Journal Article
Conspiracy Theories Have Much in Common. Their Differences May Hold the Key to Identifying When They Turn Violent.
Dec 22, 2021
Conspiracy theories circulated online contribute to a shift in public discourse away from facts and analysis and can contribute to public harm. Using linguistic and rhetorical theory, RAND researchers conducted a modeling effort to improve machine-learning technology for detecting conspiracy theory language. This report describes the results of that effort and offers recommendations to counter the effects of online conspiracy theories.
Improving Machine Learning to Detect and Understand Online Conspiracy Theories
Format | File Size | Notes |
---|---|---|
PDF file | 1 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Format | List Price | Price | |
---|---|---|---|
Add to Cart | Paperback108 pages | $22.50 | $18.00 20% Web Discount |
Conspiracy theories circulated online via social media contribute to a shift in public discourse away from facts and analysis and can contribute to direct public harm. Social media platforms face a difficult technical and policy challenge in trying to mitigate harm from online conspiracy theory language. As part of Google's Jigsaw unit's effort to confront emerging threats and incubate new technology to help create a safer world, RAND researchers conducted a modeling effort to improve machine-learning (ML) technology for detecting conspiracy theory language. They developed a hybrid model using linguistic and rhetorical theory to boost performance. They also aimed to synthesize existing research on conspiracy theories using new insight from this improved modeling effort. This report describes the results of that effort and offers recommendations to counter the effects of conspiracy theories that are spread online.
Chapter One
Introduction: Detecting and Understanding Online Conspiracy Language
Chapter Two
Making Sense of Conspiracy Theories
Chapter Three
Modeling Conspiracy Theories: A Hybrid Approach
Chapter Four
Conclusion and Recommendations
Appendix A
Data and Methodology
Appendix B
Stance: Text Analysis and Machine Learning
This research was sponsored by Google's Jigsaw unit and conducted within the International Security and Defense Policy Center of the RAND National Security Research Division (NSRD).
This report is part of the RAND Corporation Research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.