Skip to main content
Log in

Tweet Credibility Ranker: A Credibility Features’ Fusion Model

  • Published:
Cognitive Computation Aims and scope Submit manuscript

Abstract

Misinformation on social media has emerged as a modern weapon of warfare, disrupting societal peace, trust, justice, and democracy. It is quite challenging to address the issue of information credibility for microblogs. It becomes more challenging when the authenticity of the poster is hidden. The concept of information credibility has multi-perspectives. There are many necessary aspects of information credibility which must be considered for effective credibility assessment. It is observed that some important aspects of credibility are not considered in existing studies. The complete credibility assessment solution needs a comprehensive and diverse set of features for such complex identification. Therefore, these features are identified and proposed by exploring the related research studies consisting of the necessary credibility aspects. These features consist of diverse levels provided by microblogs. These levels include the post, poster, poster’s social network, and actual information propagation network. An exploratory study is also conducted to propose the best credibility features that are used in the proposed solution. The attempt is made for a hybrid features fusion model which combines feature-based or machine learning and graph-based approaches. It is a lightweight, high-performing, non-latent features model to avoid their drawbacks. It assesses the levels of credibility of the concerned post. It is designed for high-impact applications to combat low-credibility content during elections, crises, and other critical scenarios. The model is executed over a publicly available dataset extended for credibility assessment. The model provides good results with 95.6% accuracy by XGBoost using platinum features. The performance of the proposed model is compared with state-of-the-art that produced much-appreciating results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data Availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author upon reasonable request.

References

  1. Hermida A. Twittering the news: the emergence of ambient journalism. Journal Pract. 2010;4(3):297–308.

  2. Kwak H, Lee C, Park H, Moon S. What is Twitter, a social network or a news media?. In: Proceedings of the 19th international conference on World wide web; 2010:591–600.

  3. Hu M, Liu S, Wei F, Wu Y, Stasko J, Ma K.-L. Breaking news on Twitter. In: Proceedings of the SIGCHI conference on human factors in computing systems; 2012:2751–2754.

  4. Perrin A. Social media usage. Pew Res Cent. 2015:52–68.

  5. Shearer E, Gottfried B.J. News use across social media platforms 2017. Pew Res Cent. 2017;(2017):17.

  6. Mendoza M, Poblete B, Castillo C. Twitter under crisis: can we trust what we RT?. In: Proceedings of the first workshop on social media analytics; 2010:71–79.

  7. Briscoe EJ, Appling DS, Hayes H. Social network derived credibility,. In: Recommendation and search in social networks, Springer; 2015:59–75.

  8. Laird S. How social media is taking over the news industry. Retrieved on: Mashable; 2012.

    MATH  Google Scholar 

  9. Perrin A. Social media usage: 2005-2015. Accessed 1 12 2024. https://www.pewresearch.org/internet/2015/10/08/social-networking-usage-2005-2015/

  10. Elisa Shearer K.E.M. Social media usage: 2018. Accessed 1 12 2024. https://www.journalism.org/2018/09/10/news-use-across-social-media-platforms-2018/

  11. Blatchford T. Americans believe two-thirds of news on social media is misinformation. Accessed 1 12 2024. https://www.poynter.org/ethics-trust/2018/americans-believe-two-thirds-of-news-on-social-media-is-misinformation/

  12. Hsu C-C, Ajorlou A, Jadbabaie A. Persuasion, news sharing, and cascades on social networks. In: 2021 60th IEEE Conference on decision and control (CDC); 2022:4970–4975.

  13. Howell L, et al. Digital wildfires in a hyperconnected world. WEF report. 2013;3(2013):15–94.

    MATH  Google Scholar 

  14. Molony T. Social media warfare and Kenya’s conflict with Al Shabaab in Somalia: a right to know? Afr Aff. 2019;118(471):328–51.

    MATH  Google Scholar 

  15. Qureshi KA, Malick RAS, Sabih M. Social media and microblogs credibility: identification, theory driven framework, and recommendation, IEEE Access; 2021:1–1.

  16. Pierri F, Ceri S. False news on social media: a data-driven survey. ACM SIGMOD Rec. 2019;48(2):18–27.

    MATH  Google Scholar 

  17. Roozenbeek J, van der Linden S. Fake news game confers psychological resistance against online misinformation. Palgrave Commun. 2019;5(1):1–10.

    Google Scholar 

  18. Volkova S, Shaffer K, Jang JY, Hodas N. Separating facts from fiction: linguistic models to classify suspicious and trusted news posts on Twitter. In: Proceedings of the 55th annual meeting of the association for computational linguistics (Volume 2: Short Papers); 2017:647–653.

  19. Qureshi KA, Sabih M. Un-compromised credibility: social media based multi-class hate speech classification for text. IEEE Access. 2021;9:109465–77.

    MATH  Google Scholar 

  20. Fortuna P, Nunes S. A survey on automatic detection of hate speech in text. ACMComput Surv (CSUR). 2018;51(4):1–30.

    MATH  Google Scholar 

  21. Varol O, Ferrara E, Davis CA, Menczer F, Flammini A. Online human-bot interactions: detection, estimation, and characterization. In: Eleventh international AAAI conference on web and social media; 2017.

  22. Jiang M, Cui P, Faloutsos C. Suspicious behavior detection: current trends and future directions. IEEE Intell Syst. 2016;31(1):31–9.

    MATH  Google Scholar 

  23. Shao C, Hui P-M, Wang L, Jiang X, Flammini A, Menczer F, Ciampaglia GL. Anatomy of an online misinformation network. PLoS ONE. 2018;13(4): e0196087.

    Google Scholar 

  24. Hindman M, Barash V. Disinformation, and influence campaigns on Twitter. 2018.

  25. Ngo T, Wischnewski M, Bernemann R, Jansen M, Krämer N. Spot the bot: investigating user’s detection cues for social bots and their willingness to verify Twitter profiles. Comput Hum Behav. 2023;146:107819.

    Google Scholar 

  26. Jin Z, Cao J, Guo H, Zhang Y, Wang Y, Luo J. Detection and analysis of 2016 US presidential election related rumors on Twitter. In: International conference on social computing, behavioral-cultural modeling and prediction and behavior representation in modeling and simulation, Springer; 2017:14–24.

  27. Allcott H, Gentzkow M. Social media and fake news in the 2016 election. Journal of economic perspectives. 2017;31(2):211–36.

    MATH  Google Scholar 

  28. Faris R, Roberts H, Etling B, Bourassa N, Zuckerman E, Benkler Y. "Partisanship, propaganda, and disinformation: Online media and the,. US presidential election,". Berkman Klein Center Research Publication. 2016;6:2017.

  29. Bovet A, Makse HA. Influence of fake news in Twitter during the 2016 US presidential election. Nat Commun. 2019;10(1):1–14.

    MATH  Google Scholar 

  30. Bálint P, Bálint G. The Semmelweis-reflex. Orv Hetil. 2009;150(30):1430–1430.

    MATH  Google Scholar 

  31. Roets A, et al. ‘fake news’: incorrect, but hard to correct. the role of cognitive ability on the impact of false information on social impressions. Intelligence. 2017;65:107–10.

    MATH  Google Scholar 

  32. Kumar S, Shah N, False information on web and social media: a survey. arXiv preprint arXiv:1804.08559, 2018.

  33. AlRubaian M, Al-Qurishi M, Al-Rakhami M, Rahman SMM, Alamri A. A multistage credibility analysis model for microblogs. In: 2015 IEEE/ACM International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2015:1434–1440.

  34. Gwiaździński P, Gundersen AB, Piksa M, Krysińska I, Kunst JR, Noworyta K, Olejniuk A, Morzy M, Rygula R, Wójtowicz T, et al. Psychological interventions countering misinformation in social media: a scoping review. Front Psych. 2023;13:974782.

    Google Scholar 

  35. Rieh SY, Danielson DR. Credibility: a multidisciplinary framework. 2007.

  36. Self CC, Roberts C. Credibility. In: An Integrated Approach to Communication Theory and Research, Routledge; 2019:435–446.

  37. Ahmad M, Jan M.A. Evaluating research: diversity and credibility of information sources., Dialogue (Pakistan). 2018;13:4.

  38. Rieh SY, Morris MR, Metzger MJ, Francke H, Jeon GY. Credibility perceptions of content contributors and consumers in social media. Proceedings of the American Society for Information Science and Technology. 2014;51(1):1–4.

    Google Scholar 

  39. Bentéjac C, Csörgő A, Martínez-Muñoz G. A comparative analysis of gradient boosting algorithms. Artif Intell Rev. 2021;54:1937–67.

    MATH  Google Scholar 

  40. Thompson NC, Greenewald K, Lee K, Manso GF. The computational limits of deep learning. arXiv preprint arXiv:2007.05558, 2021.

  41. Lisboa P, Saralajew S, Vellido A, Fernández-Domenech R, Villmann T. The coming of age of interpretable and explainable machine learning models. Neurocomputing. 2023;535:25–39.

    MATH  Google Scholar 

  42. Popat K.K. Credibility analysis of textual claims with explainable evidence. 2019.

  43. Bhattarai B, Granmo O-C, Jiao L. Explainable tsetlin machine framework for fake news detection with credibility score assessment. 2021. arXiv preprint arXiv:2105.09114

  44. Shu K, Cui L, Wang S, Lee D, Liu H. defend: Explainable fake news detection. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining; 2019:395–405 .

  45. Silva A, Han Y, Luo L, Karunasekera S, Leckie C. Propagation2vec: embedding partial propagation networks for explainable fake news early detection. Information Processing & Management. 2021;58(5):102618.

    Google Scholar 

  46. Chen X, Lo LY-H, Qu H. Sirenless: reveal the intention behind news. 2021. arXiv preprint arXiv:2001.02731

  47. Alrubaian M, Al-Qurishi M, Hassan MM, Alamri A. A credibility analysis system for assessing information on Twitter. IEEE Trans Dependable Secure Comput. 2016;15(4):661–74.

    Google Scholar 

  48. Xia X, Yang X, Wu C, Li S, Bao L. Information credibility on Twitter in emergency situation. In: Pacific-Asia workshop on intelligence and security informatics, Springer; 2012:45–59.

  49. Gupta A, Kumaraguru P, Castillo C, Meier P. TweetCred: real-time credibility assessment of content on Twitter. In: International conference on social informatics, Springer; 2014:228–243.

  50. Castillo C, Mendoza M, Poblete B. Information credibility on Twitter. In: Proceedings of the 20th international conference on World wide web; 2011:675–684.

  51. Gupta A, Kumaraguru P. Credibility ranking of tweets during high impact events. In: Proceedings of the 1st workshop on privacy and security in online social media; 2012:2–8.

  52. Al-Khalifa HS, Al-Eidan RM. An experimental system for measuring the credibility of news content in Twitter. Int J Web Inform Syst. 2011.

  53. Ito J, Song J, Toda H, Koike Y, Oyama S. Assessment of tweet credibility with LDA features. In: Proceedings of the 24th international conference on world wide web; 2015:953–958.

  54. Kang B, O’Donovan J, Höllerer T. Modeling topic specific credibility on Twitter. In: Proceedings of the 2012 ACM international conference on Intelligent User Interfaces; 2012:179–188.

  55. Lorek K, Suehiro-Wiciński J, Jankowski-Lorek M, Gupta A. Automated credibility assessment on Twitter. Computer Science. 2015;16(2):157–68.

    MATH  Google Scholar 

  56. Gün A, Karagöz P. A hybrid approach for credibility detection in Twitter. In: International Conference on Hybrid Artificial Intelligence Systems, Springer; 2014:515–526.

  57. Jin Z, Cao J, Jiang Y-G, Zhang Y. News credibility evaluation on microblog with a hierarchical propagation model. In: 2014 IEEE International conference on data mining, IEEE; 2014:230–239.

  58. Gupta M, Zhao P, Han J. Evaluating event credibility on Twitter. In: Proceedings of the 2012 SIAM International Conference on Data Mining, SIAM; 2012:153–164.

  59. Chu Z, Gianvecchio S, Wang H, Jajodia S. Detecting automation of Twitter accounts: are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput. 2012;9(6):811–24.

    Google Scholar 

  60. Qureshi K.A. Credibility as informativeness: predicting informative tweets, Nov. 2021.

  61. Chao F, Zhou Q, Zhao J, Xu Y, Yu G. Trustworthiness matters: effect of source credibility on sharing debunking information across different rumour types. Inform Process Manag. 2024;61(4):103747.

  62. Chiluwa IE, Samoilenko S.A. Handbook of research on deception, fake news, and misinformation online. Inform Sci Ref/IGI Glob. 2019.

  63. Qureshi KA, Malick RAS, Sabih M, Cherifi H. Deception detection on social media: a source-based perspective. Knowl-Based Syst. 2022;256:109649.

    MATH  Google Scholar 

  64. Majerczak P, Strzelecki A. Trust, media credibility, social ties, and the intention to share towards information verification in an age of fake news. Behav Sci. 2022;12(2):51.

    MATH  Google Scholar 

  65. Shu K, Mahudeswaran D, Wang S, Lee D, Liu H. Fakenewsnet: a data repository with news content, social context and spatialtemporal information for studying fake news on social media. 2018. arXiv preprint arXiv:1809.01286

  66. Pierri F, Ceri S. False news on social media: a data-driven survey. ACM SIGMOD Rec. 2019;48(2):18–27.

    MATH  Google Scholar 

  67. Dutton WH, Blank G, Groselj D. Cultures of the internet: the internet in Britain: Oxford Internet Survey 2013 Report. Oxford Internet Institute. 2013.

  68. Riquelme F, González-Cantergiani P. Measuring user influence on Twitter: a survey. Information processing & management. 2016;52(5):949–75.

    MATH  Google Scholar 

  69. Gamage R, Wickramaarachchi D, Senanayake J, Source impact and credibility assessment on Twitter users. 2021.

  70. Elin K, Alice H. Analysing credibility of twitter users using the pagerank algorithm. 2017.

  71. Anand K, Kumar J, Anand K. Anomaly detection in online social network: a survey. In: 2017 International conference on inventive communication and computational technologies (ICICCT); 2017:456–459.

  72. Saquib S, Ali R. Malicious behavior in online social network. In: 2015 IEEE Workshop on computational intelligence: theories, applications and future directions (WCI), IEEE; 2015:1–6.

  73. Cha M, Haddadi H, Benevenuto F, Gummadi K.P. Measuring user influence in Twitter: the million follower fallacy. In: Fourth international AAAI conference on weblogs and social media; 2010.

  74. Sahoo SR, Gupta BB. Hybrid approach for detection of malicious profiles in Twitter. Comput Electr Eng. 2019;76:65–81.

    MATH  Google Scholar 

  75. Venkatesh R, Rout JK, Jena S. Malicious account detection based on short URLs in Twitter. In: Proceedings of the international conference on signal, networks, computing, and systems, Springer; 2017:243–251.

  76. David I, Siordia OS, Moctezuma D. Features combination for the detection of malicious Twitter accounts. In: 2016 IEEE International autumn meeting on power, electronics and computing (ROPEC), IEEE; 2016:1–6.

  77. Singh M, Bansal D, Sofat S. Detecting malicious users in Twitter using classifiers. In: Proceedings of the 7th international conference on security of information and networks; 2014:247–253.

  78. Varol O, Ferrara E, Davis C, Menczer F, Flammini A. Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the international AAAI conference on web and social media; 2017. vol. 11.

  79. Multi-class and automated tweet categorization, Zenodo, Nov. 2021.

  80. Web of trust API. Accessed 1 12 2024. https://www.mywot.com/developers.

  81. Ismail A, Kuppusamy K, Kumar A, Ojha PK. Connect the dots: accessibility, readability and site ranking-an investigation with reference to top ranked websites of government of India. J King Saud University-Comput Inform Sci. 2019;31(4):528–40.

    Google Scholar 

  82. Alexa rank. Accessed 1 12 2024. https://www.alexa.com/siteinfo

  83. List of swear words. Accessed 1 12 2024. https://www.noswearing.com/dictionary

  84. Textblob python library. Accessed 1 12 2024. https://textblob.readthedocs.io/en/dev/

  85. Lexicon-based emotion analysis. Accessed 1 12 2024. https://github.com/glhuilli/limbic

  86. Credibility ground truths. 2021. https://didyoucheckfirst.wordpress.com/ opensources-co-news-sites/

  87. Wiki fake sites. 2021. https://en.wikipedia.org/wiki/ List_of_fake_news_websites

  88. News guard tech. 2021. https://www.newsguardtech.com/

  89. News media bias. 2021. https://www.allsides.com/

  90. Media bias fact check. 2021. https://mediabiasfactcheck.com/

  91. 349 fact-checking web sites provided by reporters lab at duke university. Accessed 1 12 2024. https://reporterslab.org/fact-checking/

  92. Qureshi KA, Malick RAS, Sabih M, Cherifi H. Complex network and source inspired COVID-19 fake news classification on Twitter. IEEE Access. 2021;9:139636–56.

    Google Scholar 

  93. Ling CX, Huang J, Zhang H, et al. AUC: a statistically consistent and more discriminating measure than accuracy. Ijcai. 2003;3:519–24.

    MATH  Google Scholar 

  94. Labatut V, Cherifi H. Accuracy measures for the comparison of classifiers. 2012. arXiv preprint arXiv:1207.3790

  95. Confusion matrix. Accessed 1 12 2024. https://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/

  96. Nembrini S, König IR, Wright MN. The revival of the GINI importance? Bioinformatics. 2018;34(21):3711–8.

    MATH  Google Scholar 

  97. Van der Maaten L, Hinton G. Visualizing data using t-SNE. J Mach Learn Res. vol. 9, no. 11, 2008.

  98. Qureshi KA, Malick RAS. Explainable tweet credibility ranker: a comprehensive credibility solution. Comput Electr Eng. 2023;112:109028.

    Google Scholar 

  99. Westerman D, Spence PR, Van Der Heide B. A social network as information: the effect of system generated reports of connectedness on credibility on Twitter. Comput Hum Behav. 2012;28(1):199–206.

    MATH  Google Scholar 

  100. Amador J, Oehmichen A, Molina-Solana M. Characterizing political fake news in Twitter by its meta-data. 2017. arXiv preprint arXiv:1712.05999

  101. Shu K, Wang S, Liu H. Understanding user profiles on social media for fake news detection. In: 2018 IEEE Conference on multimedia information processing and retrieval (MIPR); IEEE; 2018:430–435.

  102. Sikdar S, Kang B, ODonovan J, Höllerer T, Adah S. Understanding information credibility on Twitter. In: 2013 International conference on social computing, IEEE, 2013:19–24

  103. Shu K, Zhou X, Wang S, Zafarani R, Liu H. The role of user profiles for fake news detection. In: Proceedings of the 2019 IEEE/ACM international conference on advances in social networks analysis and mining, 2019:436–439.

  104. Morris MR, Counts S, Roseway A, Hoff A, Schwarz J. Tweeting is believing? Understanding microblog credibility perceptions. In: Proceedings of the ACM 2012 conference on computer supported cooperative work; 2012:441–450.

  105. Alsaleh M, Alarifi A, Al-Salman AM, Alfayez M, Almuhaysin A. TSD: detecting sybil accounts in Twitter. In: 2014 13th International conference on machine learning and applications, IEEE, 2014:463–469.

  106. Lauterbach D, Truong H, Shah T, Adamic L. Surfing a web of trust: reputation and reciprocity on couchsurfing. com. In: 2009 International conference on computational science and engineering, IEEE; 2009. vol. 4, pp. 346–353.

  107. Narang R, Sarin S, Singh P, Goyal R. Impact of reciprocity in information spreading using epidemic model variants. Information. 2018;9:6.

  108. Ito J, Song J, Toda H, Koike Y, Oyama S. Assessment of tweet credibility with LDA features. In: Proceedings of the 24th international conference on world wide web; 2015:953–958.

  109. Meel P, Vishwakarma DK. Fake news, rumor, information pollution in social media and web: a contemporary survey of state-of-the-arts, challenges and opportunities. Expert Syst Appl. 2020;153:112986.

    MATH  Google Scholar 

  110. Collins B, Hoang DT, Nguyen NT, Hwang D. Trends in combating fake news on social media-a survey. J Inform Telecommun. 2021;5(2):247–66.

    MATH  Google Scholar 

  111. ODonovan J, Kang B, Meyer G, Höllerer T, Adalii S. Credibility in context: an analysis of feature distributions in Twitter. In: 2012 International conference on privacy, security, risk and trust and 2012 international confernece on social computing, IEEE, 2012:293–301.

  112. Arora U, Dutta HS, Joshi B, Chetan A, Chakraborty T. Analyzing and detecting collusive users involved in blackmarket retweeting activities. ACM Trans Intell Syst Technol (TIST). 2020;11(3):1–24.

    Google Scholar 

  113. Dutta HS, Chakraborty T. Blackmarket-driven collusion among retweeters-analysis, detection, and characterization. IEEE Trans Inf Forensics Secur. 2019;15:1935–44.

    MATH  Google Scholar 

  114. Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M. The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th international conference on world wide web companion, 2017:963–972.

  115. Internettrusttoolnewsguardwebsite. Accessed 1 12 2024. https://www.newsguardtech.com/

  116. Tausczik YR, Pennebaker JW. The psychological meaning of words: LIWC and computerized text analysis methods. J Lang Soc Psychol. 2010;29(1):24–54.

    Google Scholar 

  117. Fadhli I, Hlaoua L, Omri MN. Survey-credible conversation and sentiment analysis. Soc Netw Anal Min. 2023;14(1):13.

    Google Scholar 

  118. Sabbeh SF, Baatwah SY. Arabic news credibility on Twitter: an enhanced model using hybrid features. J Theor Appl Inform Technol. 2018. vol. 96, no. 8.

  119. Acar A, Muraki Y. Twitter for crisis communication: lessons learned from Japan’s tsunami disaster. Int J Web Based Communities. 2011;7(3):392–402.

    MATH  Google Scholar 

  120. Recasens M, Danescu-Niculescu-Mizil C, Jurafsky D. Linguistic models for analyzing and detecting biased language. In: Proceedings of the 51st annual meeting of the association for computational linguistics (Volume 1: Long Papers), , 2013:1650–1659.

  121. Duan Y, Jiang L, Qin T, Zhou M, Shum H.-Y. An empirical study on learning to rank of tweets. In: Proceedings of the 23rd international conference on computational linguistics. Association for Computational Linguistics. 2010:295–303.

  122. Mitra T, Gilbert E. CredBank: a large-scale social media corpus with associated credibility annotations. In: Ninth international AAAI conference on web and social media; 2015.

  123. Westerman D, Spence PR, Van Der Heide B. Social media as information source: recency of updates and credibility of information. J Comput-Mediat Commun. 2014;19(2):171–83.

  124. Dutta HS, Chetan A, Joshi B, Chakraborty T. Retweet us, we will retweet you: spotting collusive retweeters involved in blackmarket services. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE; 2018:242–249.

  125. Vosoughi S, Roy D, Aral S. The spread of true and false news online. Science. 2018;359(6380):1146–51.

    MATH  Google Scholar 

  126. Karlova NA, Fisher KE. A social diffusion model of misinformation and disinformation for understanding human information behaviour. 2013.

  127. Ling KC, Piew TH, Chai LT. The determinants of consumers’ attitude towards advertising. Can Soc Sci. 2010;6(4):114–26.

  128. Lazer DM, Baum MA, Benkler Y, Berinsky AJ, Greenhill KM, Menczer F, Metzger MJ, Nyhan B, Pennycook G, Rothschild D, et al. The science of fake news. Science. 2018;359(6380):1094–6.

  129. Stewart LG, Arif A, Starbird K. Examining trolls and polarization with a retweet network. In: Proc ACM WSDM, workshop on misinformation and misbehavior mining on the web; 2018.

Download references

Acknowledgements

Performed the role of additional data fetching: Maad Saifuddin, Syed Ahmed Ali Naqvi, Faraz Kayani, and Ghayas-Uddin Adam at Department of Computer Science, DHA Suffa University, Karachi, Pakistan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khubaib Ahmed Qureshi.

Ethics declarations

Conflict of Interest

The authors declare no competing interests.

Ethical Approval

This article does not contain any studies involving human participants performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A. Proposed User-Based Features

Table 14 Proposed user-based features: explored and identified from related and supported research studies

Appendix B. Proposed Post-Based Features

Table 15 Proposed post-based features: explored and identified from related and supported research studies

Appendix C. Guided Data Tagging GUI

The GUI of the application used to rank the tweets using the guided data tagging method is shown as follows in Fig. 11.

Fig. 11
figure 11

Guided data tagging: credibility ranking GUI

Table 16 Agreement (O) and Kappa (K) values between experts and ground truths

Appendix D: Discriminating Features-eCDF Plots

The most discriminating feature distributions are plotted using empirical cumulative distribution function (eCDF). It could be observed that all features are highly discriminating. Only 20 features are plotted out of 46 features (see Fig. 12).

Fig. 12
figure 12

Feature analysis: few features are plotted using eCDF plots that show that these features are highly discriminating

Appendix E. Classification Models Results

Table 17 Multi-class classification models complete results
Table 18 Binary-class classification models complete results

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qureshi, K.A., Malick, R.A.S. Tweet Credibility Ranker: A Credibility Features’ Fusion Model. Cogn Comput 17, 56 (2025). https://doi.org/10.1007/s12559-025-10413-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12559-025-10413-5

Keywords