Fake News, Rumor, Information Pollution in Social Media and Web: a Contemporary Survey of State-Of-The-Arts, Challenges and Opportunities

Fake News, Rumor, Information Pollution in Social Media and Web: a Contemporary Survey of State-Of-The-Arts, Challenges and Opportunities

Expert Systems With Applications 153 (2020) 112986 Contents lists available at ScienceDirect Expert Systems With Applications journal homepage: www.elsevier.com/locate/eswa Review Fake news, rumor, information pollution in social media and web: A contemporary survey of state-of-the-arts, challenges and opportunities ∗ Priyanka Meel, Dinesh Kumar Vishwakarma Biometric Research Laboratory, Department of Information Technology, Delhi Technological University, New Delhi 110042, India a r t i c l e i n f o a b s t r a c t Article history: Internet and social media have become a widespread, large scale and easy to use platform for real-time Received 19 July 2019 information dissemination. It has become an open stage for discussion, ideology expression, knowledge Revised 6 September 2019 dissemination, emotions and sentiment sharing. This platform is gaining tremendous attraction and a Accepted 26 September 2019 huge user base from all sections and age groups of society. The matter of concern is that up to what Available online 4 October 2019 extent the contents that are circulating among all these platforms every second changing the mindset, Keywords: perceptions and lives of billions of people are verified, authenticated and up to the standards. This paper Clickbait puts forward a holistic view of how the information is being weaponized to fulfil the malicious motives Deep learning and forcefully making a biased user perception about a person, event or firm. Further, a taxonomy is pro- Fraudulent Content vided for the classification of malicious information content at different stages and prevalent technologies Information Pollution to cope up with this issue form origin, propagation, detection and containment stages. We also put for- Machine learning ward a research gap and possible future research directions so that the web information content could Opinion Spam be more reliable and safer to use for decision making as well as for knowledge sharing. Online Social Networks Rumour Propagation ©2019Elsevier Ltd. All rights reserved. 1. Introduction The section of the data on which we are focusing is information pollution i.e. how the contents on the web are being contaminated In the era of information overload, restiveness, uncertainty and intentionally or sometimes unintentionally. The false information implausible content all around; information credibility or web may be in any format fake review, fake news, satire, hoax, etc. af- credibility refers to the trustworthiness, reliability, fairness and ac- fects the human community in a negative way. Approximately 65% curacy of the information. Information credibility is the extent up of the US adult population is dependent on social media for daily to which a person believes in the content provided on the internet. news ( Shao, Ciampaglia, Flammini, & Menczer, 2016 ). If we grab Every second of time passes by millions of people interacting on the information without showing severe concern about its truthful- social media, creating vast volumes of data, which has many un- ness, we have to pay in the long run. Social networks information seen patterns and behavioural trends inside. The data disseminat- diffusion has strong temporal features: Bursting updates, flooding ing on the web, social media and discussion forums have become a all platforms with the carnival of information within no time (of massive topic of interest for analytics as well as critics as it reflects course without fact-checking) and finally fast dying feature. Offi- social behaviour, choices, perceptions and mindset of people. Con- cial news media is also losing the trust and confidence; in the rush nectivity on the internet provides people a vivacious and enthusi- of securing readership they are releasing eye-catching and sensa- astic means of entertainment as well as refreshment. A consider- tional headlines with images, the readers do not have the time to able amount of unverified and unauthenticated information trav- read the actual news content; trust the appealing headline and the els through these networks, misleading a large population. Thus to image. Thus, appealing headlines gives birth to a misunderstood increase the trustworthiness of online social networks and miti- falsified piece of information. gate the devastating effects of information pollution; timely detec- Earlier rumors used to spread at a slow pace, but the advent tion and containment of false contents circulating on the web are of internet technologies and popularity of retweeting activities on highly required ( Nunes & Correia, 2013 ). social networks has fuelled the dissemination of a piece of ru- mor around the globe at an alarming rate. In 2016, US presidential elections, because of some flows in algorithmic architecture Face- book has become a key distributor of fake news ( Zannettou, Siriv- ∗ Corresponding author. ianos, Blackburn, & Kourtellis, 2018 ), which has affected people’s E-mail addresses: [email protected] (P. Meel), [email protected] (D.K. choice of the vote and had a tremendous impact on the result Vishwakarma). https://doi.org/10.1016/j.eswa.2019.112986 0957-4174/© 2019 Elsevier Ltd. All rights reserved. 2 P. Meel and D.K. Vishwakarma / Expert Systems With Applications 153 (2020) 112986 a b 30% Survey papers 25% 28% 10% 14% Web Links 20% Source Identification 21% 20% 14% 15% Propagation 15% 40% Dynamics 10% 7% Detection Methods 9% 15% Other topics 5% 7% 0% before 2015 2016 2017 2018 2019 2015 Fig. 1. (a) Topic-wise (b) Year-wise distribution of the refereed literature. of the election. It is a remarkable example of how fake news ac- after 2016 US presidential elections, statistics from Fig. 1 (b) also counts had outperformed real news. The main lineage of work strengthens this fact. done by researchers in web and social media mining is in tweet- This work provides an overview of the state-of-the-art tech- ing behavior analysis, feature extraction, trends and pattern anal- nologies, models, datasets, and experimental setups for content ysis, information diffusion, visualization, anomaly detection, pre- and behavior analysis of fraudulent information circulating online. dictive analysis, recommender systems, and situation awareness This review takes into consideration the broader perspectives of ( Kumar & Shah, 2018 ; Zhou & Zafarani, 2018 ; Shelke & Attar, 2019 ; the research conducted by other scholars as on date as well as our Zubiaga, Aker, Bontcheva, Liakata, & Procter, 2018 ). Fake news de- analysis of the situation. The flow of information in this survey is tection algorithms focus on figure out deep systematic patterns structured according to Fig. 2 . embedded inside the content of news. Another primary feature of A taxonomy of false information, a comprehensive survey of so- detection is transmission behavior that strengthens the diffusion of cial impact, motivation for spreading false contents, user percep- information, which is of questionable integrity and value. tion and available state-of-the-art methods of fact-checking is pro- vided in Section 2 . Section 3 focuses on the technological aspects 1.1. Motivation of the identification of sources from where the falsified contents are originated. Social media is a very fast data generating and disseminating Different models and diffusion patterns of intended contents platform and every second, millions and million of the users are for the targeted population is described in detail in Section 4 . interacting on web platforms and creating huge volumes of data. Section 5 deals with different stylometric and feature-oriented ma- But contrary to traditional news sources such as news channels chine learning methods, deep learning and other methods of cred- and newspapers, the credibility of contents circulating on social ibility analysis by which fraudulent contents can be segregated. media platforms is questionable due to independence of freedom The same section also details the experimental setups and datasets of expression. Recently, it has been seen that there is a huge in- used by different researchers to address the issue. Countermea- crease in the number users ( Newman, Fletcher, Kalogeropoulos, sures to aware the social audience who have already been influ- Levy, & Nielsen, 2018 ), who access the social media and web plat- enced or are about to influence by malicious content are stated in forms for news and knowledge. Social media contents are gov- Section 6 . Current challenges and potential future scope of research erning people’s choices of preferences. The term “Fake news” has are thoroughly presented in Section 7 . Finally, Section 8 details in become widespread after “2016 US presidential elections” where with the social and methodological findings and Section 9 con- it is assumed that the fraudulent contents circulated during the clude the work. The main contributions of the work are as under: elections exert considerable effects on the election results. Hence, to outline and analyses the various approaches used to deal with • Puts forward a serious concern towards the burning issue of these issues, this work is presented. This work includes the current trustworthiness and reliability of web content on social me- scenario of information pollution on web in terms of ecosystem, dia platforms. different data sharing and generating platforms, data analytics and • The fraudulent content of all varieties scattered online is cat- fact-checking tools. Our survey methodology focuses on the four egorized, and the fake information ecosystem is analyzed different stages of

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    26 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us