Social Network Analysis of Information Flow and Opinion Formation on Indonesian Social Media: A Case Study of Youth Violence
Abstract
:1. Introduction
- Who are the key actors involved in narrative formation and dissemination?
- What patterns characterize information dissemination in youth violence cases on Indonesian social media?
- How do opinion clusters form and evolve within digital social networks?
- What are the characteristics of inter-group interactions within the network?
1.1. Digital Public Sphere and Network Society Theory
1.2. Youth Violence and Digital Networks
1.3. Network Analysis in Indonesian Digital Context
1.4. Theoretical Framework
- Datafication: The transformation of social activity into quantified data.
- Commodification: The conversion of social values into economic values.
- Selection: The algorithmic curation of information and interaction.
- Micro-level: Individual interaction patterns.
- Meso-level: Group formation and cluster dynamics.
- Macro-level: Overall network structures and evolution.
- Network Formation: How digital communities form and evolve around youth violence cases.
- Information Flow: How different types of content spread through social networks.
- Opinion Dynamics: How public discourse develops and changes over time.
- Cultural Context: How Indonesian social and cultural factors influence digital interaction patterns.
2. Materials and Methods
2.1. Methodological Framework
2.2. Data Collection and Processing
- Tweet Duplication Removal
- Identifying and removing identical tweets appearing multiple times;
- Checking based on tweet ID and content;
- This step was crucial because the platform X’s API occasionally returns duplicate content, especially during high-traffic periods. We identified duplicates through tweet ID comparison and content similarity analysis, utilizing Python’s library to filter unique entries while maintaining the integrity of the conversation threads.
- Format Standardization
- Converting date and time to same time zone;
- Consistent formatting of usernames and mentions;
- Hashtag normalization to address capitalization variations.
- This involved converting all timestamps to Western Indonesia Time (WIB) to accurately track temporal patterns, as Indonesia spans multiple time zones and many users’ devices might be set to different configurations. We also standardized the formatting of usernames and mentions by removing special characters and normalizing capitalization variations to avoid counting the same user multiple times under slightly different renderings of their username. Hashtag normalization was equally important, as variations in capitalization (e.g., #JusticeForDavid versus #justicefordavid) could fragment our analysis of thematic patterns. Using regex pattern matching, we standardized all hashtags to lowercase format while preserving their original semantic meaning.
- Data Completeness Verification
- Essential information checking: user ID, timestamp, tweet content;
- Engagement metrics;
- Interaction metadata.
- Each tweet record was examined for critical data points, including user ID, timestamp, and tweet content. We also verified engagement metrics (retweets, likes, replies) and interaction metadata (hashtags, mentions, media attachments) to ensure a complete picture of each interaction. Records with substantial missing data were flagged and, where possible, reconciled with secondary data sources. This verification process was essential for maintaining data integrity, particularly for the longitudinal analysis of conversation evolution over the case timeline.
2.3. Data Filtering and Categorization
- Topic Relevance Filtering
- Manual and automated checking of tweet relevance;
- Context verification of keyword usage;
- Removal of off-topic tweets.
- Topic relevance filtering began with automated keyword-based identification, followed by manual verification by three trained coders. We implemented context verification of keyword usage to distinguish between relevant discussions of the Mario Dandy case and incidental mentions or homonyms. For example, tweets containing “Mario” but referring to the video game character were excluded. This manual verification process, while time-intensive, was crucial for maintaining the integrity of the dataset, as purely automated approaches would have included substantial off-topic content due to the complex nature of the case.
- Spam and Bot Removal
- Identification based on posting patterns;
- Account characteristics analysis;
- Promotional content removal.
- Spam and bot removal represented a critical quality control measure, particularly due to the case’s high public visibility, which attracted automated engagement. We developed a multidimensional identification approach based on posting patterns, including an unnaturally high posting frequency (exceeding 50 tweets per hour), identical content posted across multiple threads, and repetitive engagement patterns. The analysis of account characteristics included examining the account age, follower–following ratios, and behavioral patterns typical of automated accounts. Additionally, we filtered promotional content that opportunistically used case-related hashtags to market unrelated products or services. This comprehensive approach removed approximately 5783 tweets (2.14% of the initial dataset) identified as likely non-human or spam interactions.
- Data Categorization
- By interaction type (original tweets, retweets, replies, quotes);
- By content type (pure text, media, URL, combinations);
- By user characteristics (verified status, follower count, activity level);
- By temporal phases.
- Following these quality control measures, we implemented a systematic data categorization framework to facilitate multidimensional analysis. Tweets were categorized by interaction type to distinguish between original content creation, information amplification (retweets), direct engagement (replies), and evaluative responses (quotes). This categorization was essential for understanding the various communicative functions within the discourse. Content type categorization separated purely textual contributions from those incorporating media (images, videos), URLs (linking to external content), or combinations thereof, enabling the analysis of how different content formats influenced engagement patterns.
- User characteristic categorization allowed us to examine how the verified status, follower count, and activity level correlated with influence and reach within the network. We created distinct categories for high-influence users (>10,000 followers), medium-influence users (1000–10,000 followers), and standard users (<1000 followers) to analyze how account reach affected information dissemination. Finally, temporal phase categorization organized the dataset into initial (0–24 h post-incident), middle (24–72 h), and advanced (>72 h) phases, enabling the examination of how discourse evolved from immediate reactions to more reflective analysis over time. This multidimensional categorization framework established the analytical foundation for identifying the distinct clusters and interaction patterns presented in our results.
2.4. Network Analysis Approach
- Structural Analysis
- Degree centrality calculation for central actor identification;
- Betweenness centrality analysis for information brokers;
- Eigenvector centrality measurement for influence;
- Network density analysis for cohesiveness.
- Cluster and Community Analysis
- Community identification using Louvain algorithm;
- Modularity analysis;
- Clustering coefficient calculation;
- Inter-community interaction analysis.
- Temporal Analysis
- Tracking network structural changes;
- Cluster formation and dissolution analysis;
- Critical momentum identification;
- Discussion sustainability analysis.
2.5. Visualization
- Layout and Visual Representation
- ForceAtlas2 for optimal layout;
- Visual parameter adjustments;
- Filter implementation;
- Label optimization.
- Dynamic Visualization
- Temporal evolution representation;
- Structural change animation;
- Interactive timeline;
- Temporal filtering.
2.6. Validation and Reliability
- Structural Data Validation
- Internal consistency checks;
- Temporal validation;
- Network structural coherence verification.
- Cross-Source Validation
- Verification with mainstream media coverage;
- Data triangulation;
- Expert consultation.
- Methodological Validation
- Inter-coder reliability testing;
- Statistical validation;
- Robustness checks.
3. Results
3.1. Network Characteristics and Volume
3.2. Community Structure and Polarization
- Pro David cluster (33,338 accounts|40.12%)
- Highest internal cohesion (85% internal activities);
- Strong narrative consistency supporting the victim;
- Most active in cross-cluster interactions (15,001 interactions).
- Mario Dandy cluster (22,378 accounts|26.93%)
- More balanced interaction pattern (75% internal, 25% external);
- Focus on perpetrator background and social context;
- Significant interaction with media cluster (5594 interactions).
- Media cluster (11,750 accounts|14.14%)
- Neutral position in information dissemination;
- Highest content adoption rate;
- Balanced interaction distribution with other clusters.
- Buzzer cluster (5027 accounts|6.05%)
- Highest activity per account (3.54);
- Opportunistic engagement patterns;
- Limited substantive contribution (5% of direct interactions).
3.3. Information Flow and Interaction Patterns
- Pro David cluster
- Focus on Mario’s violent actions toward David, emphasizing the brutality of the incident.
- Strong advocacy for severe legal punishment, specifically calling for extended imprisonment.
- Expansion of accountability to include other parties, particularly demanding police action against Agnes.
- Support for the victim’s family’s legal position, specifically their request for attempted murder charges.
- Rapid sharing of news articles supporting their narrative.
- Consistent amplification of victim-supportive content.
- Coordinated hashtag usage to maintain topic visibility.
- Strategic redistribution of media coverage aligning with their perspective.
- Validating their narrative through media engagement.
- Maintaining selective dialogue with opposing viewpoints.
- Amplifying their message through internal network activation.
- 2.
- Counter Mario Dandy cluster
- 75% internal activities demonstrating strong group coherence.
- 25% external engagement showing openness to broader dialogue.
- Significant connections to media nodes indicating active fact-checking and context-building.
- Comparative analysis with other criminal cases.
- Focus on Mario Dandy’s perceived arrogance and privilege.
- Broader discussions about social inequality.
- Critical examination of institutional responses.
- The prominence of terms like “pejabat” (official), “pajak” (tax), and “kasus” (case) indicates a focus on the socio-economic context and privilege aspects of the case.
- Terms like “penganiayaan” (assault) appear alongside “hukum” (law), suggesting an emphasis on legal accountability.
- The presence of words like “warga” (citizen) and “anak” (child) points to discussions about social class disparities.
- References to “bapaknya” (his father) and “anaknya” (his child) show attention to family dynamics and parental responsibility.
- Validate information through media sources.
- Maintain constructive dialogue with opposing perspectives.
- Build broader context around the case.
- Engage in substantive discussion rather than mere opposition.
- A more sophisticated approach to discourse participation.
- Greater willingness to engage with diverse perspectives.
- Strategic use of both media sources and direct dialogue.
- Focus on contextual understanding rather than a purely emotional response.
- 3.
- News Media cluster
- Strategic positioning between opposing clusters.
- Dense connections indicating high content adoption rates.
- Balanced distribution of outgoing connections suggesting a neutral stance.
- Consistent output (average 1.03 tweets per account).
- Focus on development updates.
- Balanced coverage of all involved parties.
- Emphasis on factual verification.
- Factual Focus
- Prominence of terms like “kasus” (case) and “tersangka” (suspect) indicates objective reporting.
- Use of “penganiayaan” (assault) as a formal legal term rather than emotional descriptors.
- Integration of official terms like “pejabat” (official) and “dirjen” (director general).
- Comprehensive Coverage
- Multiple actor references: “mario”, “dandy”, “satriyo”, “agnes”.
- Legal aspects: “hukum” (law), “polisi” (police).
- Context elements: “video”, “viral”, “saksi” (witness).
- Distribution Balance
- 3525 interactions (11%) with Pro David cluster.
- 2937 interactions (9%) with Mario Dandy cluster.
- Remaining interactions distributed among smaller clusters and general audience.
- Content Reliability Metrics
- Highest verification rates for shared information.
- Consistent fact-checking practices.
- Regular updates with verified sources.
- Strong correlation between reported events and official statements.
- The cluster’s high content reliability metrics were demonstrated through the following:
- Systematic source verification.
- Consistent fact-checking protocols.
- Regular updates with official statements.
- Clear distinction between facts and allegations.
- Primary information validator.
- Neutral information broker.
- Bridge between opposing narratives.
- Reliable source for all stakeholders.
- 4.
- Political Buzzer cluster
- Political Context Integration
- Presence of terms like “jokowi” and “milenial” indicates attempts to politicize the case.
- Location-specific terms (“cilacap”, “bromo”) suggest regional political messaging.
- Terms unrelated to the case (“ariani”, “yunanda”) show attempts to piggyback on trending topics.
- Divergent Narrative Focus
- Limited use of case-specific terms.
- Introduction of unrelated political and social terms.
- Inclusion of entertainment and celebrity references.
- The network visualization shows this cluster’s peripheral position:
- Isolated position in the network structure.
- Limited meaningful connections to main discourse clusters.
- Sporadic bursts of activity rather than sustained engagement.
- Opportunistic hashtag usage.
- High activity per account (3.54).
- Limited substantive contribution (5% of direct interactions).
- Focus on visibility rather than meaningful discourse.
- Cross-cluster Interactions
- Only 2593 interactions representing 5% of total cross-cluster activities.
- Limited meaningful dialogue with main discussion clusters.
- Sporadic rather than sustained engagement patterns.
- Content Strategy
- High retweet ratio with minimal original content generation.
- Strategic hashtag deployment targeting visibility metrics.
- Opportunistic topic exploitation without substantive contribution.
- Focus on amplification rather than content creation.
- Engagement Characteristics
- Short-burst, high-volume activity periods.
- Limited sustained presence in any single discussion thread.
- Strategic timing of posts to maximize visibility.
- Minimal investment in meaningful discourse.
- Network Position
- Peripheral location in the overall network structure.
- Weak connections to main discussion clusters.
- Limited influence on core narrative development.
- Focus on volume rather than impact.
3.4. Temporal Evolution and Activity Patterns
- Daily Activity Distribution
- Pro David cluster: Peak activity 14:00–17:00 WIB (35% of activities);
- Mario Dandy cluster: Peak 19:00–22:00 WIB (40% of activities);
- News Media cluster: Highest activity 08:00–11:00 WIB (45% of activities);
- Buzzer cluster: Sporadic activity peaks (not time-bound).
- Multiple short bursts of high activity;
- No consistent temporal pattern;
- Opportunistic engagement with trending moments.
- Content Lifecycle Phases
- Initial Phase (0–24 h)
- 60% engagement focused on factual details;
- Breaking news reached 800 engagements;
- Decay rate −15% per hour.
- Middle Phase (24–72 h)
- More stable engagement (300–450 per post);
- Moderate decay rate (−8% per hour);
- Focus shifted to context and analysis.
- Advanced Phase (>72 h)
- Lower but sustained engagement (200–300 per post);
- Extended discussion period up to 48 h;
- Focus on systemic issues.
3.5. Content Impact and Engagement Patterns
- High-Impact Content (>1000 engagements)
- Average lifespan: 48 h;
- Peak engagement: 4–6 h post-publication;
- Distribution: Pro David (45%), Mario Dandy (30%), Media (20%);
- Sustained significant engagement up to 24 h.
- Medium-Impact Content (100–1000 engagements)
- Average lifespan: 24 h;
- Peak engagement: 2–4 h post-publication;
- Distribution: Pro David (40%), Mario Dandy (35%), Media (15%);
- More balanced cluster distribution.
- Response Time and Engagement
- Media content: Fastest response (<30 min);
- Pro David content: Initial pickup ~45 min;
- Mario Dandy content: Initial pickup ~60 min;
- Political Buzzer content: Quick initial response (<15 min);
- Sustained engagement periods: 3–5 h average.
3.6. Network Resilience and Sustainability
- Structural Resilience
- Path reliability: 85% success rate;
- Average path length: 2.3 hops;
- Secondary paths: 15,849 backup routes;
- Multiple connection pathways between major clusters.
- Connection Distribution
- Strong ties: 25% (20,774 connections);
- Medium ties: 45% (37,394 connections);
- Weak ties: 30% (24,929 connections).
- Sustainability Metrics
- Core user retention: 65%;
- Content type distribution:
- Evergreen content: 15%;
- Time-sensitive content: 70%;
- Ephemeral content: 15%.
- Network Impact
- Direct activities: 264,155;
- Secondary views: 792,465;
- Total impressions: 1,584,930;
- Multiplier effect: six impressions per interaction.
4. Discussion
4.1. Key Actors in Narrative Formation and Dissemination
4.2. Information Dissemination Patterns
4.3. Formation and Evolution of Opinion Clusters
- Fast initial clustering but with permeable boundaries.
- High information velocity but with significant cross-verification.
- Rapid narrative formation but with multiple competing frames.
- Stabilization of cluster boundaries while maintaining cross-cluster dialogue.
- Emergence of more nuanced narratives.
- Integration of multiple information sources.
- Development of sustained inter-cluster debates.
- Development of sophisticated analytical frames.
- Integration of multiple perspectives.
- Sustained engagement with deeper societal implications.
- Formation of stable but permeable discourse communities.
- Increasing cross-cluster dialogue (20% of total activities).
- Development of shared interpretative frameworks.
- Emergence of bridge nodes facilitating inter-group communication.
- Integration of diverse narrative perspectives.
4.4. Inter-Group Interaction Characteristics
- Strong ties (25%) maintain cluster cohesion while allowing external influence;
- Medium ties (45%) facilitate sustained cross-cluster dialogue;
- Weak ties (30%) enable information exposure across ideological boundaries.
- Structural Role
- Facilitate cross-cluster information flow;
- Maintain network cohesion;
- Enable narrative translation between clusters;
- Support sustained inter-group dialogue.
- Content Function
- Validate information across cluster boundaries;
- Contextualize narratives for different audiences;
- Mediate between competing interpretations;
- Foster constructive cross-cluster dialogue.
- Bridge nodes actively curate and translate content;
- They maintain multiple group affiliations while retaining credibility;
- They facilitate dialogue across ideological boundaries;
- They help sustain long-term network resilience.
- Structural Stability
- Multiple redundant pathways between clusters;
- Sustained cross-cluster dialogue;
- Robust information validation mechanisms;
- Stable but permeable cluster boundaries.
- Content Sustainability
- Evolution from reactive to reflective discourse;
- Development of shared interpretative frameworks;
- Integration of multiple narrative perspectives;
- Sustained engagement with complex issues.
4.5. Theoretical Implications
- Power Dynamics
- Traditional hierarchies persist within network structures;
- Institutional authority adapts rather than dissolves;
- Power flows through multiple, overlapping channels;
- Cultural factors significantly influence network formation.
- Network Architecture
- More resilient than predicted (85% path reliability);
- Higher cross-cluster interaction (20%);
- Sustained rather than temporary connections;
- Complex integration of formal and informal networks.
- Algorithmic Governance
- Platform mechanics influence but do not determine interactions;
- User agency remains significant in shaping information flows;
- Cultural practices modify algorithmic effects;
- Traditional media maintain substantial influence.
- Cultural Adaptation
- Local communication patterns persist;
- Platform features adapt to cultural norms;
- Hybrid forms of authority emerge;
- Traditional institutions maintain relevance.
- Cultural Context
- Information verification through cultural networks;
- Local interpretation of global narratives;
- Community-based fact-checking mechanisms;
- Cultural influence on information credibility.
- Network Effects
- Cross-cluster validation processes;
- Bridge node verification roles;
- Community-based truth arbitration;
- Cultural factors in information assessment.
- Echo Chambers
- Higher cross-cluster interaction than predicted;
- More permeable ideological boundaries;
- Active bridge node facilitation;
- Sustained cross-ideological dialogue.
- Digital Polarization
- More complex than binary opposition;
- Dynamic rather than static clustering;
- Active inter-group dialogue;
- Cultural factors moderating polarization.
4.6. Limitations and Future Research
5. Conclusions
- Develop context-sensitive moderation approaches that address Indonesian cultural and linguistic nuances when evaluating discussions about youth violence.
- Increase transparency regarding how platforms moderate content related to youth violence cases, especially when involving public figures.
- Empower local user communities to participate in platform governance decisions, reflecting Gowder’s call for participatory platform identity and multi-level governance structures.
- Support bridge nodes and legitimate information validators that facilitate cross-community dialogue and verify information.
- Acknowledge the narrative ecosystems shaping digital discourse, rather than focusing solely on individual posts.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- We Are Social; Meltwater. Digital 2024 Indonesia; 2024. Available online: https://wearesocial.com/id/wp-content/uploads/sites/19/2024/02/Digital_2024_Indonesia.pdf (accessed on 27 March 2025).
- Kesdu, I.A.P.; Amalia, I. Perilaku cyberbullying: Peran moral disengagement dan peer attachment pada siswa Sekolah Menengah Pertama (SMP). J. Ecopsy 2021, 8, 129. [Google Scholar] [CrossRef]
- Ruliyatin, E.; Ridhowati, D. Dampak cyber bullying pada pribadi siswa dan penanganannya di era pandemi COVID-19. J. Bikotetik (Bimbing. Dan Konseling Teor. Dan Prakt.) 2021, 5, 1–5. [Google Scholar] [CrossRef]
- Fadila, K.; Sabita, H.; Putri, A.S.; Triloka, J. Pelatihan Internet Sehat Sebagai Antisipasi Cyber Bullying Anak Remaja di Panti Asuhan “Kemala Puji” Bandar Lampung. J. Pengabdi. Masy. Madani (JPMM) 2021, 1, 199–204. [Google Scholar] [CrossRef]
- Koskina, S. The Psychology of Misinformation and Fake News. 2024. Available online: https://www.byarcadia.org/post/the-psychology-of-misinformation-and-fake-news (accessed on 3 January 2025).
- Vidal, C.; Katzenstein, J. Social Media and Mental Health in Children and Teens. 2024. Available online: https://www.hopkinsmedicine.org/health/wellness-and-prevention/social-media-and-mental-health-in-children-and-teens (accessed on 3 January 2025).
- Mendel, R. The Real Cost of “Bad News”: How Misinformation is Undermining Youth Justice Policy in Baltimore; JSTOR: New York, NY, USA, 2024. [Google Scholar]
- Lee, M. The Impact of Media Exposure on Children’s Perception of Violence and Abuse. 2024. Available online: https://www.ncacia.org/post/the-impact-of-media-exposure-on-children-s-perception-of-violence-and-abuse (accessed on 2 January 2025).
- Kusuma, C.S.D. Dampak media sosial dalam gaya hidup sosial (studi kasus pada mahasiswi pendidikan administrasi perkantoran fe uny). EFISIENSI-Kaji. Ilmu Adm. 2020, 17, 15–33. [Google Scholar] [CrossRef]
- Mikhael, L. Sosialisasi Pemahaman Larangan Undang-Undang Informasi Dan Transaksi Elektronik Serta Etika Penggunaan Media Sosial Pada Remaja. AIWADTHU J. Pengabdi. Huk. 2022, 2, 50. [Google Scholar] [CrossRef]
- Patton, D.U.; Hong, J.S.; Ranney, M.; Patel, S.; Kelley, C.; Eschmann, R.; Washington, T. Social media as a vector for youth violence: A review of the literature. Comput. Hum. Behav. 2014, 35, 548–553. [Google Scholar] [CrossRef]
- Castells, M. Networks of Outrage and Hope: Social Movements in the Internet Age, 2nd ed.; Polity Press: Cambridge, UK, 2015. [Google Scholar]
- Boyd, D. Social Media: A Phenomenon to be Analyzed. Soc. Media + Soc. 2015, 1, 1–2. [Google Scholar] [CrossRef]
- van Dijck, J.; Poell, T.; de Waal, M. The Platform Society; Oxford University Press: Oxford, UK, 2018. [Google Scholar]
- Stray, J.; Iyer, R.; Larrauri, H.P. The Algorithmic Management of Polarization and Violence on Social Media. SSRN Electron. J. 2023. [Google Scholar] [CrossRef]
- Livingstone, S.; Third, A. Children and young people’s rights in the digital age: An emerging agenda. New Media Soc. 2017, 19, 657–670. [Google Scholar] [CrossRef]
- Sultan, M.; Scholz, C.; van den Bos, W. Leaving traces behind: Using social media digital trace data to study adolescent wellbeing. Comput. Hum. Behav. Rep. 2023, 10, 100281. [Google Scholar] [CrossRef]
- Chan, T.K.H.; Cheung, C.M.K.; Lee, Z.W.Y. Cyberbullying on social networking sites: A literature review and future research directions. Inf. Manag. 2021, 58, 103411. [Google Scholar] [CrossRef]
- Kowalski, R.M.; Limber, S.P.; McCord, A. A developmental approach to cyberbullying: Prevalence and protective factors. Aggress. Violent Behav. 2019, 45, 20–32. [Google Scholar] [CrossRef]
- Peter, I.-K.; Petermann, F. Cyberbullying: A concept analysis of defining attributes and additional influencing factors. Comput. Hum. Behav. 2018, 86, 350–366. [Google Scholar] [CrossRef]
- Englander, E.; Donnerstein, E.; Kowalski, R.; Lin, C.A.; Parti, K. Defining Cyberbullying. Pediatrics 2017, 140 (Suppl. S2), S148–S151. [Google Scholar] [CrossRef] [PubMed]
- Livingstone, S.; Smith, P.K. Annual Research Review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. J. Child Psychol. Psychiatry 2014, 55, 635–654. [Google Scholar] [CrossRef] [PubMed]
- Wright, M.F. The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents’ Cyber Aggression. J. Interpers. Violence 2020, 35, 1719–1738. [Google Scholar] [CrossRef]
- Bukhori, B.; Nuriyyatiningrum, N.A.H.; Zikrinawati, K.; Liem, A.; Wahib, A.; Darmu’in. Determinant factors of cyberbullying behaviour among Indonesian adolescents. Int. J. Adolesc. Youth 2024, 29, 1–14. [Google Scholar] [CrossRef]
- Safaria, T. Prevalence and impact of cyberbullying in a sample of indonesian junior high school students. TOJET Turk. Online J. Educ. Technol. 2016, 15, 82–91. [Google Scholar]
- Tomassi, A.; Falegnami, A.; Romano, E. Mapping automatic social media information disorder. The role of bots and AI in spreading misleading information in society. PLoS ONE 2024, 19, e0303183. [Google Scholar] [CrossRef]
- Wardle, C.; Derakhshan, H. Information Disorder: Toward an Interdisciplinary Framework for Research and Policy Making Information Disorder Toward an Interdisciplinary Framework for Research and Policymaking. 2017. Available online: www.coe.int (accessed on 10 November 2024).
- Wardle, C. Misunderstanding Misinformation. Issues Sci. Technol. 2023, 29, 38–40. [Google Scholar] [CrossRef]
- Monge, P.R.; Contractor, N. Theories of Communication Networks; Oxford University Press: Oxford, UK, 2003. [Google Scholar] [CrossRef]
- Borgatti, S.P.; Halgin, D.S. Analyzing Affiliation Networks. In The SAGE Handbook of Social Network Analysis; SAGE Publications Ltd.: Thousand Oaks, CA, USA, 2014; pp. 417–433. [Google Scholar] [CrossRef]
- Lim, M. Freedom to hate: Social media, algorithmic enclaves, and the rise of tribal nationalism in Indonesia. Crit. Asian Stud. 2017, 49, 411–427. [Google Scholar] [CrossRef]
- Sinpeng, A. Digital media, political authoritarianism, and Internet controls in Southeast Asia. Media Cult. Soc. 2020, 42, 25–39. [Google Scholar] [CrossRef]
- Anom, A.K.; Sarwono, D.A.; Chandra, Y.C. Fake News Consumption Among Indonesian Generation Z on Twitter During Pandemic COVID-19. J. Theor. Appl. Inf. Technol. 2022, 100, 5110–5118. [Google Scholar]
- Gowder, P. The Networked Leviathan; Cambridge University Press: Cambridge, UK, 2023. [Google Scholar] [CrossRef]
- Gosztonyi, G. Censorship from Plato to Social Media; Springer International Publishing: Cham, Switzerland, 2023; Volume 61. [Google Scholar] [CrossRef]
- Borgatti, S.P.; Mehra, A.; Brass, D.J.; Labianca, G. Network Analysis in the Social Sciences. Science 2009, 323, 892–895. [Google Scholar] [CrossRef]
- Wasserman, S.; Faust, K. Social Network Analysis; Cambridge University Press: Cambridge, UK, 1994. [Google Scholar] [CrossRef]
- Granovetter, M.S. The Strength of Weak Ties. Am. J. Sociol. 1973, 78, 1360–1380. [Google Scholar] [CrossRef]
- Bennett, W.L.; Segerberg, A. The Logic of Connective Action. Inf. Commun. Soc. 2012, 15, 739–768. [Google Scholar] [CrossRef]
- Benkler, Y. The Wealth of Networks: How Social Production Transforms Markets and Freedom; Yale University Press: New Haven, CT, USA, 2006. [Google Scholar]
- Fuchs, C. Critical Theory of Communication : New Readings of Lukács, Adorno, Marcuse, Honneth and Habermas in the Age of the Internet; University of Westminster Press: London, UK, 2017. [Google Scholar]
- van der Linden, S.; Leiserowitz, A.; Rosenthal, S.; Maibach, E. Inoculating the Public against Misinformation about Climate Change. Glob. Chall. 2017, 1, 1600008. [Google Scholar] [CrossRef]
- Lewandowsky, S.; Ecker, U.K.H.; Cook, J. Beyond misinformation: Understanding and coping with the “post-truth” era. J. Appl. Res. Mem. Cogn. 2017, 6, 353–369. [Google Scholar] [CrossRef]
- Sunstein, C.R. Republic; Princeton University Press: Princeton, NJ, USA, 2018. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Irwanto, I.; Bahfiarti, T.; Unde, A.A.; Sonni, A.F. Social Network Analysis of Information Flow and Opinion Formation on Indonesian Social Media: A Case Study of Youth Violence. Adolescents 2025, 5, 18. https://doi.org/10.3390/adolescents5020018
Irwanto I, Bahfiarti T, Unde AA, Sonni AF. Social Network Analysis of Information Flow and Opinion Formation on Indonesian Social Media: A Case Study of Youth Violence. Adolescents. 2025; 5(2):18. https://doi.org/10.3390/adolescents5020018
Chicago/Turabian StyleIrwanto, Irwanto, Tuti Bahfiarti, Andi Alimuddin Unde, and Alem Febri Sonni. 2025. "Social Network Analysis of Information Flow and Opinion Formation on Indonesian Social Media: A Case Study of Youth Violence" Adolescents 5, no. 2: 18. https://doi.org/10.3390/adolescents5020018
APA StyleIrwanto, I., Bahfiarti, T., Unde, A. A., & Sonni, A. F. (2025). Social Network Analysis of Information Flow and Opinion Formation on Indonesian Social Media: A Case Study of Youth Violence. Adolescents, 5(2), 18. https://doi.org/10.3390/adolescents5020018