Searching for Truth in the Post-Truth Age

Alia Samreen, Adnan Ahmad, Furkh Zeshan
{"title":"Searching for Truth in the Post-Truth Age","authors":"Alia Samreen, Adnan Ahmad, Furkh Zeshan","doi":"10.1109/ICACS47775.2020.9055948","DOIUrl":null,"url":null,"abstract":"Despite the increasing use of social media platforms for information and data collection, its immoderate nature often leads to the spread of rumors - unverified information. At the same time, the opening of social media platforms offers the opportunity to explore how users share and discuss input, as well as to automatically evaluate the assessment of their verification using techniques and different methodologies. To overcome these problems, this study aims to contribute effectively to the area of rumor verification by scraping the web and verifying the information provided. To this end, a Rumor Tracking System is proposed in which a web scraping technique is used to evaluate the news verification based on various sources and features for news checking. The proposed system automatically detects these sources and features on the websites and verifies the content by consulting an information matching algorithm and completing a truth table of the sources and features provided. A combination of information on all the sources and features gathered through the websites is maintained by the system, which is used to determine whether an article is based on rumor or not.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACS47775.2020.9055948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Despite the increasing use of social media platforms for information and data collection, its immoderate nature often leads to the spread of rumors - unverified information. At the same time, the opening of social media platforms offers the opportunity to explore how users share and discuss input, as well as to automatically evaluate the assessment of their verification using techniques and different methodologies. To overcome these problems, this study aims to contribute effectively to the area of rumor verification by scraping the web and verifying the information provided. To this end, a Rumor Tracking System is proposed in which a web scraping technique is used to evaluate the news verification based on various sources and features for news checking. The proposed system automatically detects these sources and features on the websites and verifies the content by consulting an information matching algorithm and completing a truth table of the sources and features provided. A combination of information on all the sources and features gathered through the websites is maintained by the system, which is used to determine whether an article is based on rumor or not.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在后真理时代寻找真理
尽管越来越多地使用社交媒体平台来收集信息和数据,但其不节制的性质往往导致谣言的传播-未经证实的信息。与此同时,社交媒体平台的开放提供了探索用户如何分享和讨论输入的机会,以及使用技术和不同方法自动评估其验证的评估。为了克服这些问题,本研究旨在通过抓取网络并验证所提供的信息来有效地为谣言验证领域做出贡献。为此,本文提出了一种谣言跟踪系统,该系统采用网络抓取技术,根据不同的消息来源和特征来评估新闻的真实性。所提出的系统自动检测网站上的这些来源和特征,并通过咨询信息匹配算法和完成所提供的来源和特征的真值表来验证内容。该系统将通过网站收集的所有来源和特征的信息组合在一起,用于确定文章是否基于谣言。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Review of Security Machanism in internet of Things(IoT) Effects of Refactoring upon Efficiency of an NP-Hard Task Assignment Problem: A case study Preventive Techniques of Phishing Attacks in Networks CBAM: A Controller based Broadcast Storm Avoidance Mechanism in SDN based NDN-IoTs Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1