Characterizing Arabic Computational Propaganda on Twitter
DOI:
https://doi.org/10.13053/cys-28-3-5168Keywords:
Computation Propaganda, Online Propaganda, Disinformation, Social Media, Propagandists’ CharacteristicsAbstract
Background: The rise of social media has nourished the "computational propaganda" phenomenon. Propagandists rely on advanced artificial intelligence methods to change their writing style with every new campaign, allowing them to evade detection methods easily. Detecting computational propaganda in Arab countries has become a trending topic in social media research. Most of the proposed methods have been focused on detecting propaganda based on the writing style. Unfortunately, these approaches were marred with significant limitations because propagandists' traits and behaviours must be considered. Objectives: This study aims to demonstrate the value of characterizing Arab computational propaganda on Twitter to close the research gap. It follows a data-driven approach to investigate the main characteristics that can distinguish Arab computational propaganda on Twitter. Method: It follows a scientific approach to obtain and combine data from reliable and propagandistic users who discuss the same topics. Then, it provides a deep analysis of two communities that discussed different topics. It characterizes the key features that can be used to differentiate between them. Finding: The findings show that around 70 per cent of propagandists rely on artificial amplification by retweeting to produce an echo chamber supporting their viewpoints. The propagandists' following-to-follower ratio is between 0.8 and 1, indicating they are a coherent army that supports each other. 98 per cen of the propagandists' users participate in diverse topic discussions, indicating that topic diversity and publishing volume are very important features for detecting propaganda on Twitter. Publishing periods can strongly help in detecting propagandists. Novelty: The study offers early evidence on social media regarding the behaviour of propagandists' users and messages. This study enlightens future research by identifying the important features needed to propose anti-propaganda detectors.Downloads
Published
2024-09-12
Issue
Section
Articles of the Thematic Section
License
Hereby I transfer exclusively to the Journal "Computación y Sistemas", published by the Computing Research Center (CIC-IPN),the Copyright of the aforementioned paper. I also accept that these
rights will not be transferred to any other publication, in any other format, language or other existing means of developing.I certify that the paper has not been previously disclosed or simultaneously submitted to any other publication, and that it does not contain material whose publication would violate the Copyright or other proprietary rights of any person, company or institution. I certify that I have the permission from the institution or company where I work or study to publish this work.The representative author accepts the responsibility for the publicationof this paper on behalf of each and every one of the authors.
This transfer is subject to the following conditions:- The authors retain all ownership rights (such as patent rights) of this work, except for the publishing rights transferred to the CIC, through this document.
- Authors retain the right to publish the work in whole or in part in any book they are the authors or publishers. They can also make use of this work in conferences, courses, personal web pages, and so on.
- Authors may include working as part of his thesis, for non-profit distribution only.