Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: Social Network Analysis and Mining 1/2022

01-12-2022 | Original Article

Credibility aspects’ perceptions of social networks, a survey

Authors: Amira M. Idrees, Yehia Helmy, Ayman E. Khedr

Published in: Social Network Analysis and Mining | Issue 1/2022

Login to get access
share
SHARE

Abstract

Social networks are currently considered the universally superior information source for people as well as organizations. This source is considered as one of the main components featuring an immense variety of successful applications that support different contexts. During disasters, social networks have been vital actors in information dissemination as they, not surprisingly, gained a critical role in the communities’ networks. Social networks not only provide a flood of information, but this information is naturally supported by the participants’ opinions, sentiments, and emotions. Therefore, ensuring an acceptable level of credibility for social media information is a vital subject to discuss. This research aims at highlighting the role of social networks in different fields such as in the health field and retailing field. Before discussing this role, the research provided many other aspects in this scope including the affecting factors on the information credibility, the role of the key actors in raising the level of credibility, and others. The research highlighted the contributing techniques in evaluating the level of credibility as well as their influence level. Moreover, different perspectives of information credibility are discussed including social networks’ credibility, email, news, and opinions’ credibility. Finally, the research discussed the effect of credibility in the health field. The researchers of this paper argue that the included summaries of the researches effectively contribute to an understanding of the field gaps and is a great value for the researchers in the same field to gain a higher understanding of the credibility, the nature of the social networks’ contents, and the manipulation aspects.
Literature
go back to reference Adams S (2010) Revisiting the online health information reliability debate in the wake of web 2.0: an inter interdisciplinary. Int J Med Inf 79:391–400 CrossRef Adams S (2010) Revisiting the online health information reliability debate in the wake of web 2.0: an inter interdisciplinary. Int J Med Inf 79:391–400 CrossRef
go back to reference Afify E, Sharaf Eldin A, Khedr AE, Alsheref FK (2019) User-generated content (UGC) credibility on social media using sentiment classification. FCI-H Inform Bull 1(1):1–19 Afify E, Sharaf Eldin A, Khedr AE, Alsheref FK (2019) User-generated content (UGC) credibility on social media using sentiment classification. FCI-H Inform Bull 1(1):1–19
go back to reference AlMansour A, Brankovic L, Iliopoulos C (2014) A model for recalibrating credibility in different contexts and languages, a twitter case study. Int J Digital Inf Wirel Commun 4:53–62 AlMansour A, Brankovic L, Iliopoulos C (2014) A model for recalibrating credibility in different contexts and languages, a twitter case study. Int J Digital Inf Wirel Commun 4:53–62
go back to reference Almazroi AA, Khedr AE, Idrees AM (2021) A proposed customer relationship framework based on information retrieval for effective firms’ competitiveness. Expert Sys Appl 176:114882 CrossRef Almazroi AA, Khedr AE, Idrees AM (2021) A proposed customer relationship framework based on information retrieval for effective firms’ competitiveness. Expert Sys Appl 176:114882 CrossRef
go back to reference Alrubaian M, Al-Qurishi M, Alamri A, Al-Rakhami M, Hassan MM, Fortino G (2019) Credibility in online social networks: a survey. IEEE Access 7:2828–2855 CrossRef Alrubaian M, Al-Qurishi M, Alamri A, Al-Rakhami M, Hassan MM, Fortino G (2019) Credibility in online social networks: a survey. IEEE Access 7:2828–2855 CrossRef
go back to reference Atzmueller M (2012) Mining social media: key players, sentiments, and communities. Wires Data Min Knowl Discovery 2:411–419 CrossRef Atzmueller M (2012) Mining social media: key players, sentiments, and communities. Wires Data Min Knowl Discovery 2:411–419 CrossRef
go back to reference Atzmueller M, Doerfel S, Hotho A, Mitzlaff F, Stumme G (2011) Face-to-face contacts at a conference: dynamics of communities and roles. Modeling and mining ubiquitous social media. Springer, Berlin, pp 21–39 Atzmueller M, Doerfel S, Hotho A, Mitzlaff F, Stumme G (2011) Face-to-face contacts at a conference: dynamics of communities and roles. Modeling and mining ubiquitous social media. Springer, Berlin, pp 21–39
go back to reference Atzmueller M, Lemmerich F (2012) VIKAMINE—opensource subgroup discovery, pattern mining, and analytics. In: Proceedings of ECML/PKDD 2012: European conference on machine learning and principles and practice of knowledge discovery in databases, Springer, Germany Atzmueller M, Lemmerich F (2012) VIKAMINE—opensource subgroup discovery, pattern mining, and analytics. In: Proceedings of ECML/PKDD 2012: European conference on machine learning and principles and practice of knowledge discovery in databases, Springer, Germany
go back to reference Bahgat E, Rady S, Gad W, Moawad I (2018) Efficient email classification approach based on semantic methods. Ain Shams Eng J 9(4):3259–3269 CrossRef Bahgat E, Rady S, Gad W, Moawad I (2018) Efficient email classification approach based on semantic methods. Ain Shams Eng J 9(4):3259–3269 CrossRef
go back to reference Banerjee S, Chua A (2014) Applauses in hotel reviews:genuine or deceptive? Science and Information Conference (SAI). IEEE, London, pp 938–942 Banerjee S, Chua A (2014) Applauses in hotel reviews:genuine or deceptive? Science and Information Conference (SAI). IEEE, London, pp 938–942
go back to reference Barushka A, Hajek P (2018) Spam filtering using integrated distribution-based balancing approach and regularized deep neural networks. Appl Intell 48:3538–3556 CrossRef Barushka A, Hajek P (2018) Spam filtering using integrated distribution-based balancing approach and regularized deep neural networks. Appl Intell 48:3538–3556 CrossRef
go back to reference Batrinca B, Treleaven P (2015) Social media analytics: a survey of techniques, tools and platforms. AI Society 30(1):89–116 CrossRef Batrinca B, Treleaven P (2015) Social media analytics: a survey of techniques, tools and platforms. AI Society 30(1):89–116 CrossRef
go back to reference Briscoe E, Appling D, Hayes H (2015) Social network derived credibility. Recommendation and search in social networks. Springer, Cham, pp 59–75 Briscoe E, Appling D, Hayes H (2015) Social network derived credibility. Recommendation and search in social networks. Springer, Cham, pp 59–75
go back to reference Canini K, Suh B, Pirolli P (2010) Finding relevant sources in twitter based on content and social structure. Proc NIPS MLSN Workshop 7:2829–2855 Canini K, Suh B, Pirolli P (2010) Finding relevant sources in twitter based on content and social structure. Proc NIPS MLSN Workshop 7:2829–2855
go back to reference Castillo C, Mendoza M, Poblete B (2011) Information credibility on Twitter. In: The 20th International Conference World Wide Web, Hyderabad Castillo C, Mendoza M, Poblete B (2011) Information credibility on Twitter. In: The 20th International Conference World Wide Web, Hyderabad
go back to reference Castillo MM, Poblete B (2013) Predicting information credibility in time-sensitive social media. Internet Res 23:560–588 CrossRef Castillo MM, Poblete B (2013) Predicting information credibility in time-sensitive social media. Internet Res 23:560–588 CrossRef
go back to reference Cohen Y, Gordon D, Hendler D (2018) Early detection of spamming accounts in large-Scale service provider networks. Knowl Based Syst 142:241–255 CrossRef Cohen Y, Gordon D, Hendler D (2018) Early detection of spamming accounts in large-Scale service provider networks. Knowl Based Syst 142:241–255 CrossRef
go back to reference Croft B, Lafferty J (2013) Language modeling for information retrieval, vol 13. Springer, Dordrecht MATH Croft B, Lafferty J (2013) Language modeling for information retrieval, vol 13. Springer, Dordrecht MATH
go back to reference Di S, Shen Y, Chen L (2019) Relation extraction via domain-aware transfer learning. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1348–1357 Di S, Shen Y, Chen L (2019) Relation extraction via domain-aware transfer learning. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1348–1357
go back to reference Fairbanks J, Fitch N, Knauf N, Briscoe E (2018) Credibility assessment in the news: do we need to read? In: Proceedings of the MIS2 Workshop held in conjuction with 11th International Conference on Web Search and Data Mining Fairbanks J, Fitch N, Knauf N, Briscoe E (2018) Credibility assessment in the news: do we need to read? In: Proceedings of the MIS2 Workshop held in conjuction with 11th International Conference on Web Search and Data Mining
go back to reference Filieri R, Hofacker CF, Alguezaui S (2018a) What makes information in online consumer reviews diagnostic over time? The role of review relevancy, factuality, currency, source credibility and ranking score. Comput Hum Behav 80:122–131 CrossRef Filieri R, Hofacker CF, Alguezaui S (2018a) What makes information in online consumer reviews diagnostic over time? The role of review relevancy, factuality, currency, source credibility and ranking score. Comput Hum Behav 80:122–131 CrossRef
go back to reference Filieri R, McLeay F, Tsui B, Lin Z (2018b) Consumer perceptions of information helpfulness and determinants of purchase intention in online consumer reviews of services. Inf Manag 55(8):956–970 CrossRef Filieri R, McLeay F, Tsui B, Lin Z (2018b) Consumer perceptions of information helpfulness and determinants of purchase intention in online consumer reviews of services. Inf Manag 55(8):956–970 CrossRef
go back to reference Fusilier DH, Montes Gomez M, Rosso P, Cabrera RG (2015) Detection of opinion spam with character n-grams. International conference on intelligent text processing and computational linguistics. Springer, Cham, pp 285–294 Fusilier DH, Montes Gomez M, Rosso P, Cabrera RG (2015) Detection of opinion spam with character n-grams. International conference on intelligent text processing and computational linguistics. Springer, Cham, pp 285–294
go back to reference Gupta A, Kumaraguru P (2012) Credibility ranking of tweets during high impact events. Proceedings of the 1st Workshop Privacy Secur, Online Social Media Gupta A, Kumaraguru P (2012) Credibility ranking of tweets during high impact events. Proceedings of the 1st Workshop Privacy Secur, Online Social Media
go back to reference Hanselowski A, Avinesh P, Schiller B, Caspelherr F, Chaudhuri D, Meyer C, Gurevych I (2018) A retrospective analysis of the fake news challenge stance-detection task. In: Proceedings of the 27th International Conference on Computational Linguistics, pp. 1859–1874 Hanselowski A, Avinesh P, Schiller B, Caspelherr F, Chaudhuri D, Meyer C, Gurevych I (2018) A retrospective analysis of the fake news challenge stance-detection task. In: Proceedings of the 27th International Conference on Computational Linguistics, pp. 1859–1874
go back to reference Helmy Y, Khedr AE, Kolief S, Haggag E (2019) An enhanced business intelligence approach for increasing customer satisfaction using mining techniques. Int J Comp Sci Inf Secur (IJCSIS), 17(4) Helmy Y, Khedr AE, Kolief S, Haggag E (2019) An enhanced business intelligence approach for increasing customer satisfaction using mining techniques. Int J Comp Sci Inf Secur (IJCSIS), 17(4)
go back to reference Horne BD, Adali S (2017) This just in: fake news packs a lot in title, uses simpler, repetitive content in text body, more similar to satire than real news. arXiv preprint, arXiv:​1703.​09398 Horne BD, Adali S (2017) This just in: fake news packs a lot in title, uses simpler, repetitive content in text body, more similar to satire than real news. arXiv preprint, arXiv:​1703.​09398
go back to reference Hosseinimotlagh S, Papalexakis E (2018) Unsupervised content-based identication of fake news articles with tensor decomposition ensembles. In: Proceedings of the MIS2 Workshop held in conjuction with 11th International Conference on Web Search and Data Mining Hosseinimotlagh S, Papalexakis E (2018) Unsupervised content-based identication of fake news articles with tensor decomposition ensembles. In: Proceedings of the MIS2 Workshop held in conjuction with 11th International Conference on Web Search and Data Mining
go back to reference Hussain S, Melewar T, Priporas C-V, Foroudi P (2020) Examining the effects of celebrity trust on advertising credibility, brand credibility and corporate credibility. J Bus Res 109:472–488 CrossRef Hussain S, Melewar T, Priporas C-V, Foroudi P (2020) Examining the effects of celebrity trust on advertising credibility, brand credibility and corporate credibility. J Bus Res 109:472–488 CrossRef
go back to reference Idrees AM, Alsheref FK, ElSeddawy A (2019) A proposed model for detecting facebook news’ credibility. Int J Adv Comp Sci Appl, 10(7) Idrees AM, Alsheref FK, ElSeddawy A (2019) A proposed model for detecting facebook news’ credibility. Int J Adv Comp Sci Appl, 10(7)
go back to reference Idrees AM, Khedr AE (2022) A collaborative mining-based decision support model for granting personal loans in the banking sector. Int J E-Services Mobile Appl (IJESMA) 14(1):1–23 CrossRef Idrees AM, Khedr AE (2022) A collaborative mining-based decision support model for granting personal loans in the banking sector. Int J E-Services Mobile Appl (IJESMA) 14(1):1–23 CrossRef
go back to reference Ikegami Y, Kawai K, Namihira Y, Tsuruta S (2013) High precision credibility analysis of information on Twitter. IEEE Interanational Conference Syst, Man, Cybern, pp. 4676–4681 Ikegami Y, Kawai K, Namihira Y, Tsuruta S (2013) High precision credibility analysis of information on Twitter. IEEE Interanational Conference Syst, Man, Cybern, pp. 4676–4681
go back to reference Ismagilova E, Emma S, Ranac NP, Dwivedi YK (2020) The effect of characteristics of source credibility on consumer behaviour: a meta-analysis. J Retail Consum Serv 53:101736 CrossRef Ismagilova E, Emma S, Ranac NP, Dwivedi YK (2020) The effect of characteristics of source credibility on consumer behaviour: a meta-analysis. J Retail Consum Serv 53:101736 CrossRef
go back to reference Jindal N, Liu B (2008) Opinion spam and analysis. Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219–230 Jindal N, Liu B (2008) Opinion spam and analysis. Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219–230
go back to reference Karim A, Azam S, Kannoorpatti K, Alazab M (2019) A Comprehensive survey for intelligent spam email detection. IEEE Access 7:168261–168295 CrossRef Karim A, Azam S, Kannoorpatti K, Alazab M (2019) A Comprehensive survey for intelligent spam email detection. IEEE Access 7:168261–168295 CrossRef
go back to reference Khedr A, Kholeif S, Saad F (2017) An integrated business intelligence framework for healthcare analytics. Int J Adv Res Comp Sci Softw Eng 7(5):263–270 Khedr A, Kholeif S, Saad F (2017) An integrated business intelligence framework for healthcare analytics. Int J Adv Res Comp Sci Softw Eng 7(5):263–270
go back to reference Khedr AE, Idrees AM, Alsheref FK (2019) A proposed framework to explore semantic relations for learning process management. Int J e-Collab 15(4):46–70 Khedr AE, Idrees AM, Alsheref FK (2019) A proposed framework to explore semantic relations for learning process management. Int J e-Collab 15(4):46–70
go back to reference Khedr AE, Idrees AM, Shabaan E (2020) Automated Ham-Spam lexicon generation based on semantic relations extraction. Int J e-Collab (IJeC) 16(2):45–64 Khedr AE, Idrees AM, Shabaan E (2020) Automated Ham-Spam lexicon generation based on semantic relations extraction. Int J e-Collab (IJeC) 16(2):45–64
go back to reference Khedr AE, Idrees AM, Salem R (2021) Enhancing the e-learning system based on a novel tasks’ classification load-balancing algorithm. PeerJ Comp Sci 7:e669 CrossRef Khedr AE, Idrees AM, Salem R (2021) Enhancing the e-learning system based on a novel tasks’ classification load-balancing algorithm. PeerJ Comp Sci 7:e669 CrossRef
go back to reference Lai C, Xu KQ, Lau RY, Li Y, Jing L (2010) Toward a language modeling approach for consumer review spam detection. 7th International Conference on E-Business Engineering, pp. 1–8 Lai C, Xu KQ, Lau RY, Li Y, Jing L (2010) Toward a language modeling approach for consumer review spam detection. 7th International Conference on E-Business Engineering, pp. 1–8
go back to reference Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on Twitter during hurricane sandy. The 22nd International Conference World Wide Web Companion, Rio de Janeiro Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on Twitter during hurricane sandy. The 22nd International Conference World Wide Web Companion, Rio de Janeiro
go back to reference Lau RY, Liao S, Kwok R, Xu, K, Xia Y, Li Y (2012) Text mining and probabilistic language modeling for online review spam detection. ACM Trans Manag Inf Syst, 2(4) Lau RY, Liao S, Kwok R, Xu, K, Xia Y, Li Y (2012) Text mining and probabilistic language modeling for online review spam detection. ACM Trans Manag Inf Syst, 2(4)
go back to reference Lee C, Chen Y, Tzeng W (2017) An online subject-based spam filter using natural language features. In: Proceedings of IEEE Conference Dependable Secure Computing, pp. 479–487 Lee C, Chen Y, Tzeng W (2017) An online subject-based spam filter using natural language features. In: Proceedings of IEEE Conference Dependable Secure Computing, pp. 479–487
go back to reference Li R, Suh A (2015) Factors influencing information credibility on social media platforms: evidence from facebook pages. The Third Inf Syst Int Conf, Proc Comp Sci 72:314–328 Li R, Suh A (2015) Factors influencing information credibility on social media platforms: evidence from facebook pages. The Third Inf Syst Int Conf, Proc Comp Sci 72:314–328
go back to reference Li F, Huang M, Yang Y, Zhu X (2011) Learning to identify review spam. IJCAI proceedings—international joint conference on artificial intelligence. AAAI Press, Barcelona, pp 2488–2493 Li F, Huang M, Yang Y, Zhu X (2011) Learning to identify review spam. IJCAI proceedings—international joint conference on artificial intelligence. AAAI Press, Barcelona, pp 2488–2493
go back to reference Li Y, Wang X, Lin X, Hajli M (2018) Seeking and sharing health information on social media: a net valence model and cross-cultural comparison. Technol Forecast Soc Change 126:28–40 CrossRef Li Y, Wang X, Lin X, Hajli M (2018) Seeking and sharing health information on social media: a net valence model and cross-cultural comparison. Technol Forecast Soc Change 126:28–40 CrossRef
go back to reference Lin H, Yan J, Qu M, Ren X (2019) Learning dual retrieval module for semi-supervised relation extraction. The World Wide Web Conference, pp. 1073–1083 Lin H, Yan J, Qu M, Ren X (2019) Learning dual retrieval module for semi-supervised relation extraction. The World Wide Web Conference, pp. 1073–1083
go back to reference Luca M, Zervas G (2016) Fake it till you make it: reputation, competition, and yelp review fraud. Manag Sci 62(12):3412–3427 CrossRef Luca M, Zervas G (2016) Fake it till you make it: reputation, competition, and yelp review fraud. Manag Sci 62(12):3412–3427 CrossRef
go back to reference Luo C, Luo X, Xu Y, Warkentin M, Sia C (2015) Examining the moderating role of sense of membership in online review evaluations. Inf Manag 52(3):305–316 CrossRef Luo C, Luo X, Xu Y, Warkentin M, Sia C (2015) Examining the moderating role of sense of membership in online review evaluations. Inf Manag 52(3):305–316 CrossRef
go back to reference Mahdavinejad M, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth A (2018) Machine learning for internet of things data analysis: a survey. Digital Commun Netw 4(3):161–175 CrossRef Mahdavinejad M, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth A (2018) Machine learning for internet of things data analysis: a survey. Digital Commun Netw 4(3):161–175 CrossRef
go back to reference McKnight H, Kacmar C (2006) Factors of information credibility for an internet advice site. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS) McKnight H, Kacmar C (2006) Factors of information credibility for an internet advice site. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS)
go back to reference Méndez J, Cotos-Yañez T, Ruano-Ordás D (2019) A new semantic-based feature selection method for spam filtering. Appl Soft Comput 76:89–104 CrossRef Méndez J, Cotos-Yañez T, Ruano-Ordás D (2019) A new semantic-based feature selection method for spam filtering. Appl Soft Comput 76:89–104 CrossRef
go back to reference Middleton S (2015) Extracting attributed verification and debunking reports from social media: MediaEval-2015 trust and credibility analysis of image and video. In: Proceedings of MediaEval Workshop. Wurzen, Germany Middleton S (2015) Extracting attributed verification and debunking reports from social media: MediaEval-2015 trust and credibility analysis of image and video. In: Proceedings of MediaEval Workshop. Wurzen, Germany
go back to reference Mohsen AM, Idrees AM, Hassan HA (2019) Emotion analysis for opinion mining from text: a comparative study. Int J e-Collab 15(1):38–58 Mohsen AM, Idrees AM, Hassan HA (2019) Emotion analysis for opinion mining from text: a comparative study. Int J e-Collab 15(1):38–58
go back to reference Mukherjee A, Venkataraman V, Liu B, Glance N (2013) What yelp fake review filter might be doing? In: The 7th International AAAI Conference on Weblogs and Social Media Mukherjee A, Venkataraman V, Liu B, Glance N (2013) What yelp fake review filter might be doing? In: The 7th International AAAI Conference on Weblogs and Social Media
go back to reference Mukherjee S, Weikum G, Danescu-Niculescu-Mizil C (2014) People on drugs: credibility of user statements in health communities. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 65–74 Mukherjee S, Weikum G, Danescu-Niculescu-Mizil C (2014) People on drugs: credibility of user statements in health communities. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 65–74
go back to reference Naiem S, Khedr AE, Marie M, Idrees AM (2022) Distributed denial of services attacks and their prevention in cloud services. J Theor Appl Inf Technol 100(4):1170–1181 Naiem S, Khedr AE, Marie M, Idrees AM (2022) Distributed denial of services attacks and their prevention in cloud services. J Theor Appl Inf Technol 100(4):1170–1181
go back to reference Nakawatase H, Oyama K, Han H (2014) Evaluating credibility of interest reflection on Twitter. Int J Web Inf Syst 10(4):343–362 CrossRef Nakawatase H, Oyama K, Han H (2014) Evaluating credibility of interest reflection on Twitter. Int J Web Inf Syst 10(4):343–362 CrossRef
go back to reference Oh S, Yi Y, Worrall A (2013) Quality of health answers in social q&a. Proceedings of the American Society for Information Science and Technology Oh S, Yi Y, Worrall A (2013) Quality of health answers in social q&a. Proceedings of the American Society for Information Science and Technology
go back to reference Othman M, Hassan H, Moawad R, Idrees AM (2018) A linguistic approach for opinionated documents summary. Future Comput Inf J 3(2):152–158 CrossRef Othman M, Hassan H, Moawad R, Idrees AM (2018) A linguistic approach for opinionated documents summary. Future Comput Inf J 3(2):152–158 CrossRef
go back to reference Ott M, Choi Y, Cardie C, Hancock J (2011) Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies, Portland: Association for Computational Linguistics, pp. 19–24 Ott M, Choi Y, Cardie C, Hancock J (2011) Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies, Portland: Association for Computational Linguistics, pp. 19–24
go back to reference Ott M, Cardie C, & Hancock J (2012) Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st International Conference on World Wide Web, pp. 201–210 Ott M, Cardie C, & Hancock J (2012) Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st International Conference on World Wide Web, pp. 201–210
go back to reference Perez-Rosas V, Kleinberg B, Lefevre A, Mihalcea R (2018) Automatic detection of fake news. In: Proceedings of the 27th International Conference on Computational Linguistics, Portland: Association for Computational Linguistics, pp. 3391–3401 Perez-Rosas V, Kleinberg B, Lefevre A, Mihalcea R (2018) Automatic detection of fake news. In: Proceedings of the 27th International Conference on Computational Linguistics, Portland: Association for Computational Linguistics, pp. 3391–3401
go back to reference Pierri F, Ceri S (2019) False news on social media: a data-driven survey. ACM SIGMOD Rec 48(2):18–27 CrossRef Pierri F, Ceri S (2019) False news on social media: a data-driven survey. ACM SIGMOD Rec 48(2):18–27 CrossRef
go back to reference Popat K, Mukherjee S, Yates A, Weikum G (2018) Declare: Debunking fake news and false claims using evidence-aware deep learning. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, pp. 22–32 Popat K, Mukherjee S, Yates A, Weikum G (2018) Declare: Debunking fake news and false claims using evidence-aware deep learning. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, pp. 22–32
go back to reference Potthast, M., Kiesel, J., Reinartz, K., Bevendor, J., & Stein, B. (2018). A stylometric inquiry into hyperpartisan and fake news. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, Portlang: Association for Computational Linguistics, pp. 231–240 Potthast, M., Kiesel, J., Reinartz, K., Bevendor, J., & Stein, B. (2018). A stylometric inquiry into hyperpartisan and fake news. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, Portlang: Association for Computational Linguistics, pp. 231–240
go back to reference Rains S, Karmikel C (2009) Health information seeking and perceptions of website credibility examining web-use orientation, message characteristics and structural features of websites. Comput Hum Behav 25:544–553 CrossRef Rains S, Karmikel C (2009) Health information seeking and perceptions of website credibility examining web-use orientation, message characteristics and structural features of websites. Comput Hum Behav 25:544–553 CrossRef
go back to reference Riedel B, Augenstein I, Spithourakis G, Riedel S (2017) A simple but tough-to-beat baseline for the fake news challenge stance detection task. Computer Science. ArXiv, arXiv:​1707.​03264 Riedel B, Augenstein I, Spithourakis G, Riedel S (2017) A simple but tough-to-beat baseline for the fake news challenge stance detection task. Computer Science. ArXiv, arXiv:​1707.​03264
go back to reference Roy S, Sinha A, Roy R, Barna V, Samui P (2017) Spam email detection using deep support vector machine, support vector machine and artificial neural network. Soft Comput Appl 634:162–174 CrossRef Roy S, Sinha A, Roy R, Barna V, Samui P (2017) Spam email detection using deep support vector machine, support vector machine and artificial neural network. Soft Comput Appl 634:162–174 CrossRef
go back to reference Ruano-Ordás D, Fdez-Riverola F, Méndez J (2018) Using evolutionary computation for discovering spam patterns from e-mail samples. Inf Process Manage 54(2):303–317 CrossRef Ruano-Ordás D, Fdez-Riverola F, Méndez J (2018) Using evolutionary computation for discovering spam patterns from e-mail samples. Inf Process Manage 54(2):303–317 CrossRef
go back to reference Saez-Trumper D (2014) Fake tweet buster: a Webtool to identify users promoting fake news on Twitter. In: Proceeding of the 25th ACM Conference Hypertext Social Media, pp. 316–317 Saez-Trumper D (2014) Fake tweet buster: a Webtool to identify users promoting fake news on Twitter. In: Proceeding of the 25th ACM Conference Hypertext Social Media, pp. 316–317
go back to reference Saikaew K, Noyunsan C (2015) Features for measuring credibility on facebook information. Int J Comput Inf Eng 9(1):174–177 Saikaew K, Noyunsan C (2015) Features for measuring credibility on facebook information. Int J Comput Inf Eng 9(1):174–177
go back to reference Sheeraz M, Iqbal N, Ahmed N (2012) Impact of brand credibility and consumer values on consumer purchase intentions in Pakistan. Int J Acad Res Bus Soc Sci 2(8):1 Sheeraz M, Iqbal N, Ahmed N (2012) Impact of brand credibility and consumer values on consumer purchase intentions in Pakistan. Int J Acad Res Bus Soc Sci 2(8):1
go back to reference Sheu J, Chu K, Li N, Lee C (2017) An efficient incremental learning mechanism for tracking concept drift in spam filtering. PLoS ONE 12(2):e0171518 CrossRef Sheu J, Chu K, Li N, Lee C (2017) An efficient incremental learning mechanism for tracking concept drift in spam filtering. PLoS ONE 12(2):e0171518 CrossRef
go back to reference Sikdar S, Adali S, Amin M, Abdelzaher T, Chan K, Cho J, O'Donovan J (2014) Finding true and credible information on Twitter. In: Proceeding of the 17th International Conference Infusion Fusion (FUSION), pp. 1–8 Sikdar S, Adali S, Amin M, Abdelzaher T, Chan K, Cho J, O'Donovan J (2014) Finding true and credible information on Twitter. In: Proceeding of the 17th International Conference Infusion Fusion (FUSION), pp. 1–8
go back to reference Snyder H (2019) Literature review as a research methodology: an overview and guidelines. J Bus Res 104:333–339 CrossRef Snyder H (2019) Literature review as a research methodology: an overview and guidelines. J Bus Res 104:333–339 CrossRef
go back to reference Sosnkowski A, Carol JF, Shivram R (2021) An analysis of Twitter users’ long term political view migration using cross-account data mining. Online Soc Netw Media 26:100177 CrossRef Sosnkowski A, Carol JF, Shivram R (2021) An analysis of Twitter users’ long term political view migration using cross-account data mining. Online Soc Netw Media 26:100177 CrossRef
go back to reference Sun H, Morales A, Yan X (2013) Synthetic review spamming and defense. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York: ACM, pp. 1088–1096 Sun H, Morales A, Yan X (2013) Synthetic review spamming and defense. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York: ACM, pp. 1088–1096
go back to reference Vargo C, Guo L, Amazeen M (2018) The agenda-setting power of fake news: a big data analysis of the online media landscape from 2014 to 2016. New Media Soc 20(5):2028–2049 CrossRef Vargo C, Guo L, Amazeen M (2018) The agenda-setting power of fake news: a big data analysis of the online media landscape from 2014 to 2016. New Media Soc 20(5):2028–2049 CrossRef
go back to reference Viviani M, Pasi G (2017) Credibility in social media:opinions, news, and health information—a survey. WIREs Data Min Knowl Discov 7:12 Viviani M, Pasi G (2017) Credibility in social media:opinions, news, and health information—a survey. WIREs Data Min Knowl Discov 7:12
go back to reference Viviani M, Pasi G (2017b) Quantifier guided aggregation for the veracity assessment of online reviews. Int J Intell Syst 32(5):481–501 CrossRef Viviani M, Pasi G (2017b) Quantifier guided aggregation for the veracity assessment of online reviews. Int J Intell Syst 32(5):481–501 CrossRef
go back to reference Wang D (2014) Analysis and detection of low quality information in social networks. In: 2014 IEEE 30th International Conference on Data Engineering Workshops Wang D (2014) Analysis and detection of low quality information in social networks. In: 2014 IEEE 30th International Conference on Data Engineering Workshops
go back to reference Wang Z, Hou T, Song D, Li Z, Kong T (2016a) Detecting review spammer groups via bipartite graph projection. Comput J 59(6):861–874 CrossRef Wang Z, Hou T, Song D, Li Z, Kong T (2016a) Detecting review spammer groups via bipartite graph projection. Comput J 59(6):861–874 CrossRef
go back to reference Wang Z, Hou T, Song D, Li Z, Kong T (2016b) A review of relational machine learning for knowledge graphs. Proc IEEE 104(1):11–33 CrossRef Wang Z, Hou T, Song D, Li Z, Kong T (2016b) A review of relational machine learning for knowledge graphs. Proc IEEE 104(1):11–33 CrossRef
go back to reference Wang Y, Ma F, Jin Z, Yuan Y, Xun G, Jha K, Gao J (2018) Eann: Event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 849–857 Wang Y, Ma F, Jin Z, Yuan Y, Xun G, Jha K, Gao J (2018) Eann: Event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 849–857
go back to reference Wassermann S, Faust K (1994) Social network analysis. Cambridge University Press, Cambridge CrossRef Wassermann S, Faust K (1994) Social network analysis. Cambridge University Press, Cambridge CrossRef
go back to reference Weitzel L, de Oliveira J, Quaresma P (2014) Measuring the reputation in user-generated-content systems based on health information. Proc Comput Sci 29:364–378 CrossRef Weitzel L, de Oliveira J, Quaresma P (2014) Measuring the reputation in user-generated-content systems based on health information. Proc Comput Sci 29:364–378 CrossRef
go back to reference Westerman D, Spence P, Van Der Heide B (2012) A social network as information: the effect of system generated reports of connectedness on credibility on Twitter. Comput Hum Behav 28:199–206 CrossRef Westerman D, Spence P, Van Der Heide B (2012) A social network as information: the effect of system generated reports of connectedness on credibility on Twitter. Comput Hum Behav 28:199–206 CrossRef
go back to reference Wu X, Feng Z, Fan W, Gao J, Yu Y (2013) Detecting marionette microblog users for improved information credibility. Machine learning and knowledge discovery in databases. Springer, Berlin, pp 483–498 Wu X, Feng Z, Fan W, Gao J, Yu Y (2013) Detecting marionette microblog users for improved information credibility. Machine learning and knowledge discovery in databases. Springer, Berlin, pp 483–498
go back to reference Wu L, Liu H (2018) Tracing fake-news footprints: characterizing social media messages by how they propagate. In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, pp. 637–645 Wu L, Liu H (2018) Tracing fake-news footprints: characterizing social media messages by how they propagate. In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, pp. 637–645
go back to reference Xia X, Yang X, Wu C, Li S, Bao L (2012) Information credibility on twitter in emergency situation. Intelligence and security informatics. Springer, Heidelberg, pp 45–59 CrossRef Xia X, Yang X, Wu C, Li S, Bao L (2012) Information credibility on twitter in emergency situation. Intelligence and security informatics. Springer, Heidelberg, pp 45–59 CrossRef
go back to reference Xiao N, Sharman R, Rao H, Upadhyaya S (2014) Factors influencing online health information search: an empirical analysis of a national cancer-related survey. Decis Support Syst 57:417–427 CrossRef Xiao N, Sharman R, Rao H, Upadhyaya S (2014) Factors influencing online health information search: an empirical analysis of a national cancer-related survey. Decis Support Syst 57:417–427 CrossRef
go back to reference Yang S, Shu K, Wang S, Gu R, Wu F, Liu H (2019) Unsupervised fake news detection on social media: a generative approach. Proc 33rd AAAI Conf Artif Int 33:5644–5651 Yang S, Shu K, Wang S, Gu R, Wu F, Liu H (2019) Unsupervised fake news detection on social media: a generative approach. Proc 33rd AAAI Conf Artif Int 33:5644–5651
go back to reference Yasser F, AbdelMawgoud S, Idrees AM (2022) Mining perspectives for news credibility: the road to trust social networks. In: Zhao J (ed) Handbook of research on technologies and systems for E-collaboration during global crises. IGI Global, Hershey Yasser F, AbdelMawgoud S, Idrees AM (2022) Mining perspectives for news credibility: the road to trust social networks. In: Zhao J (ed) Handbook of research on technologies and systems for E-collaboration during global crises. IGI Global, Hershey
go back to reference Ye J, Akoglu L (2015) Discovering opinion spammer groups by network footprints. Joint European conference on machine learning and knowledge discovery in databases. Springer, Cham, pp 267–282 CrossRef Ye J, Akoglu L (2015) Discovering opinion spammer groups by network footprints. Joint European conference on machine learning and knowledge discovery in databases. Springer, Cham, pp 267–282 CrossRef
go back to reference Zhou X, Zafarani R (2020) A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput Surv 53(5):1–40 CrossRef Zhou X, Zafarani R (2020) A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput Surv 53(5):1–40 CrossRef
Metadata
Title
Credibility aspects’ perceptions of social networks, a survey
Authors
Amira M. Idrees
Yehia Helmy
Ayman E. Khedr
Publication date
01-12-2022
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2022
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-022-00924-6

Other articles of this Issue 1/2022

Social Network Analysis and Mining 1/2022 Go to the issue

Premium Partner