<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>2nd International Workshop on Rumours and Deception in Social Media: Preface</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ahmet Aker</string-name>
          <email>a.aker@is.inf.uni-due.de</email>
          <email>a.aker@is.inf.uni-due.de Kalina Bontcheva University of She eld, UK k.bontcheva@she eld.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Arkaitz Zubiaga</string-name>
          <email>a.zubiaga@qmul.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maria Liakata, Rob Procter</string-name>
          <email>fm.liakata,rob.procterg@warwick.ac.uk</email>
          <email>rob.procterg@warwick.ac.uk</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Queen Mary University of London</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Duisburg-Essen</institution>
          ,
          <addr-line>Germany</addr-line>
          ,
          <institution>University of She eld</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Warwick and Alan Turing Institute</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This preface introduces the proceedings of the 2nd International Workshop on Rumours and Deception in Social Media (RDSM'18), colocated with CIKM 2018 in Turin, Italy.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Social media is an excellent resource for mining all
kinds of information, varying from opinions to actual
facts. However, not all information in social media
posts is reliable [ZAB+18] and thus their truth value
can often be questionable. One such category of
information types is rumours where the veracity level is
not known at the time of posting. Some rumours are
true, but many of them are false, and the deliberate
fabrication and propagation of false rumours can be a
powerful tool for the manipulation of public opinion.
It is therefore very important to be able to detect and
provide veri cation of false rumours before they spread
widely and in uence public opinion. In this workshop
the aim is to bring together researchers and
practitioners interested in social media mining and analysis to
deal with the emerging issues of rumour veracity
assessment and their use in the manipulation of public
opinion.</p>
      <p>The 2nd edition of the RDSM workshop took place
in Turin, Italy in October 2018, co-located with CIKM
2018. It was organised with the aim of focusing
particularly on online information disorder and its interplay
Copyright © CIKM 2018 for the individual papers by the papers'
authors. Copyright © CIKM 2018 for the volume as a collection
by its editors. This volume and its papers are published under
the Creative Commons License Attribution 4.0 International (CC
BY 4.0).
with public opinion formation. Information disorder
has been categorised into three types [WD17]: (1)
misinformation, an honest mistake in information sharing,
(2) disinformation, deliberate spreading of inaccurate
information, and (3) malinformation, accurate
information that is intended to harm others, such as leaks.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Accepted papers</title>
      <p>The workshop received 17 submissions from multiple
countries, of which 10 (58.9%) were ultimately
accepted for inclusion in these proceedings and
presentation at the workshop:</p>
      <p>Kefato et al. [KSB+18] propose a fully
networkagnostic approach called CaTS that models the
early spread of posts (i.e., cascades) as time series
and predicts their virality.</p>
      <p>Caled and Silva [CS18] describe ongoing work on
the creation of a multilingual rumour dataset on
football transfer news, FTR-18.</p>
      <p>Yao and Hauptmann [YH18a] analyse the power
of the crowd for checking the veracity of rumours,
which they formulate as a reviewer selection
problem. Their work aims to nd reliable reviewers for
a particular rumour.</p>
      <p>Yang and Yu [YY18] propose a reinforcement
learning framework that aims to incorporate
interpersonal deception theories to ght against
social engineering attacks.</p>
      <p>Conforti et al. [CPC18] propose a simple
architecture for stance detection based on conditional
encoding, carefully designed to model the internal
structure of a news article and its relations with
a claim.</p>
      <p>Roitero et al. [RDMS18] report on collecting
truthfulness values (i) by means of
crowdsourcing and (ii) using ne-grained scales. They collect
truthfulness values using a bounded and discrete
scale with 100 levels as well as a magnitude
estimation scale, which is unbounded, continuous and
has in nite amount of levels.</p>
      <p>Skorniakov et al. [STZ18] describe an approach to
the detection of social bots using a stacking based
ensemble, which exploits text and graph features.
Caetano et al. [CMC+18] investigate the public
perception of WhatsApp through the lens of
media. They analyse two large datasets of news and
show the kind of content that is being associated
with WhatsApp in di erent regions of the world
and over time.</p>
      <p>Pamungkas et al. [PBP18] describe an
approach to stance classi cation, which leverages
conversation-based and a ective-based features,
covering di erent facets of a ect.</p>
      <p>Yao and Hauptmann [YH18b] analyse a publicly
available dataset of Russian trolls. They analyse
tweeting patterns over time, revealing that these
accounts di er from traditional bots and raise new
challenges for bot detection methods.</p>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgments</title>
      <p>We would like to thank the programme committee
members for their support.
[ZAB+18] Arkaitz Zubiaga, Ahmet Aker, Kalina
Bontcheva, Maria Liakata, and Rob
Procter. Detection and resolution of rumours in
social media: A survey. ACM Computing
Surveys (CSUR), 51(2):32, 2018.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [CMC+18]
          <string-name>
            <given-names>Josemar</given-names>
            <surname>Alves</surname>
          </string-name>
          <string-name>
            <given-names>Caetano</given-names>
            , Gabriel Magno, Evandro Cunha, Wagner Meira Jr.,
            <surname>Humberto</surname>
          </string-name>
          <string-name>
            <given-names>T.</given-names>
            <surname>Marques-Neto</surname>
          </string-name>
          ,
          <article-title>and Virgilio Almeida. Characterizing the public perception of whatsapp through the lens of media</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [CPC18]
          <article-title>[CS18] Costanza Conforti, Mohammad Taher Pilehvar, and Nigel Collier. Modeling the fake news challenge as a cross-level stance detection task</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Danielle</given-names>
            <surname>Caled</surname>
          </string-name>
          and
          <string-name>
            <surname>Mario J. Silva.</surname>
          </string-name>
          <article-title>Ftr18: Collecting rumours on football transfer news</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [KSB+18]
          <string-name>
            <surname>Zekarias</surname>
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Kefato</surname>
            , Nasrullah Sheikh, Leila Bahri, Amira Soliman, Alberto Montresor, and
            <given-names>Sarunas</given-names>
          </string-name>
          <string-name>
            <surname>Girdzijauskas</surname>
          </string-name>
          . Cats:
          <article-title>Network-agnostic virality prediction model to aid rumour detection</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>[PBP18] Endang Wahyu</surname>
            <given-names>Pamungkas</given-names>
          </string-name>
          , Valerio Basile, and
          <string-name>
            <given-names>Viviana</given-names>
            <surname>Patti</surname>
          </string-name>
          .
          <article-title>Stance classi cation for rumour analysis in twitter: Exploiting a ective information and conversation structure</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [RDMS18]
          <string-name>
            <given-names>Kevin</given-names>
            <surname>Roitero</surname>
          </string-name>
          , Gianluca Demartini, Stefano Mizzaro, and
          <string-name>
            <given-names>Damiano</given-names>
            <surname>Spina</surname>
          </string-name>
          .
          <article-title>How many truth levels? six? one hundred? even more? validating truthfulness of statements via crowdsourcing</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>[STZ18] [WD17] [YH18a] [YH18b] [YY18] Kirill Skorniakov</source>
          , Denis Turdakov, and
          <string-name>
            <given-names>Andrey</given-names>
            <surname>Zhabotinsky</surname>
          </string-name>
          .
          <article-title>Make social networks clean again: Graph embedding and stacking classi ers for bot detection</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>Information disorder: Toward an interdisciplinary framework for research and policymaking</article-title>
          .
          <source>Council of Europe report, DGI</source>
          (
          <year>2017</year>
          ),
          <volume>9</volume>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>Reviewer selection for rumor checking on social media</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <article-title>Temporal patterns of russian trolls: A case study</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>Grace</given-names>
            <surname>Hui Yang</surname>
          </string-name>
          and
          <string-name>
            <given-names>Yue</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>Use of interpersonal deception theory in counter social engineering</article-title>
          .
          <source>In Proc. of 2nd RDSM</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>