Internet users beware, you follow online health rumors (more than counter-rumors) irrespective of risk propensity and prior endorsement

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rumors and Social Networks

Why do people spread rumors? This paper studies the transmission of possibly false information—by rational agents who seek the truth. Unbiased agents earn payoffs when a collective decision is correct in that it matches the true state of the world. Biased agents desire a particular decision regardless of the true state. One agent possibly learns the true underlying state and chooses whether to ...

متن کامل

Rumors and the Reinvention of the Internet in Accra, Ghana

This article is an analysis of rumors about Internet scamming told by Internet café users in the West African capital city of Accra, Ghana. Rumors provided accounts of how the Internet can be effectively operated by young Ghanaians to realize ‘‘big gains’’ through foreign connections. Yet these accounts were contradicted by the less promising direct experiences users had at the computer interfa...

متن کامل

Spotting Rumors via Novelty Detection

Rumour detection is hard because the most accurate systems operate retrospectively, only recognising rumours once they have collected repeated signals. By then the rumours might have already spread and caused harm. We introduce a new category of features based on novelty, tailored to detect rumours early on. To compensate for the absence of repeated signals, we make use of news wire as an addit...

متن کامل

From Rumors to Facts, and Facts to Rumors: The Role of Certainty Decay in Consumer Communications

How does a rumor come to be believed as a fact as it spreads across a chain of consumers? This research proposes that because consumers’ certainty about their beliefs (e.g., attitudes, opinions) is less salient than the beliefs themselves, certainty information is more susceptible to being lost in communication. Consistent with this idea, the current studies reveal that though consumers transmi...

متن کامل

GOSSIB vs. IP Traceback Rumors

To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking (PPM) have received most attention, as they are easy to implement and deploy incrementally. In this paper, we introduce a new concept, namely Groups Of Strongly SImilar Birthdays (GOSSIB), that can be used by to obtain effects s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology & People

سال: 2020

ISSN: 0959-3845

DOI: 10.1108/itp-02-2019-0097