{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T09:13:30Z","timestamp":1769505210689,"version":"3.49.0"},"reference-count":74,"publisher":"Emerald","issue":"5\/6","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJWIS"],"published-print":{"date-parts":[[2022,12,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Owing to the increased accessibility of internet and related technologies, more and more individuals across the globe now turn to social media for their daily dose of news rather than traditional news outlets. With the global nature of social media and hardly any checks in place on posting of content, exponential increase in spread of fake news is easy. Businesses propagate fake news to improve their economic standing and influencing consumers and demand, and individuals spread fake news for personal gains like popularity and life goals. The content of fake news is diverse in terms of topics, styles and media platforms, and fake news attempts to distort truth with diverse linguistic styles while simultaneously mocking true news. All these factors together make fake news detection an arduous task. This work tried to check the spread of disinformation on Twitter.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This study carries out fake news detection using user characteristics and tweet textual content as features. For categorizing user characteristics, this study uses the XGBoost algorithm. To classify the tweet text, this study uses various natural language processing techniques to pre-process the tweets and then apply a hybrid convolutional neural network\u2013recurrent neural network (CNN-RNN) and state-of-the-art Bidirectional Encoder Representations from Transformers (BERT) transformer.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This study uses a combination of machine learning and deep learning approaches for fake news detection, namely, XGBoost, hybrid CNN-RNN and BERT. The models have also been evaluated and compared with various baseline models to show that this approach effectively tackles this problem.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This study proposes a novel framework that exploits news content and social contexts to learn useful representations for predicting fake news. This model is based on a transformer architecture, which facilitates representation learning from fake news data and helps detect fake news easily. This study also carries out an investigative study on the relative importance of content and social context features for the task of detecting false news and whether absence of one of these categories of features hampers the effectiveness of the resultant system. This investigation can go a long way in aiding further research on the subject and for fake news detection in the presence of extremely noisy or unusable data.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijwis-02-2022-0044","type":"journal-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T07:48:13Z","timestamp":1663228093000},"page":"388-412","source":"Crossref","is-referenced-by-count":14,"title":["Fake news detection on Twitter"],"prefix":"10.1108","volume":"18","author":[{"given":"Srishti","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Mala","family":"Saraswat","sequence":"additional","affiliation":[]},{"given":"Anil Kumar","family":"Dubey","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"key2022120904442784400_ref001","first-page":"461","article-title":"Detecting hoaxes, frauds, and deception in writing style online","year":"2012"},{"key":"key2022120904442784400_ref002","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-69155-8_9","article-title":"Detection of online fake news using N-gram analysis and machine learning techniques","year":"2017"},{"key":"key2022120904442784400_ref003","doi-asserted-by":"publisher","article-title":"Fake news identification on twitter with hybrid CNN and RNN models","year":"2018","DOI":"10.1145\/3217804.3217917"},{"key":"key2022120904442784400_ref004","article-title":"Detecting fake news in social media networks","year":"2018"},{"issue":"2","key":"key2022120904442784400_ref005","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1257\/jep.31.2.211","article-title":"Social media and fake news in the 2016 election","volume":"31","year":"2017","journal-title":"Journal of Economic Perspectives"},{"key":"key2022120904442784400_ref006","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1155\/2021\/5557784","article-title":"Fake detect: a deep learning ensemble model for fake news detection","volume":"2021","year":"2021","journal-title":"Complexity"},{"key":"key2022120904442784400_ref007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90087-8_5","article-title":"Fandet semantic model: an OWL ontology for context-based fake news detection on social media","volume-title":"Combating Fake News with Computational Intelligence Techniques. Studies in Computational Intelligence","year":"2022"},{"issue":"1","key":"key2022120904442784400_ref008","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TVCG.2015.2467196","article-title":"TargetVue: visual analysis of anomalous user behaviors in online communication systems","volume":"22","year":"2016","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"key2022120904442784400_ref009","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3326467.3326490","article-title":"Computing the linguistic-based cues of fake news in the Philippines towards its detection","year":"2019"},{"key":"key2022120904442784400_ref011","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1145\/1963405.1963500","article-title":"Information credibility on twitter","year":"2011"},{"key":"key2022120904442784400_ref010","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1145\/3106426.3106489","article-title":"Fake twitter followers detection by denoising autoencoder","year":"2017"},{"issue":"2","key":"key2022120904442784400_ref012","doi-asserted-by":"publisher","first-page":"100051","DOI":"10.1016\/j.jjimei.2021.100051","article-title":"Optimization and improvement of fake news detection using deep learning approaches for societal benefit","volume":"1","year":"2021","journal-title":"International Journal of Information Management Data Insights"},{"key":"key2022120904442784400_ref013","doi-asserted-by":"publisher","article-title":"Misleading online content: recognizing clickbait as \u2018false news\u2019","year":"2015","DOI":"10.1145\/2823465.2823467"},{"key":"key2022120904442784400_ref014","article-title":"News in an online world: the need for an \u2018automatic crap detector\u2019","year":"2015"},{"key":"key2022120904442784400_ref015","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/2492517.2492637","article-title":"Battling the internet water army: detection of hidden paid posters","year":"2013"},{"key":"key2022120904442784400_ref016","article-title":"Seeing through misinformation: a framework for identifying fake online news","year":"2018"},{"issue":"6","key":"key2022120904442784400_ref017","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TDSC.2012.75","article-title":"Detecting automation of twitter accounts: are you a human, bot, or cyborg?","volume":"9","year":"2012","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"key2022120904442784400_ref018","first-page":"1","article-title":"Automatic deception detection: methods for finding fake news","year":"2015"},{"key":"key2022120904442784400_ref019","first-page":"272","article-title":"Automatic online FND combining content and social signals","year":"2018"},{"key":"key2022120904442784400_ref020","first-page":"620","article-title":"Using sentiment to detect bots on twitter: are humans more opinionated than bots?","year":"2014"},{"key":"key2022120904442784400_ref021","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-68155-9_10","article-title":"Provenance-based rumor detection","year":"2017"},{"key":"key2022120904442784400_ref022","first-page":"1097","article-title":"Fake news mitigation via point process based intervention","year":"2017"},{"key":"key2022120904442784400_ref023","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.procs.2017.11.106","article-title":"The current state of fake news: challenges and opportunities","volume":"121","year":"2017","journal-title":"Procedia Computer Science"},{"issue":"13","key":"key2022120904442784400_ref024","doi-asserted-by":"publisher","first-page":"9625","DOI":"10.1007\/s00500-019-04473-7","article-title":"Machine intelligence-based algorithms for spam filtering on document labeling","volume":"24","year":"2020","journal-title":"Soft Computing"},{"key":"key2022120904442784400_ref025","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/SCORED.2017.8305411","article-title":"Evaluating machine learning algorithms for FND","year":"2017"},{"key":"key2022120904442784400_ref026","article-title":"Detecting fake news for the new coronavirus by reasoning on the COVID-19 ontology","year":"2022"},{"key":"key2022120904442784400_ref027","doi-asserted-by":"publisher","article-title":"In search of credible news. 9883. 172-180","year":"2016","DOI":"10.1007\/978-3-319-44748-3_17"},{"key":"key2022120904442784400_ref028a","first-page":"235","article-title":"Assessing the news landscape: a multi-module toolkit for evaluating the credibility of news","year":"2018"},{"key":"key2022120904442784400_ref028","first-page":"2972","article-title":"News verification by exploiting conflicting social viewpoints in microblogs","year":"2016"},{"key":"key2022120904442784400_ref029","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1145\/3159652.3159734","article-title":"Leveraging the crowd to detect and reduce the spread of fake news and misinformation","year":"2018"},{"key":"key2022120904442784400_ref030","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2021.1957551","article-title":"An intelligent approach for mining knowledge graphs of online news","year":"2021","journal-title":"International Journal of Computers and Applications"},{"issue":"1","key":"key2022120904442784400_ref031","doi-asserted-by":"publisher","first-page":"e0168344","DOI":"10.1371\/journal.pone.0168344","article-title":"Rumor detection over varying time windows","volume":"12","year":"2017","journal-title":"Plos One"},{"key":"key2022120904442784400_ref032","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/ICDM.2013.61","article-title":"Prominent features of rumor propagation in online social media","year":"2013"},{"key":"key2022120904442784400_ref033","article-title":"Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks","year":"2018"},{"key":"key2022120904442784400_ref034","doi-asserted-by":"publisher","article-title":"Detect rumors in microblog posts using propagation structure via kernel learning","year":"2017","DOI":"10.18653\/v1\/P17-1066"},{"key":"key2022120904442784400_ref035","doi-asserted-by":"publisher","article-title":"Rumor detection on twitter with tree-structured recursive neural networks","year":"2018","DOI":"10.18653\/v1\/P18-1184"},{"key":"key2022120904442784400_ref036","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1145\/2806416.2806607","article-title":"Detect rumors using time series of social context information on microblogging websites","year":"2015"},{"key":"key2022120904442784400_ref037","first-page":"3818","article-title":"Detecting rumors from microblogs with recurrent neural networks","year":"2016","journal-title":"IJCAI"},{"key":"key2022120904442784400_ref038","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1155\/2022\/1575365","article-title":"Analyzing machine learning enabled fake news detection techniques for diversified datasets","volume":"2022","year":"2022","journal-title":"Wireless Communications and Mobile Computing"},{"key":"key2022120904442784400_ref039","unstructured":"Nakamura, K., Levy, S. and Wang, W.Y. (2019), \u201cr\/fakeddit: a new multimodal benchmark dataset for fine-grained fake news detection\u201d, arXiv Preprint, available at: http:\/\/arxiv.org\/abs\/1911.03854"},{"issue":"1","key":"key2022120904442784400_ref040","doi-asserted-by":"crossref","first-page":"100007","DOI":"10.1016\/j.jjimei.2020.100007","article-title":"Fake news detection: a hybrid CNN-RNN based deep learning approach","volume":"1","year":"2021","journal-title":"International Journal of Information Management Data Insights"},{"key":"key2022120904442784400_ref041","article-title":"How to write a spelling corrector (norvig.com)","year":"2022"},{"key":"key2022120904442784400_ref042","article-title":"The language of fake news: opening the black-box of deep learning based detectors","year":"2018"},{"key":"key2022120904442784400_ref043","doi-asserted-by":"publisher","article-title":"Media-Rich FND: a survey","year":"2018","DOI":"10.1109\/mipr.2018.00093"},{"key":"key2022120904442784400_ref044","first-page":"626","article-title":"Profiling bots and fake news spreaders at PAN\u201919 and PAN\u201920: bots and gender profiling 2019, profiling fake news spreaders on twitter 2020","year":"2020"},{"key":"key2022120904442784400_ref045","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1145\/3041021.3053379","article-title":"Assessing the credibility of claims on the web","year":"2017"},{"key":"key2022120904442784400_ref046","article-title":"A stylometric inquiry into hyperpartisan and fake news","year":"2017"},{"key":"key2022120904442784400_ref047","doi-asserted-by":"publisher","first-page":"231","DOI":"10.18653\/v1\/P18-1022","article-title":"A stylometric inquiry into hyperpartisan and fake news","year":"2018"},{"issue":"1","key":"key2022120904442784400_ref048","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1609\/aaai.v34i01.5386","article-title":"Capturing the style of fake news","volume":"34","year":"2020","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"key2022120904442784400_ref049","first-page":"1589","article-title":"Rumor has it: identifying misinformation in microblogs","year":"2011"},{"key":"key2022120904442784400_ref050","doi-asserted-by":"publisher","first-page":"2931","DOI":"10.18653\/v1\/D17-1317","article-title":"Truth of varying shades: analyzing language in fake news and political fact-checking","year":"2017"},{"issue":"4","key":"key2022120904442784400_ref051","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s41060-021-00302-z","article-title":"Fake news detection based on news content and social contexts: a transformer-based approach","volume":"13","year":"2022","journal-title":"International Journal of Data Science and Analytics"},{"key":"key2022120904442784400_ref052","doi-asserted-by":"publisher","article-title":"An infrastructure for empowering internet users to handle fake news and other online media phenomena","year":"2018","DOI":"10.1007\/978-3-319-73706-5_19"},{"key":"key2022120904442784400_ref053","first-page":"1","article-title":"Deception detection for news: three types of fakes","year":"2015"},{"key":"key2022120904442784400_ref054","doi-asserted-by":"publisher","article-title":"Fake news or truth? Using satirical cues to detect potentially misleading news","year":"2016","DOI":"10.18653\/v1\/W16-0802"},{"key":"key2022120904442784400_ref055","article-title":"CSI: a hybrid deep model for fake news","year":"2017"},{"key":"key2022120904442784400_ref056","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2689746.2689747","article-title":"Anomaly detection using autoencoders with nonlinear dimensionality reduction","year":"2014"},{"key":"key2022120904442784400_ref057","volume-title":"Beautiful Data: The Stories behind Elegant Data Solutions","year":"2009"},{"key":"key2022120904442784400_ref058","article-title":"The spread of fake news by social bots","year":"2017"},{"key":"key2022120904442784400_ref059","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/3289600.3290994","article-title":"Beyond news contents: the role of social context for fake news detection","year":"2019"},{"issue":"1","key":"key2022120904442784400_ref060","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09280-3","article-title":"FakeNewsTracker: a tool for fake news collection, detection, and visualization","volume":"25","year":"2018","journal-title":"Computational and Mathematical Organization Theory"},{"key":"key2022120904442784400_ref061","doi-asserted-by":"publisher","first-page":"113199","DOI":"10.1016\/j.eswa.2020.113199","article-title":"Towards automatically filtering fake news in Portuguese","volume":"146","year":"2020","journal-title":"Expert Systems with Applications"},{"key":"key2022120904442784400_ref062","doi-asserted-by":"publisher","article-title":"3HAN: a deep neural network for FND","year":"2017","DOI":"10.1007\/978-3-319-70096-0_59"},{"key":"key2022120904442784400_ref064","article-title":"Some like it hoax: automated FND in social networks","year":"2017"},{"key":"key2022120904442784400_ref063","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/SCIS-ISIS.2012.6505254","article-title":"Rumor detection on twitter","year":"2012"},{"issue":"3","key":"key2022120904442784400_ref065","article-title":"FND: a deep learning approach","volume":"1","year":"2018","journal-title":"SMU Data Science Review"},{"key":"key2022120904442784400_ref066","article-title":"Detecting fake news in social networks via crowdsourcing","year":"2017"},{"issue":"2","key":"key2022120904442784400_ref067","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3316809","article-title":"Polarization and fake news: early warning of potential misinformation targets","volume":"13","year":"2019","journal-title":"ACM Trans. Web"},{"key":"key2022120904442784400_ref068","article-title":"Automatic detection of rumor on Sina Weibo","year":"2012"},{"key":"key2022120904442784400_ref069","doi-asserted-by":"publisher","first-page":"5644","DOI":"10.1609\/aaai.v33i01.33015644","article-title":"Unsupervised FND on social media: a generative approach","year":"2019"},{"key":"key2022120904442784400_ref070","doi-asserted-by":"publisher","article-title":"Information processing and management","year":"2022","DOI":"10.1016\/j.ipm.2019.03.004"},{"key":"key2022120904442784400_ref071","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1145\/2736277.2741637","article-title":"Enquiring minds: early detection of rumors in social media from enquiry posts","year":"2015"},{"issue":"12","key":"key2022120904442784400_ref072","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1109\/TVCG.2014.2346922","article-title":"#FluxFlow: visual analysis of anomalous information spreading on social media","volume":"20","year":"2014","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"key2022120904442784400_ref073","article-title":"Fake news: a survey of research, detection methods, and opportunities","year":"2018"}],"container-title":["International Journal of Web Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-02-2022-0044\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-02-2022-0044\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:23:45Z","timestamp":1753395825000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijwis\/article\/18\/5-6\/388-412\/445034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":74,"journal-issue":{"issue":"5\/6","published-online":{"date-parts":[[2022,9,19]]},"published-print":{"date-parts":[[2022,12,12]]}},"alternative-id":["10.1108\/IJWIS-02-2022-0044"],"URL":"https:\/\/doi.org\/10.1108\/ijwis-02-2022-0044","relation":{},"ISSN":["1744-0084","1744-0084"],"issn-type":[{"value":"1744-0084","type":"print"},{"value":"1744-0084","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,19]]}}}