Advertisement

The Avant-Garde Ways to Prevent the WhatsApp Fake News

  • J. IndumathiEmail author
  • J. Gitanjali
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1054)

Abstract

The birth of the information era has perceived many machineries which have throttled the Communication Engineering applications. Amid the zillion instant messaging applications, WhatsApp has its share of highlights and challenges. In India, chat messaging app—WhatsApp—is seen trapped in multiple court cases relating to the spread of misinformation, encrypted messages and fake news. Unless the liabilities are restricted, it will no longer be an asset but rather will become a curse on the user community. Over seventy billion messages are spread on WhatsApp daily, and the false rumours are spread at lightning speed. They have encompassed conspiracy theories, anti-vaccination misinformation and panicked rumours and have led to fatal lynchings worldwide. Many have exploited WhatsApp for dispersal of falsehood and abhor discourse. The inspiration behind this paper is to decrease the spread of fake news in WhatsApp. This paper will recognize the fake news, depending on the data given from the client end. Client can propose just those messages as fake, that are approved for the proposition. Service provider will accumulate all these data and the need for each fake news will be given based on the count of proposal and furthermore dependent on the priority level of the clients. For every priority level, a star rating will be given. Every time when the count reaches the red label level (most elevated amount), that specific message will be blocked, and it can’t be sent to anybody. This technique is incontestable and can guarantee a fake free WhatsApp.

Keywords

WhatsApp Service provider Red label level Star rating Misinformation Content dissemination Textual information 

References

  1. 1.
    Bouhnik, D., Deshen, M.: Whatsapp goes to school: mobile instant messaging between teachers and students. J. Inf. Technol. Educ. Res. 13, 217–231 (2014)Google Scholar
  2. 2.
    Montag, C., Błaszkiewicz, K., Sariyska, R., Lachmann, B., Andone, I., Trendafilov, B., Eibes, M., Markowetz, A.: Smartphone usage in the 21st century: who is active on whatsapp? BMC Res. Notes 8(1), 1–6 (2015)CrossRefGoogle Scholar
  3. 3.
    Church, K., De Oliveira, R.: What’s up with whatsapp?: Comparing mobile instant messaging behaviors with traditional sms. In: Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services, MobileHCI’13, pp. 352–361 (2013)Google Scholar
  4. 4.
    Fiadino, P., Schiavone, M., Casas, P.: Vivisecting whatsapp through large-scale measurements in mobile networks. In: SIGCOMM 2014 (2014)Google Scholar
  5. 5.
    Johnston, M., King, D., Arora, S., Behar, N., Athanasiou, T., Sevdalis, N., Darzi, A.: Smartphones let surgeons know WhatsApp: an analysis of communication in emergency surgical teams. Am. J. Surg. 209, 45–51 (2015)CrossRefGoogle Scholar
  6. 6.
    O’Hara, K.P., Massimi, M., Harper, R., Rubens, S., Morris, J.: Everyday dwelling with WhatsApp. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW’14, pp. 1131–1143 (2014)Google Scholar
  7. 7.
    Pielot, M., De Oliveira, R., Kwak, H., Oliver, N.: Didn’t you see my message?: Predicting attentiveness to mobile instant messages. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI’14, pp. 3319–3328 (2014)Google Scholar
  8. 8.
    Mudliar, P., Rangaswamy, N.: Offline strangers, online friends: bridging classroom gender segregation with whatsapp. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI’15, pp. 3799–3808 (2015)Google Scholar
  9. 9.
    Sanchez, J.: Malicious threats, vulnerabilities and defenses in WhatsApp and mobile instant messaging platforms (2014)Google Scholar
  10. 10.
    Jain, J., Luaran, J.E., Binti Abd Rahman, N.: Learning Beyond the Walls: The Role of Whatsapp Groups, pp. 447–457 (2016)Google Scholar
  11. 11.
    Gulacti, U., Lok, U., Hatipoglu, S., Polat, H.: An analysis of whatsapp usage for communication between consulting and emergency physicians. J. Med. Syst. 40(6), 1–7 (2016)CrossRefGoogle Scholar
  12. 12.
    Burkhardt, J.M.: Combating Fake News in the Digital Age, vol. 53, 8th edn. ALA TechSource (2017)Google Scholar
  13. 13.
    Ahmed, H., Traore, I., Saad, S.: Detecting opinion spams and fake news using text classification. Secur. Priv. 1(1), (2017).  https://doi.org/10.1002/spy2.9
  14. 14.
    Lazer, D., Matthew, B., Benkler, Y., Berinsky, A., Greenhill, K., Menczer, F., Metzger, M., Nyhan, B., Pennycook, G., Rothschild, D., Schudson, M., Sloman, S., Sunstein, C., Thorson, E., Watts, D., Zittrain, J.: The science of fake news. Dissemination in WhatsApp: gathering, analyzing and countermeasures. In: Proceedings of the Web Conference (2018)Google Scholar
  15. 15.
    Explained.: What is Fake News? Social Media and Filter Bubbles. 02 July 2018. Retrieved from https://www.webwise.ie/teachers/what-is-fake-news/
  16. 16.
    Rosenfield, A., Sina, S., Sarne, D., Avidov, O., Kraus, S.: WhatsApp usage patterns and prediction models. In: ICWSM/IUSSP Workshop on Social Media and Demographic Research (2016)Google Scholar
  17. 17.
    Garimella, K., Tyson, G.: WhatsApp, doc? A first look at whatsapp public group data (2018)Google Scholar
  18. 18.
    Bhatt, A., Arshad, M.: Impact of WhatsApp on Youth: A Sociological Study (2016)Google Scholar
  19. 19.
    Sharma, S., Kumar, N.: Survey Analysis on the Usage and Impact of WhatsApp Messenger (2017)Google Scholar
  20. 20.
    Seufert, M., Hobfeld, T., Schwind, A., Burger, V., Tran-Gia, P.: Analysis of Group-based Communication in WhatsApp (2016)Google Scholar
  21. 21.
    Mueller, R., Schrittwieser, S., Fruehwirt, P., Kieseberg, P., Weippl, E.: What’s new with WhatsApp & Co.? Revisiting the security of smartphone messaging applications (2014)Google Scholar
  22. 22.
    Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22–36 (2017)CrossRefGoogle Scholar
  23. 23.
    Jin, Z., Cao, J., Zhang, Y., Luo, J.: News verification by exploiting conflicting social viewpoints in microblogs. In: AAAI, pp. 2972–2978 (2016)Google Scholar
  24. 24.
    Tacchini, E., Ballarin, G., Della Vedova, M.L., Moret, S., de Alfaro, L.: Some like it hoax: automated fake news detection in social networks. Preprint at arXiv:1704.07506 (2017)
  25. 25.
    Shu, K., Bernard, H.R., Liu, H.: Studying fake news via network analysis: detection and mitigation. In: Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining, pp. 43–65. Springer (2019)Google Scholar
  26. 26.
    Gitanjali, J., Banu, S.N., Indumathi, J., Uma, G.V.: A panglossian solitary-skim sanitization for privacy preserving data archaeology. Int. J. Electr. Power Eng. 2(3), 154–165 (2008)Google Scholar
  27. 27.
    Gitanjali, J., Banu, S.N., Geetha, M.A., Indumathi, J., Uma, G.V.: An agent based burgeoning framework for privacy preserving information harvesting systems. Int. J. Comput. Sci. Netw. Secur. 7(11), 268–276 (2007)Google Scholar
  28. 28.
    Indumathi, J.: A generic scaffold housing the innovative modus operandi for selection of the superlative anonymisation technique for optimized privacy preserving data mining (Chap. 6). In: Karahoca, A. (ed.) Data Mining Applications in Engineering and Medicine, vol. 335, pp. 133–156. In Tech (2012). ISBN: 9535107200 9789535107200Google Scholar
  29. 29.
    Indumathi, J.: Amelioration of anonymity modus operandi for privacy preserving data publishing (Chap. 7). In: Amine, A., Mohamed, O.A., Benatallah, B. (eds.) Network Security Technologies: Design and Applications, vol. 330, pp. 96–107. Tahar Moulay University, Algeria, Concordia University, USA, University of New South Wales, Australia (2013a). Release Date: November, 2013Google Scholar
  30. 30.
    Indumathi, J.: An enhanced secure agent-oriented burgeoning integrated home tele health care framework for the silver generation. Int. J. Adv. Netw. Appl. 04(04), 16–21 (2013b). Special Issue on “Computational Intelligence—A Research Perspective” held on 21st–22nd Feb 2013Google Scholar
  31. 31.
    Indumathi, J.: State-of-the-Art in reconstruction-based modus operandi for privacy preserving data dredging. Int. J. Adv. Netw. Appl. 04(04), 9–15 (2013c). Special Issue on “Computational Intelligence—A Research Perspective” held on 21st–22nd Feb 2013Google Scholar
  32. 32.
    Indumathi, J., Uma, G.V.: Customized privacy preservation using unknowns to stymie unearthing of association rules. J. Comput. Sci. 3(12), 874–881 (2007)Google Scholar
  33. 33.
    Indumathi, J., Uma, G.V.: Using privacy preserving techniques to accomplish a secure accord. Int. J. Comput. Sci. Netw. Secur. 7(8), 258–266 (2007)Google Scholar
  34. 34.
    Indumathi, J., Uma, G.V.: A bespoked secure framework for an ontology-based data-extraction system. J. Softw. Eng. 2(2), 1–13 (2008)Google Scholar
  35. 35.
    Indumathi, J., Uma, G.V.: A new flustering approach for privacy preserving data fishing in tele-health care systems. Int. J. Healthc. Technol. Manag. 9(5–6), 495–516 (2008b). Special Issue on: “Tele-Healthcare System Implementation, Challenges and Issues” (22)Google Scholar
  36. 36.
    Indumathi, J., Uma, G.V.: A novel framework for optimized privacy preserving data mining using the innovative desultory technique. Int. J. Comput. Appl. Technol. 35(2/3/4), 194–203 (2008c). Special Issue on: Computer Applications in Knowledge-Based Systems (2008 in press)Google Scholar
  37. 37.
    Indumathi, J., Uma, G.V.: An aggrandized framework for genetic privacy preserving pattern analysis using cryptography and contravening—conscious knowledge management systems. Int. J. Mol. Med. Adv. Sci. 4(1), 33–40 (2008)Google Scholar
  38. 38.
    Murugesan, K., Gitanjali, J., Indumathi, J., Manjula, D.: Sprouting modus operandi for selection of the best PPDM technique for health care domain. Int. J. Conf. Recent. Trends Comput. Sci. 1(1), 627–629 (2009)Google Scholar
  39. 39.
    Murugesan, K., Indumathi, J., Manjula, D.: An optimized intellectual agent based secure decision system for health care. Int. J. Eng. Sci. Technol. 2(5), 3662–3675 (2010)Google Scholar
  40. 40.
    Murugesan, K., Indumathi, J., Manjula, D.: A framework for an ontology-based data-gleaning and agent based intelligent decision support PPDM system employing generalization technique for health care. Int. J. Comput. Sci. Eng. 2(5), 1588–1596 (2010)Google Scholar
  41. 41.
    Vasudevan, V., Sivaraman, N., SenthilKumar, S., Muthuraj, R., Indumathi, J., Uma, G.V.: A comparative study of SPKI/SDSI and K-SPKI/SDSI systems. Inf. Technol. J. 6(8), 1208–1216 (2007)CrossRefGoogle Scholar
  42. 42.
    Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., Weippl, E.R.: Guess who’s texting you? Evaluating the security of smartphone messaging applications. In: NDSS (2012)Google Scholar
  43. 43.
    Garimella, K., Tyson, G.: Whatapp Doc? A first look at whatsapp public group data. In: Twelfth International AAAI Conference on Web and Social Media (2018)Google Scholar
  44. 44.
    Caetano, J.A., de Oliveira, J.F., Lima, H.S., Marques-Neto, H.T., Magno, G., Meira Jr, W., Almeida, V.A.: Analyzing and characterizing political discussions in WhatsApp public groups. Preprint at arXiv:1804.00397 (2018)
  45. 45.
    Wani, S.A., Rabah, S.M., AlFadil, S., Dewanjee, N., Najmi, Y.: Efficacy of communication amongst staff members at plastic and reconstructive surgery section using smartphone and mobile WhatsApp. Indian J. Plast. Surg. Off. Publ. Assoc. Plast. Surg. India 46(3), 502 (2013)Google Scholar
  46. 46.
    Resende, G., Melo, P., Sousa, H., Messias, Marisa, J., Vasconcelos, M., Almeida, J., Benevenuto, F.: (Mis)Information (2019)Google Scholar
  47. 47.
    Najmi, Y.: Efficacy of communication amongst staff members at plastic and of India. 46(3), 502 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Information Science and TechnologyAnna UniversityChennaiIndia
  2. 2.School of Information TechnologyVellore Institute of TechnologyVelloreIndia

Personalised recommendations