Contrasting the Spread of Misinformation in Online Social Networks

The emergence of online social networks has revolutionized the way people seek and share information. Nowadays, popular online social sites as Twitter, Facebook and Google+ are among the major news sources as well as the most effective channels for viral marketing. However, these networks also became the most effective channel for spreading misinformation, accidentally or maliciously. The widespread diffusion of inaccurate information or fake news can lead to undesirable and severe consequences, such as widespread panic, libelous campaigns and conspiracies. In order to guarantee the trustworthiness of online social networks it is a crucial challenge to find effective strategies to contrast the spread of the misinformation in the network. In this paper we concentrate our attention on two problems related to the diffusion of misinformation in social networks: identify the misinformation sources and limit its diffusion in the network. We consider a social network where some nodes have already been infected from misinformation. We first provide an heuristics to recognize the set of most probable sources of the infection. Then, we provide an heuristics to place a few monitors in some network nodes in order to control information diffused by the suspected nodes and block misinformation they injected in the network before it reaches a large part of the network. To verify the quality and efficiency of our suggested solutions, we conduct experiments on several real-world networks. Empirical results indicate that our heuristics are among the most effective known in literature.

[1]  L. D. Costa,et al.  Identifying the starting point of a spreading process in complex networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[2]  Huan Liu,et al.  Gleaning Wisdom from the Past: Early Detection of Emerging Rumors in Social Media , 2017, SDM.

[3]  Giuseppe Persiano,et al.  Mixing Time and Stationary Expected Social Welfare of Logit Dynamics , 2010, SAGT.

[4]  Shuo Yang,et al.  Unsupervised Fake News Detection on Social Media: A Generative Approach , 2019, AAAI.

[5]  Peter J Hotez,et al.  Texas and Its Measles Epidemics , 2016, PLoS medicine.

[6]  Xiang Li,et al.  Misinformation in Online Social Networks: Detect Them All with a Limited Budget , 2016, TOIS.

[7]  Madhav V. Marathe,et al.  Finding Critical Nodes for Inhibiting Diffusion of Complex Contagions in Social Networks , 2010, ECML/PKDD.

[8]  Yevgeniy Vorobeychik,et al.  Controlling Elections through Social Influence , 2017, AAMAS.

[9]  Masahiro Kimura,et al.  Minimizing the Spread of Contamination by Blocking Links in a Network , 2008, AAAI.

[10]  Suhang Wang,et al.  Fake News Detection on Social Media: A Data Mining Perspective , 2017, SKDD.

[11]  James Aspnes,et al.  Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.

[12]  Mehrdad Jalali,et al.  Detecting spam tweets in Twitter using a data stream clustering algorithm , 2015, 2015 International Congress on Technology, Communication and Knowledge (ICTCK).

[13]  Alex Hai Wang,et al.  Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[14]  Naren Ramakrishnan,et al.  Epidemiological modeling of news and rumors on Twitter , 2013, SNAKDD '13.

[15]  Huan Liu,et al.  Mining Misinformation in Social Media , 2016 .

[16]  R. Ehrenberg Social media sway: Worries over political misinformation on Twitter attract scientists' attention , 2012 .

[17]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[18]  Mohsen Guizani,et al.  Spammer Detection and Fake User Identification on Social Networks , 2019, IEEE Access.

[19]  Donghyun Kim,et al.  Rumor restriction in Online Social Networks , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).

[20]  Itai Himelboim,et al.  Virtual Zika transmission after the first U.S. case: who said what and how it spread on Twitter , 2018, American journal of infection control.

[21]  In Seop Na,et al.  Human-machine interaction: A case study on fake news detection using a backtracking based on a cognitive system , 2019, Cognitive Systems Research.

[22]  R. Kelly Garrett,et al.  Electoral Consequences of Political Rumors: Motivated Reasoning, Candidate Rumors, and Vote Choice during the 2008 U.S. Presidential Election , 2014 .

[23]  S. Korea Sources of Misinformation in Online Social Networks : Who to suspect ? , 2012 .

[24]  Kevin Driscoll,et al.  The diffusion of misinformation on social media: Temporal pattern, message, and source , 2018, Comput. Hum. Behav..

[25]  My T. Thai,et al.  Monitor placement to timely detect misinformation in Online Social Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[26]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[27]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[28]  Wanlei Zhou,et al.  Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.

[29]  Ullrich K. H. Ecker,et al.  Misinformation and Its Correction , 2012, Psychological science in the public interest : a journal of the American Psychological Society.

[30]  Xiang Li,et al.  Limiting the Spread of Misinformation While Effectively Raising Awareness in Social Networks , 2015, CSoNet.

[31]  Mona T. Diab,et al.  Rumor Identification and Belief Investigation on Twitter , 2016, WASSA@NAACL-HLT.

[32]  Katherine Levine Einstein,et al.  Do I Think BLS Data are BS? The Consequences of Conspiracy Theories , 2015 .

[33]  David Pogue,et al.  How to Stamp Out Fake News. , 2017, Scientific American.

[34]  Dimitrios Gunopulos,et al.  Finding effectors in social networks , 2010, KDD.

[35]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[36]  Paolo Penna,et al.  Logit Dynamics with Concurrent Updates for Local Interaction Games , 2012, Embedded Systems and Applications.

[37]  Jacob Goldenberg,et al.  Using Complex Systems Analysis to Advance Marketing Theory Development , 2001 .

[38]  David Kempe,et al.  Unbalanced Graph Cuts , 2005, ESA.

[39]  Kan Li,et al.  Least Cost Rumor Influence Minimization in Multiplex Social Networks , 2018, ICONIP.

[40]  Weili Wu,et al.  Least Cost Rumor Blocking in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[41]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[42]  P. Kumaraguru,et al.  $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter , 2013, 2013 APWG eCrime Researchers Summit.

[43]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[44]  Nam P. Nguyen,et al.  Containment of misinformation spread in online social networks , 2012, WebSci '12.

[45]  Arkaitz Zubiaga,et al.  Detection and Resolution of Rumours in Social Media , 2017, ACM Comput. Surv..

[46]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[47]  Deying Li,et al.  An efficient randomized algorithm for rumor blocking in online social networks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[48]  Filippo Menczer,et al.  Anatomy of an online misinformation network , 2018, PloS one.

[49]  Tanya Y. Berger-Wolf,et al.  Finding Spread Blockers in Dynamic Networks , 2008, SNAKDD.

[50]  Sinan Aral,et al.  The spread of true and false news online , 2018, Science.

[51]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[52]  Francesco Maffioli,et al.  The k best spanning arborescences of a network , 1980, Networks.

[53]  Robert E. Tarjan,et al.  A Fast Parametric Maximum Flow Algorithm and Applications , 1989, SIAM J. Comput..