Abstract
Twitter has shown its greatest power of influence for its fast information diffusion. Previous research has shown that most of the tweets posted are truthful, but as some people post the rumors and spams on Twitter in emergence situation, the direction of public opinion can be misled and even the riots are caused. In this paper, we focus on the methods for the information credibility in emergency situation. More precisely, we build a novel Twitter monitor model to monitoring Twitter online. Within the novel monitor model, an unsupervised learning algorithm is proposed to detect the emergency situation. A collection of training dataset which includes the tweets of typical events is gathered through the Twitter monitor. Then we manually dispatch the dataset to experts who label each tweet into two classes: credibility or incredibility. With the classified tweets, a number of features related to the user social behavior, the tweet content, the tweet topic and the tweet diffusion are extracted. A supervised method using learning Bayesian Network is used to predict the tweets credibility in emergency situation. Experiments with the tweets of UK Riots related topics show that our procedure achieves good performance to classify the tweets compared with other state-of-art algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boyd, D., Golder, S., Lotan, G.: Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In: HICSS-43, pp. 1–10. IEEE, Kauai (2010)
Vieweg, S.: Microblogged contributions to the emergency arena: Discovery, interpretation and implications. Computer Supported Collaborative Work (2010)
Flanagin, A.J., Metzger, M.J.: Perceptions of Internet information credibility. Journalism and Mass Communication Quarterly 77, 515–540 (2000)
Juffinger, A., Granitzer, M., Lex, E.: Blog credibility ranking by exploiting verified content. In: WICOW, Madrid, Spain, pp. 51–58 (2009)
Johnson, T.J., Kaye, B.K., Bichard, S.L., Wong, W.J.: Every Blog Has Its Day: Politically-interested Internet Users’ Perceptions of Blog Credibility. Journal of Computer-Mediated Communication 13, 100–122 (2008)
Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Seventh Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Redmond, Washington, US (2010)
Jindal, N., Liu, B.: Opinion spam and analysis. In: WSDM 2008, Palo Alto, California, USA, pp. 219–230 (2008)
Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC 2010, Austin, Texas, USA, pp. 1–9 (2010)
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: WWW 2011, Hyderabad, India, pp. 675–684 (2011)
Mathioudakis, M., Koudas, N.: TwitterMonitor: trend detection over the twitter stream. In: Proceedings of the 2010 International Conference on Management of Data, pp. 1155–1158 (2010)
Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes Twitter users: real-time event detection by social sensors. In: WWW 2010, Raleigh, North Carolina, pp. 851–860 (2010)
Hughes, A.L., Palen, L.: Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6, 248–260 (2009)
Mendoza, M., Poblete, B., Castillo, C.: Twitter Under Crisis: Can we trust what we RT? In: 1st Workshop on Social Media Analytics (SOMA 2010), Washington, DC, USA, pp. 71–79 (2010)
MacQueen, J.: Some methods for classification and analysis of multivariate observations. Presented at the Proceedings of the Fifth Berkeley Symposium (1967)
Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery 2, 121–167 (1998)
Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S.: Top 10 algorithms in data mining. Knowledge and Information Systems 14, 1–37 (2008)
Koller, D., Friedman, N.: Probabilistic graphical models. MIT Press (2009)
Cooper, G.F., Herskovits, E.: A Bayesian method for the induction of probabilistic networks from data. Machine Learning 9, 309–347 (1992)
Buntine, W.: A guide to the literature on learning probabilistic networks from data. IEEE Transactions on Knowledge and Data Engineering 8, 195–210 (1996)
Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Machine Learning 29, 131–163 (1997)
Bouckaert, R.R., Frank, E., Hall, M.A., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: WEKA"Cexperiences with a java opensource project. Journal of Machine Learning Research 11, 2533–2541 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xia, X., Yang, X., Wu, C., Li, S., Bao, L. (2012). Information Credibility on Twitter in Emergency Situation. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2012. Lecture Notes in Computer Science, vol 7299. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30428-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-30428-6_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30427-9
Online ISBN: 978-3-642-30428-6
eBook Packages: Computer ScienceComputer Science (R0)