Skip to main content

Information Credibility on Twitter in Emergency Situation

  • Conference paper
Intelligence and Security Informatics (PAISI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7299))

Included in the following conference series:

Abstract

Twitter has shown its greatest power of influence for its fast information diffusion. Previous research has shown that most of the tweets posted are truthful, but as some people post the rumors and spams on Twitter in emergence situation, the direction of public opinion can be misled and even the riots are caused. In this paper, we focus on the methods for the information credibility in emergency situation. More precisely, we build a novel Twitter monitor model to monitoring Twitter online. Within the novel monitor model, an unsupervised learning algorithm is proposed to detect the emergency situation. A collection of training dataset which includes the tweets of typical events is gathered through the Twitter monitor. Then we manually dispatch the dataset to experts who label each tweet into two classes: credibility or incredibility. With the classified tweets, a number of features related to the user social behavior, the tweet content, the tweet topic and the tweet diffusion are extracted. A supervised method using learning Bayesian Network is used to predict the tweets credibility in emergency situation. Experiments with the tweets of UK Riots related topics show that our procedure achieves good performance to classify the tweets compared with other state-of-art algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyd, D., Golder, S., Lotan, G.: Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In: HICSS-43, pp. 1–10. IEEE, Kauai (2010)

    Google Scholar 

  2. Vieweg, S.: Microblogged contributions to the emergency arena: Discovery, interpretation and implications. Computer Supported Collaborative Work (2010)

    Google Scholar 

  3. Flanagin, A.J., Metzger, M.J.: Perceptions of Internet information credibility. Journalism and Mass Communication Quarterly 77, 515–540 (2000)

    Article  Google Scholar 

  4. Juffinger, A., Granitzer, M., Lex, E.: Blog credibility ranking by exploiting verified content. In: WICOW, Madrid, Spain, pp. 51–58 (2009)

    Google Scholar 

  5. Johnson, T.J., Kaye, B.K., Bichard, S.L., Wong, W.J.: Every Blog Has Its Day: Politically-interested Internet Users’ Perceptions of Blog Credibility. Journal of Computer-Mediated Communication 13, 100–122 (2008)

    Article  Google Scholar 

  6. Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Seventh Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Redmond, Washington, US (2010)

    Google Scholar 

  7. Jindal, N., Liu, B.: Opinion spam and analysis. In: WSDM 2008, Palo Alto, California, USA, pp. 219–230 (2008)

    Google Scholar 

  8. Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC 2010, Austin, Texas, USA, pp. 1–9 (2010)

    Google Scholar 

  9. Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: WWW 2011, Hyderabad, India, pp. 675–684 (2011)

    Google Scholar 

  10. Mathioudakis, M., Koudas, N.: TwitterMonitor: trend detection over the twitter stream. In: Proceedings of the 2010 International Conference on Management of Data, pp. 1155–1158 (2010)

    Google Scholar 

  11. Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes Twitter users: real-time event detection by social sensors. In: WWW 2010, Raleigh, North Carolina, pp. 851–860 (2010)

    Google Scholar 

  12. Hughes, A.L., Palen, L.: Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6, 248–260 (2009)

    Article  Google Scholar 

  13. Mendoza, M., Poblete, B., Castillo, C.: Twitter Under Crisis: Can we trust what we RT? In: 1st Workshop on Social Media Analytics (SOMA 2010), Washington, DC, USA, pp. 71–79 (2010)

    Google Scholar 

  14. MacQueen, J.: Some methods for classification and analysis of multivariate observations. Presented at the Proceedings of the Fifth Berkeley Symposium (1967)

    Google Scholar 

  15. Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)

    Article  Google Scholar 

  16. Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S.: Top 10 algorithms in data mining. Knowledge and Information Systems 14, 1–37 (2008)

    Article  Google Scholar 

  17. Koller, D., Friedman, N.: Probabilistic graphical models. MIT Press (2009)

    Google Scholar 

  18. Cooper, G.F., Herskovits, E.: A Bayesian method for the induction of probabilistic networks from data. Machine Learning 9, 309–347 (1992)

    MATH  Google Scholar 

  19. Buntine, W.: A guide to the literature on learning probabilistic networks from data. IEEE Transactions on Knowledge and Data Engineering 8, 195–210 (1996)

    Article  Google Scholar 

  20. Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Machine Learning 29, 131–163 (1997)

    Article  MATH  Google Scholar 

  21. Bouckaert, R.R., Frank, E., Hall, M.A., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: WEKA"Cexperiences with a java opensource project. Journal of Machine Learning Research 11, 2533–2541 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xia, X., Yang, X., Wu, C., Li, S., Bao, L. (2012). Information Credibility on Twitter in Emergency Situation. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2012. Lecture Notes in Computer Science, vol 7299. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30428-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30428-6_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30427-9

  • Online ISBN: 978-3-642-30428-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics