Skip to main content
Top
Published in: Social Network Analysis and Mining 1/2018

01-12-2018 | Original Article

Utilizing computational trust to identify rumor spreaders on Twitter

Authors: Bhavtosh Rath, Wei Gao, Jing Ma, Jaideep Srivastava

Published in: Social Network Analysis and Mining | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Ubiquitous use of social media such as microblogging platforms opens unprecedented chances for false information to diffuse online. Facing the challenges in such a so-called “post-fact” era, it is very important for intelligent systems to not only check the veracity of information but also verify the authenticity of the users who spread the information, especially in time-critical situations such as real-world emergencies, where urgent measures have to be taken for stopping the spread of fake information. In this work, we propose a novel machine-learning-based approach for automatic identification of the users who spread rumorous information on Twitter by leveraging computational trust measures, in particular the concept of Believability. We define believability as a measure for assessing the extent to which the propagated information is likely being perceived as truthful or not based on the proxies of trust such as user’s retweet and reply behaviors in the network. We hypothesize that the believability between two users is proportional to the trustingness of the retweeter/replier and the trustworthiness of the tweeter, which are complementary to one another for representing user trust and can be inferred from trust proxies using a variant of HITS algorithm. With the trust network edge-weighted by believability scores, we apply network representation learning algorithms to generate user embeddings, which are then used to classify users into rumor spreaders or not based on recurrent neural networks (RNN). Experimented on a large real-world rumor dataset collected from Twitter, it is demonstrated that our proposed RNN-based method can effectively identify rumor spreaders and outperform four more straightforward, non-RNN models with large margin.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
6
We used Twitter API for getting maximum 5k friends of each user, and obtained more friends by requests via Twitter’s Web interface.
 
7
Though unpopular tweets could be fake, we ignore them as they do not draw much attention and are hardly impactful.
 
8
Since Twitter API cannot retrieve over 100 retweets, we gathered the retweet users for a given tweet from Twrench (https://​twren.​ch).
 
9
We generated the replies of the source tweets using PHEME toolkit (https://​github.​com/​azubiaga/​pheme-twitter-conversation-collection; Zubiaga et al. 2015).
 
Literature
go back to reference Allport G, Postman L (1965) The psychology of rumor. Russell & Russell, Westerham Allport G, Postman L (1965) The psychology of rumor. Russell & Russell, Westerham
go back to reference Arif A, Shanahan K, Chou F, Dosouto Y, Starbird K, Spiro E (2016) How information snowballs: exploring the role of exposure in online rumor propagation. In: Proceedings of CSCW. ACM, pp 466–477 Arif A, Shanahan K, Chou F, Dosouto Y, Starbird K, Spiro E (2016) How information snowballs: exploring the role of exposure in online rumor propagation. In: Proceedings of CSCW. ACM, pp 466–477
go back to reference Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semant Sci Serv Agents World Wide Web 5(2):58–71CrossRef Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semant Sci Serv Agents World Wide Web 5(2):58–71CrossRef
go back to reference Bengio Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5(2):157–166CrossRef Bengio Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5(2):157–166CrossRef
go back to reference Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of WWW. ACM, pp 675–684 Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of WWW. ACM, pp 675–684
go back to reference Cho K, van Merrienboer B, Bahdanau D, Bengio Y (2014) On the properties of neural machine translation: encoder–decoder approaches. arXiv:1409.1259 Cho K, van Merrienboer B, Bahdanau D, Bengio Y (2014) On the properties of neural machine translation: encoder–decoder approaches. arXiv:​1409.​1259
go back to reference Collobert R, Weston J, Bottou L, Karlen M, Kavukcuoglu K, Kuksa P (2011) Natural language processing (almost) from scratch. J Mach Learn Res 12:2493–2537MATH Collobert R, Weston J, Bottou L, Karlen M, Kavukcuoglu K, Kuksa P (2011) Natural language processing (almost) from scratch. J Mach Learn Res 12:2493–2537MATH
go back to reference Conroy BR, Sajda P (2012) Fast, exact model selection and permutation testing for L2-regularized logistic regression. In: Proceedings of the 15th International Conference on Artificial Intelligence and Statistics, pp 246–254 Conroy BR, Sajda P (2012) Fast, exact model selection and permutation testing for L2-regularized logistic regression. In: Proceedings of the 15th International Conference on Artificial Intelligence and Statistics, pp 246–254
go back to reference Fan R-E, Chang K-W, Hsieh C-J, Wang X-R, Lin C-J (2008) LIBLINEAR: a library for large linear classification. J Mach Learn Res 9:1871–1874MATH Fan R-E, Chang K-W, Hsieh C-J, Wang X-R, Lin C-J (2008) LIBLINEAR: a library for large linear classification. J Mach Learn Res 9:1871–1874MATH
go back to reference Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of SIGKDD. ACM, pp 855–864 Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of SIGKDD. ACM, pp 855–864
go back to reference Gupta A, Kumaraguru P, Castillo C, Meier P (2014) TweetCred: real-time credibility assessment of content on Twitter. In: Proceedings of SocInfo, lecture notes in computer science, vol 8851. Springer, Cham, pp 228-243 Gupta A, Kumaraguru P, Castillo C, Meier P (2014) TweetCred: real-time credibility assessment of content on Twitter. In: Proceedings of SocInfo, lecture notes in computer science, vol 8851. Springer, Cham, pp 228-243
go back to reference Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780CrossRef Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780CrossRef
go back to reference Jin Z, Cao J, Jiang Y, Zhang Y (2014) News credibility evaluation on microblog with a hierarchical propagation model. In: Proceedings of ICDM. IEEE, pp 230–239 Jin Z, Cao J, Jiang Y, Zhang Y (2014) News credibility evaluation on microblog with a hierarchical propagation model. In: Proceedings of ICDM. IEEE, pp 230–239
go back to reference Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of WWW. ACM, pp 640–651 Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of WWW. ACM, pp 640–651
go back to reference Kwon S, Cha M, Jung K, Chen W, Wang Y (2013) Prominent features of rumor propagation in online social media. In: Proceedings of ICDM Kwon S, Cha M, Jung K, Chen W, Wang Y (2013) Prominent features of rumor propagation in online social media. In: Proceedings of ICDM
go back to reference Lawrence P, Sergey B, Motwani R, Winograd T (1998) The pagerank citation ranking: bringing order to the web. Technical report. Stanford University Lawrence P, Sergey B, Motwani R, Winograd T (1998) The pagerank citation ranking: bringing order to the web. Technical report. Stanford University
go back to reference Liu X, Nourbakhsh A, Li Q, Fang R, Shah S (2015) Real-time rumor debunking on twitter. In: Proceedings of CIKM. ACM, pp 1867–1870 Liu X, Nourbakhsh A, Li Q, Fang R, Shah S (2015) Real-time rumor debunking on twitter. In: Proceedings of CIKM. ACM, pp 1867–1870
go back to reference Ma J, Gao W, Wei Z, Lu Y, Wong K-F (2015) Detect rumors using time series of social context information on microblogging websites. In: Proceedings of CIKM. ACM, pp 1751–1754 Ma J, Gao W, Wei Z, Lu Y, Wong K-F (2015) Detect rumors using time series of social context information on microblogging websites. In: Proceedings of CIKM. ACM, pp 1751–1754
go back to reference Ma J, Gao W, Mitra P, Kwon S, Jansen BJ, Wong K-F, Meeyoung C (2016) Detecting rumors from microblogs with recurrent neural networks. In: Proceedings of IJCAI. AAAI, pp 3818–3824 Ma J, Gao W, Mitra P, Kwon S, Jansen BJ, Wong K-F, Meeyoung C (2016) Detecting rumors from microblogs with recurrent neural networks. In: Proceedings of IJCAI. AAAI, pp 3818–3824
go back to reference Ma J, Gao W, Wong K-F (2017) Detect rumors in microblog posts using propagation structure via kernel learning. In: Proceedings of ACL. Association for Computational Linguistics, pp 708–717 Ma J, Gao W, Wong K-F (2017) Detect rumors in microblog posts using propagation structure via kernel learning. In: Proceedings of ACL. Association for Computational Linguistics, pp 708–717
go back to reference Ma J, Gao W, Wong K-F (2018a) Detect rumor and stance jointly by neural multi-task learning. In: Companion proceedings of the web conference. ACM, pp 585–593 Ma J, Gao W, Wong K-F (2018a) Detect rumor and stance jointly by neural multi-task learning. In: Companion proceedings of the web conference. ACM, pp 585–593
go back to reference Ma J, Gao W, Wong K-F (2018b) Rumor detection on twitter with tree-structured recursive neural networks. In: Proceedings of ACL. Association for Computational Linguistics, pp 1980-1989 Ma J, Gao W, Wong K-F (2018b) Rumor detection on twitter with tree-structured recursive neural networks. In: Proceedings of ACL. Association for Computational Linguistics, pp 1980-1989
go back to reference Metzger MJ, Flanagin AJ (2013) Credibility and trust of information in online environments: the use of cognitive heuristics. J Pragmat 59:210–220CrossRef Metzger MJ, Flanagin AJ (2013) Credibility and trust of information in online environments: the use of cognitive heuristics. J Pragmat 59:210–220CrossRef
go back to reference Mishra A, Bhattacharya A (2011) Finding the bias and prestige of nodes in networks based on trust scores. In: Proceedings of WWW. ACM, pp 567–576 Mishra A, Bhattacharya A (2011) Finding the bias and prestige of nodes in networks based on trust scores. In: Proceedings of WWW. ACM, pp 567–576
go back to reference Murphy KP (2012) Machine learning: a probabilistic perspective. The MIT Press, CambridgeMATH Murphy KP (2012) Machine learning: a probabilistic perspective. The MIT Press, CambridgeMATH
go back to reference O’Hara K, Alani H, Kalfoglou Y, Shadbolt N (2004) Trust strategies for the semantic web. In: Proceedings of the 2004 International conference on trust, security, and reputation on the semantic web, vol 127. Aachen, pp 42–51 O’Hara K, Alani H, Kalfoglou Y, Shadbolt N (2004) Trust strategies for the semantic web. In: Proceedings of the 2004 International conference on trust, security, and reputation on the semantic web, vol 127. Aachen, pp 42–51
go back to reference Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of SIGKDD. ACM, pp 701–710 Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of SIGKDD. ACM, pp 701–710
go back to reference Rath B, Gao W, Ma J, Srivastava J (2017) From retweet to believability: utilizing trust to identify rumor spreaders on Twitter. In: Proceedings of ASONAM. ACM/IEEE, pp 179–186 Rath B, Gao W, Ma J, Srivastava J (2017) From retweet to believability: utilizing trust to identify rumor spreaders on Twitter. In: Proceedings of ASONAM. ACM/IEEE, pp 179–186
go back to reference Roy A (2015) Computational trust at various granularities in social networks. Ph.D. thesis, University of Minnesota Roy A (2015) Computational trust at various granularities in social networks. Ph.D. thesis, University of Minnesota
go back to reference Roy A, Sarkar C, Srivastava J, Huh J (2016) Trustingness and trustworthiness: a pair of complementary trust measures in a social network. In: Proceedings of ASONAM. CM/IEEE, pp 549–554 Roy A, Sarkar C, Srivastava J, Huh J (2016) Trustingness and trustworthiness: a pair of complementary trust measures in a social network. In: Proceedings of ASONAM. CM/IEEE, pp 549–554
go back to reference Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. Nature 323:533–536CrossRef Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. Nature 323:533–536CrossRef
go back to reference Shu K, Sliva A, Wang S, Tang J, Liu H (2017) Fake news detection on social media: a data mining perspective. SIGKDD Explor 19(1):22–36CrossRef Shu K, Sliva A, Wang S, Tang J, Liu H (2017) Fake news detection on social media: a data mining perspective. SIGKDD Explor 19(1):22–36CrossRef
go back to reference Tang J, Qu M, Wang M, Zhang M, Yan J, Mei Q (2015) LINE: large-scale information network embedding. In: Proceedings of WWW. ACM, New York, pp 1067–1077 Tang J, Qu M, Wang M, Zhang M, Yan J, Mei Q (2015) LINE: large-scale information network embedding. In: Proceedings of WWW. ACM, New York, pp 1067–1077
go back to reference Wang S, Terano T (2015) Detecting rumor patterns in streaming social media. In: Proceedings of the IEEE international conference on big data. IEEE, pp 2709-2715 Wang S, Terano T (2015) Detecting rumor patterns in streaming social media. In: Proceedings of the IEEE international conference on big data. IEEE, pp 2709-2715
go back to reference Wu K, Yang S, Zhu KQ (2015) False rumors detection on sina weibo by propagation structures. In: Proceedings of ICDE. IEEE, pp 651–662 Wu K, Yang S, Zhu KQ (2015) False rumors detection on sina weibo by propagation structures. In: Proceedings of ICDE. IEEE, pp 651–662
go back to reference Yang F, Liu Y, Yu X, Yang M (2012) Automatic detection of rumor on sina weibo. In: Proceedings of ACM SIGKDD workshop on mining data semantics. ACM, New York Yang F, Liu Y, Yu X, Yang M (2012) Automatic detection of rumor on sina weibo. In: Proceedings of ACM SIGKDD workshop on mining data semantics. ACM, New York
go back to reference Yu F, Liu Q, Wu S, Wang L, Tan T (2017) A convolutional approach for misinformation identification. In: Proceedings of IJCAI. AAAI, pp 3901–3907 Yu F, Liu Q, Wu S, Wang L, Tan T (2017) A convolutional approach for misinformation identification. In: Proceedings of IJCAI. AAAI, pp 3901–3907
go back to reference Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: early detection of rumors in social media from enquiry posts. In: Proceedings of WWW. ACM, pp 1395–1405 Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: early detection of rumors in social media from enquiry posts. In: Proceedings of WWW. ACM, pp 1395–1405
go back to reference Zou F, Wang Y, Yang Y, Zhou K, Chen Y, Song J (2015) Supervised feature learning via L2-norm regularized logistic regression for 3D object recognition. Neurocomputing 151:603611CrossRef Zou F, Wang Y, Yang Y, Zhou K, Chen Y, Song J (2015) Supervised feature learning via L2-norm regularized logistic regression for 3D object recognition. Neurocomputing 151:603611CrossRef
go back to reference Zubiaga A, Aker A, Bontcheva K, Liakata M, Procter R (2018) Detection and resolution of rumours in social media: a survey. ACM Comput Surv 51(2):32CrossRef Zubiaga A, Aker A, Bontcheva K, Liakata M, Procter R (2018) Detection and resolution of rumours in social media: a survey. ACM Comput Surv 51(2):32CrossRef
go back to reference Zubiaga A, Hoi GWS, Liakata M, Procter R, Tolmie P (2015) Analysing how people orient to and spread rumours in social media. PLoS One 11(3):e0150989CrossRef Zubiaga A, Hoi GWS, Liakata M, Procter R, Tolmie P (2015) Analysing how people orient to and spread rumours in social media. PLoS One 11(3):e0150989CrossRef
Metadata
Title
Utilizing computational trust to identify rumor spreaders on Twitter
Authors
Bhavtosh Rath
Wei Gao
Jing Ma
Jaideep Srivastava
Publication date
01-12-2018
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2018
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-018-0540-z

Other articles of this Issue 1/2018

Social Network Analysis and Mining 1/2018 Go to the issue

Premium Partner