A Credibility Analysis System for Assessing Information on Twitter

被引:77
作者
Alrubaian, Majed [1 ]
Al-Qurishi, Muhammad [1 ]
Hassan, Mohammad Mehedi [1 ]
Alamri, Atif [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Res Chair Pervas & Mobile Comp, Riyadh 11543, Saudi Arabia
关键词
Credibility; reputation; classification; user experience; feature-ranking; Twitter; NETWORK;
D O I
10.1109/TDSC.2016.2602338
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information credibility on Twitter has been a topic of interest among researchers in the fields of both computer and social sciences, primarily because of the recent growth of this platform as a tool for information dissemination. Twitter has made it increasingly possible to offer near-real-time transfer of information in a very cost-effective manner. It is now being used as a source of news among a wide array of users around the globe. The beauty of this platform is that it delivers timely content in a tailored manner that makes it possible for users to obtain news regarding their topics of interest. Consequently, the development of techniques that can verify information obtained from Twitter has become a challenging and necessary task. In this paper, we propose a new credibility analysis system for assessing information credibility on Twitter to prevent the proliferation of fake or malicious information. The proposed system consists of four integrated components: a reputation-based component, a credibility classifier engine, a user experience component, and a feature-ranking algorithm. The components operate together in an algorithmic form to analyze and assess the credibility of Twitter tweets and users. We tested the performance of our system on two different datasets from 489,330 unique Twitter accounts We applied 10-fold cross-validation over four machine learning algorithms. The results reveal that a significant balance between recall and precision was achieved for the tested dataset.
引用
收藏
页码:661 / 674
页数:14
相关论文
共 29 条
[1]   SAMAR: Subjectivity and sentiment analysis for Arabic social media [J].
Abdul-Mageed, Muhammad ;
Diab, Mona ;
Kuebler, Sandra .
COMPUTER SPEECH AND LANGUAGE, 2014, 28 (01) :20-37
[2]  
Almansour A.A., 2014, ACM INT C PROCEEDING, p16, DOI DOI 10.1145/2637748.2638439
[3]  
AlRubaian M., 2015, IEEE ACM INT C ADV S
[4]  
[Anonymous], J TRUST MANAG
[5]  
[Anonymous], 2015, 2015 2 WORLD S WEB A
[6]  
[Anonymous], 2015, ASIA CONTROL CONF AS
[7]  
[Anonymous], 2012, P ACM 2012 C COMP SU, DOI DOI 10.1145/2145204.2145274
[8]  
Canini K. R., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P1, DOI 10.1109/PASSAT/SocialCom.2011.91
[9]  
Castillo C., 2011, 20 INT C WORLD WID
[10]   Software-Defined Mobile Networks Security [J].
Chen, Min ;
Qian, Yongfeng ;
Mao, Shiwen ;
Tang, Wan ;
Yang, Ximin .
MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05) :729-743