Internet users beware, you follow online health rumors (more than counter-rumors) irrespective of risk propensity and prior endorsement
نویسندگان
چکیده
منابع مشابه
Rumors and Social Networks
Why do people spread rumors? This paper studies the transmission of possibly false information—by rational agents who seek the truth. Unbiased agents earn payoffs when a collective decision is correct in that it matches the true state of the world. Biased agents desire a particular decision regardless of the true state. One agent possibly learns the true underlying state and chooses whether to ...
متن کاملRumors and the Reinvention of the Internet in Accra, Ghana
This article is an analysis of rumors about Internet scamming told by Internet café users in the West African capital city of Accra, Ghana. Rumors provided accounts of how the Internet can be effectively operated by young Ghanaians to realize ‘‘big gains’’ through foreign connections. Yet these accounts were contradicted by the less promising direct experiences users had at the computer interfa...
متن کاملSpotting Rumors via Novelty Detection
Rumour detection is hard because the most accurate systems operate retrospectively, only recognising rumours once they have collected repeated signals. By then the rumours might have already spread and caused harm. We introduce a new category of features based on novelty, tailored to detect rumours early on. To compensate for the absence of repeated signals, we make use of news wire as an addit...
متن کاملFrom Rumors to Facts, and Facts to Rumors: The Role of Certainty Decay in Consumer Communications
How does a rumor come to be believed as a fact as it spreads across a chain of consumers? This research proposes that because consumers’ certainty about their beliefs (e.g., attitudes, opinions) is less salient than the beliefs themselves, certainty information is more susceptible to being lost in communication. Consistent with this idea, the current studies reveal that though consumers transmi...
متن کاملGOSSIB vs. IP Traceback Rumors
To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking (PPM) have received most attention, as they are easy to implement and deploy incrementally. In this paper, we introduce a new concept, namely Groups Of Strongly SImilar Birthdays (GOSSIB), that can be used by to obtain effects s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology & People
سال: 2020
ISSN: 0959-3845
DOI: 10.1108/itp-02-2019-0097