“…The most applied techniques are Machine Learning which is found in 19 papers [6], [8], [12], [19], [26], [27], [32], [34], [46], [47], [48], [49], [50], [56], [59], [60], [63], [64] and [68] with 26. 4% of the total, likewise Data Mining is found in 12 papers [6], [23], [27], [34], [47], [48], [49], [50], [54], [55], [61] and [68] Guo, Cho, Chen, Sengupta, Hong & Mitra [79], considered as data-driven deception detection techniques: data driven, social honeypots, user profile, message content, network structure, early detection, information propagation mitigation and blockchain -based authenticity.…”