How the Voice Lost Its Voice: Applying the Dual Processing Theory to Explain How Mis/Disinformation Can Deceive and Persuade Voting Decision Making

Abstract:
Mis/disinformation (also called fake news) is a major information warfare concern because it is a powerful tool for manipulating public perception, destabilising societies, and influencing geopolitical conflicts. This paper examined whether there is utility in applying the Dual Processing Theory to gain understandings and distinctions in language used in mis/disinformation compared to genuine information. The study examined Facebook posts written about the ‘The Indigenous Voice to Parliament’ 2023 referendum in Australia. There was evidence of persuasive language in both types of posts; however, anchoring techniques, fear around untrue losses, and moral framing were more typical of mis/disinformation posts.
AUTHORS

Department of Software Systems and Cybersecurity Monash University
Victoria, Australia
Professor Monica Whitty is the Head of Department for Software Systems and Cyber Security, where she holds a Professorship in Human Factors in Cyber Security at Monash University, Australia is an expert in understanding the psychological issues related to cyber security and cybercrimes and has led large interdisciplinary projects supported by competitive grants, such as projects on cyberscams, insider threats, online deception and cyber security practices, education and awareness raising, and detecting and preventing dis/misinformation. She has been an expert witness on 10+ court cases for scam victims. She was a member of the Global Futures Communities for Cyber Security for the World Economic Forum. Professor Whitty is the author of five books and over 100 articles. Thier work was supported by the National Intelligence and Security Discovery Research Grant scheme under project title "Enhanced Disinformation Detection".
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive