skip to main content
10.1145/1963405.1963500acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Information credibility on twitter

Authors Info & Claims
Published:28 March 2011Publication History

ABSTRACT

We analyze the information credibility of news propagated through Twitter, a popular microblogging service. Previous research has shown that most of the messages posted on Twitter are truthful, but the service is also used to spread misinformation and false rumors, often unintentionally.

On this paper we focus on automatic methods for assessing the credibility of a given set of tweets. Specifically, we analyze microblog postings related to "trending" topics, and classify them as credible or not credible, based on features extracted from them. We use features from users' posting and re-posting ("re-tweeting") behavior, from the text of the posts, and from citations to external sources.

We evaluate our methods using a significant number of human assessments about the credibility of items on a recent sample of Twitter postings. Our results shows that there are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.

References

  1. E. Agichtein, C. Castillo, D. Donato, A. Gionis, and G. Mishne. Finding high-quality content in social media. In WSDM '08: Proceedings of the international conference on Web search and web data mining, pages 183--194, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alonso, Omar, Carson, Chad, Gerster, David, Ji, Xiang, and Nabar, Shubha. Detecting Uninteresting Content in Text Streams. In SIGIR Crowdsourcing for Search Evaluation Workshop, 2010.Google ScholarGoogle Scholar
  3. C. L. Armstrong and M. J. Mcadams. Blogs of information: How gender cues and individual motivations influence perceptions of credibility. Journal of Computer-Mediated Communication, 14(3):435--456, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting Spammers on Twitter. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), July 2010.Google ScholarGoogle Scholar
  5. R. Crane and D. Sornette. Robust dynamic classes revealed by measuring the response function of a social system. Proceedings of the National Academy of Sciences, 105(41):15649--15653, October 2008.Google ScholarGoogle ScholarCross RefCross Ref
  6. B. De Longueville, R. S. Smith, and G. Luraschi. "OMG, from here, I can see the flames!": a use case of mining location based social networks to acquire spatio-temporal data on forest fires. In LBSN '09: Proceedings of the 2009 International Workshop on Location Based Social Networks, pages 73--80, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. S. Earle, M. Guy, C. Ostrum, S. Horvath, and R. A. Buckmaster. OMG Earthquake! Can Twitter improve earthquake response? AGU Fall Meeting Abstracts, pages B1697+, Dec. 2009.Google ScholarGoogle Scholar
  8. A. J. Flanagin and M. J. Metzger. Perceptions of internet information credibility. Journalism and Mass Communication Quarterly, 77(3):515--540, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. J. Flanagin and M. J. Metzger. The role of site features, user attributes, and information verification behaviors on the perceived credibility of web-based information. New Media Society, 9(2):319--342, April 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. B. J. Fogg and H. Tseng. The elements of computer credibility. In CHI '99: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 80--87, New York, NY, USA, 1999. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In CCS '10: Proceedings of the 17th ACM conference on Computer and Communications Security, CCS '10, pages 27--37, New York, NY, USA, October 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. L. Hughes and L. Palen. Twitter adoption and use in mass convergence and emergency events. In ISCRAM Conference, May 2009.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: understanding microblogging usage and communities. In WebKDD/SNA-KDD '07: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pages 56--65, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. J. Johnson, B. K. Kaye, S. L. Bichard, and W. J. Wong. Every blog has its day: Politically-interested internet users' perceptions of blog credibility. Journal of Computer-Mediated Communication, 13(1), 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Kireyev, L. Palen, and K. Anderson. Applications of topics models to analysis of disaster-related twitter data. In NIPS Workshop on Applications for Topic Models: Text and Beyond, December 2009.Google ScholarGoogle Scholar
  16. H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a social network or a news media? In World Wide Web Conference. ACM Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. V. Lampos, T. D. Bie, and N. Cristianini. Flu detector - tracking epidemics on twitter. In European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2010), pages 599--602, Barcelona, Spain, 2010. Springer, Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Mathioudakis and N. Koudas. TwitterMonitor: trend detection over the twitter stream. In Proceedings of the 2010 international conference on Management of data, pages 1155--1158. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Mendoza, B. Poblete, and C. Castillo. Twitter under crisis: Can we trust what we rt? In 1st Workshop on Social Media Analytics (SOMA '10). ACM Press, July 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. E. Mustafaraj and P. Metaxas. From obscurity to prominence in minutes: Political speech and real-time search. In Proceedings of the WebSci10: Extending the Frontiers of Society On-Line, April 2010.Google ScholarGoogle Scholar
  21. M. Naaman, J. Boase, and C. H. Lai. Is it really about me?: message content in social awareness streams. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, CSCW '10, pages 189--192, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Pear Analytics. Twitter study. http://www.pearanalytics.com/wp-content/uploads/2009/08/Twitter-Study-August-2009.pdf, August 2009.Google ScholarGoogle Scholar
  23. Pew Research Center. Internet Overtakes Newspapers As News Outlet. http://pewresearch.org/pubs/1066/internet-overtakes-newspapers-as-news-source 2008.Google ScholarGoogle Scholar
  24. A. M. Popescu and M. Pennacchiotti. Detecting controversial events from twitter. In Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pages 1873--1876, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Poulsen. Firsthand reports from california wildfires pour through twitter. October 2007.Google ScholarGoogle Scholar
  26. J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, S. Patil, A. Flammini, and F. Menczer. Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams. arXiv, Nov 2010.Google ScholarGoogle Scholar
  27. T. Sakaki, M. Okazaki, and Y. Matsuo. Earthquake shakes Twitter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 851--860, New York, NY, USA, April 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Sankaranarayanan, H. Samet, B. E. Teitler, M. D. Lieberman, and J. Sperling. TwitterStand: news in tweets. In GIS '09: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pages 42--51, New York, NY, USA, November 2009. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Schmierbach and A. Oeldorf-Hirsch. A little bird told me, so i didn't believe it: Twitter, credibility, and issue perceptions. In Proc. of annual meeting of the Association for Education in Journalism and Mass Communication. AEJMC, August 2010.Google ScholarGoogle Scholar
  30. J. Schwarz and M. R. Morris. Augmenting Web Pages and Search Results to Support Credibility Assessment. In ACM Conference on Human Factors in Computing Systems (CHI). ACM Press, May 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. K. Starbird, L. Palen, A. L. Hughes, and S. Vieweg. Chatter on the red: what hazards threat reveals about the social life of microblogged information. In CSCW '10: Proceedings of the 2010 ACM conference on Computer supported cooperative work, pages 241--250, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. S. Vieweg. Microblogged contributions to the emergency arena: Discovery, interpretation and implications. In Computer Supported Collaborative Work, February 2010.Google ScholarGoogle Scholar
  33. S. Vieweg, A. Hughes, K. Starbird, and L. Palen. Microblogging during two natural hazards events: What twitter may contribute to situational awareness. In Proceedings of ACM Conference on Computer Human Interaction (CHI), April 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. C. R. W. Watch. Leap of faith: Using the internet despite the dangers. http://www.consumerwebwatch.org/pdfs/princeton.pdf, October 2005.Google ScholarGoogle Scholar
  35. D. J. Watts and J. Peretti. Viral Marketing for the Real World. Harvard Business Review, June 2007.Google ScholarGoogle Scholar
  36. S. Yardi, D. Romero, G. Schoenebeck, and D. Boyd. Detecting spam in a Twitter network. First Monday, 15(1), January 2010.Google ScholarGoogle Scholar

Index Terms

  1. Information credibility on twitter

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WWW '11: Proceedings of the 20th international conference on World wide web
        March 2011
        840 pages
        ISBN:9781450306324
        DOI:10.1145/1963405

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 March 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,899of8,196submissions,23%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader