In the last years, social media has gained an unprecedented amount of attention, playing a pivotal role in shaping the contemporary landscape of communication and connection. However, Coordinated inauthentic Behaviour (CIB), defined as orchestrated efforts by entities to deceive or mislead users about their identity and intentions, has emerged as a tactic to exploit the online discourse. In this study, we quantify the efficacy of CIB tactics by defining a general framework for evaluating the influence of a subset of nodes in a directed tree. We design two algorithms that provide optimal and greedy post-hoc placement strategies that lead to maximising the configuration influence. We then consider cascades from information spreading on Twitter to compare the observed behaviour with our algorithms. The results show that, according to our model, coordinated accounts are quite inefficient in terms of their network influence, thus suggesting that they may play a less pivotal role than expected. Moreover, the causes of these poor results may be found in two separate aspects: a bad placement strategy and a scarcity of resources.

Di Marco, N., Brunetti, S., Cinelli, M., Quattrociocchi, W. (2025). Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated Accounts. ACM TRANSACTIONS ON THE WEB, 19(2), 1-19 [10.1145/3700644].

Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated Accounts

Brunetti, Sara;
2025-01-01

Abstract

In the last years, social media has gained an unprecedented amount of attention, playing a pivotal role in shaping the contemporary landscape of communication and connection. However, Coordinated inauthentic Behaviour (CIB), defined as orchestrated efforts by entities to deceive or mislead users about their identity and intentions, has emerged as a tactic to exploit the online discourse. In this study, we quantify the efficacy of CIB tactics by defining a general framework for evaluating the influence of a subset of nodes in a directed tree. We design two algorithms that provide optimal and greedy post-hoc placement strategies that lead to maximising the configuration influence. We then consider cascades from information spreading on Twitter to compare the observed behaviour with our algorithms. The results show that, according to our model, coordinated accounts are quite inefficient in terms of their network influence, thus suggesting that they may play a less pivotal role than expected. Moreover, the causes of these poor results may be found in two separate aspects: a bad placement strategy and a scarcity of resources.
2025
Di Marco, N., Brunetti, S., Cinelli, M., Quattrociocchi, W. (2025). Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated Accounts. ACM TRANSACTIONS ON THE WEB, 19(2), 1-19 [10.1145/3700644].
File in questo prodotto:
File Dimensione Formato  
3700644.pdf

accesso aperto

Tipologia: PDF editoriale
Licenza: Creative commons
Dimensione 773.87 kB
Formato Adobe PDF
773.87 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/1277576