Peter Jachim
YOU?
Author Swipe
View article: 'Debunk-It-Yourself': Health Professionals' Strategies for Responding to Misinformation on TikTok
'Debunk-It-Yourself': Health Professionals' Strategies for Responding to Misinformation on TikTok Open
Misinformation is "sticky" in nature, requiring a considerable effort to undo its influence. One such effort is debunking or exposing the falsity of information. As an abundance of misinformation is on social media, platforms do bear some …
View article: Talking Abortion (Mis)information with ChatGPT on TikTok
Talking Abortion (Mis)information with ChatGPT on TikTok Open
In this study, we tested users' perception of accuracy and engagement with TikTok videos in which ChatGPT responded to prompts about "at-home" abortion remedies. The chatbot's responses, though somewhat vague and confusing, nonetheless rec…
View article: Abortion Misinformation on TikTok: Rampant Content, Lax Moderation, and Vivid User Experiences
Abortion Misinformation on TikTok: Rampant Content, Lax Moderation, and Vivid User Experiences Open
The scientific effort devoted to health misinformation mostly focuses on the implications of misleading vaccines and communicable disease claims with respect to public health. However, the proliferation of abortion misinformation following…
View article: “Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant
“Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant Open
This paper reports the findings from an empirical study investigating the effectiveness of using intelligent voice assistants, Amazon Alexa in our case, to deliver a phishing training to users. Because intelligent voice assistants can hard…
View article: Folk Models of Misinformation on Social Media
Folk Models of Misinformation on Social Media Open
In this paper we investigate what folk models of misinformation exist through semi-structured interviews with a sample of 235 social media users. Work on social media misinformation does not investigate how ordinary users - the target of m…
View article: Gone Quishing: A Field Study of Phishing with Malicious QR Codes
Gone Quishing: A Field Study of Phishing with Malicious QR Codes Open
The COVID-19 pandemic enabled "quishing", or phishing with malicious QR codes, as they became a convenient go-between for sharing URLs, including malicious ones. To explore the quishing phenomenon, we conducted a 173-participant study wher…
View article: "Gettr-ing" Deep Insights from the Social Network Gettr
"Gettr-ing" Deep Insights from the Social Network Gettr Open
As yet another alternative social network, Gettr positions itself as the "marketplace of ideas" where users should expect the truth to emerge without any administrative censorship. We looked deep inside the platform by analyzing it's struc…
View article: Parlermonium: A Data-Driven UX Design Evaluation of the Parler Platform
Parlermonium: A Data-Driven UX Design Evaluation of the Parler Platform Open
This paper evaluates Parler, the controversial social media platform, from two seemingly orthogonal perspectives: UX design perspective and data science. UX design researchers explore how users react to the interface/content of their socia…
View article: "Hey Alexa, What do You Know About the COVID-19 Vaccine?" -- (Mis)perceptions of Mass Immunization Among Voice Assistant Users
"Hey Alexa, What do You Know About the COVID-19 Vaccine?" -- (Mis)perceptions of Mass Immunization Among Voice Assistant Users Open
In this paper, we analyzed the perceived accuracy of COVID-19 vaccine information spoken back by Amazon Alexa. Unlike social media, Amazon Alexa doesn't apply soft moderation to unverified content, allowing for use of third-party malicious…
View article: TrollHunter2020: Real-time Detection of Trolling Narratives on Twitter During the 2020 U.S. Elections
TrollHunter2020: Real-time Detection of Trolling Narratives on Twitter During the 2020 U.S. Elections Open
This paper presents TrollHunter2020, a real-time detection mechanism we used to hunt for trolling narratives on Twitter during the 2020 U.S. elections. Trolling narratives form on Twitter as alternative explanations of polarizing events li…
View article: "TL;DR:" Out-of-Context Adversarial Text Summarization and Hashtag Recommendation
"TL;DR:" Out-of-Context Adversarial Text Summarization and Hashtag Recommendation Open
This paper presents Out-of-Context Summarizer, a tool that takes arbitrary public news articles out of context by summarizing them to coherently fit either a liberal- or conservative-leaning agenda. The Out-of-Context Summarizer also sugge…
View article: "TL;DR:" Out-of-Context Adversarial Text Summarization and Hashtag\n Recommendation
"TL;DR:" Out-of-Context Adversarial Text Summarization and Hashtag\n Recommendation Open
This paper presents Out-of-Context Summarizer, a tool that takes arbitrary\npublic news articles out of context by summarizing them to coherently fit\neither a liberal- or conservative-leaning agenda. The Out-of-Context Summarizer\nalso su…
View article: Misinformation Warning Labels: Twitter's Soft Moderation Effects on COVID-19 Vaccine Belief Echoes
Misinformation Warning Labels: Twitter's Soft Moderation Effects on COVID-19 Vaccine Belief Echoes Open
Twitter, prompted by the rapid spread of alternative narratives, started actively warning users about the spread of COVID-19 misinformation. This form of soft moderation comes in two forms: as a warning cover before the Tweet is displayed …
View article: TrollHunter2020: Real-Time Detection of Trolling Narratives on Twitter\n During the 2020 US Elections
TrollHunter2020: Real-Time Detection of Trolling Narratives on Twitter\n During the 2020 US Elections Open
This paper presents TrollHunter2020, a real-time detection mechanism we used\nto hunt for trolling narratives on Twitter during the 2020 U.S. elections.\nTrolling narratives form on Twitter as alternative explanations of polarizing\nevents…
View article: TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls\n During the COVID-19 Pandemic
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls\n During the COVID-19 Pandemic Open
This paper presents TrollHunter, an automated reasoning mechanism we used to\nhunt for trolls on Twitter during the COVID-19 pandemic in 2020. Trolls, poised\nto disrupt the online discourse and spread disinformation, quickly seized the\na…
View article: TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic Open
This paper presents TrollHunter, an automated reasoning mechanism we used to hunt for trolls on Twitter during the COVID-19 pandemic in 2020. Trolls, poised to disrupt the online discourse and spread disinformation, quickly seized the abse…
View article: WikipediaBot: Automated Adversarial Manipulation of Wikipedia Articles
WikipediaBot: Automated Adversarial Manipulation of Wikipedia Articles Open
This paper presents an automated adversarial mechanism called WikipediaBot. WikipediaBot allows an adversary to create and control a bot infrastructure for the purpose of adversarial edits of Wikipedia articles. The WikipediaBot is a self-…
View article: To Tweet or Not to Tweet: Covertly Manipulating a Twitter Debate on Vaccines Using Malware-Induced Misperceptions
To Tweet or Not to Tweet: Covertly Manipulating a Twitter Debate on Vaccines Using Malware-Induced Misperceptions Open
Trolling and social bots have been proven as powerful tactics for manipulating the public opinion and sowing discord among Twitter users. This effort requires substantial content fabrication and account coordination to evade Twitter's dete…
View article: Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse
Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse Open
Social media trolling is a powerful tactic to manipulate public opinion on issues with a high moral component. Troll farms, as evidenced in the past, created fabricated content to provoke or silence people to share their opinion on social …
View article: Meet Malexa, Alexa's Malicious Twin: Malware-Induced Misperception\n Through Intelligent Voice Assistants
Meet Malexa, Alexa's Malicious Twin: Malware-Induced Misperception\n Through Intelligent Voice Assistants Open
This paper reports the findings of a study where users (N=220) interacted\nwith Malexa, Alexa's malicious twin. Malexa is an intelligent voice assistant\nwith a simple and seemingly harmless third-party skill that delivers news\nbriefings …