A psychometric analysis of information propagation in online social networks using latent trait theory

被引:0
|
作者
K. P. Krishna Kumar
Agrima Srivastava
G. Geethakumari
机构
[1] BITS-Pilani,
[2] Hyderabad Campus,undefined
来源
Computing | 2016年 / 98卷
关键词
Disinformation; Misinformation; Latent trait theory; Online social networks; Psychometric analysis; Trust; 68U35; 68M11;
D O I
暂无
中图分类号
学科分类号
摘要
The paper explores use of psychometric analysis based on latent trait theory to study quality of information propagation in online social networks. The collective intelligence of users of the network could be used to determine credibility of information. We use the latent trait of ability of users to distinguish between true information and misinformation as a measure of social computing in the network. Using repropagation features available in these networks as an affirmation of credibility of information, we build a dichotomous item response matrix which is evaluated using different models in latent trait theory. This enables us to detect presence of misinformation and also evaluate trust of users in the sources of information. Trust between users and sources of information is further used to construct a polytomous matrix. The matrices are evaluated using polytomous latent theory models to evaluate the types of trust and segregate possible collusion of users to spread misinformation. We show experimental results of psychometric analysis carried out in data sets obtained from ‘Twitter’ to support our claim.
引用
收藏
页码:583 / 607
页数:24
相关论文
共 50 条
  • [31] Information dissemination modeling based on rumor propagation in online social networks with fuzzy logic
    Hosseini, Soodeh
    Zandvakili, Aboozar
    SOCIAL NETWORK ANALYSIS AND MINING, 2022, 12 (01)
  • [32] Privacy information propagation in online social networks - a case study based on Weibo data
    Luo, Yehong
    Zhu, Nafei
    Wang, Ziwen
    Sun, Lei
    He, Jingsha
    Jurcut, Anca Delia
    Yi, Yuzi
    Ma, Xiangjun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [33] IPSA: A Multi-View Perception Model for Information Propagation in Online Social Networks
    Min, Huiyu
    Cao, Jiuxin
    Zhou, Tao
    Meng, Qing
    BIG DATA MINING AND ANALYTICS, 2025, 8 (01): : 241 - 256
  • [34] Inferring Information Propagation Over Online Social Networks: Edge Asymmetry and Flow Tendency
    Niu, Jianwei
    Wang, Danning
    Tong, Chao
    Qiu, Meikang
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 629 - 634
  • [35] An extended SEIR model considering homepage effect for the information propagation of online social networks
    Zhao, Danling
    Sun, Jianbin
    Tan, Yuejin
    Wu, Jianhong
    Dou, Yajie
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 512 : 1019 - 1031
  • [36] Relationship Classification in Large Scale Online Social Networks and Its Impact on Information Propagation
    Tang, Shaojie
    Yuan, Jing
    Mao, Xufei
    Li, Xiang-Yang
    Chen, Wei
    Dai, Guojun
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2291 - 2299
  • [37] A blockchain-based secured and trusted framework for information propagation on online social networks
    Arquam, Md
    Singh, Anurag
    Sharma, Rajesh
    SOCIAL NETWORK ANALYSIS AND MINING, 2021, 11 (01)
  • [38] Information Propagation Control Method in Social Networks Based on Exact Controllability Theory
    Huang Hongcheng
    Lai Licheng
    Hu Min
    Sun Xinran
    Tao Yang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1707 - 1714
  • [39] Opinion Propagation in Online Social Networks: A Survey
    Cercel, Dumitru-Clementin
    Trausan-Matu, Stefan
    4TH INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, MINING AND SEMANTICS, 2014,
  • [40] Online Social Networks: A Vehicle for Malware Propagation
    Ikhalia, Ehinome
    Arreymbi, Johnnes
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 95 - 101