Proceedings of the 24th ACM International on Conference on Information and Knowledge Management 2015
DOI: 10.1145/2806416.2806642
|View full text |Cite
|
Sign up to set email alerts
|

Towards Multi-level Provenance Reconstruction of Information Diffusion on Social Media

Abstract: In order to assess the trustworthiness of information on social media, a consumer needs to understand where this information comes from, and which processes were involved in its creation. The entities, agents and activities involved in the creation of a piece of information are referred to as its provenance, which was standardized by W3C PROV. However, current social media APIs cannot always capture the full lineage of every message, leaving the consumer with incomplete or missing provenance, which is crucial … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(20 citation statements)
references
References 14 publications
0
20
0
Order By: Relevance
“…The security or access restrictions or storage constraints of data base access and the concept of associating cost with trust has been described in [3]. The use of information cascades for tracing the path associated with a piece of news has been described in [6]. A news article has been described as having been influenced or transformed with edit activities which define the path of provenance to the final version of news as described in [7].…”
Section: Provenance Graph Computational Trust and Hierarchy Of Rolesmentioning
confidence: 99%
See 2 more Smart Citations
“…The security or access restrictions or storage constraints of data base access and the concept of associating cost with trust has been described in [3]. The use of information cascades for tracing the path associated with a piece of news has been described in [6]. A news article has been described as having been influenced or transformed with edit activities which define the path of provenance to the final version of news as described in [7].…”
Section: Provenance Graph Computational Trust and Hierarchy Of Rolesmentioning
confidence: 99%
“…The use of information cascades has been used for tracing the path a piece of news has traversed in the social media graph initiating from the source and traversing the information influencers [6] in the relevant provenance path. Multiple sources can produce stories about the same event which may be grouped for summarization and mining [71] purposes as has been described in [72].…”
Section: Related Work In Story Topic Eventmentioning
confidence: 99%
See 1 more Smart Citation
“…This involves two different non-trivial tasks that are affected by rate limits – first obtaining all retweets for a popular tweet up to a certain point in time and next getting social graph information (follower-friend connections) among retweeters to chart out potential paths using which the information has spread across the Twitterverse. Although other researchers have continued to analyze diffusion through retweet graphs in fields such as politics, crisis response, and sports [12]–[15], similar results are not available for health topics.…”
Section: Introductionmentioning
confidence: 99%
“…In many situations, however, we have to deal with legacy applications, for which we do not have the opportunity to modify the source code to introduce provenance-generating code, or we do not have the opportunity to recompile programs. Thus, in those cases, using application knowledge, provenance can alternatively be reconstructed retrospectively [23], [24]. Regardless of the approach, whether by instrumentation, logging, aspects, static methods, or reconstruction, at some point, a provenance record needs to be constructed.…”
mentioning
confidence: 99%