ABSTRACT
With the rise of social media and advancements in AI technology, human-bot interaction will soon be commonplace. In this paper we explore human-bot interaction in STACK OVERFLOW, a question and answer website for developers. For this purpose, we built a bot emulating an ordinary user answering questions concerning the resolution of git error messages. In a first run this bot impersonated a human, while in a second run the same bot revealed its machine identity. Despite being functionally identical, the two bot variants elicited quite different reactions.
- Eyal Aharoni and Alan J Fridlund. 2007. Social reactions toward people vs. computers: How mere lables shape interactions. Comput Hum Behav 23, 5 (2007), 2175-2189. Google ScholarDigital Library
- Miltiadis Allamanis and Charles Sutton. 2013. Why, when, and what: analyzing Stack Overflow questions by topic, type, and code. In Proc. MSR. IEEE, 53-56. Google ScholarDigital Library
- Jeff Atwood. 2009. Handling Duplicate Questions. http://blog.stackoverflow.com/2009/04/handling-duplicate-questions/. (2009). Published 4/29/2009; Last Accessed 1/6/2016.Google Scholar
- Frank Biocca, Chad Harms, and Judee K Burgoon. 2003. Toward a more robust theory and measure of social presence: Review and suggested criteria. Presence 12, 5 (2003), 456-480. Google ScholarDigital Library
- Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. 2013. Design and analysis of a social botnet. Computer Networks 57, 2 (2013), 556-578. Google ScholarDigital Library
- Judee K Burgoon. 1993. Interpersonal expectations, expectancy violations, and emotional communication. Journal of Language and Social Psychology 12, 1--2 (1993), 30-48.Google ScholarCross Ref
- Donn Erwin Byrne. 1971. The attraction paradigm. Vol. 11. Academic Pr.Google Scholar
- Maxime Clément and Matthieu J Guitton. 2015. Interacting with bots online: Users' reactions to actions of automated programs in Wikipedia. Comput Hum Behav 50 (2015), 66-75. Google ScholarDigital Library
- Stack Exchange Community. 2016. English Language & Usage. http://english.stackexchange.com. (2016). Last Accessed 1/6/2016.Google Scholar
- Stack Overflow Community. 2015a. Question: Can't push rails code to Heroku from Cloud9 because of sqlite. http://stackoverflow.com/a/29898609. (2015). Last Accessed 1/6/2016.Google Scholar
- Stack Overflow Community. 2015b. Question: Setup.py egg_info fails for requirement pygobject when deploying to Heroku. http://stackoverflow.com/a/29447570. (2015). Last Accessed 1/6/2016.Google Scholar
- Chad Edwards, Autumn Edwards, Patric R Spence, and Ashleigh K Shelton. 2014. Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on Twitter. Comput Hum Behav 33 (2014), 372-376. Google ScholarDigital Library
- Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2014. The rise of social bots. arXiv preprint arXiv:1407.5225 (2014).Google Scholar
- Tim Hwang, Ian Pearce, and Max Nanis. 2012. Socialbots: Voices from the Fronts. Interactions 19, 2 (March 2012), 38-45. DOI: http://dx.doi.org/10.1145/2090150. Google ScholarDigital Library
- Daan Janssens. 2015. Being the Cleaning Guy. The Tale of a Stack Overflow Janitor Bot. Technical Report. University of Antwerp, Dept. of Mathematics and Computer Science.Google Scholar
- Steve Jones. 2015. How I Learned to Stop Worrying and Love the Bots. Social Media + Society 1, 1 (2015), 2056305115580344.Google Scholar
- Maria Korolov. 2015. Bots now outnumber humans on the web. http://www.csoonline.com/article/2922334/malware-cybercrime/bots-now-outnumber-humans-on-the-web.html. (2015). Published 5/14/2015; Last Accessed 1/6/2016.Google Scholar
- Catherine L Lortie and Matthieu J Guitton. 2011. Social organization in virtual settings depends on proximity to human visual aspect. Comput Hum Behav 27, 3 (2011), 1258-1261. Google ScholarDigital Library
- Clifford Nass, Jonathan Steuer, and Ellen R Tauber. 1994. Computers are social actors. In Proc. CHI. ACM, 72-78. Google ScholarDigital Library
- Roger C Schank and Robert Abelson. 1977. Scripts, goals, plans, and understanding. Hillsdale, NJ: Erlbaum.Google Scholar
- Daniel B Shank. 2013. Are computers good or bad for business? How mediated customer-computer interaction alters emotions, impressions, and patronage toward organizations. Comput Hum Behav 29, 3 (2013), 715-725. Google ScholarDigital Library
- Patric R Spence, David Westerman, Chad Edwards, and Autumn Edwards. 2014. Welcoming our robot overlords: Initial expectations about interaction with a robot. Communication Research Reports 31, 3 (2014), 272-280.Google ScholarCross Ref
- Siddharth Subramanian, Laura Inozemtseva, and Reid Holmes. 2014. Live API documentation. In Proc. ICSE. ACM, 643-652. Google ScholarDigital Library
- Christoph Treude, Martin Robillard, and Barthélémy Dagenais. 2015. Extracting development tasks to navigate software documentation. IEEE TSE 41, 6 (2015), 565-581. DOI: http://dx.doi.org/10.1109/TSE. 2014.2387172Google ScholarCross Ref
- Alan M Turing. 1950. Computing machinery and intelligence. Mind LIX, 236 (1950), 433-460.Google ScholarCross Ref
- Shaowei Wang, David Lo, Bogdan Vasilescu, and Alexander Serebrenik. 2014. EnTagRec: An Enhanced Tag Recommendation System for Software Information Sites. In Proc. ICSME. IEEE, 291-300. Google ScholarDigital Library
- Joseph Weizenbaum. 1966. ELIZA--a computer program for the study of natural language communication between man and machine. CACM 9, 1 (1966), 36- 45. Google ScholarDigital Library
Index Terms
- Among the Machines: Human-Bot Interaction on Social Q&A Websites
Recommendations
Understanding a prospective approach to designing malicious social bots
The security implications of social bots are evident in consideration of the fact that data sharing and propagation functionality are well integrated with social media sites. Existing social bots primarily use Really Simple Syndication and OSN online ...
Combating the evasion mechanisms of social bots
A comprehensive analysis about the evasion mechanisms used by existing social bots.We collect the source code, builders and execution traces of existing social bot.We examine three state-of-the-art detection approaches over our collected traces.A new ...
Network distribution and sentiment interaction: Information diffusion mechanisms between social bots and human users on social media
Highlights- Based on machine learning methods, this study constructs an effective method to identify social bots in Chinese social media.
AbstractWhen public health emergencies occur, a large amount of low-credibility information is widely disseminated by social bots, and public sentiment is easily manipulated by social bots, which may pose a potential threat to the public ...
Comments