<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Windows: Creating Transparency to Understand Filter Bubbles in Social Media</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Luka Bekavac</string-name>
          <email>lukajurelars.bekavac@student.unisg.ch</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kimberly Garcia</string-name>
          <email>kimberly.garcia@unisg.ch</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jannis Strecker</string-name>
          <email>jannisrene.strecker@unisg.ch</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simon Mayer</string-name>
          <email>simon.mayer@unisg.ch</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aurelia Tamò-Larrieux</string-name>
          <email>aurelia.tamo-larrieux@unil.ch</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Lausanne</institution>
          ,
          <addr-line>Lausanne</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of St. Gallen</institution>
          ,
          <addr-line>St. Gallen</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Social media platforms play a significant role in shaping public opinion and societal norms. Understanding this influence requires examining the diversity of content that users are exposed to. However, studying iflter bubbles in social media recommender systems has proven challenging, despite extensive research in this area. In this work, we introduce SOAP (System for Observing and Analyzing Posts), a novel system designed to collect and analyze very large online platforms (VLOPs) data to study filter bubbles at scale. Our methodology aligns with established definitions and frameworks, allowing us to comprehensively explore and log filter bubbles data. From an input prompt referring to a topic, our system is capable of creating and navigating filter bubbles using a multimodal LLM. We demonstrate SOAP by creating three distinct filter bubbles in the feed of social media users, revealing a significant decline in topic diversity as fast as in 60min of scrolling. Furthermore, we validate the LLM analysis of posts through an inter- and intra-reliability testing. Finally, we open source SOAP as a robust tool for facilitating further empirical studies on filter bubbles in social media.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        (A. Tamò-Larrieux)
The measurement of filter bubbles is a critical area of research, particularly given their potential
impact on public opinion and societal polarization [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Michiels et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] performed a review on
empirical studies of filter bubbles, building upon Dahlgren [
        <xref ref-type="bibr" rid="ref3 ref30">3</xref>
        ] and Pariser [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] to propose and
operationalize a systematic and empirically verifiable definition of technological filter bubble as:
“a decrease in the diversity of a user’s recommendations over time, in any dimension of diversity,
resulting from the choices made by diferent recommendation stakeholders”. In this contribution,
we refer to technological filter bubbles simply as filter bubbles.
      </p>
      <p>
        Policymakers and the public are increasingly aware of the risks associated with filter bubbles,
recognizing their potential to influence voter behavior and exacerbate societal divisions. This
is fueled by recent investigations, such as the Wall Street Journal’s deep dive into TikTok’s
algorithm, which used automated accounts to reveal how the platform personalizes content [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
Additionally, reports have shown that TikTok disproportionately pushed young German voters
toward far-right content related to the Alternative for Germany party [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In India, political
candidates have bombarded voters with deepfakes, raising concerns about AI-driven
manipulation in democratic processes [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In response, regulations such as the EU’s Digital Services Act
(DSA) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] were implemented, targeting the transparency and accountability of recommendation
systems used by very large online platforms (VLOPs).
      </p>
      <p>
        Prior research has used simulations, sockpuppeting audits, and controlled user studies to
explore filter bubbles [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], often with manual labeling [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and artificial platforms or datasets [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
These approaches lack the scalability and authenticity required for comprehensive analysis [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ],
which highlights the need for robust, automated tooling for the uncovering, measuring, and
evaluation of filter bubbles. To analyze large volumes of complex data (audio, video, textual
content), previous studies often needed to take shortcuts such as analyzing only transcripts
or individual video snippets [
        <xref ref-type="bibr" rid="ref10 ref12">12, 10</xref>
        ]. These methods however risk losing valuable contextual
information and nuances. To overcome both challenges, we propose SOAP—a System for
Observing and Analyzing Posts capable of discovering and measuring filter bubbles on social
media. SOAP provides several advancements over the state of the art:
• Exploration and Navigation of Filter Bubbles: We contribute a replicable methodology and
implementation that allows the automated exploration and navigation of filter bubbles
across a broad range of topics. This is demonstrated with the SOAP system and with
respect to three distinct filter bubbles.
• Real Data: Other than using artificial platforms or datasets, SOAP expands filter bubble
research to real public data of a VLOP to enable more accurate and applicable
understanding of filter bubbles. In this paper, we refer to all social media platforms designated under
the DSA as VLOPs.
• Comprehensive Filter Bubble Data: SOAP collects the necessary data to comprehensively
measure filter bubbles across three dimensions proposed by Michiels et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], namely
diversity, time, and recommendations. Michiels et al. consider three aspects within
the diversity dimension: structural diversity (variety of information suppliers), topic
diversity (the range of subjects), and viewpoint diversity (the spectrum of stances on a
given topic). The recommendations dimension focuses on the diversity of content that
a user is exposed to as a result of recommendation algorithms. The time dimensions
considers filter bubbles as a longitudinal efect that emerges as recommender systems
refine their understanding of user preferences over time. Finally, a fourth dimension
called recommendation stakeholders encompasses all groups or individuals that influence
or are influenced by recommendations. SOAP is focused on the first three dimensions.
• Automation of Deductive Coding: SOAP automates coding social media content using a
multimodal Large Language Model (LLM), and we provide an automated setup for
intraand inter-reliability testing of diferent primer prompts.
      </p>
    </sec>
    <sec id="sec-3">
      <title>2. Design and Implementation of SOAP</title>
      <p>SOAP works by entering a primer prompt about a topic of interest. The system then explores
and interacts with content related to that topic and collects data for analysis. This process
continues until the diversity of posts becomes so homogeneous that, arguably, a filter bubble
has been entered. In the following, we focus on SOAP’s two central aspects: automated data
collection and automated deductive coding. Then, we present SOAP’s phases of operation as it is
currently implemented.</p>
      <p>
        Automated Data Collection To collect the data points necessary to consider each diversity
dimension proposed in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], SOAP mimicks the interactions of a real user with a Social Media
platform: viewing content, liking it, reporting it, and commenting on it. To demonstrate this
ability with an actual VLOP, we utilized instagrapi1 which provides programmatic access to
users’ frontend activities. SOAP behaves like a real user would, with random delays of 1-3
seconds between processing each post, simulating natural swipe speed. We also limited SOAP’s
bot interactions to 300 posts per session, which amounts to roughly two hours of mindless
scrolling.2. In this context, SOAP mimics the behavior of a mindlessly scrolling user, engaging in
continuous and monotonous scrolling. This approach enhances the authenticity of the collected
data by replicating real user interactions with social media platforms.
      </p>
      <p>
        Automated Deductive Coding To analyze the collected data and determine if it is part of a
iflter bubble, it is necessary to thoroughly code it. Prior research, such as Tomlein et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ],
highlighted the extensive resource requirements of traditional coding methods—requirements of
hundreds of person-hours necessitate shortcuts, such as analyzing only the transcript of a video
or using video snippets to manage the data volume [
        <xref ref-type="bibr" rid="ref10 ref12">10, 12</xref>
        ]. We propose automating this process
using Generative AI, which reduces the need for extensive human labor, improves scalability,
and lowers costs. However, it is important to recognize that automated coding through LLMs is
not without its challenges. While LLMs have been shown to support deductive coding tasks
reliably [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15, 16, 17</xref>
        ], this does not imply a seamless substitution for human expertise. LLM-based
coding lacks the nuanced understanding and contextual judgment that human coders bring
to complex social data, which may afect the authenticity of the analysis. Further, there are
concerns around the epistemic limits of LLMs—such as potential biases in the training data or
misinterpretation of social and cultural cues—that require careful evaluation. To address these
concerns, SOAP employs automatic deductive coding [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] based on a predefined codebook with
an initial set of codes, descriptions, and examples grounded in the research focus or theory [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
This coding process is not intended to fully replace human input but rather to augment it,
improving scalability while maintaining critical oversight from human researchers. LLMs,
particularly multimodal models, are efective at processing large volumes of data across text,
video, and audio inputs, which is crucial for managing the vast data generated by social media
platforms. Yet, we remain cautious about relying solely on automated processes, implementing
1https://subzeroid.github.io/instagrapi/. Last accessed July 8, 2024.
2See https://sites.psu.edu/aspsy/2019/03/16/mindless-scrolling/ (Last accessed July 8, 2024.): Mindless scrolling
refers to the act of continuously browsing through social media or websites, often spending excessive amounts of
time without a specific goal, enabled by features like infinite scrolling [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
cross-validation techniques where human and machine coding are compared for reliability
and accuracy. SOAP pioneers the use of a multimodal LLM (the Gemini 1.5 Flash model3) that
processes video and audio data in addition to text. While this approach significantly enhances
scalability, we acknowledge the ongoing need to critically assess the performance of the LLM.
Therefore, we demonstrate the intra- and inter-reliability of the model as a coder, ensuring it
efectively identifies specific characteristics and patterns in social media data that are indicative
of filter bubbles.
      </p>
      <p>SOAP Phases of Operation SOAP’s detailed operation is divided into four distinct phases.</p>
      <p>At the start of a new run on a VLOP (Phase 1), the agent logs in with a user account and
begins exploring the user feed. It fetches the user’s explore page, which consists of 20 post
IDs. In Phase 2, the agent processes each of the IDs fetched in the previous step. The agent
opens each post, collecting its media file (MP4 videos or image files) and associated metadata,
including likes, username, post text, date uploaded, and date fetched. The collected data is stored
by the agent. In Phase 3, the agent utilizes the Gemini 1.5 Flash model via the Google Cloud
Vertex AI Platform to analyze each post and determine if it corresponds to a specific topic, such
as being part of a filter bubble. The agent uses a predefined primer prompt to identify relevant
features or themes in the posts according to the researcher’s interests. SOAP automatically
rates posts according to their relevance with the primer prompt and flags highly relevant posts.
Finally, in Phase 4, based on the analysis outcome, the agent employs an automated interaction
mechanism to engage with flagged posts. Similar to user behavior, it performs actions such as
liking, commenting, or reporting. This process is performed for all posts on the explore feed
page and can be executed continuously until SOAP determines that the diversity of the feed
has declined suficiently, indicating that the feed’s content has become highly homogeneous,
suggesting the formation of a filter bubble. This threshold can be established by calculating
the ratio of the number of posts related to the filter bubble to the total number of posts on the
explore feed.</p>
      <p>
        By adjusting the primer prompt, SOAP can discover and explore filter bubbles, where it
measures and/or logs three of the four dimensions proposed by Michiels et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]: diversity,
time, and recommendations. We provide examples of the specific meta-data that was collected
with SOAP in the appendix, Table 3. The fourth dimension, Recommendation Stakeholders, is not
observable by SOAP. Michiels et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] highlight the challenges of logging and measuring the
influence of multiple stakeholders including users, providers, and the system itself, since they
lfuctuate with the content availability and specific desires of those stakeholders. Furthermore,
according to [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] understanding filter bubbles requires explaining their origins and not just
observing their existence; hence explaining the origins of the stakeholders decisions is out of
scope for SOAP.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Validation of SOAP</title>
      <p>
        We evaluated SOAP’s filter bubble discovery mechanism and its deductive coding, and present
our results in the following.
3https://cloud.google.com/vertex-ai/generative-ai/docs/multimodal/overview. Last accessed July 8, 2024
Filter Bubble Discovery In this evaluation, we used SOAP to discover three filter bubbles
with highly homogeneous content.4 We first used SOAP to create two distinct filter bubbles
related to Aviation and Kittens. The primer prompts along with all logged data used for deductive
coding and creating the filter bubbles can be found in the appendix A.1 and on GitHub. SOAP’s
agent was trapped in the filter bubbles within 150 posts/recommendations or approximately 60
minutes of scrolling. As depicted in Figure 1, topic diversity was reduced rapidly, with up to 85%
of the content being related to aviation in the last scroll. In the same way, we entered a filter
bubble related to the Palestine/Israel conflict. This topic was chosen due to its prominence on
social media at the time of writing [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], particularly concerning biased systemic censorship [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ],
digital activism [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], and war propaganda [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. As seen in Figure 1, within 250 posts or roughly
2 hours of mindless scrolling, the majority of recommended posts were about the conflict,
reducing the topic diversity in the explore feed substantially.
      </p>
      <p>Deductive Coding / Intra-Rater To measure the reliability of the vision model, we tested
for both intra- and inter-rater reliability. In order to assess the consistency of ratings for the
same posts, we employed an adjusted Test-Retest Reliability procedure for evaluating intra-rater
reliability. Specifically, we selected 95 posts and had the model rate each post 5 times, resulting
in a total of 475 ratings. We then calculated Cronbach’s Alpha and the 95% Confidence Interval
to quantify the internal consistency of these repeated ratings. This procedure was conducted
for the three filter bubbles and their respective primer prompts. The results, depicted in Table 1,
demonstrate consistently high scores, indicating that the model reliably produced similar ratings
across multiple iterations for the same content.</p>
      <p>Deductive Coding / Inter-Rater To evaluate inter-rater reliability and determine if the
model’s labels align with human labels, we conducted a study with two human labelers who
independently labeled the same set of 95 posts for each primer prompt. We then calculated
4All collected data points and deductive coding interpretations are available on GitHub along with the code of the
SOAP application.</p>
      <sec id="sec-4-1">
        <title>Intra-rater reliability: Cronbach’s Alpha and 95% confidence intervals for the model’s reliability measured on 95 posts per bubble, each rated 5x for a total of 475 ratings each.</title>
        <sec id="sec-4-1-1">
          <title>Prompt</title>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>Aviation bubble prompt</title>
      </sec>
      <sec id="sec-4-3">
        <title>Kitten bubble prompt</title>
      </sec>
      <sec id="sec-4-4">
        <title>Palestine/Israel bubble prompt</title>
        <p>Cronbach’s Alpha
95% Confidence Interval</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Discussion and Limitations</title>
      <p>In our implementation and evaluations, several choices were made that may afect the
generalizability and depth of our analysis. While our system demonstrated high intra- and inter-rater
reliability for a few primer prompts, further grounding and analysis are necessary to show the
generalizability of these results. Additionally, although our system successfully discovers filter
bubbles by mimicking human interactions with a VLOP, it does not replicate the reasoning
and nuanced behaviors of actual users on the platform. Our methodology utilizes automated
agents to generate behavioral data, which the algorithm uses to personalize recommendations,
efectively recreating the conditions faced by real users on platforms with personalized
recommendation systems. Therefore, while the created feeds and algorithms demonstrate the
platform’s capability to generate such feeds, they are artificially constructed and may not reflect
typical feeds on the platform. Currently, SOAP operates on a single VLOP, which limits its
application to other environments. However, the approach underlying SOAP—using automated
agents to interact with recommendation algorithms—can be expanded to other platforms,
including additional VLOPs, e-commerce sites, or video-sharing services. Despite these limitations,
our findings indicate that SOAP is capable of creating such feeds, providing valuable insights
into the nature of filter bubbles.</p>
      <p>
        Legal Considerations Ensuring that researchers have access to data from VLOPs is crucial
for public interest research and fostering transparency. Yet, the current relationship between
technology companies, governments, researchers, and the public remains defined by an
information asymmetry [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. To address this asymmetry, EU policymakers have put in place new
regulatory frameworks to facilitate data access from VLOPs. For instance, EU DSA Article 40
enables access to data for research that aims to detect, identify, and understand systemic risks in
the EU, as specified in Article 34(1) of the DSA [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. While these provisions provide a key building
block to enhance transparency on social media, there are limitations: (a) The scope of EU law is
restricted to member states only [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]; (b) intellectual property rights could pose challenges, as
scraping data might infringe on platforms’ rights to reproduce and distribute their databases,
as well as on copyright law [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]; and (c) researchers must respect user privacy, ensuring that
private data is not used, to comply with data protection regulations themselves [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Aside
from legal measures to access data, researchers may obtain relevant data through Web scraping.
However, this practice currently exists in a legal grey zone, with varying opinions from diferent
authorities, including data protection authorities [
        <xref ref-type="bibr" rid="ref26 ref27">26, 27</xref>
        ]. For example, the Institute for Strategic
Dialogue calls for regulators to recognize the value of mixed methods approaches, including
diferent data collection methods used by researchers, to understand the broader implications
of social media platforms on individuals and society [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. In this regard, SOAP is designed to
only access publicly available data where, according to current regulatory precedent, there is
no reasonable expectation of privacy [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Finally, the protection of content moderators and
researchers themselves (from potentially harmful content they are exposed to in their activities)
represents a challenge [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] that can be alleviated by more sophisticated tooling. Hence, by
enabling automatic labeling, SOAP limits the trauma experienced by data workers, ensuring
responsible and ethical research practices (cf. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]).
      </p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion and Future Work</title>
      <p>We have introduced SOAP as a system designed for researchers to conduct filter bubble and
recommendation research on VLOPs. The system’s data collection and automated deductive
coding elements successfully uncovered filter bubbles using real data, enabling analysis of the
results. The conducted intra- and inter-rater reliability tests showed suficient coherence scores
within the LLM itself and with human judgment for the tested primer prompts. While initial
tests focused on short-term content convergence, we plan to use SOAP for further research,
especially to observe long-term dynamics across sessions and days. In the future, we plan to
expand SOAP’s capabilities to multiple VLOPs, allowing for a broader analysis across various
platforms. As an open-source system, SOAP and its methodology can aid further research into
VLOP operations, enhancing transparency and contributing to a better understanding.</p>
    </sec>
    <sec id="sec-7">
      <title>A. Appendix</title>
      <p>A.1. Primer Prompts
Primer Prompt for the Aviation Filter Bubble:
"You are analyzing Social Media videos about aviation and aircrafts.</p>
      <p>Post Description: {post_text}
Username: {creator_id}
Please answer the following Questions:
- How much is the video about aviation/aircrafts/flying on a binary scale of 0 to
1? (0 being not at all about aviation and 1 being about aviation)
- What is your reasoning for the score?
Either the video itself or the description should contain aviation/aircrafts/flying
related content.</p>
      <p>Give your answer precisely in the following format:
"Score:Reasoning". For example, "1:The video is entirely about different types of
aircraft and their mechanisms. Do not say Score or Reasoning in the answer."
Primer Prompt for the Kitten Filter Bubble:
"You are analyzing Social Media videos that feature cute and adorable kittens.</p>
      <p>Post Description: {post_text}
Username: {creator_id}
Please answer the following questions:
- Does the video feature or relate to cute and adorable kittens? (0 for No and 1
for Yes)
- What is your reasoning for the score?
Consider the following topics as examples and rate higher if the video
prominently features, but limietd to, these topics:
- Kitten antics (e.g., playful behavior, funny moments)
- Kitten care (e.g., grooming tips, health advice, feeding information)
- Kitten milestones (e.g., first steps, learning to purr, first time playing with
toys)
- Kitten adoption stories (e.g., rescue tales, adoption success stories)
- Kitten interactions with humans and other animals (e.g., cuddling with owners,
playing with other pets)
- Kitten habitats (e.g., cozy beds, playful environments, safe outdoor
explorations)
For example:
- A video showing kittens playing with each other should be rated 1.
- A video providing tips on how to care for a new kitten should be rated 1.
- A video showing a kitten being adopted into a loving home should be rated 1.
- A video presenting a kitten's first time exploring a new environment should be
rated 1.
- A video exploring different types of kitten toys and how kittens interact with
them should be rated 1.</p>
      <p>Give your answer precisely in the following format:
""Score:Reasoning"". For example, ""1:The video is entirely about kittens playing
and showing their adorable antics."" Do not say 'Score' or 'Reasoning' in
the answer.</p>
      <p>"</p>
      <p>Primer Prompt for the Palestine/Israel Filter Bubble:
You are analyzing Social Media videos about the Palestine/Israel conflict.</p>
      <p>Post Description: {post_text}
Username: {creator_id}
Please answer the following question:
- Is the video about the Palestine/Israel conflict? (0 being not at all about the
conflict and 1 being about the conflict. Only provide a binary score of 0 or
1)
Either the video itself or the description should contain content related to the
Palestine/Israel conflict. It is also sufficient if the video is about events and
issues surrounding the conflict, like providing aid to Gaza.</p>
      <p>Give your answer precisely in the following format:
"Score:Reasoning". For example, "1:The video is about the events and issues
surrounding the Palestine/Israel conflict. Do not say 'Score' or 'Reasoning' in
your answer."
A.2. Online Resources
• All code and instructions can be found on https://github.com/LukaBekavac/SOAP/tree
/paper-submission. The code in the repository was partly created using AI tools (e.g.,
ChatGPT, GitHub Copilot, Cursor.
• The full social media data used for deductive coding evaluation and the exploration of
iflter bubbles is available upon request.</p>
      <sec id="sec-7-1">
        <title>User/account names of post creators</title>
      </sec>
      <sec id="sec-7-2">
        <title>Video/photo data of the post, hashtags, description</title>
      </sec>
      <sec id="sec-7-3">
        <title>Deductive coding analysis of the LLM, video/photo data</title>
      </sec>
      <sec id="sec-7-4">
        <title>Constellation of time and posts</title>
      </sec>
      <sec id="sec-7-5">
        <title>Logged timeline/explore feed</title>
        <sec id="sec-7-5-1">
          <title>Data</title>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bail</surname>
          </string-name>
          , Breaking the Social Media Prism: How to Make Our Platforms Less Polarizing, Princeton University Press,
          <year>2021</year>
          . URL: https://press.princeton.edu/books/hardcover/9780 691203423/
          <article-title>breaking-the-social-media-prism.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Michiels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leysen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Smets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Goethals</surname>
          </string-name>
          ,
          <article-title>What Are Filter Bubbles Really? A Review of the Conceptual and Empirical Work</article-title>
          ,
          <source>in: Adjunct Proceedings of the 30th ACM Conference on User Modeling, Adaptation and Personalization</source>
          , UMAP '22 Adjunct, Association for Computing Machinery, New York, NY, USA,
          <year>2022</year>
          , p.
          <fpage>274</fpage>
          -
          <lpage>279</lpage>
          . URL: https://doi.org/10.114 5/3511047.3538028. doi:
          <volume>10</volume>
          .1145/3511047.3538028.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dahlgren</surname>
          </string-name>
          ,
          <article-title>A critical review of filter bubbles and a comparison with selective exposure</article-title>
          ,
          <source>Nordicom Review</source>
          <volume>42</volume>
          (
          <year>2021</year>
          )
          <fpage>15</fpage>
          -
          <lpage>33</lpage>
          . URL: https://doi.org/10.2478/nor-2021-0002. doi:doi: 10.2478/nor- 2021- 0002.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>E.</given-names>
            <surname>Pariser</surname>
          </string-name>
          ,
          <article-title>The Filter Bubble: What The Internet Is Hiding From You</article-title>
          ,
          <source>Penguin Books Limited</source>
          ,
          <year>2011</year>
          . URL: https://books.google.be/books?id=-FWO0puw3nYC.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>Staf</surname>
          </string-name>
          ,
          <article-title>Inside TikTok's Algorithm: A WSJ Video Investigation</article-title>
          ,
          <year>2021</year>
          . URL: https://www. wsj.com/articles/tiktok-algorithm
          <source>-video-investigation-11626877477, Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Gilbert</surname>
          </string-name>
          ,
          <article-title>TikTok pushed young German voters toward Far-Right Party</article-title>
          ,
          <year>2024</year>
          . URL: https://www.wired.com/story/tiktok- german
          <string-name>
            <surname>-</surname>
          </string-name>
          voters- afd/,
          <source>Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Christopher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bansal</surname>
          </string-name>
          ,
          <article-title>Indian Voters Are Being Bombarded With Millions of Deepfakes</article-title>
          .
          <source>Political Candidates Approve</source>
          ,
          <year>2024</year>
          . URL: https://www.wired.com/story/indian-elections
          <article-title>-a i-deepfakes/</article-title>
          ,
          <source>Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>European</given-names>
            <surname>Parliament</surname>
          </string-name>
          ,
          <article-title>Council of the European Union, Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services</article-title>
          and
          <source>amending Directive</source>
          <year>2000</year>
          /31/EC (Digital Services Act),
          <source>Oficial Journal of the European Union</source>
          <volume>65</volume>
          (
          <year>2022</year>
          ). URL: http://data.europa.eu/eli/reg/2022/2065/oj/eng.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Schneiker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Joachim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lange</surname>
          </string-name>
          ,
          <article-title>How to Analyze Social Media? Assessing the Promise of Mixed-Methods Designs for Studying the Twitter Feeds of PMSCs</article-title>
          ,
          <source>International Studies Perspectives</source>
          <volume>20</volume>
          (
          <year>2018</year>
          )
          <fpage>188</fpage>
          -
          <lpage>200</lpage>
          . URL: https://doi.org/10.1093/isp/ eky013. doi:
          <volume>10</volume>
          .1093/isp/eky013. arXiv:https://academic.oup.com/isp/articlepdf/20/2/188/28484823/eky013.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Whittaker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Looney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Votta</surname>
          </string-name>
          ,
          <article-title>Recommender systems and the amplification of extremist content</article-title>
          ,
          <source>Internet Policy Review</source>
          <volume>10</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          . URL: https://hdl.handle.
          <source>net/104</source>
          <volume>19</volume>
          /235968. doi:
          <volume>10</volume>
          .14763/
          <year>2021</year>
          .2.1565.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B. I.</given-names>
            <surname>Davidson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wischerath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Racek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Parry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Godwin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hinds</surname>
          </string-name>
          , D. van der Linden,
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Roscoe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ayravainen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Cork</surname>
          </string-name>
          ,
          <article-title>Platform-controlled social media APIs threaten open science</article-title>
          ,
          <source>Nature Human Behaviour</source>
          <volume>7</volume>
          (
          <year>2023</year>
          )
          <fpage>2054</fpage>
          -
          <lpage>2057</lpage>
          . URL: https://doi.org/10.1038/ s41562-023-01750-2. doi:
          <volume>10</volume>
          .1038/s41562- 023- 01750- 2.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Faddoul</surname>
          </string-name>
          , G. Chaslot,
          <string-name>
            <given-names>H.</given-names>
            <surname>Farid</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Longitudinal</surname>
          </string-name>
          <article-title>Analysis of YouTube's Promotion of Conspiracy Videos</article-title>
          ,
          <year>2020</year>
          . URL: https://arxiv.org/abs/
          <year>2003</year>
          .03318. arXiv:
          <year>2003</year>
          .03318.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J. O.</given-names>
            <surname>Rixen</surname>
          </string-name>
          , L.
          <string-name>
            <surname>-M. Meinhardt</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Glöckler</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-L. Ziegenbein</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Schlothauer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Colley</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Rukzio</surname>
            ,
            <given-names>J. Gugenheimer,</given-names>
          </string-name>
          <article-title>The loop and reasons to break it: Investigating infinite scrolling behaviour in social media applications and reasons to stop</article-title>
          ,
          <source>Proc. ACM Hum.-Comput. Interact</source>
          .
          <volume>7</volume>
          (
          <year>2023</year>
          ). URL: https://doi.org/10.1145/3604275. doi:
          <volume>10</volume>
          .1145/3604275.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Tomlein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pecher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Simko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Srba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Moro</surname>
          </string-name>
          , E. Stefancova,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kompan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hrckova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Podrouzek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bielikova</surname>
          </string-name>
          ,
          <article-title>An audit of misinformation filter bubbles on youtube: Bubble bursting and recent behavior changes</article-title>
          ,
          <source>in: Proceedings of the 15th ACM Conference on Recommender Systems</source>
          , RecSys '21,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2021</year>
          , p.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . URL: https://doi.org/10.1145/3460231.3474241. doi:
          <volume>10</volume>
          .1145/3460231. 3474241.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Chew</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bollenbacher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wenger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Speer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>LLM-Assisted Content Analysis: Using Large Language Models to Support Deductive Coding</article-title>
          ,
          <year>2023</year>
          . URL: https://arxiv.org/ abs/2306.14924. arXiv:
          <volume>2306</volume>
          .
          <fpage>14924</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. V.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Abdelghani</surname>
          </string-name>
          , P.-Y. Oudeyer,
          <article-title>Supporting Qualitative Analysis with Large Language Models: Combining Codebook with GPT-3 for Deductive Coding</article-title>
          ,
          <source>in: 28th International Conference on Intelligent User Interfaces</source>
          ,
          <source>IUI '23</source>
          ,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          ,
          <year>2023</year>
          . URL: http://dx.doi.org/10.1145/3581754.3584136. doi:
          <volume>10</volume>
          .1145/3581754.3584136.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Guo</surname>
          </string-name>
          , G. Lim,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , T. J.
          <string-name>
            <surname>-J. Li</surname>
            ,
            <given-names>S. T.</given-names>
          </string-name>
          <string-name>
            <surname>Perrault</surname>
          </string-name>
          , CollabCoder: A Lowerbarrier,
          <article-title>Rigorous Workflow for Inductive Collaborative Qualitative Analysis with Large Language Models</article-title>
          ,
          <year>2024</year>
          . URL: https://arxiv.org/abs/2304.07366. arXiv:
          <volume>2304</volume>
          .
          <fpage>07366</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schechner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Barry</surname>
          </string-name>
          , G. Wells,
          <string-name>
            <given-names>J.</given-names>
            <surname>French</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Whitton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dapena</surname>
          </string-name>
          , How TikTok Brings War Home to Your Child,
          <source>The Wall Street Journal</source>
          (
          <year>2024</year>
          ). URL: https://www.tovima.com /wsj/how
          <article-title>-tiktok-brings-war-home-to-your-child/</article-title>
          ,
          <source>Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Younes</surname>
          </string-name>
          ,
          <source>Meta's Broken Promises</source>
          ,
          <year>2023</year>
          . URL: https://www.hrw.
          <source>org/report/2023/12/2 1</source>
          <article-title>/metas-broken-promises/systemic-censorship-palestine-content-instagram-</article-title>
          <string-name>
            <surname>and</surname>
          </string-name>
          ,
          <source>Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>L.</given-names>
            <surname>Cervi</surname>
          </string-name>
          , T. Divon, Playful Activism:
          <article-title>Memetic Performances of Palestinian Resistance in TikTok #Challenges</article-title>
          ,
          <source>Social Media + Society</source>
          <volume>9</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1177/20563051231157607.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>I. Akerman</surname>
          </string-name>
          , Misinformation, censorship and propaganda:
          <source>The information war on Gaza</source>
          ,
          <year>2024</year>
          . URL: https://wired.me/business/social-media/
          <article-title>gaza-social-media-war-palestine/</article-title>
          ,
          <source>Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Warrens</surname>
          </string-name>
          , Five Ways to Look at Cohen's Kappa,
          <source>Journal of Psychology &amp; Psychotherapy</source>
          <volume>05</volume>
          (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .4172/
          <fpage>2161</fpage>
          -
          <lpage>0487</lpage>
          .
          <fpage>1000197</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rozado</surname>
          </string-name>
          ,
          <source>The Political Preferences of LLMs</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2402.01789. arXiv:
          <volume>2402</volume>
          .
          <fpage>01789</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <article-title>Institute of Strategic Dialogue, Access to Social Media Data for Public Interest Research: Lessons Learnt &amp; Recommendations for Strengthening Initiatives in the EU</article-title>
          and Beyond,
          <year>2023</year>
          . URL: https://www.isdglobal.org/isd-publications/
          <article-title>researcher-access-to-social-media -data-lessons-learnt-recommendations-for-strengthening-initiatives-in-the-eu-beyond/</article-title>
          ,
          <source>Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>P.</given-names>
            <surname>Leerssen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Heldt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Kettemann</surname>
          </string-name>
          , Scraping By?
          <article-title>Europe's law and policy on social media research access</article-title>
          , in: C.
          <string-name>
            <surname>Strippel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Paasch-Colberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Emmer</surname>
          </string-name>
          , J. Trebbe (Eds.),
          <source>Challenges and perspectives of hate speech research</source>
          , volume
          <volume>12</volume>
          of Digital Communication Research, Berlin,
          <year>2023</year>
          , pp.
          <fpage>405</fpage>
          -
          <lpage>425</lpage>
          . doi:https://doi.org/10.48541/dcr.v12.
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <article-title>Dutch Data Protection Authority, AP: scraping bijna altijd illegaal</article-title>
          ,
          <year>2024</year>
          . URL: https: //www.autoriteitpersoonsgegevens.nl/actueel/ap
          <article-title>-scraping-bijna-altijd-</article-title>
          <string-name>
            <surname>illegaal</surname>
          </string-name>
          ,
          <source>Last accessed July 26</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>E. D. P.</given-names>
            <surname>Supervisor</surname>
          </string-name>
          ,
          <article-title>Generative AI and the EUDPR: First EDPS Orientations for ensuring data protection compliance when using Generative AI systems</article-title>
          , EDPS,
          <year>2024</year>
          . URL: https: //www.edps.europa.eu/system/files/2024-06/
          <fpage>24</fpage>
          -06-03_genai_orientations_en.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>R.</given-names>
            <surname>Spence</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bifulco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bradbury</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Martellozzo</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. DeMarco</surname>
          </string-name>
          ,
          <article-title>The psychological impacts of content moderation on content moderators: A qualitative study</article-title>
          ,
          <source>Cyberpsychology: Journal of Psychosocial Research on Cyberspace</source>
          <volume>17</volume>
          (
          <year>2023</year>
          )
          <article-title>Article 8</article-title>
          . URL: https://cyberpsy chology.eu/article/view/33166. doi:
          <volume>10</volume>
          .5817/CP2023- 4- 8.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>M. Z. Choksi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Aubin Le Quéré</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Lloyd</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Tao</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Grimmelmann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Naaman, Under the (neighbor)hood: Hyperlocal Surveillance on Nextdoor</article-title>
          ,
          <source>in: Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI '24</source>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2024</year>
          . URL: https://doi.org/10.1145/3613904.3641967. doi:
          <volume>10</volume>
          .1145/3613904.3641967.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>3</year>
          . Data collected
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>