Chapter 33: Exercises
Inoculation Theory, Prebunking, and Building Resistance
Comprehension Exercises
Exercise 33.1 — The Biological Analogy
McGuire's inoculation theory is grounded in an explicit biological analogy. In your own words:
a) Explain how biological vaccination works, identifying the three key elements (antigen, immune response, memory cells).
b) Map each of those three elements onto McGuire's social inoculation framework. What is the social equivalent of the antigen? The immune response? The memory cells?
c) Identify one respect in which the biological analogy is illuminating and one respect in which it is potentially misleading. Support each judgment with reference to evidence from the chapter.
Exercise 33.2 — Three Components
Section 33.2 identifies three core components of the inoculation mechanism: motivational threat, refutation, and elaboration.
a) Explain why the threat component is described as "the most counterintuitive aspect of inoculation theory." What is the conventional view it challenges?
b) What distinguishes "constructive vigilance" from defensive entrenchment? Why is the distinction important for inoculation design?
c) Explain the relationship between the elaboration component and the central route of processing in Petty and Cacioppo's Elaboration Likelihood Model (referenced in this chapter). Why does deeper processing strengthen belief resistance?
Exercise 33.3 — Content vs. Technique Inoculation
Section 33.4 distinguishes between content inoculation (protection against specific false claims) and technique inoculation (protection against manipulation strategies).
a) Why is technique inoculation described as "more powerful" for the disinformation context?
b) The chapter uses a biological analogy for this distinction: a strain-specific flu vaccine vs. a broad-spectrum antiviral. What are the trade-offs of the broad-spectrum approach in both the biological and social contexts?
c) Van der Linden argues that technique inoculation is more durable against a fast-moving disinformation environment. Under what specific conditions might content inoculation still be preferable to technique inoculation? Describe one such scenario.
Application Exercises
Exercise 33.4 — FLICC Analysis
For each of the following three real-world disinformation examples, identify which FLICC technique(s) are in use and explain the identification:
a) A social media post claiming that "hundreds of scientists have signed a petition rejecting the mainstream climate consensus" (referencing a real petition but not disclosing that the signatories include engineers, geologists, and others without climate expertise, and representing a small fraction of the scientific community).
b) An anti-vaccine message arguing: "Science demands certainty. We cannot be certain that this vaccine is safe for every individual. Therefore, we should not mandate it."
c) A political advertisement showing crime statistics from one year that are unusually high compared to the previous decade's trend, without providing the multi-year trend data.
For each example: (1) name the FLICC technique; (2) explain the logical structure of the manipulation; (3) write a one-sentence "detection rule" that a person inoculated against this technique could use.
Exercise 33.5 — Forewarning Design
The chapter identifies the forewarning as requiring careful calibration: specific enough to activate threat, not so alarming as to trigger reactance.
Below are three draft forewarnings for an inoculation message targeting the cherry-picking technique. Evaluate each one and explain why it hits, misses, or overcorrects the optimal threat level. Then write your own improved forewarning.
Draft A: "Manipulators sometimes use selective data."
Draft B: "You are being systematically deceived. The cherry-picking technique is being used to manipulate your political beliefs and you have probably already fallen for it multiple times without realizing it."
Draft C: "Researchers have identified a persuasion technique called cherry-picking — selectively presenting evidence that supports one conclusion while ignoring contrary evidence — that is frequently used to make weak or false claims appear well-supported. Being aware of how this technique works makes you significantly better at detecting it."
Exercise 33.6 — The Big Tobacco Counterfactual
Section 33.5 raises the counterfactual: what if the public had been inoculated against the manufactured doubt strategy before Big Tobacco deployed it in the 1950s?
Design a brief inoculation message (forewarning + refutation, 200–300 words total) that could have been published in a general-audience magazine in 1950 to prebunk against the impossible expectations and fake expert techniques that tobacco companies would deploy over the following decades.
Your message should: - Be appropriate to a 1950 reading audience (no reference to future events) - Target the specific techniques, not a specific tobacco company or product - Include a detection rule the reader can apply when they encounter these techniques in the future
After writing the message, write a 100-word reflection: what do you think would have happened had this message been widely read in 1950? What limits of inoculation theory does your counterfactual scenario run into?
Exercise 33.7 — Nazi Germany Prebunking Design
Section 33.5 introduces the counterfactual of a prebunking intervention in Weimar Germany in 1932. This exercise asks you to take that counterfactual seriously.
Consider a German citizen in late 1932: educated, politically moderate, reading mainstream newspapers. They will shortly be exposed to Nazi propaganda that systematically uses fake experts (racial scientists), cherry picking (selective economic and crime statistics), and conspiracy framing (Jewish-Bolshevik conspiracy narrative).
a) Which FLICC technique would be most important to inoculate against first, given the 1932 context? Justify your choice.
b) What delivery mechanism would have been realistically available in 1932 Germany? How would you have distributed an inoculation message?
c) What is the most significant limit of inoculation theory that your 1932 scenario runs into? (Consider especially the identity-protection limit and the pre-exposure requirement.)
d) Write a one-paragraph forewarning appropriate for a 1932 German newspaper op-ed column.
Analysis Exercises
Exercise 33.8 — McGuire vs. Van der Linden
Section 33.11 argues that reading McGuire (1961) alongside Roozenbeek et al. (2022) reveals both continuity and transformation in the inoculation research program.
a) Identify three questions that van der Linden's research program asked that McGuire's original design could not address. For each question, explain why the original design was structurally unable to address it.
b) Identify one finding from McGuire's original studies that directly anticipated van der Linden's most important innovation (technique inoculation). How does McGuire's "generalization effect" point toward the technique inoculation hypothesis?
c) McGuire deliberately chose "cultural truisms" as his target beliefs. Van der Linden deliberately chose politically contested beliefs and disinformation claims. What methodological implications does this difference in target belief type have for comparing the two research programs' findings?
Exercise 33.9 — Evaluating the Science Advances Study
Using the research breakdown in Section 33.10, critically evaluate the Roozenbeek et al. (2022) study.
a) The study used pre-registration. Explain what pre-registration is, why it matters for evaluating research findings, and what specific threat to validity it addresses.
b) The study found effect sizes of approximately d=0.10–0.18. Some critics argue these effects are too small to be practically meaningful. Others argue they are substantial given the context. Evaluate both arguments. Where do you come down, and why?
c) The study measured "accuracy discernment" rather than attitude change. Why is accuracy discernment a more appropriate outcome measure for this research question? What would be the problem with using attitude change as the primary outcome?
d) The authors acknowledge that the pre-exposure requirement was guaranteed in the study (all participants received inoculation before exposure). How would you design a study that tests inoculation effectiveness under naturalistic pre-exposure conditions, where some participants have already encountered the disinformation before receiving the inoculation?
Exercise 33.10 — Lippmann's Challenge
Section 33.8 revisits Walter Lippmann's democratic skepticism in light of inoculation theory.
a) Summarize Lippmann's two-level critique of democratic rationality as described in this chapter. Make sure you distinguish the cognitive capacity claim from the manipulation susceptibility claim.
b) Inoculation theory is described as addressing Lippmann's second level but not his first. Do you agree with this characterization? Is there any sense in which technique inoculation also partially addresses the cognitive capacity problem? Explain.
c) Ingrid Larsen argues that inoculation "doesn't claim to solve Lippmann's problem — it claims to make a specific part of the problem more manageable." Is this a satisfying response to Lippmann's challenge, or does it concede too much? Write a 200-word argument for your position.
Synthesis Exercises
Exercise 33.11 — The Debate
The debate in Section 33.12 presents two positions on whether inoculation theory is the right foundation for a societal disinformation defense.
a) Tariq's argument (Position B) claims that inoculation theory may have an "opportunity cost problem": investment in individual-level inoculation may crowd out investment in structural interventions. Evaluate this argument. What empirical evidence would you need to know whether the crowding-out concern is valid?
b) Sophia's argument (Position A) claims that inoculation is "non-paternalistic" because it builds capacity rather than substituting authority. Is this framing correct? Can you think of ways in which inoculation programs could be more paternalistic than content moderation, depending on how they are designed and deployed?
c) The synthesis position argues that inoculation is a "necessary but insufficient" component of a multi-layered disinformation defense. Describe what the other layers of that defense would look like. Draw on arguments from this chapter and earlier in the textbook (especially Chapters 29–32).
Exercise 33.12 — Identity Protection Limit
The identity-protection limit is identified in Section 33.9 as the most behaviorally important limit of inoculation theory.
a) Explain the psychological mechanism behind the identity-protection limit. Why does identity-embedding of a false belief transform the processing of inoculation messages?
b) Van der Linden's response to the identity-protection limit is to design maximally cross-partisan inoculation: using examples from multiple political directions and framing inoculation as protection of epistemic autonomy. Is this design response adequate? What cases would it fail to address?
c) Consider this claim: "The people most vulnerable to dangerous disinformation are exactly the people for whom inoculation is least effective." Evaluate the truth of this claim. Does the evidence reviewed in this chapter support it? What would a research design that tested this claim look like?
Progressive Project Exercise
Exercise 33.13 — Inoculation Campaign Development
This exercise prepares you for the full Progressive Project deliverable in Section 33.14 of the main chapter.
Before completing the full design, answer the following preparatory questions:
a) List three potential manipulation techniques (from the FLICC taxonomy) that are relevant to your chosen target community and domain. For each, provide one real-world example of the technique being deployed in your domain.
b) For your preferred technique target, describe the "pre-exposure window" problem: when and how do members of your target audience typically first encounter this technique? Is there a realistic window in which you could deploy inoculation before that first encounter?
c) Write a rough draft "detection rule" — a short, memorable heuristic — for your target technique. Test it against two novel examples of the technique: does the detection rule successfully identify both?
d) Identify the most significant identity-protection concern for your specific design. Is the target false belief identity-embedded for your audience? How will you handle this in your forewarning design?
Answers to selected exercises are available in the textbook's Answer Key (Appendix B).