skip to main content
research-article

Overview of the Special Issue on Trust and Veracity of Information in Social Media

Published:11 April 2016Publication History
First page image

References

  1. Janna Anderson and Lee Rainie. 2012. The future of big data. Retrieved December 17, 2015 from http://www.pewinternet.org/2012/07/20/the-future-of-big-data/.Google ScholarGoogle Scholar
  2. Alessandro Bessi, Mauro Coletto, George A. Davidescu, Antonio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2015. Science vs conspiracy: Collective narratives in the age of misinformation. PLOS ONE 10, 2 (23 Feb. 2015), e0118093+. DOI:http://dx.doi.org/10.1371/journal.pone.0118093Google ScholarGoogle Scholar
  3. Christina Boididou, Katerina Andreadou, Symeon Papadopoulos, Duc-Tien Dang-Nguyen, Giulia Boato, Michael Riegler, and Yiannis Kompatsiaris. 2015. Verifying multimedia use at MediaEval 2015. In Working Notes Proceedings of the MediaEval 2015 Workshop.Google ScholarGoogle Scholar
  4. Christina Boididou, Symeon Papadopoulos, Yiannis Kompatsiaris, Steve Schifferes, and Nic Newman. 2014. Challenges of computational verification in social multimedia. In Proceedings of the 23rd International Conference on World Wide Web (WWW’14 Companion). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 743--748. DOI:http://dx.doi.org/10.1145/2567948.2579323 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kevin Robert Canini, Bongwon Suh, and Peter Pirolli. 2011. Finding credible information sources in social networks based on content and social structure. In Proceedings of the 2011 IEEE 3rd International Conference on Privacy, Security, Risk and Trust and 2011 IEEE 3rd International Conference on Social Computing. IEEE, 1--8. DOI:http://dx.doi.org/10.1109/PASSAT/SocialCom.2011.91Google ScholarGoogle ScholarCross RefCross Ref
  6. Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2011. Information credibility on twitter. In Proceedings of the 20th International Conference on World Wide Web (WWW’11). ACM, New York, NY, 675--684. DOI:http://dx.doi.org/10.1145/1963405.1963500 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2013. Predicting information credibility in time-sensitive social media. Internet Research 23, 5 (2013), 560--588. DOI:http://dx.doi.org/10.1108/IntR-05-2012-0095Google ScholarGoogle ScholarCross RefCross Ref
  8. Dennis Fetterly and Zoltán Gyöngyi (Eds.). 2009. Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web. Google ScholarGoogle ScholarCross RefCross Ref
  9. Aditi Gupta and Ponnurangam Kumaraguru. 2012. Credibility ranking of tweets during high impact events. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM’12). ACM, New York, NY, Article 2, 7 pages. DOI:http://dx.doi.org/10.1145/2185354.2185356 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. TweetCred: Real-time credibility assessment of content on twitter. In Proceedings of the 6th International Conference, SocInfo 2014. Luca Maria Aiello and Daniel A. McFarland (Eds.), Vol. 8851. Springer, 228--243. DOI:http://dx.doi.org/10.1007/978-3-319-13734-6_16Google ScholarGoogle ScholarCross RefCross Ref
  11. Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking Sandy: Characterizing and identifying fake images on Twitter during hurricane Sandy. In Proceedings of the 22nd International Conference on World Wide Web (WWW’13 Companion). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 729--736. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Bogdan Ionescu, Alexandru-Lucian Gînsca, Bogdan Boteanu, Adrian Popescu, Mihai Lupu, and Henning Müller. 2015. Retrieving diverse social images at MediaEval 2015: Challenge, dataset and evaluation. In Working Notes Proceedings of the MediaEval 2015 Workshop. Martha A. Larson, Bogdan Ionescu, Mats Sjöberg, Xavier Anguera, Johann Poignant, Michael Riegler, Maria Eskevich, Claudia Hauff, Richard F. E. Sutcliffe, Gareth J. F. Jones, Yi-Hsuan Yang, Mohammad Soleymani, and Symeon Papadopoulos (Eds.). 2015. Working Notes Proceedings of the MediaEval 2015 Workshop. CEUR Workshop Proceedings, Vol. 1436Google ScholarGoogle Scholar
  13. Xiaomo Liu, Armineh Nourbakhsh, Quanzhi Li, Rui Fang, and Sameena Shah. 2015. Real-time rumor debunking on Twitter. In Proceedings of the 24th ACM International Conference on Information and Knowledge Management (CIKM’15). ACM, New York, NY, 1867--1870. DOI:http://dx.doi.org/10.1145/2806416.2806651 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jing Ma, Wei Gao, Zhongyu Wei, Yueming Lu, and Kam-Fai Wong. 2015. Detect rumors using time series of social context information on microblogging websites. In Proceedings of the 24th ACM International Conference on Information and Knowledge Management (CIKM’15). ACM, New York, NY, 1751--1754. DOI:http://dx.doi.org/10.1145/2806416.2806607 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Juan Martinez-Romo and Lourdes Araujo. 2013. Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40, 8 (June 2013), 2992--3000. DOI:http://dx.doi.org/10.1016/j.eswa.2012.12.015 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Radoslaw Nielek, Adam Wierzbicki, Adam Jatowt, and Katsumi Tanaka (Eds.). 2015. WebQuality 2015, 5th International Workshop on Web Quality, Co-Located with the 24th International World Wide Web Conference (WWW’15).Google ScholarGoogle Scholar
  17. John O’Donovan, Byungkyu Kang, Greg Meyer, Tobias Hollerer, and Sibel Adalii. 2012. Credibility in context: An analysis of feature distributions in twitter. In Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (SOCIALCOM-PASSAT’12). IEEE Computer Society, Washington, DC, 293--301. DOI:http://dx.doi.org/10.1109/SocialCom-PASSAT.2012.128 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Symeon Papadopoulos, David Corney, and Luca Maria Aiello (Eds.). 2014. Proceedings of the SNOW 2014 Data Challenge co-located with the 23rd International World Wide Web Conference (WWW’14). CEUR Workshop Proceedings, Vol. 1150.Google ScholarGoogle Scholar
  19. Vahed Qazvinian, Emily Rosengren, Dragomir R. Radev, and Qiaozhu Mei. 2011. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP’11). Association for Computational Linguistics, Stroudsburg, PA, 1589--1599. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Gonçalves, Snehal Patil, Alessandro Flammini, and Filippo Menczer. 2011. Truthy: Mapping the spread of astroturf in microblog streams. In Proceedings of the 20th International Conference Companion on World Wide Web (WWW’11). ACM, New York, NY, 249--252. DOI:http://dx.doi.org/10.1145/1963192.1963301 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Matthew Rowe, Milan Stankovic, and Aba-Sah Dadzie (Eds.). 2015. Proceedings of the the 5th Workshop on Making Sense of Microposts Co-Located with the 24th International World Wide Web Conference (WWW’15). CEUR Workshop Proceedings, Vol. 1395.Google ScholarGoogle Scholar
  22. Eunsoo Seo, Prasant Mohapatra, and Tarek Abdelzaher. 2012. Identifying rumors and their sources in social networks. Proc. SPIE 8389 (2012), 83891I--83891I--13. DOI:http://dx.doi.org/10.1117/12.919823Google ScholarGoogle ScholarCross RefCross Ref
  23. Katsumi Tanaka, Xiaofang Zhou, Min Zhang, and Adam Jatowt (Eds.). 2010. Proceedings of the 4th ACM Workshop on Information Credibility on the Web (WICOW’10). Google ScholarGoogle Scholar
  24. Arkaitz Zubiaga, Maria Liakata, Rob Procter, Kalina Bontcheva, and Peter Tolmie. 2015. Towards detecting rumours in social media. CoRR abs/1504.04712 (2015). http://arxiv.org/abs/1504.04712Google ScholarGoogle Scholar
  25. Arkaitz Zubiaga, Damiano Spina, Maarten de Rijke, and Markus Strohmaier (Eds.). 2013. RAMSS 2013: Proceedings of the Second Workshop on Real-time Analysis and Mining of Social Streams, Co-Located with the 22nd International World Wide Web Conference (WWW’13).Google ScholarGoogle Scholar

Index Terms

  1. Overview of the Special Issue on Trust and Veracity of Information in Social Media

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Information Systems
          ACM Transactions on Information Systems  Volume 34, Issue 3
          Special Issue on Trust and Veracity of Information in Social Media
          May 2016
          110 pages
          ISSN:1046-8188
          EISSN:1558-2868
          DOI:10.1145/2915200
          Issue’s Table of Contents

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 April 2016
          • Received: 1 December 2015
          • Accepted: 1 December 2015
          Published in tois Volume 34, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader