SlideShare a Scribd company logo
1 of 28
Download to read offline
$1.00 per RT #BostonMarathon
#PrayForBoston: Analyzing Fake
Content on Twitter
Sep	
  17,	
  2013	
  
eCrime	
  Research	
  Summit	
  2013	
  
Adi$	
  Gupta,	
  Hemank	
  Lamba,	
  	
  
Ponnurangam	
  Kumaraguru	
  (PK)	
  
IIIT-­‐Delhi,	
  India	
  
Unifying the
Global Response
to Cybercrime
2	
  
About	
  Precog@IIITD	
  
Is	
  spreading	
  fake	
  content	
  an	
  eCrime?	
  
FAKE	
  
RUMORS	
  
3	
  
$	
  
Boston	
  Blasts	
  
•  Twin	
  blasts	
  occurred	
  during	
  the	
  Boston	
  Marathon	
  
– April	
  15th,	
  2013	
  at	
  18:50	
  GMT	
  
•  3	
  people	
  were	
  killed	
  and	
  264	
  were	
  injured	
  
•  Suspects	
  Tamerlan	
  Tsarnaev	
  (deceased)	
  and	
  Dzhokhar	
  
Tsarnaev	
  (in	
  custody)	
  
•  Huge	
  volume	
  of	
  content	
  posted	
  on	
  social	
  media	
  websites,	
  
including	
  TwiVer	
  
4	
  
First	
  Image	
  on	
  TwiIer	
  (within	
  4	
  mins)	
  
5	
  
Sample	
  Fake	
  Tweets	
  
6	
  
>50,000	
  RTs	
  
>30,000	
  RTs	
  
Our	
  Contribu$ons	
  
•  We	
  characterized	
  the	
  spread	
  of	
  fake	
  content	
  on	
  TwiVer	
  using	
  
temporal,	
  source	
  and	
  user	
  aVributes.	
  
•  We	
  applied	
  linear	
  regression	
  model	
  to	
  predict	
  how	
  viral	
  a	
  
rumor	
  would	
  in	
  future	
  based	
  on	
  its	
  current	
  user	
  
characterisYcs.	
  
•  We	
  analyzed	
  the	
  acYvity	
  and	
  interacYon	
  graphs	
  for	
  the	
  
suspended	
  user	
  profiles	
  created	
  during	
  Boston	
  blasts.	
  	
  
7	
  
Data	
  Descrip$on	
  
Total tweets 7,888,374
Total users 3,677,531
Tweets with URLs 3,420,228
Tweets with Geo-tag 62,629
Retweets 4,464,201
Replies 260,627
Time of the blast Mon Apr 15 18:50 2013
Time of first tweet Mon Apr 15 18:53 2013
Time of first image Mon Apr 15 18:54 2013
Time of last tweet Thu Apr 25 01:23 2013
8	
  
Data	
  Descrip$on	
  
9	
  
Data	
  Descrip$on	
  
10	
  
Methodology	
  
11	
  
Annota$ng	
  Viral	
  Tweets	
  
Annota$ng	
  Viral	
  Tweets	
  
Six	
  Rumors	
  
130,690	
  ReTweets	
  
128,019	
  Users	
  Affected	
  
Temporal	
  PaIerns	
  
14	
  
Temporal	
  PaIerns	
  
15	
  
True	
  informaYon	
  
propagaYon	
  begins	
  only	
  
aer	
  eight	
  hours	
  of	
  the	
  
blast	
  
Predic$ng	
  Spread	
  of	
  Fake	
  Content	
  
•  Using	
  linear	
  regression	
  
•  Predict	
  how	
  viral	
  fake	
  informaYon	
  /	
  rumor	
  would	
  be	
  in	
  future	
  
based	
  on	
  impact	
  of	
  users	
  tweeYng	
  the	
  rumor	
  
•  Impact	
  based	
  on:	
  
–  Social	
  reputaYon	
  
–  Global	
  engagement	
  
–  Topical	
  engagement	
  
–  Likability	
  
–  Credibility	
  
16	
  
Predic$ng	
  Spread	
  of	
  Fake	
  Content	
  
17	
  
Results	
  show	
  it	
  is	
  possible	
  to	
  predict	
  how	
  viral	
  a	
  rumor	
  would	
  become	
  in	
  
future	
  based	
  on	
  aVributes	
  of	
  users	
  currently	
  propagaYng	
  the	
  rumor.	
  
Suspended	
  Accounts	
  
•  31,919	
  new	
  TwiVer	
  accounts	
  created	
  during	
  
Boston	
  blasts,	
  that	
  tweeted	
  about	
  the	
  event	
  
•  Out	
  of	
  these	
  19%	
  [6,073	
  accounts]	
  were	
  
deleted	
  or	
  suspended	
  by	
  TwiVer	
  
18	
  
Fake	
  /	
  Malicious	
  Accounts	
  
19	
  
Network	
  Analysis	
  of	
  Fake	
  Accounts	
  
20	
  
Self-­‐loops	
  
Network	
  Analysis	
  of	
  Fake	
  Accounts	
  
21	
  
Closed	
  community	
  
Network	
  Analysis	
  of	
  Fake	
  Accounts	
  
22	
  
Star	
  topology	
  
Network	
  Analysis	
  of	
  Fake	
  Accounts	
  
23	
  
Single	
  links	
  
Conclusions	
  &	
  Future	
  Work	
  
•  Based	
  on	
  the	
  insights	
  from	
  around	
  10	
  events	
  in	
  last	
  two	
  years	
  
including:	
  
–  England	
  riots	
  
–  Libya	
  crisis	
  
–  Mumbai	
  triple	
  blasts	
  
–  Hurricane	
  Sandy	
  
–  Boston	
  Blasts	
  
•  We	
  are	
  building	
  Real-­‐Yme	
  soluYons	
  
– Browser	
  plug-­‐in	
  
– Monitoring	
  tools	
  
24	
  
Media	
  Coverage	
  
25	
  
Ques$ons	
  
?
26	
  
27	
  
Thank You!
aditig@iiitd.ac.in
pk@iiitd.ac.in
precog.iiitd.edu.in
Unifying the
Global Response
to Cybercrime
For any further information, please write to 	
  
pk@iiitd.ac.in	
  
precog.iiitd.edu.in	
  

More Related Content

Viewers also liked

Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsIIIT Hyderabad
 
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...Craig Silverman
 
Shrinking Globe: Global Health and Social Media
Shrinking Globe: Global Health and Social MediaShrinking Globe: Global Health and Social Media
Shrinking Globe: Global Health and Social MediaMark Ryan
 
Epidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on TwitterEpidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on TwitterParang Saraf
 
English 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsEnglish 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsTrudy Morgan-Cole
 
Slides: Epidemiological Modeling of News and Rumors on Twitter
Slides: Epidemiological Modeling of News and Rumors on TwitterSlides: Epidemiological Modeling of News and Rumors on Twitter
Slides: Epidemiological Modeling of News and Rumors on TwitterParang Saraf
 
Media and politics lse mpa talk 2017
Media and politics lse mpa talk 2017Media and politics lse mpa talk 2017
Media and politics lse mpa talk 2017POLIS LSE
 
Fake News
Fake NewsFake News
Fake NewsYian Lu
 
Handling fake news and eyewitness media
Handling fake news and eyewitness mediaHandling fake news and eyewitness media
Handling fake news and eyewitness mediaAlastair Reid
 
News Media 2017: Trends & Forecasts in headlines
News Media 2017: Trends & Forecasts in headlines News Media 2017: Trends & Forecasts in headlines
News Media 2017: Trends & Forecasts in headlines Tatiana Repkova
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat itSanjana Hattotuwa
 
17 digital trends for 2017 by @FrojdAgency
17 digital trends for 2017 by @FrojdAgency17 digital trends for 2017 by @FrojdAgency
17 digital trends for 2017 by @FrojdAgencyFröjd Interactive
 

Viewers also liked (14)

Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
 
Shrinking Globe: Global Health and Social Media
Shrinking Globe: Global Health and Social MediaShrinking Globe: Global Health and Social Media
Shrinking Globe: Global Health and Social Media
 
Epidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on TwitterEpidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on Twitter
 
English 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsEnglish 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake News
 
Slides: Epidemiological Modeling of News and Rumors on Twitter
Slides: Epidemiological Modeling of News and Rumors on TwitterSlides: Epidemiological Modeling of News and Rumors on Twitter
Slides: Epidemiological Modeling of News and Rumors on Twitter
 
Media and politics lse mpa talk 2017
Media and politics lse mpa talk 2017Media and politics lse mpa talk 2017
Media and politics lse mpa talk 2017
 
Fake News
Fake NewsFake News
Fake News
 
Handling fake news and eyewitness media
Handling fake news and eyewitness mediaHandling fake news and eyewitness media
Handling fake news and eyewitness media
 
News Media 2017: Trends & Forecasts in headlines
News Media 2017: Trends & Forecasts in headlines News Media 2017: Trends & Forecasts in headlines
News Media 2017: Trends & Forecasts in headlines
 
Fake news
Fake newsFake news
Fake news
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat it
 
Digital News Report 2016
Digital News Report 2016Digital News Report 2016
Digital News Report 2016
 
17 digital trends for 2017 by @FrojdAgency
17 digital trends for 2017 by @FrojdAgency17 digital trends for 2017 by @FrojdAgency
17 digital trends for 2017 by @FrojdAgency
 

Similar to $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter

Online firestorms - A tempest in a teapot
Online firestorms - A tempest in a teapotOnline firestorms - A tempest in a teapot
Online firestorms - A tempest in a teapotHimanshuDaga7
 
Computational Verification Challenges in Social Media
Computational Verification Challenges in Social MediaComputational Verification Challenges in Social Media
Computational Verification Challenges in Social MediaSymeon Papadopoulos
 
Reading the Riots on Twitter
Reading the Riots on TwitterReading the Riots on Twitter
Reading the Riots on Twitterrobnprocter
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationAxel Bruns
 
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...mysociety
 
Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...
Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...
Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...BOBCATSSS 2017
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Analyzing the Bitcoin Ponzi Scheme Ecosystem
Analyzing the Bitcoin Ponzi Scheme EcosystemAnalyzing the Bitcoin Ponzi Scheme Ecosystem
Analyzing the Bitcoin Ponzi Scheme EcosystemTrading Game Pty Ltd
 
Safeguarding Abila: Real-time Streaming Analysis
Safeguarding Abila: Real-time Streaming AnalysisSafeguarding Abila: Real-time Streaming Analysis
Safeguarding Abila: Real-time Streaming AnalysisParang Saraf
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...Jeremiah Onaolapo
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Alexia Maddox
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
Social Media In Business Continuity
Social Media In Business ContinuitySocial Media In Business Continuity
Social Media In Business Continuitytb8851
 

Similar to $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter (20)

Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Online firestorms - A tempest in a teapot
Online firestorms - A tempest in a teapotOnline firestorms - A tempest in a teapot
Online firestorms - A tempest in a teapot
 
Computational Verification Challenges in Social Media
Computational Verification Challenges in Social MediaComputational Verification Challenges in Social Media
Computational Verification Challenges in Social Media
 
Reading the Riots on Twitter
Reading the Riots on TwitterReading the Riots on Twitter
Reading the Riots on Twitter
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)information
 
Twitter r t under crisis
Twitter r t under crisisTwitter r t under crisis
Twitter r t under crisis
 
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
 
Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...
Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...
Evert van Bolhuis, Pieter Prins, Marina Martin and Margot Verleg - Do you tru...
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Analyzing the Bitcoin Ponzi Scheme Ecosystem
Analyzing the Bitcoin Ponzi Scheme EcosystemAnalyzing the Bitcoin Ponzi Scheme Ecosystem
Analyzing the Bitcoin Ponzi Scheme Ecosystem
 
Safeguarding Abila: Real-time Streaming Analysis
Safeguarding Abila: Real-time Streaming AnalysisSafeguarding Abila: Real-time Streaming Analysis
Safeguarding Abila: Real-time Streaming Analysis
 
tcss.2021.3049232.pdf
tcss.2021.3049232.pdftcss.2021.3049232.pdf
tcss.2021.3049232.pdf
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
Social Media In Business Continuity
Social Media In Business ContinuitySocial Media In Business Continuity
Social Media In Business Continuity
 

More from IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayIIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesIIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceIIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesIIIT Hyderabad
 

More from IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter

  • 1. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter Sep  17,  2013   eCrime  Research  Summit  2013   Adi$  Gupta,  Hemank  Lamba,     Ponnurangam  Kumaraguru  (PK)   IIIT-­‐Delhi,  India   Unifying the Global Response to Cybercrime
  • 3. Is  spreading  fake  content  an  eCrime?   FAKE   RUMORS   3   $  
  • 4. Boston  Blasts   •  Twin  blasts  occurred  during  the  Boston  Marathon   – April  15th,  2013  at  18:50  GMT   •  3  people  were  killed  and  264  were  injured   •  Suspects  Tamerlan  Tsarnaev  (deceased)  and  Dzhokhar   Tsarnaev  (in  custody)   •  Huge  volume  of  content  posted  on  social  media  websites,   including  TwiVer   4  
  • 5. First  Image  on  TwiIer  (within  4  mins)   5  
  • 6. Sample  Fake  Tweets   6   >50,000  RTs   >30,000  RTs  
  • 7. Our  Contribu$ons   •  We  characterized  the  spread  of  fake  content  on  TwiVer  using   temporal,  source  and  user  aVributes.   •  We  applied  linear  regression  model  to  predict  how  viral  a   rumor  would  in  future  based  on  its  current  user   characterisYcs.   •  We  analyzed  the  acYvity  and  interacYon  graphs  for  the   suspended  user  profiles  created  during  Boston  blasts.     7  
  • 8. Data  Descrip$on   Total tweets 7,888,374 Total users 3,677,531 Tweets with URLs 3,420,228 Tweets with Geo-tag 62,629 Retweets 4,464,201 Replies 260,627 Time of the blast Mon Apr 15 18:50 2013 Time of first tweet Mon Apr 15 18:53 2013 Time of first image Mon Apr 15 18:54 2013 Time of last tweet Thu Apr 25 01:23 2013 8  
  • 13. Annota$ng  Viral  Tweets   Six  Rumors   130,690  ReTweets   128,019  Users  Affected  
  • 15. Temporal  PaIerns   15   True  informaYon   propagaYon  begins  only   aer  eight  hours  of  the   blast  
  • 16. Predic$ng  Spread  of  Fake  Content   •  Using  linear  regression   •  Predict  how  viral  fake  informaYon  /  rumor  would  be  in  future   based  on  impact  of  users  tweeYng  the  rumor   •  Impact  based  on:   –  Social  reputaYon   –  Global  engagement   –  Topical  engagement   –  Likability   –  Credibility   16  
  • 17. Predic$ng  Spread  of  Fake  Content   17   Results  show  it  is  possible  to  predict  how  viral  a  rumor  would  become  in   future  based  on  aVributes  of  users  currently  propagaYng  the  rumor.  
  • 18. Suspended  Accounts   •  31,919  new  TwiVer  accounts  created  during   Boston  blasts,  that  tweeted  about  the  event   •  Out  of  these  19%  [6,073  accounts]  were   deleted  or  suspended  by  TwiVer   18  
  • 19. Fake  /  Malicious  Accounts   19  
  • 20. Network  Analysis  of  Fake  Accounts   20   Self-­‐loops  
  • 21. Network  Analysis  of  Fake  Accounts   21   Closed  community  
  • 22. Network  Analysis  of  Fake  Accounts   22   Star  topology  
  • 23. Network  Analysis  of  Fake  Accounts   23   Single  links  
  • 24. Conclusions  &  Future  Work   •  Based  on  the  insights  from  around  10  events  in  last  two  years   including:   –  England  riots   –  Libya  crisis   –  Mumbai  triple  blasts   –  Hurricane  Sandy   –  Boston  Blasts   •  We  are  building  Real-­‐Yme  soluYons   – Browser  plug-­‐in   – Monitoring  tools   24  
  • 28. For any further information, please write to   pk@iiitd.ac.in   precog.iiitd.edu.in