Leveraging Structured Trusted-Peer Assessments to Combat Misinformation
نویسندگان
چکیده
Platform operators have devoted significant effort to combating misinformation on behalf of their users. Users are also stakeholders in this battle, but efforts combat go unsupported by the platforms. In work, we consider three new user affordances that give social media users greater power fight against misinformation: (1) ability provide structured accuracy assessments posts, (2) user-specified indication trust other users, and (3) configuration feed filters according assessed accuracy. To understand potential these designs, conducted a need-finding survey 192 people who share discuss news media, finding many already act limit or misinformation, albeit repurposing existing platform lack customized structure for information assessment. We then field study prototype implements as inputs directly impact how whether posts shown. The involved 14 participants used week while collectively assessing report users' perception use affordances. design implications platforms researchers based our empirical observations.
منابع مشابه
Securing Peer-to-Peer Networks Using Trusted Computing
It seems likely that TCG-compliant computing platforms will become widespread over the next few years. Once one accepts that the Trusted Computing paradigm offers an interesting and powerful set of security features, the natural question arises: for what purposes can this technology be exploited? In this chapter, we examine the application of Trusted Computing to securing Peer-to-Peer (P2P) net...
متن کاملTrusted information exchange in peer-to-peer mobile social networks
Social networks have recently been gaining popularity. In a peer-to-peer mobile social network (MSN), users with similar interests establish groups or communities and share information without relying on a centralized infrastructure. Users socially interact with each other using handheld mobile devices and membership in a group/community of MSNs is granted by a pre-existing group member. Howeve...
متن کاملPeer-to-Peer Security and Intels Peer-to-Peer Trusted Library
The peer-to-peer computing model is not new, but has recently become a commonplace among the average computer user due to the introduction of applications like Napster and Gnutella. Along with the freedom of connecting peer-to-peer come security risks. In response to some of these security risks, Intel has released a code library that software developers can use to strengthen the security of, a...
متن کاملHierarchical Structured Peer-to-Peer Networks
Structured peer-to-peer systems or distributed hash tables (DHT) are self-organizing distributed systems designed to support efficient and scalable lookups with dynamic network topology changes. Nodes are organized as structured overlay networks, and data is mapped to nodes in the overlap network based on their identifier. There are two main types of structured peer-to-peer architectures: flat ...
متن کاملA Programmable Structured Peer-to-Peer Overlay
Structured peer-to-peer (P2P) overlay are scalable, robust and self-organizing in nature, and provide a promising platform for a range of large-scale distributed applications. Applications proposed to date utilize a similar key-based routing service but “re-invent the wheel” by deploying their own dedicated structured P2P overlay network. This is highly inefficient and results in a significant ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ACM on human-computer interaction
سال: 2022
ISSN: ['2573-0142']
DOI: https://doi.org/10.1145/3555637