Mutual Influence of Users Credibility and News Spreading in Online Social Networks

A real-time news spreading is now available for everyone, especially thanks to Online Social Networks (OSNs) that easily endorse gate watching, so the collective intelligence and knowledge of dedicated communities are exploited to filter the news flow and to highlight and debate relevant topics. The main drawback is that the responsibility for judging the content and accuracy of information moves from editors and journalists to online information users, with the side effect of the potential growth of fake news. In such a scenario, trustworthiness about information providers cannot be overlooked anymore, rather it more and more helps in discerning real news from fakes. In this paper we evaluate how trustworthiness among OSN users influences the news spreading process. To this purpose, we consider the news spreading as a Susceptible-Infected-Recovered (SIR) process in OSN, adding the contribution credibility of users as a layer on top of OSN. Simulations with both fake and true news spreading on such a multiplex network show that the credibility improves the diffusion of real news while limiting the propagation of fakes. The proposed approach can also be extended to real social networks.


Introduction
Online Social Networks (OSNs) have recently increased the ability of individuals to find information in real time, gathering news about disparate topics both in traditional situations as well as in extreme circumstances as risk and/or crisis scenarios. In these cases, where modern communication technologies could be temporarily unavailable or reports from the news outlet correspondents delay, information coming from eyewitnesses who report events shortly after they happened through posts in OSNs becomes a significant alternative. This phenomenon, called gatewatching [1], is a form of news reporting and commenting that does not operate from an authoritative position, rather it works by exploiting the collective intelligence and knowledge of dedicated communities to filter the news flow and to highlight and debate topics pertaining to those communities.
Frequently, even traditional major press agencies collect information from these sources prior to breaking news and providing information, for example, they allowed to recognize in real time the outbreaks of infectious diseases [2] as in the case of Covid-19 [3], or to early detect the spread of seasonal influenza in order to organize containment measures [4][5][6]. OSNs were also used in the recent past to detect information about natural disasters, both to assist in managing rescue as well as in promptly warning affected populations to help as many people as possibile [7][8][9][10][11].
Beyond these extraordinary scenarios, the increasing amount of information available through these communities and related platforms often pushes people to prefer them instead of traditional channels to stay informed, therefore the responsibility for judging the content and accuracy of information moves from editors and journalists to online information users [12]. The main problem is that the information provided in OSNs often lacks professional gatekeepers to check content, i.e., people devoted to assess the veracity and relevance of news in order to choose which ones are worth to be publicly spread. If this can be interpreted as a natural consequence of the growth of user-generated content [13], a potential side-effect is the increase of fake news, because single users are usually less reliable than authoritative official sources in providing information [14].
Since news lacks the traditional markers used to determine source credibility, consumers become more responsible for making decisions about the credibility of information online and this results in a shifting towards the trustworthiness about information providers, that cannot be overlooked anymore and can effectively help in discriminating real from fake news. (Note that in this paper we will use the term trust and credibility interchangeably.) Trust in OSNs is actually influenced by several factors [15,16]: • the propensity to trust, affected by each individual's psychology and independent of other OSN users; • the set of mutual past interactions between users; • the opinion each user has about the veracity of others' posts; note that acquaintance between two individuals does not imply mutual trust, rather it can be dynamically inferred by observing the users social behaviors over time.
In this paper, taking inspiration from [16], we evaluate how trustworthiness among OSNs users influences the news spreading and viceversa, in particular we first model the news spreading as an epidemic process that can be effectively studied with Susceptible-Infected-Recovered (SIR) approach [17,18]. We added to the original formulation provided by Newman [19], the contribution of OSNs user credibility (a.k.a. trust [20,21]) to reproduce their real behavior, being people willingness in spreading news actually affected by their trustworthiness of information sources.
We model the credibility of users with an additional weighted directed layer, namely the Credibility network, that complements the acquaintances network naturally present in OSNs. It has the same nodes of acquaintances network, with a pair of two directed edges for each indirect edge in the acquaintances network. The weight (i.e., credibility) measures how much an individual trusts his neighbor and vice versa, and it changes according to an update mechanism triggered every time a piece of news is spread over the corresponding acquaintances network. The main novelty of our work is in the way we model the news spreading: it happens in the OSN network, but it is influenced by the Credibility network. On the other hand, OSN spreading process impacts on the Credibility network by altering the weights of its links. This model can be seen as the results of two mutually coupled dynamic processes.
To assess the proposed model, we implemented a simulator that spread true and fake news first applying the Newman model in its original formulation and then introducing the contribution of the credibility network. The simulator was developed from scratch using Python and Matplotlib libraries.
Simulations show that thanks to the proposed multiplex network model, users trust can be effectively used to improve the diffusion of real news while limiting the propagation of fakes.
The organization of this paper is as follows. In Section 2, we present relevant works explaining how trust affects social relations in OSNs. In Section 3, we briefly show our previous works where news spreading in OSNs is addressed and trust among users is firstly introduced. We then present our simulations, discussing results and the effectiveness of our approach. In the last section, final remarks and future works are outlined.

Related Works
During the last two decades, various attempts have been carried out to evaluate how trust affects social relations within OSNs. In the following we discuss about some works addressing such issues.
In his book, Buskens [22] discusses two possible explanations for the emergence of trust via social networks: if OSNs members can sanction others untrustworthiness, the last ones may refrain from acting in an untrustworthy manner and if members are informed regularly about trustworthy behaviors, the trust will grow among these actors. A unique combination of formal model building and empirical methodology is used to derive and test hypotheses about the effects of networks on trust. Some models combine elements from game theory and network analysis [23,24]. Indeed, while OSN represents a good example for studying the spread of news inspired to infection in human and animal populations, the inherent high-dimensionality of networks is mathematically and computationally challenging [25].
The role of Trust in OSN is an important matter and can be studied from different point of view, Grabner-Kräuter and Bitter [26] aims at clarifying the role of trust and the relevance of facets of trust, social capital and embeddedness in OSNs. They view trust as a structurally embedded asset or a property of relationships and networks that helps to shape interaction patterns within OSNs and provide a study of the mechanism during the stages of the building of a trust-relationship. Our work relay on trust methods to manage the Credibility Layers and, specifically, we refers to the evolving mechanism of trust over time that "is dominated by trust based on the trustor's knowledge and understanding about the trusted party resulting from past interactions" [27]. In general, the trust category we refer to in this paper belong to Social Capital concepts, i.e., the benefit obtained from social relationship and interactions that, in our case, is related to what extend a News will be considered fake [26].
Goldbeck [28] presented an algorithm, named "Tidal Trust" to infer trust relationships in Semantic Web-based social networks. She described the social network analysis that leads to these algorithms and described their accuracy within two networks. The benefit of this analysis is their integration into applications to enhance the users' experiences by endorsing their social preferences.
An accurate trust assessment algorithm was developed by Kuter and Goldbeck [29], they proposed a trust inference algorithm, named "SUNNY", that uses a probabilistic sampling technique to estimate the confidence in the trust information from some designated sources. SUNNY performs a probabilistic logic sampling procedure over the Bayesian Network generated by their representation mapping to estimate lower and upper bounds on the confidence values, which are then used as heuristics to establish trust values of the nodes of the Bayesian Network.
Taherian et al. [30] proposed a new inference algorithm in OSNs called "RN-Trust" that uses resistive network concept to represent trust networks. In these networks, each node in the trust network is mapped to a node in the resistive network, for each pair of adjacent nodes in the trust network, a resistor is placed between their corresponding nodes in the resistive network and the equivalent resistance of the so determined electric circuit is used to calculate the trust value from the source to the target.
Liu et al. [31] proposed a complex trust-oriented social network structure which includes complex social relationships and recommendation rules in a specific domain and they also proposed a Bayesian network based trust inference mechanism in complex social networks.
Adali et al. [32] presented a trust assessment algorithm determined from the communication behavior of social network users, in particular taking into account conversations and propagation of information from one person to another.
Caverlee et al. [33] created a reputation-based trust aggregation framework for supporting tamper-resilient trust establishment in online communities, called "SocialTrust", which provides a network-wide perspective on the trust of all users, and they also cre-ated a personalized extension, called "mySocialTrust", which provides a user-centric trust perspective that can be optimized for individual users within the network.
Wu and Wang [34] proposed a model to describe how to infer the trust value combining web mining usage and network topology. They constructed an user-oriented trust network based on small-world property, enhanced trust metric by considering social influence of the middle connectors and incorporated users potential relationship estimated from users' interactions frequency and generated a compound weight to re-evaluate similarity matrix combined with users social trust relationship.
Jiang, Wang and Wu [35] focused on generating small trusted graphs for large OSNs and showed how to preprocess a social network by developing a user-domain based trusted acquaintance chain discovery algorithm. The algorithm used the small-world network characteristics of online social networks and took advantage of weak ties and, finally, they presented how to build a trust network and generate a trusted graph with the adjustable width breadth-first search algorithms.
Jiang et al. [36] analyzed the similarity between trust propagation and network flow, converted a trust evaluation task with path dependence and trust decay into a generalized network flow problem and proposed a computational approach for calculating trust, named "GFTrust", based on a modified network flow model with leakage.
Feng et al. used a similar approach to study attention evolution in OSN [37], they found that most of the viral spreading of popular messages follows a fractional SIR model which means that an individual with a large number of friends needs more repeated news before sharing a message. Indeed, it could imply that the probability an individual will share a message is proportional to the fraction of its friends that shared the same message with him/her. They suggest that a message with attractiveness below a critical threshold will not spread to a significant fraction of OSN population. Additionally, in our work we assume that a threshold exists and it is added to the spreading model.
Other authors, e.g., Weng et al. [38], considered the community structure and investigated its impact on the spreading of memes. Others used epidemic model to study the dynamics of information cascade, for instance, in [39] Jin et al. used an epidemic model based on four parameters and tried to fit empirical data.
Sreenivasan et al. [40] view the OSN as an indirect Graph and used it to drive the dynamics the probability of new message generation, its forwarding and the length of message buffer; they also studied how the popularity of a message is statistically distributed.
Online users shows a typical pattern of behavior since they tend to acquire information adhering to their worldviews [41] ignoring dissenting information [42] that increases the probability of the spreading of misinformation [43] so causing that fake news and inaccurate information may spread faster and wider than fact-based news [44]. The behaviour of unaware users seriously impact on the fake-news diffusion in OSN [45].
In the last decades, signed network attracted interest in epidemic spreading, and it is commonly recognized as a class of graphs where links between the nodes are labeled with positive or negative signs. Recently Miu et al. [46] proposed a type of information spreading with relative attributes in signed networks based on the SI model. In their model, the information is spread with a probability that varies according its relative attribute to each node, meaning that individuals prefer to spread good instead of bad information. Moreover, they find that information spreading is influenced by both the network content and the transformation mechanism of the relative attributes.
Saeedian et al. [47] investigated the epidemic spreading in evolving signed networks in the context of energy landscapes. They referred to susceptible-infected (SI) model to configure the complete signed graphs in which negative edges do not transmit the disease [48] and introduced an energy function to describe the relationship between the structural balance and the spreading process.
Another approach proposed in Literature based on epidemic theory takes into account the limited capacity of users to consume information which leads to a sort of competition among them. In [49,50] a recommendation model where agents can remember and forget also incorporating advertisement is proposed, while Huberman [51] considered content's novelty and popularity as two major factors to get attention.
In [52] the authors found that attention fades over a natural time scale and in [53] the "collective attention" is studied [54,55] focusing on its sudden change after a shocking event. Several authors proposed agent-based models inspired by epidemic process where information is passed along the edges of a network [56][57][58].
Besides, it is quite difficult to capture all possible interactions among people whilst a two-layered networks may take into account more complex interactions such as, for instance, credibility of users and level of inaccuracy of a news. Shu et al. [59] presented a numerical study of information spreading in an interdependent spatial network composed of two identical networks. Wang et al. [60] explored the effect of inter layer contagion on spreading dynamics in multiplex networks. Yu et al. [61] explored how a limited contact capacity influences the information spreading applied on a two-layered multiplex network.
An additional challenge that is emerging is the strong impact of malicious account that amplify the spread of fake news and their credibility mainly because they include social bots, and cyborg users [62]. Social bots try to increase the popularity of a news creating the echo chamber effect for the propagation of fake news. In the same paper, a preliminary study performed using FakeNewsNet-a dataset that the authors claims to be one of the first publicly available comprehensive repository which contains news content, social context, and spatiotemporal information -shows that bot users are more likely to exist in the fake news spreading process.
Finally, news dissemination on COVID-19 strongly increased in recent months, and the factors that lead to the sharing of this misinformation could have a big impact on the people, for instance in [63] authors adopted the Uses and Gratification perspective [64] to provide another view of understanding the global problem of fake news proliferation occurred in Nigeria. Cinelli et al. in [65] present a massive data analysis related to COVID-19 on Twitter, Instagram, YouTube, Reddit and Gab. They analyze engagement and interest in the COVID-19 topic using epidemic models to study reproduction numbers over the platforms. Furthermore, they show that information from both fact-checked and inaccurate sources has the same spreading patterns.

Trust Based News Spreading Model
In this work we model trust among users as a credibility factor influencing news spreading in an OSN. To do that we introduce a new network, called Credibility Network (CN) [16,66], that forms a sort of overlay of the OSN. CN is a weighted directed graph, where nodes are users and a weighted directed link C ij between users i and j represents the direct credibility, i.e., how much user i trusts user j. Note that in general C ij = C ji . In this work, we assume C ij ranges over [0, 1], where 0 models untrusted targets (i.e., i believes that j always provides fake news) and 1 models full trusted targets (i believes j always spreads true news). As said previously, CN is an overlay of OSN, meaning that each node (user) in the OSN corresponds to a node in the CN, therefore they have the same number of nodes. As shown in Figure 1, both networks can be seen as layers of a two-layers multiplex network [67].
Note that inter-layer links connect the same user across layers. In our model, the news spreading process happens in the OSN layer, but it is influenced by the CN layer. On the other hand, as we will detail later, OSN layer spreading process impacts on the CN layer by changing (indirectly) the weights of the credibility network. Essentially, we have two coupled processes influencing one each other, as detailed in the next sections.

OSN Layer
Here we introduce the model adopted to describe how news propagate in the OSN layer. In particular, we applied a modified version of Susceptible-Infected-Recovered (SIR) model [18,68], usually adopted in epidemic spreading processes, where: • susceptible status corresponds to ignorant status, i.e., OSNs users who belong to this category are not aware of the news; • infected status corresponds to spreader status, i.e., OSNs users that are aware of news and try to spread it through sharing; • recovered status corresponds to stifle status, i.e., OSNs users aware of the news, but are not interested in propagating it. Considering that from the OSNs data analysis it is not easy to distinguish who viewed news without sharing it or who was not connected at news' publishing time, we believe that this category should include users who have at least one neighbor who shared the news and did not re-share it.
We tailor to our context the transmissibility formula of Newman's epidemic spreading model [19]: where T ij is the transmission probability, i.e., the probability that individual i infects his neighbor j, β ij ∈ [0, 1] is the contact rate between i and j and τ i is the infection time, that is the time during which i can infect his neighborhood. In OSNs context, we reinterpret T ij as the probability that i spreads news and j receives and propagates it, whereas β ij becomes the fraction of time during which i and j are simultaneously connected to the same OSN and finally τ i is viewed as the time for which the news propagated by i is visible in the foreground on OSN home page (this actually can depend on several factors and can also change for different kinds of OSN home pages).
Note that, while in real physical diseases i is naturally contagious, in the news spreading scenario being infected means that j believes the news received by i is reliable and therefore is also willing to transmit it over the network (via its neighborhood).
In our proposal, we also introduce the credibility C ji to Newman's Equation (1) as follows: C ji represents the direct credibility, i.e., how much j trusts i; this value is the weight of the direct link connecting node j with node i in the CN layer. The rationale behind the Equation (2) is that trust in an individual may depend on past interactions with him, but also on the reputation that he/she has in neighborhood and it is important because it can influence the attention people paid when he/she posts news.
In other terms, Equation (2) models the news diffusion process in the OSN layer as a function of CN layer (direct coupling between OSN and CN layers).

CN Layer
While the spreading process is influenced by the credibility, it is also true that directed credibility between any couple of users also depends on the past interactions between them. So the spreading process also determines how credibility changes over time.
To consider the evolution of C ji over time, we introduce a credibility update mechanism triggered every time a spreader node i proposes news to an uninformed node j. In the following we suppose that each news is labelled by a number x (x = {1...n}). An ignorant node j that was exposed to a (new or re-shared) news n calculates the credibility towards node i taking into account all past interactions by using the following equation: where C news x is the credibility j assigns to the news x.
This equation is a weighted average that allows credibility for i to be updated according to j's opinion about the truth of news it receives from i. Indeed, in real OSNs people can change their behaviour over time, for instance, a node that often re-posted false news in the past could start to check news and stop forwarding fakes, or conversely a reliable node could get worse by starting to spread false news; in any case Equation (3) gives its neighbors a chance to tailor the credibility according to the truthfulness of news it propagates over time. To better understand the behaviour of Equation (3) over time, we simply rewrite it (trough a series of simple mathematical steps) in the following way: where the credibility j assigns to i after the propagation of the news n , is expressed in terms of the credibility at the previous step plus the credibility j assigns to the news n . To show how Equation (4) works, in Figure 2a,b several simulated scenario are reported. In each scenario we simulate the propagation of 200 news. Scenario CT is the simple case in which i propagates to j news that are always true. In this case C ji assumes the constant value of 1 (j fully trusts i). In scenario CF, i propagates always fake news, so C ji is always zero. In scenario TF, i spreads true news for n = 1...50 and fake news for n > 50. In this case, C ji is initially equal to 1, but after the 50th news it rapidly decreases to 0, assuming the value of 0.5 after only other 20 (fake) news. So, a user can lose half of his credibility if he/she spreads about 20 completely fake news. Scenario FT is the dual of TF. It shows how a user can gain credibility by spreading completely true news. In Figure 2b, scenario RTF simulates a user i that initially spreads 50 'almost true' news and then switches to 'almost false' news. Arbitrarily, we are supposing that user j assigns a random score in the range [0.75, 1.0] and [0.0, 0.5] respectively to 'almost true' and 'almost false' news. Again RFT is the opposite scenario of RTF.  In general, how a given user scores a news is a quite subjective issue. However, just for simulation purpose we will assume the following values for each C news x : x is false but perceived as true (e.g., it cites false authoritative sources, and/or it seems coming from logical reasoning or it starts from a real event), then C news x ∈ [0, 0.5], • if x is true but perceived as false (e.g., it does not cite any sources, it is poorly described or its content is strange enough to sound fake), then C news x ∈ [0.5, 1].

News Propagation Model
In the following, we indicate with s the originator of the news (seed user/node), i.e., who injects the news in the OSN network.
Our model of news propagation works as follows: 1.
Initially, the seed node s injects a news in the network, while each of his neighbors j uses Equation (2) to compute the probability to re-post the news or not.

2.
If j re-post the news, it updates the credibility C js on the CN layers by using Equation (3).

3.
At the next step, infected nodes attempt to infect their neighborhood using the same mechanism, if it happens the directed credibilities is updated.

4.
Another diffusion step is performed.
The spreading process went on until the contagion cycle ends. At this point the number of infected nodes is the number of users reached by the news. In Algorithm 1 is reported the news spreading algorithm described above.

Algorithm 1: News spreading algorithm.
Data: s = seedNode, C news x = news injected by node s I 0 = {s} // Set of infected nodes at step 0 n = 0; while I n = ∅ do I n+1 = ∅; foreach node i in I n do foreach node j in the out-neighbourhood of i do if j not in I n then Compute T ij using Equation (2); if T ij > RND(0,1) then I n+1 = I n+1 {j}; Update credibility C ji using Equation (3); end end end end n = n + 1; end

Simulations and Results
To evaluate the proposed model we performed several experiments to assess news propagation both for highly connected and semi-isolated nodes. All experiments were made on a two-layers scale-free network with 1000 nodes. A scale-free network is a network characterized by a power-law degree distribution (i.e., the fraction P(k) of nodes with degree k goes as P(k) ∼ k −γ , where γ is a parameter that typically assumes a value in the range 2 < γ < 3). It means that in such a network the majority of nodes have few connections, while there are a few number of nodes, called hubs, with extraordinary high number of links. Specifically, in our experiments we employed scale-free networks since online social networks usually exhibit such a kind of behaviour [69]. Networks were generated by using the JGraphT Java Library [70]. In detail, the first layer was an undirected network representing OSN acquaintances while the second layer was the credibility network. All weights of the CN layer were initially set to 0.5 that represented a neutral credibility (C ij = 0.5 ∀ (i, j)).
To understand how local credibility updates affects news propagation, we considered a highly connected seed node since news propagation for semi-isolated nodes were influenced by both low contact rate and credibility, making it difficult to distinguish which one of them actually affected the lack of news propagation. We simulated the spreading of 150 different news in 5 scenarios, as reported in Table 1. All the presented results were the average over 10 different simulations for each scenario.
Scenarios A and B (i.e., all news spread are respectively true or false) were used to understand how a variation in the credibility of the spreader node affected its news spreading. Indeed, in real OSNs if a node lost its credibility fewer and fewer nodes were willing to receive and propagate its news (and vice versa).
Simulations reported in Cases C and D aimed at checking to what extent a change in a node's behavior impacted its news spreading process and how fast changes happened; for instance, when the node initially spread only fakes, and after a while, it propagated only true news, or vice-versa. All simulation results are reported in Figure 3. As shown, the number of infected nodes for the first news (i.e., C news 1 ) was similar in all the presented scenarios. As soon as nodes spread other news, C ji played a fundamental role in the network evolution, as detailed in the following.

Case A and B
In the simulation scenario A, the number of infected nodes for each news progressively decreased as the number of spread news incremented. This confirmed that a node that continuously spread false news was gradually isolated decreasing its ability to influence other nodes. Conversely, in case B, the number of infected nodes for each news progressively increased as the number of spread news incremented. In this case the spreader node gradually gained credibility increasing its ability to affect the other nodes.

Case C and D
In case C the number of infected nodes for each news decreased with the same trend as case A for the first 50 news. Afterward, when an individual's behavior changed from spreading false news to true ones, the curve changed accordingly. Similarly, when the behavior switched from good to bad again, the curve decreased. Similarly, in case D the number of infected nodes for each news increased with the same trend as case B for the first 50 propagated news. When the seed became a bad guy the curve trend decreased, and finally it increased as soon as the seed behavior became good again (true news).
Cases C and D showed another real social media users' behavior: losing credibility was easier than achieving it again. Indeed, in case C the curve increased slowly after the first behavior change at the 50th news, whereas in case D, at the same point the curve decreased very rapidly. The same curve variations could be observed in the other behavior changing points at the 100th news.

Newman Case
In the last scenario simulated, the credibility did not affect the curve, so it was used only as a reference to show the improvements introduced by our model. Indeed, one would expect that this curve was (at least asymptotically) reached by the curve of case B (credibility always set to 1). Instead, at a steady state the case B simulations performed an average of about 130 infected nodes less than the Newman ones; this was caused by the fact that not all the true news were perceived as such so some of them received a low credibility value (although true) due to, for instance, for a lack of sources and/or relevant details. Furthermore, our credibility update formula kept track of past inserted news, albeit in a decreasing way due to aging factor, hence it would never reach C ji = 1.

Credibility Distributions
To understand how the CN layer was affected by news propagation in the previous simulated scenarios, we studied how the incoming credibility strengths of each node of CN changed. The incoming strengths of a given node i were defined as the sum of the weights of the incoming links (s i = ∑ j∈N in i C ji where N in i is the in-neighbourhood of i). We then calculated the incoming credibility strength distribution of the CN at different moments during previous described simulation scenarios.
In Figure 4a,b we show the incoming credibility strength distribution for cases B and D during the 1st, 50th, 100th and 150th news. To effectively assess how the strengths distribution varies, we performed a curve fitting in a log-log scale graph according to the following function: In Figure 4a we note that all fitting curves (except the first case) were almost overlapped. This behaviour is coherent with the finding reported in Figure 3-Case B. In fact, as the number of news spreads increased, the number of infected increased too, and this corresponded to an increments of all the direct credibility values, since all news were considered true by users. Moreover, we observed that the number of infected nodes was almost stable after the 50th news. This behaviour is also observed in Figure 4a, where curves corresponding to 50th, 100th and 150th news were practically overlapped, with a slope of respectively 0.5554, 0.5382 and 0.5259. Figure 4b we observed that, except for the initial case, the fitting curve moved forward for the first 50 true news while the fitting curve returned back for the next 50 fakes ('news 100' plot) and finally ('news 150' plot) it was almost overlapped to the 'news 50' fitting curve for the last 50 true news. It suggested that on average weights of the CN layer fluctuated by following, and also imposing, specific news spreading dynamics. Note that results for case A and C are not shown here since they were opposite to case B and D respectively, therefore no further findings could be inferred.

Conclusions and Future Work
In this paper, we studied how the trustworthiness among OSNs users influences the news spreading process. We carried out several simulations using a 1000-nodes two layer multiplex scale-free network with a layer representing OSNs acquaintances and another representing users trust network. We considered five different scenarios, each one averaged over 10 simulations. Results show that credibilities update mechanism is able to correctly models the propagation dimension. In particular we noted that a well-connected seed node with medium or high credibility is always able to propagate news to its neighborhood, hence the news became viral. Conversely, if a node with low credibility tries to spread some news, the diffusion is successful only if it is able to persuade at least a hub node with neutral credibility (among its neighbors) to repost that news. News propagation of isolated nodes finally was often limited by low contact rates with his neighborhood and with medium or low credibility, hence it was very difficult to propagate the news.
The choice of a synthetic network to perform our first experiments allows to carry out assessment tests to validate the model through a well known and manageable network whereas real datasets requires to take into account the specific model they are based on, its features and possible biases.
In future works, we aim at removing some limitations of the proposal discussed here. In particular, • we planned to use Twitter datasets in order to validate our model with real data, such as those available at [71] or [72] catalogs; • further experiments on large networks (even not scale-free) will allow to test the scalability of our model; • we will also investigate on the applicability of our model to real OSNs; indeed, we believe that its formulation allows to adopt it in any social network where nodes neighbourhood is known, although sometimes this is allowed just for OSNs administrators and specific considerations may be required for each OSN (e.g., in FB the friendship is monodirectional whereas in Twitter the following-follower is a two-way relationship); • we will consider how our model can address the case of creation and diffusion of fakes from non-human accounts, i.e., bots or cyborgs [73].