<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop - April</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Fact-checking, False Narratives, and Argumentation Schemes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giovanni Luca Ciampaglia</string-name>
          <email>glc3@mail.usf.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>John Licato</string-name>
          <email>licato@usf.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of South Florida</institution>
          ,
          <addr-line>Tampa, FL</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>14</volume>
      <issue>2021</issue>
      <abstract>
        <p>False narratives, with their frequent omission of crucial argument components and their reliance on cherry-picking accurate but misleading facts, pose significant challenges to NLP tools that aim to automated parts of the human intelligence task of fact-checking. Fortunately, these forms of enthymemes can be overcome using methods from argumentation theory, which has refined over several decades a repertoire of argumentation scheme that can help us reason and model these forms of weaponized disinformation. In this position paper we argue for a new approach to computational fact-checking based on normative patterns of argumentation.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>In the arms race against disinformation, the job of fact checkers is
made significantly more dificult by the use of factual statements,
misleadingly presented. For example, a recent email sent to
supporters of President Trump stated that
“Millions of mail-in ballots were sent to people who
didn’t ask for them.”</p>
      <p>In its investigation of this claim, Fact-checking website Snopes
determined that, taken at a literal level, this claim is factually correct.
But “it was a mischaracterization of states’ election laws to frame
that fact as evidence of impropriety or fraud," which was the email’s
intended but unstated conclusion. “Rather, the ballots were sent
to registered voters in accordance with state laws.”1 Such tactics
are not limited to one political side, as shown by an article that
appeared in the Independent with the following headlines:
“Trump ‘haemorrhaging’ Twitter followers in wake
of election defeat;
President has lost followers every day this week,
figures show.”2</p>
      <p>Though the subtitle is factually correct, President Trump’s
Twitter account only lost approximately 0.25% of its followers over the
week in question, and may have actually gained followers since the
election. Such claims are used to plant or strengthen certain beliefs
(for example, that the 2020 US Presidential Election was marred
by electoral fraud) in their target audience by use of enthymemes,3
through content which: (1) omit crucial parts of the argument’s
structure, such as premises or conclusions; (2) tend to make use
1https://www.snopes.com/fact-check/millions-mail-in-ballots/
2https://www.independent.co.uk/news/world/americas/us-election-2020/trumplosing-twitter-followers-election-defeat-b1762502.html
3An enthymeme is “an argument in which one premise is not explicitly stated.” (source:
Oxford Languages).
of cherry-picked but verifiably correct facts; and (3) can often be
easily refuted by locating and examining the missing components.</p>
      <p>Fact-checking these and other types of claims is a complex
human intelligence task. First, a fact-checker needs to identify the
underlying belief the claim is trying to plant, along with how it is
meant to connect to the facts the claim presents. Second, she needs
to collect the underlying facts. Third, she needs to evaluate the
collected evidence and come up with an overall determination. This
last step may play out in diferent ways, depending on the claim.
The evidence may turn out to be false, in which case the claim can
be refuted as is. However, if the evidence is true, as is typically the
case for enthymematic claims, it may still fail to provide suficient
argumentative support of the claim, or it may fail to hold when
additional facts are considered.</p>
      <p>
        Of the various steps that comprise the workflow described above,
journalists are generally quite efective at the first two, i.e.
identifying the underlying belief and collecting the underlying facts.
As far as the third task is concerned, emerging research shows
that simple factual claims can be evaluated against a database of
facts [
        <xref ref-type="bibr" rid="ref4">1, 2, 3</xref>
        ]. However, the task of evaluating misleading claims
based on true evidence, i.e. enthymematic claims, still present
considerable challenges and is hard to scale. This task challenging since
it requires knowledge of normative patterns of argumentation —
knowledge about what types of argument schemes constitute “good”
arguments, what their refutation conditions are, and which (if any)
argument components are implied but not verified by a claim.
      </p>
      <p>
        To overcome this problem and make it easier for fact-checkers
to deal with complex claims in general, and more specifically with
enthymematic claims, there is a strong need for manually curated
argument schemes, organized into premises and conclusions. Each
scheme should be detailed by flexible analyses of its strengths,
weaknesses, conditions of refutation/strengthening, and applicability
conditions. Fortunately, such a corpus of argument schemes already
exists; it has been compiled, studied, and published over the past
near-four decades by Douglas Walton and colleagues [
        <xref ref-type="bibr" rid="ref5 ref6">4, 5</xref>
        ].
      </p>
      <p>
        For example, consider the Argument from Verbal Classification
scheme [
        <xref ref-type="bibr" rid="ref6">5</xref>
        ]:
      </p>
      <p>Individual Premise:  has property  .</p>
      <p>Classification Premise: For all  , if  has property  , then
 can be classified as having property  .</p>
      <p>Conclusion:  has property  .</p>
      <p>Critical Questions:
• CQ1: What evidence is there that  definitely has
property  , as opposed to evidence indicating room for
doubt about whether it should be so classified?
• CQ2: Is the verbal classification in the classification
premise based merely on an assumption about word
usage that is subject to doubt?</p>
      <p>This scheme may be applicable to this paper’s opening example,
by substituting ‘the 2020 elections’ for , ‘had millions of mail-in
ballots sent unsolicited’ for  , and ‘was fraudulent’ for  . Stated in
this way, it is extremely clear that although the individual premise
is true, the classification premise is extremely weak, and can be
struck down soundly.</p>
      <p>Walton-style argument schemes have never been efectively
applied to journalistic workflows such as fact-checking. This raises
a host of questions. For example: are current taxonomy of argument
schemes capable of describing all claims currently in circulation?
And, given a claim expressed in natural language, can we detected
eficiently the presence of one or more argument schemes from this
taxonomy in it? Does knowledge of the detected argument scheme
help to identify and verify the underlying facts of the claim? We
argue that more research is needed combining Natural Language
Processing (NLP), Network Science, and Machine Learning to seek
an answer to these questions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>A NEW RESEARCH AGENDA</title>
      <p>
        We seek to understand the role that argument patterns and schemes
play in enthymematic disinformation, with the ultimate aim of
developing tools for more efective fact checking. This involves
applying state-of-the-art NLP in order to solve the following tasks:
(1) Given a carrier of enthymematic disinformation (e.g. the
headline of an article shared on social media), identify its
intended conclusion—i.e., the belief that the disinformation’s
creator intends to instill or reinforce in the reader. This will
likely use patterns identified automatically, rather than
normatively crafted argument schemes. To systematically
explore this, we propose the use of new benchmark datasets
and tasks which build on two existing tasks in natural
language processing: natural language inference [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">6, 7, 8</xref>
        ] and
argument reasoning comprehension [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">9, 10, 11</xref>
        ].
(2) Given an intended conclusion, use argument schemes to
identify its necessary and suficient premises, to aid in repetitive
tasks related to the research required to fact-check a claim.
This will use normatively crafted argument schemes, such
as Walton’s, since the goal here is to enforce critical
thinking, rather than to just identify uncritical associations. To
tame the complexity of this task, we could focus on
domainspecific claims, such as political news headlines, and their
related argument schemes.
(3) Given a scheme and its identified premises, develop new
knowledge graph verification techniques that make full use
of Walton-style argument schemes. A promising approach
to tackle this issue is to devise novel graph traversal schemes
that exploit knowledge of the statistical property of the
underlying knowledge topology. The goal here is to mine a
reference knowledge base for underlying evidence to be
checked.
(4) Last but not least, we propose to engage with specific
factchecking organizations to develop new tools to aid human
fact-checkers analyze false narratives through the lens of
argument schemes.
      </p>
      <p>
        The Defeasible Inference Task. We here propose a new benchmark
task which we believe will contribute towards the development
of the kinds of NLP systems that are necessary to achieve the
goals described thus far. It is based on the Argument Reasoning
Comprehension Task (ARCS) [
        <xref ref-type="bibr" rid="ref10 ref11">9, 10</xref>
        ], which (after correcting for
biases in the initial version of the task) has been shown to be
very dificult even for state-of-the-art NLP systems [
        <xref ref-type="bibr" rid="ref12">11</xref>
        ]. Defeasible
reasoning [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">12, 13, 14</xref>
        ], sometimes called “nonmonotonic reasoning,"
involves arguments whose conclusions are subject to later defeat
by additional evidence or arguments. For example, consider the
following statements:
•  =“A woman refuses to bathe her child in tap water."
• ℎ = “The woman is unnecessarily overprotective of her child."
•  1 = “The woman refuses to let her baby eat GMOs or
processed foods."
•  2 = “The woman has read credible reports of flesh-eating
bacteria in the local water supply."
      </p>
      <p>Faced with  alone, which may be a newspaper headline, a reader
might infer ℎ on their own, and implying ℎ may indeed be the goal
of the headline writer all along. If further given  1, then the reader
might be more likely to believe that ℎ is true. But if then given  2,
a typical reader is likely to infer that ℎ no longer holds (or is at least
not suficiently supported by the available evidence).</p>
      <p>The ARCS task consists of four statements similar to those above,
where the two warrants ( 1 and  2) are such that one of them
combined with the premise  infers the hypothesis ℎ, whereas
the other combined with  infers the negation of ℎ. The task is
to determine which warrant is which. We propose to extend this
task in two ways: First, the premise will consist of an article’s
headline, and the hypothesis will consist of an intended conclusion
of that headline. Second, the warrants w = { 1, ...,  } will consist
of factual statements (not limited to two) either directly extracted
from the article, or taken from some fact checking service or process.
The task, then, is to determine whether (1)  → ℎ,4 and (2) if there
exists some  ∈ w such that ¬( ( ∧  ) → ℎ). If this is the case,
then the article corresponding to this problem can be flagged as a
possible piece of enthymematic disinformation, and can then be
reviewed by a fact checker.</p>
      <p>
        Currently, no benchmark dataset for this task exists. In prior
work, Shao, Ciampaglia, Varol, Yang, Flammini, and Menczer
analyze a sample of  = 100 articles from ‘low credibility’ sources
and found that the majority of them (77%–82%, depending on
sampling strategy) conformed to some form of misleading or inaccurate
information [
        <xref ref-type="bibr" rid="ref16">15</xref>
        ]. Actually collecting such a dataset is a focus of
our present research, and a starting point can be existing datasets
of clickbait [
        <xref ref-type="bibr" rid="ref17 ref25">16</xref>
        ], false claims, and fact-checks [17]. However, the
potential benefits of the resulting dataset are significant: a model
trained to perform well on this task may be able to automatically
determine the prevalence of enthymematic disinformation.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>DISCUSSION</title>
      <p>
        From a computational perspective, enthymematic disinformation
poses a set of interdisciplinary challenges touching upon, for
example, NLP, Network Science, and Artificial Intelligence, to name a few.
The research tasks outlined above are extremely under-researched
4The implication relationship → here would be an approximation of the “commonsense”
inference that tasks like NLI [
        <xref ref-type="bibr" rid="ref7">6</xref>
        ] attempt to capture. Such an inferential relationship is,
at a minimum, defeasible and non-monotonic.
by the state of the art in these disciplines. In particular, we aim to
bridge the gap between the statistical approach, which is typical of
NLP and Network Science, and the normative approach, which is
more typical of argumentation theory. We also contribute to NLP
and to automated reasoning by introducing new datasets,
benchmarks, and challenges for them, as well as solutions for them which
will combine the latest advances in NLP with the underutilized
resources provided by argument schemes.
      </p>
      <p>Disinformation is not new, but its spread throughout recent
years is unprecedented and disastrous [18, 19, 20, 21]. But since
the amount of energy required to successfully refute a false claim
tends to be significantly greater than that required to make or
spread the false claim, tools for making the fact-checking process
easier (by reducing the burden associated to repetitive tasks) are
desperately needed. The partnership between computer scientists
and journalists dates back a considerable time and in some cases
(e.g. news recommendation, digital advertising) it has been deeply
transformative for the news media industry, but it has impacted
more the business aspect of running a news outlet and less the
editorial aspect of the job. In contrast, we envision that the
proposed work will directly lead to the development of public tools
for the fact-checking community, an emerging form of
journalism that is increasingly becoming an essential component of the
socio-technical infrastructure of the internet.</p>
    </sec>
    <sec id="sec-4">
      <title>About the authors</title>
      <p>
        Dr. Giovanni Luca Ciampaglia is an expert in Network Science,
Data Science, and Computational Social Science. He is interested
in all problems arising from the interplay between people and
computing systems, in particular the integrity of information in
cyberspace against disinformation [
        <xref ref-type="bibr" rid="ref16">22, 23, 24, 15, 25, 26, 2</xref>
        ], and
the trustworthiness and reliability of social computing systems [
        <xref ref-type="bibr" rid="ref31">26,
27, 28, 29</xref>
        ]. At USF, he leads the Computational Sociodynamics
Laboratory (CSDL).
      </p>
      <p>
        Dr. John Licato is director of the Advancing Machine and Human
Reasoning (AMHR) Lab, and is an expert in Natural Language
Processing, Cognitive Modeling, and computational models of both
formal [
        <xref ref-type="bibr" rid="ref32 ref33 ref34">30, 31, 32</xref>
        ] and informal reasoning [
        <xref ref-type="bibr" rid="ref35 ref36 ref9">33, 8, 34</xref>
        ], including the
productive use of Walton-style argument schemes in AI [
        <xref ref-type="bibr" rid="ref37 ref38 ref39">35, 36, 37</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgement</title>
      <p>The authors would like to thank Alexios Mantzarlis, Dario
Taraborelli, and David Corney for their feedback on the manuscript and
insightful conversations.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>In: PLOS ONE 10.6 (June</source>
          <year>2015</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .1371/journal.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>pone.0128193.</mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Prashant</given-names>
            <surname>Shiralkar</surname>
          </string-name>
          , Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. “
          <article-title>Finding Streams in Knowledge Graphs to Support Fact Checking”</article-title>
          .
          <source>In: 2017 IEEE International Conference on Data Mining (ICDM)</source>
          . Extended Version. Piscataway, NJ: IEEE, Nov.
          <year>2017</year>
          , pp.
          <fpage>859</fpage>
          -
          <lpage>864</lpage>
          . isbn:
          <fpage>2374</fpage>
          -
          <lpage>8486</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICDM.
          <year>2017</year>
          .
          <volume>105</volume>
          . arXiv:
          <volume>1708</volume>
          .07239 [cs.
          <source>AI].</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [3]
          <string-name>
            <surname>“</surname>
            <given-names>REMOD</given-names>
          </string-name>
          :
          <article-title>Relation Extraction for Modeling Online Discourse”</article-title>
          . In: (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Douglas</given-names>
            <surname>Walton</surname>
          </string-name>
          .
          <article-title>Arguer's Position: A Pragmatic Study of Ad Hominem Attack</article-title>
          , Criticism, Refutation, and
          <string-name>
            <surname>Fallacy</surname>
          </string-name>
          . Greenwood Press,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Douglas</given-names>
            <surname>Walton</surname>
          </string-name>
          , Chris Reed, and
          <string-name>
            <given-names>Fabrizio</given-names>
            <surname>Macagno</surname>
          </string-name>
          .
          <source>Argumentation Schemes</source>
          . Cambridge University Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Samuel</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Bowman</surname>
            , Gabor Angeli, Christopher Potts, and
            <given-names>Christopher D.</given-names>
          </string-name>
          <string-name>
            <surname>Manning</surname>
          </string-name>
          . “
          <article-title>A large annotated corpus for learning natural language inference”</article-title>
          .
          <source>In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP)</source>
          .
          <source>Association for Computational Linguistics</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Adina</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Nikita</given-names>
            <surname>Nangia</surname>
          </string-name>
          , and
          <string-name>
            <surname>Samuel</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Bowman</surname>
          </string-name>
          .
          <article-title>“A Broad-Coverage Challenge Corpus for Sentence Understanding through Inference”</article-title>
          .
          <source>In: CoRR abs/1704</source>
          .05426 (
          <year>2017</year>
          ). arXiv:
          <volume>1704</volume>
          .05426. url: http://arxiv.org/abs/1704.05426.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Zaid</given-names>
            <surname>Marji</surname>
          </string-name>
          , Animesh Nighojkar,
          <string-name>
            <surname>and John Licato.</surname>
          </string-name>
          “
          <article-title>Probing the Natural Language Inference Task with Automated Reasoning Tools”</article-title>
          .
          <source>In: Proceedings of The 33rd International Florida Artificial Intelligence Research Society Conference (FLAIRS-33)</source>
          . Ed.
          <article-title>by Eric Bell and Roman Barták</article-title>
          . AAAI Press,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Ivan</given-names>
            <surname>Habernal</surname>
          </string-name>
          , Henning Wachsmuth, Iryna Gurevych, and Benno Stein. “
          <article-title>The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants”</article-title>
          .
          <source>In: CoRR abs/1708</source>
          .01425 (
          <year>2018</year>
          ). arXiv:
          <volume>1708</volume>
          .01425. url: http: //arxiv.org/abs/1708.01425.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Ivan</surname>
            <given-names>Habernal</given-names>
          </string-name>
          , Henning Wachsmuth, Iryna Gurevych, and Benno Stein. “SemEval-2018
          <source>Task</source>
          <volume>12</volume>
          :
          <article-title>The Argument Reasoning Comprehension Task”</article-title>
          .
          <source>In: Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval-</source>
          <year>2018</year>
          ).
          <article-title>Association for Computational Linguistics</article-title>
          .
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Timothy</given-names>
            <surname>Niven</surname>
          </string-name>
          and
          <string-name>
            <surname>Hung-Yu Kao</surname>
          </string-name>
          . “
          <article-title>Probing Neural Network Comprehension of Natural Language Arguments”</article-title>
          .
          <source>In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics</source>
          .
          <year>2019</year>
          , pp.
          <fpage>4658</fpage>
          -
          <lpage>4664</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Roderick</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Chisholm</surname>
          </string-name>
          . Perceiving. Cornell University Press,
          <year>1957</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [13]
          <string-name>
            <surname>John</surname>
            <given-names>L. Pollock.</given-names>
          </string-name>
          “
          <article-title>Criteria and Our Knowledge of the Material World”</article-title>
          .
          <source>In: Philosophical Review</source>
          <volume>76</volume>
          (
          <year>1967</year>
          ), pp.
          <fpage>28</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [14]
          <string-name>
            <surname>John</surname>
            <given-names>L. Pollock. Cognitive</given-names>
          </string-name>
          <string-name>
            <surname>Carpentry</surname>
          </string-name>
          :
          <article-title>A Blueprint for How to Build a Person</article-title>
          . MIT Press,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Chengcheng</surname>
            <given-names>Shao</given-names>
          </string-name>
          , Giovanni Luca Ciampaglia, Onur Varol, Kaicheng Yang,
          <string-name>
            <given-names>Alessandro</given-names>
            <surname>Flammini</surname>
          </string-name>
          , and Filippo Menczer. “
          <article-title>The spread of low-credibility content by social bots”</article-title>
          .
          <source>In: Nature Communications 9</source>
          .1 (
          <issue>Nov</issue>
          .
          <year>2018</year>
          ), pp.
          <fpage>4787</fpage>
          -. issn:
          <fpage>2041</fpage>
          -
          <lpage>1723</lpage>
          . doi:
          <volume>10</volume>
          .1038/s41467-018-06930-7.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Martin</surname>
            <given-names>Potthast</given-names>
          </string-name>
          , Sebastian Köpsel, Benno Stein, and Matthias Hagen. “
          <article-title>Clickbait Detection”</article-title>
          . In: Advances in Information Retrieval. Ed. by Nicola Ferro, Fabio Crestani,
          <string-name>
            <surname>Marie-Francine</surname>
            <given-names>Moens</given-names>
          </string-name>
          , Josiane Mothe, Fabrizio Silvestri, Giorgio Maria Di Nunzio,
          <source>Claudia Hauf, and Gianmaria Silvello. 6630 Cham</source>
          , Switzerland: Springer International Publishing,
          <year>2016</year>
          , pp.
          <fpage>810</fpage>
          -
          <lpage>817</lpage>
          . isbn:
          <fpage>978</fpage>
          -3-
          <fpage>319</fpage>
          -30671-1.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>Andon</given-names>
            <surname>Tchechmedjiev</surname>
          </string-name>
          , Pavlos Fafalios, Katarina Boland, Malo Gasquet, Matthaus Zloch, Benjamin Zapilko, Stefan Dietze, and Konstantin Todorov. “
          <article-title>ClaimsKG: A Knowledge Graph of Fact-Checked Claims”</article-title>
          . In: International Semantic Web Conference. Auckland, New Zealand, Oct.
          <year>2019</year>
          , pp.
          <fpage>309</fpage>
          -
          <lpage>324</lpage>
          . doi:
          <volume>10</volume>
          . 1007 / 978 - 3 -
          <fpage>030</fpage>
          - 30796 - 7 \ _20. url: https : //hal.archives-ouvertes.fr/hal-02404153.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>Binxuan</given-names>
            <surname>Huang and Kathleen M. Carley</surname>
          </string-name>
          .
          <article-title>Disinformation and Misinformation on Twitter during the Novel Coronavirus Outbreak</article-title>
          .
          <year>2020</year>
          . arXiv:
          <year>2006</year>
          .
          <article-title>04278 [cs</article-title>
          .SI].
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>Areeb</given-names>
            <surname>Mian</surname>
          </string-name>
          and
          <string-name>
            <given-names>Shujhat</given-names>
            <surname>Khan</surname>
          </string-name>
          . “
          <article-title>Coronavirus: the spread of misinformation”</article-title>
          .
          <source>In: BMC Medicine 18.1</source>
          (
          <issue>2020</issue>
          ), p.
          <fpage>89</fpage>
          . doi:
          <volume>10</volume>
          .1186/s12916-020-01556-3. url: https://doi.org/10.1186/ s12916-020-01556-3.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <year>2020</year>
          . arXiv:
          <year>2003</year>
          .
          <article-title>12309 [cs</article-title>
          .SI].
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>Giovanni</given-names>
            <surname>Luca Ciampaglia</surname>
          </string-name>
          . “
          <article-title>Fighting fake news: a role for computational social science in the fight against digital misinformation”</article-title>
          .
          <source>In: Journal of Computational Social Science</source>
          <volume>1</volume>
          .1 (
          <issue>Jan</issue>
          .
          <year>2018</year>
          ), pp.
          <fpage>147</fpage>
          -
          <lpage>153</lpage>
          . issn:
          <fpage>2432</fpage>
          -
          <lpage>2725</lpage>
          . doi:
          <volume>10</volume>
          .1007/s42001- 017-0005-6.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>Giovanni</given-names>
            <surname>Luca</surname>
          </string-name>
          <string-name>
            <surname>Ciampaglia</surname>
          </string-name>
          , Alexios Mantzarlis, Gregory Maus, and Filippo Menczer. “Research Challenges of Digital Misinformation:
          <article-title>Toward a Trustworthy Web”</article-title>
          .
          <source>In: AI Magazine 39.1</source>
          (
          <issue>Mar</issue>
          .
          <year>2018</year>
          ), pp.
          <fpage>65</fpage>
          -
          <lpage>74</lpage>
          . doi:
          <volume>10</volume>
          .1609/aimag.v39i1.
          <fpage>2783</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>Chengcheng</given-names>
            <surname>Shao</surname>
          </string-name>
          , Giovanni Luca Ciampaglia, Alessandro Flammini, and Filippo Menczer. “
          <article-title>Hoaxy: A Platform for Tracking Online Misinformation”</article-title>
          .
          <source>In: Proceedings of the 25th International Conference Companion on World Wide Web.</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>WWW '16 Companion. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>745</fpage>
          -
          <lpage>750</lpage>
          . isbn:
          <fpage>978</fpage>
          -1-
          <fpage>4503</fpage>
          - 4144-8. doi:
          <volume>10</volume>
          .1145/2872518.2890098.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>Chengcheng</given-names>
            <surname>Shao</surname>
          </string-name>
          ,
          <string-name>
            <surname>Pik-Mai</surname>
            <given-names>Hui</given-names>
          </string-name>
          , Lei Wang, Xinwen Jiang, Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. “
          <article-title>Anatomy of an online misinformation network”</article-title>
          .
          <source>In: PLOS ONE 13.4</source>
          (
          <issue>Apr</issue>
          .
          <year>2018</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          . doi: 10 .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          1371/journal.pone.
          <volume>0196087</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <given-names>Giovanni</given-names>
            <surname>Luca</surname>
          </string-name>
          <string-name>
            <surname>Ciampaglia</surname>
          </string-name>
          , Alessandro Flammini, and Filippo Menczer. “
          <article-title>The production of information in the attention economy”</article-title>
          .
          <source>In: Scientific Reports</source>
          <volume>5</volume>
          (
          <year>2015</year>
          ), p.
          <fpage>9452</fpage>
          . doi:
          <volume>10</volume>
          .1038/srep09452.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <given-names>Giovanni</given-names>
            <surname>Luca</surname>
          </string-name>
          <string-name>
            <surname>Ciampaglia</surname>
          </string-name>
          , Azadeh Nematzadeh, Filippo Menczer, and Alessandro Flammini. “
          <article-title>How algorithmic popularity bias hinders or promotes quality”</article-title>
          .
          <source>In: Scientific Reports 8.1</source>
          (
          <issue>2018</issue>
          ), pp.
          <fpage>15951</fpage>
          -. issn:
          <fpage>2045</fpage>
          -
          <lpage>2322</lpage>
          . url: https://doi.org/ 10.1038/s41598-018-34203-2.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Taraborelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.L.</given-names>
            <surname>Ciampaglia</surname>
          </string-name>
          . “Beyond Notability.
          <article-title>Collective Deliberation on Content Inclusion in Wikipedia”</article-title>
          .
          <source>In: Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW)</source>
          . Piscataway, NJ: IEEE, Sept.
          <year>2010</year>
          , pp.
          <fpage>122</fpage>
          -
          <lpage>125</lpage>
          . doi:
          <volume>10</volume>
          .1109/SASOW.
          <year>2010</year>
          .
          <volume>26</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Shun</surname>
            <given-names>Yamaya</given-names>
          </string-name>
          , Saumya Bhadani, Alessandro Flammini, Filippo Menczer, Brendan Nyhan, and Giovanni Luca Ciampaglia. “
          <article-title>Political Audience Diversity and News Quality”</article-title>
          .
          <source>In: Proc. of Computation+Journalism</source>
          . Northeastern University.
          <year>2020</year>
          . url: https://cj2020.northeastern.edu/files/2020/02/CJ_2020_ paper_59.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [30]
          <string-name>
            <surname>John</surname>
            <given-names>Licato</given-names>
          </string-name>
          , Naveen S. Govindarajulu, Selmer Bringsjord,
          <string-name>
            <given-names>Michael</given-names>
            <surname>Pomeranz</surname>
          </string-name>
          , and Logan Gittelson. “
          <article-title>Analogico-Deductive Generation of Gödel's First Incompleteness Theorem from the Liar Paradox”</article-title>
          .
          <source>In: Proceedings of the 23rd Annual International Joint Conference on Artificial Intelligence (IJCAI-13)</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Elijah</surname>
            <given-names>Malaby</given-names>
          </string-name>
          , Bradley Dragun,
          <string-name>
            <given-names>and John Licato. “Towards</given-names>
            <surname>Concise</surname>
          </string-name>
          ,
          <article-title>Machine-discovered Proofs of Gödel's Two Incompleteness Theorems”</article-title>
          .
          <source>In: Proceedings of The 33rd International Florida Artificial Intelligence Research Society Conference (FLAIRS-33)</source>
          . Ed.
          <article-title>by Eric Bell and Roman Barták</article-title>
          . AAAI Press,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>John</given-names>
            <surname>Licato</surname>
          </string-name>
          and
          <string-name>
            <given-names>Michael</given-names>
            <surname>Cooper</surname>
          </string-name>
          . “
          <article-title>Assessing Evidence Relevance By Disallowing Direct Assessment”</article-title>
          .
          <source>In: Proceedings of the 12th Conference of the Ontario Society for the Study of Argumentation</source>
          .
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>John</given-names>
            <surname>Licato</surname>
          </string-name>
          and
          <string-name>
            <given-names>Michael</given-names>
            <surname>Cooper</surname>
          </string-name>
          . “
          <article-title>Evaluating Relevance in Analogical Arguments through Warrant-based Reasoning”</article-title>
          .
          <source>In: Proceedings of the European Conference on Argumentation (ECA</source>
          <year>2019</year>
          ).
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>Michael</given-names>
            <surname>Cooper</surname>
          </string-name>
          , Lindsay Fields,
          <string-name>
            <given-names>Marc</given-names>
            <surname>Badilla</surname>
          </string-name>
          ,
          <string-name>
            <surname>and John Licato. “</surname>
          </string-name>
          <article-title>WG-A: A Framework for Exploring Analogical Generalization and Argumentation”</article-title>
          .
          <source>In: Proceedings of the 42nd Cognitive Science Society Conference (CogSci</source>
          <year>2020</year>
          ).
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>John</given-names>
            <surname>Licato</surname>
          </string-name>
          and Zhitian Zhang. “
          <source>Evaluating Representational Systems in Artificial Intelligence”</source>
          .
          <source>In: Artificial Intelligence Review 52.2</source>
          (
          <issue>2019</issue>
          ), pp.
          <fpage>1463</fpage>
          -
          <lpage>1493</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>Ryan</given-names>
            <surname>Quandt</surname>
          </string-name>
          and John Licato. “Problems of Autonomous Agents following Informal,
          <article-title>Open-textured Rules”</article-title>
          .
          <source>In: Proceedings of the AAAI 2019 Spring Symposium on Shared Context</source>
          .
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>Ryan</given-names>
            <surname>Quandt</surname>
          </string-name>
          and John Licato. “Problems of Autonomous Agents following Informal,
          <article-title>Open-textured Rules”</article-title>
          . In: HumanMachine Shared Contexts. Ed. by William F. Lawless, Ranjeev Mittu, and
          <string-name>
            <surname>Donald</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Sofge</surname>
          </string-name>
          . Academic Press,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>