• Corpus ID: 166728787

Designing and evaluating techniques to mitigate misinformation spread on microblogging web services

  title={Designing and evaluating techniques to mitigate misinformation spread on microblogging web services},
  author={Aditi Gupta},
Online social media is a powerful platform for dissemination of information during important realworld events. Beyond the challenges of volume, variety and velocity of content generated on online social media, veracity poses a much greater challenge for effective utilization of this content by citizens, organizations, and authorities. Veracity of information refers to the trustworthiness / credibility / accuracy / completeness of the content. Over last few years social media has also been used… 
Credibility in Online Social Networks: A Survey
This work will attempt to provide an overall review of the credibility assessment literature over the period 2006–2017 as applied to the context of the microblogging platform, Twitter.
Evaluating News Media Reports on the 'Blue Whale Challenge' for Adherence to Suicide Prevention Safe Messaging Guidelines
How sensationalized news media reports on the BWC could unintentionally propagate suicide contagion effects that normalize self-harming behaviors among youth is discussed and implications for practice and policy are examined.


Rumor has it: Identifying Misinformation in Microblogs
This paper addresses the problem of rumor detection in microblogs and explores the effectiveness of 3 categories of features: content- based, network-based, and microblog-specific memes for correctly identifying rumors, and believes that its dataset is the first large-scale dataset on rumor detection.
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter
The aim of this work is to perform in-depth characterization of what factors influenced in malicious content and profiles becoming viral on Twitter, and found that large number of users with high social reputation and verified accounts were responsible for spreading the fake content.
Information credibility on twitter
There are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy
The role of Twitter, during Hurricane Sandy (2012) to spread fake images about the disaster was highlighted, and automated techniques can be used in identifying real images from fake images posted on Twitter.
Credibility in Context: An Analysis of Feature Distributions in Twitter
An analysis that highlights the utility of the individual features in Twitter such as hash tags, retweets and mentions for predicting credibility shows that the best indicators of credibility include URLs, mentions, retwets and tweet length and that features occur more prominently in data describing emergency and unrest situations.
TweetCred: Real-Time Credibility Assessment of Content on Twitter
This work presents a semi-supervised ranking model for scoring tweets according to their credibility, used in TweetCred, a real-time system that assigns a credibility score to tweets in a user's timeline and evaluates it on a user base of this size.
Phi.sh/$oCiaL: the phishing landscape through short URLs
This is the first study to connect the phishing landscape using blacklisted phishing URLs from PhishTank, URL statistics from bit.ly and cues from Twitter to track the impact of phishing in online social media.
Detecting Spammers and Content Promoters in Online Video Social Networks
This paper manually builds a test collection of real YouTube users, classifying them as spammers, promoters, and legitimates, and provides a characterization of social and content attributes that may help distinguish each user class.
Cognos: crowdsourcing search for topic experts in microblogs
This paper proposes and investigates a new methodology for discovering topic experts in the popular Twitter social network that leverages Twitter Lists, which is often carefully curated by individual users to include experts on topics that interest them and whose meta-data provides valuable semantic cues to the experts' domain of expertise.
Credibility ranking of tweets during high impact events
Results show that extraction of credible information from Twitter can be automated with high confidence and the performance of the ranking algorithm significantly enhanced when it applied re-ranking strategy.