369 research outputs found

    Investigating Rumor Propagation with TwitterTrails

    Get PDF
    Social media have become part of modern news reporting, used by journalists to spread information and find sources, or as a news source by individuals. The quest for prominence and recognition on social media sites like Twitter can sometimes eclipse accuracy and lead to the spread of false information. As a way to study and react to this trend, we introduce {\sc TwitterTrails}, an interactive, web-based tool ({\tt twittertrails.com}) that allows users to investigate the origin and propagation characteristics of a rumor and its refutation, if any, on Twitter. Visualizations of burst activity, propagation timeline, retweet and co-retweeted networks help its users trace the spread of a story. Within minutes {\sc TwitterTrails} will collect relevant tweets and automatically answer several important questions regarding a rumor: its originator, burst characteristics, propagators and main actors according to the audience. In addition, it will compute and report the rumor's level of visibility and, as an example of the power of crowdsourcing, the audience's skepticism towards it which correlates with the rumor's credibility. We envision {\sc TwitterTrails} as valuable tool for individual use, but we especially for amateur and professional journalists investigating recent and breaking stories. Further, its expanding collection of investigated rumors can be used to answer questions regarding the amount and success of misinformation on Twitter.Comment: 10 pages, 8 figures, under revie

    CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP

    Full text link
    The Internet routing protocol BGP expresses topological reachability and policy-based decisions simultaneously in path vectors. A complete view on the Internet backbone routing is given by the collection of all valid routes, which is infeasible to obtain due to information hiding of BGP, the lack of omnipresent collection points, and data complexity. Commonly, graph-based data models are used to represent the Internet topology from a given set of BGP routing tables but fall short of explaining policy contexts. As a consequence, routing anomalies such as route leaks and interception attacks cannot be explained with graphs. In this paper, we use formal languages to represent the global routing system in a rigorous model. Our CAIR framework translates BGP announcements into a finite route language that allows for the incremental construction of minimal route automata. CAIR preserves route diversity, is highly efficient, and well-suited to monitor BGP path changes in real-time. We formally derive implementable search patterns for route leaks and interception attacks. In contrast to the state-of-the-art, we can detect these incidents. In practical experiments, we analyze public BGP data over the last seven years

    Antimatter in the Direct-Action Theory of Fields

    Get PDF
    One of Feynman's greatest contributions to physics was the interpretation of negative energies as antimatter in quantum field theory. A key component of this interpretation is the Feynman propagator, which seeks to describe the behavior of antimatter at the virtual particle level. Ironically, it turns out that one can dispense with the Feynman propagator in a direct-action theory of fields, while still retaining the interpretation of negative energy solutions as antiparticles.Comment: Forthcoming in a special issue of Quanta Magazine honoring Richard P. Feynman; ed. Eliahu Cohe

    Incorporating social role theory into topic models for social media content analysis

    Get PDF
    In this paper, we explore the idea of social role theory (SRT) and propose a novel regularized topic model which incorporates SRT into the generative process of social media content. We assume that a user can play multiple social roles, and each social role serves to fulfil different duties and is associated with a role-driven distribution over latent topics. In particular, we focus on social roles corresponding to the most common social activities on social networks. Our model is instantiated on microblogs, i.e., Twitter and community question-answering (cQA), i.e., Yahoo! Answers, where social roles on Twitter include "originators" and "propagators", and roles on cQA are "askers" and "answerers". Both explicit and implicit interactions between users are taken into account and modeled as regularization factors. To evaluate the performance of our proposed method, we have conducted extensive experiments on two Twitter datasets and two cQA datasets. Furthermore, we also consider multi-role modeling for scientific papers where an author's research expertise area is considered as a social role. A novel application of detecting users' research interests through topical keyword labeling based on the results of our multi-role model has been presented. The evaluation results have shown the feasibility and effectiveness of our model

    Quantization in black hole backgrounds

    Get PDF
    Quantum field theory in a semiclassical background can be derived as an approximation to quantum gravity from a weak-coupling expansion in the inverse Planck mass. Such an expansion is studied for evolution on "nice-slices" in the spacetime describing a black hole of mass M. Arguments for a breakdown of this expansion are presented, due to significant gravitational coupling between fluctuations, which is consistent with the statement that existing calculations of information loss in black holes are not reliable. For a given fluctuation, the coupling to subsequent fluctuations becomes of order unity by a time of order M^3. Lack of a systematic derivation of the weakly-coupled/semiclassical approximation would indicate a role for the non-perturbative dynamics of gravity, and possibly for the proposal that such dynamics has an essentially non-local quality.Comment: 28 pages, 4 figures, harvmac. v2: added refs, minor clarification

    A Great Aryan Movement.

    Get PDF

    DEMO: Using TwitterTrails.com to Investigate Rumor Propagation

    Get PDF
    Social media have become part of modern news reporting, used by journalists to spread information and find sources, or as a news source by individuals. The quest for prominence and recognition on social media sites like Twitter can sometimes eclipse accuracy and lead to the spread of false information. As a way to study and react to this trend, we demo TWITTERTRAILS, an interactive, webbased tool (twittertrails.com) that allows users to investigate the origin and propagation characteristics of a rumor and its refutation, if any, on Twitter. Visualizations of burst activity, propagation timeline, retweet and co-retweeted networks help its users trace the spread of a story. Within minutes TWITTERTRAILS will collect relevant tweets and automatically answer several important questions regarding a rumor: its originator, burst characteristics, propagators and main actors according to the audience. In addition, it will compute and report the rumor’s level of visibility and, as an example of the power of crowdsourcing, the audience’s skepticism towards it which correlates with the rumor’s credibility. We envision TWITTERTRAILS as valuable tool for individual use, and especially for amateur and professional journalists investigating recent and breaking stories

    Community Self Help

    Get PDF
    This paper advocates controlling crime through a greater emphasis on precautions taken not by individuals, but by communities. The dominant battles in the literature today posit two central competing models of crime control. In one, the standard policing model, the government is responsible for the variety of acts that are necessary to deter and prosecute criminal acts. In the other, private self-help, public law enforcement is largely supplanted by providing incentives to individuals to self-protect against crime. There are any number of nuances and complications in each of these competing stories, but the literature buys into this binary matrix
    • …
    corecore