SlideShare a Scribd company logo
1 of 31
Protecting elections from social media manipulation
science.sciencemag.org/content/365/6456/858
Policy ForumScience and Democracy
1. Sinan Aral1,2,3,
2. Dean Eckles1,2
See all authors and affiliations
"ILLUSTRATION: BROBEL
DESIGN"
To what extent are
democratic elections
vulnerable to social
media manipulation? The
fractured state of
research and evidence on
this most important
question facing
democracy is reflected in
the range of
disagreement among
experts. Facebook chief
executive officer Mark
Zuckerberg has repeatedly called on the U.S. government to
regulate election manipulation
through social media. But we cannot manage what we do not
measure. Without an
organized research agenda that informs policy, democracies will
remain vulnerable to
foreign and domestic attacks. Thankfully, social media's effects
are, in our view, eminently
measurable. Here, we advocate a research agenda for measuring
social media manipulation
of elections, highlight underutilized approaches to rigorous
causal inference, and discuss
political, legal, and ethical implications of undertaking such
analysis. Consideration of this
research agenda illuminates the need to overcome important
trade-offs for public and
corporate policy—for example, between election integrity and
privacy. We have promising
research tools, but they have not been applied to election
manipulation, mainly because of
a lack of access to data and lack of cooperation from the
platforms (driven in part by public
policy and political constraints).
1/11
https://science.sciencemag.org/content/365/6456/858
Two recent studies commissioned by the U.S. Senate
Intelligence Committee detail Russian
misinformation campaigns targeting hundreds of millions of
U.S. citizens during the 2016
presidential election. The reports highlight, but do not answer,
whether social media
manipulation may have influenced the outcome. Some experts
argue that Russia-sponsored
content on social media likely did not decide the election
because Russian-linked spending
and exposure to fake news (1, 2) were smallscale. Others
contend that a combination of
Russian trolls and hacking likely tipped the election for Donald
Trump (3). Similar
disagreements exist about the UK referendum on leaving the
European Union and recent
elections in Brazil, Sweden, and India.
Such disagreement is understandable, given the distinctive
challenges of studying social
media manipulation of elections. For example, unlike the
majority of linear television
advertising, social media can be personally targeted; assess ing
its reach requires analysis of
paid and unpaid media, ranking algorithms and advertising
auctions; and causal analysis is
necessary to understand how social media changes opinions and
voting.
Luckily, much of the necessary methodology has already been
developed. A growing body
of literature illuminates how social media influences behavior.
Analysis of misinformation
on Twitter and Facebook (4, 5), and randomized and natural
experiments involving
hundreds of millions of people on various platforms, have
shown how social media changes
how we shop, read, and exercise [e.g., (6, 7)]. Similar methods
can and should be applied to
voting (8).
Research on election manipulation will be enabled and
constrained by parallel policy
initiatives that aim, for example, to protect privacy. Although
privacy legislation may prohibit
retention of consumer data, such data may also be critical to
understanding how to harden
our democracies against manipulation. To preserve democracy
in the digital age, we must
manage these trade-offs and overcome multidisciplinary
methodological challenges
simultaneously.
Measuring Manipulation
We propose a four-step research agenda for estimating the
causal effects of social media
manipulation on voter turnout and vote choice (see the figure).
We also describe analysis of
the indirect, systemic effects of social media manipulation on
campaign messaging and the
news cycle (see supplementary materials for further details).
Step 1: We must catalog exposures to manipulation, which we
define as impressions (i.e.,
serving of an ad or message to a viewer) of paid and organic
manipulative content (9) (e.g.,
false content intended to deceive voters, or even true content
propagated by foreign actors,
who are banned from participating in domestic political
processes, with the intent of
manipulating voters). To do so, we must evaluate the reach of
manipulation campaigns and
analyze the targeting strategies that distribute these
impressions. For example, we need to
2/11
know which text, image, and video messages were advertised,
organically posted, and
“boosted” through paid advertising, and on which platforms, as
well as when and how each
of these messages was shared and reshared by voters (2) and
inauthentic accounts. Here,
understanding social multiplier effects, or how individuals
influence each other, will be
essential, and the literature on peer effects in social networks
describes how our peers
change our behavior (6–8). The content of the messages should
also be analyzed to assess
the effectiveness of particular textual, image, and video content
in changing opinions and
behavior.
Much prior work on exposure to and diffusion of
(mis)information has relied on proxies for
exposure, such as who follows whom on social media (2, 4),
though some has also
investigated logs of impressions, recognizing the role of
algorithmic ranking and auctions in
determining exposure [e.g., (5, 10)]. Given prior work on the
rapid decay of advertising
effects, it is important to consider when these exposures
occurred, as recent work suggests
that exposure to misinformation may increase just prior to an
election and wane
immediately afterward (2).
Step 2: We must combine exposure data with data on voting
behavior. Data about voter
turnout in the United States are readily available in public
records (e.g., registered voters'
names, addresses, party affiliations, and when they voted). Prior
work has matched social
media accounts and public voting records using relatively
coarse data (e.g., residences
inferred from self-reported profile data and group-level,
anonymous matching procedures)
(2, 8), in part because of privacy concerns, resulting in low
match rates that limit statistical
power and representativeness. This could be substantially
improved, for example, by using
the rich location data possessed by social media platforms,
similar to that already sold and
reused for marketing purposes (e.g., matching voter
registrations with inferred home
addresses based on mobile and other location data), rather than
simply matching voters by
name and age at the state level.
In contrast to turnout data, vote choices in the United States are
secret and thus only
measurable in aggregate (e.g., precinct-level vote totals and
shares) or sparsely and
indirectly through surveys (e.g., exit polls). Thus, exposure data
would need to be
aggregated, at the precinct, district, or state levels, before
combining it with vote choice
data, making it likely that estimates of voter turnout effects will
be more precise than
estimates of vote choice effects.
Experiments demonstrate that persuasive interventions can
substantially affect voter
turnout. But, when assessing turnout, it is important to
remember that voting is habitual.
Effective manipulation therefore likely requires targeting
occasional voters in battleground
regions. In social media, however, this type of targeting is
possible and took place during
the 2016 U.S. presidential election. Analysis of the precision of
targeting efforts is essential
to understanding voter turnout effects.
3/11
Influencing vote choice is more difficult because likely voters
have strong prior beliefs.
However, even the pessimistic literature on vote choice allows
for substantial effects,
especially when targeted messages change voters' beliefs. In a
meta-analysis of 16 field
experiments, Kalla and Broockman (11) report a wide 95%
confidence interval (CI) of
[−0.27%, 0.83%] for the effect of impersonal contact (e.g.,
mail, ads) on vote choice within 2
months of general elections, and larger, more significant effects
in primaries and on issue-
specific ballot measures. In Rogers and Nickerson (12),
informing recipients in favor of
abortion rights that a candidate was not consistently supportive
of such rights had a 3.90%
[95% CI: 1.16%, 6.64%] effect on reported vote choice. Such
prior beliefs are predictable and
addressable in manipulation campaigns through social media
targeting and thus
measurable in studies of the effectiveness of such manipulation.
Step 3: We must assess the effects of manipulative messages on
opinions and behavior. This
requires a rigorous approach to causal inference, as naïve,
observational approaches would
neglect the confounding factors that cause both exposure and
voting behavior (e.g., voters
targeted with such content are more likely to be sympathetic to
it). Evaluations using
randomized experiments have shown that observational
estimates of social media influence
without careful causal inference are frequently off by more than
100%. Effects of nonpaid
exposures, estimated without causal inference, have been off by
as much as 300 to 700%.
Yet, causal claims about why social media messages spread are
routinely made without any
discussion of causal inference. Widely publicized claims about
the effectiveness of targeting
voters by inferred personality traits, as allegedly conducted by
Cambridge Analytica, were
not based on randomized experiments or any other rigorous
causal inference and
therefore plausibly suffer from similar biases.
Download high-res image
Open in new tab
Download Powerpoint
A blueprint for empirical investigations of social media
manipulation
To credibly estimate the effects of misinformation on changes
in opinions and behaviors, we
must change our approach and embrace causal inference. We
must analyze similar people
exposed to varying levels of misinformation, perhaps due to
random chance or explicit
4/11
https://science.sciencemag.org/content/sci/365/6456/858/F1.larg
e.jpg?width=800&height=600&carousel=1
https://science.sciencemag.org/content/sci/365/6456/858/F1.larg
e.jpg?download=true
https://science.sciencemag.org/content/sci/365/6456/858/F1.larg
e.jpg
https://science.sciencemag.org/highwire/powerpoint/730913
randomization by firms and campaigns. Fortunately, there are
many, until-now largely
ignored, sources of such random variation. For example,
Facebook and Twitter constantly
test new variations on their feed ranking algorithms, which
cause people to be exposed to
varying levels of different types of content. Some preliminary
analysis suggests that an A/B
test run by Facebook during the 2012 U.S. presidential election
caused over 1 million
Americans to be exposed to more “hard news” from established
sources, affecting political
knowledge, policy preferences, and voter turnout (10). Most of
these routine experiments
are not intended specifically to modulate exposure to political
content, but recent work has
illustrated how the random variation produced by hundreds or
thousands of routine tests,
of the kind these platforms conduct every day, can be used to
estimate the effects of
exposure to such content (13). Such experiments could facilitate
measurement of both
direct effects (e.g., effects of manipulative content on
recipients) and indirect “spillover”
effects (e.g., word of mouth from recipients to peers), though
other methods for estimating
the latter also exist (6–8).
One important challenge is that statistical precision is often
inadequate to answer many
questions about effects on voter behavior. For example,
randomized experiments
conducted by Facebook in the 2010 and 2012 U.S. elections
only barely detected effects on
turnout—even though the estimated effects imply that a minimal
intervention caused
hundreds of thousands of additional votes to be cast [e.g., (8)].
The lack of statistical
precision in those studies arose in part because only about a
tenth of users were uniquely
matched to voter records, which, as we note, could be improved
upon. Furthermore, unlike
television advertising, much less of the as-good-as-random
variation in exposure to social
media may be within, not between, geographic areas, making
effects on aggregate vote
shares more difficult to detect. Such imprecision can be
misleading, suggesting that online
advertising does not work simply because the effects were too
small to detect in a given
study (14), even though the results were consistent with
markedly low costs per incremental
vote, making engagement in such campaigns economically
rational.
Step 4: We must compute the aggregate consequences of
changes in voting behavior for
election outcomes. To do so, we would combine summaries of
individual-level
counterfactuals (i.e., predicted voter behavior with and without
exposure) with data on the
abundance of exposed voters by geographic, demographic, and
other characteristics in
specific elections. This would enable estimates and confidence
intervals for vote totals in
specific states or regions if a social media manipulation
campaign had not been conducted.
Although some of these confidence intervals will include vote
totals that do or do not alter
the winner in a particular contest, the ranges of counterfactual
outcomes would still be
informative about how such manipulation can alter elections.
Although it remains to be
seen exactly how precise the resulting estimates of the effects
of exposure to
misinformation would be, even sufficiently precise and
carefully communicated null results
could exclude scenarios currently posited by many
commentators.
5/11
Research should also address the systemic effects of social
media manipulation, like
countermessaging and feedback on the news cycle itself.
Countermessaging could be
studied in, for example, the replies to and debunking of fake
news on Facebook and Twitter
(4, 5) and whether the emergence of fake stories alters the
narrative trajectories of
messaging by campaigns or other interested groups. Feedback
into the news cycle could be
studied by examining the causal impact of manipulation on the
topical content of news
coverage. For example, Ananya Sen and Pinar Yildirim have
used as-good-as-random
variation in the weather to show that more viewership to
particular news stories causes
publishers to write more stories on those topics. A similar
approach could determine
whether attention to misinformation alters the topical trajectory
of the news cycle.
We believe near-real-time and ex post analysis are both possible
and helpful. The bulk of
what we are proposing is ex post analysis of what happened,
which can then be used to
design platforms and policy to prevent future manipulation. The
pace at which voting data
(whether in primaries or general elections) become available is
a key limitation. But real-
time detection of manipulation efforts and reaction to them
could also be designed, similar
to tactics in digital advertising that estimate targeting models
offline and then implement
real-time bidding based on those estimates. Experimental
analysis of the effect of social
media on behavior change can be spun up and conducted by the
platforms in a matter of
days and analyzed in a week.
Legal, Ethical, and Political Implications
We have described what a rigorous analysis of social media
manipulation would entail, but
have also assumed that the data required to conduct it are
available for analysis. But does
the social media data that we describe above, especially data
about the content that
individuals were exposed to, exist retrospectively or going
forward? Social media companies
routinely log what users are exposed to for research and
retraining algorithms. But current
regulatory regimes disincentivize the lossless retention of this
data. For example, the
European Union's General Data Protection Regulation (GDPR)
encourages firms to comply
with user requests to delete data about them, including content
that they have posted. An
audit by the office of the Irish Data Protection Commissioner
caused Facebook to
implement similar policies in 2012. Thus, without targeted
retention, it may be difficult for
firms to accurately quantify exposures for users who deleted
their accounts or were
exposed to content deleted by others. We should recognize that
well-intentioned privacy
regulations, though important, may also impede assessments
like the one that we propose.
Similarly, proposed legislation in the United States (the
DETOUR Act) could make many
routine randomized experiments by these firms illegal (Senate
Bill 1084), making future
retrospective analyses more difficult and, of course, making
ongoing efforts by those firms
to limit such manipulation less data-driven.
Even if such data are available, it is not obvious that we should
accept world governments
6/11
demanding access to or analyses of those data to quantify the
effects of speech in elections.
Although we suggest that linking datasets could be achieved
using rich location data
routinely used for marketing, such use may be reasonably
regarded as data misuse. Thus,
we do not unconditionally advocate the use of any and all
existing data for the proposed
analyses. Instead, privacy-preserving methods for record
linkage and content analysis, such
as differential privacy (15), could help manage trade-offs
between the need for privacy and
the need to protect democracy.
Hardening democracies to manipulation will take extraordinary
political and commercial
will. Politicians in the United States, for example, may have
countervailing incentives to
support or oppose a postmortem on Russian interference, and
companies like Facebook,
Twitter, and Google face pressure to secure personal data.
Perhaps this is why Social
Science One, the forward-looking industry–academic
partnership working to provide access
to funding and Facebook data to study the effects of social
media on democracy, faced long
delays in securing access to any data, and why its most recent
release does not include any
data relevant to a postmortem on Russian interference in the
2016 or 2018 elections in the
United States. Moreover, this cannot just be about any single
company or platform.
Comprehensive analysis must include Facebook, Twitter,
YouTube, and others. Perhaps only
mounting pressure from legislators and the public will empower
experts with the access
they need to do the work that is required.
Research collaborations with social media platforms, like that
being undertaken by Social
Science One, can facilitate access to important data for
understanding democracy's
vulnerability to social media manipulation. We hope the
realization that the analysis we
propose is bigger than any one election and essential to
protecting democracies worldwide
will help overcome partisanship and myopic commercial
interests in making the necessary
data available, in privacy-preserving ways.
However, it is important to note that prior work has linked
social media messaging to
validated voting, both with the assistance of the social media
platforms (8) and without it (2).
Although collaboration with the platforms is preferable, it is not
the only way to assess
manipulation. In the absence of commercial or governmental
support for postmortems on
past elections, active analysis of ongoing information
operations, conducted according to
the framework that we propose, is a viable and valuable
alternative. A detailed
understanding of country-specific regulations and election
procedures is necessary for
robust analysis of the effects of social media manipulation on
democracies worldwide.
Our suggested approach emphasizes precise causal inference,
but this should be
complemented with surveys, ethnographies, and analysis of
observational data to
understand the mechanisms through which manipulation can
affect opinions and behavior.
Achieving a scientific understanding of the effects of social
media manipulation on elections
is an important civic duty. Without it, democracies remain
vulnerable. The sooner we begin
7/11
a public discussion of the trade-offs between privacy, free
speech, and democracy that arise
from the pursuit of this science, the sooner we can realize a path
forward.
Supplementary Materials
science.sciencemag.org/content/365/6456/858/suppl/DC1
http://www.sciencemag.org/about/science-licenses-journal-
article-reuse
This is an article distributed under the terms of the Science
Journals Default License.
References and Notes
1. ↵
1. H. Allcott,
2. M. Gentzkow
, J. Econ. Perspect. 31, 211 (2017).
CrossRefGoogle Scholar
2. ↵
1. N. Grinberg,
2. K. Joseph,
3. L. Friedland,
4. B. Swire-Thompson,
5. D. Lazer
, Science 363, 374 (2019).
Abstract/FREE Full TextGoogle Scholar
3. ↵
1. K. H. Jamieson
, Cyberwar: How Russian Hackers and Trolls Helped Elect a
President (Oxford Univ. Press,
2018).
Google Scholar
4. ↵
1. S. Vosoughi,
2. D. Roy,
3. S. Aral
, Science 359, 1146 (2018).
Abstract/FREE Full TextGoogle Scholar
8/11
http://science.sciencemag.org/content/365/6456/858/suppl/DC1
http://www.sciencemag.org/about/science-licenses-journal-
article-reuse
http://www.sciencemag.org/about/science-licenses-journal-
article-reuse
https://science.sciencemag.org/lookup/external-
ref?access_num=10.1257/jep.31.2.211&link_type=DOI
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
J.+Econ.+Perspect.+31%2C+211+(2017).
https://science.sciencemag.org/lookup/ijlink/YTozOntzOjQ6InB
hdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5Ij
thOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMT
oiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjE
yOiIzNjMvNjQyNS8zNzQiO3M6NDoiYXRvbSI7czoyMjoiL3Nj
aS8zNjUvNjQ1Ni84NTguYXRvbSI7fXM6ODoiZnJhZ21lbnQiO
3M6MDoiIjt9
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Science+363%2C+374+(2019).
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Cyberwar%3A+How+Russian+Hackers+and+Trolls+Helped+Ele
ct+a+President+(Oxford+Univ.+Press%2C+2018).
https://science.sciencemag.org/lookup/ijlink/YTozOntzOjQ6InB
hdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5Ij
thOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMT
oiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjE
zOiIzNTkvNjM4MC8xMTQ2IjtzOjQ6ImF0b20iO3M6MjI6Ii9zY
2kvMzY1LzY0NTYvODU4LmF0b20iO31zOjg6ImZyYWdtZW5
0IjtzOjA6IiI7fQ==
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Science+359%2C+1146+(2018).
5. ↵
1. A. Friggeri,
2. L. A. Adamic,
3. D. Eckles,
4. J. Cheng
, in Proceedings of the International Conference on Web and
Social Media (Association for
the Advancement of Artificial Intelligence, 2014).
Google Scholar
6. ↵
1. S. Aral,
2. D. Walker
, Science 337, 337 (2012).
Abstract/FREE Full TextGoogle Scholar
7. ↵
1. S. Aral,
2. C. Nicolaides
, Nat. Commun. 8, 14753 (2017).
Google Scholar
8. ↵
1. R. M. Bond et al
., Nature 489, 295 (2012).
9. ↵
1. A. Guess,
2. B. Nyhan,
3. J. Reifler
, Selective exposure to misinformation: Evidence from the
consumption of fake news during
the 2016 US presidential campaign (European Research
Council, 2018).
Google Scholar
10. ↵
1. S. Messing
, Friends that Matter: How Social Transmission of Elite
Discourse Shapes Political
Knowledge, Attitudes, and Behavior, , Stanford University
(2013).
Google Scholar
11. ↵
1. J. L. Kalla,
2. D. E. Broockman
, Am. Polit. Sci. Rev. 112, 148 (2018).
Google Scholar
12. ↵ T. Rogers, D. Nickerson, Can inaccurate beliefs about
incumbents be changed? And
can reframing change votes? HKS Working Paper no. RWP13-
018 (2013).
9/11
https://science.sciencemag.org/loo kup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
in+Proceedings+of+the+International+Conference+on+Web+and
+Social+Media+(Association+for+the+Advancement+of+Artific
ial+Intelligence%2C+2014).
https://science.sciencemag.org/lookup/ijlink/YTozOntzOjQ6InB
hdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5Ij
thOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMT
oiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjE
yOiIzMzcvNjA5Mi8zMzciO3M6NDoiYXRvbSI7czoyMjoiL3Nja
S8zNjUvNjQ1Ni84NTguYXRvbSI7fXM6ODoiZnJhZ21lbnQiO3
M6MDoiIjt9
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Science+337%2C+337+(2012).
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Nat.+Commun.+8%2C+14753+(2017).
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Selective+exposure+to+misinformation%3A+Evidence+from+th
e+consumption+of+fake+news+during+the+2016+US+presidenti
al+campaign+(European+Research+Council%2C+2018).
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Friends+that+Matter%3A+How+Social+Transmission+of+Elite+
Discourse+Shapes+Political+Knowledge%2C+Attitudes%2C+an
d+Behavior%2C+Ph.D.+thesis%2C+Stanford+University+(2013
).
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Am.+Polit.+Sci.+Rev.+112%2C+148+(2018).
13. ↵
1. A. Peysakhovich,
2. D. Eckles
, Learning causal effects from many randomized experiments
using regularized
instrumental variables, in Proceedings of the 2018 World Wide
Web Conference
(International World Wide Web Conferences Steering
Committee , 2018), pp. 699–707.
Google Scholar
14. ↵
1. D. E. Broockman,
2. D. P. Green
, Polit. Behav. 36, 263 (2014).
Google Scholar
15. ↵
1. C. Dwork
, Differential privacy: A survey of results, in Proceedings of the
International Conference on
Theory and Applications of Models of Computation (Springer,
2008).
Google Scholar
Acknowledgments: We thank A. J. Berinsky and B. Nyhan for
comments. S.A. has financial
interest in Alibaba, Google, Amazon, and Twitter. S.A. was a
Scholar in Residence at the New
York Times in 2013 and visiting researcher at Microsoft in
2016. S.A. has received research
funding from The Boston Globe and speaking fees from
Microsoft. S.A. is an inventor on a
related patent pending. D.E. has financial interest in Facebook,
Amazon, Google, and
Twitter. D.E. was a consultant at Microsoft in 2018. D.E. was
an employee and consultant at
Facebook from 2010 to 2017. D.E. has recently received
funding from Amazon. D.E.'s
attendance at conferences has recently been funded by DARPA,
Microsoft, and Technology
Crossover Ventures. D.E. is an inventor on a related patent,
which is assigned to Facebook.
S.A. and D.E. contributed equally to this work.
View Abstract
Recommended articles from TrendMD
1. How to Use Social Media for Professional Development in
Medicine
myHealthTalent, 2020
2. 3 ways medical job seekers can leverage social media
myHealthTalent, 2018
3. Financing climate-resilient infrastructure: Determining risk,
reward, and return on
investment
Peter B. MEYER1 et al., Frontiers of Engineering Management,
2019
10/11
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&author[0]=A
.+Peysakhovich&author[1]=D.+Eckles&title=Learning+causal+e
ffects+from+many+randomized+experiments+using+regularized
+instrumental+variables&publication_year=2018&pages=699-
707
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+
Polit.+Behav.+36%2C+263+(2014).
https://science.sciencemag.org/lookup/google-
scholar?link_type=googlescholar&gs_type=article&author[0]=C
.+Dwork&title=Differential+privacy:+A+survey+of+results&pu
blication_year=2008
https://science.sciencemag.org/content/365/6456/858.abstract
https://blog.myhealthtalent.com/?p=1265&preview=true&utm_s
ource=TrendMD&utm_medium=cpc&utm_campaign=myHealthT
alent_TrendMD_1
http://blog.myhealthtalent.com/advice/3-ways-medical-job-
seekers-can-leverage-social-
media/?utm_source=TrendMD&utm_medium=cpc&utm_campai
gn=myHealthTalent_TrendMD_1
http://www.engineering.org.cn/default/page/loadPageIndex?pag
eId=ab4265bb601844d298ec9cd21f046661&id=26272&utm_sou
rce=TrendMD&utm_medium=cpc&utm_campaign=Frontiers_of
_Engineering_Management_TrendMD_1
4. An overview of proven Climate Change Vulnerability
Assessment tools for forests and
forest-dependent communities across the globe: a literature
analysis
Caterina Guidi et al., Journal of Forestry Research, 2018
5. Self-esteem, self-confidence, and self-motivation for the
development of ecology in
China
Wenhua Li, Ecosystem Health and Sustainability, 2018
11/11
https://link.springer.com/article/10.1007/s11676-018-0611-
z?utm_source=TrendMD&utm_medium=cpc&utm_campaign=Jo
urnal_of_Forestry_Research_TrendMD_1
https://www.tandfonline.com/doi/full/10.1080/20964129.2018.1
485468?utm_source=TrendMD&utm_medium=cpc&utm_campai
gn=Ecosystem_Health_and_Sustainability_TrendMD_1Protectin
g elections from social media manipulationMeasuring
ManipulationLegal, Ethical, and Political
ImplicationsSupplementary MaterialsReferences and
NotesRecommended articles from TrendMD
U.S. Unleashes Military to Fight Fake News, Disinformation
bloomberg.com/news/articles/2019-08-31/u-s-unleashes-
military-to-fight-fake-news-disinformation
Photographer: stevanovicigor/iStockphoto
cybersecurity
By
Pete Norman
August 31, 2019, 9:43 AM EDT
Pentagon research to sift 250,000 news items in initial phase
Fears grow about viral political memes polarizing society
Fake news and social media posts are such a threat to U.S.
security that the Defense
Department is launching a project to repel “large-scale,
automated disinformation attacks,”
as the top Republican in Congress blocks efforts to protect the
integrity of elections.
The Defense Advanced Research Projects Agency wants custom
software that can unearth
fakes hidden among more than 500,000 stories, photos, video
and audio clips. If successful,
the system after four years of trials may expand to detect
malicious intent and prevent viral
fake news from polarizing society.
“A decade ago, today’s state-of-the-art would have registered as
sci-fi — that’s how fast the
improvements have come,” said Andrew Grotto at the Center for
International Security at
Stanford University. “There is no reason to think the pace of
innovation will slow any time
soon.”
U.S. officials have been working on plans to prevent outside
hackers from flooding social
channels with false information ahead of the 2020 election. The
drive has been hindered by
Senate Majority Leader Mitch McConnell’s refusal to consider
election-security legislation.
Critics have labeled him #MoscowMitch, saying he left the U.S.
vulnerable to meddling by
Russia, prompting his retort of “modern-day McCarthyism.”
Risk Factor
1/4
https://www.bloomberg.com/news/articles/2019-08-31/u-s-
unleashes-military-to-fight-fake-news-disinformation
https://www.bloomberg.com/authors/ASPqlbqhB0M/pete-
norman
https://www.bloomberg.com/quote/0329914Z:US
https://www.bloomberg.com/quote/0053963D:US
https://www.bloomberg.com/quote/4458Z:RU
https://www.bloomberg.com/news/articles/2019-07-31/-
moscow-mitch-puts-mcconnell-on-defense-over-election-
security
President Donald Trump has repeatedly rejected allegations that
dubious content on
platforms like Facebook, Twitter and Google aided his election
win. Hillary Clinton
supporters claimed a flood of fake items may have helped sway
the results in 2016.
How Russia Meddling Became Social Media’s Problem:
QuickTake Q&A
“The risk factor is social media being abused and used to
influence the elections,” Syracuse
University assistant professor of communications Jennifer
Grygiel said in a telephone
interview. “It’s really interesting that Darpa is trying to create
these detection systems but
good luck is what I say. It won’t be anywhere near perfect until
there is legislative oversight.
There’s a huge gap and that’s a concern.”
False news stories and so-called deepfakes are increasingly
sophisticated and making it
more difficult for data-driven software to spot. AI imagery has
advanced in recent years and
is now used by Hollywood, the fashion industry and facial
recognition systems. Researchers
have shown that these generative adversarial networks -- or
GANs -- can be used to create
fake videos.
Facebook co-founder Mark Zuckerberg sits at the witness table
after a break during a joint hearing of
the Senate Judiciary and Commerce Committees in Washington,
D.C., U.S., on Tuesday, April 10,
2018.
Photographer: Andrew Harrer/Bloomberg
Famously, Oscar-winning filmmaker Jordan Peele created a fake
video of former President
Barack Obama talking about the Black Panthers, Ben Carson,
and making an alleged slur
against Trump, to highlight the risk of trusting material online.
After the 2016 election, Facebook Chief Executive Officer Mark
Zuckerberg played down
fake news as a challenge for the world’s biggest social media
platform. He later signaled that
he took the problem seriously and would let users flag content
and enable fact-checkers to
label stories in dispute. These judgments subsequently
prevented stories being turned into
paid advertisements, which were one key avenue toward viral
promotion.
In June, Zuckerberg said Facebook made an “execution mistake”
when it didn’t act fast
enough to identify a doctored video of House Speaker Nancy
Pelosi in which her speech was
slurred and distorted.
“Where things get especially scary is the prospect of malicious
actors combining different
forms of fake content into a seamless platform,” Grotto said.
“Researchers can already
produce convincing fake videos, generate persuasively realistic
text, and deploy chatbots to
interact with people. Imagine the potential persuasive impact on
vulnerable people that
integrating these technologies could have: an interactive
deepfake of an influential person
engaged in AI-directed propaganda on a bot-to-person basis.”
2/4
https://www.bloomberg.com/news/articles/2017-10-31/how-
russia-meddling-became-social-media-s-problem-quicktake-q-a
https://www.bloomberg.com/news/articles/2019-08-
19/deepfakes-can-help-you-dance
https://medium.com/@jonathan_hui/gan-some-cool-
applications-of-gans-4c9ecca35900
https://www.buzzfeednews.com/article/davidmack/obama-fake-
news-jordan-peele-psa-video-buzzfeed
https://www.facebook.com/notes/mark-zuckerberg/building-
global-community/10103508221158471/
https://www.bloomberg.com/news/articles/2019-06-
26/facebook-ceo-company-was-too-slow-to-respond-to-pelosi-
deepfake
By increasing the number algorithm checks, the military
research agency hopes it can spot
fake news with malicious intent before going viral.
“A comprehensive suite of semantic inconsistency detectors
would dramatically increase the
burden on media falsifiers, requiring the creators of falsified
media to get every semantic
detail correct, while defenders only need to find one, or a very
few, inconsistencies,” the
agency said in its Aug. 23 concept document for the Semantic
Forensics program.
Semantic Errors
The agency added: “These SemaFor technologies will help
identify, deter, and understand
adversary disinformation campaigns.”
Current surveillance systems are prone to “semantic errors.” An
example, according to the
agency, is software not noticing mismatched earrings in a fake
video or photo. Other
indicators, which may be noticed by humans but missed by
machines, include weird teeth,
messy hair and unusual backgrounds.
Deepfakes Can Help You Dance, But They’re Not Always So
Innocent
The algorithm testing process will include an ability to scan and
evaluate 250,000 news
articles and 250,000 social media posts, with 5,000 fake items
in the mix. The program has
three phases over 48 months, initially covering news and social
media, before an analysis
begins of technical propaganda. The project will also include
week-long “hackathons.”
A timeline of the program in the DARPA broad agency
announcement.
DARPA
Program manager Matt Turek discussed the program on
Thursday in Arlington, Virginia,
with potential software designers. Darpa didn’t provide an on-
the-record comment.
Tech Gap
The agency also has an existing research program underway,
called MediFor, which is trying
to plug a technological gap in image authentication, as no end-
to-end system can verify
manipulation of images taken by digital cameras and
smartphones.
“Mirroring this rise in digital imagery is the associated ability
for even relatively unskilled
users to manipulate and distort the message of the visual
media,” according to the agency’s
website. “While many manipulations are benign, performed for
fun or for artistic value,
others are for adversarial purposes, such as propaganda or
misinformation campaigns.”
With a four-year project scale for SemaFor, the next election
will have come and gone
before the system is operational.
3/4
https://medium.com/@kcimc/how-to-recognize-fake-ai-
generated-images-4d1f6f9a2842
https://www.bloomberg.com/news/articles/2019-08-
19/deepfakes-can-help-you-dance
https://www.darpa.mil/staff/dr-matt-turek
https://www.darpa.mil/program/media-forensics
“This timeline is too slow and I wonder if it is a bit of PR,”
Grygiel said. “Educating the public
on media literacy, along with legislation, is what is important.
But elected officials lack
motivation themselves for change, and there is a conflict of
interest as they are using these
very platforms to get elected.”
Before it's here, it's on the Bloomberg Terminal.
Watch Live TV Listen to Live Radio
Most Read
4/4
https://www.bloomberg.com/live
https://www.bloomberg.com/audioU.S. Unleashes Military to
Fight Fake News, DisinformationRisk FactorSemantic
ErrorsTech GapMost Read

More Related Content

Similar to Protecting elections from social media manipulationscience.s

Mass Media and the Depoliticization of Personal Experience.docx
 Mass Media and the Depoliticization of Personal Experience.docx Mass Media and the Depoliticization of Personal Experience.docx
Mass Media and the Depoliticization of Personal Experience.docxaryan532920
 
Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...Joshua Wong
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsMSL
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsMSL Germany
 
Dov Levin - Partisan electoral interventions by the great powers: Introducing...
Dov Levin - Partisan electoral interventions by the great powers: Introducing...Dov Levin - Partisan electoral interventions by the great powers: Introducing...
Dov Levin - Partisan electoral interventions by the great powers: Introducing...Davide J. Mancino
 
What could politics learn from brands?
What could politics learn from brands?What could politics learn from brands?
What could politics learn from brands?TNS
 
Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017
Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017
Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017EnriqueJavierBurbano
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docxAttaUrRahman78
 
A literature review on Social Influence in Decision Making and its measuremen...
A literature review on Social Influence in Decision Making and its measuremen...A literature review on Social Influence in Decision Making and its measuremen...
A literature review on Social Influence in Decision Making and its measuremen...Mohsen Bahrami
 
Final Research Project
Final Research ProjectFinal Research Project
Final Research ProjectMollie Neal
 
Media in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenarioMedia in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenarioAI Publications
 
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1crore projects
 
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...IRJET Journal
 
Week 3Rational and Expressive Choice Rational Choice The.docx
Week 3Rational and Expressive Choice  Rational Choice The.docxWeek 3Rational and Expressive Choice  Rational Choice The.docx
Week 3Rational and Expressive Choice Rational Choice The.docxmelbruce90096
 
While research can be interesting in regards to understanding so.docx
While research can be interesting in regards to understanding so.docxWhile research can be interesting in regards to understanding so.docx
While research can be interesting in regards to understanding so.docxmansonagnus
 

Similar to Protecting elections from social media manipulationscience.s (20)

Mass Media and the Depoliticization of Personal Experience.docx
 Mass Media and the Depoliticization of Personal Experience.docx Mass Media and the Depoliticization of Personal Experience.docx
Mass Media and the Depoliticization of Personal Experience.docx
 
Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public Affairs
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public Affairs
 
Monitoring of the Last US Presidential Elections
Monitoring of the Last US Presidential ElectionsMonitoring of the Last US Presidential Elections
Monitoring of the Last US Presidential Elections
 
Dov Levin - Partisan electoral interventions by the great powers: Introducing...
Dov Levin - Partisan electoral interventions by the great powers: Introducing...Dov Levin - Partisan electoral interventions by the great powers: Introducing...
Dov Levin - Partisan electoral interventions by the great powers: Introducing...
 
What could politics learn from brands?
What could politics learn from brands?What could politics learn from brands?
What could politics learn from brands?
 
Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017
Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017
Aimoneetal2018 altruisticpunishment voting_ejpe_resub_march_2017
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
 
A literature review on Social Influence in Decision Making and its measuremen...
A literature review on Social Influence in Decision Making and its measuremen...A literature review on Social Influence in Decision Making and its measuremen...
A literature review on Social Influence in Decision Making and its measuremen...
 
Ijsrp p10682
Ijsrp p10682Ijsrp p10682
Ijsrp p10682
 
Final Research Project
Final Research ProjectFinal Research Project
Final Research Project
 
Media in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenarioMedia in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenario
 
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
 
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
 
Week 3Rational and Expressive Choice Rational Choice The.docx
Week 3Rational and Expressive Choice  Rational Choice The.docxWeek 3Rational and Expressive Choice  Rational Choice The.docx
Week 3Rational and Expressive Choice Rational Choice The.docx
 
C427 Research Paper
C427 Research PaperC427 Research Paper
C427 Research Paper
 
While research can be interesting in regards to understanding so.docx
While research can be interesting in regards to understanding so.docxWhile research can be interesting in regards to understanding so.docx
While research can be interesting in regards to understanding so.docx
 
Econometric Analysis
Econometric AnalysisEconometric Analysis
Econometric Analysis
 

More from janekahananbw

Please Read Below carefully, then answer all questions with orig.docx
Please Read Below carefully, then answer all questions with orig.docxPlease Read Below carefully, then answer all questions with orig.docx
Please Read Below carefully, then answer all questions with orig.docxjanekahananbw
 
Please read and view (where applicable) the following Learning Res.docx
Please read and view (where applicable) the following Learning Res.docxPlease read and view (where applicable) the following Learning Res.docx
Please read and view (where applicable) the following Learning Res.docxjanekahananbw
 
Please read and reference the following articlesPopa, M., & Salan.docx
Please read and reference the following articlesPopa, M., & Salan.docxPlease read and reference the following articlesPopa, M., & Salan.docx
Please read and reference the following articlesPopa, M., & Salan.docxjanekahananbw
 
Please read all  attached documents .. This ILab instructions are at.docx
Please read all  attached documents .. This ILab instructions are at.docxPlease read all  attached documents .. This ILab instructions are at.docx
Please read all  attached documents .. This ILab instructions are at.docxjanekahananbw
 
PLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docx
PLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docxPLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docx
PLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docxjanekahananbw
 
Please provide a short paper, is 2–3 pages, 600 words minimum, due.docx
Please provide a short paper, is 2–3 pages, 600 words minimum, due.docxPlease provide a short paper, is 2–3 pages, 600 words minimum, due.docx
Please provide a short paper, is 2–3 pages, 600 words minimum, due.docxjanekahananbw
 
Please provideOverall RecommendationsManagementSolutions.docx
Please provideOverall RecommendationsManagementSolutions.docxPlease provideOverall RecommendationsManagementSolutions.docx
Please provideOverall RecommendationsManagementSolutions.docxjanekahananbw
 
Please provide a comprehensive answer to the following two quest.docx
Please provide a comprehensive answer to the following two quest.docxPlease provide a comprehensive answer to the following two quest.docx
Please provide a comprehensive answer to the following two quest.docxjanekahananbw
 
Please pick 2 of the questions.  write 400 words each on the ones yo.docx
Please pick 2 of the questions.  write 400 words each on the ones yo.docxPlease pick 2 of the questions.  write 400 words each on the ones yo.docx
Please pick 2 of the questions.  write 400 words each on the ones yo.docxjanekahananbw
 
Please pay close  attention to the directions given in the templat.docx
Please pay close  attention to the directions given in the templat.docxPlease pay close  attention to the directions given in the templat.docx
Please pay close  attention to the directions given in the templat.docxjanekahananbw
 
Please list and describe three (3) categories of methods to prop.docx
Please list and describe three (3) categories of methods to prop.docxPlease list and describe three (3) categories of methods to prop.docx
Please list and describe three (3) categories of methods to prop.docxjanekahananbw
 
Please look through the following links and find something interesti.docx
Please look through the following links and find something interesti.docxPlease look through the following links and find something interesti.docx
Please look through the following links and find something interesti.docxjanekahananbw
 
please identify following termsContraceptive entrepreneur        .docx
please identify following termsContraceptive entrepreneur        .docxplease identify following termsContraceptive entrepreneur        .docx
please identify following termsContraceptive entrepreneur        .docxjanekahananbw
 
Please keep plagiarism at 22 or less assignment sent through Tu.docx
Please keep plagiarism at 22 or less assignment sent through Tu.docxPlease keep plagiarism at 22 or less assignment sent through Tu.docx
Please keep plagiarism at 22 or less assignment sent through Tu.docxjanekahananbw
 
Please let me know you will do this assignment. thanks for everythin.docx
Please let me know you will do this assignment. thanks for everythin.docxPlease let me know you will do this assignment. thanks for everythin.docx
Please let me know you will do this assignment. thanks for everythin.docxjanekahananbw
 
Please look at httplabor.mo.govsitesdefaultfilespubs_forms20.docx
Please look at httplabor.mo.govsitesdefaultfilespubs_forms20.docxPlease look at httplabor.mo.govsitesdefaultfilespubs_forms20.docx
Please look at httplabor.mo.govsitesdefaultfilespubs_forms20.docxjanekahananbw
 
Please help me write a 6-7 pages research about Pica in Iron Defici.docx
Please help me write a 6-7 pages research about Pica in Iron Defici.docxPlease help me write a 6-7 pages research about Pica in Iron Defici.docx
Please help me write a 6-7 pages research about Pica in Iron Defici.docxjanekahananbw
 
please i want to do a presnatation and write me the presntaion  in 2.docx
please i want to do a presnatation and write me the presntaion  in 2.docxplease i want to do a presnatation and write me the presntaion  in 2.docx
please i want to do a presnatation and write me the presntaion  in 2.docxjanekahananbw
 
Please follow the assignment below.  The example assignment will be .docx
Please follow the assignment below.  The example assignment will be .docxPlease follow the assignment below.  The example assignment will be .docx
Please follow the assignment below.  The example assignment will be .docxjanekahananbw
 
Please find the attached for instruction.Please carefully read t.docx
Please find the attached for instruction.Please carefully read t.docxPlease find the attached for instruction.Please carefully read t.docx
Please find the attached for instruction.Please carefully read t.docxjanekahananbw
 

More from janekahananbw (20)

Please Read Below carefully, then answer all questions with orig.docx
Please Read Below carefully, then answer all questions with orig.docxPlease Read Below carefully, then answer all questions with orig.docx
Please Read Below carefully, then answer all questions with orig.docx
 
Please read and view (where applicable) the following Learning Res.docx
Please read and view (where applicable) the following Learning Res.docxPlease read and view (where applicable) the following Learning Res.docx
Please read and view (where applicable) the following Learning Res.docx
 
Please read and reference the following articlesPopa, M., & Salan.docx
Please read and reference the following articlesPopa, M., & Salan.docxPlease read and reference the following articlesPopa, M., & Salan.docx
Please read and reference the following articlesPopa, M., & Salan.docx
 
Please read all  attached documents .. This ILab instructions are at.docx
Please read all  attached documents .. This ILab instructions are at.docxPlease read all  attached documents .. This ILab instructions are at.docx
Please read all  attached documents .. This ILab instructions are at.docx
 
PLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docx
PLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docxPLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docx
PLEASE READ BACKGROUND INFO BELOW.  TURNIT IN IS USEDModule 4 .docx
 
Please provide a short paper, is 2–3 pages, 600 words minimum, due.docx
Please provide a short paper, is 2–3 pages, 600 words minimum, due.docxPlease provide a short paper, is 2–3 pages, 600 words minimum, due.docx
Please provide a short paper, is 2–3 pages, 600 words minimum, due.docx
 
Please provideOverall RecommendationsManagementSolutions.docx
Please provideOverall RecommendationsManagementSolutions.docxPlease provideOverall RecommendationsManagementSolutions.docx
Please provideOverall RecommendationsManagementSolutions.docx
 
Please provide a comprehensive answer to the following two quest.docx
Please provide a comprehensive answer to the following two quest.docxPlease provide a comprehensive answer to the following two quest.docx
Please provide a comprehensive answer to the following two quest.docx
 
Please pick 2 of the questions.  write 400 words each on the ones yo.docx
Please pick 2 of the questions.  write 400 words each on the ones yo.docxPlease pick 2 of the questions.  write 400 words each on the ones yo.docx
Please pick 2 of the questions.  write 400 words each on the ones yo.docx
 
Please pay close  attention to the directions given in the templat.docx
Please pay close  attention to the directions given in the templat.docxPlease pay close  attention to the directions given in the templat.docx
Please pay close  attention to the directions given in the templat.docx
 
Please list and describe three (3) categories of methods to prop.docx
Please list and describe three (3) categories of methods to prop.docxPlease list and describe three (3) categories of methods to prop.docx
Please list and describe three (3) categories of methods to prop.docx
 
Please look through the following links and find something interesti.docx
Please look through the following links and find something interesti.docxPlease look through the following links and find something interesti.docx
Please look through the following links and find something interesti.docx
 
please identify following termsContraceptive entrepreneur        .docx
please identify following termsContraceptive entrepreneur        .docxplease identify following termsContraceptive entrepreneur        .docx
please identify following termsContraceptive entrepreneur        .docx
 
Please keep plagiarism at 22 or less assignment sent through Tu.docx
Please keep plagiarism at 22 or less assignment sent through Tu.docxPlease keep plagiarism at 22 or less assignment sent through Tu.docx
Please keep plagiarism at 22 or less assignment sent through Tu.docx
 
Please let me know you will do this assignment. thanks for everythin.docx
Please let me know you will do this assignment. thanks for everythin.docxPlease let me know you will do this assignment. thanks for everythin.docx
Please let me know you will do this assignment. thanks for everythin.docx
 
Please look at httplabor.mo.govsitesdefaultfilespubs_forms20.docx
Please look at httplabor.mo.govsitesdefaultfilespubs_forms20.docxPlease look at httplabor.mo.govsitesdefaultfilespubs_forms20.docx
Please look at httplabor.mo.govsitesdefaultfilespubs_forms20.docx
 
Please help me write a 6-7 pages research about Pica in Iron Defici.docx
Please help me write a 6-7 pages research about Pica in Iron Defici.docxPlease help me write a 6-7 pages research about Pica in Iron Defici.docx
Please help me write a 6-7 pages research about Pica in Iron Defici.docx
 
please i want to do a presnatation and write me the presntaion  in 2.docx
please i want to do a presnatation and write me the presntaion  in 2.docxplease i want to do a presnatation and write me the presntaion  in 2.docx
please i want to do a presnatation and write me the presntaion  in 2.docx
 
Please follow the assignment below.  The example assignment will be .docx
Please follow the assignment below.  The example assignment will be .docxPlease follow the assignment below.  The example assignment will be .docx
Please follow the assignment below.  The example assignment will be .docx
 
Please find the attached for instruction.Please carefully read t.docx
Please find the attached for instruction.Please carefully read t.docxPlease find the attached for instruction.Please carefully read t.docx
Please find the attached for instruction.Please carefully read t.docx
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

Protecting elections from social media manipulationscience.s

  • 1. Protecting elections from social media manipulation science.sciencemag.org/content/365/6456/858 Policy ForumScience and Democracy 1. Sinan Aral1,2,3, 2. Dean Eckles1,2 See all authors and affiliations "ILLUSTRATION: BROBEL DESIGN" To what extent are democratic elections vulnerable to social media manipulation? The fractured state of research and evidence on this most important question facing democracy is reflected in the range of disagreement among experts. Facebook chief executive officer Mark Zuckerberg has repeatedly called on the U.S. government to regulate election manipulation through social media. But we cannot manage what we do not measure. Without an organized research agenda that informs policy, democracies will remain vulnerable to
  • 2. foreign and domestic attacks. Thankfully, social media's effects are, in our view, eminently measurable. Here, we advocate a research agenda for measuring social media manipulation of elections, highlight underutilized approaches to rigorous causal inference, and discuss political, legal, and ethical implications of undertaking such analysis. Consideration of this research agenda illuminates the need to overcome important trade-offs for public and corporate policy—for example, between election integrity and privacy. We have promising research tools, but they have not been applied to election manipulation, mainly because of a lack of access to data and lack of cooperation from the platforms (driven in part by public policy and political constraints). 1/11 https://science.sciencemag.org/content/365/6456/858 Two recent studies commissioned by the U.S. Senate Intelligence Committee detail Russian misinformation campaigns targeting hundreds of millions of U.S. citizens during the 2016 presidential election. The reports highlight, but do not answer, whether social media manipulation may have influenced the outcome. Some experts argue that Russia-sponsored content on social media likely did not decide the election because Russian-linked spending and exposure to fake news (1, 2) were smallscale. Others contend that a combination of Russian trolls and hacking likely tipped the election for Donald
  • 3. Trump (3). Similar disagreements exist about the UK referendum on leaving the European Union and recent elections in Brazil, Sweden, and India. Such disagreement is understandable, given the distinctive challenges of studying social media manipulation of elections. For example, unlike the majority of linear television advertising, social media can be personally targeted; assess ing its reach requires analysis of paid and unpaid media, ranking algorithms and advertising auctions; and causal analysis is necessary to understand how social media changes opinions and voting. Luckily, much of the necessary methodology has already been developed. A growing body of literature illuminates how social media influences behavior. Analysis of misinformation on Twitter and Facebook (4, 5), and randomized and natural experiments involving hundreds of millions of people on various platforms, have shown how social media changes how we shop, read, and exercise [e.g., (6, 7)]. Similar methods can and should be applied to voting (8). Research on election manipulation will be enabled and constrained by parallel policy initiatives that aim, for example, to protect privacy. Although privacy legislation may prohibit retention of consumer data, such data may also be critical to understanding how to harden our democracies against manipulation. To preserve democracy in the digital age, we must
  • 4. manage these trade-offs and overcome multidisciplinary methodological challenges simultaneously. Measuring Manipulation We propose a four-step research agenda for estimating the causal effects of social media manipulation on voter turnout and vote choice (see the figure). We also describe analysis of the indirect, systemic effects of social media manipulation on campaign messaging and the news cycle (see supplementary materials for further details). Step 1: We must catalog exposures to manipulation, which we define as impressions (i.e., serving of an ad or message to a viewer) of paid and organic manipulative content (9) (e.g., false content intended to deceive voters, or even true content propagated by foreign actors, who are banned from participating in domestic political processes, with the intent of manipulating voters). To do so, we must evaluate the reach of manipulation campaigns and analyze the targeting strategies that distribute these impressions. For example, we need to 2/11 know which text, image, and video messages were advertised, organically posted, and “boosted” through paid advertising, and on which platforms, as well as when and how each of these messages was shared and reshared by voters (2) and inauthentic accounts. Here,
  • 5. understanding social multiplier effects, or how individuals influence each other, will be essential, and the literature on peer effects in social networks describes how our peers change our behavior (6–8). The content of the messages should also be analyzed to assess the effectiveness of particular textual, image, and video content in changing opinions and behavior. Much prior work on exposure to and diffusion of (mis)information has relied on proxies for exposure, such as who follows whom on social media (2, 4), though some has also investigated logs of impressions, recognizing the role of algorithmic ranking and auctions in determining exposure [e.g., (5, 10)]. Given prior work on the rapid decay of advertising effects, it is important to consider when these exposures occurred, as recent work suggests that exposure to misinformation may increase just prior to an election and wane immediately afterward (2). Step 2: We must combine exposure data with data on voting behavior. Data about voter turnout in the United States are readily available in public records (e.g., registered voters' names, addresses, party affiliations, and when they voted). Prior work has matched social media accounts and public voting records using relatively coarse data (e.g., residences inferred from self-reported profile data and group-level, anonymous matching procedures) (2, 8), in part because of privacy concerns, resulting in low match rates that limit statistical
  • 6. power and representativeness. This could be substantially improved, for example, by using the rich location data possessed by social media platforms, similar to that already sold and reused for marketing purposes (e.g., matching voter registrations with inferred home addresses based on mobile and other location data), rather than simply matching voters by name and age at the state level. In contrast to turnout data, vote choices in the United States are secret and thus only measurable in aggregate (e.g., precinct-level vote totals and shares) or sparsely and indirectly through surveys (e.g., exit polls). Thus, exposure data would need to be aggregated, at the precinct, district, or state levels, before combining it with vote choice data, making it likely that estimates of voter turnout effects will be more precise than estimates of vote choice effects. Experiments demonstrate that persuasive interventions can substantially affect voter turnout. But, when assessing turnout, it is important to remember that voting is habitual. Effective manipulation therefore likely requires targeting occasional voters in battleground regions. In social media, however, this type of targeting is possible and took place during the 2016 U.S. presidential election. Analysis of the precision of targeting efforts is essential to understanding voter turnout effects. 3/11
  • 7. Influencing vote choice is more difficult because likely voters have strong prior beliefs. However, even the pessimistic literature on vote choice allows for substantial effects, especially when targeted messages change voters' beliefs. In a meta-analysis of 16 field experiments, Kalla and Broockman (11) report a wide 95% confidence interval (CI) of [−0.27%, 0.83%] for the effect of impersonal contact (e.g., mail, ads) on vote choice within 2 months of general elections, and larger, more significant effects in primaries and on issue- specific ballot measures. In Rogers and Nickerson (12), informing recipients in favor of abortion rights that a candidate was not consistently supportive of such rights had a 3.90% [95% CI: 1.16%, 6.64%] effect on reported vote choice. Such prior beliefs are predictable and addressable in manipulation campaigns through social media targeting and thus measurable in studies of the effectiveness of such manipulation. Step 3: We must assess the effects of manipulative messages on opinions and behavior. This requires a rigorous approach to causal inference, as naïve, observational approaches would neglect the confounding factors that cause both exposure and voting behavior (e.g., voters targeted with such content are more likely to be sympathetic to it). Evaluations using randomized experiments have shown that observational estimates of social media influence without careful causal inference are frequently off by more than 100%. Effects of nonpaid
  • 8. exposures, estimated without causal inference, have been off by as much as 300 to 700%. Yet, causal claims about why social media messages spread are routinely made without any discussion of causal inference. Widely publicized claims about the effectiveness of targeting voters by inferred personality traits, as allegedly conducted by Cambridge Analytica, were not based on randomized experiments or any other rigorous causal inference and therefore plausibly suffer from similar biases. Download high-res image Open in new tab Download Powerpoint A blueprint for empirical investigations of social media manipulation To credibly estimate the effects of misinformation on changes in opinions and behaviors, we must change our approach and embrace causal inference. We must analyze similar people exposed to varying levels of misinformation, perhaps due to random chance or explicit 4/11 https://science.sciencemag.org/content/sci/365/6456/858/F1.larg e.jpg?width=800&height=600&carousel=1 https://science.sciencemag.org/content/sci/365/6456/858/F1.larg e.jpg?download=true https://science.sciencemag.org/content/sci/365/6456/858/F1.larg e.jpg https://science.sciencemag.org/highwire/powerpoint/730913
  • 9. randomization by firms and campaigns. Fortunately, there are many, until-now largely ignored, sources of such random variation. For example, Facebook and Twitter constantly test new variations on their feed ranking algorithms, which cause people to be exposed to varying levels of different types of content. Some preliminary analysis suggests that an A/B test run by Facebook during the 2012 U.S. presidential election caused over 1 million Americans to be exposed to more “hard news” from established sources, affecting political knowledge, policy preferences, and voter turnout (10). Most of these routine experiments are not intended specifically to modulate exposure to political content, but recent work has illustrated how the random variation produced by hundreds or thousands of routine tests, of the kind these platforms conduct every day, can be used to estimate the effects of exposure to such content (13). Such experiments could facilitate measurement of both direct effects (e.g., effects of manipulative content on recipients) and indirect “spillover” effects (e.g., word of mouth from recipients to peers), though other methods for estimating the latter also exist (6–8). One important challenge is that statistical precision is often inadequate to answer many questions about effects on voter behavior. For example, randomized experiments conducted by Facebook in the 2010 and 2012 U.S. elections only barely detected effects on
  • 10. turnout—even though the estimated effects imply that a minimal intervention caused hundreds of thousands of additional votes to be cast [e.g., (8)]. The lack of statistical precision in those studies arose in part because only about a tenth of users were uniquely matched to voter records, which, as we note, could be improved upon. Furthermore, unlike television advertising, much less of the as-good-as-random variation in exposure to social media may be within, not between, geographic areas, making effects on aggregate vote shares more difficult to detect. Such imprecision can be misleading, suggesting that online advertising does not work simply because the effects were too small to detect in a given study (14), even though the results were consistent with markedly low costs per incremental vote, making engagement in such campaigns economically rational. Step 4: We must compute the aggregate consequences of changes in voting behavior for election outcomes. To do so, we would combine summaries of individual-level counterfactuals (i.e., predicted voter behavior with and without exposure) with data on the abundance of exposed voters by geographic, demographic, and other characteristics in specific elections. This would enable estimates and confidence intervals for vote totals in specific states or regions if a social media manipulation campaign had not been conducted. Although some of these confidence intervals will include vote totals that do or do not alter the winner in a particular contest, the ranges of counterfactual
  • 11. outcomes would still be informative about how such manipulation can alter elections. Although it remains to be seen exactly how precise the resulting estimates of the effects of exposure to misinformation would be, even sufficiently precise and carefully communicated null results could exclude scenarios currently posited by many commentators. 5/11 Research should also address the systemic effects of social media manipulation, like countermessaging and feedback on the news cycle itself. Countermessaging could be studied in, for example, the replies to and debunking of fake news on Facebook and Twitter (4, 5) and whether the emergence of fake stories alters the narrative trajectories of messaging by campaigns or other interested groups. Feedback into the news cycle could be studied by examining the causal impact of manipulation on the topical content of news coverage. For example, Ananya Sen and Pinar Yildirim have used as-good-as-random variation in the weather to show that more viewership to particular news stories causes publishers to write more stories on those topics. A similar approach could determine whether attention to misinformation alters the topical trajectory of the news cycle. We believe near-real-time and ex post analysis are both possible
  • 12. and helpful. The bulk of what we are proposing is ex post analysis of what happened, which can then be used to design platforms and policy to prevent future manipulation. The pace at which voting data (whether in primaries or general elections) become available is a key limitation. But real- time detection of manipulation efforts and reaction to them could also be designed, similar to tactics in digital advertising that estimate targeting models offline and then implement real-time bidding based on those estimates. Experimental analysis of the effect of social media on behavior change can be spun up and conducted by the platforms in a matter of days and analyzed in a week. Legal, Ethical, and Political Implications We have described what a rigorous analysis of social media manipulation would entail, but have also assumed that the data required to conduct it are available for analysis. But does the social media data that we describe above, especially data about the content that individuals were exposed to, exist retrospectively or going forward? Social media companies routinely log what users are exposed to for research and retraining algorithms. But current regulatory regimes disincentivize the lossless retention of this data. For example, the European Union's General Data Protection Regulation (GDPR) encourages firms to comply with user requests to delete data about them, including content that they have posted. An audit by the office of the Irish Data Protection Commissioner caused Facebook to
  • 13. implement similar policies in 2012. Thus, without targeted retention, it may be difficult for firms to accurately quantify exposures for users who deleted their accounts or were exposed to content deleted by others. We should recognize that well-intentioned privacy regulations, though important, may also impede assessments like the one that we propose. Similarly, proposed legislation in the United States (the DETOUR Act) could make many routine randomized experiments by these firms illegal (Senate Bill 1084), making future retrospective analyses more difficult and, of course, making ongoing efforts by those firms to limit such manipulation less data-driven. Even if such data are available, it is not obvious that we should accept world governments 6/11 demanding access to or analyses of those data to quantify the effects of speech in elections. Although we suggest that linking datasets could be achieved using rich location data routinely used for marketing, such use may be reasonably regarded as data misuse. Thus, we do not unconditionally advocate the use of any and all existing data for the proposed analyses. Instead, privacy-preserving methods for record linkage and content analysis, such as differential privacy (15), could help manage trade-offs between the need for privacy and the need to protect democracy.
  • 14. Hardening democracies to manipulation will take extraordinary political and commercial will. Politicians in the United States, for example, may have countervailing incentives to support or oppose a postmortem on Russian interference, and companies like Facebook, Twitter, and Google face pressure to secure personal data. Perhaps this is why Social Science One, the forward-looking industry–academic partnership working to provide access to funding and Facebook data to study the effects of social media on democracy, faced long delays in securing access to any data, and why its most recent release does not include any data relevant to a postmortem on Russian interference in the 2016 or 2018 elections in the United States. Moreover, this cannot just be about any single company or platform. Comprehensive analysis must include Facebook, Twitter, YouTube, and others. Perhaps only mounting pressure from legislators and the public will empower experts with the access they need to do the work that is required. Research collaborations with social media platforms, like that being undertaken by Social Science One, can facilitate access to important data for understanding democracy's vulnerability to social media manipulation. We hope the realization that the analysis we propose is bigger than any one election and essential to protecting democracies worldwide will help overcome partisanship and myopic commercial interests in making the necessary data available, in privacy-preserving ways.
  • 15. However, it is important to note that prior work has linked social media messaging to validated voting, both with the assistance of the social media platforms (8) and without it (2). Although collaboration with the platforms is preferable, it is not the only way to assess manipulation. In the absence of commercial or governmental support for postmortems on past elections, active analysis of ongoing information operations, conducted according to the framework that we propose, is a viable and valuable alternative. A detailed understanding of country-specific regulations and election procedures is necessary for robust analysis of the effects of social media manipulation on democracies worldwide. Our suggested approach emphasizes precise causal inference, but this should be complemented with surveys, ethnographies, and analysis of observational data to understand the mechanisms through which manipulation can affect opinions and behavior. Achieving a scientific understanding of the effects of social media manipulation on elections is an important civic duty. Without it, democracies remain vulnerable. The sooner we begin 7/11 a public discussion of the trade-offs between privacy, free speech, and democracy that arise from the pursuit of this science, the sooner we can realize a path
  • 16. forward. Supplementary Materials science.sciencemag.org/content/365/6456/858/suppl/DC1 http://www.sciencemag.org/about/science-licenses-journal- article-reuse This is an article distributed under the terms of the Science Journals Default License. References and Notes 1. ↵ 1. H. Allcott, 2. M. Gentzkow , J. Econ. Perspect. 31, 211 (2017). CrossRefGoogle Scholar 2. ↵ 1. N. Grinberg, 2. K. Joseph, 3. L. Friedland, 4. B. Swire-Thompson, 5. D. Lazer , Science 363, 374 (2019). Abstract/FREE Full TextGoogle Scholar 3. ↵ 1. K. H. Jamieson , Cyberwar: How Russian Hackers and Trolls Helped Elect a President (Oxford Univ. Press, 2018). Google Scholar
  • 17. 4. ↵ 1. S. Vosoughi, 2. D. Roy, 3. S. Aral , Science 359, 1146 (2018). Abstract/FREE Full TextGoogle Scholar 8/11 http://science.sciencemag.org/content/365/6456/858/suppl/DC1 http://www.sciencemag.org/about/science-licenses-journal- article-reuse http://www.sciencemag.org/about/science-licenses-journal- article-reuse https://science.sciencemag.org/lookup/external- ref?access_num=10.1257/jep.31.2.211&link_type=DOI https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ J.+Econ.+Perspect.+31%2C+211+(2017). https://science.sciencemag.org/lookup/ijlink/YTozOntzOjQ6InB hdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5Ij thOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMT oiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjE yOiIzNjMvNjQyNS8zNzQiO3M6NDoiYXRvbSI7czoyMjoiL3Nj aS8zNjUvNjQ1Ni84NTguYXRvbSI7fXM6ODoiZnJhZ21lbnQiO 3M6MDoiIjt9 https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Science+363%2C+374+(2019). https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Cyberwar%3A+How+Russian+Hackers+and+Trolls+Helped+Ele ct+a+President+(Oxford+Univ.+Press%2C+2018). https://science.sciencemag.org/lookup/ijlink/YTozOntzOjQ6InB
  • 18. hdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5Ij thOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMT oiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjE zOiIzNTkvNjM4MC8xMTQ2IjtzOjQ6ImF0b20iO3M6MjI6Ii9zY 2kvMzY1LzY0NTYvODU4LmF0b20iO31zOjg6ImZyYWdtZW5 0IjtzOjA6IiI7fQ== https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Science+359%2C+1146+(2018). 5. ↵ 1. A. Friggeri, 2. L. A. Adamic, 3. D. Eckles, 4. J. Cheng , in Proceedings of the International Conference on Web and Social Media (Association for the Advancement of Artificial Intelligence, 2014). Google Scholar 6. ↵ 1. S. Aral, 2. D. Walker , Science 337, 337 (2012). Abstract/FREE Full TextGoogle Scholar 7. ↵ 1. S. Aral, 2. C. Nicolaides , Nat. Commun. 8, 14753 (2017). Google Scholar
  • 19. 8. ↵ 1. R. M. Bond et al ., Nature 489, 295 (2012). 9. ↵ 1. A. Guess, 2. B. Nyhan, 3. J. Reifler , Selective exposure to misinformation: Evidence from the consumption of fake news during the 2016 US presidential campaign (European Research Council, 2018). Google Scholar 10. ↵ 1. S. Messing , Friends that Matter: How Social Transmission of Elite Discourse Shapes Political Knowledge, Attitudes, and Behavior, , Stanford University (2013). Google Scholar 11. ↵ 1. J. L. Kalla, 2. D. E. Broockman , Am. Polit. Sci. Rev. 112, 148 (2018). Google Scholar 12. ↵ T. Rogers, D. Nickerson, Can inaccurate beliefs about incumbents be changed? And can reframing change votes? HKS Working Paper no. RWP13- 018 (2013).
  • 20. 9/11 https://science.sciencemag.org/loo kup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ in+Proceedings+of+the+International+Conference+on+Web+and +Social+Media+(Association+for+the+Advancement+of+Artific ial+Intelligence%2C+2014). https://science.sciencemag.org/lookup/ijlink/YTozOntzOjQ6InB hdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5Ij thOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMT oiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjE yOiIzMzcvNjA5Mi8zMzciO3M6NDoiYXRvbSI7czoyMjoiL3Nja S8zNjUvNjQ1Ni84NTguYXRvbSI7fXM6ODoiZnJhZ21lbnQiO3 M6MDoiIjt9 https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Science+337%2C+337+(2012). https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Nat.+Commun.+8%2C+14753+(2017). https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Selective+exposure+to+misinformation%3A+Evidence+from+th e+consumption+of+fake+news+during+the+2016+US+presidenti al+campaign+(European+Research+Council%2C+2018). https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Friends+that+Matter%3A+How+Social+Transmission+of+Elite+ Discourse+Shapes+Political+Knowledge%2C+Attitudes%2C+an d+Behavior%2C+Ph.D.+thesis%2C+Stanford+University+(2013 ). https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Am.+Polit.+Sci.+Rev.+112%2C+148+(2018).
  • 21. 13. ↵ 1. A. Peysakhovich, 2. D. Eckles , Learning causal effects from many randomized experiments using regularized instrumental variables, in Proceedings of the 2018 World Wide Web Conference (International World Wide Web Conferences Steering Committee , 2018), pp. 699–707. Google Scholar 14. ↵ 1. D. E. Broockman, 2. D. P. Green , Polit. Behav. 36, 263 (2014). Google Scholar 15. ↵ 1. C. Dwork , Differential privacy: A survey of results, in Proceedings of the International Conference on Theory and Applications of Models of Computation (Springer, 2008). Google Scholar Acknowledgments: We thank A. J. Berinsky and B. Nyhan for comments. S.A. has financial interest in Alibaba, Google, Amazon, and Twitter. S.A. was a Scholar in Residence at the New York Times in 2013 and visiting researcher at Microsoft in 2016. S.A. has received research funding from The Boston Globe and speaking fees from
  • 22. Microsoft. S.A. is an inventor on a related patent pending. D.E. has financial interest in Facebook, Amazon, Google, and Twitter. D.E. was a consultant at Microsoft in 2018. D.E. was an employee and consultant at Facebook from 2010 to 2017. D.E. has recently received funding from Amazon. D.E.'s attendance at conferences has recently been funded by DARPA, Microsoft, and Technology Crossover Ventures. D.E. is an inventor on a related patent, which is assigned to Facebook. S.A. and D.E. contributed equally to this work. View Abstract Recommended articles from TrendMD 1. How to Use Social Media for Professional Development in Medicine myHealthTalent, 2020 2. 3 ways medical job seekers can leverage social media myHealthTalent, 2018 3. Financing climate-resilient infrastructure: Determining risk, reward, and return on investment Peter B. MEYER1 et al., Frontiers of Engineering Management, 2019 10/11 https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&author[0]=A .+Peysakhovich&author[1]=D.+Eckles&title=Learning+causal+e ffects+from+many+randomized+experiments+using+regularized
  • 23. +instrumental+variables&publication_year=2018&pages=699- 707 https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&q_txt=%2C+ Polit.+Behav.+36%2C+263+(2014). https://science.sciencemag.org/lookup/google- scholar?link_type=googlescholar&gs_type=article&author[0]=C .+Dwork&title=Differential+privacy:+A+survey+of+results&pu blication_year=2008 https://science.sciencemag.org/content/365/6456/858.abstract https://blog.myhealthtalent.com/?p=1265&preview=true&utm_s ource=TrendMD&utm_medium=cpc&utm_campaign=myHealthT alent_TrendMD_1 http://blog.myhealthtalent.com/advice/3-ways-medical-job- seekers-can-leverage-social- media/?utm_source=TrendMD&utm_medium=cpc&utm_campai gn=myHealthTalent_TrendMD_1 http://www.engineering.org.cn/default/page/loadPageIndex?pag eId=ab4265bb601844d298ec9cd21f046661&id=26272&utm_sou rce=TrendMD&utm_medium=cpc&utm_campaign=Frontiers_of _Engineering_Management_TrendMD_1 4. An overview of proven Climate Change Vulnerability Assessment tools for forests and forest-dependent communities across the globe: a literature analysis Caterina Guidi et al., Journal of Forestry Research, 2018 5. Self-esteem, self-confidence, and self-motivation for the development of ecology in China Wenhua Li, Ecosystem Health and Sustainability, 2018 11/11
  • 24. https://link.springer.com/article/10.1007/s11676-018-0611- z?utm_source=TrendMD&utm_medium=cpc&utm_campaign=Jo urnal_of_Forestry_Research_TrendMD_1 https://www.tandfonline.com/doi/full/10.1080/20964129.2018.1 485468?utm_source=TrendMD&utm_medium=cpc&utm_campai gn=Ecosystem_Health_and_Sustainability_TrendMD_1Protectin g elections from social media manipulationMeasuring ManipulationLegal, Ethical, and Political ImplicationsSupplementary MaterialsReferences and NotesRecommended articles from TrendMD U.S. Unleashes Military to Fight Fake News, Disinformation bloomberg.com/news/articles/2019-08-31/u-s-unleashes- military-to-fight-fake-news-disinformation Photographer: stevanovicigor/iStockphoto cybersecurity By Pete Norman August 31, 2019, 9:43 AM EDT Pentagon research to sift 250,000 news items in initial phase Fears grow about viral political memes polarizing society Fake news and social media posts are such a threat to U.S. security that the Defense Department is launching a project to repel “large-scale, automated disinformation attacks,” as the top Republican in Congress blocks efforts to protect the integrity of elections.
  • 25. The Defense Advanced Research Projects Agency wants custom software that can unearth fakes hidden among more than 500,000 stories, photos, video and audio clips. If successful, the system after four years of trials may expand to detect malicious intent and prevent viral fake news from polarizing society. “A decade ago, today’s state-of-the-art would have registered as sci-fi — that’s how fast the improvements have come,” said Andrew Grotto at the Center for International Security at Stanford University. “There is no reason to think the pace of innovation will slow any time soon.” U.S. officials have been working on plans to prevent outside hackers from flooding social channels with false information ahead of the 2020 election. The drive has been hindered by Senate Majority Leader Mitch McConnell’s refusal to consider election-security legislation. Critics have labeled him #MoscowMitch, saying he left the U.S. vulnerable to meddling by Russia, prompting his retort of “modern-day McCarthyism.” Risk Factor 1/4 https://www.bloomberg.com/news/articles/2019-08-31/u-s- unleashes-military-to-fight-fake-news-disinformation https://www.bloomberg.com/authors/ASPqlbqhB0M/pete- norman https://www.bloomberg.com/quote/0329914Z:US
  • 26. https://www.bloomberg.com/quote/0053963D:US https://www.bloomberg.com/quote/4458Z:RU https://www.bloomberg.com/news/articles/2019-07-31/- moscow-mitch-puts-mcconnell-on-defense-over-election- security President Donald Trump has repeatedly rejected allegations that dubious content on platforms like Facebook, Twitter and Google aided his election win. Hillary Clinton supporters claimed a flood of fake items may have helped sway the results in 2016. How Russia Meddling Became Social Media’s Problem: QuickTake Q&A “The risk factor is social media being abused and used to influence the elections,” Syracuse University assistant professor of communications Jennifer Grygiel said in a telephone interview. “It’s really interesting that Darpa is trying to create these detection systems but good luck is what I say. It won’t be anywhere near perfect until there is legislative oversight. There’s a huge gap and that’s a concern.” False news stories and so-called deepfakes are increasingly sophisticated and making it more difficult for data-driven software to spot. AI imagery has advanced in recent years and is now used by Hollywood, the fashion industry and facial recognition systems. Researchers have shown that these generative adversarial networks -- or GANs -- can be used to create fake videos.
  • 27. Facebook co-founder Mark Zuckerberg sits at the witness table after a break during a joint hearing of the Senate Judiciary and Commerce Committees in Washington, D.C., U.S., on Tuesday, April 10, 2018. Photographer: Andrew Harrer/Bloomberg Famously, Oscar-winning filmmaker Jordan Peele created a fake video of former President Barack Obama talking about the Black Panthers, Ben Carson, and making an alleged slur against Trump, to highlight the risk of trusting material online. After the 2016 election, Facebook Chief Executive Officer Mark Zuckerberg played down fake news as a challenge for the world’s biggest social media platform. He later signaled that he took the problem seriously and would let users flag content and enable fact-checkers to label stories in dispute. These judgments subsequently prevented stories being turned into paid advertisements, which were one key avenue toward viral promotion. In June, Zuckerberg said Facebook made an “execution mistake” when it didn’t act fast enough to identify a doctored video of House Speaker Nancy Pelosi in which her speech was slurred and distorted. “Where things get especially scary is the prospect of malicious actors combining different forms of fake content into a seamless platform,” Grotto said. “Researchers can already
  • 28. produce convincing fake videos, generate persuasively realistic text, and deploy chatbots to interact with people. Imagine the potential persuasive impact on vulnerable people that integrating these technologies could have: an interactive deepfake of an influential person engaged in AI-directed propaganda on a bot-to-person basis.” 2/4 https://www.bloomberg.com/news/articles/2017-10-31/how- russia-meddling-became-social-media-s-problem-quicktake-q-a https://www.bloomberg.com/news/articles/2019-08- 19/deepfakes-can-help-you-dance https://medium.com/@jonathan_hui/gan-some-cool- applications-of-gans-4c9ecca35900 https://www.buzzfeednews.com/article/davidmack/obama-fake- news-jordan-peele-psa-video-buzzfeed https://www.facebook.com/notes/mark-zuckerberg/building- global-community/10103508221158471/ https://www.bloomberg.com/news/articles/2019-06- 26/facebook-ceo-company-was-too-slow-to-respond-to-pelosi- deepfake By increasing the number algorithm checks, the military research agency hopes it can spot fake news with malicious intent before going viral. “A comprehensive suite of semantic inconsistency detectors would dramatically increase the burden on media falsifiers, requiring the creators of falsified media to get every semantic detail correct, while defenders only need to find one, or a very few, inconsistencies,” the agency said in its Aug. 23 concept document for the Semantic
  • 29. Forensics program. Semantic Errors The agency added: “These SemaFor technologies will help identify, deter, and understand adversary disinformation campaigns.” Current surveillance systems are prone to “semantic errors.” An example, according to the agency, is software not noticing mismatched earrings in a fake video or photo. Other indicators, which may be noticed by humans but missed by machines, include weird teeth, messy hair and unusual backgrounds. Deepfakes Can Help You Dance, But They’re Not Always So Innocent The algorithm testing process will include an ability to scan and evaluate 250,000 news articles and 250,000 social media posts, with 5,000 fake items in the mix. The program has three phases over 48 months, initially covering news and social media, before an analysis begins of technical propaganda. The project will also include week-long “hackathons.” A timeline of the program in the DARPA broad agency announcement. DARPA Program manager Matt Turek discussed the program on Thursday in Arlington, Virginia, with potential software designers. Darpa didn’t provide an on- the-record comment.
  • 30. Tech Gap The agency also has an existing research program underway, called MediFor, which is trying to plug a technological gap in image authentication, as no end- to-end system can verify manipulation of images taken by digital cameras and smartphones. “Mirroring this rise in digital imagery is the associated ability for even relatively unskilled users to manipulate and distort the message of the visual media,” according to the agency’s website. “While many manipulations are benign, performed for fun or for artistic value, others are for adversarial purposes, such as propaganda or misinformation campaigns.” With a four-year project scale for SemaFor, the next election will have come and gone before the system is operational. 3/4 https://medium.com/@kcimc/how-to-recognize-fake-ai- generated-images-4d1f6f9a2842 https://www.bloomberg.com/news/articles/2019-08- 19/deepfakes-can-help-you-dance https://www.darpa.mil/staff/dr-matt-turek https://www.darpa.mil/program/media-forensics “This timeline is too slow and I wonder if it is a bit of PR,” Grygiel said. “Educating the public on media literacy, along with legislation, is what is important.
  • 31. But elected officials lack motivation themselves for change, and there is a conflict of interest as they are using these very platforms to get elected.” Before it's here, it's on the Bloomberg Terminal. Watch Live TV Listen to Live Radio Most Read 4/4 https://www.bloomberg.com/live https://www.bloomberg.com/audioU.S. Unleashes Military to Fight Fake News, DisinformationRisk FactorSemantic ErrorsTech GapMost Read