ABSTRACT
Fake or misleading multimedia content and its distribution through social networks such as Twitter constitutes an increasingly important and challenging problem, especially in the context of emergencies and critical situations. In this paper, the aim is to explore the challenges involved in applying a computational verification framework to automatically classify tweets with unreliable media content as fake or real. We created a data corpus of tweets around big events focusing on the ones linking to images (fake or real) of which the reliability could be verified by independent online sources. Extracting content and user features for each tweet, we explored the fake prediction accuracy performance using each set of features separately and in combination. We considered three approaches for evaluating the performance of the classifier, ranging from the use of standard cross-validation, to independent groups of tweets and to cross-event training. The obtained results included a 81% for tweet features and 75% for user ones in the case of cross-validation. When using different events for training and testing, the accuracy is much lower (up to %58) demonstrating that the generalization of the predictor is a very challenging issue.
- F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In Collaboration, Electronic messaging, Anti-abuse and Spam conference (CEAS), volume 6, 2010.Google Scholar
- K. R. Canini, B. Suh, and P. L. Pirolli. Finding credible information sources in social networks based on content and social structure. In IEEE Third International Conference on Social Computing (SocialCom), pages 1--8. IEEE, 2011.Google ScholarCross Ref
- C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: Web spam detection using the web topology. In Proceedings of the 30th annual international ACM SIGIR conference, pages 423--430. ACM, 2007. Google ScholarDigital Library
- C. Castillo, M. Mendoza, and B. Poblete. Information credibility on twitter. In Proceedings of the 20th international conference on World Wide Web, pages 675--684. ACM, 2011. Google ScholarDigital Library
- F. Cheong and C. Cheong. Social media data mining: A social network analysis of tweets during the 2010--2011 australian floods. In PACIS, page 46, 2011.Google Scholar
- A. Gupta and P. Kumaraguru. @ twitter credibility ranking of tweets on events #breakingnews. 2012.Google Scholar
- A. Gupta and P. Kumaraguru. Twitter explodes with activity in mumbai blasts! a lifeline or an unmonitored daemon in the lurking? 2012.Google Scholar
- A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi. Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In Proceedings of the 22nd international conference on World Wide Web companion, pages 729--736. International World Wide Web Conferences Steering Committee, 2013. Google ScholarDigital Library
- Z. Gyongyi and H. Garcia-Molina. Web spam taxonomy. In First international workshop on adversarial information retrieval on the web (AIRWeb 2005), 2005.Google Scholar
- P. Kanske and S. A. Kotz. Leipzig affective norms for german: A reliability study. Behavior research methods, 42(4):987--991, 2010.Google Scholar
- M. Mendoza, B. Poblete, and C. Castillo. Twitter under crisis: Can we trust what we rt? In Proceedings of the first Workshop on Social Media Analytics, pages 71--79. ACM, 2010. Google ScholarDigital Library
- J. Redondo, I. Fraga, I. Padrón, and M. Comesana. The spanish adaptation of anew (affective norms for english words). Behavior research methods, 39(3):600--605, 2007.Google ScholarCross Ref
- E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, pages 83891I--83891I. International Society for Optics and Photonics, 2012.Google ScholarCross Ref
- E. Spyromitros-Xioufis, S. Papadopoulos, I. Kompatsiaris, G. Tsoumakas, and I. Vlahavas. An empirical study on the combination of surf features with vlad vectors for image search. In 13th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), pages 1--4. IEEE, 2012.Google ScholarCross Ref
- G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, pages 1--9. ACM, 2010. Google ScholarDigital Library
- C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web, pages 71--80. ACM, 2012. Google ScholarDigital Library
Index Terms
- Challenges of computational verification in social multimedia
Recommendations
Combating Misinformation by Sharing the Truth: a Study on the Spread of Fact-Checks on Social Media
AbstractMisinformation on social media has become a horrendous problem in our society. Fact-checks on information often fall behind the diffusion of misinformation, which can lead to negative impacts on society. This research studies how different factors ...
Information resonance on Twitter: watching Iran
SOMA '10: Proceedings of the First Workshop on Social Media AnalyticsTwitter has undoubtedly caught the attention of both the general public, and academia as a microblogging service worthy of study and attention. Twitter has several features that sets it apart from other social media/networking sites, including its 140 ...
The Dynamics of (Not) Unfollowing Misinformation Spreaders
WWW '24: Proceedings of the ACM on Web Conference 2024Many studies explore how people "come into" misinformation exposure. But much less is known about how people "come out of" misinformation exposure.Do people organically sever ties to misinformation spreaders? And what predicts doing so? Over six months, ...
Comments