skip to main content
10.1145/3292522.3326025acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article
Public Access

Debunking Rumors in Social Networks: A Timely Approach

Published:26 June 2019Publication History

ABSTRACT

Social networks have been instrumental in spreading rumor such as fake news and false rumors. Research in rumor intervention to date has concentrated on launching an intervening campaign to limit the number of infectees. However, many emerging and important tasks focus more onearly intervention. Social and psychological studies have revealed that rumors might evolve 70% of its original content after 6 transmissions. Therefore, ignoring earliness of intervention makes the intervening campaign downgrade rapidly due to the evolved content. In real social networks, the number of social actors is usuallylarge, while the budget for an intervening campaign is relativelysmall. The limited budget makes early intervention particularly challenging. Nonetheless, we present an efficient containment method that promptly terminates the diffusion with least cost. To our knowledge, this work is the first to study the earliness of rumor intervention in a large real-world social network. Evaluations on a network of $3$ million users show that the key social actors who earliest terminate the spread are not necessarily the most influential users or friends of rumor initiators, and the proposed method effectively reduces the life span of rumors.

References

  1. Luca Maria Aiello, Alain Barrat, Rossano Schifanella, Ciro Cattuto, Benjamin Markines, and Filippo Menczer. 2012. Friendship prediction and homophily in social media. ACM Transactions on the Web (TWEB), Vol. 6, 2 (2012), 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Gordon W Allport and Leo Postman. 1947. The psychology of rumor. (1947).Google ScholarGoogle Scholar
  3. Despoina Antonakaki, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, and Paraskevi Fragopoulou. 2016. Exploiting abused trending topics to identify spam campaigns in Twitter. Social Network Analysis and Mining, Vol. 6, 1 (2016), 1--11.Google ScholarGoogle ScholarCross RefCross Ref
  4. Fabricio Benevenuto, Tiago Rodrigues, Virgilio Almeida, Jussara Almeida, Chao Zhang, and Keith Ross. Identifying video spammers in online social networks. In International Workshop on Adversarial Information Retrieval on the Web. ACM, 45--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Alessandro Bessi, Fabio Petroni, Michela Del Vicario, Fabiana Zollo, Aris Anagnostopoulos, Antonio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2015. Viral misinformation: The role of homophily and polarization. In Proceedings of the 24th International Conference on World Wide Web. ACM, 355--356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Allan Borodin, Yuval Filmus, and Joel Oren. 2010. Threshold models for competitive influence in social networks. In International Workshop on Internet and Network Economics. Springer, 539--550. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In Proceedings of the 20th international conference on World Wide Web. ACM, 665--674. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Damon Centola. 2010. The spread of behavior in an online social network experiment. science, Vol. 329, 5996 (2010), 1194--1197.Google ScholarGoogle Scholar
  9. Chen Chen, Hanghang Tong, B Aditya Prakash, Charalampos E Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen Horng Chau. 2016. Node Immunization on Large Graphs: Theory and Algorithms. IEEE Transactions on Knowledge and Data Engineering, Vol. 28, 1 (2016), 113--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD. ACM, 1029--1038. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Daryl J Daley and David G Kendall. 1964. Epidemics and rumours. (1964).Google ScholarGoogle Scholar
  12. Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli, H Eugene Stanley, and Walter Quattrociocchi. 2016. The spreading of misinformation online. Proceedings of the National Academy of Sciences(PNAS), Vol. 113, 3 (2016), 554--559.Google ScholarGoogle ScholarCross RefCross Ref
  13. Uriel Feige. 1998. A threshold of ln n for approximating set cover. Journal of the ACM (JACM), Vol. 45, 4 (1998), 634--652. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Miroslav Fiedler. 1973. Algebraic connectivity of graphs. Czechoslovak mathematical journal, Vol. 23, 2 (1973), 298--305.Google ScholarGoogle Scholar
  15. Amit Goyal, Wei Lu, and Laks VS Lakshmanan. 2011. Simpath: An efficient algorithm for influence maximization under the linear threshold model. In Data Mining (ICDM), 2011 IEEE 11th International Conference on. IEEE, 211--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Daniel Gruhl, Ramanathan Guha, David Liben-Nowell, and Andrew Tomkins. 2004. Information diffusion through blogspace. In Proceedings of the 13th international conference on World Wide Web. ACM, 491--501. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Xinran He, Guojie Song, Wei Chen, and Qingye Jiang. 2012. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model.. In SDM. SIAM, 463--474.Google ScholarGoogle Scholar
  18. Zaobo He, Zhipeng Cai, Jiguo Yu, Xiaoming Wang, Yunchuan Sun, and Yingshu Li. 2017. Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Transactions on Vehicular Technology, Vol. 66, 3 (2017), 2789--2800.Google ScholarGoogle ScholarCross RefCross Ref
  19. Andrew Hiles, This Chapter Covers, and How Rumors Spread. 2011. How Firms Should Fight Rumors. Reputation Management: Building and Protecting Your Company's Profile in a Digital World (2011), 1--44.Google ScholarGoogle Scholar
  20. Ken-ichi Kawarabayashi. 2014. Optimal budget allocation: Theoretical guarantee and efficient algorithm. (2014).Google ScholarGoogle Scholar
  21. David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 137--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. William O Kermack and Anderson G McKendrick. 1927. A contribution to the mathematical theory of epidemics. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, Vol. 115. 700--721.Google ScholarGoogle ScholarCross RefCross Ref
  23. Jan Kostka, Yvonne Anne Oswald, and Roger Wattenhofer. 2008. Rumor dissemination in social networks. In International Colloquium on Structural Information and Communication Complexity. Springer, 185--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Sangho Lee and Jong Kim. 2014. Early filtering of ephemeral malicious accounts on Twitter. Computer Communications, Vol. 54 (2014), 48--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Jure Leskovec and Rok Sosivc. 2016. SNAP: A General-Purpose Network Analysis and Graph-Mining Library. ACM Transactions on Intelligent Systems and Technology (TIST), Vol. 8, 1 (2016), 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, and Manos Antonakakis. 2017. A Lustrum of malware network communication: Evolution and insights. In Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 788--804.Google ScholarGoogle ScholarCross RefCross Ref
  27. Hui Li, Sourav S Bhowmick, Jiangtao Cui, Yunjun Gao, and Jianfeng Ma. 2015. Getreal: Towards realistic selection of influence maximization strategies in competitive networks. In ACM SIGMOD International Conference on Management of Data. ACM, 1525--1537. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Iouliana Litou, Vana Kalogeraki, Ioannis Katakis, and Dimitrios Gunopulos. 2016. Real-Time and Cost-Effective Limitation of Misinformation Propagation. (2016).Google ScholarGoogle Scholar
  29. Wei Lu, Francesco Bonchi, Amit Goyal, and Laks VS Lakshmanan. 2013. The bang for the buck: fair competitive viral marketing from the host perspective. In International Conference on Knowledge Discovery and Data Dining (KDD). ACM, 928--936. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Carsten Lund and Mihalis Yannakakis. 1994. On the hardness of approximating minimization problems. Journal of the ACM (JACM), Vol. 41, 5 (1994), 960--981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Baharan Mirzasoleiman, Ashwinkumar Badanidiyuru, Amin Karbasi, Jan Vondrák, and Andreas Krause. 2014. Lazier Than Lazy Greedy. arXiv preprint arXiv:1409.7938 (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Yamir Moreno, Maziar Nekovee, and Amalio F Pacheco. 2004. Dynamics of rumor spreading in complex networks. Physical Review E, Vol. 69, 6 (2004), 066130.Google ScholarGoogle ScholarCross RefCross Ref
  33. Fred Morstatter, Liang Wu, Tahora H Nazer, Kathleen M Carley, and Huan Liu. 2016. A new approach to bot detection: striking the balance between precision and recall. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 533--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Mark EJ Newman. 2001. The structure of scientific collaboration networks. Proceedings of the National Academy of Sciences (PNAS), Vol. 98, 2 (2001), 404--409.Google ScholarGoogle ScholarCross RefCross Ref
  35. Nam P Nguyen, Guanhua Yan, My T Thai, and Stephan Eidenbenz. 2012. Containment of misinformation spread in online social networks. In Proceedings of the 4th Annual ACM Web Science Conference. ACM, 213--222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Shirin Nilizadeh, Francc ois Labrèche, Alireza Sedighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, and Giovanni Vigna. 2017. POISED: Spotting Twitter Spam Off the Beaten Paths. arXiv preprint arXiv:1708.09058 (2017).Google ScholarGoogle Scholar
  37. Michael Simpson, Venkatesh Srinivasan, and Alex Thomo. 2016. Clearing contamination in large networks. IEEE Transactions on Knowledge and Data Engineering, Vol. 28, 6 (2016), 1435--1448. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Chonggang Song, Wynne Hsu, and Mong Li Lee. 2015. Node Immunization over Infectious Period. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM, 831--840. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Hanghang Tong, B Aditya Prakash, Charalampos Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen Horng Chau. 2010. On the vulnerability of large graphs. In International Conference on Data Mining. IEEE, 1091--1096. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Steve Webb, James Caverlee, and Calton Pu. 2008. Social Honeypots: Making Friends With A Spammer Near You.. In CEAS.Google ScholarGoogle Scholar
  41. Laurence A Wolsey. 1982. An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica, Vol. 2, 4 (1982), 385--393.Google ScholarGoogle ScholarCross RefCross Ref
  42. Liang Wu, Xia Hu, Fred Morstatter, and Huan Liu. 2017a. Adaptive spammer detection with sparse group modeling. In Eleventh International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  43. Liang Wu, Xia Hu, Fred Morstatter, and Huan Liu. 2017b. Detecting camouflaged content polluters. In Eleventh International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  44. Liang Wu, Jundong Li, Xia Hu, and Huan Liu. 2017c. Gleaning wisdom from the past: Early detection of emerging rumors in social media. In Proceedings of the 2017 SIAM International Conference on Data Mining. SIAM, 99--107.Google ScholarGoogle ScholarCross RefCross Ref
  45. Liang Wu and Huan Liu. 2018. Tracing fake-news footprints: Characterizing social media messages by how they propagate. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. ACM, 637--645. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Liang Wu, Fred Morstatter, Xia Hu, and Huan Liu. 2016. Mining misinformation in social media. Big Data in Complex and Social Networks (2016), 123--152.Google ScholarGoogle Scholar
  47. Reza Zafarani and Huan Liu. 10 Bits of Surprise: Detecting Malicious Users with Minimum Information (CIKM'15). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Yao Zhang, Sudip Saha, Anil Vullikanti, B Aditya Prakash, and others. 2015. Near-optimal Algorithms for Controlling Propagation at Group Scale on Networks. IEEE Transactions on Knowledge and Data Engineering (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Debunking Rumors in Social Networks: A Timely Approach

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WebSci '19: Proceedings of the 10th ACM Conference on Web Science
          June 2019
          395 pages
          ISBN:9781450362023
          DOI:10.1145/3292522

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 June 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          WebSci '19 Paper Acceptance Rate41of130submissions,32%Overall Acceptance Rate218of875submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader