[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships

Published: 30 July 2020 Publication History

Abstract

Untrustworthy content such as fake news and clickbait have become a pervasive problem on the Internet, causing significant socio-political problems around the world. Identifying untrustworthy content is a crucial step in countering them. The current best practices for identification involve content analysis and arduous fact-checking of the content. To complement content analysis, we propose examining websites’ third-parties to identify their trustworthiness. Websites utilize third-parties, also known as their digital supply chains, to create and present content and help the website function. Third-parties are an important indication of a website's business model. Similar websites exhibit similarities in the third-parties they use. Using this perspective, we use machine learning and heuristic methods to discern similarities and dissimilarities in third-party usage, which we use to predict trustworthiness of websites. We demonstrate the effectiveness and robustness of our approach in predicting trustworthiness of websites from a database of News, Fake News, and Clickbait websites. Our approach can be easily and cost-effectively implemented to reinforce current identification methods.

References

[1]
N. Akpan. 2016. The Very Real Consequences of Fake News Stories and Why Your Brain Can't Ignore Them. Retrieved from http://www.pbs.org/newshour/updates/real-consequences-fake-news-stories-brain-cant-ignore/.
[2]
A. Anand, T. Chakraborty, and N. Park. 2017. We used neural networks to detect clickbaits: You won't believe what happened next! In Proceedings of the European Conference on Information Retrieval. 541--547.
[3]
A. Abbasi, Z. Zhang, D. Zimbra, H. Chen, and J. F. Nunamaker Jr. 2010. Detecting fake websites: The contribution of statistical learning theory. MIS Quart. 34, 3 (2010) 435-461.
[4]
D. Bowersox, D. Closs, and T. Stank. 2003. How to master cross-enterprise collaboration. Supply Chain Manag. Rev. 7, 4 (2003), 18--27.
[5]
Y. Chen, N. J. Conroy, and V. L. Rubin. 2015. Misleading online content: Recognizing clickbait as false news. In Proceedings of the ACM Workshop on Multimodal Deception Detection. 15--19.
[6]
A. Chakraborty, B. Paranjape, S. Kakarla, and N. Ganguly. 2016. Stop clickbait: Detecting and preventing clickbaits in online news media. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’16). 9--16.
[7]
T. Y. Choi and Y. Kim. 2008. Structural embeddedness and supplier management: a network perspective. J. Supply Chain Manag. 44, 4 (2008), 5--13.
[8]
D. Chandler, P. R. Haunschild, M. Rhee, and C. M. Beckman. 2013. The effects of firm reputation and status on interorganizational network structure. Strategic Organization 11, 3 (2013), 217--244.
[9]
R. Gopal, H. Hidaji, R. A. Patterson, E. Rolland, and D. Zhdanov. 2018. How much to share with third-parties? A website's dilemma and users’ privacy concerns. MIS Quart. 42, 1 (2018), 143--164.
[10]
R. Gopal, R. Patterson, E. Rolland, and D. Zhdanov. 2012. Social Network Meets Sherlock Holmes: Investigating the Missing Links of Fraud. Computer Fraud and Security, 2012, 1 (2012), 12--18.
[11]
M. Granovetter. 1985. Economic action and social structure: The problem of embeddedness. Amer. J. Sociol. 91, 3 (1985), 481--510.
[12]
C. M. Hutchins. 2010. Benham-Hutchins. Hiding in plain sight: criminal network analysis. Computational and Mathematical Organization Theory, 16, 1 (2010), 89--111.
[13]
K. Leetaru. 2016. Why Stopping “Fake” News Is So Hard. Retrieved from https://www.forbes.com/sites/kalevleetaru/2016/11/30/why-stopping-fake-news-is-so-hard/.
[14]
Harvard library, Research guides: Fake news, misinformation, and propaganda. 2017. available at https://guides.library.harvard.edu/fake.
[15]
D. Pogue. 2017. What Facebook is Doing to Combat Fake News. Retrieved from www.scientificamerican.com/article/pogue-what-facebook-is-doing-to-combat-fake-news.
[16]
K. Polanyi and R. M. MacIver. 1944. The Great Transformation. Volume 2. Beacon Press, Boston, MA.
[17]
J. A. Schmpeter. 2010. Capitalism, Socialism and Democracy. Routledge, London, UK.
[18]
L. Šubelj, Š. Furlan, and M. Bajec. 2011. An expert system for detecting automobile insurance fraud using social network analysis. Expert Systems with Applications 38, 1 (2011), 1039--1052.
[19]
S. Shellenbarger. 2016. Most Students Don't Know When News Is Fake, Stanford Study Finds. Retrieved from www.wsj.com/articles/most-students-dont-know-when-news-is-fake-stanford-study-finds-1479752576.
[20]
B. N. Sullivan, P. Haunschild, and K. Page. 2007. Organizations non gratae? The impact of unethical corporate acts on interorganizational networks. Organiz. Sci. 18, 1 (2007) 55--70.
[21]
B. D. Uzzi. 1993. The Dynamics of Organizational Networks: Structural Embeddedness and Economic Behavior. Doctoral thesis. State University of New York at Stony Brook, Stony Brook, NY.
[22]
B. D. Uzzi. 1996. The source of consequences of embeddedness for the economic performance of organizations: The network effect. Amer. Sociol. Rev. 61, 4 (1996), 674--698.
[23]
B. D. Uzzi. 1997. Social structure and competition in interfirm networks: The paradox of embeddedness. Admin. Sci. Quart. 42, 1 (1997) 35--67.
[24]
J. Xu and H. Chen. 2005. CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Transactions on Information Systems, 23, 2 (2005), 201--226.
[25]
F. Zuber. 2015. Spread of Unethical Behavior in Organizations: A Dynamic Social Network Perspective. Journal of Business Ethics, 131, 1 (2015), 151--172.
[26]
M. Zimdars, False, misleading, clickbait-y, and satirical “news” sources. 2016. available at https://docs.google.com/document/u/1/d/10eA5-mCZLSS4MQY5QGb5ewCbvb3VAL6pLkT53V_81ZyitM/mobilebasic.

Cited By

View all
  • (2023)Non-monotonic Generation of Knowledge Paths for Context UnderstandingACM Transactions on Management Information Systems10.1145/362799415:1(1-28)Online publication date: 20-Oct-2023
  • (2022)Analysis of third-party request structures to detect fraudulent websitesDecision Support Systems10.1016/j.dss.2021.113698154:COnline publication date: 1-Mar-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Management Information Systems
ACM Transactions on Management Information Systems  Volume 11, Issue 3
Special Section on WITS 2018 and Regular Articles
September 2020
140 pages
ISSN:2158-656X
EISSN:2158-6578
DOI:10.1145/3407737
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 July 2020
Online AM: 07 May 2020
Accepted: 01 February 2020
Revised: 01 November 2019
Received: 01 May 2019
Published in TMIS Volume 11, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Website third-parties
  2. heuristics
  3. machine learning
  4. prediction
  5. untrustworthy websites

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)5
Reflects downloads up to 27 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Non-monotonic Generation of Knowledge Paths for Context UnderstandingACM Transactions on Management Information Systems10.1145/362799415:1(1-28)Online publication date: 20-Oct-2023
  • (2022)Analysis of third-party request structures to detect fraudulent websitesDecision Support Systems10.1016/j.dss.2021.113698154:COnline publication date: 1-Mar-2022

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media