Who watches the Birdwatchers? Sociotechnical vulnerabilities in Twitter's content contextualisation

Research output: Chapter in Book/Report/Published conference proceedingChapterpeer-review

Abstract

At the start of 2021, Twitter launched a closed US pilot of Birdwatch, seeking to promote credible information online by giving users the opportunity to add context to misleading tweets. The pilot shows awareness of the importance of context, and the challenges, risks and vulnerabilities the system will face. But the mitigations against these vulnerabilities of Birdwatch can exacerbate wider societal vulnerabilities created by Birdwatch. This article examines how Twitter presents the Birdwatch system, outlines a taxonomy of potential sociotechnical vulnerabilities, and situates these risks within broader social issues. We highlight the importance of watching the watchers, not only in terms of those using and potentially manipulating Birdwatch, but also the way Twitter is developing the system and their wider decision-making processes that impact on public discourse.
Original languageEnglish
Title of host publicationSocio-Technical Aspects in Security
Subtitle of host publication11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers
EditorsSimon Parkin, Luca Viganò
PublisherSpringer
Pages3-23
Number of pages21
ISBN (Electronic)978-3-031-10183-0
ISBN (Print)9783031101823
DOIs
Publication statusPublished - 14 Jul 2022
Event11th International Workshop on Socio-Technical Aspects in Security, ESORICS 2021 -
Duration: 7 Oct 20218 Oct 2021
http://stast.uni.lu

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13176 LNCS

Workshop

Workshop11th International Workshop on Socio-Technical Aspects in Security, ESORICS 2021
Abbreviated titleSTAST 2021
Period7/10/218/10/21
Internet address

Fingerprint

Dive into the research topics of 'Who watches the Birdwatchers? Sociotechnical vulnerabilities in Twitter's content contextualisation'. Together they form a unique fingerprint.

Cite this