pith. sign in

arxiv: 2605.20050 · v1 · pith:H3UXMDRQnew · submitted 2026-05-19 · 💻 cs.CL

Language Mutations Sustain the Persistences of Conspiracy Theories on Social Media

Pith reviewed 2026-05-20 05:42 UTC · model grok-4.3

classification 💻 cs.CL
keywords conspiracy theoriessocial medialanguage mutationssemantic changesurvival analysispsycholinguistic featurescontent moderationpersistence
0
0 comments X p. Extension
pith:H3UXMDRQ Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{H3UXMDRQ}

Prints a linked pith:H3UXMDRQ badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

The pith

Conspiracy claims with greater semantic mutations have substantially longer lifespans on social media.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

This paper examines how language changes influence the staying power of conspiracy theories on platforms such as X. Drawing on a three-year collection of related posts and combining linguistic analysis with survival models, the authors establish that posts showing more semantic mutations tend to remain active for longer periods. Mutations affecting pronouns, social reference words, cognitive process terms, and risk- or health-related vocabulary are tied to these extended durations, as are shifts in descriptions of actors, actions, and targets. Qualitative review points to simplification and assimilation as the main ways these mutations occur. The work implies that efforts to moderate content should address the stable core of a claim rather than every possible rewording.

Core claim

Conspiracy claims with greater semantic mutations have substantially longer lifespans. Mutations in psycholinguistic properties, including pronouns, social reference words, cognitive process terms, risk- and health-related vocabularies, are associated with extended lifespans. Mutations in actor, action and target categories are associated with longer lifespans as well. Qualitative analysis identifies two predominant mutation patterns: simplification and assimilation, at both linguistic and AAT structural levels.

What carries the argument

Semantic mutations in conspiracy posts, measured by shifts in psycholinguistic categories and actor-action-target structures, tracked through computational linguistic analysis and survival modelling on a three-year X dataset.

If this is right

  • Conspiracy claims that change in pronouns, social references, and cognitive terms persist longer than stable versions.
  • Mutations in how actors, actions, and targets are framed also extend the active period of a claim.
  • Content moderation should target core claims to limit the persistence of their variations.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The same mutation-driven persistence may apply to other categories of online claims such as health misinformation.
  • Detection systems could monitor ongoing linguistic adaptation as a signal for early intervention.
  • Experiments that limit visible mutations, for instance through targeted replies, could test whether lifespan shortens.

Load-bearing premise

The three-year X dataset and survival modelling accurately capture post lifespans and semantic mutations without major biases from platform algorithms, user engagement patterns, or incomplete sampling of conspiracy discussions.

What would settle it

A controlled collection of conspiracy posts where higher rates of semantic mutation show no increase in measured lifespan compared with lower-mutation versions.

Figures

Figures reproduced from arXiv: 2605.20050 by Calvin Yixiang Cheng, Dorian Quelle, Scott A. Hale.

Figure 1
Figure 1. Figure 1: The workflow of data collection. 4.2. Conspiracy Claim Matching We examine the persistence at the claim level of conspir￾acy theories. A claim refer to discrete statements or asser￾tions that convey one conspiratorial idea. Different posts may refer to the same underlying conspiracy claim. Following prior research on fact-checking, we conceptualize this as a claim-matching task, in which semantically simil… view at source ↗
Figure 2
Figure 2. Figure 2: Plot a shows average cosine similarity of indirectly connected conspiracy posts over a hundred days. Time measures the number of days between the dates of two clustered posts not directly connected. Shading shows the standard error. Panel b, c show the relationship between claim lifespan and their average cosine similarity and standard deviation given the preset threshold of 0.88. The standard deviation (S… view at source ↗
Figure 3
Figure 3. Figure 3: The time ratios (TR) of semantic drift in Weibull Accelerated Failure Time (AFT) model. The x-axis represents the TR with 95% confidence intervals, y-axis corresponds to covariates in the Weibull AFT model. Asterisk represents the significance of variables (* 𝑝 < 0.05, ** 𝑝 < 0.01, *** 𝑝 < 0.001). The horizontal reference line indicates no effect. 𝑇 𝑅 > 1 represents longer survival times (decelerated failu… view at source ↗
Figure 4
Figure 4. Figure 4: Kaplan-Meier survival curves for psycholinguistic properties. The x-axis is days, and the y-axis represents the probability a claim is still transmitting after 𝑡 days. The vertical dash lines indicate the 20% survival time for both groups. The log-rank tests shows the statistic difference between two curves in each plot [PITH_FULL_IMAGE:figures/full_fig_p021_4.png] view at source ↗
Figure 5
Figure 5. Figure 5: The time ratios (TR) of psycholinguistic properties in Weibull Accelerated Failure Time (AFT) model. Plot a shows the binary changes, and Plot b illustrates the standard deviation of percentage change in conspiracy claims. The x-axis represents the TR with 95% confidence intervals, y￾axis corresponds to covariates in the Weibull AFT model. Asterisk represents the significance of variables (* 𝑝 < 0.05, ** 𝑝… view at source ↗
Figure 6
Figure 6. Figure 6 [PITH_FULL_IMAGE:figures/full_fig_p021_6.png] view at source ↗
Figure 7
Figure 7. Figure 7: Qualitative analysis of significant psycholinguistic elements change within conspiracy relevant claims. Cheng, Quelle, and Hale: Preprint submitted to Elsevier Page 22 of 19 [PITH_FULL_IMAGE:figures/full_fig_p022_7.png] view at source ↗
Figure 8
Figure 8. Figure 8: Qualitative analysis of significant actor-action-target elements change within conspiracy relevant claims. Cheng, Quelle, and Hale: Preprint submitted to Elsevier Page 23 of 19 [PITH_FULL_IMAGE:figures/full_fig_p023_8.png] view at source ↗
Figure 9
Figure 9. Figure 9: Inter- and Intra Cluster Distances. Highlighted bars show the minimized intra-cluster distance and the approxi￾mately maximized inter-cluster distance. Cheng, Quelle, and Hale: Preprint submitted to Elsevier Page 24 of 19 [PITH_FULL_IMAGE:figures/full_fig_p024_9.png] view at source ↗
Figure 10
Figure 10. Figure 10: Kaplan-Meier survival curves for psycholinguistic properties with 0.25 threshold. The x-axis is days, and the y-axis represents the probability a claim is still transmitting after 𝑡 days. The vertical dash lines indicate the 20% survival time for both groups. The log-rank tests shows the statistic difference between two curves in each plot [PITH_FULL_IMAGE:figures/full_fig_p025_10.png] view at source ↗
Figure 11
Figure 11. Figure 11: Kaplan-Meier survival curves for psycholinguistic properties with 0.75 threshold. The x-axis is days, and the y-axis represents the probability a claim is still transmitting after 𝑡 days. The vertical dash lines indicate the 20% survival time for both groups. The log-rank tests shows the statistic difference between two curves in each plot. Cheng, Quelle, and Hale: Preprint submitted to Elsevier Page 25 o… view at source ↗
Figure 12
Figure 12. Figure 12: The time ratios (TR) of psycholinguistic properties in Weibull Accelerated Failure Time (AFT) model with 0.25 threshold. Plot a shows the binary changes, and Plot b illustrates the standard deviation of percentage change in conspiracy claims. The x-axis represents the TR with 95% confidence intervals, y-axis corresponds to covariates in the Weibull AFT model. Asterisk represents the significance of variab… view at source ↗
Figure 14
Figure 14. Figure 14: The inter-cluster variance and the Silhouette score against the number of clusters for actors, actions and targets [PITH_FULL_IMAGE:figures/full_fig_p026_14.png] view at source ↗
Figure 13
Figure 13. Figure 13: The time ratios (TR) of psycholinguistic properties in Weibull Accelerated Failure Time (AFT) model with 0.75 threshold. Plot a shows the binary changes, and Plot b illustrates the standard deviation of percentage change in conspiracy claims. The x-axis represents the TR with 95% confidence intervals, y-axis corresponds to covariates in the Weibull AFT model. Asterisk represents the significance of variab… view at source ↗
Figure 16
Figure 16. Figure 16: The relationship between conspiracy claims’ lifespan and their average cosine similarity, standard deviation, and entropy given different cosine similarity thresholds. Cheng, Quelle, and Hale: Preprint submitted to Elsevier Page 27 of 19 [PITH_FULL_IMAGE:figures/full_fig_p027_16.png] view at source ↗
Figure 17
Figure 17. Figure 17: Average cosine similarity of indirectly connected conspiracy posts over time in the first year. Time measures the number of days between the dates of two clustered posts not directly connected. Shading shows the standard error [PITH_FULL_IMAGE:figures/full_fig_p028_17.png] view at source ↗
Figure 19
Figure 19. Figure 19: The time ratios (TR) of semantic drift in Weibull Accelerated Failure Time (AFT) model. The x-axis represents the TR with 95% confidence intervals, y-axis corresponds to covariates in the Weibull AFT model. Asterisk represents the significance of variables (* 𝑝 < 0.05, ** 𝑝 < 0.01, *** 𝑝 < 0.001). The horizontal reference line indicates no effect. 𝑇 𝑅 > 1 represents longer survival times (decelerated fail… view at source ↗
Figure 18
Figure 18. Figure 18: Number of pairs by time. The y axis represent the number of pairs at certain time point within the cluster at a certain threshold [PITH_FULL_IMAGE:figures/full_fig_p028_18.png] view at source ↗
read the original abstract

This study investigates how language mutations affect the persistent diffusion of conspiracy theories on social media. Drawing on a three-year dataset of conspiracy-related posts from X, and applying computational linguistic analysis alongside survival modelling, we find that conspiracy claims with greater semantic mutations have substantially longer lifespans. Mutations in psycholinguistic properties, including pronouns, social reference words, cognitive process terms, risk- and health- related vocabularies, are associated with extended lifespans. Mutations in actor, action and target (AAT) categories are associated with longer lifespans as well. Qualitative analysis identifies two predominant mutation patterns: simplification and assimilation, at both linguistic and AAT structural levels. Taken together, the results advance our understanding of how language mutations contribute to conspiracy persistence online and shed lights on longitudinal content moderation strategies. We argue that content moderation should consider the mutability of conspiracy claims and focus on the core claims that can address their potential variations.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 3 minor

Summary. This paper investigates how language mutations affect the persistent diffusion of conspiracy theories on social media. Drawing on a three-year dataset of conspiracy-related posts from X and applying computational linguistic analysis alongside survival modelling, it finds that conspiracy claims with greater semantic mutations have substantially longer lifespans. Mutations in psycholinguistic properties (pronouns, social reference words, cognitive process terms, risk- and health-related vocabularies) and in actor-action-target (AAT) categories are associated with extended lifespans. Qualitative analysis identifies simplification and assimilation as predominant mutation patterns at both linguistic and structural levels, with implications for longitudinal content moderation that targets core claims rather than variants.

Significance. If the central associations hold after addressing potential confounds, the work provides a data-driven link between linguistic adaptability and online conspiracy persistence, combining survival analysis with psycholinguistic feature tracking and qualitative pattern identification. This could inform more effective moderation strategies and extends computational social science approaches to misinformation dynamics.

major comments (2)
  1. [Survival modelling and dataset construction] § on survival modelling and dataset construction: the models do not include explicit robustness checks such as inverse-probability weighting by initial engagement, stratification by follower count, or sensitivity analyses for right-censoring and API sampling limits. Because the central claim equates observed post lifespans with intrinsic mutation-driven persistence, unaddressed platform algorithm biases (which may correlate with the studied psycholinguistic markers) constitute a load-bearing threat to causal interpretation.
  2. [Methods section] Methods section: the manuscript provides no details on sample size, sampling strategy for identifying conspiracy posts, exact quantification of semantic mutations (e.g., distance metrics or thresholds), statistical controls, or error handling. These omissions prevent verification that the reported positive associations between mutation rates and lifespans are statistically supported rather than artifacts of data construction.
minor comments (3)
  1. [Title] Title: 'Persistences' is grammatically incorrect and should read 'Persistence'.
  2. [Abstract] Abstract: 'shed lights on' should be corrected to 'shed light on'.
  3. [Throughout] Notation and terminology: ensure consistent distinction between 'semantic mutations' and 'language mutations' throughout; define AAT categories explicitly on first use.

Simulated Author's Rebuttal

2 responses · 1 unresolved

We thank the referee for their constructive feedback, which helps improve the clarity and robustness of our analysis. We respond to each major comment in turn.

read point-by-point responses
  1. Referee: [Survival modelling and dataset construction] § on survival modelling and dataset construction: the models do not include explicit robustness checks such as inverse-probability weighting by initial engagement, stratification by follower count, or sensitivity analyses for right-censoring and API sampling limits. Because the central claim equates observed post lifespans with intrinsic mutation-driven persistence, unaddressed platform algorithm biases (which may correlate with the studied psycholinguistic markers) constitute a load-bearing threat to causal interpretation.

    Authors: We concur that robustness checks are essential to mitigate concerns about platform biases and to support the interpretation of mutation-driven persistence. Accordingly, we will add sensitivity analyses for right-censoring and API sampling limits in the revised manuscript. Regrettably, follower counts and initial engagement metrics are not available in the dataset, precluding inverse-probability weighting and stratification by follower count. We will revise the manuscript to emphasize that the findings represent associations and to discuss these data limitations explicitly. revision: partial

  2. Referee: [Methods section] Methods section: the manuscript provides no details on sample size, sampling strategy for identifying conspiracy posts, exact quantification of semantic mutations (e.g., distance metrics or thresholds), statistical controls, or error handling. These omissions prevent verification that the reported positive associations between mutation rates and lifespans are statistically supported rather than artifacts of data construction.

    Authors: We apologize for the insufficient detail provided in the methods section of the submitted manuscript. In the revision, we will include the sample size, describe the sampling strategy for conspiracy posts, specify the distance metrics and thresholds used for semantic mutation quantification, detail the statistical controls, and outline the error handling procedures to allow for full verification of the results. revision: yes

standing simulated objections not resolved
  • Data limitations prevent conducting inverse-probability weighting by initial engagement and stratification by follower count.

Circularity Check

0 steps flagged

No circularity: empirical associations derived from external dataset observations

full rationale

The paper conducts a data-driven empirical study on a three-year X dataset using computational linguistic analysis (psycholinguistic properties and AAT categories) paired with survival modeling. The central claims are associations between observed semantic mutations and measured post lifespans, with no first-principles derivation chain, no parameters fitted to a subset then re-presented as predictions, and no load-bearing self-citations or uniqueness theorems. All reported results rest on external data observations and standard statistical methods rather than reducing to the paper's own inputs by construction. This is a normal, self-contained empirical finding.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

Abstract-only review yields minimal ledger entries; no explicit free parameters, invented entities, or ad-hoc axioms are stated.

axioms (1)
  • domain assumption The collected X posts form a representative sample of conspiracy theory diffusion without significant platform-induced selection effects.
    Required for survival modelling results to generalize to online persistence.

pith-pipeline@v0.9.0 · 5688 in / 1104 out tokens · 34217 ms · 2026-05-20T05:42:08.607684+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

94 extracted references · 94 canonical work pages · 1 internal anchor

  1. [1]

    An Analysis of Rumor

    Allport, G.W., Postman, L., 1946. An Analysis of Rumor. Public Opinion Quarterly 10, 501. URL:http://poq.oupjournals.org/cgi/ doi/10.1086/265813, doi:10.1086/265813

  2. [2]

    Responses to digital disinformation as part of hybrid threats: a systematic re- view on the effects of disinformation and the effectiveness of fact- checking/debunking

    Arcos,R.,Gertrudix,M.,Arribas,C.,Cardarilli,M.,2022. Responses to digital disinformation as part of hybrid threats: a systematic re- view on the effects of disinformation and the effectiveness of fact- checking/debunking. Open Research Europe 2, 8

  3. [3]

    Why the Wuhan lab-leak theory is so disputed

    BBC, 2021a. Why the Wuhan lab-leak theory is so disputed. URL: https://www.bbc.com/news/world-asia-china-57268111

  4. [4]

    Wuhan lab leak theory: How Fort Detrick became a centre for Chinese conspiracies

    BBC, 2021b. Wuhan lab leak theory: How Fort Detrick became a centre for Chinese conspiracies. URL:https://www.bbc.com/news/ world-us-canada-58273322. Cheng, Quelle, and Hale:Preprint submitted to ElsevierPage 10 of 19 Language Mutations Sustain Conspiracy Persistence

  5. [5]

    COVID-19 conspiracy theories: QAnon, 5G, the New World Order and other viral ideas

    Bodner, J., Welch, W., Brodie, I., 2020. COVID-19 conspiracy theories: QAnon, 5G, the New World Order and other viral ideas. McFarland

  6. [6]

    TheDevelopmentandPsychometricPropertiesofLIWC-22

    Boyd,R.L.,AshwiniAshokkumar,Seraj,S.,Pennebaker,J.W.,2022. TheDevelopmentandPsychometricPropertiesofLIWC-22. Techni- cal Report. University of Texas at Austin. Austin, TX. doi:10.13140/ RG.2.2.23890.43205

  7. [7]

    Emotionshapesthediffusionofmoralizedcontentinsocialnetworks

    Brady, W.J., Wills, J.A., Jost, J.T., Tucker, J.A., Bavel, J.J.V., 2017. Emotionshapesthediffusionofmoralizedcontentinsocialnetworks. Proceedings of the National Academy of Sciences 114, 7313–7318. URL:https://www.pnas.org/content/114/28/7313, doi:10.1073/pnas. 1618923114

  8. [8]

    Do conspiracy theorists think too much or too little? Current Opinion in Psychology 49, 101504

    Brashier, N.M., 2023. Do conspiracy theorists think too much or too little? Current Opinion in Psychology 49, 101504. URL:https://www.sciencedirect.com/science/article/pii/ S2352250X22002251, doi:10.1016/j.copsyc.2022.101504

  9. [9]

    Fighting fake news spread in online social networks: Actual trends and future research directions, in: 2017 IEEE International Conference on Big Data (Big Data), pp

    Campan, A., Cuzzocrea, A., Truta, T.M., 2017. Fighting fake news spread in online social networks: Actual trends and future research directions, in: 2017 IEEE International Conference on Big Data (Big Data), pp. 4453–4457. doi:10.1109/BigData.2017.8258484

  10. [10]

    The indirect assessment of social attitudes

    Campbell, D.T., 1950. The indirect assessment of social attitudes. Psychological Bulletin 47, 15–38. doi:10.1037/h0054114. place: US

  11. [11]

    Systematic error on the part of human links in communication systems

    Campbell, D.T., 1958. Systematic error on the part of human links in communication systems. Information and Control 1, 334–

  12. [12]

    URL:https://www.sciencedirect.com/science/article/pii/ S0019995858902195, doi:10.1016/S0019-9958(58)90219-5

  13. [13]

    Tracking Social Media Discourse About the COVID-19 Pandemic: Development of a Public CoronavirusTwitterDataSet.JMIRPublicHealthandSurveillance6, e19273

    Chen, E., Lerman, K., Ferrara, E., 2020. Tracking Social Media Discourse About the COVID-19 Pandemic: Development of a Public CoronavirusTwitterDataSet.JMIRPublicHealthandSurveillance6, e19273. URL:http://publichealth.jmir.org/2020/2/e19273/,doi:10. 2196/19273

  14. [14]

    A real-time platform for contextualized conspiracytheoryanalysis,in:2021InternationalConferenceonData MiningWorkshops(ICDMW),pp.118–127.doi:10.1109/ICDMW53433

    Chong, D., Lee, E., Fan, M., Holur, P., Shahsavari, S., Tangherlini, T., Roychowdhury, V., 2021. A real-time platform for contextualized conspiracytheoryanalysis,in:2021InternationalConferenceonData MiningWorkshops(ICDMW),pp.118–127.doi:10.1109/ICDMW53433. 2021.00021

  15. [15]

    Chung, C.K., Pennebaker, J.W., 2018. What do we know when we LIWCaperson?Textanalysisasanassessmenttoolfortraits,personal concerns and life stories, in: The SAGE handbook of personality and individual differences: The science of personality and individual dif- ferences. Sage Reference, pp. 341–360. doi:10.4135/9781526451163. n16

  16. [16]

    Conspiracy theories and social media platforms

    Cinelli, M., Etta, G., Avalle, M., Quattrociocchi, A., Di Marco, N., Valensise, C., Galeazzi, A., Quattrociocchi, W., 2022. Conspiracy theories and social media platforms. Current Opinion in Psychology 47, 101407. URL:https://www.sciencedirect.com/science/article/ pii/S2352250X22001282, doi:10.1016/j.copsyc.2022.101407

  17. [17]

    Durably reducing conspiracybeliefsthroughdialogueswithAI.Science385,eadq1814

    Costello, T.H., Pennycook, G., Rand, D.G., 2024. Durably reducing conspiracybeliefsthroughdialogueswithAI.Science385,eadq1814. URL:https://www.science.org/doi/10.1126/science.adq1814,doi:10. 1126/science.adq1814

  18. [18]

    What Are Conspiracy Theories? A Definitional Approach to Their Correlates, Consequences, and Communication

    Douglas, K.M., Sutton, R.M., 2023. What Are Conspiracy Theories? A Definitional Approach to Their Correlates, Consequences, and Communication. Annual Review of Psychology 74, 271–298. URL:https://www.annualreviews. org/content/journals/10.1146/annurev-psych-032420-031329, doi:10.1146/annurev-psych-032420-031329

  19. [19]

    The Psychology of Conspiracy Theories

    Douglas, K.M., Sutton, R.M., Cichocka, A., 2017. The Psychology of Conspiracy Theories. Current Directions in Psychological Sci- ence 26, 538–542. URL:https://doi.org/10.1177/0963721417718261, doi:10.1177/0963721417718261

  20. [20]

    Understanding Conspiracy Theories

    Douglas,K.M.,Uscinski,J.E.,Sutton,R.M.,Cichocka,A.,Nefes,T., Ang, C.S., Deravi, F., 2019. Understanding Conspiracy Theories. Political Psychology 40, 3–35. doi:https://doi.org/10.1111/pops. 12568

  21. [21]

    The COVID-19 pandemic and the search for structure: Social media andconspiracytheories

    Dow, B.J., Johnson, A.L., Wang, C.S., Whitson, J., Menon, T., 2021. The COVID-19 pandemic and the search for structure: Social media andconspiracytheories. SocialandPersonalityPsychologyCompass

  22. [22]

    URL:https://onlinelibrary.wiley.com/doi/10.1111/spc3.12636, doi:10.1111/spc3.12636

  23. [23]

    Conspiracy theories: secrecy and power in Amer- icanculture

    Fenster, M., 2008. Conspiracy theories: secrecy and power in Amer- icanculture. Rev.andupdatededed.,UniversityofMinnesotaPress, Minneapolis

  24. [24]

    Social cognition: from brains to culture

    Fiske, S.T., Taylor, S.E., 2013. Social cognition: from brains to culture. 2nd edition ed., Sage, Los Angeles London New Delhi Singapore Washington, DC

  25. [25]

    An- alyzing Misinformation Claims During the 2022 Brazilian General Election on WhatsApp, Twitter, and Kwai

    Hale, S.A., Belisario, A., Mostafa, A.N., Camargo, C., 2024. An- alyzing Misinformation Claims During the 2022 Brazilian General Election on WhatsApp, Twitter, and Kwai. International Jour- nal of Public Opinion Research 36. URL:https://academic.oup. com/ijpor/article/doi/10.1093/ijpor/edae032/7709027, doi:10.1093/ ijpor/edae032

  26. [26]

    Emotional Contagion

    Hatfield, E., Cacioppo, J.T., Rapson, R.L., 1993. Emotional Contagion. Current Directions in Psychological Science 2, 96–

  27. [27]

    1111/1467-8721.ep10770953

    URL:https://doi.org/10.1111/1467-8721.ep10770953, doi:10. 1111/1467-8721.ep10770953

  28. [28]

    Interviewing in social research

    Hyman, H.H., 1954. Interviewing in social research. University of Chicago Press, Chicago

  29. [29]

    The emerging medias- cape,sameoldtheories?AcasestudyofonlinenewsdiffusioninKo- rea

    Im, Y.H., Kim, E.m., Kim, K., Kim, Y., 2010. The emerging medias- cape,sameoldtheories?AcasestudyofonlinenewsdiffusioninKo- rea. New Media & Society URL:https://journals.sagepub.com/doi/ 10.1177/1461444810377916, doi:10.1177/1461444810377916. publisher: SAGE PublicationsSage UK: London, England

  30. [30]

    (Eds.), 2022

    Jeppesen,S.,Hoechsmann,M.,ulthiin,i.h.,VanDyke,D.,McKee,M., Giroux, H.A., Kumanyika, C. (Eds.), 2022. The Capitol riots: digital media, disinformation, and democracy under attack. Politics, media and political communication. first published ed., Routledge, London New York

  31. [31]

    Claim Matching Beyond English to Scale Global Fact-Checking, in: Zong, C., Xia, F., Li, W., Navigli, R

    Kazemi, A., Garimella, K., Gaffney, D., Hale, S.A., 2021. Claim Matching Beyond English to Scale Global Fact-Checking, in: Zong, C., Xia, F., Li, W., Navigli, R. (Eds.), Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers),...

  32. [32]

    plandemic

    Kearney, M.D., Chiang, S.C., Massey, P.M., 2020. The Twitter origins and evolution of the COVID-19 “plandemic” conspiracy theory. Harvard Kennedy School Misinformation Review 1. URL:https://misinforeview.hks.harvard.edu/article/ the-twitter-origins-and-evolution-of-the-covid-19-plandemic-conspiracy-theory/, doi:10.37016/mr-2020-42

  33. [33]

    Pathwaystoconspiracy:The socialandlinguisticprecursorsofinvolvementinReddit’sconspiracy theory forum

    Klein,C.,Clutton,P.,Dunn,A.G.,2019. Pathwaystoconspiracy:The socialandlinguisticprecursorsofinvolvementinReddit’sconspiracy theory forum. PLOS ONE 14. URL:https://dx.plos.org/10.1371/ journal.pone.0225098, doi:10.1371/journal.pone.0225098

  34. [34]

    Experimental evidence of massive-scale emotional contagion through social net- works

    Kramer, A.D.I., Guillory, J.E., Hancock, J.T., 2014. Experimental evidence of massive-scale emotional contagion through social net- works. ProceedingsoftheNationalAcademyofSciences111,8788–

  35. [35]

    URL:https://www.pnas.org/doi/abs/10.1073/pnas.1320040111, doi:10.1073/pnas.1320040111

  36. [36]

    George Mason University

    Lewandowsky,S.,Cook,J.,2020.TheConspiracyTheoryHandbook. George Mason University

  37. [37]

    Did I See It Before? Detecting Previously-Checked Claims over Twitter, in: Hagen, M., Verberne,S.,Macdonald,C.,Seifert,C.,Balog,K.,Nørvåg,K.,Setty, V

    Mansour, W., Elsayed, T., Al-Ali, A., 2022. Did I See It Before? Detecting Previously-Checked Claims over Twitter, in: Hagen, M., Verberne,S.,Macdonald,C.,Seifert,C.,Balog,K.,Nørvåg,K.,Setty, V. (Eds.), Advances in Information Retrieval, Springer International Publishing, Cham. pp. 367–381. doi:10.1007/978-3-030-99736-6_25

  38. [38]

    TheCompellingCom- plexity of Conspiracy Theories

    Marsh,J.K.,Coachys,C.,Kleinberg,S.,2022. TheCompellingCom- plexity of Conspiracy Theories. Proceedings of the Annual Meeting of the Cognitive Science Society 44. URL:https://escholarship. org/uc/item/0sw059jb

  39. [39]

    Towards Effective Extraction andEvaluationofFactualClaims

    Metropolitansky, D., Larson, J., 2025. Towards Effective Extraction andEvaluationofFactualClaims. arXivpreprintarXiv:2502.10855

  40. [40]

    LOCO: The 88-million- word language of conspiracy corpus

    Miani, A., Hills, T., Bangerter, A., 2022. LOCO: The 88-million- word language of conspiracy corpus. Behavior Research Methods Cheng, Quelle, and Hale:Preprint submitted to ElsevierPage 11 of 19 Language Mutations Sustain Conspiracy Persistence 54, 1794–1817. URL:https://doi.org/10.3758/s13428-021-01698-z, doi:10.3758/s13428-021-01698-z

  41. [41]

    distribution_hubs

    Neuberger, J., Ackermann, L., Aa, H.v.d., Jablonski, S., 2024. A Universal Prompting Strategy for Extracting Process Model Infor- mation from Natural Language Text using Large Language Mod- els. URL:http://arxiv.org/abs/2407.18540, doi:10.48550/arXiv. 2407.18540. arXiv:2407.18540 [cs] version: 1

  42. [42]

    Conspiracy and bias: argumentative fea- tures and persuasiveness of conspiracy theories

    Oswald, S., 2016. Conspiracy and bias: argumentative fea- tures and persuasiveness of conspiracy theories. OSSA Con- ference Archive URL:https://scholar.uwindsor.ca/ossaarchive/ OSSA11/papersandcommentaries/168

  43. [43]

    Online claims that Chinese scien- tists stole coronavirus from Winnipeg lab have no factual ba- sis

    Pauls, K., Yates, J., 2020. Online claims that Chinese scien- tists stole coronavirus from Winnipeg lab have no factual ba- sis. CBC News URL:https://www.cbc.ca/news/canada/manitoba/ china-coronavirus-online-chatter-conspiracy-1.5442376

  44. [44]

    The Half-Life of a Tweet

    Pfeffer, J., Matter, D., Sargsyan, A., 2023. The Half-Life of a Tweet. ProceedingsoftheInternationalAAAIConferenceonWebandSocial Media17,1163–1167. URL:https://ojs.aaai.org/index.php/ICWSM/ article/view/22228, doi:10.1609/icwsm.v17i1.22228

  45. [45]

    Theorizing conspiracy

    Pratt, R., 2003. Theorizing conspiracy. Theory and Society 32, 255–271.URL:https://link.springer.com/10.1023/A:1023996501425, doi:10.1023/a:1023996501425

  46. [46]

    Psychology of conspiracy theories

    van Prooijen, J.W., 2018. Psychology of conspiracy theories. Rout- ledge, New York, NY

  47. [47]

    Belief in conspiracy theories: Basic principles of an emerging research domain

    van Prooijen, J.W., Douglas, K.M., 2018. Belief in conspiracy theories: Basic principles of an emerging research domain. European Journal of Social Psychology 48, 897–

  48. [48]

    _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/ejsp.2530

    URL:https://onlinelibrary.wiley.com/doi/abs/10.1002/ ejsp.2530, doi:https://doi.org/10.1002/ejsp.2530. _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/ejsp.2530

  49. [49]

    Lost in translation: using global fact-checks to measure multilingual misinformation prevalence, spread, and evolution

    Quelle, D., Cheng, C.Y., Bovet, A., Hale, S.A., 2025. Lost in translation: using global fact-checks to measure multilingual misinformation prevalence, spread, and evolution. EPJ Data Science 14, 1–24. URL:https://epjdatascience.springeropen. com/articles/10.1140/epjds/s13688-025-00520-6, doi:10.1140/epjds/ s13688-025-00520-6. number: 1

  50. [50]

    Psycholinguis- ticMarkersofCOVID-19ConspiracyTweetsandPredictorsofTweet Dissemination

    Rains,S.A.,Leroy,G.,Warner,E.L.,Harber,P.,2023. Psycholinguis- ticMarkersofCOVID-19ConspiracyTweetsandPredictorsofTweet Dissemination. Health Communication 38, 21–30. URL:https:// doi.org/10.1080/10410236.2021.1929691, doi:10.1080/10410236.2021. 1929691. _eprint: https://doi.org/10.1080/10410236.2021.1929691

  51. [51]

    Salman, M., Haller, A., Rodriguez Mendez, S.J., Naseem, U., 2024. Tiny But Mighty: A Crowdsourced Benchmark Dataset for Triple Extraction from Unstructured Text, in: Proceedings of the 20th Joint ACL-ISOWorkshoponInteroperableSemanticAnnotation,ELRA- ICCL, Torino, Italia. pp. 71–81. URL:https://aclanthology.org/ 2024.isa-1.10/

  52. [52]

    ConspiraciesOnline:UserDiscussions in a Conspiracy Community Following Dramatic Events

    Samory,M.,Mitra,T.,2018a. ConspiraciesOnline:UserDiscussions in a Conspiracy Community Following Dramatic Events. Proceed- ings of the International AAAI Conference on Web and Social Me- dia 12. URL:https://ojs.aaai.org/index.php/ICWSM/article/view/ 15039. number: 1

  53. [53]

    ’The Government Spies Using Our Webcams’: The Language of Conspiracy Theories in Online Discus- sions

    Samory, M., Mitra, T., 2018b. ’The Government Spies Using Our Webcams’: The Language of Conspiracy Theories in Online Discus- sions. Proc. ACM Hum.-Comput. Interact. 2, 152:1–152:24. URL: https://dl.acm.org/doi/10.1145/3274421, doi:10.1145/3274421

  54. [54]

    Metacognitive Experiences in Consumer Judgment and Decision Making

    Schwarz, N., 2004. Metacognitive Experiences in Consumer Judgment and Decision Making. Journal of Consumer Psychology 14, 332–348. URL:https://onlinelibrary.wiley.com/doi/abs/10. 1207/s15327663jcp1404_2, doi:10.1207/s15327663jcp1404_2. _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1207/s15327663jcp1404_2

  55. [55]

    Metacognitive Experiences and the Intricacies of Setting People Straight: Implica- tionsforDebiasingandPublicInformationCampaigns,in:Advances in Experimental Social Psychology

    Schwarz, N., Sanna, L.J., Skurnik, I., Yoon, C., 2007. Metacognitive Experiences and the Intricacies of Setting People Straight: Implica- tionsforDebiasingandPublicInformationCampaigns,in:Advances in Experimental Social Psychology. Academic Press. volume 39, pp.127–161. URL:https://www.sciencedirect.com/science/article/ pii/S006526010639003X, doi:10.1016/...

  56. [56]

    Conspiracy in the time of corona: automatic de- tection of emerging COVID-19 conspiracy theories in social me- dia and the news

    Shahsavari, S., Holur, P., Wang, T., Tangherlini, T.R., Roychowd- hury, V., 2020. Conspiracy in the time of corona: automatic de- tection of emerging COVID-19 conspiracy theories in social me- dia and the news. Journal of Computational Social Science , 1–39URL:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7591696/, doi:10.1007/s42001-020-00086-5

  57. [57]

    The diffu- sion of misinformation on social media: Temporal pattern, mes- sage, and source

    Shin, J., Jian, L., Driscoll, K., Bar, F., 2018. The diffu- sion of misinformation on social media: Temporal pattern, mes- sage, and source. Computers in Human Behavior 83, 278–

  58. [58]

    URL:http://www.sciencedirect.com/science/article/pii/ S0747563218300669, doi:10.1016/j.chb.2018.02.008

  59. [59]

    UTDRM: unsupervised method for training debunked-narrative retrieval models

    Singh, I., Scarton, C., Bontcheva, K., 2023. UTDRM: unsupervised method for training debunked-narrative retrieval models. EPJ Data Science 12, 59. URL:https://epjds.epj.org/articles/epjdata/ abs/2023/01/13688_2023_Article_437/13688_2023_Article_437.html, doi:10.1140/epjds/s13688-023-00437-y. number: 1

  60. [60]

    Why test for proportional hazards? Jama 323, 1401–1402

    Stensrud, M.J., Hernán, M.A., 2020. Why test for proportional hazards? Jama 323, 1401–1402. ISBN: 0098-7484

  61. [61]

    No more COVID-19 messages via social media, please

    Sun, J., Lee, S.K., 2023. “No more COVID-19 messages via social media, please”: the mediating role of COVID-19 message fatigue between information overload, message avoidance, and behavioral intention. CurrentPsychology42,20347–20361. URL:https://doi. org/10.1007/s12144-023-04726-7, doi:10.1007/s12144-023-04726-7

  62. [62]

    Swami, V., Coles, R., Stieger, S., Pietschnig, J., Furnham, A., Rehim, S., Voracek, M., 2011. Conspiracist ideation in Britain and Austria: Evidence of a monological belief system and as- sociations between individual psychological differences and real- world and fictitious conspiracy theories. British Journal of Psy- chology 102, 443–463. URL:https://onl...

  63. [63]

    Toward a Generative Model of Legend: Pizzas,Bridges,Vaccines,andWitches.Humanities7,1.URL:https: //www.mdpi.com/2076-0787/7/1/1, doi:10.3390/h7010001

    Tangherlini, T.R., 2018. Toward a Generative Model of Legend: Pizzas,Bridges,Vaccines,andWitches.Humanities7,1.URL:https: //www.mdpi.com/2076-0787/7/1/1, doi:10.3390/h7010001. number: 1

  64. [64]

    An automated pipeline for the discovery of conspiracy and conspiracy theory narrative frameworks: Bridge- gate, Pizzagate and storytelling on the web

    Tangherlini, T.R., Shahsavari, S., Shahbazi, B., Ebrahimzadeh, E., Roychowdhury, V., 2020. An automated pipeline for the discovery of conspiracy and conspiracy theory narrative frameworks: Bridge- gate, Pizzagate and storytelling on the web. PLOS ONE 15, e0233879. URL:https://journals.plos.org/plosone/article?id=10. 1371/journal.pone.0233879, doi:10.1371/...

  65. [65]

    The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods

    Tausczik, Y.R., Pennebaker, J.W., 2010. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Jour- nal of Language and Social Psychology 29, 24–54. URL:http: //journals.sagepub.com/doi/10.1177/0261927X09351676, doi:10.1177/ 0261927X09351676

  66. [66]

    (Ed.), 2018

    Uscinski, J.E. (Ed.), 2018. Conspiracy Theories and the People Who Believe Them. 1 ed., Oxford University Press. URL:https://oxford.universitypressscholarship.com/ view/10.1093/oso/9780190844073.001.0001/oso-9780190844073, doi:10.1093/oso/9780190844073.001.0001

  67. [67]

    Science , volume =

    Vosoughi, S., Roy, D., Aral, S., 2018. The spread of true and false news online. Science 359, 1146–1151. URL:https://science. sciencemag.org/content/359/6380/1146, doi:10.1126/science.aap9559

  68. [68]

    Conspiracy Theories as Ethnosociologies: Explanation and Intention in African American Political Culture

    Waters, A.M., 1997. Conspiracy Theories as Ethnosociologies: Explanation and Intention in African American Political Culture. Journal of Black Studies 28, 112–125. URL:https://doi.org/10. 1177/002193479702800107, doi:10.1177/002193479702800107

  69. [69]

    Lacking Control Increases Illusory Pattern Perception

    Whitson, J.A., Galinsky, A.D., 2008. Lacking Control Increases Illusory Pattern Perception. Science 322, 115–117. URL:https:// science.sciencemag.org/content/322/5898/115, doi:10.1126/science. 1159845

  70. [70]

    Generating Scientific Claims for Zero-Shot Scientific Fact Checking, in: Muresan, S., Nakov, P., Villavicencio, A

    Wright, D., Wadden, D., Lo, K., Kuehl, B., Cohan, A., Augenstein, I., Wang, L.L., 2022. Generating Scientific Claims for Zero-Shot Scientific Fact Checking, in: Muresan, S., Nakov, P., Villavicencio, A. (Eds.), Proceedings of the 60th Annual Meeting of the Associ- ation for Computational Linguistics (Volume 1: Long Papers), As- sociation for Computational...

  71. [71]

    Cheng, Quelle, and Hale:Preprint submitted to ElsevierPage 12 of 19 Language Mutations Sustain Conspiracy Persistence 18653/v1/2022.acl-long.175

    URL:https://aclanthology.org/2022.acl-long.175/, doi:10. Cheng, Quelle, and Hale:Preprint submitted to ElsevierPage 12 of 19 Language Mutations Sustain Conspiracy Persistence 18653/v1/2022.acl-long.175. A. Appendix B. Data After collecting fact-checking articles, we employed three postgraduate students to identify conspiracy theory relatedonesbasedonthede...

  72. [72]

    Read the text carefully within the context of COVID-19.↪

  73. [73]

    Reason whether the tweet is relevant to any conspiracies with a brief rationale within 15 words. ↪ ↪

  74. [74]

    1" is conspiracy relevant, otherwise

    Label with your decision that "1" is conspiracy relevant, otherwise "0", referring to conspiracy irrelevant. ↪ ↪ The output should be in the following JSON format (as a list of objects):↪ [ Table 3 Model performance compared to human coders on 150 conspiracy-related posts. Ground truth annotations were pro- vided by two postgraduate annotators. Model Prec...

  75. [75]

    the virus

    Read the text carefully and list every noun phrase that can function as an Actor (people, organisations, countries, institutions, "the virus", etc.)

  76. [76]

    For each sentence, locate the main verb phrase(s) (Actions)

  77. [77]

    Decide which entity, object, or concept each action is performed upon (Target)

  78. [78]

    Add any implicit Actors or Targets when they are strongly implied; leave empty strings "" if truly unknowable

  79. [79]

    Summarise any Actor, Action, or Target longer than three words to <=3 words while preserving meaning

  80. [80]

    <document id 1>

    List all identified triplets in strict JSON format, with the document id as the key (as a string) and a list of triplets as the value: [ "<document id 1>": [ "actor": "<=3-word actor", "action": "<=3-word action", "target": "<=3-word target", "actor": "<=3-word actor", "action": "<=3-word action", "target": "<=3-word target" ] , "<document id 2>": [ "acto...

Showing first 80 references.