[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3448016.3452778acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

To Intervene or Not To Intervene: Cost based Intervention for Combating Fake News

Published: 18 June 2021 Publication History

Abstract

Social media platforms provide valuable and powerful means with which users can share content, comment, and communicate. They also suffer from abuse through the dissemination of fake news and misinformation. While a fair amount of work has been done on detecting fake news, on the complementary problem of limiting its propagation, progress has been modest. Once an item is detected as fake, a social media company can intervene on the item and take an appropriate action, including hard intervention (e.g., removing an account) and soft intervention (e.g., labeling the item as "suspicious"). Given that fake news detectors are not 100% reliable, we study the problem of developing a cost aware intervention policy which decides whether to intervene based on the truthiness and popularity of the item. Our solution, Solomon, consists of three modular components - truthiness estimation, popularity estimation (with and without intervention), and intervention policy. Our extensive experiments on real and fake news from multiple domains show that Solomon can perform effective intervention.

Supplementary Material

MP4 File (3448016.3452778.mp4)
While social media platforms provide valuable and powerful means with which users can share content, comment, and communicate, they also suffer from abuse through the dissemination of fake news and misinformation. While a fair amount of work has been done on detecting fake news, on the complementary problem of limiting its propagation, progress has been modest. Once an item is detected as fake, a social media company can intervene on the item and take an appropriate action, including hard intervention (e.g., removing an account) and soft intervention (e.g., labeling the item as "suspicious"). Given that fake news detectors are not 100% reliable, we study the problem of developing an intervention policy which decides when to intervene on an item. We propose a cost-aware approach for intervention, which determines whether to intervene based on the truthiness and popularity of the item. We define a reward function that seeks to reduce the reach of fake items without affecting the reach of authentic items. Our solution, Solomon, consists of three components - truthiness estimation, popularity estimation (with and without intervention), and intervention policy. Solomon is modular and allows one to plug in any algorithm for each of the components. Our extensive experiments on real and fake news from multiple domains including politics, entertainment,and health show that Solomon can perform effective intervention on news items in these domains.

References

[1]
Shipra Agrawal and Navin Goyal. 2013. Thompson sampling for contextual bandits with linear payoffs. In ICML . 127--135.
[2]
Ioannis Arapakis, Berkant Barla Cambazoglu, and Mounia Lalmas. 2017. On the feasibility of predicting popular news at cold start. Journal of the Association for Information Science and Technology, Vol. 68, 5 (2017), 1149--1164.
[3]
Abolfazl Asudeh, Hosagrahar Visvesvaraya Jagadish, You Wu, and Cong Yu. 2020. On detecting cherry-picked trendlines. Proceedings of the VLDB Endowment, Vol. 13, 6 (2020), 939--952.
[4]
Abhishek Bagade, Ashwini Pale, Shreyans Sheth, Megha Agarwal, Soumen Chakrabarti, Kameswari Chebrolu, and S Sudarshan. 2020. The Kauwa-Kaate Fake News Detection System. In Proceedings of the 7th ACM IKDD CoDS and 25th COMAD. 302--306.
[5]
Roja Bandari, Sitaram Asur, and Bernardo A Huberman. 2012. The pulse of news in social media: Forecasting popularity. In ICWSM .
[6]
Hamsa Bastani, Mohsen Bayati, and Khashayar Khosravi. 2017. Mostly exploration-free algorithms for contextual bandits. arXiv preprint arXiv:1704.09011 (2017).
[7]
Alberto Bietti, Alekh Agarwal, and John Langford. 2018. A contextual bandit bake-off. arXiv preprint arXiv:1802.04064 (2018).
[8]
Sébastien Bubeck, Rémi Munos, Gilles Stoltz, and Csaba Szepesvári. 2011. X-armed bandits. Journal of Machine Learning Research, Vol. 12, May (2011), 1655--1695.
[9]
Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In WWW. 665--674.
[10]
Carlos Castillo, Mohammed El-Haddad, Jürgen Pfeffer, and Matt Stempeck. 2014. Characterizing the life cycle of online news stories using social media reactions. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. 211--223.
[11]
Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2011. Information credibility on twitter. In WWW. 675--684.
[12]
Sylvie Cazalens, Julien Leblay, Philippe Lamarre, Ioana Manolescu, and Xavier Tannier. 2018. Computational fact checking: a content management perspective. (2018).
[13]
Chen Chen, Hanghang Tong, B Aditya Prakash, Charalampos E Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen Horng Chau. 2015. Node immunization on large graphs: Theory and algorithms. TKDE, Vol. 28, 1 (2015), 113--126.
[14]
Justin Cheng, Lada Adamic, P Alex Dow, Jon Michael Kleinberg, and Jure Leskovec. 2014. Can cascades be predicted?. In WWW. 925--936.
[15]
CNN. 2020. Facebook is giving 25 million USD to news organizations, and spending 75 million USD more to help . https://edition.cnn.com/2020/03/30/media/facebook-news-journalism-grants-coronavirus/index.html, Last accessed on 2020--11--20.
[16]
S Cohen, C Li, J Yang, and C Yu. 2011. Computational journalism: A call to arms to database researchers, 148--151. In 5th Biennial Conference on Innovative Data Systems Research, CIDR .
[17]
Limeng Cui and Dongwon Lee. 2020. CoAID: COVID-19 Healthcare Misinformation Dataset. arxiv: cs.SI/2006.00885
[18]
Enyan Dai, Yiwei Sun, and Suhang Wang. 2020. Ginger Cannot Cure Cancer: Battling Fake Health News with a Comprehensive Data Repository. arXiv preprint arXiv:2002.00837 (2020).
[19]
Xin Luna Dong, Christos Faloutsos, Xian Li, Subhabrata Mukherjee, and Prashant Shiralkar. 2018. Fact Checking: Theory and Practice. In SIGKDD .
[20]
Charles Elkan. 2001. The foundations of cost-sensitive learning. In IJCAI, Vol. 17. Lawrence Erlbaum Associates Ltd, 973--978.
[21]
Facebook. 2019 a. Helping to Protect the 2020 US Elections. https://about.fb.com/news/2019/10/update-on-election-integrity-efforts/, Last accessed on 2020-07-07.
[22]
Facebook. 2019 b. How is Facebook addressing false news? https://www.facebook.com/help/1952307158131536, Last accessed on 2020-07-07.
[23]
Mehrdad Farajtabar, Jiachen Yang, Xiaojing Ye, Huan Xu, Rakshit Trivedi, Elias Khalil, Shuang Li, Le Song, and Hongyuan Zha. 2017. Fake news mitigation via point process based intervention. In ICML. JMLR. org, 1097--1106.
[24]
Sarah Filippi, Olivier Cappe, Aurélien Garivier, and Csaba Szepesvári. 2010. Parametric bandits: The generalized linear case. In NIPS. 586--594.
[25]
Xiaofeng Gao, Zhenhao Cao, Sha Li, Bin Yao, Guihai Chen, and Shaojie Tang. 2019. Taxonomy and Evaluation for Microblog Popularity Prediction. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 13, 2 (2019), 1--40.
[26]
Google. 2020. Google FactCheck Claim Search API . https://toolbox.google.com/factcheck/apis, Last accessed on 2020--11--20.
[27]
Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. Tweetcred: Real-time credibility assessment of content on twitter. In SocInfo. Springer, 228--243.
[28]
Naeemul Hassan, Fatma Arslan, Chengkai Li, and Mark Tremayne. 2017a. Toward automated fact-checking: Detecting check-worthy factual claims by ClaimBuster. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining . 1803--1812.
[29]
Naeemul Hassan, Afroza Sultana, You Wu, Gensheng Zhang, Chengkai Li, Jun Yang, and Cong Yu. 2014. Data in, fact out: automated monitoring of facts by FactWatcher. Proceedings of the VLDB Endowment, Vol. 7, 13 (2014), 1557--1560.
[30]
Naeemul Hassan, Gensheng Zhang, Fatma Arslan, Josue Caraballo, Damian Jimenez, Siddhant Gawsane, Shohedul Hasan, Minumol Joseph, Aaditya Kulkarni, Anil Kumar Nayak, et almbox. 2017b. ClaimBuster: the first-ever end-to-end fact-checking system. Proceedings of the VLDB Endowment, Vol. 10, 12 (2017), 1945--1948.
[31]
Alan G Hawkes. 1971. Spectra of some self-exciting and mutually exciting point processes. Biometrika, Vol. 58, 1 (1971), 83--90.
[32]
Xinran He, Guojie Song, Wei Chen, and Qingye Jiang. 2012. Influence blocking maximization in social networks under the competitive linear threshold model. In SDM. SIAM, 463--474.
[33]
Instagram. 2019. Instagram adds 'false information' labels to prevent fake news from going viral. https://me.mashable.com/tech/7586/instagram-adds-false-information-labels-to-prevent-fake-news-from-going-viral, Last accessed on 2020-07-07.
[34]
Georgios Karagiannis, Immanuel Trummer, Saehan Jo, Shubham Khandelwal, Xuezhi Wang, and Cong Yu. 2019. Mining an" anti-knowledge base" from Wikipedia updates with applications to fact checking and beyond. Proceedings of the VLDB Endowment, Vol. 13, 4 (2019), 561--573.
[35]
David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining . 137--146.
[36]
Yaser Keneshloo, Shuguang Wang, Eui-Hong Han, and Naren Ramakrishnan. 2016. Predicting the popularity of news articles. In SDM. SIAM, 441--449.
[37]
Sejeong Kwon, Meeyoung Cha, Kyomin Jung, Wei Chen, and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In ICDM. IEEE, 1103--1108.
[38]
Laks VS Lakshmanan, Michael Simpson, and Saravanan Thirumuruganathan. 2019. Combating fake news: a data management and mining perspective. PVLDB, Vol. 12, 12 (2019), 1990--1993.
[39]
John Langford and Tong Zhang. 2008. The epoch-greedy algorithm for multi-armed bandits with side information. In NIPS . 817--824.
[40]
Tor Lattimore and Csaba Szepesvári. 2020. Bandit algorithms .Cambridge University Press.
[41]
Wei Lu, Wei Chen, and Laks V. S. Lakshmanan. 2015. From Competition to Complementarity: Comparative Influence Diffusion and Maximization. Proc. VLDB Endow., Vol. 9, 2 (2015), 60--71. https://doi.org/10.14778/2850578.2850581
[42]
Travis Martin, Jake M Hofman, Amit Sharma, Ashton Anderson, and Duncan J Watts. 2016. Exploring limits to prediction in complex social systems. In Proceedings of the 25th International Conference on World Wide Web. 683--694.
[43]
Katerina Eva Matsa and Elisa Shearer. 2018. News use across social media platforms 2018. Pew Research Center (2018).
[44]
Swapnil Mishra, Marian-Andrei Rizoiu, and Lexing Xie. 2016. Feature driven and point process approaches for popularity prediction. In CIKM . 1069--1078.
[45]
Subhabrata Mukherjee and Gerhard Weikum. 2015. Leveraging joint interactions for credibility analysis in news communities. In CIKM . 353--362.
[46]
Hung T Nguyen, My T Thai, and Thang N Dinh. 2016. Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In Proceedings of the 2016 International Conference on Management of Data. 695--710.
[47]
Nam P Nguyen, Guanhua Yan, My T Thai, and Stephan Eidenbenz. 2012. Containment of misinformation spread in online social networks. In WebSci . 213--222.
[48]
Cameron Nowzari, Victor M Preciado, and George J Pappas. 2016. Analysis and control of epidemics: A survey of spreading processes on complex networks. IEEE Control Systems Magazine, Vol. 36, 1 (2016), 26--46.
[49]
Pinterest. 2019. Health misinformation. https://help.pinterest.com/en/article/health-misinformation, Last accessed on 2020-07-07.
[50]
Carlos Riquelme, George Tucker, and Jasper Snoek. 2018. Deep Bayesian Bandits Showdown: An Empirical Comparison of Bayesian Deep Networks for Thompson Sampling. ICLR. (2018).
[51]
Natali Ruchansky, Sungyong Seo, and Yan Liu. 2017. Csi: A hybrid deep model for fake news detection. In CIKM. 797--806.
[52]
Shaden Shaar, Giovanni Da San Martino, Nikolay Babulkov, and Preslav Nakov. 2020. That is a known lie: Detecting previously fact-checked claims. ACL (2020).
[53]
Karishma Sharma, Feng Qian, He Jiang, Natali Ruchansky, Ming Zhang, and Yan Liu. 2019. Combating fake news: A survey on identification and mitigation techniques. ACM TIST, Vol. 10, 3 (2019), 1--42.
[54]
Kai Shu, Limeng Cui, Suhang Wang, Dongwon Lee, and Huan Liu. 2019. defend: Explainable fake news detection. In SIGKDD. 395--405.
[55]
Kai Shu, Deepak Mahudeswaran, and et.al. 2018. Fakenewsnet: A data repository with news content, social context and dynamic information for studying fake news on social media. arXiv preprint arXiv:1809.01286 (2018).
[56]
Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, and Huan Liu. 2017. Fake news detection on social media: A data mining perspective. SIGKDD Explorations, Vol. 19, 1 (2017), 22--36.
[57]
Michael Simpson, Venkatesh Srinivasan, and Alex Thomo. 2020. Reverse Prevention Sampling for Misinformation Mitigation in Social Networks. In 23rd International Conference on Database Theory (ICDT 2020). Schloss Dagstuhl-Leibniz-Zentrum für Informatik.
[58]
Stavros Sintos, Pankaj K Agarwal, and Jun Yang. 2019. Selecting data to clean for fact checking: minimizing uncertainty vs. maximizing surprise. Proceedings of the VLDB Endowment, Vol. 12, 13 (2019), 2408--2421.
[59]
Youze Tang, Yanchen Shi, and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data . 1539--1554.
[60]
William R Thompson. 1933. On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika, Vol. 25, 3/4 (1933), 285--294.
[61]
Hanghang Tong, B Aditya Prakash, Tina Eliassi-Rad, Michalis Faloutsos, and Christos Faloutsos. 2012. Gelling, and melting, large graphs by edge manipulation. In CIKM . 245--254.
[62]
Twitter. 2020 a. Building rules in public: Our approach to synthetic and manipulated media. https://blog.twitter.com/en_us/topics/company/2020/new-approach-to-synthetic-and-manipulated-media.html, Last accessed on 2020-07-07.
[63]
Twitter. 2020 b. Notices on Twitter and what they mean. https://help.twitter.com/en/rules-and-policies/notices-on-twitter, Last accessed on 2020-07-07.
[64]
Twitter. 2020 c. Our range of enforcement options. https://help.twitter.com/en/rules-and-policies/enforcement-options, Last accessed on 2020-07-07.
[65]
Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. Science, Vol. 359, 6380 (2018), 1146--1151.
[66]
Bo Wu and Haiying Shen. 2015. Analyzing and predicting news popularity on Twitter. IJIM, Vol. 35, 6 (2015), 702--711.
[67]
Ke Wu, Song Yang, and Kenny Q Zhu. 2015. False rumors detection on sina weibo by propagation structures. In ICDE. IEEE, 651--662.
[68]
You Wu, Pankaj K Agarwal, Chengkai Li, Jun Yang, and Cong Yu. 2014. Toward computational fact-checking. Proceedings of the VLDB Endowment, Vol. 7, 7 (2014), 589--600.
[69]
Jaewon Yang and Jure Leskovec. 2011. Patterns of temporal variation in online media. In WSDM. 177--186.
[70]
Tauhid Zaman, Emily B Fox, Eric T Bradlow, et almbox. 2014. A bayesian approach for predicting the popularity of tweets. AAS, Vol. 8, 3 (2014), 1583--1611.
[71]
Yao Zhang, Arvind Ramanathan, Anil Vullikanti, Laura Pullum, and B Aditya Prakash. 2019. Data-driven efficient network and surveillance-based immunization. Knowledge and Information Systems, Vol. 61, 3 (2019), 1667--1693.
[72]
Qingyuan Zhao, Murat A Erdogdu, Hera Y He, Anand Rajaraman, and Jure Leskovec. 2015. Seismic: A self-exciting point process model for predicting tweet popularity. In SIGKDD . 1513--1522.
[73]
Fan Zhou, Xovee Xu, Goce Trajcevski, and Kunpeng Zhang. 2020. A Survey of Information Cascade Analysis: Models, Predictions and Recent Advances. arXiv preprint arXiv:2005.11041 (2020).
[74]
Xinyi Zhou and Reza Zafarani. 2018. Fake news: A survey of research, detection methods, and opportunities. arXiv preprint arXiv:1812.00315 (2018).
[75]
Xinyi Zhou, Reza Zafarani, Kai Shu, and Huan Liu. 2019. Fake news: Fundamental theories, detection strategies and challenges. In WSDM . 836--837.

Cited By

View all
  • (2022)Epidemic Spread Optimization for Disease Containment with NPIs and Vaccination2022 IEEE 38th International Conference on Data Engineering (ICDE)10.1109/ICDE53745.2022.00258(2845-2858)Online publication date: May-2022
  • (2021)Online Fake News Detection Using Machine Learning Techniques: A Systematic Mapping StudyCombating Fake News with Computational Intelligence Techniques10.1007/978-3-030-90087-8_1(3-37)Online publication date: 16-Dec-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '21: Proceedings of the 2021 International Conference on Management of Data
June 2021
2969 pages
ISBN:9781450383431
DOI:10.1145/3448016
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fake news
  2. intervention
  3. popularity
  4. social media
  5. truthiness

Qualifiers

  • Research-article

Funding Sources

Conference

SIGMOD/PODS '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)50
  • Downloads (Last 6 weeks)7
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Epidemic Spread Optimization for Disease Containment with NPIs and Vaccination2022 IEEE 38th International Conference on Data Engineering (ICDE)10.1109/ICDE53745.2022.00258(2845-2858)Online publication date: May-2022
  • (2021)Online Fake News Detection Using Machine Learning Techniques: A Systematic Mapping StudyCombating Fake News with Computational Intelligence Techniques10.1007/978-3-030-90087-8_1(3-37)Online publication date: 16-Dec-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media