The elements of computer credibility
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Finding high-quality content in social media
WSDM '08 Proceedings of the 2008 International Conference on Web Search and Data Mining
Why we twitter: understanding microblogging usage and communities
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis
Proceedings of the 2009 International Workshop on Location Based Social Networks
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Is it really about me?: message content in social awareness streams
Proceedings of the 2010 ACM conference on Computer supported cooperative work
Chatter on the red: what hazards threat reveals about the social life of microblogged information
Proceedings of the 2010 ACM conference on Computer supported cooperative work
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
What is Twitter, a social network or a news media?
Proceedings of the 19th international conference on World wide web
Earthquake shakes Twitter users: real-time event detection by social sensors
Proceedings of the 19th international conference on World wide web
TwitterMonitor: trend detection over the twitter stream
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
Detecting controversial events from twitter
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Flu detector: tracking epidemics on twitter
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part III
Twitter under crisis: can we trust what we RT?
Proceedings of the First Workshop on Social Media Analytics
Augmenting web pages and search results to support credibility assessment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Phi.sh/$oCiaL: the phishing landscape through short URLs
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Heterogeneous network-based trust analysis: a survey
ACM SIGKDD Explorations Newsletter
DS'11 Proceedings of the 14th international conference on Discovery science
Identifying automatic posting systems in microblogs
EPIA'11 Proceedings of the 15th Portugese conference on Progress in artificial intelligence
Do all birds tweet the same?: characterizing twitter around the world
Proceedings of the 20th ACM international conference on Information and knowledge management
User oriented tweet ranking: a filtering approach to microblogs
Proceedings of the 20th ACM international conference on Information and knowledge management
Correlating financial time series with micro-blogging activity
Proceedings of the fifth ACM international conference on Web search and data mining
Tweeting is believing?: understanding microblog credibility perceptions
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Modeling topic specific credibility on twitter
Proceedings of the 2012 ACM international conference on Intelligent User Interfaces
Analyzing patterns of information cascades based on users' influence and posting behaviors
Proceedings of the 2nd Temporal Web Analytics Workshop
Review: SMS spam filtering: Methods and data
Expert Systems with Applications: An International Journal
Detecting collective attention spam
Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality
Credibility ranking of tweets during high impact events
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Proceedings of the 21st international conference on World Wide Web
Dynamical classes of collective attention in twitter
Proceedings of the 21st international conference on World Wide Web
We know what @you #tag: does the dual role affect hashtag adoption?
Proceedings of the 21st international conference on World Wide Web
Semi-automatic semantic moderation of web annotations
Proceedings of the 21st international conference companion on World Wide Web
Finding and assessing social media information sources in the context of journalism
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 15th International Conference on Extending Database Technology
Disputed sentence suggestion towards credibility-oriented web search
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Characterizing topic-specific hashtag cascade in twitter based on distributions of user influence
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Lessons learned in using social media for disaster relief - ASU crisis response game
SBP'12 Proceedings of the 5th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction
Credibility-inspired ranking for blog post retrieval
Information Retrieval
Informing observers: quality-driven filtering and composition of web 2.0 sources
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Ranking tweets considering trust and relevance
Proceedings of the Ninth International Workshop on Information Integration on the Web
Information credibility on twitter in emergency situation
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Finding interesting posts in Twitter based on retweet graph analysis
SIGIR '12 Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval
Automatic detection of rumor on Sina Weibo
Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics
Whom to ask?: jury selection for decision making tasks on micro-blog services
Proceedings of the VLDB Endowment
Mining web query logs to analyze political issues
Proceedings of the 3rd Annual ACM Web Science Conference
Using link analysis to discover interesting messages spread across Twitter
TextGraphs-7 '12 Workshop Proceedings of TextGraphs-7 on Graph-based Methods for Natural Language Processing
LogUCB: an explore-exploit algorithm for comments recommendation
Proceedings of the 21st ACM international conference on Information and knowledge management
Generating event storylines from microblogs
Proceedings of the 21st ACM international conference on Information and knowledge management
Quality models for microblog retrieval
Proceedings of the 21st ACM international conference on Information and knowledge management
ACM Transactions on Intelligent Systems and Technology (TIST) - Special section on twitter and microblogging services, social recommender systems, and CAMRa2010: Movie recommendation in context
Microblog credibility perceptions: comparing the USA and China
Proceedings of the 2013 conference on Computer supported cooperative work
She gets a sports car from our donation: rumor transmission in a Chinese microblogging community
Proceedings of the 2013 conference on Computer supported cooperative work
Trust in online news: comparing social media and official media use by chinese citizens
Proceedings of the 2013 conference on Computer supported cooperative work
Recommending targeted strangers from whom to solicit information on social media
Proceedings of the 2013 international conference on Intelligent user interfaces
Curating and contextualizing Twitter stories to assist with social newsgathering
Proceedings of the 2013 international conference on Intelligent user interfaces
Measuring user credibility in social media
SBP'13 Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction
User Features and Social Networks for Topic Modeling in Online Social Media
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Tweets Beget Propinquity: Detecting Highly Interactive Communities on Twitter Using Tweeting Links
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Web credibility: features exploration and credibility prediction
ECIR'13 Proceedings of the 35th European conference on Advances in Information Retrieval
Identification of useful user comments in social media: a case study on flickr commons
Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries
Twitter stream analysis in Spanish
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy
Proceedings of the 22nd international conference on World Wide Web companion
Defending imitating attacks in web credibility evaluation systems
Proceedings of the 22nd international conference on World Wide Web companion
On the subjectivity and bias of web content credibility evaluations
Proceedings of the 22nd international conference on World Wide Web companion
Identifying local events by using microblogs as social sensors
Proceedings of the 10th Conference on Open Research Areas in Information Retrieval
Determining credibility from social network structure
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Epidemiological modeling of news and rumors on Twitter
Proceedings of the 7th Workshop on Social Network Mining and Analysis
RAProp: ranking tweets by exploiting the tweet/user/web ecosystem and inter-tweet agreement
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
MultiOSN: realtime monitoring of real world events on multiple online social media
Proceedings of the 5th IBM Collaborative Academia Research Exchange Workshop
Integrating on-demand fact-checking with public dialogue
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Evidential location estimation for events detected in Twitter
Proceedings of the 7th Workshop on Geographic Information Retrieval
Context Oriented Analysis of Interest Reflection of Tweeted Webpages based on Browsing Behavior
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Personalized emerging topic detection based on a term aging model
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
Campaign extraction from social media
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
A Meta-Analysis of State-of-the-Art Electoral Prediction From Twitter Data
Social Science Computer Review
Time, place, technology: Twitter as an information source in the Wisconsin labor protests
Computers in Human Behavior
Content or context: Which matters more in information processing on microblogging sites
Computers in Human Behavior
Identifying interesting Twitter contents using topical analysis
Expert Systems with Applications: An International Journal
Hi-index | 0.01 |
We analyze the information credibility of news propagated through Twitter, a popular microblogging service. Previous research has shown that most of the messages posted on Twitter are truthful, but the service is also used to spread misinformation and false rumors, often unintentionally. On this paper we focus on automatic methods for assessing the credibility of a given set of tweets. Specifically, we analyze microblog postings related to "trending" topics, and classify them as credible or not credible, based on features extracted from them. We use features from users' posting and re-posting ("re-tweeting") behavior, from the text of the posts, and from citations to external sources. We evaluate our methods using a significant number of human assessments about the credibility of items on a recent sample of Twitter postings. Our results shows that there are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.