<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">833385</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2022.833385</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Exploring the Effect of Spreading Fake News Debunking Based on Social Relationship Networks</article-title>
<alt-title alt-title-type="left-running-head">Wang et al.</alt-title>
<alt-title alt-title-type="right-running-head">Effect of Debunking Fake News</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Wang</surname>
<given-names>Xin</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/1451827/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Chao</surname>
<given-names>Fan</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/1445212/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ma</surname>
<given-names>Ning</given-names>
</name>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Yu</surname>
<given-names>Guang</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1342184/overview"/>
</contrib>
</contrib-group>
<aff>
<institution>School of Management</institution>, <institution>Harbin Institute of Technology</institution>, <addr-line>Harbin</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/73038/overview">Matja&#x17e; Perc</ext-link>, University of Maribor, Slovenia</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/284636/overview">Marija Mitrovic Dankulov</ext-link>, University of Belgrade, Serbia</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/517573/overview">Valerio Restocchi</ext-link>, University of Edinburgh, United Kingdom</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Guang Yu, <email>yug@hit.edu.cn</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Social Physics, a section of the journal Frontiers in Physics</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>26</day>
<month>04</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>10</volume>
<elocation-id>833385</elocation-id>
<history>
<date date-type="received">
<day>11</day>
<month>12</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>02</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2022 Wang, Chao, Ma and Yu.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Wang, Chao, Ma and Yu</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Fake news spreads rapidly on social networks; the aim of this study is to compare the characteristics of the social relationship networks (SRNs) of refuters and non-refuters to provide a scientific basis for developing effective strategies for debunking fake news. First, based on six types of fake news published on Sina Weibo (a Chinese microblogging website) during 2015&#x2013;2019 in China, a deep learning method was used to build text classifiers for identifying debunked posts (DPs) and non-debunked posts (NDPs). Refuters and non-refuters were filtered out, and their follower&#x2013;followee relationships on social media were obtained. Second, the differences between DPs and NDPs were compared in terms of the volume and growth rate of the posts across various types of fake news. The SRNs of refuters and non-refuters and the <inline-formula id="inf1">
<mml:math id="m1">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of these SRNs were constructed, and the differences in the growth rates between DPs and NDPs were explored. Business-related fake news was revealed to be debunked better; society-related fake news, the most widely spread in China, was debunked poorly; and science- and politics-related fake news was debunked the worst. Additionally, more celebrity accounts, larger node sizes with follower-followee relationships in the SRNs, and more weakly connected components were found to lead to a faster growth rate in the dissemination of posts, regardless of whether the posts were DPs or NDPs. This study can help practitioners develop more effective strategies for debunking fake news on social media in China.</p>
</abstract>
<kwd-group>
<kwd>fake news</kwd>
<kwd>stance detection</kwd>
<kwd>deep learning</kwd>
<kwd>debunking</kwd>
<kwd>refuter</kwd>
<kwd>social relationship network</kwd>
</kwd-group>
<contract-sponsor id="cn001">National Natural Science Foundation of China<named-content content-type="fundref-id">10.13039/501100001809</named-content>
</contract-sponsor>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>Since the 2016 U.S. presidential election, &#x201c;fake news&#x201d; has become a common term in the mainstream vernacular [<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B2">2</xref>]. Similar to Western countries, fake news is also prevalent in China [<xref ref-type="bibr" rid="B3">3</xref>], and it largely involves online rumors (<italic>yao yan</italic> in Chinese [<xref ref-type="bibr" rid="B4">4</xref>]). Furthermore, with the rapid development of social networking services (SNSs), each user in a social network has become both a spreader and receiver of information, and millions of people present, comment on, or share various topics on social media every day [<xref ref-type="bibr" rid="B5">5</xref>]. In addition, the emergence of social media as an information dissemination channel has reduced the gap between content producers and consumers and profoundly changed the way users obtain information, debate, and shape their attitudes [<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B7">7</xref>]. Although authoritative organizations such as the government and news media have made considerable efforts to debunk fake news, social media enables individuals to rapidly distribute fake news through social networks owing to its abundance of users and complex network structure, causing considerable panic in society [<xref ref-type="bibr" rid="B8">8</xref>, <xref ref-type="bibr" rid="B9">9</xref>].</p>
<p>Effective debunking can be considered as a competition between debunked and non-debunked information. Thus, if we need to reduce and combat the proliferation of fake news on social media, we must improve the identification of the spread of the differences between debunked and non-debunked information on social media, make debunked information an effective hedge against non-debunked information, and understand the structure and functions of these technologically advanced social networks [<xref ref-type="bibr" rid="B10">10</xref>].</p>
<p>A better understanding of debunking strategies associated with different types of fake news can help address fake news more specifically on social media. As most researchers have concentrated on politically sensitive or field-specific fake news on social media, it has been difficult to derive common rules applicable to countering all types of fake news generated within a certain field [<xref ref-type="bibr" rid="B11">11</xref>]. Although in previous studies, the differences between the spread of facts and that of rumors on Twitter across various topics [<xref ref-type="bibr" rid="B12">12</xref>] or between the typical features of rumor and anti-rumor accounts on Sina Weibo [<xref ref-type="bibr" rid="B9">9</xref>] have been comprehensively evaluated, the differences between different types of debunked and non-debunked fake news based on real data on Chinese social media have been thoroughly assessed in only a few studies.</p>
<p>Social media (e.g., Sina Weibo) are information dissemination platforms based on social relationships (follower-followee relationships), wherein information dissemination is closely related to people&#x2019;s social relationships [<xref ref-type="bibr" rid="B13">13</xref>], especially in networks that are large, complex, heterogeneous, and scalable [<xref ref-type="bibr" rid="B14">14</xref>]. Thus, people&#x2019;s social relationships and information dissemination networks are interrelated and mutually reinforcing. The breadth and depth of people&#x2019;s social relationship networks (SRNs) determine the breadth and depth of the information they obtain and how far the dissemination of this information can spread. Although the methods used for the study of fake news, such as fake news debunking detection (e.g., using features extracted from news articles and their social contexts, such as textual features and users&#x2019; profiles [<xref ref-type="bibr" rid="B15">15</xref>]) and diffusion network structure analysis (e.g., reposting or commenting networks [<xref ref-type="bibr" rid="B16">16</xref>]), have been identified, the ways in which users&#x2019; social relationships on social networks influence the spread of debunking messages have not been widely investigated. Additionally, these problems are important to address because, if a debunking methodology for fake news is not shared quickly and widely on social networks, people will fail to combat fake news in a timely and effective manner. Consequently, false information will continue to misguide public opinion on social media [<xref ref-type="bibr" rid="B17">17</xref>].</p>
<p>To meet the aforementioned objectives, first, we used a dataset containing 49,278 posts from 176 fake news events published on Sina Weibo from July 2015 to September 2019 and divided the fake news into six topics. Second, we developed a text classifier using deep learning by applying a long short-term memory (LSTM) algorithm to identify debunked posts (DPs) and non-debunked posts (NDPs), filtered the corresponding refuters and non-refuters, and obtained 74,987 follower-followee relationships between these refuters and non-refuters. Third, we analyzed the differences in the volume and growth rates between the DPs and NDPs for each type of fake news by comparing them in terms of the number and cumulative probability distribution of the posts. Fourth, for each type of fake news, we constructed SRNs involving refuters and non-refuters and the <inline-formula id="inf2">
<mml:math id="m2">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of these SRNs; then, we investigated the proportion of each account type, the network size of the <inline-formula id="inf3">
<mml:math id="m3">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of the SRNs, and the number of weakly connected components to explore the differences in the growth rates between DPs and NDPs. Finally, we analyzed the reasons for these differences across different types of fake news. Based on these results, we propose personalized and real-time governance strategies to serve as a guide for promoting healthier behavior among social media users and minimize the spread of fake news.</p>
<p>The contributions of this study are significant both in theory and practice. First, unlike previous research that focused on the sharing of fake news [<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B18">18</xref>], in this study, by using deep learning method and social network analysis method, we focus on the comparison of differences between the debunking and non-debunking of fake news across various topics and systematically construct, compare, and analyze the SRNs of refuters or non-refuters to provide strategies for combating various categories of fake news on Chinese social media at the macro level. Thus, we shift the scholarly focus from the dominant area of fake news information sharing to the emerging area of employing users and the social relationships among them to combat various types of fake news on Chinese social media platforms. Second, on a practical level, the &#x201c;fake news&#x201d; literature in China is expanded by focusing on various types of day-to-day online rumors on social media available from a large volume of fake news datasets. This study provides insight to practitioners such as social media managers, government staff, news authorities, and media staff on ways to debunk different types of fake news using targeted and personalized governance strategies.</p>
<p>The remainder of this paper is structured as follows. <italic>Related Work</italic> introduces work related to this study. <italic>Materials and Methods</italic> describes the data and methods. <italic>Results</italic> details the results of the experiments. <italic>Discussion</italic> presents a discussion on this study, the limitations of this study, and a scope for future work. <italic>Conclusion</italic> provides the conclusions of the study.</p>
</sec>
<sec id="s2">
<title>Related Work</title>
<p>Before introducing the study problem, we provide brief remarks on the terminology used. Researchers have provided different interpretations of the definitions and connotations of fake news, misinformation, and rumors; these terms are often used interchangeably in academic research [<xref ref-type="bibr" rid="B19">19</xref>]. First, we disregarded the politicized nature that the term &#x201c;fake news&#x201d; has indicated, especially since the 2016 U.S. presidential elections. Second, we adopted a broader definition of news on social media: it includes any information (e.g., text, emoticons, and links) posted on social media [<xref ref-type="bibr" rid="B12">12</xref>]. Third, we did not consider the intentions behind those who posted the online information [<xref ref-type="bibr" rid="B2">2</xref>] and the differences between automated social robots and humans [<xref ref-type="bibr" rid="B12">12</xref>]. For these reasons and owing to its useful scientific meaning and construction, we retained the term &#x201c;fake news,&#x201d; which is used by most researchers, to represent our research objective [<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B8">8</xref>]; this term refers to false news or false rumors stemming from authorities&#x2019; (e.g., government agencies, state media, and other authoritative organizations) statements that were determined to be false.</p>
<p>Social media platforms employ different approaches to combat online fake news. The first key strategy is to undermine economic incentives and shift focus to developing technical solutions to help users make more informed decisions [<xref ref-type="bibr" rid="B20">20</xref>], for example, by showing warning messages and relying on fact-checking units [<xref ref-type="bibr" rid="B2">2</xref>, <xref ref-type="bibr" rid="B8">8</xref>, <xref ref-type="bibr" rid="B17">17</xref>, <xref ref-type="bibr" rid="B21">21</xref>&#x2013;<xref ref-type="bibr" rid="B24">24</xref>]. In this context, Hoaxy is a platform used for the collection, detection, analysis, and fact-checking of fraudulent online content from various viewpoints [<xref ref-type="bibr" rid="B22">22</xref>]. It was tested by collecting approximately 1,442,295 tweets and articles from 249,659 different users [<xref ref-type="bibr" rid="B16">16</xref>]. Content from news websites and social media was fed into a database that was updated on a regular basis, and it was analyzed to extract different hidden patterns [<xref ref-type="bibr" rid="B22">22</xref>]. Pennycook et al. selected fake news headlines from <ext-link ext-link-type="uri" xlink:href="http://Snopes.com">Snopes.com</ext-link>, a third-party website that fact-checks news stories, to investigate whether warning tags would effectively reduce belief in fake news by a prominent intervention that involved attaching warnings to the headlines of news stories that have been disputed by third-party fact-checkers [<xref ref-type="bibr" rid="B24">24</xref>]. Although researchers and online fact-checking organizations are continuously improving their fact-checking measures against the spread of fake news, most fact-checking processes depend on human labor, which requires considerable time and money [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B26">26</xref>]. Despite recent advancements in automatic detection, identification models for fact checking lack the required adaptive and systematic applications [<xref ref-type="bibr" rid="B2">2</xref>]. <xref ref-type="table" rid="T1">Table 1</xref> lists popular fact-checking analysis tools that are used to check the authenticity of online content.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Summary of some previous work related to debunking fake news.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Category</th>
<th align="center">References</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Fact Checking</td>
<td align="left">CredFinder [<xref ref-type="bibr" rid="B21">21</xref>]; Hoaxy [<xref ref-type="bibr" rid="B22">22</xref>]; Snopes [<xref ref-type="bibr" rid="B24">24</xref>]; PolitiFact, FactCheck, TruthOrFiction, and Sina Community Management Centre [<xref ref-type="bibr" rid="B2">2</xref>, <xref ref-type="bibr" rid="B8">8</xref>, <xref ref-type="bibr" rid="B17">17</xref>, <xref ref-type="bibr" rid="B23">23</xref>]</td>
</tr>
<tr>
<td align="left">Source Detection</td>
<td align="left">Source localization algorithm for probabilistic weighted graph [<xref ref-type="bibr" rid="B34">34</xref>]; path-based approach [<xref ref-type="bibr" rid="B31">31</xref>]; variants of epidemic models [<xref ref-type="bibr" rid="B32">32</xref>]; and batch and interactive query approaches [<xref ref-type="bibr" rid="B33">33</xref>]</td>
</tr>
<tr>
<td align="left">Propagation Dynamics</td>
<td align="left">Soft computing models, such as the heat energy model [<xref ref-type="bibr" rid="B36">36</xref>]<break/>Epidemiological models and their variants, such as the SI model, SIR model, SIS model, SIRS model, SEIS model [<xref ref-type="bibr" rid="B37">37</xref>], and G-SCNDR model [<xref ref-type="bibr" rid="B38">38</xref>]<break/>Mathematical models, such as the linear threshold model [<xref ref-type="bibr" rid="B41">41</xref>], independent cascade model [<xref ref-type="bibr" rid="B40">40</xref>], and stochastic model [<xref ref-type="bibr" rid="B39">39</xref>]</td>
</tr>
<tr>
<td align="left">Fake News Detection</td>
<td align="left">Datasets and experimental settings, including the details of the dataset, size, amount of fake or real news, and information used for detection [<xref ref-type="bibr" rid="B12">12</xref>, <xref ref-type="bibr" rid="B43">43</xref>&#x2013;<xref ref-type="bibr" rid="B46">46</xref>]<break/>Handcrafted feature extraction, including text (e.g., number of words and/or sentences [<xref ref-type="bibr" rid="B48">48</xref>], first/second/third person pronouns [<xref ref-type="bibr" rid="B47">47</xref>]), sentiment analysis (positive, negative, any other [<xref ref-type="bibr" rid="B12">12</xref>]), images (e.g., number of faces [<xref ref-type="bibr" rid="B47">47</xref>], image statistical features [<xref ref-type="bibr" rid="B49">49</xref>]), users (e.g., name, location, gender [<xref ref-type="bibr" rid="B50">50</xref>]), messages [e.g., messages with URL [<xref ref-type="bibr" rid="B50">50</xref>] or hashtags (&#x23;) [<xref ref-type="bibr" rid="B51">51</xref>]], propagation (e.g., degree of root in a propagation tree, depth of the propagation tree [<xref ref-type="bibr" rid="B52">52</xref>]), structural [<xref ref-type="bibr" rid="B48">48</xref>], temporal [<xref ref-type="bibr" rid="B53">53</xref>], and linguistic specific features [<xref ref-type="bibr" rid="B54">54</xref>]<break/>Studying network structures, including getting credibility assessment methods [<xref ref-type="bibr" rid="B55">55</xref>, <xref ref-type="bibr" rid="B56">56</xref>] and modeling network structures and the user connectivity of online social networks (e.g., generative graph models [<xref ref-type="bibr" rid="B57">57</xref>])<break/>Machine learning and deep learning classifiers, including machine learning techniques [e.g., SVM, decision tree, k-NN algorithm, random forest (RF)] and deep learning techniques (e.g., RNN, LSTM) [<xref ref-type="bibr" rid="B59">59</xref>&#x2013;<xref ref-type="bibr" rid="B64">64</xref>, <xref ref-type="bibr" rid="B66">66</xref>, <xref ref-type="bibr" rid="B67">67</xref>]<break/>Other methods, such as cognitive psychology methods [<xref ref-type="bibr" rid="B65">65</xref>]</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Social network analysis has become a widely accepted tool [<xref ref-type="bibr" rid="B27">27</xref>]. Thus, the second key strategy is broadcasting denials to the public to prevent the exposure of individuals to fake news on social media [<xref ref-type="bibr" rid="B8">8</xref>], which can reduce the possibility of fake news spreading [<xref ref-type="bibr" rid="B28">28</xref>]. Fake news often spreads over social media through interpersonal communication [<xref ref-type="bibr" rid="B23">23</xref>], and personal involvement remains a salient construct of the spread of fake news on social media [<xref ref-type="bibr" rid="B29">29</xref>]. Thus, the key approach to combat the spread of fake news is to use the power of social relationships on social networks to spread messages from one individual to another [<xref ref-type="bibr" rid="B30">30</xref>]. Some researchers preferred to examine interventions on social networks that might be effective in debunking fake news by using source detection, i.e., finding out the person or location from whom or where the false information in the social network or web started spreading [<xref ref-type="bibr" rid="B16">16</xref>, <xref ref-type="bibr" rid="B31">31</xref>&#x2013;<xref ref-type="bibr" rid="B35">35</xref>] (see <xref ref-type="table" rid="T1">Table 1</xref>). For example, Shelke and Attar provided a state-of-the-art survey of different source detection methodologies along with different available datasets and experimental setups in case of existing single and multiple misinformation sources [<xref ref-type="bibr" rid="B35">35</xref>]. Whereas other researchers preferred to investigate the propagation dynamics of fake news [<xref ref-type="bibr" rid="B16">16</xref>]. As shown in <xref ref-type="table" rid="T1">Table 1</xref>, the prominent methods of fake news diffusion models available in the literature can be classified into three major categories: soft computing [<xref ref-type="bibr" rid="B36">36</xref>], epidemiological [<xref ref-type="bibr" rid="B37">37</xref>, <xref ref-type="bibr" rid="B38">38</xref>], and mathematical approaches [<xref ref-type="bibr" rid="B39">39</xref>&#x2013;<xref ref-type="bibr" rid="B41">41</xref>]. It is hard to execute these approaches because most of these studies are based on complex mathematical, physical, and epidemiological models; furthermore, in the real world, users may go beyond just controlling the simulation settings in the diffusion models [<xref ref-type="bibr" rid="B17">17</xref>].</p>
<p>The third key strategy is fake news detection. Different artificial intelligence algorithms along with cognitive psychology and mathematical models are used to identify false content [<xref ref-type="bibr" rid="B16">16</xref>]. As the assessment of the veracity of a news story is complex from an engineering point of view, the research community is approaching this task from different perspectives; <xref ref-type="table" rid="T1">Table 1</xref> presents some prominent research on datasets, experimental settings, training, validation, and testing methods used in various machine learning and deep learning technologies, and other methods to address the issue [<xref ref-type="bibr" rid="B16">16</xref>, <xref ref-type="bibr" rid="B42">42</xref>] (see <xref ref-type="table" rid="T1">Table 1</xref>).</p>
<p>As presented in <xref ref-type="table" rid="T1">Table 1</xref>, the first research aspect is the study of datasets and experimental settings. Different formats of datasets are used for content and behavioral analyses such as text tweets, images, headlines, news articles, URLs, users&#x2019; comments, suggestions, and discussions on particular events [<xref ref-type="bibr" rid="B16">16</xref>]. Most researchers used Twitter, Sina Weibo, and Facebook&#x2019;s Application Programming Interface (API) for collecting and analyzing rumors and fake news as data sources [<xref ref-type="bibr" rid="B12">12</xref>, <xref ref-type="bibr" rid="B43">43</xref>, <xref ref-type="bibr" rid="B44">44</xref>], whereas other researchers preferred using a data repository such as FakeNewsNet that contains two comprehensive datasets PolitiFact and GossipCop to facilitate research in the field of fake news analysis [<xref ref-type="bibr" rid="B45">45</xref>]. These datasets collect multi-dimensional information from news content and social contexts and spatiotemporal data from diverse news domains [<xref ref-type="bibr" rid="B16">16</xref>]. In addition, some researchers compared the details of some of the widely used datasets and experimental setups in detail [<xref ref-type="bibr" rid="B46">46</xref>].</p>
<p>The second research aspect is the study of handcrafted feature extraction. Machine and deep learning are prominent techniques for designing models for detecting false information. The effectiveness of these algorithms mainly depends on pattern analysis and feature extraction of text [<xref ref-type="bibr" rid="B12">12</xref>, <xref ref-type="bibr" rid="B47">47</xref>, <xref ref-type="bibr" rid="B48">48</xref>], images [<xref ref-type="bibr" rid="B47">47</xref>, <xref ref-type="bibr" rid="B49">49</xref>], users [<xref ref-type="bibr" rid="B50">50</xref>] messages [<xref ref-type="bibr" rid="B50">50</xref>, <xref ref-type="bibr" rid="B51">51</xref>], propagation [<xref ref-type="bibr" rid="B52">52</xref>], structural [<xref ref-type="bibr" rid="B48">48</xref>], temporal [<xref ref-type="bibr" rid="B53">53</xref>], and linguistic specific features [<xref ref-type="bibr" rid="B16">16</xref>, <xref ref-type="bibr" rid="B54">54</xref>] (see <xref ref-type="table" rid="T1">Table 1</xref>).</p>
<p>The third research aspect is the study of network structures. Network structures are innovative methods of assessing the credibility of a target article [<xref ref-type="bibr" rid="B55">55</xref>]. For example, Ishida and Kuraya proposed a bottom-up approach with relative, mutual, and dynamic credibility evaluation using a dynamic relational network (or mutual evaluation model) of related news articles, wherin each node can evaluate and in turn be evaluated by other nodes for credibility based on the consistency of the content of the node [<xref ref-type="bibr" rid="B56">56</xref>]. In addition, to model network structures and the user connectivity of online social networks, scalable synthetic graph generators were used by researchers. These generators provided a wide variety of generative graph models that could be used by researchers to generate graphs based on the extraction of different features such as propagation, temporal, connectivity, follower-followee relationship [<xref ref-type="bibr" rid="B16">16</xref>]. For example, Edunov et al. proposed Darwini, a graph generator that captures several core characteristics of real graphs and can be used efficiently to study the propagation and detection of false content by generating different social connections in the form of a graph [<xref ref-type="bibr" rid="B57">57</xref>]. To accomplish this, Darwini produces local clustering coefficients, degree distributions, node page ranks, eigenvalues, and many other matrices [<xref ref-type="bibr" rid="B57">57</xref>].</p>
<p>The fourth research aspect is the study of machine learning and deep learning classifiers. Some scholars have investigated real-time data in social media sites using stance detection methods to identify people who are supportive, neutral, or opposed to fake news [<xref ref-type="bibr" rid="B58">58</xref>]. These methods are widely based on the computation of machine or deep learning algorithms to achieve open or target-specific classification [<xref ref-type="bibr" rid="B59">59</xref>&#x2013;<xref ref-type="bibr" rid="B61">61</xref>]. For example, P&#xe9;rez-Rosas et al. focused on the linguistic differences between fake news and legitimate news content by using machine learning techniques, including a linear support vector machine (SVM) classifier, and obtained 78% accuracy in detecting fake news on two novel datasets [<xref ref-type="bibr" rid="B62">62</xref>]. The major disadvantage of machine-learning-based models is that they are dependent on hand-crafted features that require exhaustive, meticulous, detailed, and biased human efforts; thus, recent technologies are shifting the trend towards deep learning-based models [<xref ref-type="bibr" rid="B16">16</xref>]. For example, Zarrella and Marsh applied a recurrent neural network (RNN) initialized with features learned <italic>via</italic> distant supervision to tackle the SemEval-2016 task 6 (Detecting Stance in Tweets, Subtask A: Supervised Frameworks) [<xref ref-type="bibr" rid="B63">63</xref>]. In parallel, they trained embeddings of words and phrases with the word2vec Skip-Gram method. This effort achieved the top score among 19 systems with an F1 score of 67.8%, and one of 71.1% in a non-official test. Poddar et al. developed a novel neural architecture for detecting the veracity of a rumor using the stances of people engaging in a conversation about it on Twitter [<xref ref-type="bibr" rid="B64">64</xref>]. Taking into consideration the conversation tree structure, the proposed CT-Stance model (stance predictor model) achieved the best performance with an accuracy of 79.86% when considering all three realistically available signals (target a tweet, conversation sequence, time). In addition, there are other fake news detection methods, such as the use of cognitive psychology to analyze human perceptions. For example, Kumar and Geethakumari explored the use of cognitive psychology concepts to evaluate the spread of misinformation, disinformation, and propaganda in online social networks by examining four main ingredients: the coherency of the message, credibility of the source, consistency of the message, and general acceptability of the message; they used the collaborative filtering property of social networks to detect any existing misinformation, disinformation, and propaganda [<xref ref-type="bibr" rid="B65">65</xref>].</p>
<p>Based on the analysis of the aforementioned related work, some previous studies on fake news debunking are summarized in <xref ref-type="table" rid="T1">Table 1</xref>. First, the differences between different types of debunked and non-debunked fake news based on real data on Chinese social media have not been comprehensively assessed; second, the ways in which users&#x2019; social relationships on social networks influence the spread of debunking messages have also not been fully investigated. Unlike previous studies, we used a deep learning method to build text classifiers for identifying debunked posts (DPs) and non-debunked posts (NDPs), and filtered out refuters and non-refuters. Then based on social analysis method, we focused on the empirical analysis of real data on Chinese social media platforms by comparing the characteristics of the SRNs of refuters and non-refuters, and we tried to discover useful strategies for debunking different categories of fake news effectively.</p>
</sec>
<sec sec-type="materials|methods" id="s3">
<title>Materials and Methods</title>
<sec id="s3-1">
<title>Study Context and Data Collection</title>
<p>Sina Weibo, often referred to as &#x201c;Chinese Twitter,&#x201d; is one of the most influential social network platforms in China [<xref ref-type="bibr" rid="B68">68</xref>]. Twitter is a widely used microblogging platform worldwide, and its content is mainly written in English, while Sina Weibo is the most famous microblogging platform in China, where all posts are written in Chinese [<xref ref-type="bibr" rid="B69">69</xref>]. Social media are known as interactive computer-mediated technologies that allow people to create, share or exchange information [<xref ref-type="bibr" rid="B69">69</xref>]. The increasing popularity of social media websites and Web 2.0 has led to an exponential growth of user-generated content, especially text content on the Internet [<xref ref-type="bibr" rid="B69">69</xref>], which generates a large amount of unstructured text data and provides data support for our research. Thus, to avoid selection bias in the data, our data were collected from Zhiwei Data Sharing Platform&#x2019;s (hereinafter referred to as Zhiwei Data) database that contains fake news of public events posted on Sina Weibo from July 2015 to September 2019, among which all the fake news events have been verified as &#x201c;false.&#x201d; We then obtained 176 widely spread fake news events, for a total of 49,278 posts. We also cooperated with Zhiwei Data to obtain user profiles through the business API of Sina Weibo, including the demographic characteristics of the users, such as their names, genders, types of accounts, locations, the number of their posts, followees, and followers, the source of their posts, and their posting times.</p>
<p>As publicly available data were used in this study, we only referred to the summarized results and did not derive any sensitive data. Information on the individuals studied in this research has not been published elsewhere.</p>
</sec>
<sec id="s3-2">
<title>Methodology</title>
<sec id="s3-2-1">
<title>Identification of Debunked Fake News Posts</title>
<p>Fake news contains partly true, false, and mixed information; thus, researchers need to know what kind of opinions are expressed by people communicating on social media; this can be determined through stance detection [<xref ref-type="bibr" rid="B58">58</xref>]. A stance is a person&#x2019;s opinion on or attitude toward some target entity, idea, or event determined from a posting, e.g., &#x201c;in favor of,&#x201d; &#x201c;neutral,&#x201d; &#x201c;against,&#x201d; [<xref ref-type="bibr" rid="B70">70</xref>], &#x201c;support,&#x201d; &#x201c;deny,&#x201d; &#x201c;comment,&#x201d; or &#x201c;query&#x201d; [<xref ref-type="bibr" rid="B71">71</xref>]. According to the content of 176 fake news events, we considered both subjective expressions and their corresponding targets, which might not be explicitly mentioned, and labeled each stance with respect to a specific target of each event; each stance was divided into two relative standpoints, &#x201c;against&#x201d; and &#x201c;other,&#x201d; corresponding to DPs from refuters and NDPs from non-refuters, respectively. Additionally, a text classifier was developed to detect DPs, which indicated that people who made these posts were against fake news. Although we acknowledge that binary labeling has certain limitations, for our current research, we highlighted the main research objectives as well as the overwhelming advantages of this straightforward and simple classification when compared to its weaknesses [<xref ref-type="bibr" rid="B72">72</xref>].</p>
<p>Stance detection is an area with closely related subjects [<xref ref-type="bibr" rid="B58">58</xref>]. Thus, it is modeled as a supervised learning process to achieve better results when a training dataset is required. Therefore, to obtain a fully available dataset, we asked three members of our team to label posts using an &#x201c;against&#x201d; or &#x201c;other&#x201d; stance. Two members with a detailed understanding of fake news labeled 10,000 posts, which were randomly selected from 49,278 posts. Furthermore, we tackled this labeling analysis based on the conversations stemming from direct and nested replies to the posts originating from fake news [<xref ref-type="bibr" rid="B71">71</xref>]. Next, these two members discussed all the annotation results and reannotated the posts to agree on the differences. Finally, a third member randomly selected 1,000 posts from 10,000 posts for an annotation to calculate the intercoder reliability. In addition, Cohen&#x2019;s kappa is popular descriptive statistics for summarizing the cross-classification of two nominal variables with <inline-formula id="inf4">
<mml:math id="m4">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> identical categories [<xref ref-type="bibr" rid="B73">73</xref>, <xref ref-type="bibr" rid="B74">74</xref>]. An <inline-formula id="inf5">
<mml:math id="m5">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> table can for example, be obtained by cross-classifying the ratings of two observers that each have classified a group of objects into <inline-formula id="inf6">
<mml:math id="m6">
<mml:mi>n</mml:mi>
</mml:math>
</inline-formula> categories. In this case, the <inline-formula id="inf7">
<mml:math id="m7">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> table can be referred to as an agreement table, since it reflects how the ratings of the two observers agree and disagree [<xref ref-type="bibr" rid="B73">73</xref>]. Based on the above analysis, to calculate the inter-annotator agreement, we assessed the validity of the annotation scheme using Cohen&#x2019;s kappa. The Cohen&#x2019;s kappa (<inline-formula id="inf8">
<mml:math id="m8">
<mml:mi>&#x3ba;</mml:mi>
</mml:math>
</inline-formula>) value for the members was 0.889 (<inline-formula id="inf9">
<mml:math id="m9">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.001</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>), indicating a good agreement between them [<xref ref-type="bibr" rid="B75">75</xref>]. Finally, 5,613 DPs were labeled from the 10,000 posts.</p>
<p>According to the external references in a stop word dictionary, we used Python&#x2019;s (Version 3.6.2) regular expressions to clean the sample data (including the compile and sub methods in Python&#x2019;s RE package), including removing the relevant stop words (based on the list of stop words produced by the Harbin Institute of Technology), URLs, and punctuation and correcting any misspelt words. Then, we created our user dictionary, which includes some terms related to the 176 fake news events, and we used the Jieba Chinese text segmentation module in Python, one of the most widely used word segmentation tools for the Chinese, to segment the sample data. We then used word2vec from Google for word embedding [<xref ref-type="bibr" rid="B76">76</xref>]. The vector representations of words learned by word2vec can extract the deep semantic relationships between words, contributing more to text classification [<xref ref-type="bibr" rid="B77">77</xref>].</p>
<p>A long short-term memory (LSTM [<xref ref-type="bibr" rid="B78">78</xref>]) network was developed on the basis of recurrent neural networks (RNNs), which are capable of processing serialized information through their recurrent structures, to solve problems related to gradient vanishing or exploding [<xref ref-type="bibr" rid="B79">79</xref>]. LSTM does show a remarkable ability in processing natural language. Particularly, on Chinese social media posts where the words have complex context-dependent relationships, LSTM models perform well in applications with text classification tasks [<xref ref-type="bibr" rid="B79">79</xref>, <xref ref-type="bibr" rid="B80">80</xref>]. Therefore, a deep neural network with an LSTM algorithm was employed to build the text classifier. In the LSTM model training process, the hyperparameter is a parameter that sets the value before the model is trained. Generally, the hyperparameters need to be optimized, and a set of optimal hyperparameters is selected for the model to improve the quality of the learning [<xref ref-type="bibr" rid="B81">81</xref>]. To prevent the overfitting problem of the model in the training process, we selected some appropriate combinations of parameters to train the model, and the hyperparameter configuration of the model was as follows: batch size &#x3d; 512; maximum length of the sentence &#x3d; 70; dropout &#x3d; 0.5; activation &#x3d; sigmoid; loss function &#x3d; binary cross-entropy.</p>
<p>Then, we tested the vector dimensions of 50, 100, 150, &#x2026; , 450, and 500 to obtain the best word vector dimension. We chose accuracy and F1 score as metrics to measure the performance of the classifiers [<xref ref-type="bibr" rid="B82">82</xref>]. A 10-fold cross-validation technique was also adopted to train our classifier and evaluate the performance of our classification algorithm. The experimental results of the classification are presented in <xref ref-type="table" rid="T2">Table 2</xref>. Compared with other dimensions, the experimental results had a relatively high accuracy of 90.98% and an F1 score of 92.05% with a word vector dimension of 350. Thus, we used a word vector dimension of 350 to build our classification. Finally, we obtained 25,856 DPs from 6,114 refuters and 23,422 NDPs from 8,285 non-refuters using our classifier. A flowchart for identifying debunked fake news posts is shown in <xref ref-type="fig" rid="F1">Figure 1</xref> [see procedures (1&#x2013;5) in <xref ref-type="fig" rid="F1">Figure 1</xref>].</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Results of the classification.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Dimensions of vectors</th>
<th align="center">Accuracy (%)</th>
<th align="center">F1 score (%)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">50</td>
<td align="char" char=".">86.37</td>
<td align="char" char=".">88.63</td>
</tr>
<tr>
<td align="left">100</td>
<td align="char" char=".">89.58</td>
<td align="char" char=".">91.02</td>
</tr>
<tr>
<td align="left">150</td>
<td align="char" char=".">89.68</td>
<td align="char" char=".">90.78</td>
</tr>
<tr>
<td align="left">200</td>
<td align="char" char=".">90.58</td>
<td align="char" char=".">91.44</td>
</tr>
<tr>
<td align="left">250</td>
<td align="char" char=".">90.88</td>
<td align="char" char=".">91.94</td>
</tr>
<tr>
<td align="left">300</td>
<td align="char" char=".">90.38</td>
<td align="char" char=".">91.64</td>
</tr>
<tr>
<td align="left">350</td>
<td align="char" char=".">90.98</td>
<td align="char" char=".">92.05</td>
</tr>
<tr>
<td align="left">400</td>
<td align="char" char=".">90.38</td>
<td align="char" char=".">91.13</td>
</tr>
<tr>
<td align="left">450</td>
<td align="char" char=".">90.48</td>
<td align="char" char=".">91.66</td>
</tr>
<tr>
<td align="left">500</td>
<td align="char" char=".">90.78</td>
<td align="char" char=".">91.70</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Process for research procedures.</p>
</caption>
<graphic xlink:href="fphy-10-833385-g001.tif"/>
</fig>
</sec>
<sec id="s3-2-2">
<title>Qualitative Classification of Account Types and Fake News Topics</title>
<p>First, to analyze and examine how various accounts (refuters and non-refuters) were involved in DPs and NDPs, we referred to account classification standards based on the Sina Weibo certification on their homepages, which includes ten types of accounts: ordinary, media, government, celebrity, Weibo&#x2019;s got talent, enterprise, campus, organization, website, and Weibo girl.</p>
<p>Second, we referenced the fake news classification standards of Twitter [<xref ref-type="bibr" rid="B12">12</xref>] and previous studies regarding the rumor classification standards of Sina Weibo in China [<xref ref-type="bibr" rid="B83">83</xref>]. We divided the fake news into six categories using the Zhiwei Data&#x2019;s classification criteria: society, health, business, science and technology (hereinafter referred to as science), disaster, and politics and finance (hereinafter referred to as politics) (<xref ref-type="table" rid="T3">Table 3</xref>). We also asked three annotators from Zhiwei Data to label 176 events according to these six categories. Additionally, the Cohen&#x2019;s kappa (<inline-formula id="inf10">
<mml:math id="m10">
<mml:mi>&#x3ba;</mml:mi>
</mml:math>
</inline-formula>) value for the annotators was 0.961 (<inline-formula id="inf11">
<mml:math id="m11">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.001</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>), indicating that the classification results were robust.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Examples for six categories of fake news (Translated into English from Chinese).</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Category</th>
<th align="center">Example</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="2" align="left">Society</td>
<td align="left">&#x25cf; Netizens reporting that children in Bijie&#x2019;s orphanage were sexually abused was a rumor</td>
</tr>
<tr>
<td align="left">&#x25cf; A courier crying in the rain because of a quarrel with his girlfriend was a rumor</td>
</tr>
<tr>
<td align="left">Health</td>
<td align="left">&#x25cf; Ham and bacon being carcinogenic when taken with arsenic was a rumor<break/>&#x25cf; Meat pine in meat muffin being made of cotton was a rumor</td>
</tr>
<tr>
<td align="left">Business</td>
<td align="left">&#x25cf; Was the woman involved in the case of Qiangdong Liu taken into custody? The U.S. police responded that it was not true<break/>&#x25cf; Huawei dispelled the rumor that cooperation with the Longping Yuan company to cultivate rice was a rumor</td>
</tr>
<tr>
<td align="left">Science and Technology</td>
<td align="left">&#x25cf; Officials dispelled the rumor that the third generation ID card increased the positioning function was a rumor<break/>&#x25cf; The possibility of the electronic marriage certificate replacing the paper certificate was a rumor</td>
</tr>
<tr>
<td align="left">Disaster</td>
<td align="left">&#x25cf; The Gansu Zhangye 5.0 magnitude earthquake causing the road to vibrate in a &#x201c;wave-like&#x201d; manner was a rumor<break/>&#x25cf; Heavy rainstorm in the Sichuan Province due to the movement of a &#x201c;water beast&#x201d; was a rumor</td>
</tr>
<tr>
<td align="left">Politics and Finance</td>
<td align="left">&#x25cf; The China&#x2013;U.S. trade war ceasefire was a rumor<break/>&#x25cf; Stopping the circulation of one-yuan banknotes in the near future was a rumor</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>Notes: Data Source: Zhiwei Data Sharing Platform (<ext-link ext-link-type="uri" xlink:href="http://university.zhiweidata.com/">http://university.zhiweidata.com/</ext-link>).</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>For each type of fake news, we used the number of posts to indicate the spreading volumes of the DPs and NDPs. We also sorted each event in ascending order according to the time of the post and calculated the relative hours of any post relative to the first post in each news event. For the six types of fake news, we aggregated all their corresponding events. Here, the epoch <inline-formula id="inf12">
<mml:math id="m12">
<mml:mi>t</mml:mi>
</mml:math>
</inline-formula> was set to 1&#xa0;h because of data sparsity and the 24&#xa0;h daily schedule. Therefore, for the six types of fake news, we used <inline-formula id="inf13">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to represent the cumulative probability of propagation at any hour <inline-formula id="inf14">
<mml:math id="m14">
<mml:mi>t</mml:mi>
</mml:math>
</inline-formula> of the DPs or NDPs to indicate the growth rates of their spread, based on the method of Liu et al. [<xref ref-type="bibr" rid="B84">84</xref>], and we defined the following:<disp-formula id="e1">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>n</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>n</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>&#x2192;</mml:mo>
<mml:mi>&#x221e;</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:math>
<label>(1)</label>
</disp-formula>where <inline-formula id="inf15">
<mml:math id="m16">
<mml:mrow>
<mml:msub>
<mml:mi>n</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> represents the cumulative total of the posts with the type <inline-formula id="inf16">
<mml:math id="m17">
<mml:mi>j</mml:mi>
</mml:math>
</inline-formula> in the fake news of category <inline-formula id="inf17">
<mml:math id="m18">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula> until time <inline-formula id="inf18">
<mml:math id="m19">
<mml:mi>t</mml:mi>
</mml:math>
</inline-formula>, <inline-formula id="inf19">
<mml:math id="m20">
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2192;</mml:mo>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> denotes the time when the propagation of the fake news of category <inline-formula id="inf20">
<mml:math id="m21">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula> ends, <inline-formula id="inf21">
<mml:math id="m22">
<mml:mi>j</mml:mi>
</mml:math>
</inline-formula> represents two types of posts (<inline-formula id="inf22">
<mml:math id="m23">
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, DPs; <inline-formula id="inf23">
<mml:math id="m24">
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, NDPs), <inline-formula id="inf24">
<mml:math id="m25">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula> represents six categories of fake news (<inline-formula id="inf25">
<mml:math id="m26">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>6</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> which represents society, health, business, science, disaster, and politics, respectively).</p>
</sec>
<sec id="s3-2-3">
<title>Social Relationship Network Construction and Analysis</title>
<p>On Sina Weibo, users (followers) may choose to follow any other users (followees); thus, they can automatically receive all the posts published by their followees, such as on Twitter [<xref ref-type="bibr" rid="B85">85</xref>]. Here, an SRN with weak ties is formed; users can easily follow many people without talking to them directly. Thus, we filtered out all the follower-followee relationships (hereinafter referred to as following relationships) of 6,114 refuters and 8,285 non-refuters involved in spreading fake news. We also filtered the source nodes (followers) and target nodes (followees) in the following relationship of users involved in fake news propagation and finally obtained 74,987 following relationships.</p>
<p>A set of following relationships and the set of Sina Weibo users connected by these relationships formed an SRN [<xref ref-type="bibr" rid="B85">85</xref>]. Relationships between people can be captured as graphs where vertices represent entities and edges represent connections among them [<xref ref-type="bibr" rid="B86">86</xref>]. A <inline-formula id="inf26">
<mml:math id="m27">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core of a graph is a maximal connected subgraph in which every vertex is connected to at least <inline-formula id="inf27">
<mml:math id="m28">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula> vertices in the subgraph [<xref ref-type="bibr" rid="B87">87</xref>]. The <inline-formula id="inf28">
<mml:math id="m29">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition of a graph maintains, for each vertex, the max-<inline-formula id="inf29">
<mml:math id="m30">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula> value: the maximum <inline-formula id="inf30">
<mml:math id="m31">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula> value for which a <inline-formula id="inf31">
<mml:math id="m32">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core containing the vertex exists [<xref ref-type="bibr" rid="B86">86</xref>]. At the same time, <inline-formula id="inf32">
<mml:math id="m33">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition is often used in large-scale network analysis [<xref ref-type="bibr" rid="B86">86</xref>]. For example, the <inline-formula id="inf33">
<mml:math id="m34">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition was recently applied to several real-world networks (the Internet, the WWW, etc.) and was turned out to be an important tool for visualization of complex networks and interpretation of cooperative processes in them [<xref ref-type="bibr" rid="B87">87</xref>, <xref ref-type="bibr" rid="B88">88</xref>]. Thus, to explore the network structure of the participants&#x2019; social relationships, for both refuters and non-refuters, we established SRNs under each topic and their <inline-formula id="inf34">
<mml:math id="m35">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions based on the following relationships between the users (2 &#xd7; 2 &#xd7; 6 &#x3d; 24); the networks were directed and unweighted. In an SRN, each user is a node; if user <inline-formula id="inf35">
<mml:math id="m36">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula> follows user <inline-formula id="inf36">
<mml:math id="m37">
<mml:mi>j</mml:mi>
</mml:math>
</inline-formula>, then there is a directed edge from <inline-formula id="inf37">
<mml:math id="m38">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula> to <inline-formula id="inf38">
<mml:math id="m39">
<mml:mi>j</mml:mi>
</mml:math>
</inline-formula>, and isolated nodes denote users without a following relationship with anyone in the network. To better investigate the following relationships between refuters in DPs and those between non-refuters in NDPs, we divided all the users participating in the discussion into four categories for each type of fake news as follows: SRN of refuters (refuter&#x2013;refuter SRN, R&#x2013;R), <inline-formula id="inf39">
<mml:math id="m40">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition of SRN of refuters (refuter&#x2013;refuter <inline-formula id="inf40">
<mml:math id="m41">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition of SRN, R<sub>k</sub>&#x2013;R<sub>k</sub>), SRN of non-refuters (non-refuter&#x2013;non-refuter SRN, NR&#x2013;NR), and <inline-formula id="inf41">
<mml:math id="m42">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition of SRN of non-refuters (non-refuter&#x2013;non-refuter <inline-formula id="inf42">
<mml:math id="m43">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition of SRN, NR<sub>k</sub>&#x2013;NR<sub>k</sub>).</p>
<p>We computed the following set of basic network properties, which allowed us to encode each network according to a tuple of features: (1) the average degree (<inline-formula id="inf43">
<mml:math id="m44">
<mml:mrow>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>&#x3e;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>), (2) the diameter (<inline-formula id="inf44">
<mml:math id="m45">
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula>), (3) the average clustering coefficient (<inline-formula id="inf45">
<mml:math id="m46">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>), and (4) the average path length (<inline-formula id="inf46">
<mml:math id="m47">
<mml:mi>L</mml:mi>
</mml:math>
</inline-formula>) [<xref ref-type="bibr" rid="B15">15</xref>, <xref ref-type="bibr" rid="B89">89</xref>], where <inline-formula id="inf47">
<mml:math id="m48">
<mml:mrow>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>&#x3e;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> is characterized by the average of the degrees of the nodes in the SRN and measures the average influence of the nodes in the SRN; <inline-formula id="inf48">
<mml:math id="m49">
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula> is characterized by the maximum value of the shortest distance between any two nodes in the network and measures the maximum length of any following relationship in the network; <inline-formula id="inf49">
<mml:math id="m50">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is characterized by the average of the clustering coefficients of the nodes in the network and measures the cohesive size of the network; and <inline-formula id="inf50">
<mml:math id="m51">
<mml:mi>L</mml:mi>
</mml:math>
</inline-formula> is characterized by the average value of the shortest distance between the nodes in the network, which measures the average length of any following relationship in the network.</p>
<p>Note that our analysis is based on the fact that fake news propagation has already ended; we did not construct a reposting network. Some of the network indicators (1&#x2013;4) in the aforementioned network analysis are only descriptions and portrayals of the basic properties of the network and cannot be used to explain the reasons for the differences in the propagation of DPs and NDPs. Therefore, to compare SRNs more effectively, we considered defining measurement indices based on the following three aspects. First, we considered that some accounts exhibited different characteristics in the spread of fake news [<xref ref-type="bibr" rid="B18">18</xref>] and that there might be some individual differences, that is, different types of nodes might play different roles in the spread. Second, in interpersonal communication, fake news tends to initially flow to neighbors, friends, and colleagues of the spreaders and then circulate in certain regions and groups; thus, we used the size of the nodes with social relationships to symbolize the magnitude of this spreading effect. Furthermore, if a shortcut existed between two local cliques, was more conducive to the spread of information, and the number of weakly connected components on social networks indicated the magnitude of this influence. Therefore, we defined the following three measure indices:<list list-type="simple">
<list-item>
<p>(1) Proportion of account types (<inline-formula id="inf51">
<mml:math id="m52">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>)</p>
</list-item>
</list>
</p>
<p>To avoid differences in the sizes of the SRNs of different types of fake news, we considered the relative index of the proportion of account types participating in DPs and NDPs as follows:<disp-formula id="e2">
<mml:math id="m53">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>D</mml:mi>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:math>
<label>(2)</label>
</disp-formula>where <inline-formula id="inf52">
<mml:math id="m54">
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf53">
<mml:math id="m55">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>D</mml:mi>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represent the proportion of account type <inline-formula id="inf54">
<mml:math id="m56">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula> in DPs and NDPs in the fake news of category <inline-formula id="inf55">
<mml:math id="m57">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula>, where <inline-formula id="inf56">
<mml:math id="m58">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>6</mml:mn>
<mml:mtext>&#xa0;</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> represents society, health, business, science, disaster, and politics, respectively <inline-formula id="inf57">
<mml:math id="m59">
<mml:mrow>
<mml:mo>;</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> represents ordinary users, media, government, celebrity, and other types of accounts (including Weibo got talent, enterprise, campus, organization, website, and Weibo girl accounts) <inline-formula id="inf58">
<mml:math id="m60">
<mml:mrow>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> respectively.<list list-type="simple">
<list-item>
<p>(2) Network size of the <inline-formula id="inf59">
<mml:math id="m61">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition of an SRN (<inline-formula id="inf60">
<mml:math id="m62">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>)</p>
</list-item>
</list>
</p>
<p>To avoid the differences in the scales of the SRNs of different types of fake news, we considered analyzing the ratio of the number of nodes in the SRNs before and after <inline-formula id="inf61">
<mml:math id="m63">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition to measure the scale of the SRNs and determine the size of nodes with following relationships in the <inline-formula id="inf62">
<mml:math id="m64">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of the SRNs; accordingly, we defined size as follows:<disp-formula id="e3">
<mml:math id="m65">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>N</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:math>
<label>(3)</label>
</disp-formula>where <inline-formula id="inf63">
<mml:math id="m66">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf64">
<mml:math id="m67">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>N</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, respectively, represent the number of nodes in the SRNs before and after their <inline-formula id="inf65">
<mml:math id="m68">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions for the fake news of category <inline-formula id="inf66">
<mml:math id="m69">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula>, for refuters or non-refuters, where <inline-formula id="inf67">
<mml:math id="m70">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>6</mml:mn>
<mml:mtext>&#xa0;</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> represents society, health, business, science, disaster, and politics; and <inline-formula id="inf68">
<mml:math id="m71">
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> represents refuters and non-refuters, respectively.<list list-type="simple">
<list-item>
<p>(3) Number of weakly connected components (<inline-formula id="inf69">
<mml:math id="m72">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>)</p>
</list-item>
</list>
</p>
<p>A weakly connected component of a directed graph is a maximal (sub)graph, where there exists a path <italic>u</italic> <inline-formula id="inf70">
<mml:math id="m73">
<mml:mo>&#x2194;</mml:mo>
</mml:math>
</inline-formula> <italic>v</italic> ignoring edge directions for each pair of <inline-formula id="inf71">
<mml:math id="m74">
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>u</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> [<xref ref-type="bibr" rid="B15">15</xref>].</p>
<p>Additionally, we used the open-source software Gephi 0.9.2 to visualize networks and calculate the network properties [<xref ref-type="bibr" rid="B90">90</xref>, <xref ref-type="bibr" rid="B91">91</xref>]. In the network, nodes were colored according to ten types of accounts, and the sizes of the nodes corresponded to their total degree (including the in-degree and out-degree), that is, the number of followees and followers of this account, which is a measure of the influence of an account. The Fruchterman-Reingold layout algorithm was used to calculate the graph layout and draw a graph by force-directed placement [<xref ref-type="bibr" rid="B92">92</xref>].</p>
</sec>
<sec id="s3-2-4">
<title>Statistical Analyses</title>
<p>Pearson chi-square (<inline-formula id="inf72">
<mml:math id="m75">
<mml:mrow>
<mml:mtext>&#xa0;</mml:mtext>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>) tests were performed to compare the differences in the distributions of DPs and NDPs across each fake news topic, as well as the differences in the account distributions of DPs and NDPs across each fake news topic [<xref ref-type="bibr" rid="B93">93</xref>]. Wilcoxon rank sum tests were used to measure the differences in the number of posts between DPs and NDPs across each fake news topic over time [<xref ref-type="bibr" rid="B94">94</xref>]. The Pearson chi-square (<inline-formula id="inf73">
<mml:math id="m76">
<mml:mrow>
<mml:mtext>&#xa0;</mml:mtext>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>) test and Wilcoxon rank sum test were conducted by SPSS for Windows, version 25.0.0 (IBM Corporation).</p>
</sec>
<sec id="s3-2-5">
<title>Research Procedures</title>
<p>The process followed in this study is illustrated in <xref ref-type="fig" rid="F1">Figure 1</xref>. First, we collected 49,278 posts of 176 fake news events on Sina Weibo from July 2015 to September 2019. Second, we used the LSTM algorithm to build a stance classifier, which divided posts into DPs and NDPs and filtered out refuters and non-refuters for further analysis. Third, we divided the account types into ten categories and fake news into six topics. Fourth, for each type of fake news, we obtained 74,987 following relationships of refuters and non-refuters and constructed SRNs and their <inline-formula id="inf74">
<mml:math id="m77">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition SRNs. Fifth, we analyzed the differences in the volume and spreading growth rates between DPs and NDPs for each type of fake news by comparing the posts in terms of number and cumulative probability distribution. For each type of fake news, we analyzed the differences in the spreading growth rates of DPs and NDPs, as well as the reasons for these differences by investigating the proportion of account types, the network sizes of the <inline-formula id="inf75">
<mml:math id="m78">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of the SRNs, and the number of weakly connected components. Finally, we provide recommendations for combating fake news on social media.</p>
</sec>
</sec>
</sec>
<sec sec-type="results" id="s4">
<title>Results</title>
<sec id="s4-1">
<title>Development of Debunked and Non-Debunked Posts Over Time</title>
<sec id="s4-1-1">
<title>Distribution of Debunked and Non-Debunked Posts</title>
<p>To achieve a better comparison between DPs and NDPs, we used graphs for clearer data representation. The quarterly numbers of all the DPs and NDPs diffused on Sina Weibo from July 2015 to September 2019 are shown in <xref ref-type="fig" rid="F2">Figure 2A</xref>. Owing to the scarcity and imbalance of the dataset at certain periods and for better comparison with the research on Twitter [<xref ref-type="bibr" rid="B12">12</xref>], we used quarterly data for the representation in <xref ref-type="fig" rid="F2">Figure 2A</xref>. Note that the spread of fake news has increased yearly, particularly in 2018 and 2019. Similarly, the spread of DPs has gradually but significantly increased, especially in the third and fourth quarters of 2018; furthermore, the number of DPs is much higher than that of the NDPs, and the gap between the DPs and NDPs is gradually increasing (<inline-formula id="inf76">
<mml:math id="m79">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.001</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>).</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Descriptive analysis of DPs and NDPs: <bold>(A)</bold> quarterly DPs and NDPs and <bold>(B)</bold> the number of DPs and NDPs under the six fake news topics. Notes: Science represents science and technology and Politics denotes politics and finance.</p>
</caption>
<graphic xlink:href="fphy-10-833385-g002.tif"/>
</fig>
<p>The total number of DPs and NDPs for various types of fake news are shown in <xref ref-type="fig" rid="F2">Figure 2B</xref>. The result of the Pearson chi-square test was <inline-formula id="inf77">
<mml:math id="m80">
<mml:mrow>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>25</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>117110</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> (<inline-formula id="inf78">
<mml:math id="m81">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.001</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>), indicating that the result had a very high degree of statistical significance. <xref ref-type="fig" rid="F2">Figure 2B</xref> demonstrates that society-related fake news was the largest category of fake news in Chinese social media platforms, with 15,844 DPs and 15,501 NDPs, followed by health with 4,292 DPs and 3,981 NDPs; business-related fake news had 2,265 DPs and 1,329 NDPs, which differed from the distribution on Twitter (corresponding to politics, urban legends, business, terrorism, and war, respectively [<xref ref-type="bibr" rid="B12">12</xref>]). Similarly, DPs and NDPs showed a different trend, with more DPs than NDPs. We analyzed the reason for this because our research data are a review of historical data collected over a long period and the total number of DPs mostly exceeded that of the NDPs. However, the observation that the total number of DPs circulated was greater than that of NDPs circulated was insufficient to prove that this was an effective fake news rebuttal act.</p>
</sec>
<sec id="s4-1-2">
<title>Spreading Growth Rates of Debunked and Non-Debunked Posts</title>
<p>For the spread of fake news, early debunking is important to minimize harmful effects. Therefore, we considered further examining the differences in the propagation growth rates of DPs and NDPs. Using <xref ref-type="disp-formula" rid="e1">Eq. 1</xref>, we calculated the <inline-formula id="inf79">
<mml:math id="m82">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for each type of fake news and plotted the cumulative probability distribution for six fake news categories of DPs and NDPs (<xref ref-type="fig" rid="F3">Figure 3</xref>). Owing to the imbalanced dataset, the number of posts varied and was greater during certain periods. The cumulative probability distribution in the six fake news categories of DPs and NDPs (<xref ref-type="fig" rid="F3">Figure 3</xref>) indicates that the differences in the growth rates of the spread of DPs and NDPs for the same propagation time with the <inline-formula id="inf80">
<mml:math id="m83">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> reaching a larger value, represented faster growth in speed during the same propagation time. For instance, as depicted in <xref ref-type="fig" rid="F3">Figure 3D</xref>, after 70&#xa0;h are completed, the <inline-formula id="inf81">
<mml:math id="m84">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of the NDPs is always higher than that of the DPs, indicating that the NDPs spread faster than the DPs. <xref ref-type="fig" rid="F3">Figure 3</xref> also indicates the time required for DPs and NDPs to reach a certain proportion of the same total number of posts for the same value of <inline-formula id="inf82">
<mml:math id="m85">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, e.g., for <inline-formula id="inf83">
<mml:math id="m86">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, half of the propagation of DPs or NDPs of the respective total number of posts, the shorter time represents the increase in the growth in speed.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Growth rate of debunked posts (DPs) and non-debunked posts (NDPs) in six categories of fake news over time: <bold>(A)</bold> Society, <bold>(B)</bold> Health, <bold>(C)</bold> Business, <bold>(D)</bold> Science, <bold>(E)</bold> Disaster, and <bold>(F)</bold> Politics. Notes: Science represents science and technology and Politics represents politics and finance.</p>
</caption>
<graphic xlink:href="fphy-10-833385-g003.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F3">Figure 3</xref> shows that for all types of fake news, in the first 1/3 propagation stage, the NDPs and DPs spread rapidly; however, the details of the spread patterns are different. Except for business-related fake news (as shown in <xref ref-type="fig" rid="F3">Figure 3C</xref>, the <inline-formula id="inf84">
<mml:math id="m87">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for DPs is close to NDPs; a low degree of statistical significance, <inline-formula id="inf85">
<mml:math id="m88">
<mml:mrow>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mi>p</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.943</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>), NDPs spread faster than DPs for the other five types of fake news (as shown in <xref ref-type="fig" rid="F3">Figures 3B&#x2013;F</xref>, the <inline-formula id="inf86">
<mml:math id="m89">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for the NDPs is higher than that for the DPs; high degree of statistical significances, <inline-formula id="inf87">
<mml:math id="m90">
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mn>0.000</mml:mn>
<mml:mo>,</mml:mo>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mn>0.036</mml:mn>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>). For all types of fake news, in the first 1/3 propagation stage, the <inline-formula id="inf88">
<mml:math id="m91">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of NDPs can reach 0.8 and more, which can spread to more than 80% of the total number of NDPs; however, not all the <inline-formula id="inf89">
<mml:math id="m92">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of the DPs can reach 0.8, such as science- (<xref ref-type="fig" rid="F3">Figure 3D</xref>) or politics-related (<xref ref-type="fig" rid="F3">Figure 3F</xref>) fake news. Therefore, our results showed that the spreading patterns of DPs and NDPs were different for various categories of fake news, indicating that the patterns may be related to the characteristics of the event. Specifically, for the six types of fake news, the debunking effect of the business-related fake news was better, where DPs can catch up with the speed of NDPs, whereas for other types of fake news, DPs did not spread as rapidly as NDPs. Fake news related to science (<xref ref-type="fig" rid="F3">Figure 3D</xref>) and politics (<xref ref-type="fig" rid="F3">Figure 3F</xref>) was debunked the worst, indicating that the response speed of the DPs was slower and the release of the debunking messages was not as timely compared with DPs in other categories.</p>
</sec>
</sec>
<sec id="s4-2">
<title>Social Relationship Networks of Refuter&#x2013;Refuter and Non-Refuter&#x2013;Non-Refuter</title>
<sec id="s4-2-1">
<title>Distribution of Account Types</title>
<p>To investigate the different roles played by the various types of accounts in the growth rate of DPs and NDPs, we first examined the proportion of accounts in all types of fake news; the results are shown in <xref ref-type="fig" rid="F4">Figure 4</xref>. For DPs and NDPs, the Pearson chi-square tests indicated that the results had a very high degree of statistical significance in the account distribution under different types of fake news [<xref ref-type="fig" rid="F4">Figure 4A</xref>: <inline-formula id="inf90">
<mml:math id="m93">
<mml:mrow>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>20</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>937.751</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>p</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.001</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>; <xref ref-type="fig" rid="F4">Figure 4B</xref>: <inline-formula id="inf91">
<mml:math id="m94">
<mml:mrow>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>20</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>349.891</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>p</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.001</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>]. Media and celebrity account types accounted for most DPs in six types of fake news, and media accounts typically accounted for the largest proportion of DPs, with an average proportion of 57.64% in the six types of fake news events, followed by celebrity accounts, with an average proportion of 20.60%. In terms of account types in NDPs, however, media and celebrity accounts continued to be the most common, with an average proportion of 31.75% and 43.89%, respectively. Celebrity accounts accounted for the largest proportion of the four types of fake news events, namely politics (55.39%), science (49.15%), business (46.28%), and society (40.39%), whereas media accounts accounted for the largest proportion of health- (42.02%) and disaster-related fake news (38.46%).</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Proportion of account types in <bold>(A)</bold> debunked posts (DPs) and <bold>(B)</bold> non-debunked posts (NDPs) under six types of fake news. Notes: Other types of accounts include Weibo got talent, enterprise, campus, organization, website, and Weibo girl accounts.</p>
</caption>
<graphic xlink:href="fphy-10-833385-g004.tif"/>
</fig>
<p>Celebrity and media accounts played an important role in the spreading growth rates of DPs and NDPs. Therefore, combining the &#x201c;80/20&#x201d; distributions [<xref ref-type="bibr" rid="B95">95</xref>], we mainly focused on the role played by media and celebrity accounts in the propagation of DPs and NDPs, referring to <xref ref-type="disp-formula" rid="e2">Eq. 2</xref>. The results are shown in <xref ref-type="table" rid="T4">Table 4</xref>. We found that, for business-related fake news that achieved a better debunking effect on the spread of DPs, the relative proportion of the celebrity accounts in DPs to those in NDPs was the highest (<inline-formula id="inf92">
<mml:math id="m95">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
<mml:mn>2</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.708</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>), whereas the relative proportion of media accounts in DPs to those in NDPs was the lowest (<inline-formula id="inf93">
<mml:math id="m96">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1.495</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>). In contrast, for two types of fake news that had the worst debunking effects in the spread of DPs, namely, science- and politics-related fake news, the relative proportion of the celebrity accounts in DPs to those in NDPs was the lowest, at 0.292 and 0.361, respectively, whereas the relative proportion of the media accounts in DPs to those in NDPs was the highest, at 2.486 and 2.600, respectively.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Relative proportion of account types in DPs and those in NDPs under six types of fake news.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Category</th>
<th align="center">Ratio 1</th>
<th align="center">Ratio 2</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Society</td>
<td align="char" char=".">1.591</td>
<td align="char" char=".">0.555</td>
</tr>
<tr>
<td align="left">Health</td>
<td align="char" char=".">1.527</td>
<td align="char" char=".">0.415</td>
</tr>
<tr>
<td align="left">Business</td>
<td align="char" char=".">1.495</td>
<td align="char" char=".">0.708</td>
</tr>
<tr>
<td align="left">Science and Technology</td>
<td align="char" char=".">2.486</td>
<td align="char" char=".">0.292</td>
</tr>
<tr>
<td align="left">Disaster</td>
<td align="char" char=".">1.655</td>
<td align="char" char=".">0.523</td>
</tr>
<tr>
<td align="left">Politics and Finance</td>
<td align="char" char=".">2.600</td>
<td align="char" char=".">0.361</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>Notes: Ratio1 denotes the relative proportion of media accounts in DPs to those in NDPs; Ratio2 denotes the relative proportion of celebrity accounts in DPs to those in NDPs.</p>
</fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s4-2-2">
<title>Comparison of Differences in Networks of Refuters and Non-Refuters</title>
<p>To analyze the factors affecting the growth rate of DPs and NDPs for the six types of fake news, we constructed SRNs of refuters and non-refuters and the corresponding <inline-formula id="inf94">
<mml:math id="m97">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of these SRNs and attempted to discover the factors affecting the growth rate of DPs and NDPs in terms of their network characteristics. Therefore, we constructed SRNs of refuters and non-refuters for each type of fake news and portrayed the SRNs using four basic network properties (<xref ref-type="fig" rid="F5">Figure 5</xref>). We found that, in SRNs of refuters and non-refuters for each type of fake news event, the fake news categories with a better fake news debunking effect (business) and those with worse fake news debunking effects (society, health, disaster, politics, and science) did not show significant differences in the properties of <inline-formula id="inf95">
<mml:math id="m98">
<mml:mrow>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>&#x3e;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf96">
<mml:math id="m99">
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula>, <inline-formula id="inf97">
<mml:math id="m100">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf98">
<mml:math id="m101">
<mml:mrow>
<mml:mtext>&#xa0;</mml:mtext>
<mml:mi>L</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>SRNs under six types of fake news: <bold>(A)</bold> of refuters (R&#x2013;R) in society-related fake news, <bold>(B)</bold> of non-refuters (NR&#x2013;NR) in society-related fake news, <bold>(C)</bold> R&#x2013;R in health-related fake news, <bold>(D)</bold> NR&#x2013;NR in health-related fake news, <bold>(E)</bold> R&#x2013;R in business-related fake news, <bold>(F)</bold> NR&#x2013;NR in business-related fake news, <bold>(G)</bold> R&#x2013;R in science-related fake news, <bold>(H)</bold> NR&#x2013;NR in science-related fake news, <bold>(I)</bold> R&#x2013;R in disaster-related fake news, <bold>(J)</bold> NR&#x2013;NR in disaster-related fake news, <bold>(K)</bold> R&#x2013;R in politics-related fake news, and <bold>(L)</bold> NR&#x2013;NR in politics-related fake news.</p>
</caption>
<graphic xlink:href="fphy-10-833385-g005.tif"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="F5">Figure 5</xref>, the fake news types with better debunking effects (business) and those with worse debunking effects (society, health, disaster, politics, and science) do not show significant differences in the properties of <inline-formula id="inf99">
<mml:math id="m102">
<mml:mrow>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>&#x3e;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf100">
<mml:math id="m103">
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula>, <inline-formula id="inf101">
<mml:math id="m104">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf102">
<mml:math id="m105">
<mml:mi>L</mml:mi>
</mml:math>
</inline-formula>. Therefore, to further analyze the influence of the following relationships between nodes (refuters or non-refuters) on the growth rate of DPs and NDPs, we performed <inline-formula id="inf103">
<mml:math id="m106">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition (<inline-formula id="inf104">
<mml:math id="m107">
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>) on the SRNs to remove the isolated nodes (<inline-formula id="inf105">
<mml:math id="m108">
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>g</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>o</mml:mi>
<mml:mi>f</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>n</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>) without any following relationship and obtain the <inline-formula id="inf106">
<mml:math id="m109">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of SRNs composed of nodes with following relationships. Furthermore, for different types of fake news, we examined the differences between the network sizes of the <inline-formula id="inf107">
<mml:math id="m110">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of the SRNs and the number of weakly connected components, as shown in <xref ref-type="fig" rid="F6">Figure 6</xref>.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>
<inline-formula id="inf108">
<mml:math id="m111">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of SRNs under six types of fake news: <bold>(A)</bold> SRN of refuters after <inline-formula id="inf109">
<mml:math id="m112">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition (R<sub>k</sub>&#x2013;R<sub>k</sub>) in society-related fake news, <bold>(B)</bold> SRN of non-refuters after <inline-formula id="inf110">
<mml:math id="m113">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decomposition (NR<sub>k</sub>&#x2013;NR<sub>k</sub>) in society-related fake news, <bold>(C)</bold> R<sub>k</sub>&#x2013;R<sub>k</sub> in health-related fake news, <bold>(D)</bold> NR<sub>k</sub>&#x2013;NR<sub>k</sub> in health-related fake news, <bold>(E)</bold> R<sub>k</sub>&#x2013;R<sub>k</sub> in business-related fake news, <bold>(F)</bold> NR<sub>k</sub>&#x2013;NR<sub>k</sub> in business-related fake news, <bold>(G)</bold> R<sub>k</sub>&#x2013;R<sub>k</sub> in science-related fake news, <bold>(H)</bold> NR<sub>k</sub>&#x2013;NR<sub>k</sub> in science-related fake news, <bold>(I)</bold> R<sub>k</sub>&#x2013;R<sub>k</sub> in disaster-related fake news, <bold>(J)</bold> NR<sub>k</sub>&#x2013;NR<sub>k</sub> in disaster-related fake news, <bold>(K)</bold> R<sub>k</sub>&#x2013;R<sub>k</sub> in politics-related fake news, and <bold>(L)</bold> NR<sub>k</sub>&#x2013;NR<sub>k</sub> in politics-related fake news.</p>
</caption>
<graphic xlink:href="fphy-10-833385-g006.tif"/>
</fig>
<p>First, to analyze the impact of the size of nodes with following relationships in the SRN on the spread of information, the network size of the <inline-formula id="inf111">
<mml:math id="m114">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of the SRNs was examined using <xref ref-type="disp-formula" rid="e3">Eq. 3</xref>. Our results showed that the network size of R<sub>k</sub>&#x2013;R<sub>k</sub> was smaller than that of NR<sub>k</sub>&#x2013;NR<sub>k</sub> in the five fake news categories of society, health, disaster, politics, and science. For example, in society-related fake news, <inline-formula id="inf112">
<mml:math id="m115">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.545</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.647</mml:mn>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. In contrast, in business-related fake news with a better debunking effect, the network size of <inline-formula id="inf113">
<mml:math id="m116">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.340</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.234</mml:mn>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>Second, we also found that the number of weakly connected components in the <inline-formula id="inf114">
<mml:math id="m117">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of the SRNs differed between the business-related fake news and the other five types of fake news. Specifically, the number of weakly connected components of R<sub>k</sub>&#x2013;R<sub>k</sub> was smaller than that of NR<sub>k</sub>&#x2013;NR<sub>k</sub> in the five fake news categories of society, health, disaster, politics, and science. For example, in health-related fake news, <inline-formula id="inf115">
<mml:math id="m118">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>N</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>9</mml:mn>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>N</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>16</mml:mn>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. In contrast, in business-related fake news that had a better debunking effect, <inline-formula id="inf116">
<mml:math id="m119">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>11</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>N</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>9</mml:mn>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
</sec>
</sec>
<sec sec-type="discussion" id="s5">
<title>Discussion</title>
<p>Our results are intended to highlight the differences in the growth rates between DPs and NDPs under different fake news topics from the perspective of SRNs on social media in China, as well as to deeply explore the reasons for the differences, and provide the following four key insights.</p>
<p>First, as shown in <xref ref-type="fig" rid="F2">Figure 2</xref>, our results indicated that the spread of fake news is increasing yearly, similar to the findings reported by Vosoughi et al. [<xref ref-type="bibr" rid="B12">12</xref>]. We found that in Chinese social media, people have unique preferences for fake news on different topics. To be specific, our results showed that society- and health-related fake news were highly important to Chinese society [<xref ref-type="bibr" rid="B4">4</xref>], society-related fake news with 15,844 DPs and 15,501 NDPs, followed by health with 4,292 DPs and 3,981 NDPs, which differed from the distribution on Twitter (corresponding to politics, urban legends, business, terrorism, and war, respectively [<xref ref-type="bibr" rid="B12">12</xref>]). Thus, on the one hand, our results confirmed that the information-spreading patterns were different between categories of fake news events [<xref ref-type="bibr" rid="B96">96</xref>] and that such a pattern was determined by the event attributes [<xref ref-type="bibr" rid="B84">84</xref>]. On the other hand, our results confirmed that the differences in their spread in different countries can be attributed to cultural differences, the news media environment, and other environmental factors [<xref ref-type="bibr" rid="B97">97</xref>]. Furthermore, as shown in <xref ref-type="fig" rid="F3">Figure 3</xref>, our results also showed that the debunking effect of business-related fake news was better than that of the other types of fake news. This finding is not consistent with those in previous research on fake news on Twitter, which found that falsehood diffused significantly farther, faster, deeper, and more broadly than the truth in all categories of information, and the effects were more pronounced for false political news than for false news about terrorism, natural disasters, science, urban legends, or financial information [<xref ref-type="bibr" rid="B12">12</xref>]. In contrast, in our findings, business news had a high <inline-formula id="inf117">
<mml:math id="m120">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> value in DPs, which reflected the idea that enterprises had a high industry sensitivity in terms of fake news on Chinese social media platforms. For the other five types of fake news, especially for science- and politics-related fake news, the growth rate of the <inline-formula id="inf118">
<mml:math id="m121">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of DPs was slower than that of NDPs. One possible reason can be attributed to the nature of individuals&#x2019; relationships with their country, society, and national culture, wherein the social norms directly influence the individual&#x2019;s belief system; this supports the existence of confirmation bias [<xref ref-type="bibr" rid="B6">6</xref>], which may result in an individual requiring more time to change their preexisting beliefs. Therefore, the control and management of these two categories of fake news should be urgently strengthened by practitioners, and it is necessary to raise the public&#x2019;s awareness in these two areas immediately. From a cognitive perspective, fake news has a strong preemptive advantage in terms of its spread, resulting in a phenomenon called &#x201c;failure of refutation,&#x201d; despite real information refuting such fake news in the early stages of the spread. Thus, we propose that practitioners must empower ordinary users to enhance their knowledge and technology in that particular field, which can improve the users&#x2019; ability to recognize information. For example, government and mainstream media should improve their control and governance programs. This can be accomplished by explaining the truth accurately and increasing the credibility of reliable information by presenting them in clear and concise factual statements to increase the users&#x2019; ability to recognize the truth and gain immunity to false information, thereby avoiding and overcoming inherent human biases.</p>
<p>Second, for fake news on different topics, the results in <xref ref-type="table" rid="T4">Table 4</xref> showed that regardless of whether the posts were DPs or NDPs, celebrity accounts (<inline-formula id="inf119">
<mml:math id="m122">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>) played a significant role in promoting the spread of information [<xref ref-type="bibr" rid="B98">98</xref>]. Users perceive social media posts by influencers (e.g., celebrity accounts) as particularly credible and engaging [<xref ref-type="bibr" rid="B99">99</xref>, <xref ref-type="bibr" rid="B100">100</xref>]. To be specific, some health-related fake news studies have shown that celebrity involvement can be an effective tool for health organizations to convey their messages to counter fake news [<xref ref-type="bibr" rid="B100">100</xref>]. At the same time, some political-related fake news studies have also indicated that celebrities may participate in fake news as propagators or endorsers, their status affords them extended social reach and the ability to greatly influence the fake news propagation and persuasion, such as governments and partisans use fake news for political framing [<xref ref-type="bibr" rid="B101">101</xref>]. Celebrities have been studied more at a micro-level (e.g., fake news event-specific) in previous studies; however, our results are more generalizable as they are drawn in the context of various categories of fake news on Chinese social media platforms at a macro level. For our results, a convincing explanation is that, according to social facilitation theory [<xref ref-type="bibr" rid="B102">102</xref>], the opinions of influential leaders tend to become dominant and are constantly strengthened by those around them, making their views highly consistent and strong. That is, people typically believe that influential users are naturally right and that obeying such users will grant them safety; this leads them to accept refutable messages from influential rebuttal sources without judgment. Media opinions and information in newspapers, radio, and television are usually not directly presented to the general audience; they need to pass through opinion leaders for personalized interpretation before flowing to the less active part of the population, i.e., &#x201c;media information&#x2014;opinion leaders&#x2014;general audience.&#x201d; Opinion leaders act as &#x201c;secondary information dissemination hubs&#x201d; in the spreading process and a conduit of information; they filter and shape news and share their interpretations with others [<xref ref-type="bibr" rid="B103">103</xref>]; therefore, they have a profound impact on opinion formation and diffusion [<xref ref-type="bibr" rid="B104">104</xref>]. The celebrities on Sina Weibo can be considered opinion leaders [<xref ref-type="bibr" rid="B105">105</xref>], and it is clear from the analysis results that they play a crucial role in the dissemination of information. Therefore, we propose that, in debunking, we should improve controlling the spread of fake news by paying attention to opinion leaders such as celebrities, focusing on the review of the information released by them, and effectively gatekeeping this information before it is released. Moreover, opinion leaders, such as celebrities, should take up the role of promoting the importance of debunking fake news and implementing it among the general public.</p>
<p>Third, as shown in <xref ref-type="fig" rid="F6">Figure 6</xref>, for fake news on different topics, our results showed that messages were more likely to spread in networks with following relationships, that is, the larger the size of the nodes (<inline-formula id="inf120">
<mml:math id="m123">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>) with following relationships in the <inline-formula id="inf121">
<mml:math id="m124">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of SRNs, the faster the information would spread. Our results indicated that the wide distribution of nodes promoted the flow of information. Social media (such as Sina Weibo) are information dissemination platforms based on social relationships, where information dissemination and people&#x2019;s social relationships are interrelated and mutually reinforcing. Fake news tends to initially spread to neighbors, friends, and colleagues of the spreaders and then circulate in certain areas and social groups. The breadth and depth of people&#x2019;s SRNs determine the breadth and depth of the information that they obtain and how far the information they spread can reach. At the same time, our results in <xref ref-type="fig" rid="F6">Figure 6</xref> also showed that the greater the number of weakly connected components (<inline-formula id="inf122">
<mml:math id="m125">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>), the easier it was to promote the spread of information. Granovetter&#x2019;s weak connection theory illustrates the shortcuts formed by the weak ties in different social circles, which are conducive to the spread of messages across these circles [<xref ref-type="bibr" rid="B106">106</xref>, <xref ref-type="bibr" rid="B107">107</xref>]. Our results show that the number of weakly connected components (<inline-formula id="inf123">
<mml:math id="m126">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>) and size of nodes (<inline-formula id="inf124">
<mml:math id="m127">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>) are more effective in disseminating widely, which is in accordance with the results of previous studies [<xref ref-type="bibr" rid="B107">107</xref>]. However, most previous studies have focused on single-topic fake news and reached these conclusions, such as the fake news that &#x201c;iodized salt is radiation-proof&#x201d; [<xref ref-type="bibr" rid="B107">107</xref>], whereas our findings are more general and reliable as they are drawn in the context of the macroscopic spread of various types of fake news on Chinese social media platforms. In addition, according to previous research, the number of very strong ties among interpersonal relationships is small, but the number of ties with low strength is big [<xref ref-type="bibr" rid="B108">108</xref>]. For example, on Sina Weibo, two-way following relationships comprise mostly relatives, friends, colleagues, and other strong connections, whereas one-way following relations comprise mostly weak connections with little connection and weak ties; these form the weakly connected component of the SRNs. Therefore, for one thing, we propose making full use of social networks among users in the fake news debunking process to achieve the following goals: first, improving netizens&#x2019; ability to distinguish between true and fake news, including teaching them how to fact-check information and educating them in media literacy; and second, improving netizens&#x2019; critical thinking ability and reducing the herding effect caused by their following relationships. For another thing, we propose that to form an effective hedge against the weak ties of NDPs in the process of fake news debunking, multi-departmental, multi-faceted, and multi-directional joint refutations should be established to spread debunking messages in different circles and a linkage mechanism should be formed. Fake news refuters should integrate support from different rebuttal agents, such as government departments, mainstream media outlets, and opinion leaders to pool their efforts to establish a rapid debunking mechanism for online fake news and expand the influence of authoritative news to debunk fake news quickly and accurately. In this way, governments can play an important role in promoting the dissemination of debunking information for fake news through enlarging the channels of right information disclosure, increasing weak tie connections with the public, and shortening the average path length between individuals in the networks [<xref ref-type="bibr" rid="B107">107</xref>].</p>
<p>However, we acknowledge that our research has certain limitations, which give way to promising topics for further research. First, we only analyzed posts on Sina Weibo, which has limitations in terms of data size and multi-platform sources. Thus, we will consider adding the data of other social media platforms, such as those of Baidu Tieba and WeChat. Second, most of our research results are the experimental results of a comparative analysis of users&#x2019; SRNs. Therefore, in future research, we will consider using simulation methods to enhance the robustness of our research results, such as applying some physical models for further analysis [<xref ref-type="bibr" rid="B109">109</xref>]. We will also consider the internal mechanism of the time delays of DPs among different categories of fake news and analyze the reasons why people opt for refuting or accepting the DPs. Thirdly, to understand the large-scale fake news on Chinese social media platforms, although we focused on the comparison of differences between the debunking and non-debunking of fake news across various topics and obtained some general and reliable findings based on a large-scale multi-category fake news dataset, some of the findings in our results were validation of some intuitive results or previous studies. In the future, by investigating different types of fake news on Chinese social media platforms, we hope to find more interesting and surprising results based on social relationship networks. For example, previous research indicated that structural positions stratified by such variables as gender, age, ethnicity, paid employment, educational attainment, income, and family responsibilities may shape the formation of social relationships and one&#x2019;s ability to gain valuable information [<xref ref-type="bibr" rid="B110">110</xref>]. Therefore, in the future, we hope to do more insightful investigations on how the attributes of social relationship networks might affect the spread of debunking information. Finally, to highlight the research objective, we detected only two stances. In a future study, we will consider a more detailed refutation method based on multiple classifications using deep learning algorithms, not only by evaluating the true and false labels of fake news but also by combining concepts such as sociology, psychology, and communication theory to focus on controversy detection, degree of divergence, and group polarization. We will also consider using fake news data on the COVID-19 epidemic for an in-depth study.</p>
</sec>
<sec sec-type="conclusion" id="s6">
<title>Conclusion</title>
<p>The growth in social networking has made social media platforms such as Sina Weibo a breeding ground for fake news. Based on the six types of fake news spread on Sina Weibo, first, in this study, we investigated the differences in the volume and growth rates of posts between DPs and NDPs by comparing them in terms of their number and cumulative probability distribution. Second, we used three indices to explore the network characteristics of the following relationships of refuters and non-refuters, namely the proportion of account types, the network size of <inline-formula id="inf125">
<mml:math id="m128">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>-core decompositions of SRNs, and the number of weakly connected components, to uncover the deeper reasons for the differences in the growth rates of DPs and NDPs. Our results showed that the debunking of business-related fake news was better, that of society-related fake news, the most widely spread type of fake news in China, was poor, and that of science- and politics-related fake news, was the worst. Additionally, regardless of whether the posts were DPs or NDPs, a higher number of celebrity accounts, larger sizes of nodes with following relationships in the SRNs, and a higher number of weakly connected components would lead to a faster growth rate of dissemination. Finally, based on the aforementioned results, we examined the reasons for the differences in the growth rates of DPs and NDPs and proposed countermeasures and recommendations for fake news debunking management that can be followed and implemented by government and decision-making institutions.</p>
</sec>
</body>
<back>
<sec id="s7">
<title>Data Availability Statement</title>
<p>The raw data supporting the conclusion of this article will be made available by the authors, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s8">
<title>Author Contributions</title>
<p>XW: Conceptualization, Methodology, Software, Visualization, Formal analysis, Data Curation, Writing. FC: Methodology, Formal analysis. NM: Methodology. GY: Conceptualization, Writing, Funding acquisition.</p>
</sec>
<sec id="s9">
<title>Funding</title>
<p>This research was funded by the National Natural Science Foundation of China (Grant No. 72074060).</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ack>
<p>The authors would like to acknowledge the editor&#x2019;s contribution and show appreciation to the reviewers for their helpful comments and recommendations. The authors would like to acknowledge all the authors cited in the references. The authors would like to thank Zhiwei Data Sharing Platform (<ext-link ext-link-type="uri" xlink:href="http://university.zhiweidata.com/">http://university.zhiweidata.com/</ext-link>) for our data support.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Grinberg</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Joseph</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Friedland</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Swire-Thompson</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Lazer</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Fake News on Twitter during the 2016 U.S. Presidential Election</article-title>. <source>Science</source> (<year>2019</year>) <volume>363</volume>(<issue>6425</issue>):<fpage>374</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1126/science.aau2706</pub-id> </citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Ghorbani</surname>
<given-names>AA</given-names>
</name>
</person-group>. <article-title>An Overview of Online Fake News: Characterization, Detection, and Discussion</article-title>. <source>Inf Process Management</source> (<year>2020</year>) <volume>57</volume>(<issue>2</issue>):<fpage>102025</fpage>. <pub-id pub-id-type="doi">10.1016/j.ipm.2019.03.004</pub-id> </citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cheng</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>C-J</given-names>
</name>
</person-group>. <article-title>Online Crisis Communication in a post-truth Chinese Society: Evidence from Interdisciplinary Literature</article-title>. <source>Public Relations Rev</source> (<year>2019</year>) <volume>45</volume>(<issue>4</issue>):<fpage>101826</fpage>. <pub-id pub-id-type="doi">10.1016/j.pubrev.2019.101826</pub-id> </citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Guo</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>China&#x27;s "Fake News" Problem: Exploring the Spread of Online Rumors in the Government-Controlled News Media</article-title>. <source>Digital Journalism</source> (<year>2020</year>) <volume>8</volume>(<issue>8</issue>):<fpage>992</fpage>&#x2013;<lpage>1010</lpage>. <pub-id pub-id-type="doi">10.1080/21670811.2020.1766986</pub-id> </citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>N</given-names>
</name>
</person-group>. <article-title>Rumor Spreading Model Considering Rumor Credibility, Correlation and Crowd Classification Based on Personality</article-title>. <source>Sci Rep</source> (<year>2020</year>) <volume>10</volume>(<issue>1</issue>):<fpage>5887</fpage>&#x2013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1038/s41598-020-62585-9</pub-id> </citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Del Vicario</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Bessi</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Zollo</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Petroni</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Scala</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Caldarelli</surname>
<given-names>G</given-names>
</name>
<etal/>
</person-group>
<article-title>The Spreading of Misinformation Online</article-title>. <source>Proc Natl Acad Sci USA</source> (<year>2016</year>) <volume>113</volume>(<issue>3</issue>):<fpage>554</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1073/pnas.1517441113</pub-id> </citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Qian</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Echo Chamber Effect in the Discussions of Rumor Rebuttal about COVID-19 in China: Existence and Impact</article-title>. <source>J Med Internet Res</source> (<year>2021</year>). </citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lazer</surname>
<given-names>DMJ</given-names>
</name>
<name>
<surname>Baum</surname>
<given-names>MA</given-names>
</name>
<name>
<surname>Benkler</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Berinsky</surname>
<given-names>AJ</given-names>
</name>
<name>
<surname>Greenhill</surname>
<given-names>KM</given-names>
</name>
<name>
<surname>Menczer</surname>
<given-names>F</given-names>
</name>
<etal/>
</person-group>
<article-title>The Science of Fake News</article-title>. <source>Science</source> (<year>2018</year>) <volume>359</volume>(<issue>6380</issue>):<fpage>1094</fpage>&#x2013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1126/science.aao2998</pub-id> </citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Deng</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>Statistical Analysis of Dispelling Rumors on Sina Weibo</article-title>. <source>Complexity</source> (<year>2020</year>) <fpage>2020</fpage>. <pub-id pub-id-type="doi">10.1155/2020/3176593</pub-id> </citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Grado&#x144;</surname>
<given-names>KT</given-names>
</name>
<name>
<surname>Ho&#x142;yst</surname>
<given-names>JA</given-names>
</name>
<name>
<surname>Moy</surname>
<given-names>WR</given-names>
</name>
<name>
<surname>Sienkiewicz</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Suchecki</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Countering Misinformation: A Multidisciplinary Approach</article-title>. <source>Big Data Soc</source> (<year>2021</year>) <volume>8</volume>(<issue>1</issue>):<fpage>20539517211013848</fpage>. </citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Jin</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Bao</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Cheng</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>A Survey on Rumor Identification over Social media</article-title>. <source>Chin J Comput</source> (<year>2018</year>) <volume>40</volume>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>23</lpage>. </citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vosoughi</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Roy</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Aral</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>The Spread of True and False News Online</article-title>. <source>Science</source> (<year>2018</year>) <volume>359</volume>(<issue>6380</issue>):<fpage>1146</fpage>&#x2013;<lpage>51</lpage>. <pub-id pub-id-type="doi">10.1126/science.aap9559</pub-id> </citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Min</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>B</given-names>
</name>
<etal/>
</person-group>
<article-title>Improving User Recommendation by Extracting Social Topics and Interest Topics of Users in Uni-Directional Social Networks</article-title>. <source>Knowledge-Based Syst</source> (<year>2018</year>) <volume>140</volume>:<fpage>120</fpage>&#x2013;<lpage>33</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2017.10.031</pub-id> </citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>Y-Y</surname>
<given-names>Ahn</given-names>
</name>
<name>
<surname>S</surname>
<given-names>Han</given-names>
</name>
<name>
<surname>H</surname>
<given-names>Kwak</given-names>
</name>
<name>
<surname>S</surname>
<given-names>Moon</given-names>
</name>
<name>
<surname>H</surname>
<given-names>Jeong</given-names>
</name>
</person-group>, editors. <source>Analysis of Topological Characteristics of Huge Online Social Networking Services</source>. <conf-name>Proceedings of the 16th international conference on World Wide Web</conf-name> (<year>2007</year>).</citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pierri</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Piccardi</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Ceri</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Topology Comparison of Twitter Diffusion Networks Effectively Reveals Misleading Information</article-title>. <source>Sci Rep</source> (<year>2020</year>) <volume>10</volume>(<issue>1</issue>):<fpage>1372</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1038/s41598-020-58166-5</pub-id> </citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Meel</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Vishwakarma</surname>
<given-names>DK</given-names>
</name>
</person-group>. <article-title>Fake News, Rumor, Information Pollution in Social media and Web: A Contemporary Survey of State-Of-The-Arts, Challenges and Opportunities</article-title>. <source>Expert Syst Appl</source> (<year>2020</year>) <volume>153</volume>:<fpage>112986</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2019.112986</pub-id> </citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pal</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Chua</surname>
<given-names>AYK</given-names>
</name>
<name>
<surname>Hoe-Lian Goh</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Debunking Rumors on Social media: The Use of Denials</article-title>. <source>Comput Hum Behav</source> (<year>2019</year>) <volume>96</volume>:<fpage>110</fpage>&#x2013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2019.02.022</pub-id> </citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Oehmichen</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Hua</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Amador Diaz Lopez</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Molina-Solana</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Gomez-Romero</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>Y-k</given-names>
</name>
</person-group>. <article-title>Not All Lies Are Equal. A Study into the Engineering of Political Misinformation in the 2016 US Presidential Election</article-title>. <source>IEEE Access</source> (<year>2019</year>) <volume>7</volume>:<fpage>126305</fpage>&#x2013;<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1109/access.2019.2938389</pub-id> </citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Xi</surname>
<given-names>W</given-names>
</name>
</person-group>. <article-title>Effects of Group Arguments on Rumor Belief and Transmission in Online Communities: An Information cascade and Group Polarization Perspective</article-title>. <source>Inf Management</source> (<year>2018</year>) <volume>55</volume>(<issue>4</issue>):<fpage>441</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1016/j.im.2017.10.004</pub-id> </citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jung</surname>
<given-names>A-K</given-names>
</name>
<name>
<surname>Ross</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Stieglitz</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Caution: Rumors Ahead&#x2014;A Case Study on the Debunking of False Information on Twitter</article-title>. <source>Big Data Soc</source> (<year>2020</year>) <volume>7</volume>(<issue>2</issue>):<fpage>2053951720980127</fpage>. <pub-id pub-id-type="doi">10.1177/2053951720980127</pub-id> </citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>M</surname>
<given-names>AlRubaian</given-names>
</name>
<name>
<surname>M</surname>
<given-names>Al-Qurishi</given-names>
</name>
<name>
<surname>M</surname>
<given-names>Al-Rakhami</given-names>
</name>
<name>
<surname>MM</surname>
<given-names>Hassan</given-names>
</name>
<name>
<surname>A</surname>
<given-names>Alamri</given-names>
</name>
</person-group>, editors. <source>CredFinder: A Real-Time Tweets Credibility Assessing System</source>. <conf-name>2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM</conf-name>. <publisher-name>IEEE</publisher-name> (<year>2016</year>).</citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shao</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Hui</surname>
<given-names>PM</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Flammini</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Menczer</surname>
<given-names>F</given-names>
</name>
<etal/>
</person-group>
<article-title>Anatomy of an Online Misinformation Network</article-title>. <source>PloS one</source> (<year>2018</year>) <volume>13</volume>:<fpage>e0196087</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0196087</pub-id> </citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>J-w</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>E-J</given-names>
</name>
<name>
<surname>Shin</surname>
<given-names>SY</given-names>
</name>
</person-group>. <article-title>What Debunking of Misinformation Does and Doesn&#x27;t</article-title>. <source>Cyberpsychology, Behav Soc Networking</source> (<year>2019</year>) <volume>22</volume>(<issue>6</issue>):<fpage>423</fpage>&#x2013;<lpage>7</lpage>. </citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pennycook</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Bear</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Collins</surname>
<given-names>ET</given-names>
</name>
<name>
<surname>Rand</surname>
<given-names>DG</given-names>
</name>
</person-group>. <article-title>The Implied Truth Effect: Attaching Warnings to a Subset of Fake News Headlines Increases Perceived Accuracy of Headlines without Warnings</article-title>. <source>Management Sci</source> (<year>2020</year>) <volume>66</volume>(<issue>11</issue>):<fpage>4944</fpage>&#x2013;<lpage>57</lpage>. <pub-id pub-id-type="doi">10.1287/mnsc.2019.3478</pub-id> </citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dale</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>NLP in a post-truth World</article-title>. <source>Nat Lang Eng</source> (<year>2017</year>) <volume>23</volume>(<issue>2</issue>):<fpage>319</fpage>&#x2013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.1017/s1351324917000018</pub-id> </citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shu</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Sliva</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>Fake News Detection on Social Media</article-title>. <source>SIGKDD Explor Newsl</source> (<year>2017</year>) <volume>19</volume>(<issue>1</issue>):<fpage>22</fpage>&#x2013;<lpage>36</lpage>. <pub-id pub-id-type="doi">10.1145/3137597.3137600</pub-id> </citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Stieglitz</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Mirbabaie</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Ross</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Neuberger</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Social media Analytics - Challenges in Topic Discovery, Data Collection, and Data Preparation</article-title>. <source>Int J Inf Manag</source> (<year>2018</year>) <volume>39</volume>:<fpage>156</fpage>&#x2013;<lpage>68</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2017.12.002</pub-id> </citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>B</given-names>
</name>
</person-group>. <article-title>Dynamic 8-state ICSAR Rumor Propagation Model Considering Official Rumor Refutation</article-title>. <source>Physica A: Stat Mech Its Appl</source> (<year>2014</year>) <volume>415</volume>:<fpage>333</fpage>&#x2013;<lpage>46</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2014.07.023</pub-id> </citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chua</surname>
<given-names>AYK</given-names>
</name>
<name>
<surname>Banerjee</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Intentions to Trust and Share Online Health Rumors: An experiment with Medical Professionals</article-title>. <source>Comput Hum Behav</source> (<year>2018</year>) <volume>87</volume>:<fpage>1</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2018.05.021</pub-id> </citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tripathy</surname>
<given-names>RM</given-names>
</name>
<name>
<surname>Bagchi</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Mehta</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Towards Combating Rumors in Social Networks: Models and Metrics</article-title>. <source>Ida</source> (<year>2013</year>) <volume>17</volume>(<issue>1</issue>):<fpage>149</fpage>&#x2013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.3233/ida-120571</pub-id> </citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Ying</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Information Source Detection in the SIR Model: A Sample-Path-Based Approach</article-title>. <source>IEEE/ACM Trans Networking</source> (<year>2014</year>) <volume>24</volume>(<issue>1</issue>):<fpage>408</fpage>&#x2013;<lpage>21</lpage>. </citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>Y</surname>
<given-names>Liu</given-names>
</name>
<name>
<surname>C</surname>
<given-names>Gao</given-names>
</name>
<name>
<surname>X</surname>
<given-names>She</given-names>
</name>
<name>
<surname>Z</surname>
<given-names>Zhang</given-names>
</name>
</person-group>, editors. <source>A Bio-Inspired Method for Locating the Diffusion Source with Limited Observers</source>. <conf-name>2016 IEEE Congress on Evolutionary Computation (CEC)</conf-name>. <publisher-name>IEEE</publisher-name> (<year>2016</year>).</citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>J</surname>
<given-names>Choi</given-names>
</name>
<name>
<surname>S</surname>
<given-names>Moon</given-names>
</name>
<name>
<surname>J</surname>
<given-names>Woo</given-names>
</name>
<name>
<surname>K</surname>
<given-names>Son</given-names>
</name>
<name>
<surname>J</surname>
<given-names>Shin</given-names>
</name>
<name>
<surname>Y</surname>
<given-names>Yi</given-names>
</name>
</person-group>, editors. <source>Rumor Source Detection under Querying with Untruthful Answers</source>. <conf-name>IEEE INFOCOM 2017-IEEE Conference on Computer Communications</conf-name>. <publisher-name>IEEE</publisher-name> (<year>2017</year>).</citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Louni</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Subbalakshmi</surname>
<given-names>KP</given-names>
</name>
</person-group>. <article-title>Who Spread that Rumor: Finding the Source of Information in Large Online Social Networks with Probabilistically Varying Internode Relationship Strengths</article-title>. <source>IEEE Trans Comput Soc Syst</source> (<year>2018</year>) <volume>5</volume>(<issue>2</issue>):<fpage>335</fpage>&#x2013;<lpage>43</lpage>. <pub-id pub-id-type="doi">10.1109/tcss.2018.2801310</pub-id> </citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shelke</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Attar</surname>
<given-names>V</given-names>
</name>
</person-group>. <article-title>Source Detection of Rumor in Social Network - A Review</article-title>. <source>Online Soc Networks Media</source> (<year>2019</year>) <volume>9</volume>:<fpage>30</fpage>&#x2013;<lpage>42</lpage>. <pub-id pub-id-type="doi">10.1016/j.osnem.2018.12.001</pub-id> </citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Han</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Zhuang</surname>
<given-names>F</given-names>
</name>
<name>
<surname>He</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Ao</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>Energy Model for Rumor Propagation on Social Networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2014</year>) <volume>394</volume>:<fpage>99</fpage>&#x2013;<lpage>109</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2013.10.003</pub-id> </citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Turenne</surname>
<given-names>N</given-names>
</name>
</person-group>. <article-title>The Rumour Spectrum</article-title>. <source>PloS one</source> (<year>2018</year>) <volume>13</volume>:<fpage>e0189080</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0189080</pub-id> </citation>
</ref>
<ref id="B38">
<label>38.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Qiu</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>A Rumor Reversal Model of Online Health Information during the Covid-19 Epidemic</article-title>. <source>Inf Process Management</source> (<year>2021</year>) <volume>58</volume>(<issue>6</issue>):<fpage>102731</fpage>. <pub-id pub-id-type="doi">10.1016/j.ipm.2021.102731</pub-id> </citation>
</ref>
<ref id="B39">
<label>39.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cheng</surname>
<given-names>J-J</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>W-G</given-names>
</name>
</person-group>. <article-title>An Epidemic Model of Rumor Diffusion in Online Social Networks</article-title>. <source>The Eur Phys J B</source> (<year>2013</year>) <volume>86</volume>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1140/epjb/e2012-30483-5</pub-id> </citation>
</ref>
<ref id="B40">
<label>40.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tong</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Du</surname>
<given-names>D-Z</given-names>
</name>
</person-group>. <article-title>Distributed Rumor Blocking with Multiple Positive Cascades</article-title>. <source>IEEE Trans Comput Soc Syst</source> (<year>2018</year>) <volume>5</volume>(<issue>2</issue>):<fpage>468</fpage>&#x2013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1109/tcss.2018.2818661</pub-id> </citation>
</ref>
<ref id="B41">
<label>41.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pham</surname>
<given-names>DV</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>GL</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>TN</given-names>
</name>
<name>
<surname>Pham</surname>
<given-names>CV</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>AV</given-names>
</name>
</person-group>. <article-title>Multi-topic Misinformation Blocking with Budget Constraint on Online Social Networks</article-title>. <source>IEEE Access</source> (<year>2020</year>) <volume>8</volume>:<fpage>78879</fpage>&#x2013;<lpage>89</lpage>. <pub-id pub-id-type="doi">10.1109/access.2020.2989140</pub-id> </citation>
</ref>
<ref id="B42">
<label>42.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Saquete</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Tom&#xe1;s</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Moreda</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Mart&#xed;nez-Barco</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Palomar</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Fighting post-truth Using Natural Language Processing: A Review and Open Challenges</article-title>. <source>Expert Syst Appl</source> (<year>2020</year>) <volume>141</volume>:<fpage>112943</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2019.112943</pub-id> </citation>
</ref>
<ref id="B43">
<label>43.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zubiaga</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Aker</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Bontcheva</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Liakata</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Procter</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Detection and Resolution of Rumours in Social media: A Survey</article-title>. <source>ACM Comput Surv (Csur)</source> (<year>2018</year>) <volume>51</volume>(<issue>2</issue>):<fpage>1</fpage>&#x2013;<lpage>36</lpage>. </citation>
</ref>
<ref id="B44">
<label>44.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Du</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Social media Rumor Refutation Effectiveness: Evaluation, Modelling and Enhancement</article-title>. <source>Inf Process Management</source> (<year>2021</year>) <volume>58</volume>(<issue>1</issue>):<fpage>102420</fpage>. <pub-id pub-id-type="doi">10.1016/j.ipm.2020.102420</pub-id> </citation>
</ref>
<ref id="B45">
<label>45.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shu</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Mahudeswaran</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>FakeNewsTracker: a Tool for Fake News Collection, Detection, and Visualization</article-title>. <source>Comput Math Organ Theor</source> (<year>2019</year>) <volume>25</volume>(<issue>1</issue>):<fpage>60</fpage>&#x2013;<lpage>71</lpage>. <pub-id pub-id-type="doi">10.1007/s10588-018-09280-3</pub-id> </citation>
</ref>
<ref id="B46">
<label>46.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>M</surname>
<given-names>Al-Qurishi</given-names>
</name>
<name>
<surname>M</surname>
<given-names>Al-Rakhami</given-names>
</name>
<name>
<surname>M</surname>
<given-names>Alrubaian</given-names>
</name>
<name>
<surname>A</surname>
<given-names>Alarifi</given-names>
</name>
<name>
<surname>SMM</surname>
<given-names>Rahman</given-names>
</name>
<name>
<surname>A</surname>
<given-names>Alamri</given-names>
</name>
</person-group>, editors. <source>Selecting the Best Open Source Tools for Collecting and Visualzing Social media Content</source>. <conf-name>2015 2nd world symposium on web applications and networking (WSWAN)</conf-name>. <publisher-name>IEEE</publisher-name> (<year>2015</year>).</citation>
</ref>
<ref id="B47">
<label>47.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Cui</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>PS</given-names>
</name>
</person-group>. <article-title>TI-CNN: Convolutional Neural Networks for Fake News Detection</article-title>. <source>arXiv preprint arXiv</source> (<year>2018</year>) <volume>180600749</volume>. </citation>
</ref>
<ref id="B48">
<label>48.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vicario</surname>
<given-names>MD</given-names>
</name>
<name>
<surname>Quattrociocchi</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Scala</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Zollo</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>Polarization and Fake News</article-title>. <source>ACM Trans Web</source> (<year>2019</year>) <volume>13</volume>(<issue>2</issue>):<fpage>1</fpage>&#x2013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.1145/3316809</pub-id> </citation>
</ref>
<ref id="B49">
<label>49.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jin</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Tian</surname>
<given-names>Q</given-names>
</name>
</person-group>. <article-title>Novel Visual and Statistical Image Features for Microblogs News Verification</article-title>. <source>IEEE Trans multimedia</source> (<year>2016</year>) <volume>19</volume>(<issue>3</issue>):<fpage>598</fpage>&#x2013;<lpage>608</lpage>. </citation>
</ref>
<ref id="B50">
<label>50.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>F</surname>
<given-names>Yang</given-names>
</name>
<name>
<surname>Y</surname>
<given-names>Liu</given-names>
</name>
<name>
<surname>X</surname>
<given-names>Yu</given-names>
</name>
<name>
<surname>M</surname>
<given-names>Yang</given-names>
</name>
</person-group>, editors. <source>Automatic Detection of Rumor on Sina Weibo</source>. <conf-name>Proceedings of the ACM SIGKDD workshop on mining data semantics</conf-name> (<year>2012</year>).</citation>
</ref>
<ref id="B51">
<label>51.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>D</surname>
<given-names>Lin</given-names>
</name>
<name>
<surname>Y</surname>
<given-names>Lv</given-names>
</name>
<name>
<surname>D</surname>
<given-names>Cao</given-names>
</name>
</person-group>, editors. <source>Rumor Diffusion Purpose Analysis from Social Attribute to Social Content</source>. <conf-name>2015 International Conference on Asian Language Processing (IALP)</conf-name>. <publisher-name>IEEE</publisher-name> (<year>2015</year>).</citation>
</ref>
<ref id="B52">
<label>52.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>C</surname>
<given-names>Castillo</given-names>
</name>
<name>
<surname>M</surname>
<given-names>Mendoza</given-names>
</name>
<name>
<surname>B</surname>
<given-names>Poblete</given-names>
</name>
</person-group>, editors. <source>Information Credibility on Twitter</source>. <conf-name>Proceedings of the 20th international conference on World wide web</conf-name> (<year>2011</year>).</citation>
</ref>
<ref id="B53">
<label>53.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shu</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Mahudeswaran</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>Fakenewsnet: A Data Repository with News Content, Social Context, and Spatiotemporal Information for Studying Fake News on Social media</article-title>. <source>Big data</source> (<year>2020</year>) <volume>8</volume>(<issue>3</issue>):<fpage>171</fpage>&#x2013;<lpage>88</lpage>. <pub-id pub-id-type="doi">10.1089/big.2020.0062</pub-id> </citation>
</ref>
<ref id="B54">
<label>54.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vosoughi</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Mohsenvand</surname>
<given-names>MN</given-names>
</name>
<name>
<surname>Roy</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Rumor Gauge</article-title>. <source>ACM Trans Knowl Discov Data</source> (<year>2017</year>) <volume>11</volume>(<issue>4</issue>):<fpage>1</fpage>&#x2013;<lpage>36</lpage>. <pub-id pub-id-type="doi">10.1145/3070644</pub-id> </citation>
</ref>
<ref id="B55">
<label>55.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Ng</surname>
<given-names>ST</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>SH</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>FJ</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>A Domain Knowledge Incorporated Text Mining Approach for Capturing User Needs on BIM Applications</article-title>. <source>Eng Construction Architectural Management</source> (<year>2019</year>). </citation>
</ref>
<ref id="B56">
<label>56.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ishida</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Kuraya</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Fake News and its Credibility Evaluation by Dynamic Relational Networks: A Bottom up Approach</article-title>. <source>Proced Computer Sci</source> (<year>2018</year>) <volume>126</volume>:<fpage>2228</fpage>&#x2013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1016/j.procs.2018.07.226</pub-id> </citation>
</ref>
<ref id="B57">
<label>57.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Edunov</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Logothetis</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Ching</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kabiljo</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Darwini: Generating Realistic Large-Scale Social Graphs</article-title>. <source>arXiv preprint arXiv:161000664</source> (<year>2016</year>). </citation>
</ref>
<ref id="B58">
<label>58.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lillie</surname>
<given-names>AE</given-names>
</name>
<name>
<surname>Middelboe</surname>
<given-names>ER</given-names>
</name>
</person-group>. <article-title>Fake News Detection Using Stance Classification: A Survey</article-title>. <source>arXiv preprint arXiv</source> (<year>2019</year>) <volume>190700181</volume>:<fpage>907</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-50496&#x2013;485</pub-id> </citation>
</ref>
<ref id="B59">
<label>59.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Gui</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Du</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Xue</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Overview of NLPCC Shared Task 4: Stance Detection in Chinese Microblogs</article-title>. <source>Nat Lang understanding Intell Appl Springer</source> (<year>2016</year>). p. <fpage>907</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-50496-4_85</pub-id> </citation>
</ref>
<ref id="B60">
<label>60.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Aker</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Derczynski</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Bontcheva</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Simple Open Stance Classification for Rumour Analysis</article-title>. <source>arXiv preprint arXiv</source> (<year>2017</year>) <volume>170805286</volume>. <pub-id pub-id-type="doi">10.26615/978-954-452-049-6_005</pub-id> </citation>
</ref>
<ref id="B61">
<label>61.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>S</surname>
<given-names>Dungs</given-names>
</name>
<name>
<surname>A</surname>
<given-names>Aker</given-names>
</name>
<name>
<surname>N</surname>
<given-names>Fuhr</given-names>
</name>
<name>
<surname>K</surname>
<given-names>Bontcheva</given-names>
</name>
</person-group>, editors. <source>Can Rumour Stance Alone Predict Veracity?</source> <conf-name>Proceedings of the 27th International Conference on Computational Linguistics</conf-name> (<year>2018</year>).</citation>
</ref>
<ref id="B62">
<label>62.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>P&#xe9;rez-Rosas</surname>
<given-names>V</given-names>
</name>
<name>
<surname>Kleinberg</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Lefevre</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Mihalcea</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Automatic Detection of Fake News</article-title>. <source>arXiv preprint arXiv</source> (<year>2017</year>) <volume>170807104</volume>. </citation>
</ref>
<ref id="B63">
<label>63.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zarrella</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Marsh</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Mitre at Semeval-2016 Task 6: Transfer Learning for Stance Detection</article-title>. <source>arXiv preprint arXiv:160603784</source> (<year>2016</year>). <pub-id pub-id-type="doi">10.18653/v1/s16-1074</pub-id> </citation>
</ref>
<ref id="B64">
<label>64.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>L</surname>
<given-names>Poddar</given-names>
</name>
<name>
<surname>W</surname>
<given-names>Hsu</given-names>
</name>
<name>
<surname>ML</surname>
<given-names>Lee</given-names>
</name>
<name>
<surname>S</surname>
<given-names>Subramaniyam</given-names>
</name>
</person-group>, editors. <source>Predicting Stances in Twitter Conversations for Detecting Veracity of Rumors: A Neural Approach</source>. <conf-name>2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI</conf-name>. <publisher-name>IEEE</publisher-name> (<year>2018</year>).</citation>
</ref>
<ref id="B65">
<label>65.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumar</surname>
<given-names>KK</given-names>
</name>
<name>
<surname>Geethakumari</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Detecting Misinformation in Online Social Networks Using Cognitive Psychology</article-title>. <source>Human-centric Comput Inf Sci</source> (<year>2014</year>) <volume>4</volume>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.1186/s13673-014-0014-x</pub-id> </citation>
</ref>
<ref id="B66">
<label>66.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Sui</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Multi-level Attention Residuals Neural Network for Multimodal Online Social Network Rumor Detection</article-title>. <source>FrPhy</source> (<year>2021</year>) <volume>9</volume>:<fpage>466</fpage>. <pub-id pub-id-type="doi">10.3389/fphy.2021.711221</pub-id> </citation>
</ref>
<ref id="B67">
<label>67.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>C</surname>
<given-names>Conforti</given-names>
</name>
<name>
<surname>MT</surname>
<given-names>Pilehvar</given-names>
</name>
<name>
<surname>N</surname>
<given-names>Collier</given-names>
</name>
</person-group>, editors. <source>Towards Automatic Fake News Detection: Cross-Level Stance Detection in News Articles</source>. <conf-name>Proceedings of the First Workshop on Fact Extraction and VERification (FEVER)</conf-name> (<year>2018</year>).</citation>
</ref>
<ref id="B68">
<label>68.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rodr&#xed;guez</surname>
<given-names>CP</given-names>
</name>
<name>
<surname>Carballido</surname>
<given-names>BV</given-names>
</name>
<name>
<surname>Redondo-Sama</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Ramis</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Flecha</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>False News Around COVID-19 Circulated Less on Sina Weibo Than on Twitter. How to Overcome False Information?</article-title> <source>Int Multidisciplinary J Soc Sci</source> (<year>2020</year>) <volume>9</volume>(<issue>2</issue>):<fpage>107</fpage>&#x2013;<lpage>28</lpage>. </citation>
</ref>
<ref id="B69">
<label>69.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Lai</surname>
<given-names>KK</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Exploring Public Mood toward Commodity Markets: A Comparative Study of User Behavior on Sina Weibo and Twitter</article-title>. <source>Intr</source> (<year>2020</year>) <volume>31</volume>(<issue>3</issue>):<fpage>1102</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1108/intr-02-2020-0055</pub-id> </citation>
</ref>
<ref id="B70">
<label>70.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mohammad</surname>
<given-names>SM</given-names>
</name>
<name>
<surname>Sobhani</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Kiritchenko</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Stance and Sentiment in Tweets</article-title>. <source>ACM Trans Internet Technol</source> (<year>2017</year>) <volume>17</volume>(<issue>3</issue>):<fpage>1</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1145/3003433</pub-id> </citation>
</ref>
<ref id="B71">
<label>71.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Derczynski</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Bontcheva</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Liakata</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Procter</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Hoi</surname>
<given-names>GWS</given-names>
</name>
<name>
<surname>Zubiaga</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>SemEval-2017 Task 8: RumourEval: Determining Rumour Veracity and Support for Rumours</article-title>. <source>arXiv preprint arXiv</source> (<year>2017</year>) <volume>170405972</volume>. </citation>
</ref>
<ref id="B72">
<label>72.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Duan</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>Q</given-names>
</name>
</person-group>. <article-title>The Impact of Social and Conventional media on Firm Equity Value: A Sentiment Analysis Approach</article-title>. <source>Decis support Syst</source> (<year>2013</year>) <volume>55</volume>(<issue>4</issue>):<fpage>919</fpage>&#x2013;<lpage>26</lpage>. <pub-id pub-id-type="doi">10.1016/j.dss.2012.12.028</pub-id> </citation>
</ref>
<ref id="B73">
<label>73.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Warrens</surname>
<given-names>MJ</given-names>
</name>
</person-group>. <article-title>Weighted Kappa Is Higher Than Cohen&#x27;s Kappa for Tridiagonal Agreement Tables</article-title>. <source>Stat Methodol</source> (<year>2011</year>) <volume>8</volume>(<issue>2</issue>):<fpage>268</fpage>&#x2013;<lpage>72</lpage>. <pub-id pub-id-type="doi">10.1016/j.stamet.2010.09.004</pub-id> </citation>
</ref>
<ref id="B74">
<label>74.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fleiss</surname>
<given-names>JL</given-names>
</name>
<name>
<surname>Cohen</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Everitt</surname>
<given-names>BS</given-names>
</name>
</person-group>. <article-title>Large Sample Standard Errors of Kappa and Weighted Kappa</article-title>. <source>Psychol Bull</source> (<year>1969</year>) <volume>72</volume>(<issue>5</issue>):<fpage>323</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1037/h0028106</pub-id> </citation>
</ref>
<ref id="B75">
<label>75.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cohen</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>A Coefficient of Agreement for Nominal Scales</article-title>. <source>Educ Psychol Meas</source> (<year>1960</year>) <volume>20</volume>(<issue>1</issue>):<fpage>37</fpage>&#x2013;<lpage>46</lpage>. <pub-id pub-id-type="doi">10.1177/001316446002000104</pub-id> </citation>
</ref>
<ref id="B76">
<label>76.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mikolov</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Corrado</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Dean</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Efficient Estimation of Word Representations in Vector Space</article-title>. <source>arXiv preprint arXiv:13013781</source> (<year>2013</year>). </citation>
</ref>
<ref id="B77">
<label>77.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Chinese Comments Sentiment Classification Based on Word2vec and SVMperf</article-title>. <source>Expert Syst Appl</source> (<year>2015</year>) <volume>42</volume>(<issue>4</issue>):<fpage>1857</fpage>&#x2013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2014.09.011</pub-id> </citation>
</ref>
<ref id="B78">
<label>78.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hochreiter</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Schmidhuber</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Long Short-Term Memory</article-title>. <source>Neural Comput</source> (<year>1997</year>) <volume>9</volume>(<issue>8</issue>):<fpage>1735</fpage>&#x2013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1162/neco.1997.9.8.1735</pub-id> </citation>
</ref>
<ref id="B79">
<label>79.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>Chinese Text Classification Model Based on Deep Learning</article-title>. <source>Future Internet</source> (<year>2018</year>) <volume>10</volume>(<issue>11</issue>):<fpage>113</fpage>. <pub-id pub-id-type="doi">10.3390/fi10110113</pub-id> </citation>
</ref>
<ref id="B80">
<label>80.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Masterson</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Using Word Order in Political Text Classification with Long Short-Term Memory Models</article-title>. <source>Polit Anal</source> (<year>2020</year>) <volume>28</volume>(<issue>3</issue>):<fpage>395</fpage>&#x2013;<lpage>411</lpage>. <pub-id pub-id-type="doi">10.1017/pan.2019.46</pub-id> </citation>
</ref>
<ref id="B81">
<label>81.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fei</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Yao</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>H</given-names>
</name>
<etal/>
</person-group>
<article-title>Deep Learning Structure for Cross-Domain Sentiment Classification Based on Improved Cross Entropy and Weight</article-title>. <source>Scientific Programming</source> (<year>2020</year>) <fpage>2020</fpage>. <pub-id pub-id-type="doi">10.1155/2020/3810261</pub-id> </citation>
</ref>
<ref id="B82">
<label>82.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Zhong</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>Specular Highlight Detection Based on Color Distribution for Endoscopic Images</article-title>. <source>FrPhy</source> (<year>2021</year>) <volume>8</volume>:<fpage>575</fpage>. <pub-id pub-id-type="doi">10.3389/fphy.2020.616930</pub-id> </citation>
</ref>
<ref id="B83">
<label>83.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lin</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Lin</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model</article-title>. <source>IEEE Access</source> (<year>2018</year>) <volume>7</volume>:<fpage>4478</fpage>&#x2013;<lpage>86</lpage>. </citation>
</ref>
<ref id="B84">
<label>84.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Zhan</surname>
<given-names>X-X</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Z-K</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>G-Q</given-names>
</name>
<name>
<surname>Hui</surname>
<given-names>PM</given-names>
</name>
</person-group>. <article-title>How Events Determine Spreading Patterns: Information Transmission via Internal and External Influences on Social Networks</article-title>. <source>New J Phys</source> (<year>2015</year>) <volume>17</volume>(<issue>11</issue>):<fpage>113045</fpage>. <pub-id pub-id-type="doi">10.1088/1367-2630/17/11/113045</pub-id> </citation>
</ref>
<ref id="B85">
<label>85.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>Weibo Network, Information Diffusion and Implications for Collective Action in China</article-title>. <source>Inf Commun Soc</source> (<year>2014</year>) <volume>17</volume>(<issue>1</issue>):<fpage>86</fpage>&#x2013;<lpage>104</lpage>. <pub-id pub-id-type="doi">10.1080/1369118x.2013.853817</pub-id> </citation>
</ref>
<ref id="B86">
<label>86.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sar&#x131;y&#xfc;ce</surname>
<given-names>AE</given-names>
</name>
<name>
<surname>Gedik</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Jacques-Silva</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>K-L</given-names>
</name>
<name>
<surname>&#xc7;ataly&#xfc;rek</surname>
<given-names>&#xdc;V</given-names>
</name>
</person-group>. <article-title>Incremental K-Core Decomposition: Algorithms and Evaluation</article-title>. <source>VLDB J</source> (<year>2016</year>) <volume>25</volume>(<issue>3</issue>):<fpage>425</fpage>&#x2013;<lpage>47</lpage>. <pub-id pub-id-type="doi">10.1007/s00778-016-0423-8</pub-id> </citation>
</ref>
<ref id="B87">
<label>87.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dorogovtsev</surname>
<given-names>SN</given-names>
</name>
<name>
<surname>Goltsev</surname>
<given-names>AV</given-names>
</name>
<name>
<surname>Mendes</surname>
<given-names>JF</given-names>
</name>
</person-group>. <article-title>K-core Organization of Complex Networks</article-title>. <source>Phys Rev Lett</source> (<year>2006</year>) <volume>96</volume>:<fpage>040601</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevLett.96.040601</pub-id> </citation>
</ref>
<ref id="B88">
<label>88.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alvarez-Hamelin</surname>
<given-names>JI</given-names>
</name>
<name>
<surname>Dall&#x27;Asta</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Barrat</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Vespignani</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>K-core Decomposition: A Tool for the Visualization of Large Scale Networks</article-title>. <source>arXiv preprint cs/0504107</source> (<year>2005</year>). </citation>
</ref>
<ref id="B89">
<label>89.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Newman</surname>
<given-names>MEJ</given-names>
</name>
</person-group>. <article-title>The Structure and Function of Complex Networks</article-title>. <source>SIAM Rev</source> (<year>2003</year>) <volume>45</volume>(<issue>2</issue>):<fpage>167</fpage>&#x2013;<lpage>256</lpage>. <pub-id pub-id-type="doi">10.1137/s003614450342480</pub-id> </citation>
</ref>
<ref id="B90">
<label>90.</label>
<citation citation-type="confproc">
<person-group person-group-type="editor">
<name>
<surname>M</surname>
<given-names>Bastian</given-names>
</name>
<name>
<surname>S</surname>
<given-names>Heymann</given-names>
</name>
<name>
<surname>M</surname>
<given-names>Jacomy</given-names>
</name>
</person-group>, editors. <source>Gephi: An Open Source Software for Exploring and Manipulating Networks</source>. <conf-name>Third international AAAI conference on weblogs and social media</conf-name> (<year>2009</year>).</citation>
</ref>
<ref id="B91">
<label>91.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Grandjean</surname>
<given-names>M</given-names>
</name>
</person-group>. <source>Gephi: Introduction to Network Analysis and Visualisation</source> (<year>2015</year>). </citation>
</ref>
<ref id="B92">
<label>92.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fruchterman</surname>
<given-names>TMJ</given-names>
</name>
<name>
<surname>Reingold</surname>
<given-names>EM</given-names>
</name>
</person-group>. <article-title>Graph Drawing by Force-Directed Placement</article-title>. <source>Softw Pract Exper</source> (<year>1991</year>) <volume>21</volume>(<issue>11</issue>):<fpage>1129</fpage>&#x2013;<lpage>64</lpage>. <pub-id pub-id-type="doi">10.1002/spe.4380211102</pub-id> </citation>
</ref>
<ref id="B93">
<label>93.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sharpe</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Chi-square Test Is Statistically Significant: Now what?</article-title> <source>Pract Assess Res Eval</source> (<year>2015</year>) <volume>20</volume>(<issue>1</issue>):<fpage>8</fpage>. </citation>
</ref>
<ref id="B94">
<label>94.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kerby</surname>
<given-names>DS</given-names>
</name>
</person-group>. <article-title>The Simple Difference Formula: An Approach to Teaching Nonparametric Correlation</article-title>. <source>Compr Psychol</source> (<year>2014</year>) <volume>3</volume>:<fpage>11</fpage>. <pub-id pub-id-type="doi">10.2466/11.it.3.1</pub-id> </citation>
</ref>
<ref id="B95">
<label>95.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nelson</surname>
<given-names>JL</given-names>
</name>
<name>
<surname>Taneja</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>The Small, Disloyal Fake News Audience: The Role of Audience Availability in Fake News Consumption</article-title>. <source>New Media Soc</source> (<year>2018</year>) <volume>20</volume>(<issue>10</issue>):<fpage>3720</fpage>&#x2013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1177/1461444818758715</pub-id> </citation>
</ref>
<ref id="B96">
<label>96.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Crane</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Sornette</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Robust Dynamic Classes Revealed by Measuring the Response Function of a Social System</article-title>. <source>Proc Natl Acad Sci</source> (<year>2008</year>) <volume>105</volume>(<issue>41</issue>):<fpage>15649</fpage>&#x2013;<lpage>53</lpage>. <pub-id pub-id-type="doi">10.1073/pnas.0803685105</pub-id> </citation>
</ref>
<ref id="B97">
<label>97.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>DiFonzo</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Bordia</surname>
<given-names>P</given-names>
</name>
</person-group>. <source>Rumor Psychology: Social and Organizational Approaches</source>. <publisher-name>American Psychological Association</publisher-name> (<year>2007</year>). <pub-id pub-id-type="doi">10.1037/11503-000</pub-id> </citation>
</ref>
<ref id="B98">
<label>98.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fath</surname>
<given-names>BP</given-names>
</name>
<name>
<surname>Fiedler</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Whittaker</surname>
<given-names>DH</given-names>
</name>
</person-group>. <article-title>Collective Destination Marketing in China: Leveraging Social media Celebrity Endorsement</article-title>. <source>Tourism Anal</source> (<year>2017</year>) <volume>22</volume>(<issue>3</issue>):<fpage>377</fpage>&#x2013;<lpage>87</lpage>. <pub-id pub-id-type="doi">10.3727/108354217x14955605216113</pub-id> </citation>
</ref>
<ref id="B99">
<label>99.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Djafarova</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Rushworth</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Exploring the Credibility of Online Celebrities&#x27; Instagram Profiles in Influencing the Purchase Decisions of Young Female Users</article-title>. <source>Comput Hum Behav</source> (<year>2017</year>) <volume>68</volume>:<fpage>1</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2016.11.009</pub-id> </citation>
</ref>
<ref id="B100">
<label>100.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Malik</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>ML</given-names>
</name>
<name>
<surname>Quan-Haase</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Public Health Agencies Outreach through Instagram during the Covid-19 Pandemic: Crisis and Emergency Risk Communication Perspective</article-title>. <source>Int J Disaster Risk Reduction</source> (<year>2021</year>) <volume>61</volume>:<fpage>102346</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijdrr.2021.102346</pub-id> </citation>
</ref>
<ref id="B101">
<label>101.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>George</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Gerhart</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Torres</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Uncovering the Truth about Fake News: A Research Model Grounded in Multi-Disciplinary Literature</article-title>. <source>J Management Inf Syst</source> (<year>2021</year>) <volume>38</volume>(<issue>4</issue>):<fpage>1067</fpage>&#x2013;<lpage>94</lpage>. <pub-id pub-id-type="doi">10.1080/07421222.2021.1990608</pub-id> </citation>
</ref>
<ref id="B102">
<label>102.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zajonc</surname>
<given-names>RB</given-names>
</name>
</person-group>. <article-title>Social Facilitation</article-title>. <source>Science</source> (<year>1965</year>) <volume>149</volume>(<issue>3681</issue>):<fpage>269</fpage>&#x2013;<lpage>74</lpage>. <pub-id pub-id-type="doi">10.1126/science.149.3681.269</pub-id> </citation>
</ref>
<ref id="B103">
<label>103.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luqiu</surname>
<given-names>LR</given-names>
</name>
<name>
<surname>Schmierbach</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Ng</surname>
<given-names>Y-L</given-names>
</name>
</person-group>. <article-title>Willingness to Follow Opinion Leaders: A Case Study of Chinese Weibo</article-title>. <source>Comput Hum Behav</source> (<year>2019</year>) <volume>101</volume>:<fpage>42</fpage>&#x2013;<lpage>50</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2019.07.005</pub-id> </citation>
</ref>
<ref id="B104">
<label>104.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Kou</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Understanding Influence Power of Opinion Leaders in E-Commerce Networks: An Opinion Dynamics Theory Perspective</article-title>. <source>Inf Sci</source> (<year>2018</year>) <volume>426</volume>:<fpage>131</fpage>&#x2013;<lpage>47</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2017.10.031</pub-id> </citation>
</ref>
<ref id="B105">
<label>105.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Understanding the Power of Opinion Leaders&#x27; Influence on the Diffusion Process of Popular mobile Games: Travel Frog on Sina Weibo</article-title>. <source>Comput Hum Behav</source> (<year>2020</year>) <volume>109</volume>:<fpage>106354</fpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2020.106354</pub-id> </citation>
</ref>
<ref id="B106">
<label>106.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Granovetter</surname>
<given-names>MS</given-names>
</name>
</person-group>. <article-title>The Strength of Weak Ties</article-title>. <source>Am J Sociol</source> (<year>1973</year>) <volume>78</volume>(<issue>6</issue>):<fpage>1360</fpage>&#x2013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1086/225469</pub-id> </citation>
</ref>
<ref id="B107">
<label>107.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wei</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Bu</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Gollagher</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>The Process of Crisis Information Dissemination: Impacts of the Strength of Ties in Social Networks</article-title>. <source>Kyb</source> (<year>2014</year>). <pub-id pub-id-type="doi">10.1108/k-03-2013-0043</pub-id> </citation>
</ref>
<ref id="B108">
<label>108.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Petr&#xf3;czi</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Nepusz</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Bazs&#xf3;</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>Measuring Tie-Strength in Virtual Social Networks</article-title>. <source>Connections</source> (<year>2007</year>) <volume>27</volume>(<issue>2</issue>):<fpage>39</fpage>&#x2013;<lpage>52</lpage>. </citation>
</ref>
<ref id="B109">
<label>109.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Sobkowicz</surname>
<given-names>P</given-names>
</name>
</person-group>. <source>Whither Now, Opinion Modelers? FrPhy</source> (<year>2020</year>). p. <fpage>461</fpage>. </citation>
</ref>
<ref id="B110">
<label>110.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lai</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Wong</surname>
<given-names>O</given-names>
</name>
</person-group>. <article-title>The Tie Effect on Information Dissemination: The Spread of a Commercial Rumor in Hong Kong</article-title>. <source>Social Networks</source> (<year>2002</year>) <volume>24</volume>(<issue>1</issue>):<fpage>49</fpage>&#x2013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.1016/s0378-8733(01)00050-8</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>