<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Combining Tweets and Connections Graph for FakeNews Detection at MediaEval 2022</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Konstantin Pogorelov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniel Thilo Schroeder</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Brenner</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Asep Maulana</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Johannes Langguth</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Simula Research Laboratory</institution>
          ,
          <country country="NO">Norway</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Stuttgart Media University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Bergen</institution>
          ,
          <country country="NO">Norway</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The FakeNews Detection task at MediaEval 2022, running for the third time as part of the challenge, focuses on the detection of misinformation tweets and their spreaders. Like in the 2021 task, conspiracy theories related to COVID-19 in nine diferent categories have to be detected, along with the authors stance towards them. For the 2022 challenge, the size of the dataset has approximately doubled. Furthermore, we also provide a large interaction graph along with vertex features derived from the same Twitter dataset in which misinformation spreaders should be classified. As a final subtask, participants are asked to combine text and graph information to refine their classifications. This paper describes the tasks, including use case and motivation, challenges, the dataset with ground truth, the required participant runs, and the evaluation metrics.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>During the course of the COVID-19 pandemic a large amount of misinformation of various
kinds was observed in online and ofline media of all kinds. A particularly noteworthy example
of this misinformation are conspiracy theories related to the origin, nature, and treatment of the
virus. Despite the eforts of most major social networks, irrational and or harmful conspiracy
theories spread widely in many online media, and the spread of such content can have severe
real-world implications. Thus, our aim is to study new ways of detecting such content, as well
as the stance of the author towards the content. We are especially interested in messages that
propose multiple overlapping conspiracy theories.</p>
      <p>However, conspiracy content can be dificult to detect by pure text analysis, since many such
ideas are communicated via hidden or implied meaning, codes, or intentional misspellings such
as plANdemic instead of pandemic. Thus, in order to improve detection accuracy, we suggest to
study the connections between tweet authors, as well as meta-information about them. Thus,
our task ofers three subtasks, with the first requiring text-based tweet classification, the second
node classification, and the third a combination thereof.</p>
      <p>
        Similar to text-only classification challenges, e.g., [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ], we expect to see NLP approaches
for the text analysis, but we aim wider set of conspiracy theories and diferent-level detection
methodologies. Furthermore, we ask for evaluation of diferent approaches with respect to
real-world imbalanced datasets [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The second subtask requires graph analysis, using graph
neural networks or similar methods, and consequently the third subtask requires both.
      </p>
      <p>The task is intended to be of interest to researchers in the areas of online news, social
media, multimedia analysis, multimedia information retrieval, natural language processing, and
semantic understanding.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Dataset Details</title>
      <p>
        The dataset was created in a multi-stage process, starting with the collection of a set of tweets
related to the COVID-19 pandemic from Twitter between January 17, 2020 and Jun 30, 2021. We
used the Twitter search API via our custom distributed Twitter scrapping framework called
FACT [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and targeted COVID-19 keywords. Since conspiracy tweets are not particularly
frequent, we use a list of keywords related to conspiracy theories and perform a text search.
During the COVID-19 pandemic we observed misinformation trends and developed the list.
We then removed tweets that contain hyperlinks. This was done because using the links could
distract from the goal of the challenge, i.e. natural language understanding. For the remaining
tweets, we attempted to resolve the self-reported location of the tweet authors. We make use
of a system to resolve locations from previous work [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. From the remaining set, we selected
3, 389 tweets and performed the manual labeling. The selection was done in a way that ensures
that a constant proportion of the tweets was selected from every day in the dataset, in order
to ensure an even distribution and to account for the fact that the daily number of COVID-19
related tweets was much higher in Spring 2020 than during the later stages of the pandemic.
      </p>
      <p>The annotation process was been performed by a team of researchers, postdocs, PhD, and
master students. Each tweet was annotated by at least two annotators. Disagreed annotations
were resolved by a third experienced annotator. We use three classes in nine categories to label
tweets:</p>
      <p>Promotes/Supports Conspiracy class contains all tweets that promotes, supports, claim,
insinuate some connection between COVID-19 and various conspiracies, such as, for example,
the idea that 5G weakens the immune system and thus caused the current corona-virus pandemic;
that there is no pandemic and the COVID-19 victims were actually harmed by radiation emitted
by 5G network towers; ideas about an intentional release of the virus, forced or harmful
vaccinations, vaccine contains microchips, or the virus being a hoax, etc. The crucial requirement
is the claimed existence of some causal link.</p>
      <p>Discusses Conspiracy class contains all tweets that just mentioning the existing various
conspiracies connected to COVID-19, or negating such a connection in clearly negative or
sarcastic manner.</p>
      <p>Non-Conspiracy class contains all tweets not belonging to the previous two classes. Note
that this also includes tweets that discuss COVID-19 pandemic itself.</p>
      <p>We use the following nine categories that corresponds to the most popular conspiracy
theories: Suppressed cures, Behaviour and Mind Control, Antivax, Fake virus, Intentional
Pandemic, Harmful Radiation or Influence, Population reduction, New World Order,
and Satanism.</p>
      <p>The development and test tweet text datasets consist of 1, 913 and 1, 476 tweets respectively.
Both datasets are heavily unbalanced in terms of the number of samples per class, reflecting the
distribution of tweet topics and people’s opinions. The whole development dataset is used in the
ifrst and third subtasks. The test dataset is devided between the first and third subtasks resulting
in two subsets containing 830 and 646 tweets respectively. Tweet texts were shared with the
registered participants who were obliged to sign an additional non disclosure agreement.</p>
      <p>For the first subtask, we provide only tweet text content without any linking to the user
accounts or original tweets objects. On the other hand, for the second task we provide a graph
with 1, 679, 011 vertices and 268, 694, 698 edges, along with 1, 913 and 830 vertex labels for
the development and test set respectively. In addition, it contains more details about the users.
The account creation date, number of favourites, followers, friends, and statuses, self-reported
location resolved via the Google geolocation API, and the verification status. On the other hand,
userID, name, and description have been anonymized. For the latter two, the length of the string
is given instead. Thus, it should not be possible to identify individual users with simple methods
such as Google searches. For the third task, we also provide a matching between annotated
tweets and annonymized users.</p>
      <p>
        After the challenge, the entire tweet dataset will be made available, but only tweet IDs, labels,
and graphs will be shared publicly. Tweet texts can be obtained by contacting the authors. A
paper describing the dataset is in preparation [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Evaluation Metrics and Subtasks</title>
      <p>
        The oficial report metric used for evaluating the multi-class classification performance is the
multi-class generalization of the Matthews correlation coeficient (MCC, Rk-statistic) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] which
is suited for multi-class classifiers for both balanced and unbalanced datasets. Ties are broken
by submission time. For the evaluation, the participants must submit at least one run for at least
one subtask defined below. Additionally, the participants optionally can submit four more runs
for each subtasks, for a maximum of 15 runs in total.
      </p>
      <p>Text-Based Misinformation and Conspiracies Detection: In this subtask, the participants
receive a dataset consisting of tweet text blocks in English related to COVID-19 and various
conspiracy theories. The goal of this subtask is to build a complex multi-labelling multi-class
detector that for each topic from a list of predefined conspiracy topics can predict whether a
tweet promotes/supports or just discusses that particular topic. This task is identical to a task
posed in last year’s challenge, but it uses larger development and test datasets.</p>
      <p>Graph-Based Conspiracy Source Detection: In this subtask, the participants are given an
undirected graph derived from social network data where the vertices are users and the edges
represent connections between them. Each vertex has a set of attributes, including location,
number of followers, etc. Some users are labeled as misinformation posters, based on manually
annotated tweets, and some are labeled as non-misinformation posters. This subtask asks
participants to classify the other users in the graph, based on their connection to the labeled
users as well as their attributes. Scoring will be based on correctly classifying users/vertices in
the graph that have manually generated hidden labels.</p>
      <p>Graph and Text-Based Conspiracy Detection: This subtask combines the data of both
previous subtasks with the aim of improving the text-based classification. For each text to be
evaluated, the vertex corresponding to the author is specified in the graph. The goal of this
subtask is the same as that of Subtask 1, but participants can make full use of the graph data
and vertex attributes. This subtask will use the same development and a diferent test set from
that of the first subtask.</p>
      <p>
        In the submitted runs participants are allowed to use an additional Cannot Determine class.
This additional class represents cases where the output of the classifier is not reliable. The efect
of using the Cannot Determine class is described in the related literature [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>With respect to the subtask evaluation, the following methodology is used.</p>
      <p>The Graph-Based Conspiracy Source Detection subtask is evaluated with Rk-statistic
directly.</p>
      <p>Text-Based Misinformation and Conspiracies Detection and Graph and Text-Based
Conspiracy Detection subtasks are evaluated in two-steps. First, evaluation of each conspiracy
theory category is performed individually and independently using the Rk-statistic. Then all the
computed Rk-statistic values across all the conspiracy theories are averaged and the resulting
averaged value is used to compare the results of diferent teams. Finally, results in each
conspiracy theory group are evaluated independently, but this step is auxiliary and does not
afect the final ranking.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion and Outlook</title>
      <p>
        The task is substantially more challenging than the 2021 edition [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], with last years task
being contained in the first subtask. It resumes the use of graphs as a tool to improve detection
accuracy from the 2020 challenge [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] but by using a large connected graph instead of individual
spreading graphs, we open the way for trying out new network based approaches.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Acknowledgements</title>
      <p>This work was funded by the Norwegian Research Council under contracts #272019 and #303404
and has benefited from the Experimental Infrastructure for Exploration of Exascale Computing
(eX3), which is financially supported by the Research Council of Norway under contract #270053.
We also acknowledge support from Michael Kreil in the collection of Twitter data.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Do</surname>
          </string-name>
          ,
          <article-title>Jigsaw unintended bias in toxicity classification (</article-title>
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Toxic comment classification challenge - identify and classify toxic online comments</article-title>
          ,
          <year>2018</year>
          . URL: https://www.kaggle.com/c/jigsaw-toxic
          <article-title>-comment-classification-challenge/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mungekar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Parab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pereira</surname>
          </string-name>
          ,
          <article-title>Quora insincere question classification</article-title>
          ,
          <source>National College of Ireland</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Chawla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Japkowicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kotcz</surname>
          </string-name>
          ,
          <article-title>Special issue on learning from imbalanced data sets</article-title>
          ,
          <source>ACM SIGKDD explorations newsletter 6</source>
          (
          <year>2004</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Pogorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Langguth</surname>
          </string-name>
          ,
          <article-title>Fact: a framework for analysis and capture of twitter graphs</article-title>
          ,
          <source>in: 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>134</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Langguth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Filkuková</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brenner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Pogorelov</surname>
          </string-name>
          , Covid-
          <volume>19</volume>
          and
          <article-title>5g conspiracy theories: long term observation of a digital wildfire</article-title>
          ,
          <source>International Journal of Data Science and Analytics</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Langguth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Filkuková</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brenner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Philips</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Pogorelov</surname>
          </string-name>
          ,
          <string-name>
            <surname>Coco:</surname>
          </string-name>
          <article-title>An annotated twitter dataset of covid-19 conspiracy theories (</article-title>
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gorodkin</surname>
          </string-name>
          ,
          <article-title>Comparing two k-category assignments by a k-category correlation coeficient</article-title>
          ,
          <source>Computational biology and chemistry 28</source>
          (
          <year>2004</year>
          )
          <fpage>367</fpage>
          -
          <lpage>374</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Boughorbel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Jarray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>El-Anbari</surname>
          </string-name>
          ,
          <article-title>Optimal classifier for imbalanced data using matthews correlation coeficient metric</article-title>
          ,
          <source>PloS one 12</source>
          (
          <year>2017</year>
          )
          <article-title>e0177678</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>K.</given-names>
            <surname>Pogorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brenner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Langguth</surname>
          </string-name>
          ,
          <article-title>Fakenews: Corona virus and conspiracies multimedia analysis task at mediaeval 2021</article-title>
          , in: Multimedia Benchmark Workshop,
          <year>2021</year>
          , p.
          <fpage>67</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>K.</given-names>
            <surname>Pogorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Burchard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Moe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brenner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Filkukova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Langguth</surname>
          </string-name>
          ,
          <article-title>Fakenews: Corona virus and 5g conspiracy task at mediaeval 2020</article-title>
          ., in: MediaEval,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>