Abstract
Online social networks (OSNs) are now implied as an important source of news and information besides establishing social connections. However, such information sharing is not always authentic because people, sometimes, also share their perceptions and fabricated information on OSNs. Thus, verification of online posts is important to maintain reliability over this useful communication medium. To address this concern, multiple approaches have been investigated including machine learning, natural language processing, source authentication, empirical studies, web semantics, and modeling/simulations, but the problem still persists. This research proposes an effective synergy-based rumor verification method along with a weighted-mean reputation management system to mitigate the spread of rumors over OSN. The model was formally verified through Colored Petri-Nets while its semantic behavior was analyzed through ontologies. Moreover, a third-party Facebook application was developed for proof of concept, and users’ acceptance and usability analysis was performed through Technology Acceptance Model and Self-Efficacy scale. The results indicate that the proposed approach can be used as an effective tool for the identification of rumors and it has the potential to improve the quality of users’ online experience.
Similar content being viewed by others
Data availability
Data will be provided on demand. Please contact the corresponding author.
References
[Online]. Available: https://stats.idre.ucla.edu/spss/faq/what-does-cronbachs-alpha-mean/.
[Online]. Available: https://www.wikipedia.org/.
[Online]. Available: https://www.yahoo.com/.
Ahmad A, Whitworth B, Zeshan F, Bertino E, Friedman R (2017) Extending social networks with delegation. Comput Secur 70:546–564
Ahmad A, Whitworth B, Zeshan F, Janczewski L, Ali M, Chaudary MH, Friedman R (2019) A relation-aware multiparty access control. J Intell Fuzzy Syst 37(1):227–239
Ahmad A, Azhar A, Naqvi S, Nawaz A, Arshad S, Zeshan F, Salih AO (2020) A methodology for sender-oriented anti-spamming. J Intell Fuzzy Syst 38(3):2765–2776
Ahmad A, Whitworth B, Bertino E (2022) A framework for the application of socio-technical design methodology. Ethics Inf Technol 24(4):46
Alpaydin E (2009) Introduction to machine learning, MIT press
Anderson M, Hitlin P, Atkinson M (2016) Wikipedia at 15: millions of readers in scores of languages. 14 January 2016. [Online]. Available: https://www.pewresearch.org/fact-tank/2016/01/14/wikipedia-at-15/.
Barboza FC, Jeong H, Kobayashi K, Shiramatsu S (2013) An ontology-based computational framework for analyzing public opinion framing in news media. In: 2013 IEEE Int Conf Syst Man Cybern (pp 2420–2426). IEEE
Becker D, Bendett S (2015) Crowdsourcing solutions for disaster response: examples and lessons for the US government. Procedia Eng 107:27–33
Boididou C, Middleton SE, Jin Z, Papadopoulos S, Dang-Nguyen DT, Boato G, Kompatsiaris Y (2018a) Verifying information with multimedia content on twitter: a comparative study of automated approaches. Multimed Tools Appl 77:15545–15571
Boididou C, Papadopoulos S, Zampoglou M, Apostolidis L, Papadopoulou O, Kompatsiaris Y (2018b) Detection and visualization of misleading content on twitter. Int J Multimed Inf Retr 7:71–86
Bordia P, DiFonzo N (2002) When social psychology became less social: Prasad and the history of rumor research. Asian J Soc Psychol 5(1):49–61
Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web, pp 675–684
Cen J, Li Y (2022) A rumor detection method from social network based on deep learning in big data environment. Comput Intell Neurosci
Chen X (2016) A real time anti-spamming system in crowdsourcing platform. In: Software engineering and service science (ICSESS), 2016 7th IEEE international conference on, IEEE, pp 981–984
Choudhury D, Acharjee T (2023) A novel approach to fake news detection in social networks using genetic algorithm applying machine learning classifiers. Multimed Tools Appl 82:9029–9045
Chua AY, Banerjee S (2017a) To share or not to share: the role of epistemic belief in online health rumors. Int J Med Inf 108:36–41
Chua AY, Banerjee S (2017b) Rumor verifications on facebook: click speech of likes, comments and shares. In: 2017 Twelfth international conference on digital information management (ICDIM), pp 257–262
Clark BY, Zingale N, Logan J, Brudney J (2019) A framework for using crowdsourcing in government. In: Social entrepreneurship: concepts, methodologies, tools, and applications, IGI Global, pp 405–425
Clayton K, Blair S, Busam JA, Forstner S, Glance J, Green G, Nyhan B (2020) Real solutions for fake news? Measuring the effectiveness of general warnings and fact-check tags in reducing belief in false stories on social media. Polit Behav 42:1073–1095
Clementi A, Crescenzi P, Doerr C, Fraigniaud P, Pasquale F, Silvestri R (2013) Rumor spreading in random evolving graphs. In: European symposium on algorithms pp 325–336
Dang A, Smit M, Moh'd A, Minghim R, Milios E (2016) Toward understanding how users respond to rumours in social media. In: Advances in social networks analysis and mining (ASONAM), 2016 IEEE/ACM international conference on, IEEE, pp 777–784
De Guerre J (2007) The mechanics of Vipul’s Razor technology. Netw Secur 2007:15–17
Derczynski L, Bontcheva K, Liakata M, Procter R, Hoi GWS, Zubiaga A (2017) SemEval-2017 task 8: RumourEval: determining rumour veracity and support for rumours. arXiv preprint arXiv:1704.05972
Ding X, Zhang X, Fan R, Xu Q, Hunt K, Zhuang J (2022) Rumor recognition behavior of social media users in emergencies. J Manag Sci Eng 7:36–47
Ehsanfar A, Mansouri M (2017) Incentivizing the dissemination of truth versus fake news in social networks. In: 2017 12th system of systems engineering conference (SoSE), pp 1–6
Fountoulakis N, Panagiotou K (2013) Rumor spreading on random regular graphs and expanders. Random Struct Algorithm 43(2):201–220
Funke D (2017) 13 Nov 2017. [Online]. Available: https://www.poynter.org/fact-checking/2017/the-eu-is-asking-for-help-in-its-fight-against-fake-news/.
Gao H, Wu Y, Xu Y, Li R, Jiang Z (2023) Neural collaborative learning for user preference discovery from biased behavior sequences. IEEE Transact Comput Soc Syst
Gatautis R, Vitkauskaite E (2014) Crowdsourcing application in marketing activities. Procedia Soc Behav Sci 110:1243–1250
Granik M, Mesyura V (2017) Fake news detection using naive Bayes classifier. In: Electrical and computer engineering (UKRCON), 2017 IEEE first Ukraine conference on, IEEE, pp 900–903
Grassberger P (1983) On the critical behavior of the general epidemic process and dynamical percolation. Math Biosci 63:157–172
Gray JA (1981) A critique of Eysenck’s theory of personality. In: A model for personality (pp 246–276). Springer Berlin Heidelberg
Guo M, Xu Z, Liu L, Guo M, Zhang Y (2020) An adaptive deep transfer learning model for rumor detection without sufficient identified rumors. Math Probl Eng
Gupta A, Kumaraguru P, Castillo C, Meier P (2014) Tweetcred: real-time credibility assessment of content on twitter. In: International conference on social informatics, Springer, pp 228–243
Gupta A, Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd international conference on world wide web, ACM, pp 729–736
Hoodbhoy P (2017) Why they lynched Mashal Khan, 29 April 2017. [Online]. Available: https://www.dawn.com/news/1329909.
Imran M, Ahmad A (2023) Enhancing data quality to mine credible patterns. Inf Syst Front 49:544–564
Jain V, Singh M (2013) Ontology development and query retrieval using protege tool. Int J Intell Syst Appl 9:67–75
Jang SM, Geng T, Li J-YQ, Xia R, Huang C-T, Kim H, Tang J (2018) A computational approach for examining the roots and spreading patterns of fake news: evolution tree analysis. Comput Human Behav Elsevier 84:103–113
Javanmardi S, Lopes C, Baldi P (2010) Modeling user reputation in wikis. Stat Anal Data Min ASA Data Sci J 3:126–139
Jensen K (2013) Coloured petri nets: basic concepts, analysis methods and practical use, vol 1. Springer Science & Business Media
Jin Z, Cao J, Zhang Y, Zhou J, Tian Q (2016) Novel visual and statistical image features for microblogs news verification. IEEE Trans Multimed 19(3):598–608
Kermack WO, McKendrick AG (1939) Contributions to the mathematical theory of epidemics: V. analysis of experimental epidemics of mouse-typhoid; a bacterial disease conferring incomplete immunity. Epidemiol Infect 39(3):271–288
Khaled K, ElKorany A, Ezzat CA (2023) Enhancing prediction of user stance for social networks rumors. Int J Electr Comput Eng (IJECE) 13:6609–6619
Khalil U, Ahmad A, Abdel-Aty AH, Elhoseny M, El-Soud MWA, Zeshan F (2021) Identification of trusted IoT devices for secure delegation. Comput Electr Eng 90:106988
Kotteti CMM, Dong X, Qian L (2020) Ensemble deep learning on time-series representation of tweets for rumor detection in social media. Appl Sci 10:7541
Kumar KK, Geethakumari G (2014) Detecting misinformation in online social networks using cognitive psychology. Human-Centric Comput Inf Sci SpringerOpen 4:14
Lai P (2017) The literature review of technology adoption models and theories for the novelty technology. JISTEM-J Inf Syst Technol Manag 14:21–38
Le H, Boynton G, Shafiq Z, Srinivasan P (2019) A postmortem of suspended Twitter accounts in the 2016 US presidential election. In: 2019 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM)
Li C, Li J, Ma Z, Zhu H (2014) Canard phenomenon for an SIS epidemic model with nonlinear incidence. J Math Anal Appl 420:987–1004
Lunden I (2018) Yahoo Mail aims at emerging markets and casual users, launches versions for mobile web and Android Go [Online]. Available: https://techcrunch.com/2018/06/19/yahoo-mail-go/.
Luvembe AM, Li W, Li S, Liu F, Xu G (2023) Dual emotion based fake news detection: a deep attention-weight update approach. Inf Process Manag 60(4):103354
Lytinen SL (2005) Artificial intelligence: natural language processing. Van nostrand's scientific encyclopedia
Majchrzak A, Malhotra A (2013) Towards an information systems perspective and research agenda on crowdsourcing for innovation. J Strateg Inf Syst Elsevier 22(4):257–268
Martínez M (2018) Burned to death because of a rumour on WhatsApp. 12 November 2018. [Online]. Available: https://www.bbc.com/news/world-latin-america-46145986.
Metaxas PT, Finn S, Mustafaraj E (2015) Using twittertrails. com to investigate rumor propagation. In: Proceedings of the 18th ACM conference companion on computer supported cooperative work \& social computing, pp 69–72
Middleton SE, Papadopoulos S, Kompatsiaris Y (2018) Social computing for verifying social media content in breaking news. IEEE Internet Comput 22(2):83–89
Mills S (2012) How twitter is winning the 2012 US election. October 2012. [Online]. Available: https://www.theguardian.com/commentisfree/2012/oct/16/twitter-winning-2012-us-election.
Miró-Llinares F, Aguerri JC (2023) Misinformation about fake news: a systematic critical review of empirical studies on the phenomenon and its status as a ‘threat.’ Eur J Criminol 20(1):356–374
MIT Technology Review, 14 November 2017. [Online]. Available: https://www.technologyreview.com/f/609478/last-year-social-media-was-used-to-influence-elections-in-at-least-18-countries/.
Moreno Y, Nekovee M, Vespignani A (2004) Efficiency and reliability of epidemic data dissemination in complex networks. Phys Rev E 69(5):055101
Mughaid A et al (2022) An intelligent cybersecurity system for detecting fake news in social media websites. Soft Comput 26(12):5577–5591
Muhammad T, Ahmad A (2021) A joint sharing approach for online privacy preservation. World Wide Web 24(3):895–924
Negm TM, Rezqa MA, Hegazi AF (2018) News credibility measure utilizing ontologies \& semantic weighing schemes (NCMOSWS). In: Negm, Tarek M and Rezqa, Mohamed A and Hegazi, Abdel Fatah, pp 57–64
O’Neill, Philip D (2002) A tutorial introduction to Bayesian inference for stochastic epidemic models using Markov chain Monte Carlo methods. Math Biosci 180(1–2):103–114
Ojha RP, Srivastava PK, Awasthi S, Srivastava V, Pandey PS, Dwivedi RS, Singh R, Galletta A (2023) Controlling of fake information dissemination in online social networks: an epidemiological approach. IEEE Access 11:32229–32240
Ozturk P, Li H, Sakamoto Y (2015) Combating rumor spread on social media: the effectiveness of refutation and warning. In: System sciences (HICSS), 2015 48th Hawaii international conference on, IEEE
Pastor R, Vespignani A (2001) Epidemic dynamics and endemic states in complex networks. Phys Rev E 63:066117
Patten ML (2016) Proposing empirical research: a guide to the fundamentals, Routledge
Perrig A, Canetti R, Song D, Tygar JD (2001) Efficient and secure source authentication for multicast. In: Network and distributed system security symposium, NDSS, vol 1, No. 2001, pp 35–46
Popat K, Mukherjee S, Strötgen J, Weikum G (2018) CredEye: a credibility lens for analyzing and explaining misinformation. In: Companion proceedings of the the web conference 2018 (pp 155-158)
Pourghomi P, Safieddine F, Masri W, Dordevic M (2017) How to stop spread of misinformation on social media: Facebook plans vs. right-click authenticate approach. In: 2017 international conference on engineering & MIS (ICEMIS) (pp 1–8). IEEE
Prollochs N, Feuerriegel S (2023) Mechanisms of true and false rumor sharing in social media: collective intelligence or herd behavior? Proc ACM Human-Comput Interact 7:1–38
Rathakrishnan A, Sathiyanarayanan R (2023) Rumor detection on social media using deep learning algorithms with fuzzy inference system for healthcare analytics system using COVID-19 dataset. Int J Comput Intell Appl 22:2341008
Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F (2011) Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th international conference companion on world wide web (pp 249–252)
Reshi JA, Ali R (2019) Rumor proliferation and detection in social media: a review. In: 2019 5th international conference on advanced computing & communication systems (ICACCS) (pp 1156–1160). IEEE
Rotman D (2013) MIT technology retrieved from meet the man with a cheap and easy plan to stop global warming. [Online]. Available: http://www.technologyreview.com/featuredstory/511016/a-cheap-and-easy-plan-to-stop-globalwarming.
Rubin VL, Conroy NJ, Chen Y (2015) Towards news verification: Deception detection methods for news discourse. In: Proceedings of the Hawaii international conference on system sciences (HICSS48) symposium on rapid screening technologies, deception detection and credibility assessment symposium, pp 5–8
Sadeghi F, Bidgoly AJ, Amirkhani H (2022) Fake news detection on social media using a natural language inference approach. Multimed Tools Appl 81:33801–33821
Samreen A, Ahmad A, Zeshan F, Ahmed F, Ahmed S, Ashfaq Z (2020) A collaborative method for protecting teens against online predators over social networks: a behavioral analysis. IEEE Access 8:174375–174393
Samreen A, Ahmad A, Zeshan F (2020) Searching for truth in the post-truth age. In: 2020 3rd international conference on advancements in computational sciences (ICACS) (pp 1–5). IEEE
Saxton GD, Oh O, Kishore R (2013) Rules of crowdsourcing: models, issues, and systems of control. Inf Syst Manag 30:2–20
Schmitz PW, Tröger T (2012) The (sub-) optimality of the majority rule. Games Econ Behav 74(2):651–665
Seddari N, Derhab A, Belaoued M, Halboob W, Al-Muhtadi J, Bouras A (2022) A hybrid linguistic and knowledge-based analysis approach for fake news detection on social media. IEEE Access 10:62097–62109
Shao C, Ciampaglia GL, Flammini A, Menczer F (2016) Hoaxy: a platform for tracking online misinformation. In: Proceedings of the 25th international conference companion on world wide web, 2016, pp 745–750
Shearer E (2021) More than eight-in-ten Americans get news from digital devices. Pew Research Center, 12 January 2021. [Online]. Available: https://www.pewresearch.org/fact-tank/2021/01/12/more-than-eight-in-ten-americans-get-news-from-digital-devices/
Shelke S, Attar V (2022) Rumor detection in social network based on user, content and lexical features. Multimed Tools Appl 81:17347–17368
Sherer M, Maddux JE, Mercandante B, Prentice-Dunn S, Jacobs B, Rogers RW (1982) The self-efficacy scale: construction and validation. Psychol Rep 51:663–671
Shi W, Xie M (2013) A reputation-based collaborative approach for spam filtering. AASRI Procedia 5:220–227
Shin J, Jian L, Driscoll K, Bar F (2018) The diffusion of misinformation on social media: temporal pattern, message, and source. Comput Hum Behav 83:278–287
Simons A, Kaiser LF, vom Brocke J (2019) Enterprise crowdfunding: foundations, applications, and research findings. Bus Inf Syst Eng 61:113–121
Strickland J (xxxx) How facebook works, [Online]. Available: https://computer.howstuffworks.com/internet/social-networking/networks/facebook.htm.
Suthanthira Devi P, Karthika S (2022) Rumor identification and verification for text in social media content. Comput J 65(2):436–455
Tschiatschek S, Singla A, Gomez Rodriguez M, Merchant A, Krause A (2017) Detecting fake news in social networks via crowdsourcing, arXiv preprint arXiv:1711.09025
Tu K, Chen C, Hou C, Yuan J, Li J, Yuan X (2021) Rumor2vec: a rumor detection framework with joint text and propagation structure representation learning. Inf Sci 560:137–151
VanVoorhis CW, Morgan BL (2007) Understanding power and rules of thumb for determining sample sizes. Tutorials Quant Methods Psychol 3:43–50
Wang WY (2017) liar, liar pants on fire: a new benchmark dataset for fake news detection. arXiv preprint arXiv:1705.00648
Wang J, Zhao L, Huang R (2014) 2SI2R rumor spreading model in homogeneous networks. Physica A 413:153–161
Wang Q, Yang X, Xi W (2018) Effects of group arguments on rumor belief and transmission in online communities: an information cascade and group polarization perspective. Inf Manag 55(4):441–449
Wang W, Qiu Y, Xuan S, Yang W (2021) Early rumor detection based on deep recurrent q-learning. Secur Commun Netw 2021:1–13
Welser HT, Cosley D, Kossinets G, Lin A, Dokshin F, Gay G, Smith M (2011) Finding social roles in Wikipedia. In: Proceedings of the 2011 iConference (pp 122-129)
Wiegand S, Middleton SE (2016) Veracity and velocity of social media content during breaking news: analysis of november 2015 Paris shootings. In: Proceedings of the 25th international conference companion on world wide web, pp 751–756
Wilson GD, Barrett PT, Gray JA (1989) Human reactions to reward and punishment: a questionnaire examination of Gray’s personality theory. Br J Psychol 80(4):509–515
Wu X, Zhu X, Wu G-Q, Ding W (2013) Data mining with big data. IEEE Trans Knowl Data Eng 26(1):97–107
Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intell Mag 13(3):55–75
Zeshan F, Mohamad R, Ahmad MN, Othman MB, Elhag AAM, Hussain SA, Ahmad A, Ali A, Ashraf M, Babar I (2019) Context-aware ontology and web services discovery for distributed embedded real-time systems. Malays J Comput Sci 32(3):186–208
Zubiaga A, Liakata M, Procter R, Bontcheva K, Tolmie P (2015) Crowdsourcing the annotation of rumourous conversations in social media. In: Proceedings of the 24th international conference on world wide web, pp 347–353
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Contributions
Conceptualization was performed by A.S and A.A; data curation by A.S and F.Z; formal analysis by F.Z and H.T.M; methodology by A.A; project administration by A.A; F.Z; H.T.M; writing by A.S; A.A; F.Z; H.T.M.
Corresponding author
Ethics declarations
Conflict of interest
We have no financial and personal relationships with other people and organizations.
Ethical approval
No personal identifiable information was acquired from the participants, and their consent was taken for the publication of the generalized statistics.
Consent for publication
The proposed work has not been published previously and is not under consideration to publish elsewhere.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1
Statistics for Occurrence Graph.
Appendix II
Survey Questions.
Variables | Measurement instrument |
---|---|
Perceived ease of use | PE1-I found the application easy to use PE2-Learning how to use the application is easy for me PE3-Rating on the post is performed easily using the application PE4- It is easy to verify news by using the application |
Perceived usefulness | PU1-The application can make it easier to verify fake content PU2-Using the application increases the efficiency for verifying rumors PU3-The application allows to authenticate the rumors PU4-The application is useful for verification of rumors |
Intention to use | IU1-I am positive toward using the application IU2-If I have access to application, I intent to use it for verifying rumors IU3-I will use the application for rumor verification IU4-Verifying through the application is a good idea |
Usage behavior | UB1-I intend to check post decisions from the application UB2-Using the application does not require any tutorial UB3-Using the application is easy for me UB4-I intend to be a user of the application |
Self-efficacy | SE1-I have necessary skills to use the application SE2-I feel confident on the verification results of the application SE3-I can learn how to use the application SE4-I am confident that I can efficiently deal with the application |
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sarfraz, A., Ahmad, A., Zeshan, F. et al. Synews: a synergy-based rumor verification system. Soc. Netw. Anal. Min. 14, 57 (2024). https://doi.org/10.1007/s13278-024-01214-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13278-024-01214-z