skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: It’s QuizTime: A Study of Online Verification Practices on Twitter
Misinformation poses a threat to public health, safety, and democracy. Training novices to debunk visual misinformation with image verification techniques has shown promise, yet little is known about how novices do so in the wild, and what methods prove effective. Thus, we studied 225 verification challenges posted by experts on Twitter over one year with the aim of improving novices’ skills. We collected, annotated, and analyzed these challenges and over 3,100 replies by 304 unique participants. We find that novices employ multiple tools and approaches, and techniques like collaboration and reverse image search significantly improve performance.  more » « less
Award ID(s):
1651969 1527453
PAR ID:
10208160
Author(s) / Creator(s):
; ; ; ;
Date Published:
Journal Name:
AAAI HCOMP 2019 Poster
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The coronavirus pandemic has fostered an explosion of misinformation about the disease, including the risk and effectiveness of vaccination. AI tools for automatic Scientific Claim Verification (SCV) can be crucial to defeat misinformation campaigns spreading through social media channels. However, over the past years, many concerns have been raised about the robustness of AI to adversarial attacks, and the field of automatic scientific claim verification is not exempt. The risk is that such SCV tools may reinforce and legitimize the spread of fake scientific claims rather than refute them. This paper investigates the problem of generating adversarial attacks for SCV tools and shows that it is far more difficult than the generic NLP adversarial attack problem. The current NLP adversarial attack generators, when applied to SCV, often generate modified claims with entirely different meaning from the original. Even when the meaning is preserved, the modification of the generated claim is too simplistic (only a single word is changed), leaving many weaknesses of the SCV tools undiscovered. We propose T5-ParEvo, an iterative evolutionary attack generator, that is able to generate more complex and creative attacks while better preserving the semantics of the original claim. Using detailed quantitative and qualitative analysis, we demonstrate the efficacy of T5-ParEvo in comparison with existing attack generators. 
    more » « less
  2. The widespread consumer-grade 3D printers and learning resources online enable novices to self-train in remote settings. While troubleshooting plays an essential part of 3D printing, the process remains challenging for many remote novices even with the help of well-developed online sources, such as online troubleshooting archives and online community help. We conducted a formative study with 76 active 3D printing users to learn how remote novices leverage online resources in troubleshooting and their challenges. We found that remote novices cannot fully utilize online resources. For example, the online archives statically provide general information, making it hard to search and relate their unique cases with existing descriptions. Online communities can potentially ease their struggles by providing more targeted suggestions, but a helper who can provide custom help is rather scarce, making it hard to obtain timely assistance. We propose 3DPFIX, an interactive 3D troubleshooting system powered by the pipeline to facilitate Human-AI Collaboration, designed to improve novices' 3D printing experiences and thus help them easily accumulate their domain knowledge. We built 3DPFIX that supports automated diagnosis and solution-seeking. 3DPFIX was built upon shared dialogues about failure cases from Q&A discourses accumulated in online communities. We leverage social annotations (i.e., comments) to build an annotated failure image dataset for AI classifiers and extract a solution pool. Our summative study revealed that using 3DPFIX helped participants spend significantly less effort in diagnosing failures and finding a more accurate solution than relying on their common practice. We also found that 3DPFIX users learn about 3D printing domain-specific knowledge. We discuss the implications of leveraging community-driven data in developing future Human-AI Collaboration designs. 
    more » « less
  3. Social media nowadays has a direct impact on people's daily lives as many edge devices are available at our disposal and controlled by our fingertips. With such advancement in communication technology comes a rapid increase of disinformation in many kinds and shapes; faked images are one of the primary examples of misinformation media that can affect many users. Such activity can severely impact public behavior, attitude, and belief or sway the viewers' perception in any malicious or benign direction. Mitigating such disinformation over the Internet is becoming an issue with increasing interest from many aspects of our society, and effective authentication for detecting manipulated images has become extremely important. Perceptual hashing (pHash) is one of the effective techniques for detecting image manipulations. This paper develops a new and a robust pHash authentication approach to detect fake imagery on social media networks, choosing Facebook and Twitter as case studies. Our proposed pHash utilizes a self-supervised learning framework and contrastive loss. In addition, we develop a fake image sample generator in the pre-processing stage to cover the three most known image attacks (copy-move, splicing, and removal). The proposed authentication technique outperforms state-of-the-art pHash methods based on the SMPI dataset and other similar datasets that target one or more image attacks types. 
    more » « less
  4. We developed and implemented a peer-mentoring program at two US universities whereby nine experienced mathematics graduate student instructors (GSIs) each mentored three or four first- and second-year GSIs (novices). Mentors facilitated bi-weekly small group meetings with context-specific support to help novices use active-learning techniques and augment productive discourse (Smith & Stein, 2011). Meeting discussion topics were informed by novices’ interests, concerns raised by both mentors and novices, and ideas from other small groups. We examined what topics from small-group peer-mentoring meetings novices valued and timing of the topics that mentors suggested for future cycles. We qualitatively coded meeting topics and analyzed novices’ ratings of topics discussed. Results indicate specific topics novices valued and the importance of timing some topics appropriately, informing future professional development for GSIs. These results offer insight and synergy between educating GSIs and improving undergraduate mathematics teacher pedagogy. 
    more » « less
  5. We developed and implemented a peer-mentoring program at two US universities whereby nine experienced mathematics graduate student instructors (GSIs) each mentored three or four first- and second-year GSIs (novices). Mentors facilitated bi-weekly small group meetings with context-specific support to help novices use active-learning techniques and augment productive discourse (Smith & Stein, 2011). Meeting discussion topics were informed by novices’ interests, concerns raised by both mentors and novices, and ideas from other small groups. We examined what topics from small-group peer-mentoring meetings novices valued and timing of the topics that mentors suggested for future cycles. We qualitatively coded meeting topics and analyzed novices’ ratings of topics discussed. Results indicate specific topics novices valued and the importance of timing some topics appropriately, informing future professional development for GSIs. These results offer insight and synergy between educating GSIs and improving undergraduate mathematics teacher pedagogy. 
    more » « less