1. bookVolumen 23 (2022): Heft 1 (March 2022)
Zeitschriftendaten
License
Format
Zeitschrift
eISSN
1529-1227
Erstveröffentlichung
31 Jan 2000
Erscheinungsweise
1 Hefte pro Jahr
Sprachen
Englisch
Uneingeschränkter Zugang

A Network Analysis of Twitter's Crackdown on the QAnon Conversation

Online veröffentlicht: 16 May 2022
Volumen & Heft: Volumen 23 (2022) - Heft 1 (March 2022)
Seitenbereich: 4 - 27
Zeitschriftendaten
License
Format
Zeitschrift
eISSN
1529-1227
Erstveröffentlichung
31 Jan 2000
Erscheinungsweise
1 Hefte pro Jahr
Sprachen
Englisch
Introduction

Even casual observers of the raid on the U.S. Capitol on January 6, 2021, could not help but notice the large numbers of individuals wearing clothes and other paraphernalia declaring their allegiance to ‘Q’ and the QAnon movement. Their presence was somewhat unsurprising since QAnon followers have appeared at Trump rallies since 2018 (Bank, Stack and Victor 2018). QAnon is a conspiracy theory that believes that former President Trump is (or was) fighting a ‘deep-state’ cabal of Satan-worshipping, cannibalistic pedophiles running a global child sex-trafficking ring,

Cabal members reportedly kill and eat their victims to extract a life-extending chemical from their blood.

as well as controlling just about everything that matters: politicians, the media, Hollywood, the world (Rozsa 2019). Conspirators allegedly include liberal Hollywood actors (e.g., Tom Hanks), Democratic politicians (e.g., Hillary Clinton), financial elites (e.g., George Soros), and even some religious leaders (e.g., the Dalai Lama). QAnon holds that Trump is (or was) planning a day of reckoning known as the ‘Storm’ when he would first unmask the conspiracy and then arrest, prosecute, and execute its leaders for their crimes. Accompanying the Storm will be the ‘Great Awakening,’ when Americans finally see the corruptness of the U.S. political system that has enslaved them for some time. Followers of Q just need to ‘trust in the plan.’

Many followers believed that the raid on the U.S. Capitol was, in fact, the advent of the Storm, and many were disappointed when it did not materialize. For some, disappointment turned into disillusionment two weeks later with Joe Biden's inauguration, an event many QAnon followers believed would not happen (Sardarizadeh and Robinson 2021). For example, Ron Watkins, a former site administrator for 8chan, where many of Q's posts appeared and who some believe is Q, suggested it was time to ‘go back to our lives as best we are able’ (Collins and Zadrozny 2021a). Others, however, did not abandon the faith, believing that Trump and Q were still controlling events and that Biden's inauguration was ‘all part of the plan’ (Harwell 2021, Sardarizadeh and Robinson 2021).

Beginning with a post on the 4chan imageboard in October 2017,

Imageboards are online forums where users post images, often with accompanying text and discussion.

QAnon narratives diffused across popular social media platforms, such as Twitter and Facebook, highlighting the challenges that cross-platform social media networks pose for understanding conspiracy theories, as well as countering misinformation contained therein. The movement has attracted a wide range of followers and admirers, including Republican members of Congress, individuals involved in former President Trump's attempts to overturn the 2020 election, and perhaps most notably, retired Lieutenant General Michael Flynn, who pledged an oath to QAnon on July 4, 2020 (Cohen 2020, Rosenberg 2021). Although Trump plays a central role in the conspiracy, he has pleaded ignorance about it, except for remarking that he heard it was working against pedophilia (Berman 2020). He has, however, helped publicize QAnon by retweeting or mentioning 152 QAnon-affiliated Twitter accounts, sometimes several times a day (Nguyen 2020). Some followers refer to him as ‘Q+’ (LaFrance 2020).

In May of 2019, the FBI issued an intelligence bulletin identifying QAnon as a potential security threat (Federal Bureau of Investigation 2019). A little over a year later, Twitter, claiming that QAnon messaging could lead to violence, took steps to counter the diffusion of QAnon content on its platform and prevent it from spreading to others. It banned thousands of QAnon-affiliated accounts and attempted to block QAnon-related URLs from being shared on its platform. It also altered its algorithms to no longer recommend content from other accounts associated with QAnon or highlight them in search and conversations (Conger 2020). Other platforms soon followed suit. Facebook first restricted QAnon activity and then banned it altogether (Collins and Zadrozny 2020, Heilweil 2020). YouTube and TikTok took similar steps. Then, in January 2021, shortly after the Capitol raid, Twitter took additional steps by removing more than 70,000 accounts promoting QAnon (Savov 2021). This appears to have led followers to migrate to other social media outlets, such as 8chan (now 8kun), Gab, Telegram, Parler, and so on (Bond 2021, Rahn and Patterson 2021).

This paper draws on insights drawn from diffusion/contagion studies and uses social network analysis to examine online aspects of the QAnon movement, in particular, networks created by Twitter users sharing URL links to other social media platforms. Specifically, it analyzes users’ URL sharing patterns before and after Twitter's attempt to crack down on the movement in the summer of 2020. While there are several ways to expose people to materials (e.g., videos) on other social media platforms (e.g., through colleagues and family), sharing URLs is an efficient means for doing so in near real-time (Singh et al. 2020). They can offer new pathways into extant social networks on other social media platforms and forms of media (Fu and Shumate 2017), especially when one platform becomes increasingly hostile. However, extant literature has paid little attention to multiplatform diffusion, including the spread of conspiracy theories from one platform to others. Thus, our analysis is novel in that it focuses on between-platform diffusion of QAnon-related information during critical periods of its existence.

The remainder of our paper proceeds as follows. In the next section, we provide an overview of conspiracy theories and an abbreviated history of QAnon. We then draw on diffusion/contagion theory to help place its spread in context. Next, we describe the data we use in our analysis. For reasons discussed below, we focus primarily on tweets and retweets about the diffusion of QAnon URLs that occur in specific periods before (peak) and after (post) Twitter's banning of QAnon-related accounts in July 2020. Our analysis first considers the distribution of links to other social media platforms and then examines the peak and post retweet networks using standard social network analysis measures and algorithms. We follow this with a discussion of potential strategies for impeding the spread of QAnon (and other conspiracies). It concludes by considering opportunities for future research.

Conspiracy Theories and QAnon

Conspiracy theories contend that lying behind significant political and social events is a small group of powerful people secretly acting for their benefit and (usually) against the common good (Douglas et al. 2019, Sunstein and Vermeule 2009, Uscinski 2020). Because they attribute exceptional powers to conspirators, they are notoriously difficult to refute. Followers are unlikely to accept any evidence that purports to refute a conspiracy since they most likely believe that those attempting to do so are either agents or dupes of the conspirators (Rosenblum and Muirhead 2019, Sunstein and Vermeule 2009, Uscinski 2020). Moreover, many of today's conspiracists use innuendo and make bare assertions to spread false claims and shape narratives that can fuel conspiracy theories, including those related to QAnon (Rosenblum and Muirhead, 2019).

True to form, QAnon attributes extraordinary powers to a group of people who it claims have successfully duped Americans for some time. Although outsiders believe numerous studies have discredited it and many, if not most, of Q's predictions have failed to come true, this has had little effect on QAnon followers. This pattern aligns with work on how followers often continue to believe even in the face of evidence to the contrary (Festinger, Rieken and Schachter 1956, Uscinski 2020). One difficulty in countering QAnon lies in its followers’ distrust of mainstream media. They see outlets such as CNN, The New York Times, NPR, and The Washington Post as dishonest and (either wittingly or unwittingly) in league with the conspiracy. Thus, they have turned to alternative outlets that, while not necessarily promoting QAnon, have not actively sought to undermine it either.

QAnon is built, in part, on the Pizzagate conspiracy, which claimed that the personal emails of John Podesta, Hillary Clinton's campaign manager, contained coded messages tying several high-ranking Democratic Party officials and U.S. restaurants to a human trafficking and child sex-trafficking ring (Martineau 2017, Tangherlini et al. 2020).1 Comet Ping Pong pizzeria in Washington, D.C., was reportedly one such restaurant. This led a North Carolina man to travel to D.C., where he entered the restaurant, fired shots, and then opened a door he believed led to the basement where he would find evidence of child trafficking. It was, however, just a broom closet (Comet pizzeria has no basement). Although this particular event undermined Pizzagate's credibility, Q successfully adapted aspects of it (Uscinski 2020, Wikipedia 2021b).

Q's first post (aka, ‘Q drop,’ ‘intelligence drop’) occurred on October 28, 2017, on 4chan, an anonymous English-language imageboard.

Anonymous imageboards deliberately obscure their posters’ identities. Those who wish to maintain a consistent identity but remain anonymous use a tripcode, which associates a post with a unique digital signature for anyone who uses the password associated with that tripcode (Wikipedia 2021a).

Q attracted an audience largely thanks to two 4chan moderators and a video producer. Together, they publicized Q, including creating a ‘subreddit’ to reach a larger audience and encourage discussion about Q's posts (Zadrozny and Collins 2018).

Reddit is a news aggregation, discussion, and web content rating website. Registered members can submit content (e.g., links, text posts, images, and videos), which are then voted on by others. Posts are organized by subject into user-created discussion groups called ‘subreddits.’

Reddit eventually shut down the subreddit, fearing that the discussions could incite violence (Zadrozny and Collins 2018). Q's posts eventually moved to 8chan because Q believed 4chan might have been infiltrated (Zadrozny and Collins 2018). Once there, Ron Watkins, a site administrator who many believe is Q, helped publicize Q's posts further, as did a Falun Gong YouTube channel (Rothschild 2019). Q also received a boost from Russian-backed Twitter accounts; beginning in November 2017, #QAnon was the most frequent hashtag they tweeted (Menn 2020).

Hashtags are tags prefaced by the hash symbol, #. They are widely used on social media platforms because they allow users to cross-reference particular subjects or themes.

Q initially claimed to be a high-level government official with access to highly classified information. Many QAnon followers now believe that Q is actually a team of high-ranking individuals executing a military intelligence operation that has been in the works for some time. Some believe the military specifically chose Donald Trump to help them carry out this operation. Many outside observers also believe that Q is more than one person. A machine-learning stylometric analysis of 4,952 posts from October 28, 2017, to November 13, 2020, concluded that two authors wrote Q's posts at two different points in time (OrphAnalytics 2020).

Q's posts tend to be cryptic. Followers claim this reflects the classified nature of much of the information that Q seeks to share. As such, Q only drops ‘breadcrumbs’ that followers then interpret to uncover ‘the truth,’ which they then share with the QAnon community through their own posts. Followers also parse Trump's speeches, believing they contain hidden clues. For instance, QAnon's belief in the coming Storm originates from a remark made by Trump at a gathering of military officials in October 2017: ‘You guys know what this represents? Maybe it's the calm before the storm. Could be the calm, the calm before the storm’ (quoted in Hartman 2017). The pouring over and reflecting upon Q's posts and Trump's speeches have led to a proliferation of beliefs,

In late 2017 or early 2018, Dylan Louis Monroe, reportedly a QAnon follower, mapped QAnon's numerous beliefs: https://www.mediocremonday.com/tag/q-web-made-by-dylan-louis-monroe/.

such as the government is controlled by Jews, Hillary Clinton is in jail, JFK, Jr. is still alive and will soon return to help Trump bring down the deep state, Covid-19 is a hoax, and Joe Biden's election was a fraud.

Not everyone embraces all of the beliefs associated with the movement, but most believe Trump will bring down the deep state cabal of elites who worship Satan, abuse children, and running the world for their own benefit.

A popular slogan among QAnon followers is the acronym WWG1WGA (“Where we go one, we go all”), which Q first used in April 2018 and soon appeared on t-shirts and bumper stickers, and used as a hashtag.

Diffusion/Contagion of the QAnon Conversation - Hypotheses

See Table 7 for a summary of the hypotheses and the results of the analysis.

Diffusion is a theoretical perspective to explain how ideas and information spread across populations (Rogers 2003). From a social network perspective, numerous factors can affect the speed and reach by which a belief system such as QAnon spreads (Valente 1995). Often, central actors embrace an idea or practice sooner (e.g., Banerjee et al. 2013, Christakis and Fowler 2010, Valente and Vega Yon 2020). However, there is evidence that they can be reluctant to adopt new ideas or practices that are ‘costly, risky, or controversial’ (Centola and Macy 2007:703), suggesting that in some instances, the earliest adopters may lie on the margins (Hassanpour 2017, Steinert-Threlkeld 2017) where ‘they are freed from system norms’ (Valente and Vega Yon 2020:5). While the QAnon conversation probably started on the fringes of Twitter and other social media outlets, it is likely that as it became more popular and more socially acceptable, perhaps as early as 2018 (Bank, Stack and Victor 2018), it spread to more popular Twitter accounts that could have been seen as relatively ‘reliable sources’ of information—e.g., accounts with numerous followers, those that have been frequently retweeted (for all tweets, not just QAnon-related ones), and those whose tweets have been ‘liked’ by other users (favorites)—who then helped spread it across Twitter and potentially expose others to relevant materials on other platforms. Since the period we analyze here lies in this later stage, we expect the tweets and retweets of a handful of actors to account for most of the sharing of links to external social media sites, which is likely to lead to clustering and increased centralization. Restating these observations more formally as hypotheses:

H1: A handful of actors will account for most of the link-sharing of external social media sites.

H2: “Reliable” actors will be central before and after Twitter's crackdown in July 2020, even if they are different users in each period.

H3: Because of the presence of a handful of reliable actors, we expect relatively high levels of clustering among networked accounts in each period.

H4: Because of the presence of a handful of reliable actors, we expect moderate-to-high levels of centralization in both periods.

Closely related (but not identical) to network centralization is whether the QAnon retweet networks will exhibit the characteristics of a scale-free network. In scale-free networks, most nodes have very few ties, but a few have numerous ones such that the distribution of ties across nodes follows a power law, where the number of nodes with degree (number of ties) k is proportional to ka, and a > 1 for ‘weakly’ scale-free networks and 2 < a < 3 for ‘strongly’ scale-free networks (Barabási and Albert 1999, Broido and Clauset 2019). In evaluating whether a network is scale-free, Broido and Clauset (2019) apply this power law ‘requirement’ to only the distribution's upper tail, although they require the upper tail to have at least 50 nodes. Scale-free networks often develop through preferential attachment, which occurs when new actors joining a network tend to form ties to existing actors with numerous ties rather than those with very few (Barabási and Albert 1999). Because we believe that as users joined the QAnon conversation, they were more likely to retweet posts from ‘reliable sources,’ we expect the peak and post networks to be scale-free:

H5: The QAnon peak and post retweet networks will be scale-free.

Some have speculated that the distribution of followers on Twitter is probably scale-free and caused by a preferential attachment process (see e.g., Borgatti, Everett and Johnson 2018:302, Klarreich 2018).

Tie strength can also play an important role in diffusion. Mark Granovetter (1973) has argued that weak ties are ‘strong’ because they are more likely than strong ties to form bridges between otherwise unconnected social circles. More recently, Damon Centola and Michael Macy (2007) have shown that although weak ties can facilitate the spread of some ideas or innovations, the adoption of a behavior, idea, or information that is ‘costly, risky, or controversial,’ what they call complex contagion, requires numerous, strong ties to prior adopters because individuals often ‘require independent affirmation or reinforcement from multiple sources’ (Centola and Macy 2007, 703). Consistent with their analysis, studies have found that the process by which hashtags spread across Twitter is a function of whether they are controversial or noncontroversial (Romero, Meeder and Kleinberg 2011). For example, the diffusion of controversial political hashtags exhibits the characteristics of complex contagion because most users need to have ‘contact with up to five or six adopters before adopting a new political hashtag.’ In contrast, the diffusion of less controversial hashtags exhibits the characteristics of simple contagion in that they ‘typically spread from person to person with only a single contact’ (Centola 2018, 89).

Given that the cost or riskiness for sharing QAnon-related content on Twitter during the period we analyze here was probably low (although it may have become riskier since the raid on the Capitol), our peak and post retweet networks are more likely examples of simple rather than complex contagion. As such, we expect them to exhibit three broad topological characteristics: low levels of reciprocity, sparseness, and transitivity. Stated formally:

H6: We expect the peak and post retweet networks to display low levels of reciprocity (i.e., where node pairs that share a tie also reciprocate their ties, such as account A retweets account B and vice versa), which we interpret as evidence of an absence of strong ties between user accounts.

H7: Because the relative lack of strong ties lowers the probability of transitivity (Granovetter 1973), we expect the peak and post retweet networks to be relatively sparse and exhibit low levels of transitivity.

Aside from the post network being smaller and less interconnected than the peak network, the effect of Twitter's crackdown in terms of the network metrics outlined above is not necessarily obvious. Assuming Twitter targeted more prominent accounts, we should see a decline in centralization from the peak to the post networks. The crackdown could have similarly affected the scale-free nature of the two networks in that the post network could be ‘less’ scale-free than the peak. Stated formally:

H8: The network will become less centralized after Twitter's crackdown in July 2020.

H9: The network will become less scale-free after Twitter's crackdown in July 2020.

Data and Methods

Using the R package, rtweet (Kearney 2019), we collected QAnon-related Twitter data (tweets) daily from April 2020 to November 2020 via Twitter's REST API, which allowed access to 18,000 tweets every 15 minutes going back seven days.

In January of 2021, Twitter amended its policy allowing researchers access Twitter data beyond 7 days. See https://blog.twitter.com/developer/en_us/topics/tools/2021/enabling-the-future-of-academic-research-with-the-twitter-api.html

It is important to note that these data do not constitute a random sample, unlike a streaming API. For this paper, we focus on tweets containing the hashtag #QAnon.

If we include several other commonly used QAnon-related hashtags in this count (e.g., #thegreatawakening, #pizzagate, #deepstate, #savethechilrden), then the percentage of users sharing QAnon-based hashtags along with #QAnon rises to 42% and 39% of all tweets. Since we examined only twenty commonly referenced QAnon-related hashtags, it is highly likely these statistics underestimate the extent to which users tweeted QAnon related hashtags.

To include a tweet in our analysis, it had to include the hashtag #QAnon and a link to an external social media platform (i.e., social media other than Twitter). This approach presented tradeoffs for understanding URL sharing patterns among accounts interested in QAnon.

Account-based approaches—those that collect data starting from QAnon-based accounts identified by some sort of criteria—can offer insight into the movement's followers. For instance, Benigni, Joseph, and Carley (2017) identified five known ISIS accounts and used a two-step snowball sample of followers to analyze the organization's support network on Twitter. By focusing on URL sharing behavior, we may have excluded data about those who are not ‘card carrying’ members of the movement but still expose others to QAnon materials. A combination of hashtag and account-based approaches can also offer benefits (Lorentzen and Nolin 2015).

For example, not all accounts in the data adhere to QAnon beliefs. Users can tweet #QAnon for many reasons, including ridiculing its followers or offering counter-narratives. However, 37% of all accounts in the data set tweeted #WWG1WGA at least once during the April–November timeframe, and 32% of tweets contained the hashtag. That Twitter suspended 71% of the ‘peak’ network's most central accounts,

The ‘peak’ accounts (n = 17) are those that scored in the top ten for indegree, authority, and betweenness centrality. Although they correlate highly with one another, but they give us an idea of which accounts were influential on sharing URLs.

many of whom tweeted other QAnon-related hashtags

For instance, 76% of the central accounts retweeted #WWG1WGA at least once. Overall, 82% of the most central accounts either tweeted this popular hashtag along with #QAnon, Twitter suspended them, or both. All but one of the accounts that were neither suspended nor tweeted #WWG1WGA were in Japanese.

with #QAnon, suggests most of the highly retweeted accounts held QAnon beliefs to some extent. An advantage of our approach is that it excludes accounts like ‘@JoeBiden’ and ‘@HillaryClinton,’ who many Twitter users engaged with or mentioned frequently in their tweets but did not tweet #QAnon and are considered enemies of the movement. Moreover, while #QAnon captures only a portion of the broader conversation about QAnon and does not address ‘conversational drift’ (Lorentzen and Nolin 2015), it is an obvious hashtag for users to locate and become exposed to QAnon-related materials. Similarly, our emphasis on tweets with links to external platforms permits us to focus only on the network engaged in exposing others to external resources (e.g., videos). A few other points are worth noting. The tweets did not have to be original; they included retweets as well (see the description of different types of tweets below). Also, we included links to all social media platforms. Most of these were easy to identify (e.g., YouTube, Facebook), but we did have to look more carefully for some social media platforms, such as Bitchute.

Figure 1 plots our data. The vertical line indicates July 21, 2020, when Twitter cracked down on QAnon-affiliated accounts and tweets by removing accounts, blocking trends related to QAnon, and attempting to prevent users from posting QAnon-associated URLs (Conger 2020). These restrictions affected approximately 150,000 accounts (Conger 2020). As the figure shows, there was a substantial decline in #QAnon-related tweets after the crackdown.

Figure 1

Tweets About #QAnon: Daily Aggregated #QAnon Status Counts

Our analysis primarily examines a peak-period before the crackdown (June 11–14, 2020—highlighted in yellow) and a post-period after the crackdown (July 21–August 11, 2020—highlighted in purple). In particular, we compare data before and after Twitter's ban to explore any shifts in URL sharing behavior. The peak period coincides with civil rights protests in Seattle and Atlanta, COVID cases exceeding 2 million in the U.S., as well as shortly after Washington D.C. renamed 16th Street to BLM Plaza and Trump held a photo-op grasping a Bible in front of St. John's Episcopal Church after forcefully removing protestors from Lafayette Square in D.C. The post period coincides with Trump's ‘surge’ in which he sent federal police to “Democrat cities,” his suggestion to delay the November election, wildfires in California, the Sturgis Motorcycle Rally, and Joe Biden announcing Kamala Harris as his running mate.

Table 1 summarizes our data (far right column). It also compares our data to the total number of tweets in each of the peak, post, and entire periods (#Tweets), the number and percentage of tweets that contained a URL in each period, the number and percentage of all tweets that had a social media URL in each period, and the number and percentage of tweets that included a URL to an external social media platform in each time frame. As it indicates, from April to November, approximately 19% of all tweets shared a URL, 7% shared a social media URL, and 3% shared an external social media URL. The percentages change somewhat when looking at the peak and post periods. During the peak period, approximately 25% shared a URL, 10% a social media URL, and 5% an external social media URL, while during the post, about 15% shared a URL, 6% a social media URL, and 4% an external social media URL. The tweets that shared an external social media URL interest us here. Notably, in the peak network, of the tweets that contained a link to a social media URL, 48% (5,938/12,374) were to external social media sites; however, in the post network, the percentage jumped to 60% (4,420/7,355), evidence consistent our expectation that Twitter's crackdown enticed followers to migrate to other social media outlets.

Data Summary

PeriodTweetsTweets with URLTweets with Social Media URLTweets with External Social Media URL
April – November2,330,581451,490 (19.4%)166,392 (7.1%)78,439 (3.4%)
Peak (July 11th – 14th)124,67030,966 (24.8%)12,374 (9.9%)5,938 (4.8%)
Post (July 21st – August 11th)115,88217,459 (15.1%)7,355 (6.3%)4,420 (3.8%)

Apart from examining shared URLs, we focus our network analysis on the retweet networks. Twitter data includes six types of relations: (1) mentions, which are tweets in which users mention (usually with the @ symbol) another user; (2) replies, which are tweets that answer another user and are often used to initiate conversations; (3) retweets, which are re-distributed or re-posted tweets; (4) quotes, which are retweets that include a comment; (5) friends, which are those that a specific user follows; and (6) followers, which are those that follow a specific user (Giachanou and Crestani 2016, Twitter 2021). The data also include account attributes (characteristics), several of which we include in our analysis: (1) number of retweets, which indicates the number of times an account has been retweeted; (2) tweets, which is the number of tweets an account tweeted during each time frame; (3) favorites, which shows the number of times other users ‘liked’ an account's tweets; (4) friends, which indicates the number of accounts each user follows; and (5) followers, which is the number of users that follow each user.

We focus on retweet networks because they are excellent for capturing flows (Kane et al. 2014) and URL sharing networks. Moreover, other types of tweets (e.g., mentions) include accounts not actively engaged in sharing URLs. For instance, some #QAnon mentions include ‘@realDonaldTrump,’ although Trump never shared any URLs (at least in our data set); thus, although Trump was a topic of the conversation, he did not participate in the conversation. Finally, it is essential to note that connected pairs include only ‘source’ tweet accounts (i.e., crafters of original tweets) and accounts that retweeted them, regardless of how the retweeting account was exposed to the original tweet. For instance, suppose user A retweets one of user B's initial tweets, and then user C, as a ‘friend’ of A, sees user B's tweet and subsequently retweets it. In this scenario, retweet ties only exist between users A and B and between B and C.

As with social media data collection in general, this is the result of the API we leveraged to collect this data set. It is possible this impacts some our statistics, such as driving down reciprocity. In this example, one could argue that A and C could have a retweet tie (C→A). If A had already retweeted C on another occasion (C←A), then we would miss out on the former arc (C→A) whereby C retweeted A's redistribution of B's original tweet. Nonetheless, the API output does not provide this information. As we discuss below, it still holds that the well-connected, prominent accounts did not reciprocate (i.e., retweeting) others who retweeted them.

Network Measures

Our analysis of the retweet networks begins by calculating commonly used topographical measures related to the hypotheses outlined above: density, average degree, transitivity, reciprocity centralization, diameter, average path length, and size. Density, average degree, transitivity, and clustering coefficient help gauge a network's interconnectedness. Density is the standard measure of interconnectedness, but because it is inversely associated with network size (de Nooy, Mrvar and Batagelj 2018), we use average degree as an alternative measure. Transitivity equals the ratio of triangles (closed triads) over the total number of connected triads in a network. We use degree and betweenness centralization, diameter, and average path length to estimate network spread. Centralization is the standard measure and is based on the variation in actor centrality within the network (i.e., each actor's score is compared to the highest score). More variation yields higher scores, while less yields lower ones. Diameter equals the longest shortest path (geodesic) between all connected pairs of nodes, while average path length equals the average length of all geodesics between all connected pairs of nodes. Larger diameters and average path lengths indicate greater spread. Finally, reciprocity equals the proportion of node pairs that share a tie also reciprocate their ties, and size equals the number of actors in a network.

Numerous algorithms exist to detect subgroups within a larger network. Here, we draw on community detection algorithms, which seek to detect clustering levels greater than one would expect purely by chance (Clauset, Newman and Moore 2004, Girvan and Newman 2002, Newman 2006). Next, we calculate four centrality measures—indegree, betweenness, hubs, and authorities—which we correlate with various user account attributes. Indegree indicates the number of users in each network who have retweeted a particular user account's tweets. Betweenness measures the extent to which users lie on the shortest path between all other pairs of users and is often seen as capturing a node's brokerage potential. Finally, hubs and authorities (Kleinberg 1999) identify relatively well-connected actors tied to other well-connected actors. They are similar to eigenvector centrality, but they differ in that they take into account tie direction. Hubs are associated with outgoing ties (outdegree), while authorities are associated with incoming ties (indegree).

Results and Analysis
URL Sharing

Table 2 presents the shared URL statistics for the peak period, broken down by social media platform. These data contain more than the network data we examine below in that they include retweets, mentions, quotes, and replies. The third column indicates the number of unique URLs per platform, the fourth the number of tweets that shared the domain, the fifth the number of unique accounts that shared the domain, and the sixth, the percentage of all users (13,908) who shared any type of URL. The table indicates that users are linked to multiple social media platforms, although YouTube clearly dominates. Notably, neither Gab nor Parler, which launched in 2016 and 2018, ranked in the top ten during either time period despite evidence that numerous followers migrated to them (Bond 2021, Daly and Fischer 2021, Jasser 2020, Yurieff 2020).

Peak Period URL Statistics

RankPlatformUnique LinksTweetsUsers% Users
1YouTube1,3114,9803,40824.5
2Facebook6685620.4
3PeriscopeTV6239310.2
4Instagram5629240.2
5Bitchute3142270.2
6Pastebin132180.0
7TikTok8850.0
8Spotify7860.0
9Telegram6440.0
10Soundcloud6440.0

Note: Percentage of users calculated based on all users (13,908) who shared any type of URL

Table 3 presents the post period shared URL statistics. YouTube continued to dominate but not to the extent that it did in the peak period. Whereas 25% of users shared links to YouTube in the peak period, only 21% did in the post. More revealing, however, is the increase in shared URLs to other platforms, such as Instagram, PeriscopeTV, Facebook, and Bitchute. There is also some reshuffling in the rankings, with Instagram and PeriscopeTV jumping ahead of Facebook and Reddit.

Post Period URL Statistics

RankPlatformUnique LinksTweetsUsers% Users
1YouTube1,5503,1622,12221.0
2Instagram3622081391.4
3PeriscopeTV13888490.5
4Facebook97117971.0
5Bitchute393433243.2
6TikTok2431240.2
7Etsy1530240.2
8Tumblr131280.1
9Reddit1311100.1
10Soundcloud1216140.1

Note: Percentage of users calculated based on all users (10,128) who shared any type of URL

Topography

We now turn to our topographical analysis of the retweet networks. Figure 2 presents the main components of both networks (i.e., the largest set of directly or indirectly connected accounts), while Table 4 reports key topographical and community detection metrics. The post network is much smaller than the peak, even though the number of days of data collection was far longer (21 vs. 4). Notably, the two networks consist of very different user accounts. Only 155 from the peak network remain in the post. This could be due to accounts being suspended and/or ‘self-selecting’ out (e.g., not active, switched to a different conversation, migrated to another social media platform).

Figure 2

Main (Weak) Components of Peak (Left) and Post (Right) Retweet Networks

Topographical and Girvan-Newman Clustering Metrics of Peak and Post Networks

MetricRetweet Network

PeakPost
Size3,1301,985
Size (Largest Component)2,566988
Density< 0.001< 0.001
Average Degree1.9881.747
Transitivity< 0.001< .0010
Reciprocity0.0000.000
Degree Centralization0.3410.159
Betweenness Centralization0.5860.149
Diameter1514
Average Path Length4.4164.670

Number of Groups217301
Modularity0.8210.905
Normalized Modularity0.8240.908

Reciprocity in both the peak and post retweet networks is quite low, lending support to H6; in fact, it is nonexistent, indicating that users did not exchange URL content in either time frame, perhaps suggesting an absence of ‘strong ties.’ Because such an absence lowers the probability of triadic closure, the two networks are, as expected in H7, relatively sparse and exhibit low levels of transitivity. For both networks, density (< 0.001, < 0.001) and average degree (1.988, 1.747) are quite low, as is transitivity (< 0.001, < 0.001). The decline in average degree indicates that the post network is somewhat less interconnected (i.e., sparser) than the peak.

The diameter for both networks is quite large, indicating that both networks are pretty dispersed. However, the moderate average path length suggests that a handful of nodes lie fairly close to all others. This combination probably reflects, at least in part, social media's unique nature (Kane et al. 2014). Although users did not exchange URL content (reciprocity = 0.00), they did retweet URL links from a handful of key accounts, supporting H1. Some of this likely reflects how Twitter's API provides retweet data, but in both time frames, prominent central accounts appear to serve as ‘authorities’ because they offer links, mainly to YouTube videos, that many others retweet.

For instance, 65% peak network's most central accounts (n=17, see note 14) shared links to YouTube videos on at least one occasion.

For instance, the peak network's most central accounts, which have 69% of all network ties, offer URLs to other social media platforms but do not retweet others’ URLs. The substantial higher degree (0.341) and betweenness centralization (0.586) scores for the peak network as compared to the post (0.159, 0.149) suggest that this was especially true before the crackdown (H8). These results partially support our expectation that the two networks would display moderate-to-high levels of centralization (H4). This was true of the former but not the latter.

There is some evidence that although centralization scores can range from 0.0 to 1.0, they seldom climb much higher than 0.60 (Cunningham, Everton and Murphy 2016, Oliver et al. 2014).

We, of course, did expect the post network to exhibit lower levels of centralization than the peak, but we did not anticipate the crackdown to have such an impact.

Community Detection

We applied the Girvan-Newman (2002) community detection algorithm to both networks to identify subgroups.

We also applied Spinglass (Reichardt and Bornholdt 2006), but it yielded a poorer measure of fit (i.e., modularity score).

As Table 4 indicates, the algorithm detected 217 groups in the peak network and 301 in the post. Both networks have high modularity scores, suggesting they are highly clustered around a few central accounts, supporting H3. However, the increase in groups and modularity scores from the peak to the post indicates a higher level of clustering after Twitter's crackdown.

We next collapsed the main components of both networks by the Girvan-Newman subgroups. Figure 3 presents the results where each node's pie chart indicates the proportion of ‘external’ domain-specific URLs in each subgroup. The results again highlight YouTube's popularity, as it is distributed across clusters in both periods, especially in the peak network. We can also see that other social media platforms, such as Instagram and Bitchute, gained purchase in some of the post network's subgroups.

Figure 3

Main (Weak) Component Collapsed by Girvan-Newman Subgroups

Node Level Patterns

Our next question considers the patterns of prominent accounts during each time frame. As we have seen, the peak network was centralized around a few accounts whose tweets were frequently retweeted by others. This helped create a highly clustered network, as captured in Figure 2 and reflected in the modularity scores reported in Table 4. By contrast, the post period network was less centralized. Still, its numerous subgroups and high modularity scores suggest that a handful of user accounts were retweeted far more often than the typical user account. Figure 4, which presents the indegree distribution for both networks, captures this.

Figure 4

Indegree Distribution, Peak and Post Retweets Network

Both distributions are highly skewed, indicating that most users are seldom retweeted, but the tweets of a few are retweeted frequently. Are the distributions scale-free? Broido and Clauset's (2019) tests for whether networks exhibit a power law distribution indicate that the peak network is ‘weakly’ scale-free with an alpha > 1 but < 2 (a = 1.91), while the post network is ‘strongly’ scale-free with an alpha > 2 (a = 2.74) The results lend support to H5 but not for H9. Importantly, the power-law region for both includes 50 or more nodes.

Additionally, Kolmogorov-Smirnov tests indicate that the power-law distributions cannot be rejected (p > 0.1).

Table 5 presents peak network correlations between four centrality metrics (indegree, betweenness (undirected), hubs, and authorities) and several user account attributes: number of retweets, tweets, URLs shared, favorites, friends, and followers. The coefficients support H2 and indicate a positive and statistically significant association between ‘reliable sources’ and standard centrality metrics.

Since network data violate standard statistical assumptions (Borgatti, Everett and Johnson 2018), we used permutation tests as implemented in UCINET to determine statistical significance (Borgatti, Everett and Freeman 2002).

In particular, positive correlations exist between accounts that are repeatedly retweeted, have many followers, and are frequently ‘liked’ (favorites) and three of the four centrality measures: indegree, betweenness, and authorities. The one exception is the marginally negative correlations between hubs and retweets, favorites, and followers. Recall that hubs capture the eigenvector equivalent of outdegree, that is, the extent to which users retweet frequently-retweeted users. As such, users scoring high in terms of hubs are those doing the retweeting, not necessarily those being retweeted. Thus, the negative correlations suggest that other users do not see them as ‘reliable sources.’

Peak Network Correlations Between Key Centrality Metrics and User Account Attributes

IndegreeBetweennessHubsAuthorities
Retweets0.61***0.59***−0.06***0.53***
Tweets0.05*0.07**−0.09***0.02*
URLs0.06**0.08**−0.04**0.03*
Favorites0.90***0.88***−0.04*0.90***
Friends0.13**0.13**−0.08***0.04*
Followers0.78***0.76***−0.06***0.76***

p<0.05;

p<0.01;

p<0.001

Table 6 presents post network correlations for the same centrality and account attributes. Here, the correlations differ somewhat, but the same patterns hold for retweets and favorites. Notably, the correlations between the three centrality metrics and ‘followers’ are much lower in the post than in the peak network, suggesting that after Twitter's crackdown, which eliminated several prominent QAnon-affiliated accounts, users began searching for others they should follow (and rely on) in the QAnon Twitter network.

Post Network Correlations Between Key Centrality Metrics and User Account Attributes

IndegreeBetweennessHubsAuthorities
Retweets0.76***0.63***−0.020.95***
Tweets0.21***0.26***−0.000.25***
URLs0.31***0.31***0.05*0.38***
Favorites0.73***0.60***−0.020.99***
Friends0.06**0.04*−0.040.07**
Followers0.15***0.11***−0.05*0.17**

p<0.05;

p<0.01;

p<0.001

Discussion and Conclusion

Table 7 presents a summary of the results of our analysis.

Because our analysis is of a single case study, we cannot directly generalize our results to other conspiracy conversations occurring on Twitter. Generalizability occurs at the abstract level and the theoretical principles being tested. Theory is what bridges our analysis to other settings.

In brief, it found that both the peak and post networks exhibited low levels of reciprocity and transitivity, suggesting that the diffusion of QAnon on Twitter was more akin to simple rather than complex contagion. And as expected, there was a strong positive association between accounts that QAnon followers could see as ‘reliable sources’ and key centrality metrics, indicating that a handful of users played an essential role in connecting Twitter users to the QAnon conversation. The central role these actors played also contributed to the high levels of clustering we saw in both the peak and post networks and the moderate-to-high level of centralization in the peak (but not the post) network, which, in turn, probably facilitated the diffusion of the conversation. Both networks also exhibited the characteristics of a scale-free network, although the peak network did so only weakly. Clearly, Twitter's crackdown impacted the QAnon conversation. The post network was less centralized, smaller, and sparser than the peak network, and there was a relative increase in multiplatform URL sharing from the peak to the post network.

Summary of Hypotheses and Results

HypothesesResultComments
H1. A handful of actors will account for most of the link-sharing of external social media sites.+New central actors emerged after the crackdown to diffuse external content.
H2. Reliable actors will be central before and after Twitter's July 2020 crackdown, even if they are different users in each period.+
H3. Both networks will exhibit relatively high levels of clustering.+
H4: Both networks will be moderately to highly centralized.+/−See H8 below.
H5: The retweet networks will be scale-free.+See H9 below.
H6: Both networks will exhibit low levels of reciprocity.+
H7: Both networks will be sparse and exhibit low levels of transitivity.+Unsurprisingly, the post network was smaller and sparser than the peak network.
H8: The network will become less centralized after Twitter's crackdown in July 2020.+
H9: The network will become less scale-free after Twitter's crackdown in July 2020.The post network was more strongly scale-free than the peak network.

As noted earlier, one reaction to the proliferation of QAnon beliefs, including through URL sharing, has been for social media companies, such as Twitter, to deplatform QAnon-related accounts: suspending, banning, or restricting access to particular users. Deplatforming can target everyone expressing (in this case) QAnon sympathies, or it can focus on a few key accounts, such as those scoring high in terms of various centrality and brokerage metrics. Although there is a rationale for deplatforming (Singer 2021), doing so could further validate the perception that one side of the political spectrum is being isolated and misrepresented by the other (Singer 2021). As we saw, it can also point followers to other social media platforms; it can also increase offline, face-to-face interactions that could increase informational and/or social isolation, which, in turn, increases the likelihood of radicalization and possibly violence (Everton 2016, Foot 2018, Sunstein 2002, Sunstein 2009). Targeting key accounts is probably preferable since it may be less likely to provoke a backlash that leads users to switch platforms. Moreover, given the scale-free nature of the two networks, removing a handful of key nodes can substantially fragment them (Barabási and Albert 1999).

An alternative strategy is to ‘infiltrate’ conspiracy theory discussion groups and introduce counter-narratives that would increase informational diversity and decrease the likelihood of radicalization. Sunstein and Vermeule (2009), for instance, suggest that state and federal governments could ‘cognitively infiltrate’ conspiratorial groups, but this raises ethical issues that institutional review boards might find unacceptable, not to mention that doing so probably violates civil liberties and is unconstitutional in the U.S. (Marantz 2017):

Their proposal for a government-sponsored conspiracy to combat conspiracy recalls the efforts by J. Edgar Hoover, the founding director of the FBI, who ran a counterintelligence program from 1956 to 1971 that, among other illegal and improper techniques, infiltrated civil rights groups. Infiltrating conspiracist groups is a similar offense against civil liberties—especially when the group is not a terrorist cell or some other violent association.

(Rosenblum and Muirhead 2019:154)

It is also questionable whether such an approach would be effective. It assumes that users would retweet posts containing the counter-narratives, but as our analysis has shown, the tweets of most users are not retweeted.

A third alternative is for social media platforms to adjust their algorithms to expose users to multiple points of view and potentially form ties with ‘outsiders.’ Twitter has done this, and although it may seem like a somewhat benign strategy, it is easy to underestimate the power of social media feeds to influence behavior (Bond et al. 2012, DiResta 2018, Kramer, Guillory and Hancock 2014, Lanier 2018). Consider, for example, the story of Ashley Vanderbilt, who, after the November 2020 election, spent much of her time consuming QAnon-related social media. By “inauguration day, she was convinced that if… Joe Biden took office the United States would literally turn into a communist country” (O’Sullivan 2021). This occurred because she kept clicking on videos suggested by TikTok:

It's there, she says, that she was first introduced to QAnon… She mostly followed entertainment accounts on the platform, but as the election neared she began interacting with pro-Trump and anti-Biden TikTok videos. Soon, she says, TikTok's “For You” page, an algorithmically determined feed in the app that suggests videos a user might like, was showing her video after video of conspiracy theories. (O’Sullivan 2021)

Adjusting such algorithms can help alter the underlying structure of users’ informational networks, potentially transforming the central narratives of those networks (Fuchs 2001) and thus reducing the likelihood of radicalization (Yeaton 2021).

Twitter recently introduced ‘Birdwatch,’ ‘a feature… meant to… combat misinformation and disinformation by tapping users in a fashion similar to Wikipedia to flag potentially misleading tweets’ (Collins and Zadrozny 2021b).

Because users likely migrated to other platforms after Twitter's crackdown, future studies may want to consider the multiplatform nature of QAnon and other conspiracy theories. One possibility is analyzing these multiplatform networks as multilayer networks (Boccaletti et al. 2014, Dickison, Magnani and Rossi 2016, Kivelä et al. 2014), although this poses many analytical and technical challenges (e.g., collecting data from platforms with varying access levels, including historical data). Researchers may also want to consider how other hashtags account for variation in link-sharing behavior among Twitter users. While our analysis captures some of the critical characteristics of QAnon URL-sharing, many QAnon adherents may have believed other hashtags (e.g., #savethechildren) contained more relevant or ‘insider’ information. Finally, scholars could leverage the power of exponential random graph models (ERGMs) to identify underlying patterns of interaction before and after deplatforming. In fact, they could combine such an analysis with text mining techniques to see if (and how) changes in the underlying structure of the QAnon conversation impacted the stories they told about Q and themselves.

Our analysis has only scratched the surface of the rich amount of data available. Clearly, much is left to be explored, not just about QAnon but about online conspiracies in general. We would like to think that the ground we have broken helps contribute to that effort.

Figure 1

Tweets About #QAnon: Daily Aggregated #QAnon Status Counts
Tweets About #QAnon: Daily Aggregated #QAnon Status Counts

Figure 2

Main (Weak) Components of Peak (Left) and Post (Right) Retweet Networks
Main (Weak) Components of Peak (Left) and Post (Right) Retweet Networks

Figure 3

Main (Weak) Component Collapsed by Girvan-Newman Subgroups
Main (Weak) Component Collapsed by Girvan-Newman Subgroups

Figure 4

Indegree Distribution, Peak and Post Retweets Network
Indegree Distribution, Peak and Post Retweets Network

Data Summary

Period Tweets Tweets with URL Tweets with Social Media URL Tweets with External Social Media URL
April – November 2,330,581 451,490 (19.4%) 166,392 (7.1%) 78,439 (3.4%)
Peak (July 11th – 14th) 124,670 30,966 (24.8%) 12,374 (9.9%) 5,938 (4.8%)
Post (July 21st – August 11th) 115,882 17,459 (15.1%) 7,355 (6.3%) 4,420 (3.8%)

Summary of Hypotheses and Results

Hypotheses Result Comments
H1. A handful of actors will account for most of the link-sharing of external social media sites. + New central actors emerged after the crackdown to diffuse external content.
H2. Reliable actors will be central before and after Twitter's July 2020 crackdown, even if they are different users in each period. +
H3. Both networks will exhibit relatively high levels of clustering. +
H4: Both networks will be moderately to highly centralized. +/− See H8 below.
H5: The retweet networks will be scale-free. + See H9 below.
H6: Both networks will exhibit low levels of reciprocity. +
H7: Both networks will be sparse and exhibit low levels of transitivity. + Unsurprisingly, the post network was smaller and sparser than the peak network.
H8: The network will become less centralized after Twitter's crackdown in July 2020. +
H9: The network will become less scale-free after Twitter's crackdown in July 2020. The post network was more strongly scale-free than the peak network.

Post Network Correlations Between Key Centrality Metrics and User Account Attributes

Indegree Betweenness Hubs Authorities
Retweets 0.76*** 0.63*** −0.02 0.95***
Tweets 0.21*** 0.26*** −0.00 0.25***
URLs 0.31*** 0.31*** 0.05* 0.38***
Favorites 0.73*** 0.60*** −0.02 0.99***
Friends 0.06** 0.04* −0.04 0.07**
Followers 0.15*** 0.11*** −0.05* 0.17**

Peak Period URL Statistics

Rank Platform Unique Links Tweets Users % Users
1 YouTube 1,311 4,980 3,408 24.5
2 Facebook 66 85 62 0.4
3 PeriscopeTV 62 39 31 0.2
4 Instagram 56 29 24 0.2
5 Bitchute 31 42 27 0.2
6 Pastebin 13 21 8 0.0
7 TikTok 8 8 5 0.0
8 Spotify 7 8 6 0.0
9 Telegram 6 4 4 0.0
10 Soundcloud 6 4 4 0.0

Topographical and Girvan-Newman Clustering Metrics of Peak and Post Networks

Metric Retweet Network

Peak Post
Size 3,130 1,985
Size (Largest Component) 2,566 988
Density < 0.001 < 0.001
Average Degree 1.988 1.747
Transitivity < 0.001 < .0010
Reciprocity 0.000 0.000
Degree Centralization 0.341 0.159
Betweenness Centralization 0.586 0.149
Diameter 15 14
Average Path Length 4.416 4.670

Number of Groups 217 301
Modularity 0.821 0.905
Normalized Modularity 0.824 0.908

Post Period URL Statistics

Rank Platform Unique Links Tweets Users % Users
1 YouTube 1,550 3,162 2,122 21.0
2 Instagram 362 208 139 1.4
3 PeriscopeTV 138 88 49 0.5
4 Facebook 97 117 97 1.0
5 Bitchute 39 343 324 3.2
6 TikTok 24 31 24 0.2
7 Etsy 15 30 24 0.2
8 Tumblr 13 12 8 0.1
9 Reddit 13 11 10 0.1
10 Soundcloud 12 16 14 0.1

Peak Network Correlations Between Key Centrality Metrics and User Account Attributes

Indegree Betweenness Hubs Authorities
Retweets 0.61*** 0.59*** −0.06*** 0.53***
Tweets 0.05* 0.07** −0.09*** 0.02*
URLs 0.06** 0.08** −0.04** 0.03*
Favorites 0.90*** 0.88*** −0.04* 0.90***
Friends 0.13** 0.13** −0.08*** 0.04*
Followers 0.78*** 0.76*** −0.06*** 0.76***

Banerjee, Abhijit, Arun G. Chandrasekhar, Esther Duflo and Matthew O. Jackson. 2013. “The Diffusion of Microfinance.” Science 341(July 26):363–70. doi: 10.1126/science.1236498. BanerjeeAbhijit ChandrasekharArun G. DufloEsther JacksonMatthew O. 2013 “The Diffusion of Microfinance.” Science 341 July 26 363 70 10.1126/science.1236498 DOI öffnenSearch in Google Scholar

Bank, Justin, Liam Stack and Daniel Victor. 2018. “What Is Qanon: Explaining the Internet Conspiracy Theory That Showed up at a Trump Rally.” The New York Times. Retrieved: September 10, 2021 (https://www.nytimes.com/2018/08/01/us/politics/what-is-qanon.html). BankJustin StackLiam VictorDaniel 2018 “What Is Qanon: Explaining the Internet Conspiracy Theory That Showed up at a Trump Rally.” The New York Times Retrieved: September 10, 2021 (https://www.nytimes.com/2018/08/01/us/politics/what-is-qanon.html). Search in Google Scholar

Barabási, Albert-Laszlo and Reka Albert. 1999. “Emergence of Scaling in Random Networks.” Science 286:509–12. BarabásiAlbert-Laszlo AlbertReka 1999 “Emergence of Scaling in Random Networks.” Science 286 509 12 10.1515/9781400841356.349 Search in Google Scholar

Benigni, Matthew C., Kenneth Joseph and Kathleen M. Carley. 2017. “Online Extremism and the Communities That Sustain It: Detecting the Isis Supporting Community on Twitter.” PLoS ONE 12(12):e0181405. doi: 10.1371/journal.pone.0181405. BenigniMatthew C. JosephKenneth CarleyKathleen M. 2017 “Online Extremism and the Communities That Sustain It: Detecting the Isis Supporting Community on Twitter.” PLoS ONE 12 12 e0181405 10.1371/journal.pone.0181405 DOI öffnenSearch in Google Scholar

Berman, Russell. 2020. “Trump Fails the Qanon Test.” The Atlantic. Retrieved: February 4, 2021 (https://www.theatlantic.com/politics/archive/2020/10/trump-qanon-denounce/616751/). BermanRussell 2020 “Trump Fails the Qanon Test.” The Atlantic Retrieved: February 4, 2021 (https://www.theatlantic.com/politics/archive/2020/10/trump-qanon-denounce/616751/). Search in Google Scholar

Boccaletti, S., G. Bianconi, R. Criado, C.I. del Genio, J. Gómez-Gardeñes, M. Romance, I. Sendiña-Nadal, Z. Wang and M. Zanin. 2014. “The Structure and Dynamics of Multilayer Networks.” Physics Reports 544(1):1–122. doi: 10.1016/j.physrep.2014.07.001. BoccalettiS. BianconiG. CriadoR. del GenioC.I. Gómez-GardeñesJ. RomanceM. Sendiña-NadalI. WangZ. ZaninM. 2014 “The Structure and Dynamics of Multilayer Networks.” Physics Reports 544 1 1 122 10.1016/j.physrep.2014.07.001 DOI öffnenSearch in Google Scholar

Bond, Robert M., Christopher J. Fariss, Jason J. Jones, Adam D. I. Kramer, Cameron Marlow, Jaime E. Settle and James H. Fowler. 2012. “A 61-Million-Person Experiment in Social Influence and Political Mobilization.” Nature 489(7415):295–98. doi: 10.1038/nature11421. BondRobert M. FarissChristopher J. JonesJason J. KramerAdam D. I. MarlowCameron SettleJaime E. FowlerJames H. 2012 “A 61-Million-Person Experiment in Social Influence and Political Mobilization.” Nature 489 7415 295 98 10.1038/nature11421 DOI öffnenSearch in Google Scholar

Bond, Shannon. 2021. “Unwelcome on Facebook and Twitter, Qanon Followers Flock to Fringe Sites.” NPR. Retrieved: February 4, 2021 (https://www.npr.org/2021/01/31/962104747/unwelcome-on-facebook-twitter-qanon-followers-flock-to-fringe-sites). BondShannon 2021 “Unwelcome on Facebook and Twitter, Qanon Followers Flock to Fringe Sites.” NPR Retrieved: February 4, 2021 (https://www.npr.org/2021/01/31/962104747/unwelcome-on-facebook-twitter-qanon-followers-flock-to-fringe-sites). Search in Google Scholar

Borgatti, Stephen P., Martin G. Everett and Linton C. Freeman. 2002. Ucinet for Windows: Software for Social Network Analysis. Harvard, MA: Analytical Technologies. BorgattiStephen P. EverettMartin G. FreemanLinton C. 2002 Ucinet for Windows: Software for Social Network Analysis Harvard, MA Analytical Technologies Search in Google Scholar

Borgatti, Stephen P., Martin G. Everett and Jeffrey C. Johnson. 2018. Analyzing Social Networks. Thousand Oaks, CA: SAGE Publications. BorgattiStephen P. EverettMartin G. JohnsonJeffrey C. 2018 Analyzing Social Networks Thousand Oaks, CA SAGE Publications Search in Google Scholar

Broido, Anna D. and Aaron Clauset. 2019. “Scale-Free Networks Are Rare.” Nature Communications 10(1):1017. doi: 10.1038/s41467-019-08746-5. BroidoAnna D. ClausetAaron 2019 “Scale-Free Networks Are Rare.” Nature Communications 10 1 1017 10.1038/s41467-019-08746-5 DOI öffnenSearch in Google Scholar

Centola, Damon and Michael Macy. 2007. “Complex Contagions and the Weakness of Long Ties.” American Journal of Sociology 113(3):702–34. doi: 10.1086/521848. CentolaDamon MacyMichael 2007 “Complex Contagions and the Weakness of Long Ties.” American Journal of Sociology 113 3 702 34 10.1086/521848 DOI öffnenSearch in Google Scholar

Centola, Damon. 2018. How Behavior Spreads: The Science of Complex Contagions. Princeton and Oxford: Princeton University Press. CentolaDamon 2018 How Behavior Spreads: The Science of Complex Contagions Princeton and Oxford Princeton University Press 10.23943/9781400890095 Search in Google Scholar

Christakis, Nicholas A. and James H. Fowler. 2010. “Social Network Sensors for Early Detection of Contagious Outbreaks.” PLoS ONE 5(9):e12948. doi: 10.1371/journal.pone.0012948. ChristakisNicholas A. FowlerJames H. 2010 “Social Network Sensors for Early Detection of Contagious Outbreaks.” PLoS ONE 5 9 e12948 10.1371/journal.pone.0012948 DOI öffnenSearch in Google Scholar

Clauset, Aaron, Mark E. J. Newman and Cristopher Moore. 2004. “Finding Community Structure in Very Large Networks.” Phys. Rev. E 70, 066111. ClausetAaron NewmanMark E. J. MooreCristopher 2004 “Finding Community Structure in Very Large Networks.” Phys. Rev. E 70 066111 10.1103/PhysRevE.70.066111 Search in Google Scholar

Cohen, Marshall. 2020. “Michael Flynn Posts Video Featuring Qanon Slogans.” CNN Politics. Retrieved: January 25, 2021 (https://www.cnn.com/2020/07/07/politics/michael-flynn-qanon-video/index.html). CohenMarshall 2020 “Michael Flynn Posts Video Featuring Qanon Slogans.” CNN Politics Retrieved: January 25, 2021 (https://www.cnn.com/2020/07/07/politics/michael-flynn-qanon-video/index.html). Search in Google Scholar

Collins, Ben and Brandy Zadrozny. 2020. “Facebook Bans Qanon across Its Platforms.” NBC News. Retrieved: February 4, 2021 (https://www.nbcnews.com/tech/tech-news/facebook-bans-qanon-across-its-platforms-n1242339). CollinsBen ZadroznyBrandy 2020 “Facebook Bans Qanon across Its Platforms.” NBC News Retrieved: February 4, 2021 (https://www.nbcnews.com/tech/tech-news/facebook-bans-qanon-across-its-platforms-n1242339). Search in Google Scholar

Collins, Ben and Brandy Zadrozny 2021a. “Some Qanon Followers Lose Hope after Inauguration.” NBC News. Retrieved: January 27 (https://www.nbcnews.com/tech/internet/some-qanon-followers-struggle-inauguration-day-n1255002). CollinsBen ZadroznyBrandy 2021a “Some Qanon Followers Lose Hope after Inauguration.” NBC News Retrieved: January 27 (https://www.nbcnews.com/tech/internet/some-qanon-followers-struggle-inauguration-day-n1255002). Search in Google Scholar

Collins, Ben and Brandy Zadrozny 2021b. “Twitter Launches ‘Birdwatch,’ a Forum to Combat Misinformation.” NBC News. Retrieved: February 8, 2021 (https://www.nbcnews.com/tech/social-media/twitter-launches-birdwatch-forum-combat-misinformation-n1255552). CollinsBen ZadroznyBrandy 2021b “Twitter Launches ‘Birdwatch,’ a Forum to Combat Misinformation.” NBC News Retrieved: February 8, 2021 (https://www.nbcnews.com/tech/social-media/twitter-launches-birdwatch-forum-combat-misinformation-n1255552). Search in Google Scholar

Conger, Kate. 2020. “Twitter Takedown Targets Qanon Accounts.” The New York Times. Retrieved: February 4, 2021 (https://www.nytimes.com/2020/07/21/technology/twitter-bans-qanon-accounts.html). CongerKate 2020 “Twitter Takedown Targets Qanon Accounts.” The New York Times Retrieved: February 4, 2021 (https://www.nytimes.com/2020/07/21/technology/twitter-bans-qanon-accounts.html). Search in Google Scholar

Cunningham, Daniel, Sean F. Everton and Philip J. Murphy. 2016. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Lanham, MD: Rowman and Littlefield. CunninghamDaniel EvertonSean F. MurphyPhilip J. 2016 Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis Lanham, MD Rowman and Littlefield Search in Google Scholar

Daly, Kyle and Sara Fischer. 2021. “The Online Far Right Is Moving Underground.” Axios. Retrieved: February 4, 2021 (https://www.axios.com/the-online-far-right-is-moving-underground-e429d45d-1b30-46e0-82a3-6e240bf44fef.html). DalyKyle FischerSara 2021 “The Online Far Right Is Moving Underground.” Axios Retrieved: February 4, 2021 (https://www.axios.com/the-online-far-right-is-moving-underground-e429d45d-1b30-46e0-82a3-6e240bf44fef.html). Search in Google Scholar

de Nooy, Wouter, Andrej Mrvar and Vladimir Batagelj. 2018. Exploratory Social Network Analysis with Pajek: Revised and Expanded Edition for Updated Software. Cambridge, UK: Cambridge University Press. de NooyWouter MrvarAndrej BatageljVladimir 2018 Exploratory Social Network Analysis with Pajek: Revised and Expanded Edition for Updated Software Cambridge, UK Cambridge University Press 10.1017/9781108565691 Search in Google Scholar

Dickison, Mark E., Matteo Magnani and Luca Rossi. 2016. Multilayer Social Networks. Cambridge: Cambridge University Press. DickisonMark E. MagnaniMatteo RossiLuca 2016 Multilayer Social Networks Cambridge Cambridge University Press 10.1017/CBO9781139941907 Search in Google Scholar

DiResta, Renee. 2018. “Computational Propaganda: If You Make It Trend, You Make It True.” The Yale Review 106(4):12–29. doi: https://doi.org/10.1111/yrev.13402. DiRestaRenee 2018 “Computational Propaganda: If You Make It Trend, You Make It True.” The Yale Review 106 4 12 29 doi: https://doi.org/10.1111/yrev.13402 10.1111/yrev.13402 Search in Google Scholar

Douglas, Karen M., Joseph E. Uscinski, Robbie M. Sutton, Aleksandra Cichocka, Turkay Nefes, Chee Siang Ang and Farzin Deravi. 2019. “Understanding Conspiracy Theories.” Political Psychology 40(S1):3–35. doi: https://doi.org/10.1111/pops.12568. DouglasKaren M. UscinskiJoseph E. SuttonRobbie M. CichockaAleksandra NefesTurkay AngChee Siang DeraviFarzin 2019 “Understanding Conspiracy Theories.” Political Psychology 40 S1 3 35 doi: https://doi.org/10.1111/pops.12568 10.1111/pops.12568 Search in Google Scholar

Everton, Sean F. 2016. “Social Networks and Religious Violence.” Review of Religious Research 58(2):191–217. doi: 10.1007/s13644-015-0240-3. EvertonSean F. 2016 “Social Networks and Religious Violence.” Review of Religious Research 58 2 191 217 10.1007/s13644-015-0240-3 DOI öffnenSearch in Google Scholar

Federal Bureau of Investigation. 2019. “Anti-Government, Identity Based, and Fringe Political Conspiracy Theories Very Likely Motivate Some Domestic Extremists to Commit Criminal, Sometimes Violent Activity.” Federal Bureau of Investigation Intelligence Bulletin. Federal Bureau of Investigation 2019 “Anti-Government, Identity Based, and Fringe Political Conspiracy Theories Very Likely Motivate Some Domestic Extremists to Commit Criminal, Sometimes Violent Activity.” Federal Bureau of Investigation Intelligence Bulletin Search in Google Scholar

Festinger, Leon, Henry W. Rieken and Stanley Schachter. 1956. When Prophesy Fails. Minneapolis: University of Minnesota Press. FestingerLeon RiekenHenry W. SchachterStanley 1956 When Prophesy Fails Minneapolis University of Minnesota Press 10.1037/10030-000 Search in Google Scholar

Foot, Colin J. 2018. “Digital Repression and Conflict Violence.” Master of Science, Defense Analysis, Naval Postgraduate School, Monterey, CA. Retrieved from Calhoun. FootColin J. 2018 “Digital Repression and Conflict Violence.” Master of Science, Defense Analysis, Naval Postgraduate School Monterey, CA Retrieved from Calhoun. Search in Google Scholar

Fu, Jiawei Sophia and Michelle Shumate. 2017. “News Media, Social Media, and Hyperlink Networks: An Examination of Integrated Media Effects.” The Information Society 33(2):53–63. doi: 10.1080/01972243.2016.1271379. FuJiawei Sophia ShumateMichelle 2017 “News Media, Social Media, and Hyperlink Networks: An Examination of Integrated Media Effects.” The Information Society 33 2 53 63 10.1080/01972243.2016.1271379 DOI öffnenSearch in Google Scholar

Fuchs, Stephan. 2001. Against Essentialism: A Theory of Culture and Society. Cambridge, MA: Harvard University Press. FuchsStephan 2001 Against Essentialism: A Theory of Culture and Society Cambridge, MA Harvard University Press 10.4159/9780674037410 Search in Google Scholar

Giachanou, Anastasia and Fabio Crestani. 2016. “Like It or Not: A Survey of Twitter Sentiment Analysis Methods.” ACM Comput. Surv. 49(2):Article 28. doi: 10.1145/2938640. GiachanouAnastasia CrestaniFabio 2016 “Like It or Not: A Survey of Twitter Sentiment Analysis Methods.” ACM Comput. Surv. 49 2 Article 28. 10.1145/2938640 DOI öffnenSearch in Google Scholar

Girvan, Michelle and Mark E. J. Newman. 2002. “Community Structure in Social and Biological Networks.” Proceedings of the National Academy of Sciences USA 99(12):7821–26. GirvanMichelle NewmanMark E. J. 2002 “Community Structure in Social and Biological Networks.” Proceedings of the National Academy of Sciences USA 99 12 7821 26 10.1073/pnas.122653799 Search in Google Scholar

Granovetter, Mark. 1973. “The Strength of Weak Ties.” American Journal of Sociology 73(6):1360–80. GranovetterMark 1973 “The Strength of Weak Ties.” American Journal of Sociology 73 6 1360 80 10.1086/225469 Search in Google Scholar

Hartman, Margaret. 2017. “Trump Won’t Say Why He Called Military Dinner ‘Calm before the Storm’.” New York Magazine: intelligencer. Retrieved: February 9, 2021 (https://nymag.com/intelligencer/2017/10/trump-calls-military-dinner-calm-before-the-storm.html). HartmanMargaret 2017 “Trump Won’t Say Why He Called Military Dinner ‘Calm before the Storm’.” New York Magazine: intelligencer Retrieved: February 9, 2021 (https://nymag.com/intelligencer/2017/10/trump-calls-military-dinner-calm-before-the-storm.html). Search in Google Scholar

Harwell, Drew. 2021. “Qanon Believers Grapple with Doubt, Spin New Theories as Trump Era Ends.” The Washington Post. Retrieved: January 20, 2021 (https://www.washingtonpost.com/technology/2021/01/20/qanon-trump-era-ends/). HarwellDrew 2021 “Qanon Believers Grapple with Doubt, Spin New Theories as Trump Era Ends.” The Washington Post Retrieved: January 20, 2021 (https://www.washingtonpost.com/technology/2021/01/20/qanon-trump-era-ends/). Search in Google Scholar

Hassanpour, Navid. 2017. Leading from the Periphery and Network Collective Action. Cambridge: Cambridge University Press. HassanpourNavid 2017 Leading from the Periphery and Network Collective Action Cambridge Cambridge University Press 10.1017/9781316493403 Search in Google Scholar

Heilweil, Rebecca. 2020. “Facebook Bans Qanon (Again)`.” Vox. Retrieved: January 19, 2022 (https://www.vox.com/recode/2020/10/6/21504890/facebook-qanon-ban-conspiracy-theory-movement). HeilweilRebecca 2020 “Facebook Bans Qanon (Again)`.” Vox Retrieved: January 19, 2022 (https://www.vox.com/recode/2020/10/6/21504890/facebook-qanon-ban-conspiracy-theory-movement). Search in Google Scholar

Jasser, Greta. 2020. “The Social Media Platform That Welcomes Qanon with Open Arms.” openDemocracy. Retrieved: February 4, 2021. JasserGreta 2020 “The Social Media Platform That Welcomes Qanon with Open Arms.” openDemocracy Retrieved: February 4, 2021. Search in Google Scholar

Kane, Gerald C., Maryam Alavi, Giuseppe Labianca and Stephen P. Borgatti. 2014. “What's Different About Social Media Networks? A Framework and Research Agenda.” MIS Quarterly 38(1):275–304. KaneGerald C. AlaviMaryam LabiancaGiuseppe BorgattiStephen P. 2014 “What's Different About Social Media Networks? A Framework and Research Agenda.” MIS Quarterly 38 1 275 304 10.25300/MISQ/2014/38.1.13 Search in Google Scholar

Kearney, Michael W. 2019. “Rtweet: Collecting and Analyzing Twitter Data.” Journal for Open Source Software 4(42):1829. (https://joss.theoj.org/papers/10.21105/joss.01829). KearneyMichael W. 2019 “Rtweet: Collecting and Analyzing Twitter Data.” Journal for Open Source Software 4 42 1829 (https://joss.theoj.org/papers/10.21105/joss.01829). 10.21105/joss.01829 Search in Google Scholar

Kivelä, Mikko, Alex Arenas, Marc Barthelemy, James P. Gleeson, Yamir Moreno and Mason A. Porter. 2014. “Multilayer Networks.” Journal of Complex Networks 2(3):203–71. doi: 10.1093/comnet/cnu016. KiveläMikko ArenasAlex BarthelemyMarc GleesonJames P. MorenoYamir PorterMason A. 2014 “Multilayer Networks.” Journal of Complex Networks 2 3 203 71 10.1093/comnet/cnu016 DOI öffnenSearch in Google Scholar

Klarreich, Erica. 2018. “Scant Evidence of Power Laws Found in Real-World Networks.” Quanta Magazine. Retrieved: March 15, 2018 (https://www.quantamagazine.org/scant-evidence-of-power-laws-found-in-real-world-networks-20180215/). KlarreichErica 2018 “Scant Evidence of Power Laws Found in Real-World Networks.” Quanta Magazine Retrieved: March 15, 2018 (https://www.quantamagazine.org/scant-evidence-of-power-laws-found-in-real-world-networks-20180215/). Search in Google Scholar

Kleinberg, Jon. 1999. “Authoritative Sources in a Hyperlinked Environment.” Journal of the ACM 46(5):604–32. KleinbergJon 1999 “Authoritative Sources in a Hyperlinked Environment.” Journal of the ACM 46 5 604 32 10.1515/9781400841356.514 Search in Google Scholar

Kramer, Adam D. I., Jamie E. Guillory and Jeffrey T. Hancock. 2014. “Experimental Evidence of Massive-Scale Emotional Contagion through Social Networks.” Proceedings of the National Academy of Sciences 111(24):8788–90. doi: 10.1073/pnas.1320040111. KramerAdam D. I. GuilloryJamie E. HancockJeffrey T. 2014 “Experimental Evidence of Massive-Scale Emotional Contagion through Social Networks.” Proceedings of the National Academy of Sciences 111 24 8788 90 10.1073/pnas.1320040111 DOI öffnenSearch in Google Scholar

LaFrance, Adrienne. 2020. “The Prophecies of Q: American Conspiracy Theories Are Entering a Dangerous New Phase.” The Atlantic. Retrieved: January 25, 2021 (https://www.theatlantic.com/magazine/archive/2020/06/qanon-nothing-can-stop-what-is-coming/610567/). LaFranceAdrienne 2020 “The Prophecies of Q: American Conspiracy Theories Are Entering a Dangerous New Phase.” The Atlantic Retrieved: January 25, 2021 (https://www.theatlantic.com/magazine/archive/2020/06/qanon-nothing-can-stop-what-is-coming/610567/). Search in Google Scholar

Lanier, Jaron. 2018. Ten Arguments for Deleting Your Social Media Accounts Right Now. New York: Henry Holt and Company. LanierJaron 2018 Ten Arguments for Deleting Your Social Media Accounts Right Now New York Henry Holt and Company Search in Google Scholar

Lorentzen, David Gunnarsson and Jan Nolin. 2015. “Approaching Completeness: Capturing a Hashtagged Twitter Conversation and Its Follow-on Conversation.” Social Science Computer Review 35(2):277–86. doi: 10.1177/0894439315607018. LorentzenDavid Gunnarsson NolinJan 2015 “Approaching Completeness: Capturing a Hashtagged Twitter Conversation and Its Follow-on Conversation.” Social Science Computer Review 35 2 277 86 10.1177/0894439315607018 DOI öffnenSearch in Google Scholar

Marantz, Andrew. 2017. “How a Liberal Scholar of Conspiracy Theories Became the Subject of a Right-Wing Conspiracy Theory.” The New Yorker. Retrieved: February 8, 2021 (https://www.newyorker.com/culture/persons-of-interest/how-a-liberal-scholar-of-conspiracy-theories-became-the-subject-of-a-right-wing-conspiracy-theory). MarantzAndrew 2017 “How a Liberal Scholar of Conspiracy Theories Became the Subject of a Right-Wing Conspiracy Theory.” The New Yorker Retrieved: February 8, 2021 (https://www.newyorker.com/culture/persons-of-interest/how-a-liberal-scholar-of-conspiracy-theories-became-the-subject-of-a-right-wing-conspiracy-theory). Search in Google Scholar

Martineau, Paris. 2017. “The Storm Is the New Pizzagate — Only Worse.” New York Magazine: intelligencer. Retrieved: February 9, 2021 (https://nymag.com/intelligencer/2017/12/qanon-4chan-the-storm-conspiracy-explained.html). MartineauParis 2017 “The Storm Is the New Pizzagate — Only Worse.” New York Magazine: intelligencer Retrieved: February 9, 2021 (https://nymag.com/intelligencer/2017/12/qanon-4chan-the-storm-conspiracy-explained.html). Search in Google Scholar

Menn, Joseph. 2020. “Qanon Received Earlier Boost from Russian Accounts on Twitter, Archives Show.” Reuters. Retrieved: February 9, 2021 (https://www.reuters.com/article/us-usa-election-qanon-cyber-idUSKBN27I18I). MennJoseph 2020 “Qanon Received Earlier Boost from Russian Accounts on Twitter, Archives Show.” Reuters Retrieved: February 9, 2021 (https://www.reuters.com/article/us-usa-election-qanon-cyber-idUSKBN27I18I). Search in Google Scholar

Newman, Mark E. J. 2006. “Modularity and Community Structure in Networks.” Proceedings of the National Academy of Sciences 103(23):8577–82. NewmanMark E. J. 2006 “Modularity and Community Structure in Networks.” Proceedings of the National Academy of Sciences 103 23 8577 82 10.1073/pnas.0601602103 Search in Google Scholar

Nguyen, Tina. 2020. “Trump Isn't Secretly Winking at Qanon. He's Retweeting Its Followers.” Politico. Retrieved: February 2, 2021 (https://www.politico.com/news/2020/07/12/trump-tweeting-qanon-followers-357238). NguyenTina 2020 “Trump Isn't Secretly Winking at Qanon. He's Retweeting Its Followers.” Politico Retrieved: February 2, 2021 (https://www.politico.com/news/2020/07/12/trump-tweeting-qanon-followers-357238). Search in Google Scholar

O’Sullivan, Donie. 2021. “She Was Stunned by Biden's Inauguration. How This South Carolina Mom Escaped Qanon.” CNN Business. Retrieved: February 3, 2021 (https://www.cnn.com/2021/02/03/tech/qanon-mom-former-believer/index.html). O’SullivanDonie 2021 “She Was Stunned by Biden's Inauguration. How This South Carolina Mom Escaped Qanon.” CNN Business Retrieved: February 3, 2021 (https://www.cnn.com/2021/02/03/tech/qanon-mom-former-believer/index.html). Search in Google Scholar

Oliver, Kathryn, Nick Crossley, Gemma Edwards, Johan Koskinen and Martin G. Everett. 2014. “Covert Networks: Structures, Processes, and Types.” Mitchell Centre Working Paper. (https://hummedia.manchester.ac.uk/schools/soss/research/mitchell/covertnetworks/wp/working_paper1.pdf). OliverKathryn CrossleyNick EdwardsGemma KoskinenJohan EverettMartin G. 2014 “Covert Networks: Structures, Processes, and Types.” Mitchell Centre Working Paper (https://hummedia.manchester.ac.uk/schools/soss/research/mitchell/covertnetworks/wp/working_paper1.pdf). Search in Google Scholar

OrphAnalytics. 2020. “Style Analysis by Machine Learning Reveals That Two Authors Likely Shared the Writing of Qanon's Messages at Two Different Periods in Time.” OrphAnalytics. Retrieved: February 1, 2021 (https://www.orphanalytics.com/en/news/whitepaper202012#style-analysis-by-machine-learning-reveals-that-two-authors-like). OrphAnalytics 2020 “Style Analysis by Machine Learning Reveals That Two Authors Likely Shared the Writing of Qanon's Messages at Two Different Periods in Time.” OrphAnalytics Retrieved: February 1, 2021 (https://www.orphanalytics.com/en/news/whitepaper202012#style-analysis-by-machine-learning-reveals-that-two-authors-like). Search in Google Scholar

Rahn, Will and Dan Patterson. 2021. “What Is the Qanon Conspiracy Theory?” CBS News. Retrieved: February 4, 2021 (https://www.npr.org/2021/01/31/962104747/unwelcome-on-facebook-twitter-qanon-followers-flock-to-fringe-sites). RahnWill PattersonDan 2021 “What Is the Qanon Conspiracy Theory?” CBS News Retrieved: February 4, 2021 (https://www.npr.org/2021/01/31/962104747/unwelcome-on-facebook-twitter-qanon-followers-flock-to-fringe-sites). Search in Google Scholar

Reichardt, Jörg and Stefan Bornholdt. 2006. “Statistical Mechanics of Community Detection.” Phys. Rev. E 74(016110). doi: 10.1103/PhysRevE.74.016110. ReichardtJörg BornholdtStefan 2006 “Statistical Mechanics of Community Detection.” Phys. Rev. E 74 016110 10.1103/PhysRevE.74.016110 DOI öffnenSearch in Google Scholar

Rogers, Everert M. 2003. Diffusion of Innovations. New York: The Free Press. RogersEverert M. 2003 Diffusion of Innovations New York The Free Press Search in Google Scholar

Romero, Daniel M., Brendan Meeder and Jon Kleinberg. 2011. “Differences in the Mechanics of Information Diffusion across Topics: Idioms, Political Hashtags, and Complex Contagion on Twitter.” Paper presented at the Proceedings of the 20th international conference on World wide web, Hyderabad, India (https://doi.org/10.1145/1963405.1963503). RomeroDaniel M. MeederBrendan KleinbergJon 2011 “Differences in the Mechanics of Information Diffusion across Topics: Idioms, Political Hashtags, and Complex Contagion on Twitter.” Paper presented at the Proceedings of the 20th international conference on World wide web Hyderabad, India (https://doi.org/10.1145/1963405.1963503). Search in Google Scholar

Rosenberg, Michael. 2021. “Flynn Is Back, Selling Anger and T-Shirts.” Pp. 1, 21 in The New York Times. New York. RosenbergMichael 2021 “Flynn Is Back, Selling Anger and T-Shirts.” 1 21 in The New York Times New York Search in Google Scholar

Rosenblum, Nancy L. and Russell Muirhead. 2019. A Lot of People Are Saying: The New Conspiracism and the Assault on Democracy. Princeton, NJ: Princeton University Press. RosenblumNancy L. MuirheadRussell 2019 A Lot of People Are Saying: The New Conspiracism and the Assault on Democracy Princeton, NJ Princeton University Press 10.1515/9780691190068 Search in Google Scholar

Rothschild, Mike. 2019. “This Massive Youtube Channel Is Normalizing Qanon.” Daily Dot. Retrieved: September 10, 2021 (https://www.dailydot.com/debug/edge-wonder-qanon-youtube/). RothschildMike 2019 “This Massive Youtube Channel Is Normalizing Qanon.” Daily Dot Retrieved: September 10, 2021 (https://www.dailydot.com/debug/edge-wonder-qanon-youtube/). Search in Google Scholar

Rozsa, Matthew. 2019. “Qanon Is the Conspiracy Theory That Won't Die: Here's What They Believe, and Why They're Wrong.” Salon. Retrieved: February 9, 2021 (https://www.salon.com/2019/08/18/qanon-is-the-conspiracy-theory-that-wont-die-heres-what-they-believe-and-why-theyre-wrong/). RozsaMatthew 2019 “Qanon Is the Conspiracy Theory That Won't Die: Here's What They Believe, and Why They're Wrong.” Salon Retrieved: February 9, 2021 (https://www.salon.com/2019/08/18/qanon-is-the-conspiracy-theory-that-wont-die-heres-what-they-believe-and-why-theyre-wrong/). Search in Google Scholar

Sardarizadeh, Shayan and Olga Robinson. 2021. “Biden Inauguration Leaves Qanon Believers in Disarray.” BBC News. Retrieved: January 21 (https://www.bbc.com/news/blogs-trending-55746304). SardarizadehShayan RobinsonOlga 2021 “Biden Inauguration Leaves Qanon Believers in Disarray.” BBC News Retrieved: January 21 (https://www.bbc.com/news/blogs-trending-55746304). Search in Google Scholar

Savov, Vlad. 2021. “Twitter Bans over 70,000 Qanon Accounts in Conspiracy Crackdown.” Bloomberg: Technology. Retrieved: February 4, 2021 (https://www.bloomberg.com/news/articles/2021-01-12/twitter-bans-over-70-000-qanon-accounts-in-conspiracy-crackdown). SavovVlad 2021 “Twitter Bans over 70,000 Qanon Accounts in Conspiracy Crackdown.” Bloomberg: Technology Retrieved: February 4, 2021 (https://www.bloomberg.com/news/articles/2021-01-12/twitter-bans-over-70-000-qanon-accounts-in-conspiracy-crackdown). Search in Google Scholar

Singer, Peter. 2021. “Three Steps to Fight Online Disinformation and Extremism.” Defense One. Retrieved: February 8, 2021 (https://www.defenseone.com/ideas/2021/01/three-steps-fight-online-disinformation-and-extremism/171563/). SingerPeter 2021 “Three Steps to Fight Online Disinformation and Extremism.” Defense One Retrieved: February 8, 2021 (https://www.defenseone.com/ideas/2021/01/three-steps-fight-online-disinformation-and-extremism/171563/). Search in Google Scholar

Singh, Lisa, Leticia Bode, Ceren Budak, Kornraphop Kawintiranon, Colton Padden and Emily Vraga. 2020. “Understanding High- and Low-Quality Url Sharing on Covid-19 Twitter Streams.” Journal of Computational Social Science 3(2):343–66. doi: 10.1007/s42001-020-00093-6. SinghLisa BodeLeticia BudakCeren KawintiranonKornraphop PaddenColton VragaEmily 2020 “Understanding High- and Low-Quality Url Sharing on Covid-19 Twitter Streams.” Journal of Computational Social Science 3 2 343 66 10.1007/s42001-020-00093-6 DOI öffnenSearch in Google Scholar

Steinert-Threlkeld, Zachary C. 2017. “Spontaneous Collective Action: Peripheral Mobilization During the Arab Spring.” American Political Science Review 111(2):379–403. doi: 10.1017/S0003055416000769. Steinert-ThrelkeldZachary C. 2017 “Spontaneous Collective Action: Peripheral Mobilization During the Arab Spring.” American Political Science Review 111 2 379 403 10.1017/S0003055416000769 DOI öffnenSearch in Google Scholar

Sunstein, Cass R. 2002. “The Law of Group Polarization.” The Journal of Political Philosophy 10:175–95. SunsteinCass R. 2002 “The Law of Group Polarization.” The Journal of Political Philosophy 10 175 95 10.1111/1467-9760.00148 Search in Google Scholar

Sunstein, Cass R. 2009. Going to Extremes: How Like Minds Unite and Divide. New York and Oxford: Oxford University Press. SunsteinCass R. 2009 Going to Extremes: How Like Minds Unite and Divide New York and Oxford Oxford University Press Search in Google Scholar

Sunstein, Cass R. and Adrian Vermeule. 2009. “Conspiracy Theories: Causes and Cures*.” Journal of Political Philosophy 17(2):202–27. doi: 10.1111/j.1467-9760.2008.00325.x. SunsteinCass R. VermeuleAdrian 2009 “Conspiracy Theories: Causes and Cures*.” Journal of Political Philosophy 17 2 202 27 10.1111/j.1467-9760.2008.00325.x DOI öffnenSearch in Google Scholar

Tangherlini, Timothy R., Shadi Shahsavari, Behman Shahbazi, Ehsan Ebrahimzadeh and Vwani Roychowdhury. 2020. “An Automated Pipeline for the Discovery of Conspiracy and Conspiracy Theory Narrative Frameworks: Bridgegate, Pizzagate and Storytelling on the Web.” PLoS ONE 15(6):e0233879. doi: 10.1371/journal.pone.0233879. TangherliniTimothy R. ShahsavariShadi ShahbaziBehman EbrahimzadehEhsan RoychowdhuryVwani 2020 “An Automated Pipeline for the Discovery of Conspiracy and Conspiracy Theory Narrative Frameworks: Bridgegate, Pizzagate and Storytelling on the Web.” PLoS ONE 15 6 e0233879 10.1371/journal.pone.0233879 DOI öffnenSearch in Google Scholar

Twitter. 2021. “About Different Types of Tweets.” Twitter Help Center. Retrieved: February 5, 2021 (https://help.twitter.com/en/using-twitter/types-of-tweets). Twitter 2021 “About Different Types of Tweets.” Twitter Help Center Retrieved: February 5, 2021 (https://help.twitter.com/en/using-twitter/types-of-tweets). Search in Google Scholar

Uscinski, Joseph. 2020. Conspiracy Theories: A Primer. Lanham, MD: Rowman & Littlefield Publishers. UscinskiJoseph 2020 Conspiracy Theories: A Primer Lanham, MD Rowman & Littlefield Publishers Search in Google Scholar

Valente, Thomas W. 1995. Network Models of the Diffusion of Innovations. Cresskill, NJ: Hampton Press. ValenteThomas W. 1995 Network Models of the Diffusion of Innovations Cresskill, NJ Hampton Press Search in Google Scholar

Valente, Thomas W. and George G. Vega Yon. 2020. “Diffusion/Contagion Processes on Social Networks.” Health Education & Behavior 47(2):235–48. doi: 10.1177/1090198120901497. ValenteThomas W. Vega YonGeorge G. 2020 “Diffusion/Contagion Processes on Social Networks.” Health Education & Behavior 47 2 235 48 10.1177/1090198120901497 DOI öffnenSearch in Google Scholar

Wikipedia. 2021a. “Imageboard.” Retrieved: February 4, 2021 (https://en.wikipedia.org/wiki/Imageboard#Tripcodes). Wikipedia 2021a “Imageboard.” Retrieved: February 4, 2021 (https://en.wikipedia.org/wiki/Imageboard#Tripcodes). Search in Google Scholar

Wikipedia 2021b. “Pizzagate Conspiracy Theory.” Retrieved: February 4, 2021 (https://en.wikipedia.org/wiki/Imageboard#Tripcodes). Wikipedia 2021b “Pizzagate Conspiracy Theory.” Retrieved: February 4, 2021 (https://en.wikipedia.org/wiki/Imageboard#Tripcodes). Search in Google Scholar

Yeaton, Matthew R. 2021. “Rewiring Social Networks Changes Culture through Language: Evidence from Alt-Right Echo Chambers.” Paper presented at the 3rd North American Social Networks Conference, January 28th, Washington D.C. YeatonMatthew R. 2021 “Rewiring Social Networks Changes Culture through Language: Evidence from Alt-Right Echo Chambers.” Paper presented at the 3rd North American Social Networks Conference January 28th Washington D.C. Search in Google Scholar

Yurieff, Kaya. 2020. “Conservatives Flocked to Parler after the Election. But Its Explosive Growth Is Over.” CNN Business. Retrieved: February 2, 2021 (https://www.cnn.com/2020/12/10/tech/parler-downloads/index.html). YurieffKaya 2020 “Conservatives Flocked to Parler after the Election. But Its Explosive Growth Is Over.” CNN Business Retrieved: February 2, 2021 (https://www.cnn.com/2020/12/10/tech/parler-downloads/index.html). Search in Google Scholar

Zadrozny, Brandy and Ben Collins. 2018. “How Three Conspiracy Theorists Took ‘Q’ and Sparked Qanon.” NBC News. Retrieved: January 25, 2021 (https://www.nbcnews.com/tech/tech-news/how-three-conspiracy-theorists-took-q-sparked-qanon-n900531). ZadroznyBrandy CollinsBen 2018 “How Three Conspiracy Theorists Took ‘Q’ and Sparked Qanon.” NBC News Retrieved: January 25, 2021 (https://www.nbcnews.com/tech/tech-news/how-three-conspiracy-theorists-took-q-sparked-qanon-n900531). Search in Google Scholar

Empfohlene Artikel von Trend MD