paint-brush
Combatting Misinformation: Evaluating Deterministic Prebunking Strategiesby@editorialist
109 reads

Combatting Misinformation: Evaluating Deterministic Prebunking Strategies

by THE Tech Editorialist
THE Tech Editorialist HackerNoon profile picture

THE Tech Editorialist

@editorialist

Crafting compelling perspectives in media, sparking thought-provoking discussions on diverse...

June 14th, 2024
Read on Terminal Reader
Read this story in a terminal
Print this story
tldt arrow

Too Long; Didn't Read

Two deterministic baseline policies for prebunking are proposed: early response, which delivers prebunks immediately upon spotting misinformation, and delayed response, which introduces a time gap before prebunking. Both ensure feasibility in combating misinformation spread.
featured image - Combatting Misinformation: Evaluating Deterministic Prebunking Strategies
1x
Read by Dr. One voice-avatar

Listen to this story

THE Tech Editorialist HackerNoon profile picture
THE Tech Editorialist

THE Tech Editorialist

@editorialist

Crafting compelling perspectives in media, sparking thought-provoking discussions on diverse opinions and viewpoints.

Learn More
LEARN MORE ABOUT @EDITORIALIST'S
EXPERTISE AND PLACE ON THE INTERNET.
0-item

STORY’S CREDIBILITY

Academic Research Paper

Academic Research Paper

Part of HackerNoon's growing list of open-source research papers, promoting free access to academic material.

Author:

(1) Yigit Ege Bayiz, Electrical and Computer Engineering The University of Texas at Austin Austin, Texas, USA (Email: egebayiz@utexas.edu);

(2) Ufuk Topcu, Aerospace Engineering and Engineering Mechanics The University of Texas at Austin Austin, Texas, USA (Email: utopcu@utexas.edu).

Abstract and Introduction

Related Works

Preliminaries

Optimal Prebunking Problem

Deterministic Baseline Policies

Temporally Equidistant Prebunking

Numerical Results

Conclusion and References

V. DETERMINISTIC BASELINE POLICIES

We start our analysis by introducing two baseline deterministic policies with feasibility guarantees. The first of these approaches is called early response, described in Algorithm 1. In this policy, we provide the prebunks as soon as a new misinformation is spotted in the local neighborhood of the user.


It is clear that under Assumption 3, Algorithm 1 ensures that the feasibility condition 12c holds, which we can show


Fig. 1: Two simulated misinformation propagations in a small network of users: Subfigures (a-e) show propagation with noprebunking, and subfigures (f-j) show propagation with prebunking. Dark red vertices represent misinformed users It, light

Fig. 1: Two simulated misinformation propagations in a small network of users: Subfigures (a-e) show propagation with noprebunking, and subfigures (f-j) show propagation with prebunking. Dark red vertices represent misinformed users It, light


image


Thus, the accumulated cost over time is lower bounded by the number of simultaneous misinformation appearances.


Given that the misinformation generation probabilities are constant across time, it is also possible to provide an exact closed-form expression for the policy cost of Algorithm 1, which can be seen in Lemma 1.


image


As a second baseline algorithm, we test introducing a random time gap between the origination of each misinformation and the delivery of their corresponding prebunks. One way to achieve this time gap with a deterministic policy is to always wait until the misinformation arrives at a node neighboring the central user c before providing user c with a prebunk. We call such policy the delayed response policy and provide a description of it in Algorithm 2. As was the case for Algorithm 1, Algorithm 2 also guarantees the feasibility condition 12c.


image


This paper is available on arxiv under CC 4.0 license.


L O A D I N G
. . . comments & more!

About Author

THE Tech Editorialist HackerNoon profile picture
THE Tech Editorialist@editorialist
Crafting compelling perspectives in media, sparking thought-provoking discussions on diverse opinions and viewpoints.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here
Brief
X REMOVE AD