Terrorism and War: Twitter Cascade Analysis

Misinformation spreading over online social networks is becoming more and more critical due to the huge amount of information sources whose reliability is hard to establish; moreover, several humans psychology factors as echo chambers and biased searches, plus the intensive use of bot, makes the scenario difficult to cope with. Unprecedented opportunities of gathering data to enhance knowledge though raised, even if the threat of assuming a fake as real or viceversa has been hugely increased, so urgent questions are how to ascertain the truth, and how to somehow limit the flooding process of fakes. In this work, we investigate on the diffusion of true, false and mixed news through the Twitter network using a free large dataset of fact-checked rumor cascades, that were also categorized into specific topics (here, we focus on Terrorism and War). Our goal is to assess how news spread depending on their veracity and we also try to provide an analytic formulation of spreading process via a differential equation that approximates this phenomenon by properly setting the retweet rate.

[1]  Filippo Menczer,et al.  Online Human-Bot Interactions: Detection, Estimation, and Characterization , 2017, ICWSM.

[2]  Miriam J. Metzger,et al.  Social and Heuristic Approaches to Credibility Evaluation Online , 2010 .

[3]  Ian Skurnik,et al.  Metacognitive Experiences and the Intricacies of Setting People Straight: Implications for Debiasing and Public Information Campaigns , 2007 .

[4]  Stephan Lewandowsky,et al.  Reminders and repetition of misinformation: Helping or hindering its retraction? , 2017, Journal of Applied Research in Memory and Cognition.

[5]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[6]  P. Sztompka Trust: A Sociological Theory , 2000 .

[7]  Jie Zhang,et al.  An evolutionary model for constructing robust trust networks , 2013, AAMAS.

[8]  Vincenza Carchiolo,et al.  The Cost of Trust in the Dynamics of Best Attachment , 2015, Comput. Informatics.

[9]  Punam Bedi,et al.  Empowering recommender systems using trust and argumentation , 2014, Inf. Sci..

[10]  Aristides Gionis,et al.  Quantifying Controversy on Social Media , 2018, ACM Trans. Soc. Comput..

[11]  Paolo Avesani,et al.  Trust-aware recommender systems , 2007, RecSys '07.

[12]  Vincenza Carchiolo,et al.  Users' attachment in trust networks: reputation vs. effort , 2013, Int. J. Bio Inspired Comput..

[13]  Jiawei Han,et al.  Evaluating Event Credibility on Twitter , 2012, SDM.

[14]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[15]  Vincenza Carchiolo,et al.  Direct trust assignment using social reputation and aging , 2017, J. Ambient Intell. Humaniz. Comput..

[16]  Vincenza Carchiolo,et al.  Trust assessment: a personalized, distributed, and secure approach , 2012, Concurr. Comput. Pract. Exp..

[17]  Sinan Aral,et al.  The spread of true and false news online , 2018, Science.

[18]  Filippo Menczer,et al.  The rise of social bots , 2014, Commun. ACM.

[19]  Daniel G. Goldstein,et al.  The structure of online diffusion networks , 2012, EC '12.

[20]  S. Moscovici,et al.  Biased information search in group decision making. , 2000, Journal of Personality and Social Psychology.