RecANt: Network-based Recruitment for Active Fake News Correction

To improve the reliability of content shared on social media, effective strategies for mitigating the diffusion of fake news are increasingly necessary. Traditionally, to counter false belief a competing cascade approach is used. This approach assumes that the opposite belief is already known, and thus, not applicable to newly spreading fake news. Another approach is to block nodes and links of the network to impede the flow of fake news (rumor/influence blocking). However, a more active way to battle the dissemination of fake news is to propagate the corresponding real news, since people who receive the real news in tandem with the fake news are less likely to believe in fake news. Such a setting is especially useful on a messaging platform such as WhatsApp, where the news item flows as a private message and the correction of fake news and its propagation must be performed by the users within the network as they receive it. To achieve this goal, we propose network-based recruitment for active fake news correction (RecANt) to find a set of individuals of a pre-defined size to be incentivized for actively fact-checking and passing on the real news so as to reach the maximum number of nodes in the network. These individuals should be such that they are likely to receive the fake news so that they can test its credibility, and when they propagate the corresponding real news, it reaches a large number of individuals. We prove that RecANt is NP-Hard with a monotone and submodular objective, leading to a polynomial time greedy algorithm (AFC) which provides a (1 – 1/e – ϵ)-approximation. We further optimize the runtime of AFC by developing a fast graph-pruning heuristic (RAFC) that performs as well as AFC in checking the spread of fake news while reducing the runtime significantly. Simulations on several networks demonstrate that our approach outperforms popular social network centrality measures and state-of-the-art information diffusion algorithm.

[1]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[2]  Jintao Li,et al.  Rumor Detection with Hierarchical Social Attention Network , 2018, CIKM.

[3]  M. Keeling,et al.  Modeling Infectious Diseases in Humans and Animals , 2007 .

[4]  Boris A. Galitsky Detecting Rumor and Disinformation by Web Mining , 2015, AAAI Spring Symposia.

[5]  Deying Li,et al.  An efficient randomized algorithm for rumor blocking in online social networks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[6]  Wei Chen,et al.  Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.

[7]  Pushmeet Kohli,et al.  Tractability: Practical Approaches to Hard Problems , 2013 .

[8]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[9]  Weili Wu,et al.  Least Cost Rumor Blocking in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[10]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[11]  D. Lazer,et al.  Fake news on Twitter during the 2016 U.S. presidential election , 2019, Science.

[12]  Masahiro Kimura,et al.  Blocking links to minimize contamination spread in a social network , 2009, TKDD.

[13]  Sungyong Seo,et al.  CSI: A Hybrid Deep Model for Fake News Detection , 2017, CIKM.

[14]  Xiaokui Xiao,et al.  Influence Maximization in Near-Linear Time: A Martingale Approach , 2015, SIGMOD Conference.

[15]  Dragomir R. Radev,et al.  Rumor has it: Identifying Misinformation in Microblogs , 2011, EMNLP.

[16]  Filippo Menczer,et al.  Virality Prediction and Community Structure in Social Networks , 2013, Scientific Reports.

[17]  Christian Borgs,et al.  Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.

[18]  Mong-Li Lee,et al.  iFACT: An Interactive Framework to Assess Claims from Tweets , 2017, CIKM.

[19]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[20]  Arunabha Sen,et al.  Influence propagation in adversarial setting: how to defeat competition with least amount of investment , 2012, CIKM '12.

[21]  Nam P. Nguyen,et al.  Containment of misinformation spread in online social networks , 2012, WebSci '12.

[22]  Chengkai Li,et al.  ClaimBuster: The First-ever End-to-end Fact-checking System , 2017, Proc. VLDB Endow..

[23]  Qiaozhu Mei,et al.  Enquiring Minds: Early Detection of Rumors in Social Media from Enquiry Posts , 2015, WWW.

[24]  Andreas Krause,et al.  Submodular Function Maximization , 2014, Tractability.

[25]  Wanlei Zhou,et al.  To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[26]  Nam P. Nguyen,et al.  Analysis of misinformation containment in online social networks , 2013, Comput. Networks.