From retweet to believability: Utilizing trust to identify rumor spreaders on twitter

  • Bhavtosh Rath
  • , Wei Gao
  • , Jing Ma
  • , Jaideep Srivastava

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

52 Citations (Scopus)

Abstract

Ubiquitous use of social media such as microblog-ging platforms brings about ample opportunities for the false information to diffuse online. It is very important not just to determine the veracity of information but also the authenticity of the users who spread the information, especially in time-critical situations like real-world emergencies, where urgent measures have to be taken for stopping the spread of fake information. In this work, we propose a novel machine learning based approach for automatic identification of the users spreading rumorous information by leveraging the concept of believability, i.e., the extent to which the propagated information is likely to be perceived as truthful, based on the trust measures of users in Twitter’s retweet network. We hypothesize that the believability between two users is proportional to the trustingness of the retweeter and the trustworthiness of the tweeter, which are two complementary measures of user trust and can be inferred from retweeting behaviors using a variant of HITS algorithm. With the retweet network edge-weighted by believability scores, we use network representation learning to generate user embeddings, which are then leveraged to classify users into as rumor spreaders or not. Based on experiments on a very large real-world rumor dataset collected from Twitter, we demonstrate that our method can effectively identify rumor spreaders and outperform four strong baselines with large margin.

Original languageEnglish
Title of host publicationProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017
EditorsJana Diesner, Elena Ferrari, Guandong Xu
Place of PublicationNew York
PublisherAssociation for Computing Machinery (ACM)
Pages179-186
Number of pages8
ISBN (Electronic)9781450349932
DOIs
Publication statusPublished - 31 Jul 2017
EventThe 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining - Mercure Hotel, Sydney, Australia
Duration: 31 Jul 20173 Aug 2017
http://asonam.cpsc.ucalgary.ca/2017/ (Conference website)
http://asonam.cpsc.ucalgary.ca/2017/ASONAM2017Program.pdf (Conference program)
https://dl.acm.org/doi/proceedings/10.1145/3110025 (Conference proceeding)

Publication series

NameProceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM
PublisherAssociation for Computing Machinery

Conference

ConferenceThe 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Abbreviated titleASONAM 2017
Country/TerritoryAustralia
CitySydney
Period31/07/173/08/17
Internet address

Fingerprint

Dive into the research topics of 'From retweet to believability: Utilizing trust to identify rumor spreaders on twitter'. Together they form a unique fingerprint.

Cite this