{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:47Z","timestamp":1773510887731,"version":"3.50.1"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141712980"],"award-info":[{"award-number":["N000141712980"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1749815, 1715078"],"award-info":[{"award-number":["1749815, 1715078"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p>Social media are becoming sites of information operations-activities that seek to undermine information systems and manipulate civic discourse [26,36,44,47]. Through a mixed methods approach, our research extends investigations of online activism to examine the \"work\" of online information operations conducted on Twitter. In particular, we analyze the English-language conversation surrounding the reemergence of Omran Daqneesh (the \"Aleppo Boy\") on Syrian state television, almost a year after his family's home was bombed in an airstrike conducted by the Syrian government. We uncover: a network of clustered users that contributes to a contested and politicized information space surrounding Omran's story; the presence of undermining narratives that serve to disrupt the mainstream media's narrative and confuse the audience; and the techniques used when promoting, defending, or undermining narratives. In the current climate of increasing polarization in online social spaces, this work contributes an improved understanding of information operations online and of the collaborations that take shape around and through them.<\/jats:p>","DOI":"10.1145\/3274452","type":"journal-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T21:21:27Z","timestamp":1541107287000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Assembling Strategic Narratives"],"prefix":"10.1145","volume":"2","author":[{"given":"Tom","family":"Wilson","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Kaitlyn","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Kate","family":"Starbird","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,11]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Tim Adams. 2018. Facebook's week of shame: the Cambridge Analytica fallout. The Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2018\/mar\/24\/facebook-week-of-shame-data-breach-observer-revelations-zuckerberg-silence"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753485"},{"key":"e_1_2_1_3_1","volume-title":"Russia to Keep Helping Syria If It's Attacked","author":"Press Associated","unstructured":"Associated Press. 2013. Russia to Keep Helping Syria If It's Attacked. Associated Press Financial Wire. Associated Press."},{"key":"e_1_2_1_4_1","unstructured":"BBC Trending. 2018. Syria war: The online activists pushing conspiracy theories. BBC News."},{"key":"e_1_2_1_5_1","unstructured":"Ladislav Bittman. 1985. The KGB and Soviet disinformation: an insider's view. Washington: Pergamon-Brassey's."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/019027250406700105"},{"key":"e_1_2_1_8_1","volume-title":"Understanding Russian 'Hybrid Warfare\": And What Can Be Done About It","author":"Chivvis Christopher","unstructured":"Christopher Chivvis. 2017. Understanding Russian 'Hybrid Warfare\": And What Can Be Done About It. RAND Corporation."},{"key":"e_1_2_1_9_1","volume-title":"The Difference between Story and Narrative","author":"Corman Steven R.","year":"2018","unstructured":"Steven R. Corman. 2013. The Difference between Story and Narrative. Arizona State University Center for Strategic Communication. Retrieved April 15, 2018 from http:\/\/csc.asu.edu\/2013\/03\/21\/the-difference-between-story-and-narrative\/"},{"key":"e_1_2_1_10_1","unstructured":"Jonathan Corpus Ong and Jason Vincent A Cabanes. 2018. Architects of Networked Disinformation. Retrieved from http:\/\/newtontechfordev.com\/wp-content\/uploads\/2018\/02\/ARCHITECTS-OF-NETWORKED-DISINFORMATION-FULL-REPORT.pdf"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023788"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998290"},{"key":"e_1_2_1_13_1","unstructured":"William M. Darley. 2006. Clausewitz's Theory of War and Information Operations. ARMY COMBINED ARMS CENTER FORT LEAVENWORTH KS."},{"key":"e_1_2_1_14_1","volume-title":"Rumor psychology: Social and organizational approaches","author":"DiFonzo Nicholas","unstructured":"Nicholas DiFonzo and Prashant Bordia. 2007. Rumor psychology: Social and organizational approaches. American Psychological Association Washington, DC."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817707759"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Claudia Flores-Saviaga Brian C. Keegan and Saiph Savage. 2018. Mobilizing the Trump Train: Understanding Collective Action in a Political Trolling Community. Retrieved from https:\/\/arxiv.org\/pdf\/1806.00429.pdf","DOI":"10.1609\/icwsm.v12i1.15024"},{"key":"e_1_2_1_17_1","article-title":"This iconic photo of Syrian boy pulled from rubble in Aleppo is fake, according to President Bashar Assad","author":"Frisk Adam","year":"2016","unstructured":"Adam Frisk. 2016. This iconic photo of Syrian boy pulled from rubble in Aleppo is fake, according to President Bashar Assad. Global News Canada. Retrieved April 15, 2018 from https:\/\/globalnews.ca\/news\/3015545\/this-iconic-photo-of-syrian-boy-pulled-from-rubble-in-aleppo-is-fake-according-to-president-bashar-assad\/","journal-title":"Global News Canada. Retrieved"},{"key":"e_1_2_1_18_1","volume-title":"The Atlantic. Retrieved","author":"Gilsinan Kathy","year":"2015","unstructured":"Kathy Gilsinan. 2015. The Confused Person's Guide to the Syrian Civil War. The Atlantic. Retrieved April 15, 2018 from https:\/\/www.theatlantic.com\/international\/archive\/2015\/10\/syrian-civil-war-guide-isis\/410746\/"},{"key":"e_1_2_1_19_1","unstructured":"M.R. Gordon. 2014. U.S. Strikes Follow Plea by Syrian Opposition Leader on Behalf of Kurds. New York Times."},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Philip N. Howard Aiden Duffy Deen Freelon Muzammil M. Hussain Will Mari and Marwa Maziad. 2011. Opening closed regimes: what was the role of social media during the Arab Spring?","DOI":"10.2139\/ssrn.2595096"},{"key":"e_1_2_1_21_1","volume-title":"Syria: ICRC and Syrian Arab Red Crescent maintain aid effort amid increased fighting.","author":"International Committee of the Red Cross.","year":"2012","unstructured":"International Committee of the Red Cross. 2012. Syria: ICRC and Syrian Arab Red Crescent maintain aid effort amid increased fighting. Retrieved from https:\/\/www.icrc.org\/eng\/resources\/documents\/update\/2012\/syria-update-2012-07--17.htm"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098679"},{"key":"e_1_2_1_23_1","volume-title":"Syria's Civil War Plays Out On Social Media","author":"Zaram K","unstructured":"K Zaram. 2013. Syria's Civil War Plays Out On Social Media. Associated Press."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441832"},{"key":"e_1_2_1_25_1","volume-title":"Constructing grounded theory","author":"Charmaz Kathy","unstructured":"Kathy Charmaz. 2014. Constructing grounded theory. Sage."},{"key":"e_1_2_1_26_1","unstructured":"Edward Lucas and Ben Nimmo. 2015. CEPA INFOWAR PAPER No . 1 Information Warfare?: What Is It and How to Win It Washington D.C. Retrieved from http:\/\/cepa.org\/files\/?id_plik=1896"},{"key":"e_1_2_1_27_1","volume-title":"Winning the Information War: Techniques and Counter-strategies to Russian Propaganda in Central and Eastern Europe","author":"Lucas Edward","unstructured":"Edward Lucas and Peter Pomeranzev. 2016. Winning the Information War: Techniques and Counter-strategies to Russian Propaganda in Central and Eastern Europe. Center for European Policy Analysis."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675280"},{"key":"e_1_2_1_29_1","volume-title":"Strategic narratives: Communication power and the new world order","author":"Miskimmon Alister","unstructured":"Alister Miskimmon, Ben O'Loughlin, and Laura Roselle. 2014. Strategic narratives: Communication power and the new world order. Routledge."},{"key":"e_1_2_1_30_1","first-page":"34","article-title":"Computational Propaganda in Taiwan","volume":"2","author":"Monaco Nicholas J.","year":"2017","unstructured":"Nicholas J. Monaco. 2017. Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy. 2: 34. Retrieved from http:\/\/comprop.oii.ox.ac.uk\/wp-content\/uploads\/sites\/89\/2017\/06\/Comprop-Taiwan-2.pdf","journal-title":"Where Digital Democracy Meets Automated Autocracy."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240736"},{"key":"e_1_2_1_32_1","volume-title":"The menace of unreality: How the Kremlin weaponizes information, culture and money","author":"Pomerantsev Peter","unstructured":"Peter Pomerantsev and Michael Weiss. 2014. The menace of unreality: How the Kremlin weaponizes information, culture and money. Institute of Modern Russia New York."},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"James Rogers and Andriy Tyushka. 2018. Hacking Into the West: Russia's Anti-hegemonic Drive and the Strategic Narrative Offensive. 35--60. Retrieved from https:\/\/www.stratcomcoe.org\/james-rogers-andriy-tyushka-hacking-west-russias-anti-hegemonic-drive-and-strategic-narrative","DOI":"10.30966\/2018.riga.2.2"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675295"},{"key":"e_1_2_1_35_1","volume-title":"Improvised News: A Sociological Study of Rumor.","author":"Shibutani Tamotsu","year":"1966","unstructured":"Tamotsu Shibutani. 1966. Improvised News: A Sociological Study of Rumor."},{"key":"e_1_2_1_36_1","article-title":"An Update On Information Operations On Facebook","author":"Stamos Alex","year":"2017","unstructured":"Alex Stamos. 2017. An Update On Information Operations On Facebook. Facebook Newsroom. Retrieved April 15, 2018 from https:\/\/newsroom.fb.com\/news\/2017\/09\/information-operations-update\/","journal-title":"Facebook Newsroom. Retrieved"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470769"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 7th International ISCRAM Conference","author":"Starbird Kate","year":"2010","unstructured":"Kate Starbird and Leysia Palen. 2010. Pass it on?: Retweeting in mass emergency. Proceedings of the 7th International ISCRAM Conference, December 2004: 1--10."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979102"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145212"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858551"},{"key":"e_1_2_1_42_1","volume-title":"Collective Intelligence","author":"Starbird Kate","year":"2015","unstructured":"Kate Starbird, Emma S Spiro, Ahmer Arif, et al. 2015. Expressed Uncertainty and Denials as Signals of Online Rumoring. Collective Intelligence, December 2014: 1--4."},{"key":"e_1_2_1_43_1","unstructured":"Anton Troianovski. 2018. A former Russian troll speaks: 'It was like being in Orwell's world'. Washington Post."},{"key":"e_1_2_1_44_1","volume-title":"Election. Retrieved","author":"Policy Twitter Public","year":"2018","unstructured":"Twitter Public Policy. 2018. Update on Twitter's Review of the 2016 U.S. Election. Retrieved April 15, 2018 from https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/2016-election-update.html"},{"key":"e_1_2_1_45_1","volume-title":"Twitter","author":"United States House of Representatives Permanent Select Committee on Intelligence. 2017.","unstructured":"United States House of Representatives Permanent Select Committee on Intelligence. 2017. Testimony of Sean J. Edgett Acting General Counsel, Twitter, Inc. November. Retrieved from https:\/\/intelligence.house.gov\/uploadedfiles\/prepared_testimony_of_sean_j._edgett_from_twitter.pdf"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","unstructured":"Sarah Vieweg Amanda L Hughes Kate Starbird and Leysia Palen. 2010. Microblogging During Two Natural Hazards Events?: What Twitter May Contribute to Situational Awareness. 1079--1088. 10.1145\/1753326.1753486","DOI":"10.1145\/1753326.1753486"},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Rand Waltzman. 2017. The Weaponization of Information: The Need for Cognitive Security. 10.","DOI":"10.7249\/CT473"},{"key":"e_1_2_1_48_1","unstructured":"Jen Weedon William Nuland and Alex Stamos. 2017. Information operations and Facebook. version 1: 27."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531633"},{"key":"e_1_2_1_50_1","volume-title":"Howard","author":"Woolley Samuel C.","year":"2017","unstructured":"Samuel C. Woolley and Philip N. Howard. 2017. Computational propaganda. 36. Retrieved from http:\/\/comprop.oii.ox.ac.uk\/publishing\/working-papers\/computational-propaganda-worldwide-executive-summary\/"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274452","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274452","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:36Z","timestamp":1750207476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274452"}},"subtitle":["Information Operations as Collaborative Work within an Online Community"],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":50,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1145\/3274452"],"URL":"https:\/\/doi.org\/10.1145\/3274452","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"2018-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}