–16. https://doi.org/10.1111/1468-5973.12249
Kaufhold, M.-A., & Reuter, C. (2016). The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany. Journal of Homeland Security and Emergency Management (JHSEM), 13(1), 137–166.
Kaufhold, M.-A., Reuter, C., Ludwig, T., & Scholl, S. (2017). Social Media Analytics: Eine Marktstudie im Krisenmanagement. In M. Eibl & M. Gaedke (Eds.), INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Bonn.
Khayat, M. (2013). Jihadis’ responses to widespread decline in participation on jihadi forums, increased use of Twitter. MEMRI Inquiry & Analysis, 955.
Klausen, J., Barbieri, E. T., Reichlin-Melnick, A., & Zelin, A. Y. (2012). The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign. Perspectives on Terrorism, 6(1), 36–53.
Klein, D. O., & Wueller, J. R. (2017). Fake news: A legal perspective. Journal Of Internet Law, 20(10), 6–13.
Mihailidis, P., & Viotty, S. (2017). Spreadable Spectacle in Digital Culture: Civic Expression, Fake News, and the Role of Media Literacies in “Post-Fact” Society. American Behavioral Scientist, 61(4), 441–454. https://doi.org/10.1177/0002764217701217
Müller, P. D., & Denner, N. (2017). Was tun gegen “Fake News”? Retrieved from https://www.freiheit.org/sites/default/files/uploads/2017/06/16/a4fakenews.pdf
Narwal, V., Salih, M. H., Lopez, J. A., Ortega, A., O’Donovan, J., Höllerer, T., & Savage, S. (2017). Automated Assistants to Identify and Prompt Action on Visual News Bias. In Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2796–2801). New York, NY: ACM Press. https://doi.org/10.1145/3027063.3053227
Neer, T., & O’Toole, M. E. (2014). The Violence of the Islamic State of Syria (ISIS): A Behavioral Perspective. Violence and Gender, 1(4), 145–156. https://doi.org/10.1089/vio.2014.0037
Neue Wege des Lernens e.V. (2017). Fake News Check. Retrieved from https://www.neue-wege-deslernens.de/2017/03/19/fake-news-check-mit-dem-smartphone/
Newman, M. L., Pennebaker, J. W., Berry, D. S., & Richards, J. M. (2003). Lying Words: Predicting Deception From Linguistic Styles. Society for Personality and Social Psychology, Inc., 29(5), 665–675. https://doi.org/10.1177/0146167203251529
Palen, L., & Hughes, A. L. (2018). Social Media in Disaster Communication. In H. Rodríguez, W. Donner, & J. E. Trainor (Eds.), Handbook of Disaster Research (pp. 497–518). Cham, Germany: Springer International Publishing. https://doi.org/10.1007/978-3-319-63254-4_24
Pew Research Center. (2018). Social Media Bots Draw Public’s Attention and Concern. Retrieved from http://www.journalism.org/2018/10/15/social-media-bots-draw-publics-attention-and-concern/
Potter, W. J. (2010). The state of media literacy. Journal of Broadcasting and Electronic Media, 54(4), 675–696. https://doi.org/10.1080/08838151.2011.521462
Ramalingam, D., & Chinnaiah, V. (2018). Fake profile detection techniques in large-scale online social networks: A comprehensive review. Computers & Electrical Engineering, 65, 165–177. https://doi.org/10.1016/j.compeleceng.2017.05.020
Reuter, C., Hartwig, K., Kirchner, J., & Schlegel, N. (2019). Fake News Perception in Germany: A Representative Study of People’s Attitudes and Approaches to Counteract Disinformation. In Proceedings of the International Conference on Wirtschaftsinformatik (WI). Siegen.
Reuter, C., Hughes, A. L., & Kaufhold, M.-A. (2018). Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research. International Journal on Human-Computer Interaction (IJHCI), 34(4), 280–294. https://doi.org/10.1080/10447318.2018.1427832
Reuter, C., & Kaufhold, M.-A. (2018). Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics. Journal of Contingencies and Crisis Management (JCCM), 26, 1–17.
Reuter, C., Ludwig, T., Kaufhold, M.-A., & Pipek, V. (2015). XHELP: Design of a Cross-Platform Social-Media Application to Support Volunteer Moderators in Disasters. In Proceedings of the Conference on Human Factors in Computing Systems (CHI) (pp. 4093–4102). Seoul, Korea: ACM Press. http://dx.doi.org/10.1145/2702123.2702171
Reuter, C., Pätsch, K., & Runft, E. (2017). IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study. I-Com: Journal of Interactive Media, 16(2), 181–195. Retrieved from http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf
Robinson, T., Callahan, C., Boyle, K., Rivera, E., & Cho, J. K. (2017). I ♥ FB: A Q-Methodology Analysis of Why People ‘Like’’ Facebook.’ International Journal of Virtual Communities and Social Networking (IJVCSN), 9(2), 46–61. https://doi.org/10.4018/IJVCSN.2017040103
Rubin, V. L., Chen, Y., & Conroy, N. J. (2015). Deception Detection for News: Three Types of Fake News. Proceedings of the Association for Information Science and Technology, 52(1), 1–4. https://doi.org/10.1002/pra2.2015.145052010083
Saez-Trumper, D. (2014). Fake Tweet Buster: A Webtool to identify Users Promoting Fake News Ontwitter. In Proceedings of the ACM conference on Hypertext and social media (pp. 316–317). New York, NY: ACM Press. https://doi.org/10.1145/2631775.2631786
Saltman, E. M., & Russell, J. (2014). White Paper – The role of prevent in countering online extremism. Quilliam. Retrieved from https://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/white-paper-the-role-of-prevent-in-countering-online-extremism.pdf
Sängerlaub, A. (2017a). Deutschland vor der Bundestagswahl: Überall Fake News?! Berlin, Germany: Stiftung Neue Verantwortung. Retrieved from https://www.stiftung-nv.de/sites/default/files/fakenews.pdf
Sängerlaub, A. (2017b). Verzerrte Realitäten: „Fake News“ im Schatten der USA und der Bundestagswahl. Berlin, Germany: Stiftung Neue Verantwortung. Retrieved from https://www.stiftungnv.de/de/publikation/verzerrte-realitaeten-fake-news-im-schatten-der-usa-und-der-bundestagswahl
Soden, R., & Palen, L. (2018). Informating Crisis: Expanding Critical Perspectives in Crisis Informatics. In Proceedings of the ACM on Human-Computer Interaction.
Stein, T., Chen, E., & Mangla, K. (2011). Facebook immune system. Proceedings of the 4th Workshop on Social Network Systems, m(5), 1–8. https://doi.org/10.1145/1989656.1989664
Stieglitz, S., Brachten, F., Ross, B., & Jung, A.-K. (2017). Do Social Bots Dream of Electric Sheep? A Categorisation of Social Media Bot Accounts. Proceedings of the Australasian Conference on Information Systems, 1–11.
Stieglitz, S., Mirbabaie, M., Ross, B., & Neuberger, C. (2018). Social media analytics – Challenges in topic discovery, data collection, and data preparation. International Journal of Information Management, 39, 156–168. https://doi.org/10.1016/j.ijinfomgt.2017.12.002
Sutton, J., Palen, L., & Shklovski, I. (2008). Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires. In Proceedings of the 14th International ISCRAM Conference (pp. 624–632). Brussels, Belgium: ISCRAM.
Torok, R. (2015). ISIS and the Institution of Online Terrorist Recruitment. Retrieved from https://www.mei.edu/publications/isis-and-institution-online-terrorist-recruitment
Trang, D., Johansson, F., & Rosell, M. (2015). Evaluating Algorithms for Detection of Compromised Social Media User Accounts. Proceedings - 2nd European Network Intelligence Conference, ENIC 2015, 75–82. https://doi.org/10.1109/ENIC.2015.19
Turk, A. T. (2015). Terrorism and Counterterrorism. In E. Goode (Ed.), The Handbook of Deviance (pp. 537–548). Hoboken, NJ: John Wiley & Sons, Inc. https://doi.org/10.1002/9781118701386.ch30
Vieweg, S., Hughes, A. L., Starbird, K., & Palen, L. (2010). Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. In In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) (pp. 1079–1088). New York, NY: ACM. https://doi.org/10.1145/1753326.1753486
Viviani, M., & Pasi, G. (2017). Credibility in social media: opinions, news, and health information—a survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1209--n/a. https://doi.org/10.1002/widm.1209
Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., & Zhao, B. Y. (2011). Serf and Turf: Crowdturfing for Fun and Profit. Arxiv Preprint ArXiv:1111.5654, 10. https://doi.org/10.1145/2187836.2187928
Webel, C., & Galtung, J. (2007). Negotiation and international conflict. In Handbook of Peace and Conflict (pp. 35–50). Abingdon: Routledge. https://doi.org/10.4324/9780203089163.ch3
Weimann, G. (2016). The Emerging Role of Social Media in the Recruitment of Foreign Fighters. In A. de Guttry, F. Capone, & C. Paulussen (Eds.), Foreign Fighters under International Law and Beyond (pp. 77–95). The Hague: T.M.C. Asser Press. https://doi.org/10.1007/978-94-6265-099-2_6
Weimann, G., & Jost, J. (2015). Neuer Terrorismus und Neue Medien. Zeitschrift Für Außen- Und Sicherheitspolitik, 8(3), 369–388. https://doi.org/10.1007/s12399-015-0493-5
Wendling, M. (2018). The (almost) complete history of “fake news.” Retrieved from https://www.bbc.com/news/blogs-trending-42724320
Werkner, I.-J. (2017). Zum Friedensbegriff in der Friedensforschung. In I.-J. Werkner & K. Ebeling (Eds.), Handbuch Friedensethik (pp. 19–32). Springer Fachmedien.
Wohn, D. Y., Fiesler, C., Hemphill, L., De Choudhury, M., & Matias, J. N. (2017). How to Handle Online Risks? Discussing Content Curation and Moderation in Social Media. In CHI 2017 Extended Abstracts (pp. 1271–1276). https://doi.org/10.1145/3027063.3051141
Wu, X., Fan, W., Gao, J., Feng, Z. M., & Yu, Y. (2015). Detecting Marionette Microblog Users for Improved Information Credibility. Journal of Computer Science and Technology, 30(5), 1082–1096. https://doi.org/10.1007/s11390-015-1584-4
Wulf, V., Aal, K., Ktesh, I. A., Atam, M., Schubert, K., Yerousis, G. P., … Rohde, M. (2013). Fighting against the Wall : Social Media use by Political Activists in a Palestinian Village. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). Paris, France: ACM.
Yan, G. (2013). Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. Computer Networks, 57(2), 540–555. https://doi.org/10.1016/j.comnet.2012.07.016
Ziegele, M., Breiner, T., & Quiring, O. (2014). What Creates Interactivity in Online News Discussions? An Exploratory Analysis of Discussion Factors in User Comments on News Items. Journal of Communication, 64(6), 1111–1138. https://doi.org/10.1111/jcom.12123
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Kaufhold, MA., Reuter, C. (2019). Cultural Violence and Peace in Social Media. In: Reuter, C. (eds) Information Technology for Peace and Security. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-25652-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-658-25652-4_17
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-25651-7
Online ISBN: 978-3-658-25652-4
eBook Packages: Computer Science and Engineering (German Language)