<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Need for Focused Research on Coercion, Deception and Manipulation in Persuasive Use of Social Media</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Casper</forename><forename type="middle">Justesen</forename><surname>Bech</surname></persName>
							<email>cjbe@hum.aau.dk</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Communication and Psychology</orgName>
								<orgName type="institution">Aalborg University</orgName>
								<address>
									<settlement>Aalborg</settlement>
									<country key="DK">Denmark</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The Need for Focused Research on Coercion, Deception and Manipulation in Persuasive Use of Social Media</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">26764F6A854CF692101FBF324756E27F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T21:04+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract/>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Persuasive technologies are increasingly being scrutinized for practices and usage involving coercion, deception and manipulation <ref type="bibr" target="#b0">[1]</ref>. In particular, among the most dominant social media industry platforms, these threats are increasingly becoming a growing matter of concern. The emerging trend of hybrid warfare <ref type="bibr" target="#b1">[2]</ref> [3], the Cambridge Analytica scandal <ref type="bibr" target="#b3">[4]</ref> and the 2016 United States presidential election <ref type="bibr" target="#b4">[5]</ref> has all brought these issues worldwide attention. The challenges and threats involved are complex and the involved platforms are closed source and highly secretive concerning their practices. However, the persuasive design community in general has been reluctant to engage in this area of research. It is becoming increasingly clear, that these threats are of great importance to end-users and possibly democracy itself <ref type="bibr" target="#b5">[6]</ref>. Clearly, the persuasive technology research community can offer important socio-technical insights, which can contribute to a better understanding of how users are being deceived. The aim of the poster is to showcase the current state of research into coercive and deceptive practices from a persuasive technology perspective and propose directions for further research. This could lead to a better understanding of how users of social media are being coerced, deceived and manipulated. Contributing to improved information literacy, strengthening our defenses against these threats.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Method</head><p>Based on an unreleased systematic literature review, the current state of research into coercion, deception and manipulation within persuasive technology as a field is presented. Summarized and categorized in accordance to the technologies examined and utilized theory. The literature review was carried out using the SCOPUS database. The search result was 28 articles and after sorting according to relevancy, 12 was selected. These were then encoded and analysed using NVivo 12 Pro.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Results</head><p>In general, most research defines persuasive technologies as being in opposition to deception and coercion. Little work has been done on the subject directly, reflecting the adherence to Fogg's original definition <ref type="bibr" target="#b6">[7]</ref> and perhaps the focus on ethics in BCSS and design contexts, in which ethics are of the highest importance. The main corpus of the work has been done in recent years, perhaps due the previously mentioned scandals.</p><p>Yet in 2008 Weiksner, Fogg and Liu <ref type="bibr" target="#b7">[8]</ref> did analyse and identify coercive strategies and practices in third party applications on the then newly released Facebook Platform. Since then little attention has been given to deceptive practices in social networking sites. Burr, Cristianini and Ladyman <ref type="bibr" target="#b8">[9]</ref> proposes a model of autonomous agent to user interaction and a conceptual framework. Among the identified interactions they find coercion and deception. Both appears to be widely used on both Facebook and YouTube. They deal with the endogenous intent of the system designer. Specifically, how these systems deliver information using AI. The metrics used by these intelligent agents when personalising and tailoring the user experience is often manipulated by bad actors <ref type="bibr" target="#b9">[10]</ref>, using such tactics as botting or clickfarming <ref type="bibr" target="#b10">[11]</ref>. Kampik, Nieves and Lindgren <ref type="bibr" target="#b11">[12]</ref> identifies coercive strategies in several systems, including Facebook and YouTube. They conclude that a redefining of the scope and aim of the persuasive technology community is needed and they propose new research directions in coercive and deceptive systems and strategies. The most comprehensive theory proposed for studying deception is the PSD model and OC-matrix by Kukkonen <ref type="bibr" target="#b12">[13]</ref>. The PSD model has found wide usage within BCSS related research, but it has not yet been applied in the study of deception. Much work has been in terms of ethics and coercion. Discourse ethics has been proposed as an ethical framework for persuasive technologies <ref type="bibr">[14] [15]</ref>. Smids deals with the notion of voluntariness <ref type="bibr" target="#b15">[16]</ref>, as a prerequisite for persuasion and discusses how this relates to coercive and manipulative technology usage. Several studies deals with persuasion within a very specific technological contexts and with little appliance outside of that particular technology.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>There is a need for further research and a more focused orientation into deceptive, coercive and manipulative practices in persuasive technologies. Special attention should be given to identifying the persuasive or coercive intent as well as specific strategies in the use of social media, as this would clearly distinguish between challenges related to end-user content and challenges which are intrinsic to the systems. Both of which are important and largely connected. The PSD model is largely underutilized within this area of research and further work should try to apply the PSD model to the analyses of coercion, deception and manipulation in persuasive technology.</p></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The Ethics of Persuasive Technologies in Pervasive Industry Platforms: The Need for a Robust Management and Governance Framework</title>
		<author>
			<persName><forename type="first">G</forename><surname>Borgefalk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>De Leon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Persuasive Technology: Development of Persuasive and Behavior Change Support Systems</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Oinas-Kukkonen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">T</forename><surname>Win</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Karapanos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Karppinen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Kyza</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11433</biblScope>
			<biblScope unit="page" from="156" to="167" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">How can European states respond to Russian information warfare? An analytical framework</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hellman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wagnsson</surname></persName>
		</author>
		<idno type="DOI">10.1080/09662839.2017.1294162</idno>
	</analytic>
	<monogr>
		<title level="j">Eur. Secur</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="153" to="170" />
			<date type="published" when="2017-04">Apr. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">Ø</forename><surname>Breitenbauch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Byrjalsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Winther</surname></persName>
		</author>
		<title level="m">Orden og afskraekkelse</title>
				<meeting><address><addrLine>Copenhagen</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
		<respStmt>
			<orgName>Center for Militaere Studiers</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cambridge Analytica and Facebook: The Scandal and the Fallout So Far</title>
		<author>
			<persName><forename type="first">N</forename><surname>Confessore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The New York Times</title>
		<imprint>
			<biblScope unit="page">4</biblScope>
			<date type="published" when="2018-04">Apr-2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Hacking the citizenry?: Personality profiling, &quot;big data&quot; and the election of Donald Trump</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>González</surname></persName>
		</author>
		<idno type="DOI">10.1111/1467-8322.12348</idno>
	</analytic>
	<monogr>
		<title level="j">Anthropol. Today</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="9" to="12" />
			<date type="published" when="2017-06">Jun. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Social Media, Disinformation and Electoral Integrity</title>
		<author>
			<persName><forename type="first">B</forename><surname>Martin-Rozumiłowicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kužel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>International Foundation for Electoral Systems</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Persuasive technology: using computers to change what we think and do</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Fogg</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Morgan Kaufmann Publishers</publisher>
			<pubPlace>Amsterdam ; Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Six Patterns for Persuasion in Online Social Networks</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Weiksner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Fogg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Persuasive Technology</title>
				<meeting><address><addrLine>Berlin, Heidelberg; Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5033</biblScope>
			<biblScope unit="page" from="151" to="163" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">An Analysis of the Interaction Between Intelligent Software Agents and Human Users</title>
		<author>
			<persName><forename type="first">C</forename><surname>Burr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Cristianini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ladyman</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11023-018-9479-0</idno>
	</analytic>
	<monogr>
		<title level="j">Minds Mach</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="735" to="774" />
			<date type="published" when="2018-12">Dec. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Bay</surname></persName>
		</author>
		<title level="m">THE BLACK MARKET FOR SOCIAL MEDIA MANIPULATION</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">20</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Fredheim</surname></persName>
		</author>
		<title level="m">Robotrolling</title>
				<imprint>
			<publisher>NATO Strategic Communications Centre of Excellence</publisher>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
	<note>Issue 1</note>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Coercion and deception in persuasive technologies</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kampik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Nieves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lindgren</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">13</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A foundation for the study of behavior change support systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Oinas-Kukkonen</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00779-012-0591-5</idno>
	</analytic>
	<monogr>
		<title level="j">Pers. Ubiquitous Comput</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1223" to="1235" />
			<date type="published" when="2013-08">Aug. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">And Lead Us (Not) into Persuasion…? Persuasive Technology and the Ethics of Communication</title>
		<author>
			<persName><forename type="first">A</forename><surname>Spahn</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11948-011-9278-y</idno>
	</analytic>
	<monogr>
		<title level="j">Sci. Eng. Ethics</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="633" to="650" />
			<date type="published" when="2012-12">Dec. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Are Persuasive Technologies Really Able to Communicate?: Some Remarks to the Application of Discourse Ethics</title>
		<author>
			<persName><forename type="first">C</forename><surname>Linder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Law and Ethics: Concepts, Methodologies, Tools, and Applications</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page">15</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The Voluntariness of Persuasive Technology</title>
		<author>
			<persName><forename type="first">J</forename><surname>Smids</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Persuasive Technology. Design for Health and Safety</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Bang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><forename type="middle">L</forename><surname>Ragnemalm</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Heidelberg; Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">7284</biblScope>
			<biblScope unit="page" from="123" to="132" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
