Fighting Fake News Using Machine Learning & Blockchains

The proliferation of misinformation and fake news in the digital age has become a critical societal concern. The rapid spread of false or misleading information can have far-reaching consequences, including social unrest, political polarisation, and public health crises.  

This misleading content like fake news and false media is spreading across social media platforms and has become a threat to society. It certainly has negative effects people and it is being misused in political propaganda, cyber crimes and other areas.

And for a decade or more electronic and social media false and fake news has become a global problem, but now with the rise of widely available AI technology this is a greater danger than ever.

Fake truths can lead to actual harmful consequences and so social media, and government organisations are using new strategies for dealing with the phenomenon.

This includes more fact-checking and flagging misleading information giving more important context to what the audiences needs, but this is still missing a lot of fake information publishing.

Now research from Binghamton University’s School of Management (SOM,) proposes a machine learning framework with expanded use of blockchain technology to combat this massive problem.

This research is led by Thi Tran the assistant professor of management information systems, who led the research and who has explained the thought behind it:
“We’re most likely to care about fake news if it causes harm that impacts readers or audiences. If people perceive there’s no harm, they’re more likely to share the misinformation… If we have a systematic way of identifying where misinformation will do the most harm, that will help us know where to focus on mitigation.”

According to Techxplore, Tran’s research proposed machine learning systems that will help determine how much harm content will cause to its audience and focus on the worst offenders.

The framework would use data and algorithms to spot indicators of misinformation and use those examples to inform and improve the detection process.

It would also consider user characteristics from people with prior experience or knowledge about fake news to help piece together a harm index. The index would reflect the severity of possible harm to a person in certain contexts if they were exposed and victimised by the misinformation.

The system would also consider user characteristics of people with prior experience or knowledge about fake news to help build a “harm index”, which would reflect the severity of possible harm to a person in certain contexts if they were exposed and victimised by the fake news.

Tran further explains that based on the information gathered, the machine learning system could help fake news mitigators differentiate which messages are likely to be most damaging if allowed to spread unchallenged.

“The research model I’ve built out allows us to test different theories and then prove which is the best way for us to convince people to use something from blockchain to combat misinformation,” Tran said.

He has also suggested that there should be a survey of around a 1,000 people, both fake news mitigators and content consumers, lay out three existing blockchain systems and see the participants’ willingness to use those systems in different scenarios.

“We are more likely to be interested in fake news if it causes harm to readers or the public. If people perceive that there is no harm, they are more likely to share misinformation,” said Thi Tran.

“Harms come from whether audiences act on the disinformation claims or refuse appropriate action because of it. If we have a systematic way of identifying where misinformation will do the most harm, that will help us know where to focus on mitigation.”

“I hope this research helps us educate more people about being aware of the patterns, so they know when to verify something before sharing it and are more alert to mismatches between the headline and the content itself, which would keep the misinformation from spreading unintentionally,” Tran concluded.

Tran recently presented his research at a conference hosted by SPIE, the international non-profit dedicated to advancing light-based research and technologies.

One paper focused on the machine learning-based framework and another paper dealt with the use of blockchain.

iHLS:     Science Daily:     IEEE Xplore:     Unbiased:     Tech Explorist:     Compsmag:     News8Plus

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible

« EU Proposed AI Legislation Is A Threat To Open Source Software
Online Safety Act Places US Adults At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.