On Twitter Fake News Gets More Traction Than Truth

“Falsehood flies, and the truth comes limping after it,” wrote Jonathan Swift in 1710. Now a group of scientists say they have found evidence Swift was right, at least when it comes to Twitter.

In the paper, published in the authoritative journal Science, three MIT researchers describe an analysis of a vast amount of Twitter data: more than 125,000 stories, tweeted more than 4.5 million times in total, all categorised as being true or false by at least one of six independent fact-checking organisations.

The findings make for unhappy reading. “Falsehood diffused significantly farther, faster, deeper and more broadly than the truth in all categories of information,” they write, “and the effects were more pronounced for false political news than for false news about terrorism, natural disasters, science, urban legends or financial information.”

How much further? “Whereas the truth rarely diffused to more than 1,000 people, the top 1% of false-news cascades routinely diffused to between 1,000 and 100,000 people,” they write. In other words, true facts don’t get retweeted, while too-good-to-be-true claims are viral gold.

The researchers speculate that falsehoods spread so fast because they fulfil our desire for novelty. True news, hamstrung by the requirement that it has to have actually happened, is generally much alike, but fake stories can surprise and entertain with no limit.

The scientists posit that “when information is novel, it is not only surprising, but also more valuable, both from an information theoretic perspective, in that it provides the greatest aid to decision-making, and from a social perspective, as it conveys social status on one who is ‘in the know’, or has access to, unique ‘inside’ information.”

Despite recent focus on Twitter “bots”, automated accounts seemed to have little influence on the spread of false rumours. The researchers initially ran the analysis after removing all the bots they could find, but even when they added them back in, the overall conclusions remained the same.

The only major change was that bots sped up the spread of all news, true and false: “This suggests that false news spreads farther, faster, deeper and more broadly than the truth because humans, not robots, are more likely to spread it.

“This implies that misinformation containment policies should also emphasise behavioural interventions, like labelling and incentives to dissuade the spread of misinformation, rather than focusing exclusively on curtailing bots.”

Similarly, false news is not spread because of the prevalence of a few bad actors who deliberately set out to mislead. Instead, the distinction between the distribution speed of true and false rumours seems to be wholly down to the normal people in the middle of the chain: those who decide to hit retweet, or not, on any given tweet they may see.

Focusing just on reliable news organisations might help users avoid sharing fake rumours, if there were any agreement on which news organisations they were.

Instead, the researchers report, “there is no correlation between the degree to which the American public finds a source ‘reliable’ and the fraction of its verified stories which are true” as measured by Politifact.

Fox News is trusted by more than three times as many Americans as Bloomberg, while all the major TV networks are trusted by more Americans, and rated as less reliable, than the Wall Street Journal and New York Times.

Guardian

You Might Also Read: 

Prime Minister Wants A 'fake news' Rapid Response Team:

Fake News Is A Cybesecurity Threat For Businesses:

News E-models For Quality Journalism:

 

« Charities Are Vulnerable To Severe Cyber Attacks
Cybersecurity At Sea »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.