Open Access Open Access  Restricted Access Subscription Access

Chapter 3. Can Technology Save Us?

Joanna M. Burkhardt

Abstract


Chapter 3 of Library Technology Reports (vol. 53, no. 8), “Combatting Fake News in the Digital Age”

Automated processes are involved in collecting and disseminating information. Chapter 3 of Library Technology Reports (vol. 53, no. 8), “Combatting Fake News in the Digital Age,” looks at computer programmers who are working on both sides of fake news—one group to create it and the other creating ways to eliminate it. Automatic identification of fake news is in its infancy. Those who seek to spread fake news continuously invent new technologies to allow their work to continue. It seems unlikely that technology will be able to stop the spread of fake news any time soon.


Full Text:

HTML PDF

References


Andrew Zaleski, “How Bots, Twitter, and Hackers Pushed Trump to the Finish Line,” Backchannel, Wired, November 10, 2016, https://www.wired.com/2016/11/how-bots-twitter-and-hackers-pushed-trump-to-the-finish-line/.

Alessandro Bessi and Emilio Ferrara, “Social Bots Distort the 2016 U.S. Presidential Election Online Discussion,” First Monday 21, no. 11 (November 7, 2016), http://journals.uic.edu/ojs/index.php/fm/rt/printerFriendly/7090/5653.

Tony Haile, “What You Think You Know about the Web Is Wrong,” Time.com, March 9, 2014, http://time.com/12933/what-you-think-you-know-about-the-web-is-wrong/.

Don Evon, “Nope Francis,” Snopes, July 24, 2016, www.snopes.com/pope-francis-donald-trump-endorsement/.

Marc Fisher, John Woodrow Cox, and Peter Hermann, “Pizzagate: From Rumor, to Hashtag, to Gunfire in D.C.,” Washington Post, December 6, 2016, https://www.washingtonpost.com/local/pizzagate-from-rumor-to-hashtag-to-gunfire-in-dc/2016/12/06/4c7def50-bbd4-11e6-94ac-3d324840106c_story.html.

D. Parvaz, “The Arab Spring, Chronicled Tweet by Tweet,” Al Jazeera English, November 6, 2011, www.aljazeera.com/indepth/features/2011/11/2011113123416203161.html.

Sara El-Khalili, “Social Media as a Government Propaganda Tool in Post-revolutionary Egypt,” First Monday 18, no. 3 (March 4, 2013), http://firstmonday.org/ojs/index.php/fm/rt/printerFriendly/4620/3423.

“Twitter Served as a Lifeline of Information During Hurricane Sandy,” Pew Research Center, FactTank, October 28, 2013, www.pewresearch.org/fact-tank/2013/10/28/twitter-served-as-a-lifeline-of-information-during-hurricane-sandy/.

David Turner, Michael Schroeck, and Rebecca Shockley, Analytics: The Real-World Use of Big Data in Financial Services, executive report (Somers, NY: IBM Global Services, 2013).

Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, https://hbr.org/2013/04/the-hidden-biases-in-big-data.

Dirk Helbing, Bruno S. Frey, Gerd Gigerenzer, Ernst Hafen, Michael Hagner, Yvonne Hofstetter, Jeroen van den Hoven, Roberto V. Zicari, and Andrej Zwitter, “Will Democracy Survive Big Data and Artificial Intelligence?” Scientific American, February 25, 2017, https://www.scientificamerican.com/article/will-democracy-survive-big-data-and-artificial-intelligence/.

Steven J. Frenda, Rebecca M. Nichols, and Elizabeth F. Loftus, “Current Issues and Advances in Misinformation Research,” Current Directions in Psychological Science 20, no. 1 (2011): 20–23.

Igal Zelfman, “Bot Traffic Report 2016,” Imperva Incapsula Blog, January 24, 2017, https://www.incapsula.com/blog/bot-traffic-report-2016.html.

Onur Varol, Emilio Ferrara, Clayton A. Davis, Filippo Menczer, and Alessandro Falmmini, “Online Human-Bot Interactions: Detection, Estimation and Characterization,” in Proceedings of the Eleventh International AAAI Conference on Web and Social Media (ICWSM 2017) (Palo Alto, CA: AAAI Press, 2017), 280.

Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini, “The Rise of Social Bots,” Communications of the ACM 59, no. 7 (July 2016): 96.

Philip N. Howard, Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up (New Haven, CT: Yale, 2015), 211.

Twitter, Inc., Form 10-Q, Report for the Quarterly Period Ended June 30, 2014, US Securities and Exchange Commission file number 001-36164, www.sec.gov/Archives/edgar/data/1418091/000156459014003474/twtr-10q_20140630.htm.

Charles F. Bond and Bella M. DePaulo, “Accuracy of Deception Judgments,” Personality and Social Psychology Review 10, no. 3 (2006): 214–34.

Niall J. Conroy, Victoria L. Rubin, and Yimin Chen, “Automatic Deception Detection: Methods for Finding Fake News,” Proceedings of the Association for Information Science and Technology 52, no. 1 (2015), https://doi.org/10.1002/pra2.2015.145052010082.

Jeffrey Hancock, Michael T. Woodworth, and Stephen Porter, “Hungry like the Wolf: A Word-Pattern Analysis of the Languages of Psychopaths,” Legal and Criminological Psychology 18 (2013): 102–14.

David M. Markowitz and Jeffrey T. Hancock, “Linguistic Traces of a Scientific Fraud: The Case of Diederick Stapel,” PLOS ONE 9, no. 8 (2014), https://doi.org/10.1371/journal.pone.0105937.

Rada Mihalcea and Carlo Strapparava, “The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language” (short paper, Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics and 4th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, Singapore, August 2–7, 2009).

Momchil Hardalov, Ivan Koychev, and Preslav Nakov, “In Search of Credible News,” in Artificial Intelligence: Methodology, Systems, and Applications: 17th International Conference, AIMSA 2016, Varna, Bulgaria, September 7–10, 2016, Proceedings, ed. C. Dichev and G. Agre (London: Springer, 2016), 172–80.

Song Feng, Ritwik Banerjee, and Yejin Choi, “Syntactic Stylometry for Deception Detection,” in Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (New York: Association for Computational Linguistics, 2012), 171–75, www.aclweb.org/anthology/P12-2034.

Victoria L. Rubin and Tatiana Lukoianova, “Truth and Deception at the Rhetorical Structure Level,” Journal of the Association for Information Science and Technology 66, no. 5 (2015): 905–17.

Jacob Ratkiewicz, Michael Conover, Mark Meis, Bruno Goncalves, Snehal Patil, Alessandro Flammini and Filippo Mercer, “Truthy: Mapping the Spread of Astroturf in Microblog Streams,” In WWW ’11: Proceedings of the 20th International Conference Companion on World Wide Web (New York: Association of Computational Linguistics, 2011), 249–52, http://doi.org/10.1145/1963192.1963301.

Zhiwei Jin, Juan Cao, Yongdong Zhang, Hianshe Zhou, and Qi Tian, “Novel Visual and Statistical Image Features for Microblogs News Verification,” IEEE Transactions on Multimedia 19, no. 3 (March 2017): 598–608.

Victorial L. Rubin, Yimin Chen, and Niall J. Conroy, “Deception Detection for News: Three Types of Fakes,” in ASIST 2015: Proceedings of the 78th ASIS&T Annual Meeting, ed. Andrew Grove (Silver Spring, MD: Association for Information Science and Technology, 2015).

Myle Ott, Claire Cardie, and Jeffrey T. Hancock, “Negative Deceptive Opinion Spam,” in The 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Proceedings of the Main Conference (Stroudsburg, PA: Association of Computational Linguistics, 2013), 497–501.

Xin Luna Dong, Evgeniy Gabrilovich, Kevin Murphy, Van Dang, Wilko Horn, Camillo Lugaresi, Shaohua Sun, and Wei Zhang, “Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources,” Proceedings of the VLDB Endowment, arXiv:1502.03519v1 [cs.DB] February 12, 2015.

Giovanni Luca Ciampaglia, Prashant Shiralkar, Luis M. Rocha, Johan Bollen, Fillippo Menczer, and Alessandro Flammini, “Computational Fact Checking from Knowledge Networks,” PLOS ONE 10, no. 6 (2015), https://doi.org/10.1371/journal.pone.0128193.

Hamdi Yahuaoui Al-Mutairi and Hazem Raafat, “Lattice-Based Ranking for Service Trust Behaviors,” Knowledge Based Systems 102 (2016): 20–38.

Carlos Castillo, Marcelo Mendoza, and Barbara Poblete, “Predicting Information Credibility in Time-Sensitive Social Media,” Internet Research 29, no. 5 (2013): 560–88.

Benjamin Paul Chamberlain, Clive Humby, and Marc Peter Deisenroth, “Probabilistic Inference of Twitter Users’ Age Based on What They Follow,” Association for the Advancement of Artificial Intelligence, arXiv:1601.04621v2 [cs.SI], February 24, 2017.

Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier, “TweetCred: Real-Time Credibility Assessment of Content on Twitter,” in Social Informatics: SocInfo 2014, ed. L. M. Aiello and D. McFarland (London: Springer, 2014), 228–43.

Zhao Liang, Ting Hua, Chang-Tien Lu, and Ing-Ray Chen, “A Topic-Focused Trust Model for Twitter,” Computer Communications 76 (2016): 1–11.

Victoria L. Rubin, Niall J. Conroy, and Yimin Chen, “ Towards News Verification: Deception Detection Methods for News Discourse” (paper, Hawaii International Conference on System Sciences [HICSS48] Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment Symposium, Kauai, HI, January 2015), http://works.bepress.com/victoriarubin/6/.

Diego Saez-Trumper, “Fake Tweet Buster: A Webtool to Identify Users Promoting Fake News on Twitter,” in HT ’14: Proceedings of the 25th ACM Conference on Hypertext and Social Media (New York: Association for Computing Machinery, 2014), 316–17, https://doi.org/10.1145/2631775.2631786.

Chen Yimin, Niall J. Conroy, and Victoria L. Rubin, “News in an Online World: The Need for an ‘Automatic Crap Detector,’” Proceedings of the Association for Information Science and Technology 52, no. 1 (2015), https://doi.org/10.1002/pra2.2015.145052010081.

Clayton A. Davis, Giovanni Luca Ciampaglia, Luca Maria Aiello, Keychul Chung, Michael D. Conover, Emilio Ferrara, Alessandro Flammini, et al., “OSoMe: The IUNI Observatory on Social Media,” preprint, PeerJ Preprints, accepted April 29, 2016, https://doi.org/10.7287/peerj.preprints.2008v1.

V. S. Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, et al., “The DARPA Twitter Bot Challenge,” Computer, June 2016, 38.

Norah Abokhodair, Daisy Yoo, and David W. McDonald, “Dissecting a Social Botnet: Growth, Content and Influence in Twitter,” Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing (New York: Association for Computing Machinery, 2015), 839–51, https://doi.org/10.1145/2675133.2675208.

Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, and Alessandro Panconesi, “SoK: The Evolution of Sybil Defense via Social Networks,” in Proceedings of the 2013 IEEE Symposium on Security and Privacy (Piscataway, NJ: Institute of Electrical and Electronics Engineers, 2013), 382–96, https://doi.org/10.1109/SP.2013.33.

Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu, “The Socialbot Network: When Bots Socialize for Fame and Money” (paper, 27th annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, December 5–9, 2011).

Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow, “Uncovering Large Groups of Active Malicious Accounts in Online Social Networks” in CCS ’14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (New York: ACM: 2014), 477–88, https://doi.org/10.1145/2660267.2660269.

Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer, “BotOrNot: A System to Evaluate Social Bots,” in WWW ’16 Companion: Proceedings of the 25th International Conference Companion on World Wide Web, 273–74, https://doi.org/10.1145/2872518.2889302.

Chad Edwards, Autumn Edwards, Patric R. Spence, and Ashleigh K. Shelton, “Is That a Bot Running the Social Media Feed?” Computers in Human Behavior 33 (2014) 372–76.

Aviad Elyashar, Michael Fire, Dima Kagan, and Yuval Elovici, “Homing Social Bots: Intrusion on a Specific Organization’s Employee Using Socialbots” in ASONAM ’13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (New York: ACM, 2013), 1358–65, https://doi.org/10.1145/2492517.2500225.

Carlos Freitas, Fabricio Benevenuto, Saptarshi Ghosh, and Adiano Veloso, “Reverse Engineering Socialbot Infiltration Strategies in Twitter.” arXiv:1405.4927 [cs.SI], May 20, 2014.

Russell Frank, “Caveat Lector: Fake News as Folklore,” Journal of American Folklore 128, no. 509 (Summer 2015): 315–32.

Claudia Wagner, Silvia Mitter, Christian Körner, and Markus Strohmaier, “When Social Bots Attack: Modeling Susceptibility of Users in Online Social Networks” in Making Sense of Microposts: Proceedings of the WWW ’12 Workshop on “Making Sense of Microposts,” ed. Matthew Row, Milan Stankovic, and Aba-Sah Dadzie (CEUR Workshop Proceedings, 2012), http://ceur-ws.org/Vol-838.

Claire Wardle, “Fake News: It’s Complicated,” First Draft News, February 16, 2017, https://medium.com/1st-draft/fake-news-its-complicated-d0f773766c79.

Samuel C. Woolley and Douglas R. Guilbeault, Computational Propaganda in the United States of America: Manufacturing Consensus Online, Computational Propaganda Research Project, Working Paper 2017.5 (Oxford, UK: Project on Computational Propaganda, 2017), 8, http://comprop.oii.ox.ac.uk/2017/06/19/computational-propaganda-in-the-united-states-of-america-manufacturing-consensus-online/.

Douglas Guilbeault, “Growing Bot Security: An Ecological View of Bot Agency,” International Journal of Communication 10 (2016): 5012.

Samuel C. Woolley and Philip N. Howard, “Political Communication, Computational Propaganda, and Autonomous Agents.” International Journal of Communication 10 (2016): 4882–90.

Sam Woolley and Phil Howard, “Bad News Bots: How Civil Society Can Combat Automated Online Propaganda,” TechPresident, December 10, 2014, http://techpresident.com/news/25374/bad-news-bots-how-civil-society-can-combat-automated-online-propaganda.

Jonathan Stray website, February 24, 2017, http://jonathanstray.com/networked-propaganda-and-counter-propaganda.

Tao Stein, Ergond Chen, and Karan Mangla, “Facebook Immune System,” in Proceedings of the 4th Workshop on social network systems. Article #8. EuroSys Social Networks Systems (SNS) 2011, April 10, 2011 Salzburg, http://www.cse.iitd.ac.in/~siy107537/sil765/readings/a10-stein.pdf.

Charles Warner, “Google Increases Regulation of False Ads and Fake News,” Forbes, January 25, 2017, https://www.forbes.com/sites/charleswarner/2017/01/25/google-increases-regulation-of-false-ads-and-fake-news/.

Emily Bell, “Facebook Drains the Fake News Swamp with New, Experimental Partnerships,” Little Green Footballs, December 15, 2016, http://littlegreenfootballs.com/page/322423_Facebook_Drains_the_Fake_News_.

Kathleen Chaykowski, “Facebook Expands Fight against Fake News with Automatic, Related Articles,” Forbes, August 3, 2017, https://www.forbes.com/sites/kathleenchaykowski/2017/08/03/facebook-expands-fight-against-fake-news-with-automatic-related-articles/.


Refbacks

  • There are currently no refbacks.


Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | Privacy Policy