{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T15:14:08Z","timestamp":1769613248533,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21144-6","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T12:03:46Z","timestamp":1769515426000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Avoiding, detecting &amp; fighting false content via educational awareness, in sustainability"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6166-1281","authenticated-orcid":false,"given":"Zair","family":"Bouzidi","sequence":"first","affiliation":[]},{"given":"Abdelmalek","family":"Boudries","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"issue":"4","key":"21144_CR1","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1504\/IJAMC.2019.111193","volume":"7","author":"Z Bouzidi","year":"2019","unstructured":"Bouzidi Z, Amad M, Boudries A (2019) Intelligent and real-time alert model for disaster management based on information retrieval from multiple sources. J Adv Media Commun 7(4):309\u2013330. https:\/\/doi.org\/10.1504\/IJAMC.2019.111193","journal-title":"J Adv Media Commun"},{"key":"21144_CR2","doi-asserted-by":"crossref","unstructured":"Bouzidi Z, Boudries A (2025) Managing emergency crises using secure information through educational awareness: COVID-19 case study. Comput Biol Med 186(109620). ISSN 0010\u20134825","DOI":"10.1016\/j.compbiomed.2024.109620"},{"key":"21144_CR3","doi-asserted-by":"publisher","first-page":"27069","DOI":"10.1109\/ACCESS.2022.3157724","volume":"10","author":"W Shahid","year":"2022","unstructured":"Shahid W, Li Y, Staples D, Amin G, Hakak S, Ghorbani A (2022) Are you a cyborg, bot or human?-A survey on detecting fake news spreaders. IEEE Access 10:27069\u201327083. https:\/\/doi.org\/10.1109\/ACCESS.2022.3157724","journal-title":"IEEE Access"},{"key":"21144_CR4","doi-asserted-by":"publisher","unstructured":"Marques JAL, Gois FNB, Madeiro JPV, Li T, Fong SJ (2022) Chapter 4 - Artificial neural network-based approaches for computer-aided disease diagnosis and treatment. In: Bhoi AK, de Albuquerque VHC, Srinivasu PN, Marques G (eds) In intelligent data-centric systems, cognitive and soft computing techniques for the analysis of healthcare data, Academic Press, pp 79-99. ISBN 9780323857512. https:\/\/doi.org\/10.1016\/B978-0-323-85751-2.00008-6","DOI":"10.1016\/B978-0-323-85751-2.00008-6"},{"key":"21144_CR5","doi-asserted-by":"publisher","first-page":"0167","DOI":"10.1016\/j.physd.2019.132306","volume":"132306","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D Nonlinear Phenomena 404. ISSN 132306:0167\u20132789. https:\/\/doi.org\/10.1016\/j.physd.2019.132306","journal-title":"ISSN"},{"key":"21144_CR6","doi-asserted-by":"crossref","unstructured":"Bouzidi Z, Amad M, Boudries (2022) A deep learning-based automated learning environment using smart data to improve corporate marketing, business strategies. Fraud Detection in Financial Service and Financial Time Series Forecasting, Springer Nature Springer book_524532_1_En_ Sedkaoui","DOI":"10.1007\/978-3-031-06971-0_26"},{"issue":"3","key":"21144_CR7","doi-asserted-by":"publisher","first-page":"145","DOI":"10.7903\/cmr.20677","volume":"16","author":"CC Wang","year":"2020","unstructured":"Wang CC (2020) Fake news and related concepts: Definitions and recent research development. Contemp Manage Res 16(3):145\u2013174","journal-title":"Contemp Manage Res"},{"key":"21144_CR8","doi-asserted-by":"publisher","unstructured":"Lin CK, Nifa FAA, Musa S, Shahron Sy A, Anuar NA (2018) Challenges and opportunities of disaster education program among UUM student. Proceedings of the $$3^{rd}$$ international conference on applied science and technology (ICAST 18), Georgetown, Penang, Malaysia. https:\/\/doi.org\/10.1063\/1.5055440","DOI":"10.1063\/1.5055440"},{"issue":"2","key":"21144_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s11280-016-0386-0","volume":"20","author":"R He","year":"2016","unstructured":"He R, Liu Y, Yu G, Tang J, Hu Q, Dang J (2016) Twitter summarization with social-temporal context. World Wide Web 20(2):267\u2013290. https:\/\/doi.org\/10.1007\/s11280-016-0386-0","journal-title":"World Wide Web"},{"issue":"1","key":"21144_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.4018\/IJDREM.2020010102","volume":"3","author":"R Lamsal","year":"2020","unstructured":"Lamsal R, Kumar TVV (2020) Classifying emergency tweets for disaster response. Intl J Disaster Response Emergency Manag 3(1):14\u201329. https:\/\/doi.org\/10.4018\/IJDREM.2020010102","journal-title":"Intl J Disaster Response Emergency Manag"},{"issue":"2","key":"21144_CR11","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TCSS.2018.2802942","volume":"5","author":"K Rudra","year":"2018","unstructured":"Rudra K, Sharma A, Ganguly N, Ghosh S (2018) Characterizing and countering communal micro-blogs during disaster events. IEEE Trans Comput Social Syst 5(2):403\u2013417","journal-title":"IEEE Trans Comput Social Syst"},{"issue":"6380","key":"21144_CR12","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"DMJ Lazer","year":"2018","unstructured":"Lazer DMJ, Baum MA, Benkler Y, Berinsky AJ, Greenhill KM, Menczer F et al (2018) The science of fake news. Sci 359(6380):1094\u20131096","journal-title":"Sci"},{"issue":"6","key":"21144_CR13","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1177\/0163443719899801","volume":"42","author":"B Creech","year":"2020","unstructured":"Creech B (2020) Fake news and the discursive construction of technology companies\u2019 social power. Media Culture Soc 42(6):952\u2013968. https:\/\/doi.org\/10.1177\/0163443719899801","journal-title":"Media Culture Soc"},{"issue":"8","key":"21144_CR14","first-page":"5","volume":"53","author":"JM Burkhardt","year":"2017","unstructured":"Burkhardt JM (2017) (2017) History of fake news. Library Technol Rep 53(8):5\u20139","journal-title":"Library Technol Rep"},{"issue":"2","key":"21144_CR15","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1111\/hir.12320","volume":"38","author":"SB Naeem","year":"2021","unstructured":"Naeem SB, Bhatti R, Khan A (2021) An exploration of how fake news is taking over social media and putting public health at risk. Health Inf Libraries J 38(2):143\u2013149","journal-title":"Health Inf Libraries J"},{"key":"21144_CR16","doi-asserted-by":"crossref","unstructured":"Zhang X, Ghorbani AA (2020) An overview of online fake news: Characterization detection and discussion. Inf Process Manag 57(2)","DOI":"10.1016\/j.ipm.2019.03.004"},{"key":"21144_CR17","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.procs.2017.11.106","volume":"121","author":"A Figueira","year":"2017","unstructured":"Figueira A, Oliveira L (2017) The current state of fake news: Challenges and opportunities. Proc Comput Sci 121:817\u2013825","journal-title":"Proc Comput Sci"},{"key":"21144_CR18","doi-asserted-by":"crossref","unstructured":"Spradling M, Allison M, Tsogbadrakh T, Strong J (2019) Toward limiting social BotNet effectiveness while detection is performed: A probabilistic approach. Proc Int Conf Comput Sci Comput Intell (CSCI), pp 1388-1391","DOI":"10.1109\/CSCI49370.2019.00259"},{"key":"21144_CR19","doi-asserted-by":"crossref","unstructured":"Cresci S, Petrocchi M, Spognardi A, Tognazzi S (2019) Better safe than sorry: An adversarial approach to improve social bot detection. Proc $$10^{th}$$ ACM Conf Web Sci, pp 47-56","DOI":"10.1145\/3292522.3326030"},{"key":"21144_CR20","doi-asserted-by":"crossref","unstructured":"Castillo S, Allende-Cid H, Palma W, Alfaro R, Ramos HS, Gonzalez C et al (2019) Detection of bots and cyborgs in twitter: A study on the Chilean presidential election in 2017. Proc Int Conf Hum-Comput Interact, pp 311-323","DOI":"10.1007\/978-3-030-21902-4_22"},{"key":"21144_CR21","doi-asserted-by":"crossref","unstructured":"Khaund T, Kirdemir B, Agarwal N, Liu H, Morstatter F (2021) Social bots and their coordination during online campaigns: A survey. IEEE Trans Computat Social Syst","DOI":"10.1109\/TCSS.2021.3103515"},{"issue":"4","key":"21144_CR22","doi-asserted-by":"publisher","first-page":"5079","DOI":"10.1109\/TCSS.2023.3298480","volume":"11","author":"Z Guo","year":"2024","unstructured":"Guo Z, Zhang Q, Ding F, Zhu X, Yu K (2024) A novel fake news detection model for context of mixed languages through multiscale transformer. IEEE Trans Comput Social Syst 11(4):5079\u20135089. https:\/\/doi.org\/10.1109\/TCSS.2023.3298480","journal-title":"IEEE Trans Comput Social Syst"},{"key":"21144_CR23","doi-asserted-by":"crossref","unstructured":"Moe ZH, Khin MM, San T, Tin HM (2018) Comparison of Na\u00efve bayes and support vector machine classifiers on document classification. 2018 IEEE 7th global conference on consumer electronics (GCCE), Nara, Japan","DOI":"10.1109\/GCCE.2018.8574785"},{"key":"21144_CR24","doi-asserted-by":"publisher","unstructured":"Pranckevicius T, Marcinkevi\u010dius V (2017) Comparison of na\u00efve bayes, random forest, decision tree, support vector machines, and logistic regression classifiers for text reviews classification. Baltic J Modern Comput 5(2):221-232. https:\/\/doi.org\/10.22364\/bjmc.2017.5.2.05","DOI":"10.22364\/bjmc.2017.5.2.05"},{"issue":"9","key":"21144_CR25","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.3897\/jucs.2020.059","volume":"26","author":"RK Behera","year":"2020","unstructured":"Behera RK, Das S, Rath SK, Misra S, Damasevicius R (2020) Comparative study of real time machine learning models for stock prediction through streaming data. JUCS - J Univ Comput Sci 26(9):1128\u20131147. https:\/\/doi.org\/10.3897\/jucs.2020.059","journal-title":"JUCS - J Univ Comput Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21144-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21144-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21144-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T12:03:48Z","timestamp":1769515428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21144-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["21144"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21144-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"8 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have consented and approved the ethics of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors consented and approved to participate in submitting the paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"The authors consented and approved to publish this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"All metrics are the property of the LMA laboratories of the University of B\u00e9jaia, Algeria.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"41"}}