skip to main content
research-article

Blog credibility ranking by exploiting verified content

Published: 20 April 2009 Publication History

Abstract

People use weblogs to express thoughts, present ideas and share knowledge. However, weblogs can also be misused to influence and manipulate the readers. Therefore the credibility of a blog has to be validated before the available information is used for analysis. The credibility of a blogentry is derived from the content, the credibility of the author or blog itself, respectively, and the external references or trackbacks. In this work we introduce an additional dimension to assess the credibility, namely the quantity structure. For our blog analysis system we derive the credibility therefore from two dimensions. Firstly, the quantity structure of a set of blogs and a reference corpus is compared and secondly, we analyse each separate blog content and examine the similarity with a verified news corpus. From the content similarity values we derive a ranking function. Our evaluation showed that one can sort out incredible blogs by quantity structure without deeper analysis. Besides, the content based ranking function sorts the blogs by credibility with high accuracy. Our blog analysis system is therefore capable of providing credibility levels per blog.

References

[1]
N. Agarwal and H. Liu. Blogosphere: Research issues, tools, and applications. SIGKDD Explorations, 2008.
[2]
A. Kale, A. Karandikar, P. Kolari, A. Java, T. Finin, and A. Joshi. Modeling trust and influence in the blogoshpere using link polarity. In Proc of Int. Conf. on Weblogs and Social Media, 2007.
[3]
A. W. chee Fu, E. Keogh, L. Y. H. Lau, and C. A. Ratanamahatana. Scaling and time warping in time series querying. VLDB, 2005.
[4]
B. Fogg, J. Marshall, and T. K. et al. Web credibility research: a method for online experiments and early study results. In CHI '01: CHI '01 extended abstracts on Human factors in computing systems, pages 295--296. ACM, 2001.
[5]
N. Glance, M. Hurst, K. Nigam, M. Siegler, R. Stockton, and T. Tomokiyo. Deriving marketing intelligence from online discussion. In Proc. of the Knowldege Discovery and Data Mining Conf., 2005.
[6]
D. Gruhl, D. Liben-Nowell, R. Guha, and A. Tomkins. Propagation of trust and distrust. In Proc. of the 13th international conference on World Wide Web, 2004.
[7]
E.-H. Han and G. Karypis. Centroid-based document classification: Analysis and experimental results. In PKDD '00: Proceedings of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, 2000.
[8]
M. Iding, B. Auernheimer, and M. E. Crosby. A metacognitive approach to credibility determination. In Proc. of the 2nd Workshop on Information Credibility on the Web, 2008.
[9]
A. Juffinger, R. Kern, and M. Granitzer. Crosslanguage retrieval based on wikipedia statistics. In Proc. of CLEF 2008 Workshop, Aarhus, 2008.
[10]
A. Juffinger, T. H. Neidhart, M. Granitzer, R. Kern, A. Weichselbraun, G. Wohlgenannt, and A. Scharl. Distributed web2.0 crawling for ontology evolution. -- in: International journal of internet technology and secured transactions. International Journal of Internet Technology and Secured Transactions, 2008.
[11]
J. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46, 1999.
[12]
E. B. Klemm, M. Iding, and T. Speitel. Do scientists and teachers agree on the credibility of media information sources? International Journal of Instructional Media, 28, 2001.
[13]
M. Kowalkiewicz, M. E. Orlowska, T. Kaczmarek, and W. Abramowicz. Robust web content extraction. In Proc. of the 15th int. conf. on World Wide Web, 2006.
[14]
A. N. Langville and C. D. Meyer. Google's PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press, 2006.
[15]
E. Lex, C. Seifert, W. Kienreich, and M. Granitzer. A generic framework for visualizing the news article domain and its application to real-world data. Journal of Digital Information Management, pages 434--442, 2008.
[16]
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project, 1998.
[17]
M. Pujol, R. Sangesa, and J. Delgado. Extracting reputation in multi agent systems by means of social network topology. In Proc. of the First international joint conference on Autonomous agents and multiagent systems, 2002.
[18]
L.-Q. Qiu and B. Pang. Analysis of automated evaluation for multi-document summarization using content-based similarity. In ICDS '08: Proceedings of the Second International Conference on Digital Society, pages 60--63, 2008.
[19]
H. Sakoe and S. Chiba. Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing, 1978.
[20]
G. Salton. Automatic text processing: the transformation, analysis, and retrieval of information by computer. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1989.
[21]
N. Wanas, M. El-Saban, H. Ashour, and W. Ammar. Automatic scoring of online discussion posts. In WICOW '08: Proceeding of the 2nd ACM workshop on Information credibility on the web, pages 19--26, New York, NY, USA, 2008. ACM.
[22]
E. Garfield, I. Sher, and R. Torpie. The Use of Citation Data in Writing the History of Science, Institute for Scientific Information Inc., Philadelphia, Pennsylvania, USA, 1984.

Cited By

View all
  • (2022)Tasarım Stüdyosu Eğitiminde Web 2.0 Araçlarının Araştırma Amaçlı Kullanımı: Kullanıcı Kaynaklı Videolar ÖrneğiEuropean Journal of Science and Technology10.31590/ejosat.1040033Online publication date: 1-Jan-2022
  • (2022)Fighting post-truth using natural language processingExpert Systems with Applications: An International Journal10.1016/j.eswa.2019.112943141:COnline publication date: 21-Apr-2022
  • (2021)Explainable AI for Multimodal Credibility Analysis: Case Study of Online Beauty Health (Mis)-InformationIEEE Access10.1109/ACCESS.2021.31115279(127985-128022)Online publication date: 2021
  • Show More Cited By

Index Terms

  1. Blog credibility ranking by exploiting verified content

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WICOW '09: Proceedings of the 3rd workshop on Information credibility on the web
    April 2009
    84 pages
    ISBN:9781605584881
    DOI:10.1145/1526993
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 April 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blog
    2. credibility
    3. web 2.0

    Qualifiers

    • Research-article

    Conference

    WWW '09
    Sponsor:

    Acceptance Rates

    WICOW '09 Paper Acceptance Rate 9 of 19 submissions, 47%;
    Overall Acceptance Rate 9 of 19 submissions, 47%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 19 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Tasarım Stüdyosu Eğitiminde Web 2.0 Araçlarının Araştırma Amaçlı Kullanımı: Kullanıcı Kaynaklı Videolar ÖrneğiEuropean Journal of Science and Technology10.31590/ejosat.1040033Online publication date: 1-Jan-2022
    • (2022)Fighting post-truth using natural language processingExpert Systems with Applications: An International Journal10.1016/j.eswa.2019.112943141:COnline publication date: 21-Apr-2022
    • (2021)Explainable AI for Multimodal Credibility Analysis: Case Study of Online Beauty Health (Mis)-InformationIEEE Access10.1109/ACCESS.2021.31115279(127985-128022)Online publication date: 2021
    • (2021)Assessing in real-time the credibility of Arabic blog posts using traditional and deep learning modelsSocial Network Analysis and Mining10.1007/s13278-021-00782-811:1Online publication date: 9-Aug-2021
    • (2019)How Do Humans Assess the Credibility on Web BlogsProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300904(1-12)Online publication date: 2-May-2019
    • (2019)A graph‐based method for social sensing of infrastructure disruptions in disastersComputer-Aided Civil and Infrastructure Engineering10.1111/mice.1245734:12(1055-1070)Online publication date: 21-Nov-2019
    • (2019)Credibility Analysis for Available Information Sources on the Web: A Review and a Contribution2019 4th International Conference on System Reliability and Safety (ICSRS)10.1109/ICSRS48664.2019.8987623(116-125)Online publication date: Nov-2019
    • (2018)Image-Based Hoax DetectionProceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good10.1145/3284869.3284903(159-164)Online publication date: 28-Nov-2018
    • (2018)Analysis of Hair Shine Using Rendering and Subjective EvaluationACM Transactions on Applied Perception10.1145/327447815:4(1-17)Online publication date: 1-Oct-2018
    • (2018)Comparison of Unobtrusive Visual Guidance Methods in an Immersive Dome EnvironmentACM Transactions on Applied Perception10.1145/323830315:4(1-11)Online publication date: 19-Sep-2018
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media