Soft rumor control in social networks: Modeling and analysis

被引:26
作者
Askarizadeh, Mojgan [1 ]
Ladani, Behrouz Tork [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Rumor propagation; Soft rumor control; Consultation; Social network; Trust; Evolutionary game; EVOLUTIONARY GAME; PROPAGATION;
D O I
10.1016/j.engappai.2021.104198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, social networks become ubiquitous platforms for sharing and diffusing information around the world. However, spreading rumors as unverified and opaque information in social networks causes harmful damages to societies. An approach for combating rumors in social networks is to use soft control mechanisms i.e. enhancing the people?s knowledge and awareness against the rumor to persuade them avoiding rumor dissemination. In this paper, we propose a soft rumor control model in which people refer to their trusted friends or ask the reputable authorities about the rumor to avoid rumor spreading. The model includes a method for selecting consultants who are both expert in rumor context and responsive to queries about rumors by the user. The battlespace between rumor and anti-rumor spreaders is then modeled as an evolutionary game to analyze the controls? effectiveness. To evaluate the proposed model, we use Pheme dataset of tweets and conduct simulation analysis. It is shown that trusted consultants suggested by the model with high precision are the same users who send anti-rumor messages in real world. Furthermore, we analyze and compare soft rumor control methods on societies with different assumed cyber literacy and habits. Moreover, it is interestingly shown that using soft rumor control mechanisms in some situations outperforms traditional hard controls (e.g. censorship). Note that as we have used tangible factors in formulating the proposed model, it can help social network developers to build feasible soft rumor control facilities in their own products.
引用
收藏
页数:12
相关论文
共 33 条
[1]  
Abdelrahim A., 2014, INT AUDIT MIDDLE E, V30
[2]  
[Anonymous], COMMUNICATION Q
[3]  
[Anonymous], 2013, GAME THEORY ITS APPL, DOI DOI 10.4324/9780203761335
[4]  
[Anonymous], 2010, P 19 ACM INT C INFOR, DOI DOI 10.1145/1871437.1871737
[5]   An evolutionary game model for analysis of rumor propagation and control in social networks [J].
Askarizadeh, Mojgan ;
Ladani, Behrouz Tork ;
Manshaei, Mohammad Hossein .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2019, 523 :21-39
[6]  
Bao YY, 2015, LECT NOTES SOC NETW, P77, DOI 10.1007/978-3-319-19003-7_5
[7]  
Bao YY, 2014, INT CONF COMPUT NETW, P11, DOI 10.1109/ICCNC.2014.6785296
[8]  
Bao YY, 2013, 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), P1472
[9]   Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets [J].
Barbon, Sylvio, Jr. ;
Campos, Gabriel F. C. ;
Tavares, Gabriel M. ;
Igawa, Rodrigo A. ;
Proenca, Mario L., Jr. ;
Guido, Rodrigo Capobianco .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2018, 14 (01)
[10]  
Budak Ceren, 2011, WWW, P665, DOI DOI 10.1145/1963405.1963499