Evaluating Event Credibility on Twitter Presented by Yanan Xie College of Computer Science, Zhejiang University 2012.

Slides:



Advertisements
Similar presentations
Improvements and extras Paul Thomas CSIRO. Overview of the lectures 1.Introduction to information retrieval (IR) 2.Ranked retrieval 3.Probabilistic retrieval.
Advertisements

Ranking Tweets Considering Trust and Relevance Srijith Ravikumar,Raju Balakrishnan, and Subbarao Kambhampati Arizona State University 1.
Influence and Passivity in Social Media Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman Social Computing Lab, HP Labs.
TI: An Efficient Indexing Mechanism for Real-Time Search on Tweets Chun Chen 1, Feng Li 2, Beng Chin Ooi 2, and Sai Wu 2 1 Zhejiang University, 2 National.
Role of Online Social Networks during disasters & political movements Saptarshi Ghosh Department of Computer Science and Technology Bengal Engineering.
Presented By: Omofonmwan Nelson. Agenda:  Twitter  Benefits of Twitter  Tweet  Tweeter Services  Geographical Distribution  Conclusion.
Asher Palmer EDSC 304 Slice 1
Comparing Twitter Summarization Algorithms for Multiple Post Summaries David Inouye and Jugal K. Kalita SocialCom May 10 Hyewon Lim.
Active Learning Lecture Slides For use with Classroom Response Systems Statistics: The Art and Science of Learning from Data.
Creativity Design and Cognition Gopal Kaushik – Rohit Sureka.
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Analysis of software reliability and performance.
Social Media Blog EDT180 Peter Choma Yik Yak is a social media blog application. Yik Yak is similar to Twitter, but users are anonymous. Users can post.
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Analysis of software reliability and performance.
SHOWTIME! STATISTICAL TOOLS IN EVALUATION DESCRIPTIVE VALUES MEASURES OF VARIABILITY.
Jawad Tahsin Khizer Zulfiqar Kazim Zaidi Zulfiqar Hadi Danish Mustafa Zaidi.
Social Media Chat Best practices for engaging congregational audiences through social media.
The Geography of Online News Engagement Martin Saveski, MIT Media Lab, Cambridge, USA Daniele Quercia, Yahoo Labs, Barcelona, Spain Amin Mantrach, Yahoo.
Digital Campaigning for Activists Sharing for change...
Emerging Topic Detection on Twitter (Cataldi et al., MDMKDD 2010) Padmini Srinivasan Computer Science Department Department of Management Sciences
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
On Sparsity and Drift for Effective Real- time Filtering in Microblogs Date : 2014/05/13 Source : CIKM’13 Advisor : Prof. Jia-Ling, Koh Speaker : Yi-Hsuan.
Definition of Internet shopping  -Access to shops and stores on the Internet, a user visiting an online shopping mall.  -Online shopping, cyber shopping,
6.5 Applications of the Normal Distribution Objectives: By the end of this section, I will be able to… 1) Compute probabilities for a given value of any.
Active Learning Lecture Slides For use with Classroom Response Systems Statistics: The Art and Science of Learning from Data.
Probabilistic Question Recommendation for Question Answering Communities Mingcheng Qu, Guang Qiu, Xiaofei He, Cheng Zhang, Hao Wu, Jiajun Bu, Chun Chen.
Popularity-Aware Topic Model for Social Graphs Junghoo “John” Cho UCLA.
Wei-Li Liu. + Goal: a. Do research on the history of social networking b. Compare the features of some of the past popular social networking sites c.
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development.
Exploring Online Social Activities for Adaptive Search Personalization CIKM’10 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
Inventor of Twitter By: Kelly Ryan “What if you could share your status with all your friends really easily, so they know what you're doing?” –Jack Dorsey.
THE USE OF SOCIAL NETWORK ANALYSIS IN PUBLIC RELATIONS PRESENTED BY BLAIR HOYTE.
Microblogs: Information and Social Network Huang Yuxin.
Final FRCA VIVA Course Evaluation 9 th and 10 th June 2009.
How Videos and Social Media Work Together. Social media and videos are two of the most powerful outlets that companies have online for gaining new business.
A Social Network-Based Trust Model for the Semantic Web Yu Zhang, Huajun Chen, and Zhaohui Wu Grid Computing Lab, College of Computer Science, Zhejiang.
Prepared by: Mahmoud Rafeek Al-Farra College of Science & Technology Dep. Of Computer Science & IT BCs of Information Technology Data Mining
BY NICOLE MAZZA RESIDENT ASSISTANT PROVIDENCE COLLEGE (PROVIDENCE, RI) Twitter Bulletin Board.
1 Clarifying Sensor Anomalies using Social Network feeds * University of Illinois at Urbana Champaign + U.S. Army Research Lab ++ IBM Research, USA Prasanna.
Social Media and the Internet By: Trevor Babich. Social Media Background Social media are Internet sites where people interact freely, sharing and discussing.
Trust, Influence, and Noise: Implications for Safety Surveilance Bill Rand Asst. Prof. of Marketing and Computer Science Director of the Center for Complexity.
On TWITTER on TWITTER.   Regular tweets with the added bonus of reaching both current and potential followers  Can Appear in:  User Timelines and.
 To understand the power of social network sites, especially Facebook, you can watch this video:  G5Sqc
Science Olympiad. What is Science Olympiad?  A national competition in which students compete in various “events” of their choosing.  Events cover all.
Using Twitter for client communication Original article by Terrence P. Howard Summary by Taran Stryker.
10 Good Practices for News Organizations Using Twitter Andrej Školkay Simona Lučkaničová Leonardo da Vinci Project : New Media Literacy for Media.
A Nonparametric Method for Early Detection of Trending Topics Zhang Advisor: Prof. Aravind Srinivasan.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Hamed Haddadi Fabricio Benevenuto Krishna P. Gummadi.
Alvin CHAN Kay CHEUNG Alex YING Relationship between Twitter Events and Real-life.
COLLEGE ADMISSION TEST SCORES Student IDReadingWritingMathTotal S S S S S
| Computer Science Department | Ubiquitous Knowledge Processing Lab | © Prof. Dr. Iryna Gurevych | 1 Knowledge Management in Web 2.0 Comparison.
Bubble shooter games, from starting till today seeking its way to development Before the past few years there was a very little concept of online games.
Buy SoundCloud Reposts
Recommendation in Scholarly Big Data
Name: Sushmita Laila Khan Affiliation: Georgia Southern University
CyberBullying.
Distributed voting application for handheld devices
Social Media Analytics – Sample Report
Rising Voices 4: Social Network Analysis
Twitter 330 million Montlhy Active Users
Vocabulary Review Topic.
Proposed Formative Evaluation Adaptive Topic Tracking Systems
Now It’s Your Turn. SANAP Joins Twitter Now It’s Your Turn.
Start working on today’s packet.
Social Media Update: People Who Won't Say "Tweet" Support Group
Events Name Month Year, City.
pencil, highlighter, GP notebook, textbook, graphing calculator
Austin Karingada, Jacob Handy, Adviser : Dr
Presentation transcript:

Evaluating Event Credibility on Twitter Presented by Yanan Xie College of Computer Science, Zhejiang University 2012

Motivation 1.Since its launch in 2006, Twitter has gained huge popularity. 4% of the massive number of tweets constitute news. 2.Recent surveys show that just ~8% people trust Twitter, while just ~12% trust their friends’ Twitter streams. 3.A lot of rumors have been spread using Twitter in the recent past and have resulted into a lot of damage

Problem Definition

Classification-Based Approach

Lacks: (1)With high probability, credible users provide credible tweets; (2)Average credibility of tweets is higher for credible events than that for non- credible events; and (3)Events sharing many common words and topics should have similar credibility scores.

Basic Credibility Analysis

Performing Event Graph Optimization (1)similar events get similar credibility scores, and (2)change in event credibility vector is controlled.

Experiments

Thank you!