<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Need for Focused Research on Coercion, Deception and Manipulation in Persuasive Use of Social Media</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>r Just</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Communication and Psychology, Aalborg University</institution>
          ,
          <addr-line>Aalborg</addr-line>
          ,
          <country country="DK">Denmark</country>
        </aff>
      </contrib-group>
      <fpage>2</fpage>
      <lpage>4</lpage>
      <abstract>
        <p>Persuasive technologies are increasingly being scrutinized for practices and usage involving coercion, deception and manipulation [1]. In particular, among the most dominant social media industry platforms, these threats are increasingly becoming a growing matter of concern. The emerging trend of hybrid warfare [2] [3], the Cambridge Analytica scandal [4] and the 2016 United States presidential election [5] has all brought these issues worldwide attention. The challenges and threats involved are complex and the involved platforms are closed source and highly secretive concerning their practices. However, the persuasive design community in general has been reluctant to engage in this area of research. It is becoming increasingly clear, that these threats are of great importance to end-users and possibly democracy itself [6]. Clearly, the persuasive technology research community can offer important socio-technical insights, which can contribute to a better understanding of how users are being deceived. The aim of the poster is to showcase the current state of research into coercive and deceptive practices from a persuasive technology perspective and propose directions for further research. This could lead to a better understanding of how users of social media are being coerced, deceived and manipulated. Contributing to improved information literacy, strengthening our defenses against these threats.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Based on an unreleased systematic literature review, the current state of research into
coercion, deception and manipulation within persuasive technology as a field is
presented. Summarized and categorized in accordance to the technologies examined and
utilized theory. The literature review was carried out using the SCOPUS database. The
search result was 28 articles and after sorting according to relevancy, 12 was selected.
These were then encoded and analysed using NVivo 12 Pro.</p>
    </sec>
    <sec id="sec-2">
      <title>Results</title>
      <p>
        In general, most research defines persuasive technologies as being in opposition to
deception and coercion. Little work has been done on the subject directly, reflecting the
adherence to Fogg’s original definition [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and perhaps the focus on ethics in BCSS
and design contexts, in which ethics are of the highest importance. The main corpus of
the work has been done in recent years, perhaps due the previously mentioned scandals.
Yet in 2008 Weiksner, Fogg and Liu [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] did analyse and identify coercive strategies
and practices in third party applications on the then newly released Facebook Platform.
Since then little attention has been given to deceptive practices in social networking
sites. Burr, Cristianini and Ladyman [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] proposes a model of autonomous agent to user
interaction and a conceptual framework. Among the identified interactions they find
coercion and deception. Both appears to be widely used on both Facebook and
YouTube. They deal with the endogenous intent of the system designer. Specifically,
how these systems deliver information using AI. The metrics used by these intelligent
agents when personalising and tailoring the user experience is often manipulated by
bad actors [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], using such tactics as botting or clickfarming [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Kampik, Nieves and
Lindgren [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] identifies coercive strategies in several systems, including Facebook and
YouTube. They conclude that a redefining of the scope and aim of the persuasive
technology community is needed and they propose new research directions in coercive and
deceptive systems and strategies. The most comprehensive theory proposed for
studying deception is the PSD model and OC-matrix by Kukkonen [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The PSD model has
found wide usage within BCSS related research, but it has not yet been applied in the
study of deception. Much work has been in terms of ethics and coercion. Discourse
ethics has been proposed as an ethical framework for persuasive technologies [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
Smids deals with the notion of voluntariness [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], as a prerequisite for persuasion and
discusses how this relates to coercive and manipulative technology usage. Several
studies deals with persuasion within a very specific technological contexts and with little
appliance outside of that particular technology.
4
      </p>
    </sec>
    <sec id="sec-3">
      <title>Conclusion</title>
      <p>There is a need for further research and a more focused orientation into deceptive,
coercive and manipulative practices in persuasive technologies. Special attention should
be given to identifying the persuasive or coercive intent as well as specific strategies in
the use of social media, as this would clearly distinguish between challenges related to
end-user content and challenges which are intrinsic to the systems. Both of which are
important and largely connected. The PSD model is largely underutilized within this
area of research and further work should try to apply the PSD model to the analyses of
coercion, deception and manipulation in persuasive technology.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Borgefalk</surname>
          </string-name>
          and N. de Leon, '
          <article-title>The Ethics of Persuasive Technologies in Pervasive Industry Platforms: The Need for a Robust Management and Governance Framework'</article-title>
          ,
          <source>in Persuasive Technology: Development of Persuasive and Behavior Change Support Systems</source>
          , vol.
          <volume>11433</volume>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Oinas-Kukkonen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. T.</given-names>
            <surname>Win</surname>
          </string-name>
          , E. Karapanos,
          <string-name>
            <given-names>P.</given-names>
            <surname>Karppinen</surname>
          </string-name>
          , and E. Kyza, Eds. Cham: Springer International Publishing,
          <year>2019</year>
          , pp.
          <fpage>156</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hellman</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wagnsson</surname>
          </string-name>
          , '
          <article-title>How can European states respond to Russian information warfare? An analytical framework'</article-title>
          ,
          <source>Eur. Secur.</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>153</fpage>
          -
          <lpage>170</lpage>
          , Apr.
          <year>2017</year>
          , doi: 10.1080/09662839.
          <year>2017</year>
          .
          <volume>1294162</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Ø. Breitenbauch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Byrjalsen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Winther</surname>
          </string-name>
          , '
          <article-title>Orden og afskraekkelse', Center for Militaere Studiers</article-title>
          , Copenhagen,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Confessore</surname>
          </string-name>
          , 'Cambridge Analytica and
          <article-title>Facebook: The Scandal and the Fallout So Far'</article-title>
          , The New York Times,
          <fpage>04</fpage>
          -Apr-
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. [5]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>González</surname>
          </string-name>
          , '
          <article-title>Hacking the citizenry?: Personality profiling, “big data” and the election of Donald Trump'</article-title>
          ,
          <source>Anthropol. Today</source>
          , vol.
          <volume>33</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>12</lpage>
          , Jun.
          <year>2017</year>
          , doi: 10.1111/
          <fpage>1467</fpage>
          -
          <lpage>8322</lpage>
          .
          <fpage>12348</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Martin-Rozumiłowicz</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Kužel</surname>
          </string-name>
          , 'Social Media, Disinformation and Electoral Integrity',
          <source>International Foundation for Electoral Systems</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. [7]
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Fogg</surname>
          </string-name>
          ,
          <article-title>Persuasive technology: using computers to change what we think and do</article-title>
          . Amsterdam ; Boston: Morgan Kaufmann Publishers,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. [8]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Weiksner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Fogg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          , '
          <article-title>Six Patterns for Persuasion in Online Social Networks'</article-title>
          ,
          <source>in Persuasive Technology</source>
          , vol.
          <volume>5033</volume>
          , Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
          <year>2008</year>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>163</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Burr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Cristianini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Ladyman</surname>
          </string-name>
          , '
          <article-title>An Analysis of the Interaction Between Intelligent Software Agents and Human Users'</article-title>
          ,
          <string-name>
            <given-names>Minds</given-names>
            <surname>Mach</surname>
          </string-name>
          ., vol.
          <volume>28</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>735</fpage>
          -
          <lpage>774</lpage>
          , Dec.
          <year>2018</year>
          , doi: 10.1007/s11023-018-9479-0.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bay</surname>
          </string-name>
          , '
          <article-title>THE BLACK MARKET FOR SOCIAL MEDIA MANIPULATION'</article-title>
          , p.
          <fpage>20</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Fredheim</surname>
          </string-name>
          , '
          <article-title>Robotrolling 2019</article-title>
          .
          <article-title>Issue 1</article-title>
          .
          <source>' NATO Strategic Communications Centre of Excellence</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. [12]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kampik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Nieves</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Lindgren</surname>
          </string-name>
          , '
          <article-title>Coercion and deception in persuasive technologies'</article-title>
          , p.
          <fpage>13</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Oinas-Kukkonen</surname>
          </string-name>
          ,
          <article-title>'A foundation for the study of behavior change support systems'</article-title>
          ,
          <source>Pers. Ubiquitous Comput.</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>1223</fpage>
          -
          <lpage>1235</lpage>
          , Aug.
          <year>2013</year>
          , doi: 10.1007/s00779- 012-0591-5.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Spahn</surname>
          </string-name>
          , '
          <article-title>And Lead Us (Not) into Persuasion…? Persuasive Technology and the Ethics of Communication'</article-title>
          ,
          <source>Sci. Eng</source>
          . Ethics, vol.
          <volume>18</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>633</fpage>
          -
          <lpage>650</lpage>
          , Dec.
          <year>2012</year>
          , doi: 10.1007/s11948-011-9278-y.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. [15]
          <string-name>
            <given-names>C.</given-names>
            <surname>Linder</surname>
          </string-name>
          , '
          <article-title>Are Persuasive Technologies Really Able to Communicate?: Some Remarks to the Application of Discourse Ethics'</article-title>
          ,
          <source>in Business Law and Ethics: Concepts</source>
          , Methodologies, Tools, and
          <string-name>
            <surname>Applications</surname>
          </string-name>
          (3 Volumes),
          <year>2015</year>
          , p.
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Smids</surname>
          </string-name>
          , '
          <article-title>The Voluntariness of Persuasive Technology'</article-title>
          ,
          <source>in Persuasive Technology. Design for Health and Safety</source>
          , vol.
          <volume>7284</volume>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bang</surname>
          </string-name>
          and
          <string-name>
            <given-names>E. L.</given-names>
            <surname>Ragnemalm</surname>
          </string-name>
          , Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
          <year>2012</year>
          , pp.
          <fpage>123</fpage>
          -
          <lpage>132</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>