Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Detecting fake news on social media
Shu K., Liu H., Morgan&Claypool Publishers, San Rafael, CA, 2019. 130 pp. Type: Book (978-1-681735-82-5)
Date Reviewed: Mar 3 2020

The authors have written an interesting book that summarizes problems related to detecting fake news.

In chapter 1, an introduction to the problem of fake news, the authors explain how fake news exploits individual gullibility: “(1) naïve realism--consumers tend to believe that their perceptions of reality are the only accurate views ... and (2) confirmation bias--consumers prefer to receive information that confirms their existing views” (p. 3).

Chapter 2, “What News Content Tells,” presents methods that attempt to determine whether news content is valid. It covers techniques that can be used to analyze the text of a suspect news article. A genuine news article is typically written in an inverted pyramid style: the most important information occurs early in the text, covering the familiar who, what, where, how, when, and why questions. A genuine news article will avoid emotionally charged words. This interesting chapter essentially analyzes the text of an article to determine whether it is genuine. The best method is manual fact checking, that is, a news researcher verifies the information using a number of sources. There are also websites where you can check some information.

Chapter 3 covers social context. It studies the user (or author) of an article. Information such as length of time affiliated with a certain website can be studied. It is assumed that somebody who joined a website a few days ago may be more likely to generate a fake news article than somebody who has belonged to a website for a number of years. The chapter also looks at propagation; for example, fake news can be passed on from one friend to another through social media networks.

In chapter 4, “Challenging Problems of Fake News Detection,” the topics covered include: 1) fake news early detection, 2) weakly supervised fake news detection, and 3) explainable fake news detection.

Appendix A covers data repositories. These include the Columbia Summarization Corpus, which extracts data from the academic project Columbia Newsblaster. Unfortunately, Newsblaster ended in 2016.

Appendix B covers various tools for tracking and detecting fake news on social media. Appendix C, “Relevant Activities,” includes educational programs, computational competitions, and research workshops and tutorials.

Overall, the authors cite a number of methods that can be used to detect fake news. The book is heavily referenced with more than 200 citations; there are also dozens of uniform resource locator (URL) references.

In summary, this brief, well-referenced book relies on dozens of equations. Readers can use it to become familiar with fake news detection methods. It can also be used as an advanced reference in classes attempting to study the detection of fake news.

Reviewer:  W. E. Mihalo Review #: CR146916 (2008-0179)
Bookmark and Share
  Featured Reviewer  
 
Social Networking (H.3.4 ... )
 
 
Collaborative Computing (H.5.3 ... )
 
 
Human Factors (H.1.2 ... )
 
 
Privacy (K.4.1 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Social Networking": Date
Social computing and virtual communities
Zaphiris P., Ang C., Chapman & Hall/CRC, Boca Raton, FL, 2009.  303, Type: Book (978-1-420090-42-0)
Sep 13 2011
A visual analytics approach to dynamic social networks
Federico P., Aigner W., Miksch S., Windhager F., Zenk L.  i-KNOW 2011 (Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies, Graz, Austria, Sep 7-9, 2011)1-8, 2011. Type: Proceedings
Nov 4 2011
Secure collaborative social networks
Zhan J. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 40(6): 682-689, 2010. Type: Article
Feb 8 2012
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy