• Corpus ID: 166728787

Designing and evaluating techniques to mitigate misinformation spread on microblogging web services

  title={Designing and evaluating techniques to mitigate misinformation spread on microblogging web services},
  author={Aditi Gupta},
Online social media is a powerful platform for dissemination of information during important realworld events. Beyond the challenges of volume, variety and velocity of content generated on online social media, veracity poses a much greater challenge for effective utilization of this content by citizens, organizations, and authorities. Veracity of information refers to the trustworthiness / credibility / accuracy / completeness of the content. Over last few years social media has also been used… 

Credibility in Online Social Networks: A Survey

This work will attempt to provide an overall review of the credibility assessment literature over the period 2006–2017 as applied to the context of the microblogging platform, Twitter.

Evaluating News Media Reports on the 'Blue Whale Challenge' for Adherence to Suicide Prevention Safe Messaging Guidelines

How sensationalized news media reports on the BWC could unintentionally propagate suicide contagion effects that normalize self-harming behaviors among youth is discussed and implications for practice and policy are examined.



Rumor has it: Identifying Misinformation in Microblogs

This paper addresses the problem of rumor detection in microblogs and explores the effectiveness of 3 categories of features: content- based, network-based, and microblog-specific memes for correctly identifying rumors, and believes that its dataset is the first large-scale dataset on rumor detection.

$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter

The aim of this work is to perform in-depth characterization of what factors influenced in malicious content and profiles becoming viral on Twitter, and found that large number of users with high social reputation and verified accounts were responsible for spreading the fake content.

Information credibility on twitter

There are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.

Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy

The role of Twitter, during Hurricane Sandy (2012) to spread fake images about the disaster was highlighted, and automated techniques can be used in identifying real images from fake images posted on Twitter.

Credibility in Context: An Analysis of Feature Distributions in Twitter

An analysis that highlights the utility of the individual features in Twitter such as hash tags, retweets and mentions for predicting credibility shows that the best indicators of credibility include URLs, mentions, retwets and tweet length and that features occur more prominently in data describing emergency and unrest situations.

TweetCred: Real-Time Credibility Assessment of Content on Twitter

This work presents a semi-supervised ranking model for scoring tweets according to their credibility, used in TweetCred, a real-time system that assigns a credibility score to tweets in a user's timeline and evaluates it on a user base of this size.

Phi.sh/$oCiaL: the phishing landscape through short URLs

This is the first study to connect the phishing landscape using blacklisted phishing URLs from PhishTank, URL statistics from bit.ly and cues from Twitter to track the impact of phishing in online social media.

Cognos: crowdsourcing search for topic experts in microblogs

This paper proposes and investigates a new methodology for discovering topic experts in the popular Twitter social network that leverages Twitter Lists, which is often carefully curated by individual users to include experts on topics that interest them and whose meta-data provides valuable semantic cues to the experts' domain of expertise.

Credibility ranking of tweets during high impact events

Results show that extraction of credible information from Twitter can be automated with high confidence and the performance of the ranking algorithm significantly enhanced when it applied re-ranking strategy.

PhishAri: Automatic realtime phishing detection on twitter

This research shows that PhishAri is able to detect phishing tweets at zero hour with high accuracy which is much faster than public blacklists and as well as Twitter's own defense mechanism to detect malicious content.