Developing a hierarchical model for unraveling conspiracy theories

Author:

Ghasemizade MohsenORCID,Onaolapo Jeremiah

Abstract

AbstractA conspiracy theory (CT) suggests covert groups or powerful individuals secretly manipulate events. Not knowing about existing conspiracy theories could make one more likely to believe them, so this work aims to compile a list of CTs shaped as a tree that is as comprehensive as possible. We began with a manually curated ‘tree’ of CTs from academic papers and Wikipedia. Next, we examined 1769 CT-related articles from four fact-checking websites, focusing on their core content, and used a technique called Keyphrase Extraction to label the documents. This process yielded 769 identified conspiracies, each assigned a label and a family name. The second goal of this project was to detect whether an article is a conspiracy theory, so we built a binary classifier with our labeled dataset. This model uses a transformer-based machine learning technique and is pre-trained on a large corpus called RoBERTa, resulting in an F1 score of 87%. This model helps to identify potential conspiracy theories in new articles. We used a combination of clustering (HDBSCAN) and a dimension reduction technique (UMAP) to assign a label from the tree to these new articles detected as conspiracy theories. We then labeled these groups accordingly to help us match them to the tree. These can lead us to detect new conspiracy theories and expand the tree using computational methods. We successfully generated a tree of conspiracy theories and built a pipeline to detect and categorize conspiracy theories within any text corpora. This pipeline gives us valuable insights through any databases formatted as text.

Funder

Directorate for Computer and Information Science and Engineering

Publisher

Springer Science and Business Media LLC

Reference84 articles.

1. Douglas KM, Uscinski JE, Sutton RM, Cichocka A, Nefes T, Ang CS, Deravi F (2019) Understanding conspiracy theories. Polit Psychol 40:3–35

2. Barkun M (2013) The nature of conspiracy belief 2nd edn. University of California Press, Berkeley, pp 1–14. http://www.jstor.org/stable/10.1525/j.ctt3fh35v.5. Accessed 2023-12-01

3. John F (2024) Kennedy assassination conspiracy theories. Wikipedia. https://en.wikipedia.org/wiki/John_F._Kennedy_assassination_conspiracy_theories. Accessed 2024-02-05

4. Enders AM, Uscinski JE, Seelig MI, Klofstad CA, Wuchty S, Funchion JR, Murthi MN, Premaratne K, Stoler J (2021) The relationship between social media use and beliefs in conspiracy theories and misinformation. Polit Behav, 1–24

5. Haag M, Salam M (2017) Gunman in ‘Pizzagate’ Shooting Is Sentenced to 4 Years in Prison. The New York Times. https://www.nytimes.com/2017/06/22/us/pizzagate-attack-sentence.html. Accessed 2023-09-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3