{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T06:50:05Z","timestamp":1769237405092,"version":"3.49.0"},"reference-count":109,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Technology"],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:p> Social media technology not only affords opportunities for digital activism and global liberation, but it also poses threats to the freewheeling of democracy. The emergence and prevalence of conspiracy theories on social media stem from communal processes of online political debate or social movements that degenerate into conspiracy beliefs. This study views the online formation of conspiracy theories as a socially emergent process. Subscribing to a social constructionist lens and synthesizing extant literature on social movements and social media affordances, we conducted discourse analysis on discursive data collected from Twitter for the 2020 U.S. Presidential Election Fraud Conspiracy Theory. Through the analysis, we delineate the formation of conspiracy theory into four stages and characterize each stage according to its mobilizing structure, participants, mode of interaction, content created, and discernible collective action. We also identify social media affordances facilitating the formation of conspiracy theories within and across stages. Findings of this study advance contemporary knowledge on conspiracy theories by not only extending our understanding of the role of social media in conspiracy theory formation, but they also aid practitioners in comprehending the formation process of conspiracy theory formation, the latter of which constitutes the foundation for devising appropriate prevention and mitigation strategies. <\/jats:p>","DOI":"10.1177\/02683962231175923","type":"journal-article","created":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T05:02:55Z","timestamp":1685768575000},"page":"392-416","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["Unveiling the formation of conspiracy theory on social media: A discourse analysis"],"prefix":"10.1177","volume":"39","author":[{"given":"Boying","family":"Li","sequence":"first","affiliation":[{"name":"Nottingham University Business School China, University of Nottingham - Ningbo China, Ningbo, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Ji","sequence":"additional","affiliation":[{"name":"Nottingham University Business School China, University of Nottingham - Ningbo China, Ningbo, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mengyao","family":"Fu","sequence":"additional","affiliation":[{"name":"Laboratory for AI-Powered Financial Technologies Limited, College of Business, City University of Hong Kong, Hong Kong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4245-541X","authenticated-orcid":false,"given":"Chee-Wee","family":"Tan","sequence":"additional","affiliation":[{"name":"Department of Digitalization, Copenhagen Business School, Frederiksberg, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alain","family":"Chong","sequence":"additional","affiliation":[{"name":"Nottingham University Business School China, University of Nottingham - Ningbo China, Ningbo, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric TK","family":"Lim","sequence":"additional","affiliation":[{"name":"UNSW Business School, University of New South Wales, Kensington, NSW, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2023,6,2]]},"reference":[{"key":"bibr1-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1017\/S003329172000224X"},{"key":"bibr2-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10133-9"},{"key":"bibr3-02683962231175923","doi-asserted-by":"publisher","DOI":"10.3389\/fsoc.2021.612637"},{"key":"bibr4-02683962231175923","volume-title":"How To Do Things With Words","author":"Austin J","year":"1962"},{"key":"bibr136-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1093\/ct\/qtaa023"},{"key":"bibr5-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-020-01452-z"},{"key":"bibr6-02683962231175923","volume-title":"What I Saw on the Road to Insurrection: Internal Political Efficacy, Conspiracy Beliefs and the Effect of Depression on Support for the January 6th Storming of the Capitol","author":"Baum M","year":"2021"},{"key":"bibr137-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139198752"},{"key":"bibr7-02683962231175923","volume-title":"The social construction of reality: A treatise in the sociology of knowledge","author":"Berger P","year":"1966"},{"key":"bibr138-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/soc4.12945"},{"key":"bibr8-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118093"},{"key":"bibr9-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1089\/elj.2016.0393"},{"key":"bibr10-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1177\/0263276416657880"},{"key":"bibr11-02683962231175923","doi-asserted-by":"publisher","DOI":"10.4324\/9781315715421"},{"key":"bibr12-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-23747-0_5"},{"key":"bibr13-02683962231175923","volume-title":"Proceedings of The 6th European Consortium For Political Research (ECPR)","author":"Bruns A","year":"2011"},{"key":"bibr14-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/1746-8361.12162"},{"key":"bibr147-02683962231175923","author":"Christiansen J","year":"2009","journal-title":"Four stages of social movements"},{"key":"bibr15-02683962231175923","doi-asserted-by":"publisher","DOI":"10.3366\/epi.2007.4.2.167"},{"key":"bibr16-02683962231175923","first-page":"115","volume-title":"Conspiracy Theories: The Philosophical Debate","author":"Coady D","year":"2006"},{"key":"bibr17-02683962231175923","doi-asserted-by":"publisher","DOI":"10.4337\/9781789900408.00014"},{"key":"bibr18-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2008.00296.x"},{"key":"bibr20-02683962231175923","doi-asserted-by":"publisher","DOI":"10.7560\/743793"},{"key":"bibr21-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1057\/9781137363169"},{"key":"bibr22-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.1992.tb02943.x"},{"key":"bibr23-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1080\/13691180051033333"},{"key":"bibr25-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12568"},{"key":"bibr26-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/spc3.12636"},{"key":"bibr29-02683962231175923","first-page":"1","author":"Enders AM","year":"2021","journal-title":"Political Behavior"},{"key":"bibr30-02683962231175923","doi-asserted-by":"crossref","unstructured":"Fairclough N (2013) Technologisation of discourse\u201d Texts and Practices. London: Routledge, 80\u201392.","DOI":"10.4324\/9780203431382-10"},{"key":"bibr31-02683962231175923","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00861"},{"key":"bibr33-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcm.2015.07.002"},{"key":"bibr35-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2019.04.001"},{"key":"bibr37-02683962231175923","volume-title":"People, Power, and Change: Movements of Social Transformation","author":"Gerlach L","year":"1970"},{"key":"bibr38-02683962231175923","doi-asserted-by":"publisher","DOI":"10.2196\/26527"},{"key":"bibr140-02683962231175923","author":"Gibson JJ","year":"1979","journal-title":"The ecological approach to visual perception"},{"key":"bibr39-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0840"},{"key":"bibr40-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/14290"},{"key":"bibr41-02683962231175923","volume-title":"Twenty-Third European Conference on Information Systems (ECIS)","author":"Harindranath G","year":"2015"},{"key":"bibr42-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1080\/14742837.2016.1201421"},{"key":"bibr141-02683962231175923","doi-asserted-by":"publisher","DOI":"10.21061\/jvs.v7i3.274"},{"key":"bibr142-02683962231175923","author":"Hofstadter R","year":"1964","journal-title":"The paranoid style in American politics"},{"key":"bibr44-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1002\/casp.801"},{"issue":"1","key":"bibr45-02683962231175923","first-page":"461","volume":"45","author":"Hovorka DS","year":"2021","journal-title":"MIS QUARTERLY"},{"key":"bibr46-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1145\/1810617.1810647"},{"key":"bibr49-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9020.2010.00329.x"},{"key":"bibr51-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/jasp.12453"},{"key":"bibr52-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-3615(01)00151-8"},{"key":"bibr55-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/11492"},{"key":"bibr56-02683962231175923","doi-asserted-by":"publisher","DOI":"10.2307\/2564659"},{"key":"bibr57-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1080\/0267257X.2019.1573845"},{"key":"bibr58-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1177\/16094069211018009"},{"key":"bibr60-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/15188"},{"key":"bibr61-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2019.1628921"},{"key":"bibr62-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2020\/16371"},{"key":"bibr63-02683962231175923","first-page":"227","volume-title":"Signs of Work","author":"Klein HK","year":"2015"},{"key":"bibr64-02683962231175923","first-page":"1","volume":"1","author":"Kou Y","year":"2017","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"bibr65-02683962231175923","doi-asserted-by":"publisher","DOI":"10.4324\/9780429452734-2_8"},{"key":"bibr143-02683962231175923","doi-asserted-by":"crossref","unstructured":"Krippendorff K (2018) Content Analysis: An Introduction to Its Methodology. Newbury Park: Sage Publications.","DOI":"10.4135\/9781071878781"},{"key":"bibr67-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2018.03.003"},{"key":"bibr69-02683962231175923","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2013.00073"},{"issue":"1","key":"bibr70-02683962231175923","first-page":"105","volume":"9","author":"Lit S","year":"2002","journal-title":"Asian Journal of Counselling"},{"key":"bibr71-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2022\/15455"},{"key":"bibr144-02683962231175923","first-page":"832","author":"Majchrzak A","year":"2014","journal-title":"Encyclopedia of Management Theory,"},{"key":"bibr72-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12030"},{"key":"bibr73-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225964"},{"key":"bibr74-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1080\/02691728.2020.1748744"},{"key":"bibr76-02683962231175923","doi-asserted-by":"publisher","DOI":"10.4087\/FOUNDATIONREVIEW-D-10-00015"},{"key":"bibr77-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803987.002"},{"key":"bibr81-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0927"},{"key":"bibr82-02683962231175923","unstructured":"Moyer B (1987) Doing Democracy: The MAP Model For Organizing Social Movements. 9\u201397."},{"issue":"2","key":"bibr83-02683962231175923","first-page":"75","volume":"14","author":"Muhammad M","year":"2021","journal-title":"Journal Of Media And Information Warfare"},{"key":"bibr84-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813487958"},{"key":"bibr85-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-010-9112-2"},{"key":"bibr86-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.05"},{"key":"bibr87-02683962231175923","first-page":"1","volume":"11","author":"Oliver PE","year":"1989","journal-title":"Research in Social Movements, Conflict, and Change"},{"key":"bibr88-02683962231175923","volume-title":"Real enemies: Conspiracy theories and American democracy","author":"Olmsted K","year":"2009"},{"key":"bibr89-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1109697"},{"key":"bibr90-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2021.02.007"},{"key":"bibr92-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1145\/3432922"},{"key":"bibr93-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/soin.12339"},{"key":"bibr94-02683962231175923","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2013.00406"},{"key":"bibr98-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12280"},{"key":"bibr99-02683962231175923","volume-title":"The coding manual for qualitative researchers","author":"Saldana J","year":"2013"},{"key":"bibr145-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2021\/15598"},{"key":"bibr101-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.2.03"},{"key":"bibr104-02683962231175923","doi-asserted-by":"publisher","DOI":"10.2307\/3097243"},{"key":"bibr105-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1002\/9781119973249.ch14"},{"key":"bibr106-02683962231175923","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00726"},{"key":"bibr107-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2020.02.007"},{"key":"bibr146-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1207\/S15326969ECO1502_2"},{"key":"bibr109-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9760.2008.00325.x"},{"key":"bibr111-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1177\/0149206320986617"},{"issue":"4","key":"bibr112-02683962231175923","first-page":"30","volume":"29","author":"Tr\u1ea7n V","year":"2013","journal-title":"VNU Journal Of Social Sciences And Humanities"},{"key":"bibr113-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2013.11679130"},{"key":"bibr114-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1002\/ajcp.12142"},{"key":"bibr115-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-018-5412-y"},{"key":"bibr118-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1353\/jod.2017.0064"},{"key":"bibr120-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190844073.003.0001"},{"key":"bibr121-02683962231175923","volume-title":"Conspiracy theories: A primer","author":"Uscinski JE","year":"2020"},{"key":"bibr122-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199351800.001.0001"},{"key":"bibr125-02683962231175923","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2021\/15297"},{"key":"bibr126-02683962231175923","volume-title":"The Routledge companion to management information systems","author":"Volkoff O","year":"2017","edition":"1"},{"key":"bibr127-02683962231175923","doi-asserted-by":"publisher","DOI":"10.9774\/GLEAF.4700.2009.sp.00007"},{"issue":"1","key":"bibr128-02683962231175923","first-page":"11","volume":"37","author":"Wall JD","year":"2015","journal-title":"Communications of the Association for Information Systems"},{"issue":"2","key":"bibr131-02683962231175923","first-page":"7","volume":"12","author":"White R","year":"2004","journal-title":"Nurse Researcher"},{"key":"bibr132-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1515\/text-2018-2021"},{"key":"bibr133-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2017.0669"},{"key":"bibr134-02683962231175923","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810385097"}],"container-title":["Journal of Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/02683962231175923","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/02683962231175923","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/02683962231175923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T04:14:20Z","timestamp":1740802460000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/02683962231175923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,2]]},"references-count":109,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["10.1177\/02683962231175923"],"URL":"https:\/\/doi.org\/10.1177\/02683962231175923","relation":{},"ISSN":["0268-3962","1466-4437"],"issn-type":[{"value":"0268-3962","type":"print"},{"value":"1466-4437","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,2]]}}}