Isolating Rumors Using Sentiment Analysis

Authors

  • V. Sivasangari TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India
  • Ashok Kumar Mohan TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India
  • K. Suthendran Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India
  • M. Sethumadhavan TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India

DOI:

https://doi.org/10.13052/2245-1439.7113

Keywords:

Social Media Analysis, Twitter Scraper, Sentiment Classifier, Rumor, Non-rumor, #RIP

Abstract

In recent days, social media has become a platform to spread false facts all the way through internet. One of the growing data analytic engine from web informal organization says, twitter has become the prime source for spreading fake news facilitating numerous perpetrators around the globe. It has turned into a competent, speedy cum effortless hotspot for news-fans to just click and forward junk data. Individuals are opting to use twitter for searching information regarding crisis circumstances and everyday occasions. In twitter, the spread of fraudulent or inaccurate information during the emergency situations will affect the individuals and public in numerous ways, but the original news is more reliable when it is declared by the news channels. So, the importance of proposed framework is categorized in three steps; Initially, Twitter Scraper is applied to scrape the vast volume of tweets and metadata from the collected set of tweets for the study on former Chief Minister (state of Tamil Nadu) death case controversy during 2016. Then the threshold value based on negative polarity of common tweets for the scraped data is calculated, once the tweeted texts are different from the threshold condition it will be automatically tagged as ‘rumor’ (negative) or else tagged as ‘non-rumor’ (positive) using sentiment classifier. Finally, the proposed model on VADER based sentiment analysis identifies the false facts. It is obtained as a result of the sample tweets regularly training and testing it on whole datasets.

 

Downloads

Download data is not yet available.

Author Biographies

V. Sivasangari, TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India

V. Sivasangari is pursuing her M.Tech. in Cyber Security at TIFAC-CORE in Cyber Security, Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India. Her current area of research is Rumor Prediction in Social Media Networks.

Ashok Kumar Mohan, TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India

Ashok Kumar Mohan, M.Tech. specialized in Cyber Security, is a Research Associate at TIFAC-CORE in Cyber Security, Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India. He is currently a Ph.D. scholar doing his research in the area of Cyber Forensics funded by Ministry of Electronics & Information Technology (Government of India) under Visvesvaraya PhD scheme for Electronics and IT. He is currently pursuing his research over the cyber security core vicinity in Metadata Forensics, Wireless Security Auditing, Rumor Prediction in Social Media Networks and Slack Space Analysis of NTFS File Systems. He is also the Certified EC-Council Instructor (CEI) for ethical hacking and penetration testing certification courses at the research centre.

K. Suthendran, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India

Suthendran Kannan, received his B.E. Electronics and Communication Engineering from Madurai Kamaraj University in 2002; his M.E. Communication Systems from Anna University in 2006 and his Ph.D. Electronics and Communication Engineering from Kalasalingam University in 2015. He was a Research and Development Engineer at Matrix view Technologies Private Limited, Chennai for a couple of years. He is now the Head, Cyber Forensics Research Laboratory and Associate Professor in Information Technology, Kalasalingam Academy of Research and Education. His current research interests include Cyber Security, Communication System, Signal Processing, Image Processing, etc.

M. Sethumadhavan, TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India

M. Sethumadhavan, received his Ph.D. (Number Theory) from Calicut Regional Engineering College. Currently, he is working as a Professor in the Department of Mathematics and Computer Science, Amrita Vishwa Vidyapeetham University, Coimbatore. His current research interests include: Post Quantum Crytography, Block Chain and Boolean functions.

References

Jain, S., Sharma, V., and Kaushal, R. (2016). Towards automated real-time detection of misinformation on Twitter. In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), (pp. 2015–2020). IEEE.

Gupta, A., Lamba, H., and Kumaraguru, P. (2013). $1.00 per rt# bostonmarathon# prayforboston: Analyzing fake content on twitter. In eCrime Researchers Summit (eCRS), 2013 (pp. 1–12). IEEE.

Vosoughi, S. (2015). Automatic detection and verification of rumors on Twitter (Doctoral dissertation, Massachusetts Institute of Technology).

Xia, F., Yu, C., Xu, L., Qian, W., and Zhou, A. (2017). Top-k temporal keyword search over social media data. World Wide Web, 20(5),1049–1069.

Shah, D., and Zaman, T. (2011). Rumors in a network: Who’s the culprit?. IEEE Transactions on information theory, 57(8), 5163–5181.

Liu, S., and Young, S. D. (2016). A survey of social media data analysis for physical activity surveillance. Journal of Forensic and Legal Medicine.

Zubiaga, A., Liakata, M., Procter, R., Bontcheva, K., and Tolmie, P. (2015). Towards Detecting Rumours in Social Media. In AAAI Workshop: AI for Cities.

Zhang, D. Y., Han, R., Wang, D., and Huang, C. (2016). On robust truth discovery in sparse social media sensing. In Big Data (Big Data), 2016 IEEE International Conference on (pp. 1076–1081). IEEE.

Zheltukhina, M. R., Slyshkin, G. G., Ponomarenko, E. B., Busygina, M. V., and Omelchenko, A. V. (2016). Role of Media Rumors in the Modern Society. International Journal of Environmental and Science Education, 11(17), 10581–10589.

Wang, S., and Terano, T. (2015). Detecting rumor patterns in streaming social media. In Big Data (Big Data), 2015 IEEE International Conference on (pp. 2709–2715). IEEE.

Mitra, T., Wright, G. P., and Gilbert, E. (2017). A parsimonious language model of social media credibility across disparate events. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 126–145). ACM.

Arif, A., Robinson, J. J., Stanek, S. A., Fichet, E. S., Townsend, P., Worku, Z., and Starbird, K. (2017). A Closer Look at the Self-Correcting Crowd: Examining Corrections in Online Rumors. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 155–168). ACM.

Zubiaga, A., Liakata, M., and Procter, R. (2016). Learning Reporting Dynamics during Breaking News for Rumour Detection in Social Media. arXiv preprint arXiv:1610.07363.

Vinodhini, G., and Chandrasekaran, R. M. (2012). Sentiment analysis and opinion mining: a survey. International Journal, 2(6), 282–292.

Louni, A., Santhanakrishnan, A., and Subbalakshmi, K. P. (2015). Identification of source of rumors in social networks with incomplete information. arXiv preprint arXiv:1509.00557.

Pasquini, C., Brunetta, C., Vinci, A. F., Conotter, V., and Boato, G. (2015). Towards the verification of image integrity in online news. In 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), (pp. 1–6). IEEE.

Mohan, A. K., and Venkataraman, D. (2017). Forensic future of social media analysis using web ontology. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), (pp. 1–6). IEEE.

Sanjay, S. P., Anand Kumar M, and Soman, K. P. (2015). AMRITA_CEN-NLP@ FIRE 2015: CRF Based Named Entity Extractor For Twitter Microposts. In FIRE Workshops (pp. 96–99).

Wang, M., and Gerber, M. S. (2015). Using Twitter for Next-Place Prediction, with an Application to Crime Prediction. In Computational Intelligence, 2015 IEEE Symposium Series on (pp. 941–948). IEEE.

Zhao, Z., Resnick, P., and Mei, Q. (2015). Enquiring minds: Early detection of rumors in social media from enquiry posts. In Proceedings of the 24th International Conference on World Wide Web (pp. 1395–1405). International World Wide Web Conferences Steering Committee.

Luo, W., Tay, W. P., Leng, M., and Guevara, M. K. (2015). On the universality of the Jordan center for estimating the rumor source in a social network. In 2015 IEEE International Conference on Digital Signal Processing (DSP), (pp. 760–764). IEEE.

Krithika, R., and Mohan, A. K. Inspecting Irresponsible Hypes: Rumors in Social Media Networks.

Fazal Masud Kundi1, Lexicon-Based Sentiment Analysis in the Social Web.Institute of Engineering and Computer Sciences, Pakistan.

Gilbert, C. H. E. (2014). Vader: A parsimonious rule-based model for sentiment analysis of social media text. In Eighth International Conference on Weblogs and Social Media (ICWSM-14). Available at (20/04/16) http://comp. social. gatech. edu/papers/icwsm14. vader. hutto. pdf.

https://stackoverflow.com/questions/8713241/whats-the-facebooks-graph-api-call-limit

https://stackoverflow.com/questions/1285666/twitter-api-limitt

Downloads

Published

2018-01-05

How to Cite

1.
Sivasangari V, Mohan AK, Suthendran K, Sethumadhavan M. Isolating Rumors Using Sentiment Analysis. JCSANDM [Internet]. 2018 Jan. 5 [cited 2024 Apr. 25];7(1-2):181-200. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5293

Issue

Section

Articles