Credibility Assessment of Public Pages over Facebook

  • Himanshi Agrawal
  • Rishabh KaushalEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 625)


With the growing use of online social media and presence of users on many such platforms, their interaction with social networks is huge. They are free to spread wrong information without any accuracy, integrity and authenticity checkpoints masquerading as legitimate content. All these wrong, unrelated, unwanted, manipulated information are distributed for some hidden reasons. Even, their distribution network is not limited to one social media platform. Sometimes, they use the social network as a market place either for advertising, promotion of particular website, product and an application. But these advertisements do not provide any incentive to Facebook as this content is just spam, irrelevant for Facebook. Dissemination of unwanted, unrelated information has become a huge problem not only on blog, discussion forum but also on online social network like Facebook. Due to lack of marking over content posted, this information become online and reader has no barometer to check either the credibility of commenter or poster or the credibility of facts. To address these issues, we have derived an equation to weigh the credibility of public pages and applied machine learning algorithms (MLA) over collected data to validate our prediction.


Credibility Online social media Unrelated content Machine learning algorithms Public pages Facebook 


  1. 1.
    Wang, J., Yu, C.T., Yu, P.S., Liu, B., Meng, W.: Diversionary comments under blog posts. ACM Trans. Web (TWEB) 9(4), 18 (2015)Google Scholar
  2. 2.
    Dewan, P., Kumaraguru, P.: Towards automatic real time identification of malicious posts on Facebook. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 85–92. IEEE, 21 July 2015Google Scholar
  3. 3.
    Abu-Nimeh, S., Chen, T.M., Alzubi, O.: Malicious and spam posts in online social networks. Computer 12(9), 23–28 (2011)CrossRefGoogle Scholar
  4. 4.
    Metzger, M.J., Flanagin, A.J., Eyal, K., Lemus, D.R., McCann, R.M.: Credibility for the 21st century: integrating perspectives on source, message, and media credibility in the contemporary media environment. Commun. Yearb. 20(27), 293–336 (2003)CrossRefGoogle Scholar
  5. 5.
    Nguyen, D.T., Nguyen, N.P., Thai, M.T.: Sources of misinformation in Online Social Networks: who to suspect? In: 2012-MILCOM Military Communications Conference, pp. 1–6. IEEE, 29 October 2012Google Scholar
  6. 6.
    Lin, C., Huang, Z., Yang, F., Zou, Q.: Identify content quality in online social networks. IET Commun. 6(12), 1618–1624 (2012)CrossRefGoogle Scholar
  7. 7.
    Ismail, S., Latif, R.A.: Authenticity issues of social media: credibility, quality and reality. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 74, p. 265. World Academy of Science, Engineering and Technology (WASET), 1 February 2013Google Scholar
  8. 8.
    AlMansour, A.A., Brankovic, L., Iliopoulos, C.S.: A model for recalibrating credibility in different contexts and languages-a twitter case study. Int. J. Digit. Inf. Wirel. Commun. (IJDIWC) 4(1), 53–62 (2014)Google Scholar
  9. 9.
    Abbasi, M.-A., Liu, H.: Measuring user credibility in social media. In: Greenberg, A.M., Kennedy, W.G., Bos, N.D. (eds.) SBP 2013. LNCS, vol. 7812, pp. 441–448. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  10. 10.
    Kang, M.: Measuring social media credibility: a study on a measure of blog credibility. Inst. Public Relat. 59–68 (2010)Google Scholar
  11. 11.
    Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference. ACM (2010)Google Scholar
  12. 12.
    Stein, T., Chen, E., Mangla, K.: Facebook Immune System in European Conference on Computer System (EuroSys) (2011)Google Scholar
  13. 13.
    Robertson, M., Pan, Y., Yuan, B.: A social approach to security: using social networks to help detect malicious web content. In: 2010 International Conference on Intelligent Systems and Knowledge Engineering (ISKE). IEEE (2010)Google Scholar
  14. 14.
    Cvijikj, I.P., Michahelles, F.: Monitoring trends on facebook. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE (2011)Google Scholar
  15. 15.
    Abu-Nimeh, S., Chen, T.M.: Proliferation and detection of blog spam. IEEE Secur. Priv. 8(5), 42–47 (2010)CrossRefGoogle Scholar
  16. 16.
    Agrawal, H., Kaushal, R.: Analysis of text mining techniques over public pages of Facebook. In: 2016 IEEE International Advance Computing Conference(IACC). IEEE (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  1. 1.Department of Information TechnologyIndira Gandhi Delhi Technical University for WomenDelhiIndia

Personalised recommendations