Skip to main content
Log in

Synews: a synergy-based rumor verification system

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

Online social networks (OSNs) are now implied as an important source of news and information besides establishing social connections. However, such information sharing is not always authentic because people, sometimes, also share their perceptions and fabricated information on OSNs. Thus, verification of online posts is important to maintain reliability over this useful communication medium. To address this concern, multiple approaches have been investigated including machine learning, natural language processing, source authentication, empirical studies, web semantics, and modeling/simulations, but the problem still persists. This research proposes an effective synergy-based rumor verification method along with a weighted-mean reputation management system to mitigate the spread of rumors over OSN. The model was formally verified through Colored Petri-Nets while its semantic behavior was analyzed through ontologies. Moreover, a third-party Facebook application was developed for proof of concept, and users’ acceptance and usability analysis was performed through Technology Acceptance Model and Self-Efficacy scale. The results indicate that the proposed approach can be used as an effective tool for the identification of rumors and it has the potential to improve the quality of users’ online experience.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Algorithm 2
Algorithm 3
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Data will be provided on demand. Please contact the corresponding author.

References

  • [Online]. Available: https://stats.idre.ucla.edu/spss/faq/what-does-cronbachs-alpha-mean/.

  • [Online]. Available: https://www.wikipedia.org/.

  • [Online]. Available: https://www.yahoo.com/.

  • Ahmad A, Whitworth B, Zeshan F, Bertino E, Friedman R (2017) Extending social networks with delegation. Comput Secur 70:546–564

    Article  Google Scholar 

  • Ahmad A, Whitworth B, Zeshan F, Janczewski L, Ali M, Chaudary MH, Friedman R (2019) A relation-aware multiparty access control. J Intell Fuzzy Syst 37(1):227–239

    Article  Google Scholar 

  • Ahmad A, Azhar A, Naqvi S, Nawaz A, Arshad S, Zeshan F, Salih AO (2020) A methodology for sender-oriented anti-spamming. J Intell Fuzzy Syst 38(3):2765–2776

    Article  Google Scholar 

  • Ahmad A, Whitworth B, Bertino E (2022) A framework for the application of socio-technical design methodology. Ethics Inf Technol 24(4):46

    Article  Google Scholar 

  • Alpaydin E (2009) Introduction to machine learning, MIT press

  • Anderson M, Hitlin P, Atkinson M (2016) Wikipedia at 15: millions of readers in scores of languages. 14 January 2016. [Online]. Available: https://www.pewresearch.org/fact-tank/2016/01/14/wikipedia-at-15/.

  • Barboza FC, Jeong H, Kobayashi K, Shiramatsu S (2013) An ontology-based computational framework for analyzing public opinion framing in news media. In: 2013 IEEE Int Conf Syst Man Cybern (pp 2420–2426). IEEE

  • Becker D, Bendett S (2015) Crowdsourcing solutions for disaster response: examples and lessons for the US government. Procedia Eng 107:27–33

    Article  Google Scholar 

  • Boididou C, Middleton SE, Jin Z, Papadopoulos S, Dang-Nguyen DT, Boato G, Kompatsiaris Y (2018a) Verifying information with multimedia content on twitter: a comparative study of automated approaches. Multimed Tools Appl 77:15545–15571

    Article  Google Scholar 

  • Boididou C, Papadopoulos S, Zampoglou M, Apostolidis L, Papadopoulou O, Kompatsiaris Y (2018b) Detection and visualization of misleading content on twitter. Int J Multimed Inf Retr 7:71–86

    Article  Google Scholar 

  • Bordia P, DiFonzo N (2002) When social psychology became less social: Prasad and the history of rumor research. Asian J Soc Psychol 5(1):49–61

    Article  Google Scholar 

  • Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web, pp 675–684

  • Cen J, Li Y (2022) A rumor detection method from social network based on deep learning in big data environment. Comput Intell Neurosci

  • Chen X (2016) A real time anti-spamming system in crowdsourcing platform. In: Software engineering and service science (ICSESS), 2016 7th IEEE international conference on, IEEE, pp 981–984

  • Choudhury D, Acharjee T (2023) A novel approach to fake news detection in social networks using genetic algorithm applying machine learning classifiers. Multimed Tools Appl 82:9029–9045

    Article  Google Scholar 

  • Chua AY, Banerjee S (2017a) To share or not to share: the role of epistemic belief in online health rumors. Int J Med Inf 108:36–41

    Article  Google Scholar 

  • Chua AY, Banerjee S (2017b) Rumor verifications on facebook: click speech of likes, comments and shares. In: 2017 Twelfth international conference on digital information management (ICDIM), pp 257–262

  • Clark BY, Zingale N, Logan J, Brudney J (2019) A framework for using crowdsourcing in government. In: Social entrepreneurship: concepts, methodologies, tools, and applications, IGI Global, pp 405–425

  • Clayton K, Blair S, Busam JA, Forstner S, Glance J, Green G, Nyhan B (2020) Real solutions for fake news? Measuring the effectiveness of general warnings and fact-check tags in reducing belief in false stories on social media. Polit Behav 42:1073–1095

    Article  Google Scholar 

  • Clementi A, Crescenzi P, Doerr C, Fraigniaud P, Pasquale F, Silvestri R (2013) Rumor spreading in random evolving graphs. In: European symposium on algorithms pp 325–336

  • Dang A, Smit M, Moh'd A, Minghim R, Milios E (2016) Toward understanding how users respond to rumours in social media. In: Advances in social networks analysis and mining (ASONAM), 2016 IEEE/ACM international conference on, IEEE, pp 777–784

  • De Guerre J (2007) The mechanics of Vipul’s Razor technology. Netw Secur 2007:15–17

    Article  Google Scholar 

  • Derczynski L, Bontcheva K, Liakata M, Procter R, Hoi GWS, Zubiaga A (2017) SemEval-2017 task 8: RumourEval: determining rumour veracity and support for rumours. arXiv preprint arXiv:1704.05972

  • Ding X, Zhang X, Fan R, Xu Q, Hunt K, Zhuang J (2022) Rumor recognition behavior of social media users in emergencies. J Manag Sci Eng 7:36–47

    Google Scholar 

  • Ehsanfar A, Mansouri M (2017) Incentivizing the dissemination of truth versus fake news in social networks. In: 2017 12th system of systems engineering conference (SoSE), pp 1–6

  • Fountoulakis N, Panagiotou K (2013) Rumor spreading on random regular graphs and expanders. Random Struct Algorithm 43(2):201–220

    Article  MathSciNet  Google Scholar 

  • Funke D (2017) 13 Nov 2017. [Online]. Available: https://www.poynter.org/fact-checking/2017/the-eu-is-asking-for-help-in-its-fight-against-fake-news/.

  • Gao H, Wu Y, Xu Y, Li R, Jiang Z (2023) Neural collaborative learning for user preference discovery from biased behavior sequences. IEEE Transact Comput Soc Syst

  • Gatautis R, Vitkauskaite E (2014) Crowdsourcing application in marketing activities. Procedia Soc Behav Sci 110:1243–1250

    Article  Google Scholar 

  • Granik M, Mesyura V (2017) Fake news detection using naive Bayes classifier. In: Electrical and computer engineering (UKRCON), 2017 IEEE first Ukraine conference on, IEEE, pp 900–903

  • Grassberger P (1983) On the critical behavior of the general epidemic process and dynamical percolation. Math Biosci 63:157–172

    Article  Google Scholar 

  • Gray JA (1981) A critique of Eysenck’s theory of personality. In: A model for personality (pp 246–276). Springer Berlin Heidelberg

  • Guo M, Xu Z, Liu L, Guo M, Zhang Y (2020) An adaptive deep transfer learning model for rumor detection without sufficient identified rumors. Math Probl Eng

  • Gupta A, Kumaraguru P, Castillo C, Meier P (2014) Tweetcred: real-time credibility assessment of content on twitter. In: International conference on social informatics, Springer, pp 228–243

  • Gupta A, Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd international conference on world wide web, ACM, pp 729–736

  • Hoodbhoy P (2017) Why they lynched Mashal Khan, 29 April 2017. [Online]. Available: https://www.dawn.com/news/1329909.

  • Imran M, Ahmad A (2023) Enhancing data quality to mine credible patterns. Inf Syst Front 49:544–564

    Google Scholar 

  • Jain V, Singh M (2013) Ontology development and query retrieval using protege tool. Int J Intell Syst Appl 9:67–75

    Google Scholar 

  • Jang SM, Geng T, Li J-YQ, Xia R, Huang C-T, Kim H, Tang J (2018) A computational approach for examining the roots and spreading patterns of fake news: evolution tree analysis. Comput Human Behav Elsevier 84:103–113

    Article  Google Scholar 

  • Javanmardi S, Lopes C, Baldi P (2010) Modeling user reputation in wikis. Stat Anal Data Min ASA Data Sci J 3:126–139

    Article  MathSciNet  Google Scholar 

  • Jensen K (2013) Coloured petri nets: basic concepts, analysis methods and practical use, vol 1. Springer Science & Business Media

  • Jin Z, Cao J, Zhang Y, Zhou J, Tian Q (2016) Novel visual and statistical image features for microblogs news verification. IEEE Trans Multimed 19(3):598–608

    Article  Google Scholar 

  • Kermack WO, McKendrick AG (1939) Contributions to the mathematical theory of epidemics: V. analysis of experimental epidemics of mouse-typhoid; a bacterial disease conferring incomplete immunity. Epidemiol Infect 39(3):271–288

    CAS  Google Scholar 

  • Khaled K, ElKorany A, Ezzat CA (2023) Enhancing prediction of user stance for social networks rumors. Int J Electr Comput Eng (IJECE) 13:6609–6619

    Article  Google Scholar 

  • Khalil U, Ahmad A, Abdel-Aty AH, Elhoseny M, El-Soud MWA, Zeshan F (2021) Identification of trusted IoT devices for secure delegation. Comput Electr Eng 90:106988

    Article  Google Scholar 

  • Kotteti CMM, Dong X, Qian L (2020) Ensemble deep learning on time-series representation of tweets for rumor detection in social media. Appl Sci 10:7541

    Article  CAS  Google Scholar 

  • Kumar KK, Geethakumari G (2014) Detecting misinformation in online social networks using cognitive psychology. Human-Centric Comput Inf Sci SpringerOpen 4:14

    Article  CAS  Google Scholar 

  • Lai P (2017) The literature review of technology adoption models and theories for the novelty technology. JISTEM-J Inf Syst Technol Manag 14:21–38

    Google Scholar 

  • Le H, Boynton G, Shafiq Z, Srinivasan P (2019) A postmortem of suspended Twitter accounts in the 2016 US presidential election. In: 2019 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM)

  • Li C, Li J, Ma Z, Zhu H (2014) Canard phenomenon for an SIS epidemic model with nonlinear incidence. J Math Anal Appl 420:987–1004

    Article  MathSciNet  Google Scholar 

  • Lunden I (2018) Yahoo Mail aims at emerging markets and casual users, launches versions for mobile web and Android Go [Online]. Available: https://techcrunch.com/2018/06/19/yahoo-mail-go/.

  • Luvembe AM, Li W, Li S, Liu F, Xu G (2023) Dual emotion based fake news detection: a deep attention-weight update approach. Inf Process Manag 60(4):103354

    Article  Google Scholar 

  • Lytinen SL (2005) Artificial intelligence: natural language processing. Van nostrand's scientific encyclopedia

  • Majchrzak A, Malhotra A (2013) Towards an information systems perspective and research agenda on crowdsourcing for innovation. J Strateg Inf Syst Elsevier 22(4):257–268

    Article  Google Scholar 

  • Martínez M (2018) Burned to death because of a rumour on WhatsApp. 12 November 2018. [Online]. Available: https://www.bbc.com/news/world-latin-america-46145986.

  • Metaxas PT, Finn S, Mustafaraj E (2015) Using twittertrails. com to investigate rumor propagation. In: Proceedings of the 18th ACM conference companion on computer supported cooperative work \& social computing, pp 69–72

  • Middleton SE, Papadopoulos S, Kompatsiaris Y (2018) Social computing for verifying social media content in breaking news. IEEE Internet Comput 22(2):83–89

    Article  Google Scholar 

  • Mills S (2012) How twitter is winning the 2012 US election. October 2012. [Online]. Available: https://www.theguardian.com/commentisfree/2012/oct/16/twitter-winning-2012-us-election.

  • Miró-Llinares F, Aguerri JC (2023) Misinformation about fake news: a systematic critical review of empirical studies on the phenomenon and its status as a ‘threat.’ Eur J Criminol 20(1):356–374

    Article  Google Scholar 

  • MIT Technology Review, 14 November 2017. [Online]. Available: https://www.technologyreview.com/f/609478/last-year-social-media-was-used-to-influence-elections-in-at-least-18-countries/.

  • Moreno Y, Nekovee M, Vespignani A (2004) Efficiency and reliability of epidemic data dissemination in complex networks. Phys Rev E 69(5):055101

    Article  ADS  Google Scholar 

  • Mughaid A et al (2022) An intelligent cybersecurity system for detecting fake news in social media websites. Soft Comput 26(12):5577–5591

    Article  PubMed  PubMed Central  Google Scholar 

  • Muhammad T, Ahmad A (2021) A joint sharing approach for online privacy preservation. World Wide Web 24(3):895–924

    Article  Google Scholar 

  • Negm TM, Rezqa MA, Hegazi AF (2018) News credibility measure utilizing ontologies \& semantic weighing schemes (NCMOSWS). In: Negm, Tarek M and Rezqa, Mohamed A and Hegazi, Abdel Fatah, pp 57–64

  • O’Neill, Philip D (2002) A tutorial introduction to Bayesian inference for stochastic epidemic models using Markov chain Monte Carlo methods. Math Biosci 180(1–2):103–114

  • Ojha RP, Srivastava PK, Awasthi S, Srivastava V, Pandey PS, Dwivedi RS, Singh R, Galletta A (2023) Controlling of fake information dissemination in online social networks: an epidemiological approach. IEEE Access 11:32229–32240

    Article  Google Scholar 

  • Ozturk P, Li H, Sakamoto Y (2015) Combating rumor spread on social media: the effectiveness of refutation and warning. In: System sciences (HICSS), 2015 48th Hawaii international conference on, IEEE

  • Pastor R, Vespignani A (2001) Epidemic dynamics and endemic states in complex networks. Phys Rev E 63:066117

    Article  ADS  Google Scholar 

  • Patten ML (2016) Proposing empirical research: a guide to the fundamentals, Routledge

  • Perrig A, Canetti R, Song D, Tygar JD (2001) Efficient and secure source authentication for multicast. In: Network and distributed system security symposium, NDSS, vol 1, No. 2001, pp 35–46

  • Popat K, Mukherjee S, Strötgen J, Weikum G (2018) CredEye: a credibility lens for analyzing and explaining misinformation. In: Companion proceedings of the the web conference 2018 (pp 155-158)

  • Pourghomi P, Safieddine F, Masri W, Dordevic M (2017) How to stop spread of misinformation on social media: Facebook plans vs. right-click authenticate approach. In: 2017 international conference on engineering & MIS (ICEMIS) (pp 1–8). IEEE

  • Prollochs N, Feuerriegel S (2023) Mechanisms of true and false rumor sharing in social media: collective intelligence or herd behavior? Proc ACM Human-Comput Interact 7:1–38

    Article  Google Scholar 

  • Rathakrishnan A, Sathiyanarayanan R (2023) Rumor detection on social media using deep learning algorithms with fuzzy inference system for healthcare analytics system using COVID-19 dataset. Int J Comput Intell Appl 22:2341008

    Article  Google Scholar 

  • Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F (2011) Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th international conference companion on world wide web (pp 249–252)

  • Reshi JA, Ali R (2019) Rumor proliferation and detection in social media: a review. In: 2019 5th international conference on advanced computing & communication systems (ICACCS) (pp 1156–1160). IEEE

  • Rotman D (2013) MIT technology retrieved from meet the man with a cheap and easy plan to stop global warming. [Online]. Available: http://www.technologyreview.com/featuredstory/511016/a-cheap-and-easy-plan-to-stop-globalwarming.

  • Rubin VL, Conroy NJ, Chen Y (2015) Towards news verification: Deception detection methods for news discourse. In: Proceedings of the Hawaii international conference on system sciences (HICSS48) symposium on rapid screening technologies, deception detection and credibility assessment symposium, pp 5–8

  • Sadeghi F, Bidgoly AJ, Amirkhani H (2022) Fake news detection on social media using a natural language inference approach. Multimed Tools Appl 81:33801–33821

    Article  Google Scholar 

  • Samreen A, Ahmad A, Zeshan F, Ahmed F, Ahmed S, Ashfaq Z (2020) A collaborative method for protecting teens against online predators over social networks: a behavioral analysis. IEEE Access 8:174375–174393

    Article  Google Scholar 

  • Samreen A, Ahmad A, Zeshan F (2020) Searching for truth in the post-truth age. In: 2020 3rd international conference on advancements in computational sciences (ICACS) (pp 1–5). IEEE

  • Saxton GD, Oh O, Kishore R (2013) Rules of crowdsourcing: models, issues, and systems of control. Inf Syst Manag 30:2–20

    Article  Google Scholar 

  • Schmitz PW, Tröger T (2012) The (sub-) optimality of the majority rule. Games Econ Behav 74(2):651–665

    Article  MathSciNet  Google Scholar 

  • Seddari N, Derhab A, Belaoued M, Halboob W, Al-Muhtadi J, Bouras A (2022) A hybrid linguistic and knowledge-based analysis approach for fake news detection on social media. IEEE Access 10:62097–62109

    Article  Google Scholar 

  • Shao C, Ciampaglia GL, Flammini A, Menczer F (2016) Hoaxy: a platform for tracking online misinformation. In: Proceedings of the 25th international conference companion on world wide web, 2016, pp 745–750

  • Shearer E (2021) More than eight-in-ten Americans get news from digital devices. Pew Research Center, 12 January 2021. [Online]. Available: https://www.pewresearch.org/fact-tank/2021/01/12/more-than-eight-in-ten-americans-get-news-from-digital-devices/

  • Shelke S, Attar V (2022) Rumor detection in social network based on user, content and lexical features. Multimed Tools Appl 81:17347–17368

    Article  PubMed  PubMed Central  Google Scholar 

  • Sherer M, Maddux JE, Mercandante B, Prentice-Dunn S, Jacobs B, Rogers RW (1982) The self-efficacy scale: construction and validation. Psychol Rep 51:663–671

    Article  Google Scholar 

  • Shi W, Xie M (2013) A reputation-based collaborative approach for spam filtering. AASRI Procedia 5:220–227

    Article  Google Scholar 

  • Shin J, Jian L, Driscoll K, Bar F (2018) The diffusion of misinformation on social media: temporal pattern, message, and source. Comput Hum Behav 83:278–287

    Article  Google Scholar 

  • Simons A, Kaiser LF, vom Brocke J (2019) Enterprise crowdfunding: foundations, applications, and research findings. Bus Inf Syst Eng 61:113–121

    Article  Google Scholar 

  • Strickland J (xxxx) How facebook works, [Online]. Available: https://computer.howstuffworks.com/internet/social-networking/networks/facebook.htm.

  • Suthanthira Devi P, Karthika S (2022) Rumor identification and verification for text in social media content. Comput J 65(2):436–455

    Article  Google Scholar 

  • Tschiatschek S, Singla A, Gomez Rodriguez M, Merchant A, Krause A (2017) Detecting fake news in social networks via crowdsourcing, arXiv preprint arXiv:1711.09025

  • Tu K, Chen C, Hou C, Yuan J, Li J, Yuan X (2021) Rumor2vec: a rumor detection framework with joint text and propagation structure representation learning. Inf Sci 560:137–151

    Article  Google Scholar 

  • VanVoorhis CW, Morgan BL (2007) Understanding power and rules of thumb for determining sample sizes. Tutorials Quant Methods Psychol 3:43–50

    Article  Google Scholar 

  • Wang WY (2017) liar, liar pants on fire: a new benchmark dataset for fake news detection. arXiv preprint arXiv:1705.00648

  • Wang J, Zhao L, Huang R (2014) 2SI2R rumor spreading model in homogeneous networks. Physica A 413:153–161

    Article  ADS  MathSciNet  Google Scholar 

  • Wang Q, Yang X, Xi W (2018) Effects of group arguments on rumor belief and transmission in online communities: an information cascade and group polarization perspective. Inf Manag 55(4):441–449

    Article  Google Scholar 

  • Wang W, Qiu Y, Xuan S, Yang W (2021) Early rumor detection based on deep recurrent q-learning. Secur Commun Netw 2021:1–13

    Article  Google Scholar 

  • Welser HT, Cosley D, Kossinets G, Lin A, Dokshin F, Gay G, Smith M (2011) Finding social roles in Wikipedia. In: Proceedings of the 2011 iConference (pp 122-129)

  • Wiegand S, Middleton SE (2016) Veracity and velocity of social media content during breaking news: analysis of november 2015 Paris shootings. In: Proceedings of the 25th international conference companion on world wide web, pp 751–756

  • Wilson GD, Barrett PT, Gray JA (1989) Human reactions to reward and punishment: a questionnaire examination of Gray’s personality theory. Br J Psychol 80(4):509–515

    Article  PubMed  Google Scholar 

  • Wu X, Zhu X, Wu G-Q, Ding W (2013) Data mining with big data. IEEE Trans Knowl Data Eng 26(1):97–107

    Google Scholar 

  • Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intell Mag 13(3):55–75

    Article  Google Scholar 

  • Zeshan F, Mohamad R, Ahmad MN, Othman MB, Elhag AAM, Hussain SA, Ahmad A, Ali A, Ashraf M, Babar I (2019) Context-aware ontology and web services discovery for distributed embedded real-time systems. Malays J Comput Sci 32(3):186–208

    Article  Google Scholar 

  • Zubiaga A, Liakata M, Procter R, Bontcheva K, Tolmie P (2015) Crowdsourcing the annotation of rumourous conversations in social media. In: Proceedings of the 24th international conference on world wide web, pp 347–353

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization was performed by A.S and A.A; data curation by A.S and F.Z; formal analysis by F.Z and H.T.M; methodology by A.A; project administration by A.A; F.Z; H.T.M; writing by A.S; A.A; F.Z; H.T.M.

Corresponding author

Correspondence to Adnan Ahmad.

Ethics declarations

Conflict of interest

We have no financial and personal relationships with other people and organizations.

Ethical approval

No personal identifiable information was acquired from the participants, and their consent was taken for the publication of the generalized statistics.

Consent for publication

The proposed work has not been published previously and is not under consideration to publish elsewhere.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1

Statistics for Occurrence Graph.

figure dfigure d

Appendix II

Survey Questions.

Variables

Measurement instrument

Perceived ease of use

PE1-I found the application easy to use

PE2-Learning how to use the application is easy for me

PE3-Rating on the post is performed easily using the application

PE4- It is easy to verify news by using the application

Perceived usefulness

PU1-The application can make it easier to verify fake content

PU2-Using the application increases the efficiency for verifying rumors

PU3-The application allows to authenticate the rumors

PU4-The application is useful for verification of rumors

Intention to use

IU1-I am positive toward using the application

IU2-If I have access to application, I intent to use it for verifying rumors

IU3-I will use the application for rumor verification

IU4-Verifying through the application is a good idea

Usage behavior

UB1-I intend to check post decisions from the application

UB2-Using the application does not require any tutorial

UB3-Using the application is easy for me

UB4-I intend to be a user of the application

Self-efficacy

SE1-I have necessary skills to use the application

SE2-I feel confident on the verification results of the application

SE3-I can learn how to use the application

SE4-I am confident that I can efficiently deal with the application

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarfraz, A., Ahmad, A., Zeshan, F. et al. Synews: a synergy-based rumor verification system. Soc. Netw. Anal. Min. 14, 57 (2024). https://doi.org/10.1007/s13278-024-01214-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-024-01214-z

Keywords

Navigation