10.1145/2818048.2819985acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Botivist: Calling Volunteers to Action using Online Bots

Published:27 February 2016Publication History

ABSTRACT

To help activists call new volunteers to action, we present Botivist: a platform that uses Twitter bots to find potential volunteers and request contributions. By leveraging different Twitter accounts, Botivist employs different strategies to encourage participation. We explore how people respond to bots calling them to action using a test case about corruption in Latin America. Our results show that the majority of volunteers (80\%) who responded to Botivist's calls to action contributed relevant proposals to address the assigned social problem. Different strategies produced differences in the quantity and relevance of contributions. Some strategies that work well offline and face-to-face appeared to hinder people's participation when used by an online bot. We analyze user behavior in response to being approached by bots with an activist purpose. We also provide strong evidence for the value of this type of civic media, and derive design implications.

References

  1. Luca Maria Aiello, Martina Deplano, Rossano Schifanella, and Giancarlo Ruffo. 2012. People are Strange when youre a Stranger: Impact and Influence of Bots on Social Networks. Links 697, 483,151 (2012), 1–566.Google ScholarGoogle Scholar
  2. Turadg Aleahmad, Aruna D. Balakrishnan, Jeffrey Wong, Susan R. Fussell, and Sara Kiesler. Fishing for Sustainability: The Effects of Indirect and Direct Persuasion. In Extended Abstracts on Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Eric P.S. Baumer, Sherri Jean Katz, Jill E. Freeman, Phil Adams, Amy L. Gonzales, John Pollak, Daniela Retelny, Jeff Niederdeppe, Christine M. Olson, and Geri K. Gay. 2012. Prescriptive Persuasion and Open-ended Social Awareness: Expanding the Design Space of Mobile Health. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12). 475–484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Erin Brady, Meredith Ringel Morris, and Jeffrey P Bigham. 2015. Gauging Receptiveness to Social Microvolunteering. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1055–1064. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Deana Brown, Gary Marsden, and Ulrike Rivett. 2012. WATER Alert!: Using mobile phones to improve community perspective on drinking water quality in South Africa. In Proceedings of the Fifth International Conference on Information and Communication Technologies and Development. ACM, 230–240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Nanette Byrnes. 2015. Persuasive technologies surround us, and theyre growing smarter. How do these technologies work? And why?. In Technology and Persuasion. MIT Technology Review.Google ScholarGoogle Scholar
  7. Maureen Carroll, Shelley Goldman, Leticia Britos, Jaime Koh, Adam Royalty, and Michael Hornstein. 2010. Destination, imagination and the fires within: Design thinking in a middle school classroom. International Journal of Art & Design Education 29, 1 (2010), 37–53.Google ScholarGoogle ScholarCross RefCross Ref
  8. Pew Research Center. Crime and Corruption Top Problems in Emerging and Developing Countries. Pew Research Center (????). http://www.pewglobal.org/2014/11/06/crimeandcorruptiontopproblemsinemerginganddevelopingcountries/.Google ScholarGoogle Scholar
  9. Justin Cheng and Michael Bernstein. 2014. Catalyst: triggering collective action with thresholds. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 1211–1221. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2014. The rise of social bots. arXiv preprint arXiv:1407.5225 (2014).Google ScholarGoogle Scholar
  11. John A Fleishman. 1980. Collective action as helping behavior: Effects of responsibility diffusion on contributions to a public good. Journal of Personality and Social Psychology 38, 4 (1980), 629.Google ScholarGoogle ScholarCross RefCross Ref
  12. Brian J Fogg. 2002. Persuasive technology: using computers to change what we think and do. Ubiquity 2002, December (2002), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Michelle Forelle, Phil Howard, Andrés Monroy-Hernández, and Saiph Savage. 2015. Political Bots and the Manipulation of Public Opinion in Venezuela. arXiv preprint arXiv:1507.07109 (2015).Google ScholarGoogle Scholar
  14. Aaron Halfaker, Oliver Keyes, and Dario Taraborelli. 2013. Making Peripheral Participation Legitimate: Reader Engagement Experiments in Wikipedia. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, USA, 849–860. DOI: http://dx.doi.org/10.1145/2441776.2441872 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Naila Hamdy and Ehab H Gomaa. 2012. Framing the Egyptian uprising in Arabic language newspapers and social media. Journal of Communication 62, 2 (2012), 195–211.Google ScholarGoogle ScholarCross RefCross Ref
  16. Adam Kilgarriff. 2001. Comparing corpora. International journal of corpus linguistics 6, 1 (2001), 97–133.Google ScholarGoogle ScholarCross RefCross Ref
  17. Irwin P Levin, Sara K Schnittjer, and Shannon L Thee. 1988. Information framing effects in social and personal decisions. Journal of Experimental Social Psychology 24, 6 (1988), 520–529.Google ScholarGoogle ScholarCross RefCross Ref
  18. Kimberly Ling, Gerard Beenen, Pamela Ludford, Xiaoqing Wang, Klarissa Chang, Xin Li, Dan Cosley, Dan Frankowski, Loren Terveen, Al Mamunur Rashid, and others. 2005. Using social psychology to motivate contributions to online communities. Journal of Computer-Mediated Communication 10, 4 (2005), 00–00.Google ScholarGoogle ScholarCross RefCross Ref
  19. Durairaj Maheswaran and Joan Meyers-Levy. 1990. The influence of message framing and issue involvement. Journal of Marketing research (1990), 361–367.Google ScholarGoogle Scholar
  20. Elaine Massung, David Coyle, Kirsten F Cater, Marc Jay, and Chris Preist. 2013. Using crowdsourcing to support pro-environmental community activism. In SIGCHI Conf. on Human Factors in Computing Systems. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Patrice McSherry and Molina Raul. 1999. Introduction to Shadows of State Terrorism: Impunity in Latin America. Social Justice 26, 4 (1999). https://www.socialjusticejournal.org/SJEdits/78Edit.html.Google ScholarGoogle Scholar
  22. Andrés Monroy-Hernández, Benjamin Mako Hill, Jazmin Gonzalez-Rivero, and danah boyd. 2011. Computers Can't Give Credit: How Automatic Attribution Falls Short in an Online Remixing Community. In SIGCHI Conf. on Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Clifford Nass, Jonathan Steuer, and Ellen R Tauber. Computers are social actors. In SIGCHI Conf. on Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Jeffrey Nichols, Michelle Zhou, Huahai Yang, Jeon-Hyung Kang, and Xiao Hua Sun. 2013. Analyzing the quality of information solicited from targeted strangers on social media. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 967–976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Mike Orcutt. 2012. Twitter Mischief Plagues Mexico's Election. MIT Technology Review (2012).Google ScholarGoogle Scholar
  26. Ruth Rettie, Ursula Grandcolas, and Bethan Deakins. 2005. Text message advertising: Response rates and branding effects. Journal of Targeting, Measurement and Analysis for Marketing 13, 4 (2005), 304–312.Google ScholarGoogle ScholarCross RefCross Ref
  27. Saqib Saeed, Markus Rohde, and Volker Wulf. 2011. Analyzing political activists organization practices: findings from a long term case study of the european social forum. Computer Supported Cooperative Work (CSCW) 20, 4-5 (2011), 265–304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Saiph Savage and Andrés Monroy-Hernández. 2015. Participatory Militias: An Analysis of an Armed Movement's Online Audience. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). 724–733. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Saiph Savage, Andres Monroy-Hernandez, Kasturi Bhattacharjee, and Tobias Höllerer. 2015. Tag Me Maybe: Perceptions of Public Targeted Sharing on Facebook. In Proceedings of the 26th ACM Conference on Hypertext & Social Media (HT '15). 299–303. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Lijiang Shen. 2010. Mitigating Psychological Reactance: The Role of Message-Induced Empathy in Persuasion. Human Communication Research 36, 3 (2010), 397–422.Google ScholarGoogle ScholarCross RefCross Ref
  31. Aaron Smith. 2013. Civic engagement in the digital age. Pew Internet (2013).Google ScholarGoogle Scholar
  32. David Horton Smith. 1981. Altruism, volunteers, and volunteerism. Journal of Voluntary Action Research (1981).Google ScholarGoogle ScholarCross RefCross Ref
  33. Erich Sommerfeldt. 2011. Activist online resource mobilization: Relationship building features that fulfill resource dependencies. Public Relations Review 37, 4 (2011), 429–431.Google ScholarGoogle ScholarCross RefCross Ref
  34. Kate Starbird and Leysia Palen. 2011a. 'Voluntweeters': Self-organizing by Digital Volunteers in Times of Crisis. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 1071–1080. DOI: http://dx.doi.org/10.1145/1978942.1979102 Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Kate Starbird and Leysia Palen. 2011b. Voluntweeters: Self-organizing by digital volunteers in times of crisis. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1071–1080. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Kate Starbird and Leysia Palen. 2012. (How) will the revolution be retweeted?: information diffusion and the 2011 Egyptian uprising. In Proceedings of the acm 2012 conference on computer supported cooperative work. ACM, 7–16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Amos Tversky and Daniel Kahneman. 1986. Rational choice and the framing of decisions. Journal of business (1986), S251–S278.Google ScholarGoogle Scholar
  38. Alcides Velasquez and Robert LaRose. 2014. Youth collective activism through social media: The role of collective efficacy. New Media & Society (2014), 1461444813518391.Google ScholarGoogle Scholar
  39. Amy Voida, Ellie Harmon, and Ban Al Ani. 2012. Bridging between organizations and the public: volunteer coordinators' uneasy relationship with social computing. In SIGCHI Conference on Human Factors in Computing Systems. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Joseph Weizenbaum. 1966. ELIZA: a Computer Program for the Study of Natural Language Communication Between Man and Machine. Commun. ACM 9, 1 (Jan. 1966), 36–45. DOI: http://dx.doi.org/10.1145/365153.365168 Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Wikipedia. 2015. InnoCentive. (2015). http://en.wikipedia.org/wiki/InnoCentive.Google ScholarGoogle Scholar
  42. Volker Wulf, Konstantin Aal, Ibrahim Abu Kteish, Meryem Atam, Kai Schubert, Markus Rohde, George P Yerousis, and David Randall. 2013. Fighting against the wall: Social media use by political activists in a Palestinian village. In SIGCHI Conf. on Human Factors in Computing Systems. ACM, 1979–1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Xiaofeng Yang, Qian Yang, and Christo Wilson. 2015. Penny for Your Thoughts: Searching for the 50 Cent Party on Sina Weibo. In Ninth International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!