Notice: file_put_contents(): Write of 358999 bytes failed with errno=28 No space left on device in /opt/frankenphp/design.onmedianet.com/app/src/Arsae/CacheManager.php on line 36

Warning: http_response_code(): Cannot set response code - headers already sent (output started at /opt/frankenphp/design.onmedianet.com/app/src/Arsae/CacheManager.php:36) in /opt/frankenphp/design.onmedianet.com/app/src/Models/Response.php on line 17

Warning: Cannot modify header information - headers already sent by (output started at /opt/frankenphp/design.onmedianet.com/app/src/Arsae/CacheManager.php:36) in /opt/frankenphp/design.onmedianet.com/app/src/Models/Response.php on line 20
The spread of true and false news online | Science
Skip to main content
Advertisement
Main content starts here

Lies spread faster than the truth

There is worldwide concern over false news and the possibility that it can influence political, economic, and social well-being. To understand how false news spreads, Vosoughi et al. used a data set of rumor cascades on Twitter from 2006 to 2017. About 126,000 rumors were spread by ∼3 million people. False news reached more people than the truth; the top 1% of false news cascades diffused to between 1000 and 100,000 people, whereas the truth rarely diffused to more than 1000 people. Falsehood also diffused faster than the truth. The degree of novelty and the emotional reactions of recipients may be responsible for the differences observed.
Science, this issue p. 1146

Abstract

We investigated the differential diffusion of all of the verified true and false news stories distributed on Twitter from 2006 to 2017. The data comprise ~126,000 stories tweeted by ~3 million people more than 4.5 million times. We classified news as true or false using information from six independent fact-checking organizations that exhibited 95 to 98% agreement on the classifications. Falsehood diffused significantly farther, faster, deeper, and more broadly than the truth in all categories of information, and the effects were more pronounced for false political news than for false news about terrorism, natural disasters, science, urban legends, or financial information. We found that false news was more novel than true news, which suggests that people were more likely to share novel information. Whereas false stories inspired fear, disgust, and surprise in replies, true stories inspired anticipation, sadness, joy, and trust. Contrary to conventional wisdom, robots accelerated the spread of true and false news at the same rate, implying that false news spreads more than the truth because humans, not robots, are more likely to spread it.

Register and access this article for free

As a service to the community, this article is available for free.

Access the full article

View all access options to continue reading this article.

Supplementary Material

Summary

Materials and Methods
Figs. S1 to S20
Tables S1 to S39
References (3775)

Resources

File (aap9559_vosoughi_sm.pdf)

References and Notes

1
L. J. Savage, The theory of statistical decision. J. Am. Stat. Assoc. 46, 55–67 (1951).
2
H. A. Simon, The New Science of Management Decision (Harper & Brothers Publishers, New York, 1960).
3
R. Wedgwood, The aim of belief. Noûs 36, 267–297 (2002).
4
E. Fehr, U. Fischbacher, The nature of human altruism. Nature 425, 785–791 (2003).
5
C. E. Shannon, A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948).
6
S. Bikhchandani, D. Hirshleifer, I. Welch, A theory of fads, fashion, custom, and cultural change as informational cascades. J. Polit. Econ. 100, 992–1026 (1992).
7
K. Rapoza, “Can ‘fake news’ impact the stock market?” Forbes, 26 February 2017; www.forbes.com/sites/kenrapoza/2017/02/26/can-fake-news-impact-the-stock-market/.
8
M. Mendoza, B. Poblete, C. Castillo, “Twitter under crisis: Can we trust what we RT?” in Proceedings of the First Workshop on Social Media Analytics (Association for Computing Machinery, ACM, 2010), pp. 71–79.
9
A. Gupta, H. Lamba, P. Kumaraguru, A. Joshi, “Faking Sandy: Characterizing and identifying fake images on Twitter during Hurricane Sandy,” in Proceedings of the 22nd International Conference on World Wide Web (ACM, 2010), pp. 729–736.
10
K. Starbird, J. Maddock, M. Orand, P. Achterman, R. M. Mason, “Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston Marathon bombing,” in iConference 2014 Proceedings (iSchools, 2014).
11
J. Gottfried, E. Shearer, “News use across social media platforms,” Pew Research Center, 26 May 2016; www.journalism.org/2016/05/26/news-use-across-social-media-platforms-2016/.
12
C. Silverman, “This analysis shows how viral fake election news stories outperformed real news on Facebook,” BuzzFeed News, 16 November 2016; www.buzzfeed.com/craigsilverman/viral-fake-election-news-outperformed-real-news-on-facebook/.
13
M. De Domenico, A. Lima, P. Mougel, M. Musolesi, The anatomy of a scientific rumor. Sci. Rep. 3, 2980 (2013).
14
O. Oh, K. H. Kwon, H. R. Rao, “An exploration of social media in extreme events: Rumor theory and Twitter during the Haiti earthquake 2010,” in Proceedings of the International Conference on Information Systems (International Conference on Information Systems, ICIS, paper 231, 2010).
15
M. Tambuscio, G. Ruffo, A. Flammini, F. Menczer, “Fact-checking effect on viral hoaxes: A model of misinformation spread in social networks,” in Proceedings of the 24th International Conference on World Wide Web (ACM, 2015), pp. 977–982.
16
Z. Zhao, P. Resnick, Q. Mei, “Enquiring minds: Early detection of rumors in social media from enquiry posts,” in Proceedings of the 24th International Conference on World Wide Web (ACM, 2015), pp. 1395–1405.
17
M. Gupta, P. Zhao, J. Han, “Evaluating event credibility on Twitter,” in Proceedings of the 2012 Society for Industrial and Applied Mathematics International Conference on Data Mining (Society for Industrial and Applied Mathematics, SIAM, 2012), pp. 153–164.
18
G. L. Ciampaglia, P. Shiralkar, L. M. Rocha, J. Bollen, F. Menczer, A. Flammini, Computational fact checking from knowledge networks. PLOS ONE 10, e0128193 (2015).
19
A. Friggeri, L. A. Adamic, D. Eckles, J. Cheng, “Rumor cascades,” in Proceedings of the International Conference on Weblogs and Social Media (Association for the Advancement of Artificial Intelligence, AAAI, 2014)
20
M. Del Vicario, A. Bessi, F. Zollo, F. Petroni, A. Scala, G. Caldarelli, H. E. Stanley, W. Quattrociocchi, The spreading of misinformation online. Proc. Natl. Acad. Sci. U.S.A. 113, 554–559 (2016).
21
A. Bessi, M. Coletto, G. A. Davidescu, A. Scala, G. Caldarelli, W. Quattrociocchi, Science vs conspiracy: Collective narratives in the age of misinformation. PLOS ONE 10, e0118093 (2015).
22
Friggeri et al. (19) do evaluate two metrics of diffusion: depth, which shows little difference between true and false rumors, and shares per rumor, which is higher for true rumors than it is for false rumors. Although these results are important, they are not definitive owing to the smaller sample size of the study; the early timing of the sample, which misses the rise of false news after 2013; and the fact that more shares per rumor do not necessarily equate to deeper, broader, or more rapid diffusion.
23
S. Goel, A. Anderson, J. Hofman, D. J. Watts, The structural virality of online diffusion. Manage. Sci. 62, 180–196 (2015).
24
L. Itti, P. Baldi, Bayesian surprise attracts human attention. Vision Res. 49, 1295–1306 (2009).
25
S. Aral, M. Van Alstyne, The diversity-bandwidth trade-off. Am. J. Sociol. 117, 90–171 (2011).
26
J. Berger, K. L. Milkman, What makes online content viral? J. Mark. Res. 49, 192–205 (2012).
27
D. M. Blei, A. Y. Ng, M. I. Jordan, Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993–1022 (2003).
28
S. Aral, P. Dhillon, “Unpacking novelty: The anatomy of vision advantages,” Working paper, MIT–Sloan School of Management, Cambridge, MA, 22 June 2016; https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2388254.
29
T. M. Cover, J. A. Thomas, Elements of Information Theory (Wiley, 2012).
30
T. Kailath, The divergence and Bhattacharyya distance measures in signal selection. IEEE Trans. Commun. Technol. 15, 52–60 (1967).
31
R. Plutchik, The nature of emotions. Am. Sci. 89, 344–350 (2001).
32
S. M. Mohammad, P. D. Turney, Crowdsourcing a word-emotion association lexicon. Comput. Intell. 29, 436–465 (2013).
33
S. M. Mohammad, S. Kiritchenko, Using hashtags to capture fine emotion categories from tweets. Comput. Intell. 31, 301–326 (2015).
34
S. Vosoughi, D. Roy, “A semi-automatic method for efficient detection of stories on social media,” in Proceedings of the 10th International AAAI Conference on Weblogs and Social Media (AAAI, 2016), pp. 707–710.
35
C. A. Davis, O. Varol, E. Ferrara, A. Flammini, F. Menczer, “BotOrNot: A system to evaluate social bots,” in Proceedings of the 25th International Conference Companion on World Wide Web (ACM, 2016), pp. 273–274.
36
For example, this is an argument made in recent testimony by Clint Watts—Robert A. Fox Fellow at the Foreign Policy Research Institute and Senior Fellow at the Center for Cyber and Homeland Security at George Washington University—given during the U.S. Senate Select Committee on Intelligence hearing on “Disinformation: A Primer in Russian Active Measures and Influence Campaigns” on 30 March 2017; www.intelligence.senate.gov/sites/default/files/documents/os-cwatts-033017.pdf.
37
D. Trpevski, W. K. Tang, L. Kocarev, Model for rumor spreading over networks. Phys. Rev. E Stat. Nonlin. Soft Matter Phys. 81, 056102 (2010).
38
B. Doerr, M. Fouz, T. Friedrich, Why rumors spread so quickly in social networks. Commun. ACM 55, 70–75 (2012).
39
F. Jin, E. Dougherty, P. Saraf, Y. Cao, N. Ramakrishnan, “Epidemiological modeling of news and rumors on Twitter,” in Proceedings of the 7th Workshop on Social Network Mining and Analysis (ACM, 2013).
40
J. Cheng, L. A. Adamic, J. M. Kleinberg, J. Leskovec, “Do cascades recur?” in Proceedings of the 25th International Conference on World Wide Web (ACM, 2016).
41
V. Qazvinian, E. Rosengren, D. R. Radev, Q. Mei, “Rumor has it: Identifying misinformation in microblogs,” in Proceedings of the Conference on Empirical Methods in Natural Language Processing (Association for Computational Linguistics, ACL, 2011).
42
S. Vosoughi, M. Mohsenvand, D. Roy, Rumor gauge: Predicting the veracity of rumors on Twitter. ACM Trans. Knowl. Discov. Data 11, 50 (2017).
43
W. Xu, H. Chen, “Scalable rumor source detection under independent cascade model in online social networks,” in 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN) (IEEE, 2015).
44
T. Takahashi, N. Igata, “Rumor detection on Twitter,” in 2012 Joint 6th International Conference on Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS) (IEEE, 2012).
45
C. Castillo, M. Mendoza, B. Poblete, “Information credibility on Twitter,” in Proceedings of the 20th International Conference on World Wide Web (ACM, 2011).
46
R. M. Tripathy, A. Bagchi, S. Mehta, “A study of rumor control strategies on social networks,” in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (ACM, 2010).
47
J. Shin, L. Jian, K. Driscoll, F. Bar, Political rumoring on Twitter during the 2012 U.S. presidential election: Rumor diffusion and correction. New Media Soc. 19, 1214–1235 (2017).
48
P. Ozturk, H. Li, Y. Sakamoto, “Combating rumor spread on social media: The effectiveness of refutation and warning,” in 2015 48th Hawaii International Conference on System Sciences (HICSS) (IEEE, 2015).
49
A. Bessi, F. Petroni, M. Del Vicario, F. Zollo, A. Anagnostopoulos, A. Scala, G. Caldarelli, W. Quattrociocchi, Homophily and polarization in the age of misinformation. Eur. Phys. J. Spec. Top. 225, 2047–2059 (2016).
50
A. Bessi, A. Scala, L. Rossi, Q. Zhang, W. Quattrociocchi, . The economy of attention in the age of (mis)information. J. Trust Manage. 1, 12 (2014).
51
A. Mitchell, J. Gottfried, J. Kiley, K. E. Matsa, “Political polarization & media habits,” Pew Research Center; www.journalism.org/2014/10/21/political-polarization-media-habits/.
52
J. L. Fleiss, Measuring nominal scale agreement among many raters. Psychol. Bull. 76, 378–382 (1971).
53
Q. Le, T. Mikolov, “Distributed representations of sentences and documents,” in Proceedings of the 31st International Conference on Machine Learning (ICML-14) (Journal of Machine Learning Research, 2014).
54
S. Vosoughi, P. Vijayaraghavan, D. Roy, “Tweet2vec: Learning tweet embeddings using character-level cnn-lstm encoder-decoder,” in Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval (ACM, 2016).
55
C. A. Davis, O. Varol, E. Ferrara, A. Flammini, F. Menczer, “Botornot: A system to evaluate social bots,” in Proceedings of the 25th International Conference Companion on World Wide Web (ACM, 2016).
56
J. Maddock, K. Starbird, R. M. Mason, “Using historical Twitter data for research: Ethical challenges of tweet deletions,” in CSCW 2015 Workshop on Ethics for Studying Sociotechnical Systems in a Big Data World (ACM, 2015).
57
S. Goel, D. J. Watts, D. G. Goldstein, “The structure of online diffusion networks,” in Proceedings of the 13th ACM conference on Electronic Commerce (ACM, 2012).
58
J. M. Wooldridge, Cluster-sample methods in applied econometrics. Am. Econ. Rev. 93, 133–138 (2003).
59
A. C. Cameron, D. L. Miller, A practitioner’s guide to cluster-robust inference. J. Hum. Resour. 50, 317–372 (2015).
60
P. Vijayaraghavan, S. Vosoughi, D. Roy, “Twitter demographic classification using deep multi-modal multi-task learning,” in Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (ACL) (Volume 2: Short Papers) (ACL, 2017).
61
A. Gupta, H. Lamba, P. Kumaraguru, A. Joshi, “Faking Sandy: Characterizing and identifying fake images on Twitter during Hurricane Sandy,” in Proceedings of the 22nd International Conference on World Wide Web (ACM, 2013).
62
S. M. Mohammad, P. D. Turney, “Emotions evoked by common words and phrases: Using mechanical turk to create an emotion lexicon,” in Proceedings of the NAACL HLT 2010 Workshop on Computational Approaches to Analysis and Generation of Emotion in Text (ACL, 2010).
63
S. M. Mohammad, “# emotional tweets,” in Proceedings of the First Joint Conference on Lexical and Computational Semantics (ACL, 2012).
64
S. Bird, E. Klein, E. Loper, Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit (O’Reilly Media, ed. 1, 2009).
65
J. W. Pennebaker, M. E. Francis, R. J. Booth, Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates 71, 2001 (2001).
66
M. Mendoza, B. Poblete, C. Castillo, “Twitter under crisis: Can we trust what we RT?” in Proceedings of the First Workshop on Social Media Analytics (ACM, 2010).
67
L. Zeng, K. Starbird, E. S. Spiro, “Rumors at the speed of light? Modeling the rate of rumor transmission during crisis,” in 2016 49th Hawaii International Conference on System Sciences (HICSS) (IEEE, 2016).
68
W. X. Zhao, J. Jiang, J. Weng, J. He, E.-P. Lim, H. Yan, X. Li, “Comparing Twitter and traditional media using topic models,” in European Conference on Information Retrieval (ECIR) (ECIR, 2011).
69
S. Aral, P. Dhillon, “Unpacking novelty: The anatomy of vision advantages,” Working paper, MIT–Sloan School of Management, Cambridge, MA, 22 June 2016.
70
T. M. Cover, J. A. Thomas, Elements of Information Theory (Wiley, ed. 2, 2012).
71
S. Kullback, R. A. Leibler, On information and sufficiency. Ann. Math. Stat. 22, 79–86 (1951).
72
V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfolding of communities in large networks. J. Stat. Mech. 2008, P10008 (2008).
73
S. Vosoughi, D. Roy, “A semi-automatic method for efficient detection of stories on social media,” in 10th International AAAI Conference on Web and Social Media (AAAI, 2016).
74
E. Ferrara, O. Varol, C. Davis, F. Menczer, A. Flammini, The rise of social bots. Commun. ACM 59, 96–104 (2016).
75
A. Almaatouq, E. Shmueli, M. Nouh, A. Alabdulkareem, V. K. Singh, M. Alsaleh, A. Alarifi, A. Alfaris, A. Pentland, If it looks like a spammer and behaves like a spammer, it must be a spammer: Analysis and detection of microblogging spam accounts. Int. J. Inf. Secur. 15, 475–491 (2016).

(0)eLetters

eLetters is a forum for ongoing peer review. eLetters are not edited, proofread, or indexed, but they are screened. eLetters should provide substantive and scholarly commentary on the article. Neither embedded figures nor equations with special characters can be submitted, and we discourage the use of figures and equations within eLetters in general. If a figure or equation is essential, please include within the text of the eLetter a link to the figure, equation, or full text with special characters at a public repository with versioning, such as Zenodo. Please read our Terms of Service before submitting an eLetter.

Log In to Submit a Response

No eLetters have been published for this article yet.

ScienceAdviser

Get Science’s award-winning newsletter with the latest news, commentary, and research, free to your inbox daily.

`; currentEntityStat = entityStat; break; case 1002: htmlView = "` + ` Access through `+entityStat.entityTitle + " " + `
`; currentEntityStat = entityStat; break; case 1003: htmlView = "` + ` Access through `+entityStat.entityTitle + " " + `
`; currentEntityStat = entityStat; break; default: htmlView = defaultHtml; break; } } $seamlessAccessWrapper.html(htmlView); }, (error) => { console.log(error); }); }); })();