Skip to main content

Extreme User and Political Rumor Detection on Twitter

  • Conference paper
  • First Online:
Advanced Data Mining and Applications (ADMA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10086))

Included in the following conference series:

Abstract

Twitter, as a popular social networking tool that allows its users to conveniently propagate information, has been widely used by politicians and political campaigners worldwide. In the past years, Twitter has come under scrutiny due to its lack of filtering mechanisms, which lead to the propagation of trolling, bullying, and other unsocial behaviors. Rumors can also be easily created on Twitter, e.g., by extreme political campaigners, and widely spread by readers who cannot judge their truthfulness. Current work on Twitter message assessment, however, focuses on credibility, which is subjective and can be affected by assessor’s bias. In this paper, we focus on the actual message truthfulness, and propose a rule-based method for detecting political rumors on Twitter based on identifying extreme users. We employ clustering methods to identify news tweets. In contrast with other methods that focus on the content of tweets, our unsupervised classification method employs five structural and timeline features for the detection of extreme users. We show with extensive experiments that certain rules in our rule set provide accurate rumor detection with precision and recall both above 80 %, while some other rules provide 100 % precision, although with lower recalls.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://twitter.com/BarackObama.

  2. 2.

    https://twitter.com/HillaryClinton.

  3. 3.

    https://en.wikipedia.org/wiki/Gamergate_controversy.

  4. 4.

    https://en.wikipedia.org/wiki/European_migrant_crisis.

  5. 5.

    http://twittertrails.com/.

  6. 6.

    http://longurl.org.

References

  1. Al-Ali, A., Zualkernan, I., Aloul, F.: A mobile GPRS-sensors array for air pollution monitoring. IEEE Sensors J. 10(10), 1666–1671 (2010)

    Article  Google Scholar 

  2. Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proceedings of the 20th International World Wide Web Conference, pp. 675–684 (2011)

    Google Scholar 

  3. Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, p. 2. ACM (2012)

    Google Scholar 

  4. Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: TweetCred: real-time credibility assessment of content on twitter. In: Aiello, L.M., McFarland, D. (eds.) SocInfo 2014. LNCS, vol. 8851, pp. 228–243. Springer, Heidelberg (2014). doi:10.1007/978-3-319-13734-6_16

    Google Scholar 

  5. Jaho, E., Tzoannos, E., Papadopoulos, A., Sarris, N.: Alethiometer: a framework for assessing trustworthiness and content validity in social media. In: Proceedings of the 23rd International Conference on World Wide Web Companion, pp. 749–752 (2014)

    Google Scholar 

  6. Kakol, M., Jankowski-Lorek, M., Abramczuk, K., Wierzbicki, A., Catasta, M.: On the subjectivity and bias of web content credibility evaluations. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 1131–1136 (2013)

    Google Scholar 

  7. Lee, K., Caverlee, J., Kamath, K.Y., Cheng, Z.: Detecting collective attention spam. In: Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality, pp. 48–55. ACM (2012)

    Google Scholar 

  8. Mathioudakis, M., Koudas, N.: TwitterMonitor: trend detection over the twitter stream. In: Proceedings of the ACM SIGMOD International Conference on Management of data, pp. 1155–1158 (2010)

    Google Scholar 

  9. Metaxas, P.T., Finn, S., Mustafaraj, E.: Using twittertrails.com to investigate rumor propagation. In: Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, pp. 69–72. ACM (2015)

    Google Scholar 

  10. Miyabe, M., Nadamoto, A., Aramaki, E.: How do rumors spread during a crisis? Analysis of rumor expansion and disaffirmation on twitter after 3.11 in Japan. Int. J. Web Inf. Syst. 10(4), 394–412 (2014)

    Article  Google Scholar 

  11. Morris, M.R., Counts, S., Roseway, A., Hoff, A., Schwarz, J.: Tweeting is believing?: understanding microblog credibility perceptions. In: Proceedings of the ACM Conference on Computer Supported Cooperative Work, pp. 441–450 (2012)

    Google Scholar 

  12. Popescu, A.-M., Pennacchiotti, M.: Detecting controversial events from twitter. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, pp. 1873–1876 (2010)

    Google Scholar 

  13. Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 1589–1599. Association for Computational Linguistics (2011)

    Google Scholar 

  14. Unankard, S., Li, X., Sharaf, M.A.: Emerging event detection in social networks with location sensitivity. World Wide Web 18(5), 1393–1417 (2015)

    Article  Google Scholar 

  15. Zhang, Y., Szabo, C., Sheng, Q.Z., Fang, X.S.: Classifying perspectives on twitter: immediate observation, affection, and speculation. In: Proceedings of the 16th International Conference on Web Information Systems Engineering, Part I, pp. 493–507 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yihong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Chang, C., Zhang, Y., Szabo, C., Sheng, Q.Z. (2016). Extreme User and Political Rumor Detection on Twitter. In: Li, J., Li, X., Wang, S., Li, J., Sheng, Q. (eds) Advanced Data Mining and Applications. ADMA 2016. Lecture Notes in Computer Science(), vol 10086. Springer, Cham. https://doi.org/10.1007/978-3-319-49586-6_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49586-6_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49585-9

  • Online ISBN: 978-3-319-49586-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics