ACL-OCL / Base_JSON /prefixS /json /stoc /2020.stoc-1.6.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "2020",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T15:45:27.884163Z"
},
"title": "Is this hotel review truthful or deceptive? A platform for disinformation detection through computational stylometry",
"authors": [
{
"first": "Antonio",
"middle": [],
"last": "Pascucci",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Orientale University of Naples",
"location": {}
},
"email": "[email protected]"
},
{
"first": "Raffaele",
"middle": [],
"last": "Manna",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Orientale University of Naples",
"location": {}
},
"email": "[email protected]"
},
{
"first": "Ciro",
"middle": [],
"last": "Caterino",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Orientale University of Naples",
"location": {}
},
"email": "[email protected]"
},
{
"first": "Vincenzo",
"middle": [],
"last": "Masucci",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Orientale University of Naples",
"location": {}
},
"email": "[email protected]"
},
{
"first": "Johanna",
"middle": [],
"last": "Monti",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Orientale University of Naples",
"location": {}
},
"email": "[email protected]"
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "In this paper, we present a web service platform for disinformation detection in hotel reviews written in English. The platform relies on a hybrid approach of computational stylometry techniques, machine learning and linguistic rules written using COGITO c , Expert System Corp.'s semantic intelligence software thanks to which it is possible to analyze texts and extract all their characteristics. We carried out a research experiment on the Deceptive Opinion Spam corpus, a balanced corpus composed of 1,600 hotel reviews of 20 Chicago hotels split into four datasets: positive truthful, negative truthful, positive deceptive and negative deceptive reviews. We investigated four different classifiers and we detected that Simple Logistic is the most performing algorithm for this type of classification.",
"pdf_parse": {
"paper_id": "2020",
"_pdf_hash": "",
"abstract": [
{
"text": "In this paper, we present a web service platform for disinformation detection in hotel reviews written in English. The platform relies on a hybrid approach of computational stylometry techniques, machine learning and linguistic rules written using COGITO c , Expert System Corp.'s semantic intelligence software thanks to which it is possible to analyze texts and extract all their characteristics. We carried out a research experiment on the Deceptive Opinion Spam corpus, a balanced corpus composed of 1,600 hotel reviews of 20 Chicago hotels split into four datasets: positive truthful, negative truthful, positive deceptive and negative deceptive reviews. We investigated four different classifiers and we detected that Simple Logistic is the most performing algorithm for this type of classification.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Disinformation is a phenomenon that is becoming part of everyday life. The phenomenon is uncontrollable, especially if we consider that social media and blogs are breeding grounds for news diffusion and that the higher the number of sharing of news, the more people are reached by the news. One of the fields in which disinformation is increasing quickly is hotel reviews, both for positive and for negative reviews. There may be an interest to spread positive or negative fake news about hotels. The main idea of our research is to reduce the impact of disinformation. For this reason, we developed a platform able answer to the question: is this hotel review truthful or deceptive? The paper is organized as follows: In Section 2 we present Related Work. In Section 3 we describe Computational Stylometry and some stylistic features and in Section 4 we present the Deceptive Opinion Spam corpus and we show the results of our testing. In Section 5 we propose the platform, ethical considerations are in Section 6 and Conclusions are in Section 7 along with Future Work.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "The proposed approach to detect disinformation in hotel reviews is certainly not the first one based on Computational Stylometry (CS) and Machine Learning (ML) / Deep Learning (DL) techniques. CS is presented in Section 4, DL exploits artificial neural networks with representation learning, while ML is the computer ability to learn from data. ML algorithms allow the system to preserve in its knowledge base each feature characteristic learned during the training process. Despite \"disinformation\" and \"fake news\" represent two different concepts, they should be considered as close together, since they are both characterized by stylistic features typical of those who are lying. Disinformation is defined as false information spread to deceive people 1 , while \"fake news\" describes false stories that appear to be news, usually created to influence political views or as a joke 2 . There is also a subtle difference between disinformation (incorrect information disseminated deliberately) and misinformation (that represents incorrect information disseminated unintentionally) (Egelhofer and Lecheler, 2019) . (Kumar et al., 2016) investigated hoax articles presence on Wikipedia. The scholars used a large dataset of discovered hoaxes and detected that despite the community is efficient at identifying hoaxes, there is still a small number of these that survive for a long time. In their research, the scholars focused on the structure and content of the article and its mention in other articles. Their hoax/non-hoax classifier achieved an accuracy of 86% outperforming humans by a large margin (66%). In 2018, (Bakir and McStay, 2018) investigated the disinformation issue in the 2016 US presidential election campaign from an economic point of view. The scholars discovered a new version of disinformation, driven by profit and exploited by professional persuaders: it's about emphatic media (McStay, 2016) , that represents personally and targeted news produced by algo-journalism (automated journalism), namely news articles generated by software through artificial intelligence. As stated by (Lazer et al., 2018) , addressing fake news requires a multidisciplinary effort. Despite authors of fake hotel reviews decide which words use, they can't handle the stylistic features that belong to the writing style and that make them unique. Considering that we detected stylistic features that characterize fake hotel review, we answer to (Lazer et al., 2018) 's request and we offer the potential of CS techniques in detecting fake hotel reviews. The \"opinion spam\" concept is very close to that of disinformation and mainly concerns in intentionally writing fake reviews to products, restaurants or hotel (as in our case). The research of (Jindal and Liu, 2008) reveals that there are three different categories of opinion spam:",
"cite_spans": [
{
"start": 1082,
"end": 1112,
"text": "(Egelhofer and Lecheler, 2019)",
"ref_id": "BIBREF7"
},
{
"start": 1115,
"end": 1135,
"text": "(Kumar et al., 2016)",
"ref_id": null
},
{
"start": 1619,
"end": 1643,
"text": "(Bakir and McStay, 2018)",
"ref_id": "BIBREF2"
},
{
"start": 1902,
"end": 1916,
"text": "(McStay, 2016)",
"ref_id": "BIBREF16"
},
{
"start": 2105,
"end": 2125,
"text": "(Lazer et al., 2018)",
"ref_id": "BIBREF14"
},
{
"start": 2447,
"end": 2467,
"text": "(Lazer et al., 2018)",
"ref_id": "BIBREF14"
},
{
"start": 2749,
"end": 2771,
"text": "(Jindal and Liu, 2008)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "2."
},
{
"text": "\u2022 untruthful opinions (undeserving positive reviews to some target objects to promote them or malicious negative reviews to some other objects to damage their reputation);",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "2."
},
{
"text": "\u2022 reviews on brands only (those that do not comment on the specific product, but only the brand);",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "2."
},
{
"text": "\u2022 non-reviews (those that are not reviews because contain advertisements) ) built a corpus composed of 400 truthful and 400 deceptive hotel reviews and proved that while ngrams based models are the best approach in identifying deceptive hotel reviews (89% of accuracy), a combination approach using psycholinguistically-motivated features (such as the number of words, lexical diversity, the score of narrativity) and n-grams features can perform slightly better (89.8% of accuracy). (Feng et al., 2012 ) exploit a Support Vector Machine (SVM) algorithm (Cortes and Vapnik, 1995) to build a classifier. The scholars used the corpus of and two additional corpora and based their research on syntactical and lexical features and analyzed the text data with decision trees (DL approach) and achieved 91,2% of accuracy. The performances achieved by (Feng et al., 2012) improved those of , and demonstrated how a large use of personal pronouns (I) and possessive adjective (my) characterize deceptive hotel reviews. (Popat et al., 2017) assessed the credibility of claims based on the occurrence of assertive and factive verbs, hedges, implicative words, report verbs and discourse markers. (Horne and Adali, 2017) focused on writing style and complexity to differentiate real news from fake news. The scholars used the number of occurrences of part-of-speech tags, swearing and slang words, stop words, punctuation, and negation as stylistic features. As stated by (Conroy et al., 2015) , one of the best intuition in fake news and disinformation detection is that of (Feng et al., 2012) : a deceptive writer with no experience with an event or object (e.g., never visited the hotel in question) may include contradictions or omission of facts present in profiles on similar topics.",
"cite_spans": [
{
"start": 484,
"end": 502,
"text": "(Feng et al., 2012",
"ref_id": "BIBREF8"
},
{
"start": 554,
"end": 579,
"text": "(Cortes and Vapnik, 1995)",
"ref_id": "BIBREF4"
},
{
"start": 845,
"end": 864,
"text": "(Feng et al., 2012)",
"ref_id": "BIBREF8"
},
{
"start": 1011,
"end": 1031,
"text": "(Popat et al., 2017)",
"ref_id": "BIBREF19"
},
{
"start": 1461,
"end": 1482,
"text": "(Conroy et al., 2015)",
"ref_id": "BIBREF3"
},
{
"start": 1564,
"end": 1583,
"text": "(Feng et al., 2012)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "2."
},
{
"text": "CS is a research area of Computational Linguistics that uses statistic techniques to analyze the literary style (Zheng et al., 2006) . These techniques, through automatic linguistic analysis of texts, allow us to find countless personality traits. Wincenty Lutos\u0142awski (1863 Lutos\u0142awski ( -1954 , the one who coined the term stylometry, compared the style to handwriting: \"If handwriting can be so exactly determined as to afford certainty as to its identity, so also with style, since style is more personal and characteristic than handwriting\" (Lutos\u0142awski, 1897) . We have to consider that despite a deceptive review is written with greater intention to label it as positive or negative, stylistic features are not intentional but unintentional and result from sociological factors (such as age, gender and education level) and psychological factors (that include personality, mental health and being a native speaker or not) (Daelemans, 2013) . It means that authors of deceptive review can certainly decide which words use in their review, but it is equally true that they can't handle the stylistic features that belong to their writing style. We believe that deceptive texts contain specific stylistic features that differentiate them from those truthful.",
"cite_spans": [
{
"start": 112,
"end": 132,
"text": "(Zheng et al., 2006)",
"ref_id": "BIBREF21"
},
{
"start": 257,
"end": 274,
"text": "Lutos\u0142awski (1863",
"ref_id": null
},
{
"start": 275,
"end": 294,
"text": "Lutos\u0142awski ( -1954",
"ref_id": null
},
{
"start": 546,
"end": 565,
"text": "(Lutos\u0142awski, 1897)",
"ref_id": "BIBREF15"
},
{
"start": 929,
"end": 946,
"text": "(Daelemans, 2013)",
"ref_id": "BIBREF5"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Computational Stylometry",
"sec_num": "3."
},
{
"text": "Almost all approaches in detecting disinformation and opinion spam focus on bag-of-words and part-of-speech models. As argued by (Ren and Ji, 2019) also linguistic (the functional aspect of a text), psychological (social, emotional and cognitive aspects), personal (any references to work, religion, etc.) and spoken (fillers and agreement words) features have to be taken into account. Several stylistic features characterize writing style and distinguish two or more different styles. Here we report a short list of stylistic features: sentence length (Argamon et al., 2003) , word length distributions (Zheng et al., 2006) , punctuation (Baayen et al., 1996) , use of function words (Mosteller and Wallace, 1963) , vocabulary richness (De Vel et al., 2001 ), use of a specific class of verbs or adjectives, use of first/third person. Concerning CS, it is important to stress that stylometric analysis must focus only on unintentional choices by the writer of a text. Here we list some of the features that characterise deceptive texts in the corpus we investigated: high use of adverbs, high use of common nouns, high use of inappropriate lowercase on characters, high use of may/might and intensifiers, low use of punctuation, lower readability index, rare use of foreign terms, and high use of to + infinitive.",
"cite_spans": [
{
"start": 129,
"end": 147,
"text": "(Ren and Ji, 2019)",
"ref_id": "BIBREF20"
},
{
"start": 554,
"end": 576,
"text": "(Argamon et al., 2003)",
"ref_id": "BIBREF0"
},
{
"start": 605,
"end": 625,
"text": "(Zheng et al., 2006)",
"ref_id": "BIBREF21"
},
{
"start": 640,
"end": 661,
"text": "(Baayen et al., 1996)",
"ref_id": "BIBREF1"
},
{
"start": 686,
"end": 715,
"text": "(Mosteller and Wallace, 1963)",
"ref_id": "BIBREF17"
},
{
"start": 742,
"end": 758,
"text": "Vel et al., 2001",
"ref_id": "BIBREF6"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Stylistic Features",
"sec_num": "3.1."
},
{
"text": "We investigated the Deceptive Opinion Spam corpus in order to use it as pilot for the platform. The corpus consists of truthful and deceptive hotel reviews of 20 Chicago hotels and contains 400 truthful positive reviews from TripAdvisor and 400 deceptive positive reviews from Mechanical Turk described in in addition to 400 truthful negative reviews from Expedia, Hotels.com, Orbitz, Priceline, TripAdvisor and Yelp and 400 deceptive negative reviews from Mechanical Turk described in (Ott et al., 2013) . Each dataset consists of 20 reviews for each of the 20 most popular Chicago hotels.",
"cite_spans": [
{
"start": 486,
"end": 504,
"text": "(Ott et al., 2013)",
"ref_id": "BIBREF23"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Corpus Analysis",
"sec_num": "4."
},
{
"text": "Our workflow for stylistic features extraction consists in the following steps:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Workflow",
"sec_num": "4.1."
},
{
"text": "\u2022 I) Linguistic Definition of Stylometric Features: since each author operates grammatical choices when writing a text, we organize all the grammatical characteristics of the texts under study in a taxonomy to detect the authorial fingerprint based on the grammatical choices done. This first step is carried out thanks to COGITO c , that allows us to write LR and to perform word-sense disambiguation;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Workflow",
"sec_num": "4.1."
},
{
"text": "\u2022 II) Semantic Engine Development: we train the semantic engine to extract the features from the analyzed texts. The semantic engine is implemented thanks to COGITO c 's semantic network (Sensigrafo) -that can operate word-sense disambiguation -with the addition of the rules we built;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Workflow",
"sec_num": "4.1."
},
{
"text": "\u2022 III) Training Set Analysis: the training set is analysed and all features (based on the grammatical choices done by the writer) are extracted;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Workflow",
"sec_num": "4.1."
},
{
"text": "\u2022 IV) ML: In the last step, we exploit the features extracted to train the model to detect these features in the dataset. ML process is carried out exploiting WEKA platform (Hall et al., 2009 ) (a software with machine learning tools and algorithms for data analysis) and we build each classifier with the support of one of the algorithms available in WEKA.",
"cite_spans": [
{
"start": 173,
"end": 191,
"text": "(Hall et al., 2009",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Workflow",
"sec_num": "4.1."
},
{
"text": "We built four classifiers trained with four different algorithms: Simple Logistic (SLO), Logistic (LOG), Sequential Minimal Optimization (SMO), and Random Forest (RFO). As we have mentioned, the whole corpus is composed of 1,600 reviews. We decided to test all the aforementioned algorithms using the 10-folds cross-validation method. In Table 1 we show the 10-folds cross-validation results.",
"cite_spans": [],
"ref_spans": [
{
"start": 338,
"end": 345,
"text": "Table 1",
"ref_id": "TABREF0"
}
],
"eq_spans": [],
"section": "Test",
"sec_num": "4.2."
},
{
"text": "SLO LOG SMO RFO 10-f. cross-validation 0,742 0,721 0,738 0,702 Then, in order to evaluate the real performances of all the classifiers, we split the data into two sets: a training set composed of 1,200 of the 1,600 reviews and a test set composed of the remaining 400 reviews (200 truthful reviews and 200 deceptive randomly selected). In Table 2 we show the results of the test set. According to Table 2 and to the confusion matrices in Figures 1, 2, 3, and 4 , Simple Logistic is the best performing algorithm for this type of experiment and we decided to use it for our platform. The results we achieved (77.5%) do not improve those of (Ott et al., 2011) (89%) and those of (Feng et al., 2012) (89.9%). The reason is in the approach we adopted, that mainly focus on linguistic features and does not consider features (such as n-grams) that proved to be very useful in building deceptive detection models. ",
"cite_spans": [
{
"start": 677,
"end": 696,
"text": "(Feng et al., 2012)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [
{
"start": 339,
"end": 346,
"text": "Table 2",
"ref_id": "TABREF2"
},
{
"start": 397,
"end": 404,
"text": "Table 2",
"ref_id": "TABREF2"
},
{
"start": 438,
"end": 460,
"text": "Figures 1, 2, 3, and 4",
"ref_id": null
}
],
"eq_spans": [],
"section": "Test",
"sec_num": "4.2."
},
{
"text": "The deceptive classification is provided through a REST web service which accepts as body input the text to classify.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "The logic of the system consists of three main functional blocks:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "\u2022 I) Document Repository -any document submitted to the system can be memorized together with a set of metadata about the document;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "\u2022 II) Computational Stylometry -any document has to undergo a process of stylometric analysis. Thanks to our semantic intelligence software we can extract all stylistic features. The output is a set of stylometric features that are added to the document metadata (this block represents the whole workflow we have shown in Section 4.2, with the exception of ML process that is part of the third block);",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "\u2022 III) Traits Prediction -traits prediction refers to the profiling task thanks to ML techniques.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "In Figure 5 we show the process. The method is POST, namely a method that accepts a text in the body and returns a JSON. The endpoint path contains information about the required type of classification, in this case, the deceptive one, so at the beginning, the user asks for a deceptive type of classification (it means the type of classification that the user needs and this type of classification includes two classes: truthful and deceptive) on the text the user provides. The API Gateway is in charge to receive requests and to begin the analysis process. The first step is the text analysis performed by the NLP technology, in order to extract stylometric features that will be used to classify the document in question. The second step is the ML process. For this process, we rely on WEKA platform (Hall et al., 2009) , which requires a special file (ARFF) that contains all the information related to the text (namely the input text and the stylometric features extracted). The ARFF file is the input for the classifier, invocated from our classifier dispatcher module. Classification results are formatted in JSON and sent to the requester (CLIENT). Here we report an example of classification done on a text that belongs to the corpus:",
"cite_spans": [
{
"start": 804,
"end": 823,
"text": "(Hall et al., 2009)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [
{
"start": 3,
"end": 11,
"text": "Figure 5",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "Text:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "After recent work stay at the Affinia Hotel, I can definitely say I will be coming back. They offer so many in room amenities and services, just a very comfortable and relaxed place to be. My most enjoyable experience at the Affinia Hotel was the amazing customization they offered, I would recommend Affinia hotel to anyone looking for a nice place to stay.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "Prediction:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "\"actual\": null, \"distribution\":[0.7724841302455, 0.22751586975446], \"predicted\": \"deceptive\", \"probability\": 0.7724841302455, \"doc_name\": \"hotelopinion578-test\"",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "The example reported above confirms that deceptive reviews are characterized by the use of intensifiers (definitely, so many, a very, most enjoyable). The review also lacks details, with reference only to general characteristics. Another characteristic that belongs to deceptive reviews is the repetition of the hotel name. On these bases, our platform accepts hotel reviews written in English and returns to the user a prediction on the reliability of the review. It is important to stress, as shown in the example above, that the user receives a JSON that contains also a degree of probability of the prediction. Given the results of the test carried out on the Deceptive Opinion Spam we believe that our platform could make an important contribution to disinformation detection.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Web service platform",
"sec_num": "5."
},
{
"text": "The ethical argument has fundamental importance, especially if it is about public data closely linked to people. In fact, when we talk about author profiling and authorship attribution (two important branches of CS), we immediately think about the effects of our prediction. Then, privacy is the most important issue when we deal with profiling. In a case like this, we just need texts. All the other information (name of the authors, their age, thier origin and so on) are unnecessary. It means that possible negative impacts of our technology (the disinformation detection platform) are strongly mitigated. In other words, in the case of disinformation detection, it is not essential to know who wrote the review, and anonymization of reviews can mitigate ethical issues that may arise when these type of technologies are available to everyone.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Ethical Considerations",
"sec_num": "6."
},
{
"text": "In this paper we have shown an experiment carried out on the Deceptive Opinion Spam Corpus, a corpus composed of 1,600 hotel reviews of 20 Chicago hotels split into four datasets: positive truthful, negative truthful, positive deceptive and negative deceptive reviews. The test has shown that the most performing algorithm is Simple Logistic, that correctly classified 75,5% of the test set we used. On the basis of these results, we developed a disinformation detection platform for hotel reviews written in English, in order to allow the user to submit a review and detect if it is deceptive or truthful and the percentage of probability of the prediction. It is not excluded that we will provide versions for other languages too. In this paper, we have shown how a linguistic-rule based approach can help detect deceptive hotel reviews with good results. As a next step of our research we also aim to investigate more innovative techniques such as the use of neural networks and unsupervised learning approaches and to compare it with our current approach.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusions and Future Work",
"sec_num": "7."
},
{
"text": "This research has been partly supported by the PON Ricerca e Innovazione 2014-20 and the POR Campania FSE 2014-2020 funds. Authorship contribution is as follows: Antonio Pascucci is author of Sections 1, 2, 3, 4, and 5. Sections 6 and 7 are in common between Antonio Pascucci and Raffaele Manna. This research has been developed in the framework of two Innovative Industrial PhD projects in Computational Stylometry (CS) by \"L'Orientale\" University of Naples in cooperation with Expert System Corp. We sincerely thank Ciro Caterino for helping us in developing the web service platform. We are also grateful to Vincenzo Masucci and Expert System Corp. for providing COGITO c for research and to Prof. Johanna Monti for supervising the research.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgements",
"sec_num": "8."
},
{
"text": "https://dictionary.cambridge.org/ dictionary/english/disinformation 2 https://dictionary.cambridge.org/ dictionary/english/fake-news",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Style mining of electronic messages for multiple authorship discrimination: first results",
"authors": [
{
"first": "S",
"middle": [],
"last": "Argamon",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "\u0160ari\u0107",
"suffix": ""
},
{
"first": "S",
"middle": [
"S"
],
"last": "Stein",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining",
"volume": "",
"issue": "",
"pages": "475--480",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Argamon, S., \u0160ari\u0107, M., and Stein, S. S. (2003). Style mining of electronic messages for multiple authorship discrimination: first results. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 475-480. ACM.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution",
"authors": [
{
"first": "H",
"middle": [],
"last": "Baayen",
"suffix": ""
},
{
"first": "H",
"middle": [],
"last": "Van Halteren",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "Tweedie",
"suffix": ""
}
],
"year": 1996,
"venue": "Literary and Linguistic Computing",
"volume": "11",
"issue": "3",
"pages": "121--132",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Baayen, H., Van Halteren, H., and Tweedie, F. (1996). Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing, 11(3):121-132.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Fake news and the economy of emotions: Problems, causes, solutions. Digital journalism",
"authors": [
{
"first": "V",
"middle": [],
"last": "Bakir",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Mcstay",
"suffix": ""
}
],
"year": 2018,
"venue": "",
"volume": "6",
"issue": "",
"pages": "154--175",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bakir, V. and McStay, A. (2018). Fake news and the economy of emotions: Problems, causes, solutions. Digital journalism, 6(2):154-175.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Automatic deception detection: Methods for finding fake news",
"authors": [
{
"first": "N",
"middle": [
"J"
],
"last": "Conroy",
"suffix": ""
},
{
"first": "V",
"middle": [
"L"
],
"last": "Rubin",
"suffix": ""
},
{
"first": "Chen",
"middle": [],
"last": "",
"suffix": ""
},
{
"first": "Y",
"middle": [],
"last": "",
"suffix": ""
}
],
"year": 2015,
"venue": "Proceedings of the Association for Information Science and Technology",
"volume": "52",
"issue": "",
"pages": "1--4",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Conroy, N. J., Rubin, V. L., and Chen, Y. (2015). Automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology, 52(1):1-4.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Support-vector networks",
"authors": [
{
"first": "C",
"middle": [],
"last": "Cortes",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Vapnik",
"suffix": ""
}
],
"year": 1995,
"venue": "Machine learning",
"volume": "20",
"issue": "3",
"pages": "273--297",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cortes, C. and Vapnik, V. (1995). Support-vector networks. Machine learning, 20(3):273-297.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Explanation in computational stylometry",
"authors": [
{
"first": "W",
"middle": [],
"last": "Daelemans",
"suffix": ""
}
],
"year": 2013,
"venue": "International Conference on Intelligent Text Processing and Computational Linguistics",
"volume": "",
"issue": "",
"pages": "451--462",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Daelemans, W. (2013). Explanation in computational stylometry. In International Conference on Intelligent Text Processing and Computational Linguistics, pages 451-462. Springer.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Mining e-mail content for author identification forensics",
"authors": [
{
"first": "De",
"middle": [],
"last": "Vel",
"suffix": ""
},
{
"first": "O",
"middle": [],
"last": "Anderson",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Corney",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Mohay",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "",
"suffix": ""
}
],
"year": 2001,
"venue": "ACM Sigmod Record",
"volume": "30",
"issue": "4",
"pages": "55--64",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "De Vel, O., Anderson, A., Corney, M., and Mohay, G. (2001). Mining e-mail content for author identification forensics. ACM Sigmod Record, 30(4):55-64.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Fake news as a two-dimensional phenomenon: a framework and research agenda",
"authors": [
{
"first": "J",
"middle": [
"L"
],
"last": "Egelhofer",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Lecheler",
"suffix": ""
}
],
"year": 2019,
"venue": "Annals of the International Communication Association",
"volume": "43",
"issue": "2",
"pages": "97--116",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Egelhofer, J. L. and Lecheler, S. (2019). Fake news as a two-dimensional phenomenon: a framework and research agenda. Annals of the International Communication Association, 43(2):97-116.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Syntactic stylometry for deception detection",
"authors": [
{
"first": "S",
"middle": [],
"last": "Feng",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Banerjee",
"suffix": ""
},
{
"first": "Y",
"middle": [],
"last": "Choi",
"suffix": ""
}
],
"year": 2012,
"venue": "Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics",
"volume": "2",
"issue": "",
"pages": "171--175",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Feng, S., Banerjee, R., and Choi, Y. (2012). Syntactic stylometry for deception detection. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers-Volume 2, pages 171-175. Association for Computational Linguistics.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "The weka data mining software: an update",
"authors": [
{
"first": "M",
"middle": [],
"last": "Hall",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Frank",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Holmes",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Pfahringer",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Reutemann",
"suffix": ""
},
{
"first": "I",
"middle": [
"H"
],
"last": "Witten",
"suffix": ""
}
],
"year": 2009,
"venue": "ACM SIGKDD explorations newsletter",
"volume": "11",
"issue": "1",
"pages": "10--18",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. (2009). The weka data mining software: an update. ACM SIGKDD explorations newsletter, 11(1):10-18.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "This just in: fake news packs a lot in title, uses simpler, repetitive content in text body, more similar to satire than real news",
"authors": [
{
"first": "B",
"middle": [
"D"
],
"last": "Horne",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Adali",
"suffix": ""
}
],
"year": 2017,
"venue": "Eleventh International AAAI Conference on Web and Social Media",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Horne, B. D. and Adali, S. (2017). This just in: fake news packs a lot in title, uses simpler, repetitive content in text body, more similar to satire than real news. In Eleventh International AAAI Conference on Web and Social Media.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Opinion spam and analysis",
"authors": [
{
"first": "N",
"middle": [],
"last": "Jindal",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Liu",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of the 2008 international conference on web search and data mining",
"volume": "",
"issue": "",
"pages": "219--230",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jindal, N. and Liu, B. (2008). Opinion spam and analysis. In Proceedings of the 2008 international conference on web search and data mining, pages 219-230.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Disinformation on the web: Impact, characteristics, and detection of wikipedia hoaxes",
"authors": [],
"year": null,
"venue": "Proceedings of the 25th international conference on World Wide Web",
"volume": "",
"issue": "",
"pages": "591--602",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Disinformation on the web: Impact, characteristics, and detection of wikipedia hoaxes. In Proceedings of the 25th international conference on World Wide Web, pages 591-602.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "The science of fake news",
"authors": [
{
"first": "D",
"middle": [
"M"
],
"last": "Lazer",
"suffix": ""
},
{
"first": "M",
"middle": [
"A"
],
"last": "Baum",
"suffix": ""
},
{
"first": "Y",
"middle": [],
"last": "Benkler",
"suffix": ""
},
{
"first": "A",
"middle": [
"J"
],
"last": "Berinsky",
"suffix": ""
},
{
"first": "K",
"middle": [
"M"
],
"last": "Greenhill",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "Menczer",
"suffix": ""
},
{
"first": "M",
"middle": [
"J"
],
"last": "Metzger",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Nyhan",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Pennycook",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Rothschild",
"suffix": ""
}
],
"year": 2018,
"venue": "Science",
"volume": "359",
"issue": "6380",
"pages": "1094--1096",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lazer, D. M., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., Metzger, M. J., Nyhan, B., Pennycook, G., Rothschild, D., et al. (2018). The science of fake news. Science, 359(6380):1094-1096.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "The origin and growth of Plato's logic: with an account of Plato's style and of the chronology of his writings. Longmans",
"authors": [
{
"first": "W",
"middle": [],
"last": "Lutos\u0142awski",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lutos\u0142awski, W. (1897). The origin and growth of Plato's logic: with an account of Plato's style and of the chronology of his writings. Longmans, Green and Company.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Empathic media: The rise of emotion ai",
"authors": [
{
"first": "A",
"middle": [],
"last": "Mcstay",
"suffix": ""
}
],
"year": 2016,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "McStay, A. (2016). Empathic media: The rise of emotion ai. Arts & Humanities Research Council.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers",
"authors": [
{
"first": "F",
"middle": [],
"last": "Mosteller",
"suffix": ""
},
{
"first": "D",
"middle": [
"L"
],
"last": "Wallace",
"suffix": ""
}
],
"year": 1963,
"venue": "Journal of the American Statistical Association",
"volume": "58",
"issue": "302",
"pages": "275--309",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mosteller, F. and Wallace, D. L. (1963). Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers. Journal of the American Statistical Association, 58(302):275-309.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Finding deceptive opinion spam by any stretch of the imagination",
"authors": [
{
"first": "M",
"middle": [],
"last": "Ott",
"suffix": ""
},
{
"first": "Y",
"middle": [],
"last": "Choi",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Cardie",
"suffix": ""
},
{
"first": "J",
"middle": [
"T"
],
"last": "Hancock",
"suffix": ""
}
],
"year": 2011,
"venue": "Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies",
"volume": "1",
"issue": "",
"pages": "309--319",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ott, M., Choi, Y., Cardie, C., and Hancock, J. T. (2011). Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies-volume 1, pages 309- 319. Association for Computational Linguistics.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "Where the truth lies: Explaining the credibility of emerging claims on the web and social media",
"authors": [
{
"first": "K",
"middle": [],
"last": "Popat",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Mukherjee",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Str\u00f6tgen",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Weikum",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the 26th International Conference on World Wide Web Companion",
"volume": "",
"issue": "",
"pages": "1003--1012",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Popat, K., Mukherjee, S., Str\u00f6tgen, J., and Weikum, G. (2017). Where the truth lies: Explaining the credibility of emerging claims on the web and social media. In Proceedings of the 26th International Conference on World Wide Web Companion, pages 1003-1012.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Learning to detect deceptive opinion spam: A survey",
"authors": [
{
"first": "Y",
"middle": [],
"last": "Ren",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Ji",
"suffix": ""
}
],
"year": 2019,
"venue": "IEEE Access",
"volume": "7",
"issue": "",
"pages": "42934--42945",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ren, Y. and Ji, D. (2019). Learning to detect deceptive opinion spam: A survey. IEEE Access, 7:42934-42945.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "A framework for authorship identification of online messages: Writing-style features and classification techniques",
"authors": [
{
"first": "R",
"middle": [],
"last": "Zheng",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Li",
"suffix": ""
},
{
"first": "H",
"middle": [],
"last": "Chen",
"suffix": ""
},
{
"first": "Z",
"middle": [],
"last": "Huang",
"suffix": ""
}
],
"year": 2006,
"venue": "Journal of the American society for information science and technology",
"volume": "57",
"issue": "3",
"pages": "378--393",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Zheng, R., Li, J., Chen, H., and Huang, Z. (2006). A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American society for information science and technology, 57(3):378-393. 10. Language Resource References",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Finding deceptive opinion spam by any stretch of the imagination",
"authors": [
{
"first": "M",
"middle": [],
"last": "Ott",
"suffix": ""
},
{
"first": "Y",
"middle": [],
"last": "Choi",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Cardie",
"suffix": ""
},
{
"first": "J",
"middle": [
"T"
],
"last": "Hancock",
"suffix": ""
}
],
"year": 2011,
"venue": "Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies",
"volume": "1",
"issue": "",
"pages": "309--319",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ott, M., Choi, Y., Cardie, C., and Hancock, J. T. (2011). Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies-volume 1, pages 309- 319. Association for Computational Linguistics.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Negative deceptive opinion spam",
"authors": [
{
"first": "M",
"middle": [],
"last": "Ott",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Cardie",
"suffix": ""
},
{
"first": "J",
"middle": [
"T"
],
"last": "Hancock",
"suffix": ""
}
],
"year": 2013,
"venue": "Proceedings of the 2013 conference of the north american chapter of the association for computational linguistics: human language technologies",
"volume": "",
"issue": "",
"pages": "497--501",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ott, M., Cardie, C., and Hancock, J. T. (2013). Negative deceptive opinion spam. In Proceedings of the 2013 conference of the north american chapter of the association for computational linguistics: human language technologies, pages 497-501.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"type_str": "figure",
"num": null,
"text": "Confusion matrix of Simple Logistic classifier Confusion matrix of Logistic classifierFigure 3: Confusion matrix of Sequential Minimal Optimization classifier Confusion matrix of Random Forest classifier",
"uris": null
},
"FIGREF1": {
"type_str": "figure",
"num": null,
"text": "Web service platform process",
"uris": null
},
"TABREF0": {
"type_str": "table",
"content": "<table/>",
"text": "Percentage of correctly classified instances",
"html": null,
"num": null
},
"TABREF2": {
"type_str": "table",
"content": "<table/>",
"text": "Percentage of correctly classified instances",
"html": null,
"num": null
}
}
}
}