A Survey on Information Credibility on Twitter

Article Preview

Abstract:

Twitter has emerged as an ideal platform both for conversation and substantive real-time events, growing considerable concerns whether tweets are credible or not. In this paper, we concentrate on investigating the credibility perceptions of events which would generate abundant activity and significant interconnection on Twitter. We present several methods for crawling tweets set from Twitter according to certain rules. Furthermore, we conduct various experiments for assessing credibility, in which we list affluent categories of features relevant to determining credibility and prominent algorithms to improve the effectiveness for assessing credibility. And then we bring forward some existing imperfection of previous research on information credibility and further look into the future work benefit for assessing credibility precisely.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1788-1791

Citation:

Online since:

September 2013

Export:

Price:

[1] Carlos Castillo, Marcelo Mendoza, Barbara Poblete, information credibility on Twitter, in WWW 2011: the ACM proceedings of the 20th international conference on World Wide Web, New York, NY, USA, 2011, pp.675-684.

DOI: 10.1145/1963405.1963500

Google Scholar

[2] S. Nakamura, S. Konishi, A. Jatowt, H. Ohshima, H. Kondo, T. Tezuka, S. Oyama, and K. Tanaka,Trustworthiness Analysis of Web Search Results, Proc. of the 11th European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2007), LNCS, Vol. 4675, pp.38-49, Budapest, Hungary, September (2007).

DOI: 10.1007/978-3-540-74851-9_4

Google Scholar

[3] B. J. Fogg and H. Tseng, The elements of computer credibility, " In CHI , 99: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 80-87, New York, NY, USA, 1999. ACM.

DOI: 10.1145/302979.303001

Google Scholar

[4] Gunther. A. C. 1992, Biased press or biased public? Attitudes toward media coverage of social groups, Public opinion quarterly 56: 147-167.

DOI: 10.1086/269308

Google Scholar

[5] Self, C. C. 1996, Credibility. In An integrated approach to communication theory and research, eds. M. B. Salwen and D. W. Stacks. Mahwah, NJ: Lawrence Erlbaum Associates, p.421.

Google Scholar

[6] A. l. Hughes and L. Palen, Twitter adoption and use in mass convergence and emergency events, In Proceedings of the 2009 ISCRAM Conference, (2009).

Google Scholar

[7] M. Mathioudakis and N. Koudas, TwitterMonitor: trend detection over the twitter stream, In Proceedings of the 2010 international conference on Management of data pages 1155-1158. ACM, (2010).

DOI: 10.1145/1807167.1807306

Google Scholar

[8] Fan Yang, Yang Liu, and Xiaohui Yu, Min Yang, Automatic detection of rumor on Sina Weibo, In MDS 2012: the Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, Beijing, China, (2012).

DOI: 10.1145/2350190.2350203

Google Scholar

[9] Aditi Gupta and Ponnurangam Kumaraguru, Credibility Ranking of Tweets during High Impact Events, , In PSOSM 2012: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, Lyon, France, (2012).

DOI: 10.1145/2185354.2185356

Google Scholar

[10] Meredith Ringel Morris, Scott Counts, Asta Roseway, Aaron Hoff, and Julia Schwarz, Tweeting is Believing? Understanding Microblog Credibility Perceptions, In CSCW 2012: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, New York, NY, USA, 2012, pp.441-450.

DOI: 10.1145/2145204.2145274

Google Scholar

[11] Byungkyu Kang and John O'Donovan, Modeling Topic Specific Credibility in Twitter, In IUI 2012: Proceedings of the 2012 ACM international conference on Intelligent User Interfaces, Lisbon, Portugal, 2012, pp.12-17.

DOI: 10.1145/2166966.2166998

Google Scholar

[12] J. Ratkiewicz, M. Conover, M. Meiss, B. Goncalves, S. Patil, A. Flammini, and F. Menczer, Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams, arXiv, Nov (2010).

DOI: 10.1145/1963192.1963301

Google Scholar

[13] Y. Duan, L. Jiang, T. Qin, M. Zhou, and H. -Y. Shum, An empirical study on learning to rank of tweets, " In COLING, 10.

Google Scholar

[14] Canini, K. R., Suh, B., And Pirolli, P. L, Finding credible information sources in social networks based on content and social structure, In Proceedings of the third IEEE International Conference on Social Computing (SocialCom) (2011).

DOI: 10.1109/passat/socialcom.2011.91

Google Scholar

[15] Pal, A. & Counts, S, What's in a @name? How Name Value Biases Judgment of Microblog Authors, ICWSM (2011).

DOI: 10.1609/icwsm.v5i1.14091

Google Scholar

[16] Twitter Blog. blog. twitter. com. #numbers, March 14, (2011).

Google Scholar

[17] S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru, Phi. sh/$ocial: the phishing landscape through short urls, CEAS 2011, pages 92-101, (2011).

DOI: 10.1145/2030376.2030387

Google Scholar

[18] DuBois, T., Golbeck, j., and Srinivasan, A. Predicting trust and distrust in social networks, In Proceedings of the third IEEE International Conference on Social Computing (SocialCom) (2011).

DOI: 10.1109/passat/socialcom.2011.56

Google Scholar

[19] Victor, P., Cornelis, C., Cock, M. D., and Herrera-Viedma, E, Practical aggregation operators for gradual trust and distrust, Fuzzy Sets and Systems 184, 1 (2011), 126-147.

DOI: 10.1016/j.fss.2010.10.015

Google Scholar