{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T12:03:56Z","timestamp":1771589036061,"version":"3.50.1"},"reference-count":107,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T00:00:00Z","timestamp":1461110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000269","name":"Economic and Social Research Council","doi-asserted-by":"crossref","award":["ES\/L013398\/1"],"award-info":[{"award-number":["ES\/L013398\/1"]}],"id":[{"id":"10.13039\/501100000269","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2016,5,5]]},"abstract":"<jats:p>Social media platforms provide an increasingly popular means for individuals to share content online. Whilst this produces undoubted societal benefits, the ability for content to be spontaneously posted and reposted creates an ideal environment for rumour and false\/malicious information to spread rapidly. When this occurs it can cause significant harm and can be characterised as a \u201cdigital wildfire.\u201d In this article, we demonstrate that the propagation and regulation of digital wildfires form important topics for research and conduct an overview of existing work in this area. We outline the relevance of a range of work from the computational and social sciences, including a series of insights into the propagation of rumour and false\/malicious information. We argue that significant research gaps remain\u2014for instance, there is an absence of systematic studies on the effects of digital wildfires and there is a need to combine empirical research with a consideration of how the responsible governance of social media can be determined. We propose an agenda for research that establishes a methodology to explore in full the propagation and regulation of unverified content on social media. This agenda promotes high-quality interdisciplinary research that will also inform policy debates.<\/jats:p>","DOI":"10.1145\/2893478","type":"journal-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T13:53:06Z","timestamp":1461333186000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Digital Wildfires"],"prefix":"10.1145","volume":"34","author":[{"given":"Helena","family":"Webb","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"given":"Rob","family":"Procter","sequence":"additional","affiliation":[{"name":"University of Warwick, Coventry, United Kingdom"}]},{"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"given":"Bernd Carsten","family":"Stahl","sequence":"additional","affiliation":[{"name":"De Montfort University, Leicster, United Kingdom"}]},{"given":"Matthew","family":"Williams","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"given":"William","family":"Housley","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"given":"Adam","family":"Edwards","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"given":"Marina","family":"Jirotka","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,4,20]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1471-7727(01)00006-9"},{"key":"e_1_2_1_2_1","volume-title":"Oracle: The Delphi Method and its Application to Social Policy and Public Health","author":"Adler M.","year":"1996","unstructured":"M. Adler and E. Ziglio (Eds.). 1996 . Gazing into the Oracle: The Delphi Method and its Application to Social Policy and Public Health . Jessica Kingsley Publishers . M. Adler and E. Ziglio (Eds.). 1996. Gazing into the Oracle: The Delphi Method and its Application to Social Policy and Public Health. Jessica Kingsley Publishers."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0058110"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0908800106"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/1944-2866.POI364"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433401"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/17578041211200100"},{"key":"e_1_2_1_9_1","unstructured":"R. Bandari S. Asur and B. A. Huberman. 2012. The pulse of news in social media: Forecasting popularity CoRR. abs\/1202.0332 (2012).  R. Bandari S. Asur and B. A. Huberman. 2012. The pulse of news in social media: Forecasting popularity CoRR. abs\/1202.0332 (2012)."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492599"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"B. Barrat M. Barthelemy and A. Vespignani. 2008. Dynamical Processes on Complex Networks. Cambridge University Press Cambridge.   B. Barrat M. Barthelemy and A. Vespignani. 2008. Dynamical Processes on Complex Networks. Cambridge University Press Cambridge.","DOI":"10.1017\/CBO9780511791383"},{"key":"e_1_2_1_12_1","unstructured":"L. Bassell. 2012. Media and the riots\u2014A call for action citizen journalism educational trust and the latest.com. Retrieved from http:\/\/www.the-latest.com\/riots-and-media-report.  L. Bassell. 2012. Media and the riots\u2014A call for action citizen journalism educational trust and the latest.com. Retrieved from http:\/\/www.the-latest.com\/riots-and-media-report."},{"key":"e_1_2_1_13_1","volume-title":"China punishes 197 over stock market and Tianjin \u2018rumours","author":"BBC NEWS.","year":"2015","unstructured":"BBC NEWS. 2015. China punishes 197 over stock market and Tianjin \u2018rumours \u2019, bbc.co.uk\/news 30 Aug. 2015 . Retrieved 30 August 2015 from http:\/\/www.bbc.co.uk\/news\/world-asia-china-34104114. BBC NEWS. 2015. China punishes 197 over stock market and Tianjin \u2018rumours\u2019, bbc.co.uk\/news 30 Aug. 2015. Retrieved 30 August 2015 from http:\/\/www.bbc.co.uk\/news\/world-asia-china-34104114."},{"key":"e_1_2_1_14_1","volume-title":"Retrieved","author":"Blanchard B.","year":"2015","unstructured":"B. Blanchard , H. Li , and P. Carsten . 2013. China threatens tough punishment for online rumour spreading, reuters.com 9 Sep 2013 (2013) . Retrieved August 17, 2015 from http:\/\/www.reuters.com\/article\/2013\/09\/09\/us-china-internet-idUSBRE9880CQ20130909. B. Blanchard, H. Li, and P. Carsten. 2013. China threatens tough punishment for online rumour spreading, reuters.com 9 Sep 2013 (2013). Retrieved August 17, 2015 from http:\/\/www.reuters.com\/article\/2013\/09\/09\/us-china-internet-idUSBRE9880CQ20130909."},{"key":"e_1_2_1_15_1","volume-title":"Digital Formations","volume":"45","author":"Bruns A.","year":"2008","unstructured":"A. Bruns . 2008 . Blogs, Wikipedia, second life, and beyond: From production to produsage , Digital Formations , Vol. 45 . Peter Lang. A. Bruns. 2008. Blogs, Wikipedia, second life, and beyond: From production to produsage, Digital Formations, Vol. 45. Peter Lang."},{"key":"e_1_2_1_16_1","volume-title":"Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7, 2","author":"Burnap P.","year":"2015","unstructured":"P. Burnap and M. Williams . 2015 . Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7, 2 (2015). P. Burnap and M. Williams. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7, 2 (2015)."},{"key":"e_1_2_1_17_1","volume-title":"Retrieved","author":"Burnap P.","year":"2015","unstructured":"P. Burnap , O. Rana , N. Avis , M. L. Williams , W. Housley , A. Edwards , J. Morgan , and L. Sloan . 2013. Detecting tension in online communities with computational twitter analysis. Technological Forecasting and Social Change. (2013) . Retrieved August 17, 2015 from http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0040162513000899. P. Burnap, O. Rana, N. Avis, M. L. Williams, W. Housley, A. Edwards, J. Morgan, and L. Sloan. 2013. Detecting tension in online communities with computational twitter analysis. Technological Forecasting and Social Change. (2013). Retrieved August 17, 2015 from http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0040162513000899."},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"P. Burnap M. L. Williams L. Sloan O. Rana W. Housley A. Edwards V. Knight R. Procter and A. Voss. 2014. Tweeting the terror: Modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4 1 (2014).  P. Burnap M. L. Williams L. Sloan O. Rana W. Housley A. Edwards V. Knight R. Procter and A. Voss. 2014. Tweeting the terror: Modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4 1 (2014).","DOI":"10.1007\/s13278-014-0206-4"},{"key":"e_1_2_1_19_1","unstructured":"T. W. Bynum and S. Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. Wiley Blackwell New York.   T. W. Bynum and S. Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. Wiley Blackwell New York."},{"key":"e_1_2_1_20_1","volume-title":"SSRN Elibrary 14","author":"Casilli A. A.","year":"2011","unstructured":"A. A. Casilli and P. Tubaro . 2011. Why net censorship in times of political unrest results in more violent uprisings: A social simulation experiment on the UK riots . SSRN Elibrary 14 , ( 2011 ). A. A. Casilli and P. Tubaro. 2011. Why net censorship in times of political unrest results in more violent uprisings: A social simulation experiment on the UK riots. SSRN Elibrary 14, (2011)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.002"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02930-1_31"},{"key":"e_1_2_1_23_1","volume-title":"Folk Devils and Moral Panics the Creation of the Mods and Rockers","author":"Cohen S.","unstructured":"S. Cohen . 1973. Folk Devils and Moral Panics the Creation of the Mods and Rockers . Paladin , London . S. Cohen. 1973. Folk Devils and Moral Panics the Creation of the Mods and Rockers. Paladin, London."},{"key":"e_1_2_1_24_1","volume-title":"An Introduction to Discourse Analysis","author":"Coulthard M.","unstructured":"M. Coulthard . 1977. An Introduction to Discourse Analysis . Longman , London . M. Coulthard. 1977. An Introduction to Discourse Analysis. Longman, London."},{"key":"e_1_2_1_25_1","volume-title":"Retrieved","author":"Service Crown Prosecution","year":"2013","unstructured":"Crown Prosecution Service . 2013 . Guidelines on prosecuting cases involving communications sent via social media, CPS. (2013) . Retrieved March 24, 2015 from http:\/\/www.cps.gov.uk\/legal\/a_to_c\/communications_sent_via_social_media\/. Crown Prosecution Service. 2013. Guidelines on prosecuting cases involving communications sent via social media, CPS. (2013). Retrieved March 24, 2015 from http:\/\/www.cps.gov.uk\/legal\/a_to_c\/communications_sent_via_social_media\/."},{"key":"e_1_2_1_26_1","first-page":"255","article-title":"Political participation via the web: Structural and subjective contingencies. Interactions","volume":"5","author":"Dahlgren P.","year":"2014","unstructured":"P. Dahlgren . 2014 . Political participation via the web: Structural and subjective contingencies. Interactions : Studies in Communication and Culture 5 , 3 (2014), 255 -- 269 . DOI:http:\/\/dx.doi.org\/10.1386\/iscc.5.3.255_1 10.1386\/iscc.5.3.255_1 P. Dahlgren. 2014. Political participation via the web: Structural and subjective contingencies. Interactions: Studies in Communication and Culture 5, 3 (2014), 255--269. DOI:http:\/\/dx.doi.org\/10.1386\/iscc.5.3.255_1","journal-title":"Studies in Communication and Culture"},{"key":"e_1_2_1_27_1","article-title":"Amateur online sleuthing: Does it do more harm than good","author":"Davison J.","year":"2013","unstructured":"J. Davison . 2013 . Amateur online sleuthing: Does it do more harm than good ? CBC News April 19, 2013. Retrieved August 12, 2015 from http:\/\/www.cbc.ca\/news\/technology\/amateur-online-sleuthing-does-it-do-more-harm-than-good-1.1412039. J. Davison. 2013. Amateur online sleuthing: Does it do more harm than good? CBC News April 19, 2013. Retrieved August 12, 2015 from http:\/\/www.cbc.ca\/news\/technology\/amateur-online-sleuthing-does-it-do-more-harm-than-good-1.1412039.","journal-title":"CBC News"},{"key":"e_1_2_1_28_1","volume-title":"Memes: The new replicators. In The Selfish Gene (2nd. ed.)","author":"Dawkins R.","year":"1989","unstructured":"R. Dawkins . 1989 . Memes: The new replicators. In The Selfish Gene (2nd. ed.) . Oxford University Press , Oxford . R. Dawkins. 1989. Memes: The new replicators. In The Selfish Gene (2nd. ed.). Oxford University Press, Oxford."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2011.109"},{"key":"e_1_2_1_30_1","volume-title":"Retrieved","author":"Derczynski L.","year":"2015","unstructured":"L. Derczynski , K. Bontcheva , M. Lukasik , T. Declerck , A. Scharl , G. Georgiev , R. Procter , P. Tolmie , A. Zubiaga , and M. Liakata . 2015. PHEME: Computing Veracity\u2014The Fourth Challenge of Big Social Data (2015) . Retrieved August 16, 2015 from http:\/\/derczynski.com\/sheffield\/papers\/pheme-eswc-pn.pdf. L. Derczynski, K. Bontcheva, M. Lukasik, T. Declerck, A. Scharl, G. Georgiev, R. Procter, P. Tolmie, A. Zubiaga, and M. Liakata. 2015. PHEME: Computing Veracity\u2014The Fourth Challenge of Big Social Data (2015). Retrieved August 16, 2015 from http:\/\/derczynski.com\/sheffield\/papers\/pheme-eswc-pn.pdf."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"T. Van Dijk (Ed.). 1985. Handbook of Discourse Analysis Vol. 3: Discourse and Dialogue. Academic London.  T. Van Dijk (Ed.). 1985. Handbook of Discourse Analysis Vol. 3: Discourse and Dialogue. Academic London.","DOI":"10.1075\/ct.3.02dij"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9566.00247"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184319.2184338"},{"key":"e_1_2_1_34_1","volume-title":"Retrieved","author":"Doshi S.","year":"2014","unstructured":"S. Doshi . 2014 . Building a safer Twitter, twitter.com Dec. 2, 2014 . Retrieved Jan. 15, 2015 from https:\/\/blog.twitter.com\/2014\/building-a-safer-twitter. S. Doshi. 2014. Building a safer Twitter, twitter.com Dec. 2, 2014. Retrieved Jan. 15, 2015 from https:\/\/blog.twitter.com\/2014\/building-a-safer-twitter."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2013.774185"},{"key":"e_1_2_1_36_1","volume-title":"Information ethics","author":"Floridi L.","unstructured":"L. Floridi . 2010. Information ethics . In The Cambridge Handbook of Information and Computer Ethics, L. Floridi (Ed.). Cambridge University Press , Cambridge, 77--97. L. Floridi. 2010. Information ethics. In The Cambridge Handbook of Information and Computer Ethics, L. Floridi (Ed.). Cambridge University Press, Cambridge, 77--97."},{"key":"e_1_2_1_37_1","unstructured":"I. Gagliardone D. Gal T. Alves and G. Martinez. 2015. Countering Online Hate Speech. UNESCO Series on Internet Freedom. United Nations Educational Scientific and Cultural Organisation Paris.  I. Gagliardone D. Gal T. Alves and G. Martinez. 2015. Countering Online Hate Speech. UNESCO Series on Internet Freedom. United Nations Educational Scientific and Cultural Organisation Paris."},{"key":"e_1_2_1_38_1","volume-title":"Forms of Talk","author":"Goffman E.","unstructured":"E. Goffman . 1981. Forms of Talk . University of Pennsylvania Press , Pennsylvania. E. Goffman. 1981. Forms of Talk. University of Pennsylvania Press, Pennsylvania."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2012.01574.x"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188254"},{"key":"e_1_2_1_42_1","volume-title":"Retrieved","author":"Human Rights Gulf Centre","year":"2014","unstructured":"Gulf Centre for Human Rights . 2014 . Qatar: New cyber crime law poses real threat to freedom of expression, gc4hr.org Sep. 17, 2014 . Retrieved August 17, 2015 from http:\/\/www.gc4hr.org\/news\/view\/747. Gulf Centre for Human Rights. 2014. Qatar: New cyber crime law poses real threat to freedom of expression, gc4hr.org Sep. 17, 2014. Retrieved August 17, 2015 from http:\/\/www.gc4hr.org\/news\/view\/747."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the 2nd International Workshop on Privacy and Security on Social Media (PSOSM).","author":"Gupta A.","unstructured":"A. Gupta , H. Lamba , P. Kumaraguru , and A. Joshi . 2015. Faking Sandy: Characterising and identifying fake images on Twitter during Hurricane Sandy . In Proceedings of the 2nd International Workshop on Privacy and Security on Social Media (PSOSM). A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi. 2015. Faking Sandy: Characterising and identifying fake images on Twitter during Hurricane Sandy. In Proceedings of the 2nd International Workshop on Privacy and Security on Social Media (PSOSM)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1515\/jplr.2010.011"},{"key":"e_1_2_1_45_1","volume-title":"The Rules of Engagement: A Review of the","author":"Constabulary Her Majesty's","year":"2011","unstructured":"Her Majesty's Inspectorate of Constabulary . 2011a. The Rules of Engagement: A Review of the August 2011 Disorders. HMIC, London . Her Majesty's Inspectorate of Constabulary. 2011a. The Rules of Engagement: A Review of the August 2011 Disorders. HMIC, London."},{"key":"e_1_2_1_46_1","volume-title":"Policing Public Order: An Overview and Review of Progress Against the Recommendations of Adapting to Protest and Nurturing the British Model of Policing","author":"Constabulary Her Majesty's","unstructured":"Her Majesty's Inspectorate of Constabulary . 2011b. Policing Public Order: An Overview and Review of Progress Against the Recommendations of Adapting to Protest and Nurturing the British Model of Policing . HMIC , London . Her Majesty's Inspectorate of Constabulary. 2011b. Policing Public Order: An Overview and Review of Progress Against the Recommendations of Adapting to Protest and Nurturing the British Model of Policing. HMIC, London."},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","unstructured":"W. Housley R. Procter A. Edwards P. Burnap M. Williams L. Sloan O. Rana J. Morgan A. Voss and G. Greenhill. 2014. Big and broad social data and the sociological imagination: A collaborative response. Big Data & Society 1 2 (2014).  W. Housley R. Procter A. Edwards P. Burnap M. Williams L. Sloan O. Rana J. Morgan A. Voss and G. Greenhill. 2014. Big and broad social data and the sociological imagination: A collaborative response. Big Data & Society 1 2 (2014).","DOI":"10.1177\/2053951714545135"},{"key":"e_1_2_1_48_1","volume-title":"Social Media and Criminal Offences: 1st report of Session 2014--2015. The Stationery Office Limited","author":"Lords House","year":"2015","unstructured":"House of Lords . 2014. Social Media and Criminal Offences: 1st report of Session 2014--2015. The Stationery Office Limited , London . Retrieved December 20, 2015 from http:\/\/www.publications.parliament.uk\/pa\/ld201415\/ldselect\/ldcomuni\/37\/3702.htm. House of Lords. 2014. Social Media and Criminal Offences: 1st report of Session 2014--2015. The Stationery Office Limited, London. Retrieved December 20, 2015 from http:\/\/www.publications.parliament.uk\/pa\/ld201415\/ldselect\/ldcomuni\/37\/3702.htm."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-4446.2004.00023.x"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348556"},{"key":"e_1_2_1_51_1","volume-title":"Computer Ethics (1st. ed.)","author":"Johnson D. G.","unstructured":"D. G. Johnson . 1985. Computer Ethics (1st. ed.) . Prentice Hall , Upper Saddle River, New Jersey. D. G. Johnson. 1985. Computer Ethics (1st. ed.). Prentice Hall, Upper Saddle River, New Jersey."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69355-0_16"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the 13th International Conference on Data Mining (ICDM\u201913)","author":"Kwon S.","unstructured":"S. Kwon , M. Cha , K. Jung , W. Chen , and Y. Wang . 2013. Prominent features of rumor propagation in online social media . In Proceedings of the 13th International Conference on Data Mining (ICDM\u201913) , IEEE, 1103--1108. S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang. 2013. Prominent features of rumor propagation in online social media. In Proceedings of the 13th International Conference on Data Mining (ICDM\u201913), IEEE, 1103--1108."},{"key":"e_1_2_1_55_1","volume-title":"Retrieved","author":"Lewis P.","year":"2015","unstructured":"P. Lewis , T. Newburn , M. Taylor , C. Mcgillivray , A. Greenhill , H. Frayman , and R. Procter . 2015. Reading the Riots: Investigating England's Summer of Disorder. (2011) . Retrieved March 24, 2015 from http:\/\/www.guardian.co.uk\/uk\/series\/reading-the-riots. P. Lewis, T. Newburn, M. Taylor, C. Mcgillivray, A. Greenhill, H. Frayman, and R. Procter. 2015. Reading the Riots: Investigating England's Summer of Disorder. (2011). Retrieved March 24, 2015 from http:\/\/www.guardian.co.uk\/uk\/series\/reading-the-riots."},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","unstructured":"B. D. Loader and D. Mercea (Eds.). 2012. Social Media and Democracy. Routledge London.  B. D. Loader and D. Mercea (Eds.). 2012. Social Media and Democracy. Routledge London.","DOI":"10.4324\/9780203126974"},{"key":"e_1_2_1_57_1","unstructured":"G. Lotan E. Graeff M. Ananny D. Gaffney I. Pearce and D. Boyd. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication 5 (Special Issue) (2011) 1375--1405.  G. Lotan E. Graeff M. Ananny D. Gaffney I. Pearce and D. Boyd. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication 5 (Special Issue) (2011) 1375--1405."},{"key":"e_1_2_1_58_1","volume-title":"Retrieved","author":"Luckerson V.","year":"2014","unstructured":"V. Luckerson . 2014 . Fear, misinformation and social media complicate ebola fight, Time Oct. 8, 2014 . Retrieved March 24, 2015 from http:\/\/time.com\/3479254\/ebola-social-media\/. V. Luckerson. 2014. Fear, misinformation and social media complicate ebola fight, Time Oct. 8, 2014. Retrieved March 24, 2015 from http:\/\/time.com\/3479254\/ebola-social-media\/."},{"key":"e_1_2_1_59_1","volume-title":"Digital Sociology","author":"Lupton D.","unstructured":"D. Lupton . 2015. Digital Sociology . Routledge , London . D. Lupton. 2015. Digital Sociology. Routledge, London."},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the International Conference on Weblogs and Social Media (ICWSM).","author":"Macskassy S.","unstructured":"S. Macskassy and M. Michelson . Why do people retweet? Antihomophily wins the day . In Proceedings of the International Conference on Weblogs and Social Media (ICWSM). S. Macskassy and M. Michelson. Why do people retweet? Antihomophily wins the day. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM)."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856513501413"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/1750481314568545"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964869"},{"key":"e_1_2_1_64_1","volume-title":"Retrieved","author":"Miller B.","year":"2013","unstructured":"B. Miller . 2013 . UK petition calls on Twitter to tackle abuse after Caroline Criado-Perez subjected to violent tweets, abc.net July 27, 2013 . Retrieved Jan. 12, 2015 from http:\/\/www.abc.net.au\/news\/2013-07-29\/thousands-sign-petition-to-stop-abusive-tweets\/4849780. B. Miller. 2013. UK petition calls on Twitter to tackle abuse after Caroline Criado-Perez subjected to violent tweets, abc.net July 27, 2013. Retrieved Jan. 12, 2015 from http:\/\/www.abc.net.au\/news\/2013-07-29\/thousands-sign-petition-to-stop-abusive-tweets\/4849780."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-937X.00121"},{"key":"e_1_2_1_66_1","volume-title":"Digital citizenship: The Internet","author":"Mossberger K.","unstructured":"K. Mossberger , C. J. Tolbert , and R. S. McNeal . 2008. Digital citizenship: The Internet . In Society and Participation. MIT Press , MA. K. Mossberger, C. J. Tolbert, and R. S. McNeal. 2008. Digital citizenship: The Internet. In Society and Participation. MIT Press, MA."},{"key":"e_1_2_1_67_1","volume-title":"Retrieved","author":"Munson L.","year":"2015","unstructured":"L. Munson . 2015 . India strikes down controversial \u201cSection 66A\u201d social media policing law, nakedsecurity.com March 25, 2015 . Retrieved August 17, 2015 from https:\/\/nakedsecurity.sophos.com\/2015\/03\/25\/india-strikes-down-controversial-section-66a-social-media-policing-law\/. L. Munson. 2015. India strikes down controversial \u201cSection 66A\u201d social media policing law, nakedsecurity.com March 25, 2015. Retrieved August 17, 2015 from https:\/\/nakedsecurity.sophos.com\/2015\/03\/25\/india-strikes-down-controversial-section-66a-social-media-policing-law\/."},{"key":"e_1_2_1_68_1","first-page":"1059","article-title":"Towards a sociological understanding of social media","volume":"46","author":"Murthy D.","year":"2012","unstructured":"D. Murthy . 2012 a. Towards a sociological understanding of social media : Theorizing Twitter. Sociology 46 , 6 (2012), 1059 -- 1073 . DOI:10.1177\/0038038511422553 10.1177\/0038038511422553 D. Murthy. 2012a. Towards a sociological understanding of social media: Theorizing Twitter. Sociology 46, 6 (2012), 1059--1073. DOI:10.1177\/0038038511422553","journal-title":"Theorizing Twitter. Sociology"},{"key":"e_1_2_1_69_1","volume-title":"Twitter: Social Communication in the Twitter Age","author":"Murthy D.","year":"2012","unstructured":"D. Murthy . 2012 b. Twitter: Social Communication in the Twitter Age . Polity Press , Cambridge, UK . D. Murthy. 2012b. Twitter: Social Communication in the Twitter Age. Polity Press, Cambridge, UK."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2006.07.017"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.036122"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1093\/scipol\/scs093"},{"key":"e_1_2_1_73_1","volume-title":"The Guardian","author":"Pickles N.","year":"2016","unstructured":"N. Pickles . 2016 . Safer internet day: Protecting the global town square of Twitter . The Guardian , Feb. 9, 2016. Retrieved Feb. 9, 2016 from http:\/\/www.theguardian.com\/technology\/2016\/feb\/08\/twitter-safer-internet-day-nick-pickles-online-diversity?CMP&equals;share_btn_tw. N. Pickles. 2016. Safer internet day: Protecting the global town square of Twitter. The Guardian, Feb. 9, 2016. Retrieved Feb. 9, 2016 from http:\/\/www.theguardian.com\/technology\/2016\/feb\/08\/twitter-safer-internet-day-nick-pickles-online-diversity?CMP&equals;share_btn_tw."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2013.774172"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2013.780223"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11051-011-0454-4"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963503"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263276413484941"},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","unstructured":"H. Sacks E. A. Schegloff and G. A. Jefferson. 1974. Simplest systematics for the organization of turn-taking for conversation. Language (1974) 696--735.  H. Sacks E. A. Schegloff and G. A. Jefferson. 1974. Simplest systematics for the organization of turn-taking for conversation. Language (1974) 696--735.","DOI":"10.1353\/lan.1974.0010"},{"key":"e_1_2_1_81_1","unstructured":"T. Shibutani. 1996. Improvised news: A sociological study of rumor. Bobbs-Merrill Indianapolis.  T. Shibutani. 1996. Improvised news: A sociological study of rumor. Bobbs-Merrill Indianapolis."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00304"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.01.001"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2013.05.008"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.33"},{"key":"e_1_2_1_86_1","unstructured":"P. Tolmie R. Procter M. Rouncefield M. Liakata and A. Zubiaga. 2015. Microblog Analysis as a Programme of Work. Submitted to ACM Transactions on Computer-Human Interaction. Available from arXiv:1511.03193.  P. Tolmie R. Procter M. Rouncefield M. Liakata and A. Zubiaga. 2015. Microblog Analysis as a Programme of Work. Submitted to ACM Transactions on Computer-Human Interaction. Available from arXiv:1511.03193."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1002\/bult.2012.1720380212"},{"key":"e_1_2_1_88_1","unstructured":"D. Trottier. 2012. Social Media as Surveillance. Ashgate Surrey England.  D. Trottier. 2012. Social Media as Surveillance. Ashgate Surrey England."},{"key":"e_1_2_1_89_1","volume-title":"CNET","author":"Trenholm R.","year":"2011","unstructured":"R. Trenholm . 2011 . Cameron considers blocking Twitter, Facebook, BBM after riots , CNET August 11, 2011. Retrieved March 26, 2015 from http:\/\/www.cnet.com\/uk\/news\/cameron-considers-blocking-twitter-facebook-bbm-after-riots\/. R. Trenholm. 2011. Cameron considers blocking Twitter, Facebook, BBM after riots, CNET August 11, 2011. Retrieved March 26, 2015 from http:\/\/www.cnet.com\/uk\/news\/cameron-considers-blocking-twitter-facebook-bbm-after-riots\/."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124320"},{"key":"e_1_2_1_91_1","first-page":"2012","article-title":"Lord McAlpine and the high cost of tweeting gossip","volume":"27","author":"Tweed P.","year":"2012","unstructured":"P. Tweed . 2012 . Lord McAlpine and the high cost of tweeting gossip . The Guardian . Nov. 27 , 2012 . Retrieved March 21, 2015 from http:\/\/www.theguardian.com\/law\/2012\/nov\/27\/lord-mcalpine-twitter-libel. P. Tweed. 2012. Lord McAlpine and the high cost of tweeting gossip. The Guardian. Nov. 27, 2012. Retrieved March 21, 2015 from http:\/\/www.theguardian.com\/law\/2012\/nov\/27\/lord-mcalpine-twitter-libel.","journal-title":"The Guardian"},{"key":"e_1_2_1_92_1","volume-title":"Retrieved","author":"Tuysuz G.","year":"2015","unstructured":"G. Tuysuz . 2015 . Turkey blocks social media websites, CNN.com April 6, 2015 . Retrieved August 17, 2015 from http:\/\/edition.cnn.com\/2015\/04\/06\/world\/turkey-social-media-blocked\/. G. Tuysuz. 2015. Turkey blocks social media websites, CNN.com April 6, 2015. Retrieved August 17, 2015 from http:\/\/edition.cnn.com\/2015\/04\/06\/world\/turkey-social-media-blocked\/."},{"key":"e_1_2_1_93_1","volume-title":"Retrieved","author":"Safer Internet Centre UK","year":"2015","unstructured":"UK Safer Internet Centre . 2015 . Safer Internet day 2015, saferinternet.org Feb. 10, 2015 . Retrieved March 24, 2015 from http:\/\/www.saferinternet.org.uk\/safer-internet-day\/2015. UK Safer Internet Centre. 2015. Safer Internet day 2015, saferinternet.org Feb. 10, 2015. Retrieved March 24, 2015 from http:\/\/www.saferinternet.org.uk\/safer-internet-day\/2015."},{"key":"e_1_2_1_94_1","volume-title":"Retrieved","author":"Harrassment WAM.","year":"2015","unstructured":"WAM. Harrassment of women on Twitter? We\u2019re on it&excl;, Women Action and the Media. Nov. 6, 2014 . Retrieved Jan. 20, 2015 from http:\/\/www.womenactionmedia.org\/2014\/11\/06\/harassment-of-women-on-twitter-were-on-it\/. WAM. Harrassment of women on Twitter? We\u2019re on it&excl;, Women Action and the Media. Nov. 6, 2014. Retrieved Jan. 20, 2015 from http:\/\/www.womenactionmedia.org\/2014\/11\/06\/harassment-of-women-on-twitter-were-on-it\/."},{"key":"e_1_2_1_95_1","unstructured":"D. Watts and P. Dodds. 2009. Threshold models of social influence. In Oxford Handbook of Analytical Sociology P. Hedstrom and P. S. Bearman (Eds.). Oxford University Press Oxford 475--497.  D. Watts and P. Dodds. 2009. Threshold models of social influence. In Oxford Handbook of Analytical Sociology P. Hedstrom and P. S. Bearman (Eds.). Oxford University Press Oxford 475--497."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2874239.2874267"},{"key":"#cr-split#-e_1_2_1_97_1.1","doi-asserted-by":"crossref","unstructured":"C. Wendling J. Radisch and S. Jacobzone. 2013. The use of social media in risk and crisis communication. In OECD Working Papers on Public Governance No. 24 OECD Publishing. DOI:http:\/\/dx.doi.org\/10.1787\/5k3v01fskp9s-en 10.1787\/5k3v01fskp9s-en","DOI":"10.1787\/5k3v01fskp9s-en"},{"key":"#cr-split#-e_1_2_1_97_1.2","doi-asserted-by":"crossref","unstructured":"C. Wendling J. Radisch and S. Jacobzone. 2013. The use of social media in risk and crisis communication. In OECD Working Papers on Public Governance No. 24 OECD Publishing. DOI:http:\/\/dx.doi.org\/10.1787\/5k3v01fskp9s-en","DOI":"10.1787\/5k3v01fskp9s-en"},{"key":"e_1_2_1_98_1","unstructured":"L. Wilkins. 1967. Social Deviance. Tavistock Publications London.  L. Wilkins. 1967. Social Deviance. Tavistock Publications London."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azv059"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2013.780225"},{"key":"e_1_2_1_101_1","volume-title":"World Economic Forum. Retrieved","author":"Forum World Economic","year":"2013","unstructured":"World Economic Forum . 2013 . Digital wildfires in a hyperconnected world. Global Risks Report , World Economic Forum. Retrieved Nov. 20, 2014 from http:\/\/reports.weforum.org\/global-risks-2013\/risk-case-1\/digital-wildfires-in-a-hyperconnected-world\/. World Economic Forum. 2013. Digital wildfires in a hyperconnected world. Global Risks Report, World Economic Forum. Retrieved Nov. 20, 2014 from http:\/\/reports.weforum.org\/global-risks-2013\/risk-case-1\/digital-wildfires-in-a-hyperconnected-world\/."},{"key":"e_1_2_1_102_1","volume-title":"Proceedings of the International Conference on Weblogs and Social Media (ICWSM).","author":"Yang J.","unstructured":"J. Yang and S. Counts . 2010. Predicting the speed, scale, and range of information diffusion in Twitter . In Proceedings of the International Conference on Weblogs and Social Media (ICWSM). J. Yang and S. Counts. 2010. Predicting the speed, scale, and range of information diffusion in Twitter. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM)."},{"key":"e_1_2_1_103_1","volume-title":"Proceedings of the Workshop on Computational Social Science and the Wisdom of Crowds (NIPS).","author":"Zaman T.","unstructured":"T. Zaman , R. Herbrich , J. Van Gael , and D. Stern . 2010. Predicting information spreading in Twitter . In Proceedings of the Workshop on Computational Social Science and the Wisdom of Crowds (NIPS). T. Zaman, R. Herbrich, J. Van Gael, and D. Stern. 2010. Predicting information spreading in Twitter. In Proceedings of the Workshop on Computational Social Science and the Wisdom of Crowds (NIPS)."},{"key":"e_1_2_1_104_1","doi-asserted-by":"crossref","unstructured":"T. Zaman E. Fox and E. A. Bradlow. 2013. Bayesian Approach for Predicting the Popularity of Tweets CoRR. (2013).  T. Zaman E. Fox and E. A. Bradlow. 2013. Bayesian Approach for Predicting the Popularity of Tweets CoRR. (2013).","DOI":"10.1214\/14-AOAS741"},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the AAAI Workshop on AI for Cities.","author":"Zubiaga A.","unstructured":"A. Zubiaga , M. Liakata , R. Procter , K. Bontcheva , and P. Tolmie . 2015a. Towards detecting rumours in social media . In Proceedings of the AAAI Workshop on AI for Cities. A. Zubiaga, M. Liakata, R. Procter, K. Bontcheva, and P. Tolmie. 2015a. Towards detecting rumours in social media. In Proceedings of the AAAI Workshop on AI for Cities."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23186"},{"key":"e_1_2_1_107_1","volume-title":"Wong Sak Hoi","author":"Zubiaga A.","year":"2016","unstructured":"A. Zubiaga , M. Liakata , R. Procter , P. Tolmie , and G. Wong Sak Hoi . 2016 . Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS One ( 2016). Available from arXiv:1511.07487. A. Zubiaga, M. Liakata, R. Procter, P. Tolmie, and G. Wong Sak Hoi. 2016. Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS One (2016). Available from arXiv:1511.07487."}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2893478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2893478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:13Z","timestamp":1750222573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2893478"}},"subtitle":["Propagation, Verification, Regulation, and Responsible Innovation"],"short-title":[],"issued":{"date-parts":[[2016,4,20]]},"references-count":107,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,5,5]]}},"alternative-id":["10.1145\/2893478"],"URL":"https:\/\/doi.org\/10.1145\/2893478","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"value":"1046-8188","type":"print"},{"value":"1558-2868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,20]]},"assertion":[{"value":"2015-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}