Abstract

Although a great deal of attention has been paid to how conspiracy theories circulate on social media, and the deleterious effect that they, and their factual counterpart conspiracies, have on political institutions, there has been little computational work done on describing their narrative structures. Predicating our work on narrative theory, we present an automated pipeline for the discovery and description of the generative narrative frameworks of conspiracy theories that circulate on social media, and actual conspiracies reported in the news media. We base this work on two separate comprehensive repositories of blog posts and news articles describing the well-known conspiracy theory Pizzagate from 2016, and the New Jersey political conspiracy Bridgegate from 2013. Inspired by the qualitative narrative theory of Greimas, we formulate a graphical generative machine learning model where nodes represent actors/actants, and multi-edges and self-loops among nodes capture context-specific relationships. Posts and news items are viewed as samples of subgraphs of the hidden narrative framework network. The problem of reconstructing the underlying narrative structure is then posed as a latent model estimation problem. To derive the narrative frameworks in our target corpora, we automatically extract and aggregate the actants (people, places, objects) and their relationships from the posts and articles. We capture context specific actants and interactant relationships by developing a system of supernodes and subnodes. We use these to construct an actant-relationship network, which constitutes the underlying generative narrative framework for each of the corpora. We show how the Pizzagate framework relies on the conspiracy theorists’ interpretation of “hidden knowledge” to link otherwise unlinked domains of human interaction, and hypothesize that this multi-domain focus is an important feature of conspiracy theories. We contrast this to the single domain focus of an actual conspiracy. While Pizzagate relies on the alignment of multiple domains, Bridgegate remains firmly rooted in the single domain of New Jersey politics. We hypothesize that the narrative framework of a conspiracy theory might stabilize quickly in contrast to the narrative framework of an actual conspiracy, which might develop more slowly as revelations come to light. By highlighting the structural differences between the two narrative frameworks, our approach could be used by private and public analysts to help distinguish between conspiracy theories and conspiracies.

Highlights

  • Predicating our work on narrative theory, we present an automated pipeline for the discovery and description of the generative narrative frameworks of conspiracy theories that circulate on social media, and actual conspiracies reported in the news media

  • Understanding the underlying narrative framework which, in the case of conspiracy theories, is often the work of multiple people negotiating the boundaries of the narrative through repeated, albeit brief, interactions, can provide significant insight into the various sources of threat imagined by the conspiracy theorists, identify allegedly hidden or special knowledge on which their theorizing rests, and detail the strategies they suggest to counteract the threats encoded in the conspiracy theory [14][39][40]

  • Recognizing that a series of stories or story fragments align with a narrative framework that has the hallmarks of a fictional conspiracy theory might help counteract the degree to which people come to believe in—and subsequently act on—conspiracy theories

Read more

Summary

Introduction

Conspiracy theories and their factual counterpart, conspiracies, have long been studied by scholars from a broad range of disciplines, including political science [1][2][3][4], philosophy [5], psychology [6][7][8][9][10][11][12][13][14][15], law [16], sociology [17][18], linguistics and language use [19][20], folklore [21][22] and history [23][24][25]. Understanding the underlying narrative framework which, in the case of conspiracy theories, is often the work of multiple people negotiating the boundaries of the narrative through repeated, albeit brief, interactions, can provide significant insight into the various sources of threat imagined by the conspiracy theorists, identify allegedly hidden or special knowledge on which their theorizing rests, and detail the strategies they suggest to counteract the threats encoded in the conspiracy theory [14][39][40]. The structural understanding of both conspiracy theories and conspiracies provided by our pipeline can be of significant value to many groups, including those charged with ensuring public safety

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.