In the last few years, social media has gained an unprecedented amount of attention, playing a pivotal role in shaping the contemporary landscape of communication and connection. However, Coordinated inauthentic Behaviour (CIB), defined as orchestrated efforts by entities to deceive or mislead users about their identity and intentions, has emerged as a tactic to exploit the online discourse. In this study, we quantify the efficacy of CIB tactics by defining a general framework for evaluating the influence of a subset of nodes in a directed tree. We design two algorithms that provide optimal and greedy post-hoc placement strategies that lead to maximising the configuration influence. We then consider cascades from information spreading on X (formerly known as Twitter) to compare the observed behaviour with our algorithms. The results show that, according to our model, coordinated accounts are quite inefficient in terms of their network influence, thus suggesting that they may play a less pivotal role than expected. Moreover, the causes of these poor results may be found in two separate aspects: a bad placement strategy and a scarcity of resources.

Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated Accounts / Di Marco, Niccolò; Brunetti, Sara; Cinelli, Matteo; Quattrociocchi, Walter. - In: ACM TRANSACTIONS ON THE WEB. - ISSN 1559-1131. - 19:2(2025), pp. 1-19. [10.1145/3700644]

Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated Accounts

Brunetti, Sara;Cinelli, Matteo;Quattrociocchi, Walter
2025

Abstract

In the last few years, social media has gained an unprecedented amount of attention, playing a pivotal role in shaping the contemporary landscape of communication and connection. However, Coordinated inauthentic Behaviour (CIB), defined as orchestrated efforts by entities to deceive or mislead users about their identity and intentions, has emerged as a tactic to exploit the online discourse. In this study, we quantify the efficacy of CIB tactics by defining a general framework for evaluating the influence of a subset of nodes in a directed tree. We design two algorithms that provide optimal and greedy post-hoc placement strategies that lead to maximising the configuration influence. We then consider cascades from information spreading on X (formerly known as Twitter) to compare the observed behaviour with our algorithms. The results show that, according to our model, coordinated accounts are quite inefficient in terms of their network influence, thus suggesting that they may play a less pivotal role than expected. Moreover, the causes of these poor results may be found in two separate aspects: a bad placement strategy and a scarcity of resources.
2025
coordinated inauthentic behaviour; influence; Trees
01 Pubblicazione su rivista::01a Articolo in rivista
Post-hoc Evaluation of Nodes Influence in Information Cascades: The Case of Coordinated Accounts / Di Marco, Niccolò; Brunetti, Sara; Cinelli, Matteo; Quattrociocchi, Walter. - In: ACM TRANSACTIONS ON THE WEB. - ISSN 1559-1131. - 19:2(2025), pp. 1-19. [10.1145/3700644]
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1751930
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 1
social impact