By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Hacktivists Take on Misinformation in a New Internet Age | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Hacktivists Take on Misinformation in a New Internet Age | HackerNoon
Computing

Hacktivists Take on Misinformation in a New Internet Age | HackerNoon

News Room
Last updated: 2025/05/07 at 9:58 PM
News Room Published 7 May 2025
Share
SHARE

Authors:

(1) Filipo Sharevski, DePaul University;

(2) Benjamin Kessell, DePaul University.

Table of Links

Abstract and Introduction

2 Internet Activism and Social Media

2.1 Hashtag Activism

2.2 Hacktivism

3 Internet Activism and Misinformation

3.1 Grassroots Misinformation Operations

3.2 Mainstream Misinformation Operations

4 Hacktivism and Misinformation

4.1 Research Questions and 4.2 Sample

4.3 Methods and Instrumentation

4.4 Hacktivists’ Profiles

5 Misinformation Conceptualization and 5.1 Antecedents to Misinformation

5.2 Mental Models of Misinformation

6 Active Countering of Misinformation and 6.1 Leaking, Doxing, and Deplatforming

6.2 Anti-Misinformation “Ops”

7 Misinformation Evolution and 7.1 Counter-Misinformation Tactics

7.2 Misinformation Literacy

7.3 Misinformation hacktivism

8 Discussion

8.1 Implications

8.2 Ethical Considerations

8.3 Limitations and 8.4 Future Work

9 Conclusion and References

8.3 Limitations

Our research was limited in its scope to U.S. hacktivists, therefore we exercise caution to the generalization of the results across the entire Internet activist community worldwide. Many hacktivist operations are often in the center of debates regarding the dimensions of civil disobedience, political participation, legality, and the ethical use of Internet technologies [105]. Our results pertain neither to append the permissiveness nor the disapproval of the these operations, rather, to voice the opinion of the hacktivists as the unique and engaged Internet minority. Even with such a relatively small sample we gathered in our study, we got a wide variety of insights to which many other hacktivists could well disagree and propose other models, approaches, and visions of dealing with misinformation.

We are aware that our results represent the contextualization informed by all forms of misinformation that currently exist on social media. Therefore, we are careful to avoid any predictive use of our results in future misinformation campaigns. Importantly, we do not know if, when, and how the hacktivists in our sample used the proposed counter-misinformation tools, tactics, and procedures. Our results do not provide blanket justification for any frivolous use of them across social media and any other online spaces. We note that this study reported on the evolving experience of dealing with misinformation by hacktivists and might miss some important aspects of meting out the truth on social media. We advise caution to this, as we see our work as a synergistic line of scientific inquiry addresses an important gap in voicing the opinions of those that actually introduced the means for mass producing of misinformation online in the first place.

8.4 Future Work

Our future research will continue to trace the way the hacktivist community engages with misinformation. We are interested to expand our work beyond U.S. and work with hacktivists across the globe, as misinformation is contextual to the geopolitical makings in the space where many of them operate. We are set to further explore the intersection between hashtag activism and hacktivism for the same cause of countering misinformation as such synergistic activities do already emerge in some form, as the case with the #NAFO campaign on Twitter. Here, we would devote much attention to the new misinformation “battlefield” of platforms for short videos such as TikTok and Instagram. It would be useful to study the emergent circumstances in which misinformation hacktivism mobilizes and empowers ordinary users to join future “Troll [target] Day” operations and catalogue their experiences with such participation. Of equal importance, too, would be to further study the use of “misinformation-against-(mis)information” as in the case of #OpJane to learn both the benevolent and potentially malevolent aspects of this approach.

9 Conclusion

Reflecting the communitarian ideals of free information and disobedience to authority, the hacktivists in our study showed a determination for a radical response against the reprehensible act of spreading falsehoods on social media. As misinformation is consequential to the trolling and memes of the early days of hacktivism, it is appreciative to learn that the contemporary hacktivists are outwardly against such a nefarious appropriation of their aesthetics. It is encouraging to reveal that hacktivists also advocate for general misinformation literacy as a strategic asset against an undemocratic Internet. These findings, we hope, will empower ordinary users who share the same action space in reprobating misinformers for the sake of maintaining the vision of democratic Internet.

References

[1] Shiza Ali, Mohammad Hammas Saeed, Esraa Aldreabi, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, and Gianluca Stringhini. Understanding the effect of deplatforming on social networks. In 13th ACM Web Science Conference 2021, WebSci ’21, page 187–195, New York, NY, USA, 2021. Association for Computing Machinery.

[2] Jennifer Allen, Cameron Martel, and David G Rand. Birds of a feather don’t fact-check each other: Partisanship and the evaluation of news in twitter’s birdwatch crowdsourced fact-checking program. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, CHI ’22, New York, NY, USA, 2022. Association for Computing Machinery.

[3] Omar Alonso, Vasileios Kandylas, Serge-Eric Tremblay, Jake M Hofman, and Siddhartha Sen. What’s happening and what happened: Searching the social web. In Proceedings of the 2017 ACM on Web Science Conference, pages 191–200, 2017.

[4] Janna Anderson and Lee Rainie. The future of truth and misinformation online. 2017.

[5] Anonymous. Operation jane initiated. we’re totally going to mess with texas. #anonymous, 2021.

[6] Ahmer Arif, Leo Graiden Stewart, and Kate Starbird. Acting the part: Examining information operations within# blacklivesmatter discourse. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW):1– 27, 2018.

[7] JP Armstrong. Twitter as a channel for frame diffusion? hashtag activism and the virality of# heterosexualprideday. Rise of the Far Right: Technologies of Recruitment and Mobilization, page 87, 2021.

[8] Corey H. Basch, Zoe Meleo-Erwin, Joseph Fera, Christie Jaime, and Charles E. Basch. A global pandemic in the time of viral memes: Covid-19 vaccine misinformation and disinformation on tiktok. Human Vaccines & Immunotherapeutics, 17(8):2373–2377, 2021.

[9] Ross W. Bellaby. An ethical framework for hacking operations. Ethical Theory and Moral Practice, 24(1):231–255, 2021.

[10] Yochai Benkler, Robert Faris, and Hal Roberts. Network propaganda: Manipulation, disinformation, and radicalization in American politics. Oxford University Press, 2018.

[11] Davide Beraldo. Unfolding #anonymous on twitter: The networks behind the mask. First Monday, 27(1), 2023/01/20 2022.

[12] Jonathan Bishop. Trolling for the lulz?: using media theory to understand transgressive humor and other internet trolling in online communities. In Transforming politics and policy in the digital age, pages 155–172. IGI Global, 2014.

[13] Amanda S. Bradshaw. #doctorsspeakup: Exploration of hashtag hijacking by anti-vaccine advocates and the influence of scientific counterpublics on twitter. Health Communication, 0(0):1–11, 2022.

[14] Jack Brewster, Lorenzo Arvanitis, Valerie Pavilonis, and Macrina Wang. Beware the ‘new google:’ tiktok’s search engine pumps toxic misinformation to its young users, 2022.

[15] David Bromell. Deplatforming and Democratic Legitimacy, pages 81–109. Springer International Publishing, Champaigne, 2022.

[16] Victoria Carty. Social Movements and New Technology. Taylor and Francis, 2018.

[17] Jin-Hee Cho, Scott Rager, John O’Donovan, Sibel Adali, and Benjamin D. Horne. Uncertainty-based false information propagation in social networks. Trans. Soc. Comput., 2(2), jun 2019.

[18] Miyoung Chong. Discovering fake news embedded in the opposing hashtag activism networks on twitter: #gunreformnow vs. #nra. Open Information Science, 3(1):137–153, 2019.

[19] Matteo Cinelli, Walter Quattrociocchi, Alessandro Galeazzi, Carlo Michele Valensise, Emanuele Brugnoli, Ana Lucia Schmidt, Paola Zola, Fabiana Zollo, and Antonio Scala. The covid-19 social media infodemic. Scientific reports, 10(1):1–10, 2020.

[20] E Gabriella Coleman. Logics and legacy of anonymous. Second International Handbook of Internet Research, pages 145–166, 2020.

[21] Gabriella Coleman. Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso books, 2014.

[22] Christopher T Conner and Nicholas MacMurray. The perfect storm: A subcultural analysis of the q-anon movement. Critical Sociology, 48(6):1049–1071, 2022.

[23] Ellen Cornelius. Anonymous hacktivism: Flying the flag of feminist ethics for the ukraine it army. 2022.

[24] John Corner. Fake news, post-truth and media–political change, 2017.

[25] Brian Creech. Fake news and the discursive construction of technology companies’ social power. Media, Culture & Society, 42(6):952–968, 2020.

[26] Michael Dahan. Hacking for the homeland: Patriotic hackers versus hacktivists. In Proceedings of the 8th International Conference on Information Warfare and Security (Iciw-2013), pages 51–57, 2013.

[27] Philipp Darius and Fabian Stephany. How the far-right polarises twitter: ‘hashjacking’ as a disinformation strategy in times of covid-19. In Rosa Maria Benito, Chantal Cherifi, Hocine Cherifi, Esteban Moro, Luis M. Rocha, and Marta Sales-Pardo, editors, Complex Networks & Their Applications X, pages 100–111, Cham, 2022. Springer International Publishing.

[28] Glenn Diesen. Conclusion: Anti-Russian Propaganda of a West in Relative Decline, pages 255–258. Springer Nature Singapore, Singapore, 2022.

[29] Renee DiResta, Kris Shaffer, Becky Ruppel, David Sullivan, Robert Matney, Ryan Fox, Jonathan Albright, and Ben Johnson. The tactics & tropes of the internet research agency. 2019.

[30] Ullrich K. H. Ecker, Stephan Lewandowsky, John Cook, Philipp Schmid, Lisa K. Fazio, Nadia Brashier, Panayiota Kendeou, Emily K. Vraga, and Michelle A. Amazeen. The psychological drivers of misinformation belief and its resistance to correction. Nature Reviews Psychology, 1(1):13–29, 2022.

[31] Abbas Ehsanfar and Mo Mansouri. Incentivizing the dissemination of truth versus fake news in social networks. In 2017 12th System of Systems Engineering Conference (SoSE), pages 1–6, 2017.

[32] Luca Follis and Adam Fish. 3 When to Hack, pages 73–111. 2020.

[33] Deen Freelon, Alice Marwick, and Daniel Kreiss. False equivalencies: Online activism from left to right. Science, 369(6508):1197–1201, 2020.

[34] Deen Freelon, Charlton D McIlwain, and Meredith Clark. Beyond the hashtags:# ferguson,# blacklivesmatter, and the online struggle for offline justice. Center for Media & Social Impact, American University, Forthcoming, 2016.

[35] Gordon Gauchat. Politicization of science in the public sphere: A study of public trust in the united states, 1974 to 2010. American sociological review, 77(2):167–187, 2012.

[36] Jordana J. George and Dorothy E. Leidner. From clicktivism to hacktivism: Understanding digital activism. Information and Organization, 29(3):100249, 2019.

[37] Paolo Gerbaudo. From cyber-autonomism to cyberpopulism: An ideological history of digital activism. tripleC: Communication, Capitalism & Critique, 15(2):477–489, May 2017.

[38] Claire Goforth. ‘anonymous’ hackers have a message for texas abortion ‘snitch’ sites: We’re coming for you, 2021.

[39] Luke Goode. Anonymous and the political ethos of hacktivism. Popular Communication, 13(1):74–86, 2015.

[40] Atilla Hallsby. Psychoanalysis against wikileaks: resisting the demand for transparency. Review of Communication, 20(1):69–86, 2020.

[41] Max Halupka. Clicktivism: A systematic heuristic. Policy & Internet, 6(2):115–132, 2014.

[42] Jason Hannan. Trolling ourselves to death? social media and post-truth politics. European Journal of Communication, 33(2):214–226, 2018.

[43] Masayuki Hatta. Cowboys and the eternal september transfiguration of hacker aesthetics. Annals of Business Administrative Science, page 0210923a, 2021.

[44] Nolan Higdon, Emil Marmol, and Mickey Huff. Returning to neoliberal normalcy: Analysis of legacy news media’s coverage of the biden presidency’s first hundred days. In The Future of the Presidency, Journalism, and Democracy, pages 255–273. Routledge, 2022.

[45] Matthew Hindman and Vlad Barash. Disinformation, ‘fake news’ and influence campaigns on twitter. 2018.

[46] Philip N Howard, Bharath Ganesh, Dimitra Liotsiou, John Kelly, and Camille François. The ira, social media and political polarization in the united states, 2012- 2018. 2019.

[47] Laura Illia. Passage to cyberactivism: how dynamics of activism change. Journal of public affairs., 3(4), 2003-11.

[48] Jane Im, Eshwar Chandrasekharan, Jackson Sargent, Paige Lighthammer, Taylor Denby, Ankit Bhargava, Libby Hemphill, David Jurgens, and Eric Gilbert. Still out there: Modeling and identifying russian troll accounts on twitter. In 12th ACM Conference on Web Science, WebSci ’20, page 1–10, New York, NY, USA, 2020. Association for Computing Machinery.

[49] Leanna Ireland. We are all (not) anonymous: Individual- and country-level correlates of support for and opposition to hacktivism. New Media & Society, 0(0):14614448221122252, 0.

[50] Peter Jachim, Filipo Sharevski, and Emma Pieroni. Trollhunter2020: Real-time detection of trolling narratives on twitter during the 2020 us elections. In Proceedings of the 2021 ACM workshop on security and privacy analytics, pages 55–65, 2021.

[51] Peter Jachim, Filipo Sharevski, and Paige Treebridge. Trollhunter [evader]: Automated detection [evasion] of twitter trolls during the covid-19 pandemic. In New Security Paradigms Workshop 2020, NSPW ’20, page 59–75, New York, NY, USA, 2021. Association for Computing Machinery.

[52] S.J. Jackson, M. Bailey, B.F. Welles, and G. Lauren. #HashtagActivism: Networks of Race and Gender Justice. MIT Press, 2020.

[53] Keenan Jones, Jason R. C. Nurse, and Shujun Li. Behind the mask: A computational study of anonymous’ presence on twitter. Proceedings of the International AAAI Conference on Web and Social Media, 14(1):327– 338, May 2020.

[54] Keenan Jones, Jason R.C. Nurse, and Shujun Li. Out of the shadows: Analyzing anonymous’ twitter resurgence during the 2020 black lives matter protests. Proceedings of the International AAAI Conference on Web and Social Media, 16(1):417–428, May 2022.

[55] S Mo Jones-Jang, Tara Mortensen, and Jingjing Liu. Does media literacy help identification of fake news? information literacy helps, but other literacies don’t. American behavioral scientist, 65(2):371–388, 2021.

[56] Andreas Jungherr, Gonzalo Rivero, and Daniel GayoAvello. Retooling Politics: How Digital Media Are Shaping Democracy. Cambridge University Press, 2020.

[57] Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J Nathan Matias, and Jonathan R Mayer. Adapting security warnings to counter online disinformation. In USENIX Security Symposium, pages 1163–1180, 2021.

[58] Vasileios Karagiannopoulos. A Short History of Hacktivism: Its Past and Present and What Can We Learn from It, pages 63–86. Springer International Publishing, Cham, 2021.

[59] Athina Karatzogianni. Firebrand waves of digital activism 1994-2014: The rise and spread of hacktivism and cyberconflict. Springer, 2015.

[60] Matthew D Kearney, Shawn C Chiang, and Philip M Massey. The twitter origins and evolution of the covid19 “plandemic” conspiracy theory. Harvard Kennedy School Misinformation Review, 1(3), 2020.

[61] Vance D. Keyes and Latocia Keyes. Dynamics of an american countermovement: Blue lives matter. Sociology Compass, 16(9):e13024, 2022.

[62] Allison Klempka and Arielle Stimson. Anonymous communication on the internet and trolling. Concordia Journal of Communication Research, 1(1):2, 2014.

[63] Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, and Michael Bailey. Designing toxic content classification for a diversity of perspectives. In SOUPS@ USENIX Security Symposium, pages 299– 318, 2021.

[64] Micah Lee. Hack of 251 Law Enforcement Webiste Exposes Personal Data of 700,000 Cops. 2020.

[65] Steven Levy. Hackers: Heroes of the Computer Revolution – 25th Anniversary Edition. O’Reilly Media, Inc., 1st edition, 2010.

[66] Stephan Lewandowsky, John Cook, Ullrich Ecker, Dolores Albarracin, Michelle Amazeen, Panayiota Kendou, Doug Lombardi, E Newman, Gordon Pennycook, Ethan Porter, et al. The Debunking Handbook 2020. 2020.

[67] Stephan Lewandowsky, Ullrich K.H. Ecker, and John Cook. Beyond misinformation: Understanding and coping with the “post-truth” era. Journal of Applied Research in Memory and Cognition, 6(4):353–369, 2017.

[68] Stephan Lewandowsky and Sander van der Linden. Countering misinformation and fake news through inoculation and prebunking. European Review of Social Psychology, 32(2):348–384, 2021.

[69] Simon Lindgren. Movement mobilization in the age of hashtag activism: Examining the challenge of noise, hate, and disengagement in the #metoo campaign. Policy & Internet, 11(4):418–438, 2019.

[70] Alexander J Lindvall. Political hacktivism: doxing & the first amendment. Creighton L. Rev., 53:1, 2019.

[71] Darren L. Linvill and Patrick L. Warren. Troll factories: Manufacturing specialized disinformation on twitter. Political Communication, 37(4):447–467, 2020.

[72] Ioana Literat, Lillian Boxman-Shabtai, and Neta Kligler-Vilenchik. Protesting the protest paradigm: Tiktok as a space for media criticism. The International Journal of Press/Politics, 0(0):19401612221117481, 0.

[73] Clare Llewellyn, Laura Cram, Adrian Favero, and Robin L. Hill. Russian troll hunting in a brexit twitter archive. In Proceedings of the 18th ACM/IEEE on Joint Conference on Digital Libraries, JCDL ’18, page 361–362, New York, NY, USA, 2018. Association for Computing Machinery.

[74] Martha McCaughey and Michael D Ayers. Cyberactivism: Online activism in theory and practice. Psychology Press, 2003.

[75] Ty McCormick. Anthropology of an idea hacktivism. Foreign Policy, (200):24–25, May/Jun 2013.

[76] Ally McCrow-Young and Mette Mortensen. Countering spectacles of fear: Anonymous’ meme ‘war’ against isis. European Journal of Cultural Studies, 24(4):832–849, 2021.

[77] Virginia McGovern and Francis Fortin. The anonymous collective: Operations and gender differences. Women & Criminal Justice, 30(2):91–105, 2020.

[78] Lee McIntyre. Post-truth. MIT Press, 2018. [79] Paul Mihailidis and Samantha Viotty. Spreadable spectacle in digital culture: Civic expression, fake news, and the role of media literacies in “post-fact” society. American behavioral scientist, 61(4):441–454, 2017.

[80] Stefania Milan. Social movements and their technologies: Wiring social change. Springer, 2013.

[81] Stefania Milan. Hacktivism as a radical media practice. In The Routledge companion to alternative and community media, pages 550–560. Routledge, 2015.

[82] Ryan M Milner. The world made meme: Public conversations and participatory media. MIT Press, 2018.

[83] Rachel E. Moran and Stephen Prochaska. Misinformation or activism?: analyzing networked moral panic through an exploration of #savethechildren. Information, Communication & Society, 0(0):1–21, 2022.

[84] Mette Mortensen and Christina Neumayer. The playful politics of memes. Information, Communication & Society, 24(16):2367–2377, 2021.

[85] Eni Mustafaraj and Panagiotis Takis Metaxas. The fake news spreading plague: Was it preventable? In Proceedings of the 2017 ACM on Web Science Conference, WebSci ’17, page 235–239, New York, NY, USA, 2017. Association for Computing Machinery.

[86] Mahdi M. Najafabadi and Robert J. Domanski. Hacktivism and distributed hashtag spoiling on twitter: Tales of the #irantalks. First Monday, 23(4), Apr. 2018.

[87] Asaf Nissenbaum and Limor Shifman. Internet memes as contested cultural capital: The case of 4chan’s/b/board. New media & society, 19(4):483–501, 2017.

[88] Taylor Owen. Disruptive power: The crisis of the state in the digital age. Oxford Studies in Digital Politics, 2015.

[89] Gordon Pennycook and David G. Rand. Lazy, not biased: Susceptibility to partisan fake news is better explained by lack of reasoning than by motivated reasoning. Cognition, 188:39–50, 2019. The Cognitive Science of Political Thought.

[90] Gordon Pennycook and David G. Rand. The psychology of fake news. Trends in Cognitive Sciences, 25(5):388–402, 2021.

[91] W. Phillips and R.M. Milner. The Ambivalent Internet: Mischief, Oddity, and Antagonism Online. Polity Press, 2017.

[92] Whitney Phillips. The house that fox built: Anonymous, spectacle, and cycles of amplification. Television & New Media, 14(6):494–509, 2013.

[93] Man pui Sally Chan, Christopher R. Jones, Kathleen Hall Jamieson, and Dolores Albarracín. Debunking: A meta-analysis of the psychological efficacy of messages countering misinformation. Psychological Science, 28(11):1531–1546, 2017.

[94] David Redding, Jian Ang, and Suman Bhunia. A case study of massive api scrapping: Parler data breach after the capitol riot. In 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech), pages 1–7, 2022.

[95] Eugenia Ha Rim Rho and Melissa Mazmanian. Political hashtags & the lost art of democratic discourse. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI ’20, page 1–13, New York, NY, USA, 2020. Association for Computing Machinery.

[96] Daniel R´’ochert, Gautam Kishore Shahi, German Neubaum, Björn Ross, and Stefan Stieglitz. The networked context of covid-19 misinformation: Informational homogeneity on youtube at the beginning of the pandemic. Online Social Networks and Media, 26:100164, 2021.

[97] Mark Rolfe. Hacker: Creating the Narrative of the Digital Robin Hood, pages 135–164. Springer Singapore, 2016.

[98] Marco Romagna. Hacktivism: Conceptualization, Techniques, and Historical View, pages 743–769. Springer International Publishing, Cham, 2020.

[99] Dana Rotman, Sarah Vieweg, Sarita Yardi, Ed Chi, Jenny Preece, Ben Shneiderman, Peter Pirolli, and Tom Glaisyer. From slacktivism to activism: Participatory culture in the age of social media. In CHI ’11 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’11, page 819–822, New York, NY, USA, 2011. Association for Computing Machinery.

[100] Rodrigo Sandoval-Almazan and J. Ramon Gil-Garcia. Towards cyberactivism 2.0? understanding the use of social media and other information technologies for political activism and social movements. Government Information Quarterly, 31(3):365–378, 2014.

[101] Madelyn R Sanfilippo, Shengnan Yang, and Pnina Fichman. Managing online trolling: From deviant to social and political trolls. In 50th Annual Hawaii International Conference on System Sciences, HICSS 2017, pages 1802–1811. IEEE Computer Society, 2017.

[102] Saiph Savage, Andres Monroy-Hernandez, and Tobias Höllerer. Botivist: Calling volunteers to action using online bots. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, CSCW ’16, page 813–822, New York, NY, USA, 2016. Association for Computing Machinery.

[103] Mark Scott. The shit-posting, twitter-trolling, dogdeploying social media army taking on putin one meme at a time, 2022.

[104] Dimitrios Serpanos and Theodoros Komninos. The cyberwarfare in ukraine. Computer, 55(7):88–91, 2022.

[105] Philip Serracino-Inglott. Is it ok to be an anonymous? Ethics & Global Politics, 6(4):22527, 2013.

[106] Lanyu Shang, Ziyi Kou, Yang Zhang, and Dong Wang. A multimodal misinformation detector for covid-19 short videos on tiktok. In 2021 IEEE International Conference on Big Data (Big Data), pages 899–908, 2021.

[107] Filipo Sharevski, Amy Devine, Peter Jachim, and Emma Pieroni. “Gettr-ing” User Insights from the Social Network Gettr, 2022. https://truthandtr ustonline.com/wp-content/uploads/2022/10 /TTO_2022_proceedings.pdf.

[108] Filipo Sharevski, Amy Devine, Peter Jachim, and Emma Pieroni. Meaningful context, a red flag, or both? preferences for enhanced misinformation warnings among us twitter users. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC ’22, page 189–201, New York, NY, USA, 2022. Association for Computing Machinery. https: //doi.org/10.1145/3549015.3555671.

[109] Filipo Sharevski, Amy Devine, Emma Pieroni, and Peter Jachim. Folk models of misinformation on social media. In Network and distributed system security symposium, 2023.

[110] Filipo Sharevski, Alice Huff, Peter Jachim, and Emma Pieroni. (mis)perceptions and engagement on twitter: Covid-19 vaccine rumors on efficacy and mass immunization effort. International Journal of Information Management Data Insights, 2(1):100059, 2022.

[111] Filipo Sharevski, Peter Jachim, Emma Pieroni, and Nate Jachim. Voxpop: An experimental social media platform for calibrated (mis)information discourse. In New Security Paradigms Workshop, NSPW ’21, page 88–107, New York, NY, USA, 2021. Association for Computing Machinery.

[112] Filipo Sharevski, Jennifer Vander Loop, Peter Jachim, Amy Devine, and Emma Pieroni. Abortion misinformation on tiktok: Rampant content, lax moderation, and vivid user experiences. arXiv preprint arXiv:2301.05128, 2023.

[113] Filipo Sharevski, Paige Treebridge, Peter Jachim, Audrey Li, Adam Babin, and Jessica Westbrook. Socially engineering a polarizing discourse on facebook through malware-induced misperception. International Journal of Human–Computer Interaction, 38(17):1621– 1637, 2022.

[114] Micah L Sifry. WikiLeaks and the Age of Transparency. OR Books, 2011.

[115] Ellen Simpson. Integrated & alone: The use of hashtags in twitter social activism. In Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW ’18, page 237–240, New York, NY, USA, 2018. Association for Computing Machinery.

[116] Edward Snowden. Permanent record. Pan Macmillan, 2019.

[117] Tom Sorell. Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous. Journal of Human Rights Practice, 7(3):391–410, 09 2015.

[118] Kevin F Steinmetz. Hacking and hacktivism. Shades of Deviance: A Primer on Crime, Deviance and Social Harm, 19, 2022.

[119] Leo G Stewart, Ahmer Arif, and Kate Starbird. Examining trolls and polarization with a retweet network. In Proc. ACM WSDM, workshop on misinformation and misbehavior mining on the web, volume 70, 2018.

[120] Briony Swire-Thompson, Ullrich KH Ecker, Stephan Lewandowsky, and Adam J Berinsky. They might be a liar but they’re my liar: Source evaluation and the prevalence of misinformation. Political psychology, 41(1):21–34, 2020.

[121] Leonie Maria Tanczer. Hacktivism and the male-only stereotype. New Media & Society, 18(8):1599–1615, 2016.

[122] William Theisen, Joel Brogan, Pamela Bilo Thomas, Daniel Moreira, Pascal Phoa, Tim Weninger, and Walter Scheirer. Automatic discovery of political meme genres with diverse appearances. Proceedings of the International AAAI Conference on Web and Social Media, 15(1):714–726, May 2021.

[123] TikTok. Tiktok safety, 2022.

[124] Justus Uitermark. Complex contention: analyzing power dynamics within anonymous. Social Movement Studies, 16(4):403–417, 2017.

[125] Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, and Bonnie Brinton Anderson. The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), Santa Clara, CA, August 2019. USENIX Association.

[126] Courtland VanDam and Pang-Ning Tan. Detecting hashtag hijacking from twitter. In Proceedings of the 8th ACM Conference on Web Science, WebSci ’16, page 370–371, New York, NY, USA, 2016. Association for Computing Machinery.

[127] Silvio Waisbord. Truth is what happens to news. Journalism Studies, 19(13):1866–1878, 2018.

[128] Jared M Wright, Kaitlin Kelly-Thompson, S Laurel Weldon, Dan Goldwasser, Rachel L Einwohner, Valeria Sinclair-Chapman, and Fernando Tormos-Aponte. Drive-by solidarity: Conceptualizing the temporal relationship between# blacklivesmatter and anonymous’s# opkkk. Contention, 10(2):25–55, 2022.

[129] Liang Wu, Fred Morstatter, Kathleen M. Carley, and Huan Liu. Misinformation in social media: Definition, manipulation, and detection. SIGKDD Explor. Newsl., 21(2):80–90, nov 2019.

[130] Yiping Xia, Josephine Lukito, Yini Zhang, Chris Wells, Sang Jung Kim, and Chau Tong. Disinformation, performed: self-presentation of a russian ira account on twitter. Information, Communication & Society, 22(11):1646–1664, 2019.

[131] Weiai Wayne Xu. Mapping connective actions in the global alt-right and antifa counterpublics. International Journal of Communication, 14:22, 2020.

[132] Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, Michael Sirivianos, Gianluca Stringini, and Jeremy Blackburn. What is gab: A bastion of free speech or an alt-right echo chamber. In Companion Proceedings of the Web Conference 2018, pages 1007–1014, 2018.

[133] Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Guillermo Suarez-Tangil. On the origins of memes by means of fringe web communities. In Proceedings of the Internet Measurement Conference 2018, IMC ’18, page 188–202, New York, NY, USA, 2018. Association for Computing Machinery.

[134] Savvas Zannettou, Tristan Caulfield, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, and Jeremy Blackburn. Characterizing the use of images in state-sponsored information warfare operations by russian trolls on twitter. Proceedings of the International AAAI Conference on Web and Social Media, 14(1):774– 785, May 2020.

[135] Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. Who let the trolls out? towards understanding state-sponsored trolls. In Proceedings of the 10th ACM Conference on Web Science, WebSci ’19, pages 353–362, New York, NY, USA, 2019. Association for Computing Machinery.

[136] Melissa Zimdars and Kembrew McLeod. Fake news: understanding media and misinformation in the digital age. MIT Press, 2020.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Opinion | I Teach Computer Science, and That Is All
Next Article Scientists just solved a 70-year old problem with fusion energy
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Google launches ‘implicit caching’ to make accessing its latest AI models cheaper | News
News
Temu Drops Import Changes for Now, but Future for Fast Fashion Giant Remains Murky
News
BingX Unveils ChainSpot: A CeDeFi Innovation for Simpler and Safer On-Chain Trading | HackerNoon
Computing
Coinbase Buys Deribit In Biggest Crypto Deal To Date
News

You Might also Like

Computing

BingX Unveils ChainSpot: A CeDeFi Innovation for Simpler and Safer On-Chain Trading | HackerNoon

4 Min Read
Computing

Optimal Error Scaling of ESPRIT Algorithm Demonstrated | HackerNoon

2 Min Read
Computing

BYD said to be launching cheaper Qin electric sedan amid price war · TechNode

1 Min Read
Computing

Legend, Nigeria’s first publicly listed ISP, has bigger internet plans

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?