Public news fake identification using asp.net
ABSTARCT :
Fake news, deceptive information, and conspiracy theories are part of our everyday life. It is really hard to distinguish between false and valid information.
As contemporary people receive the majority of information from electronic publications, in many cases fake information can seriously harm people’s health or economic status.
This article will analyze the question of how up-to-date information technology can help detect false information.
Our proposition is that today we do not have a perfect solution to identify fake news. There are quite a few methods employed for the discrimination of fake and valid information, but none of them is perfect. In our opinion, the reason is not in the weaknesses of the algorithms, but in the underlying human and social aspects.
EXISTING SYSTEM :
In the pre-internet era, it was easier to decide if the information was valid, thoughtfully checked and cross-checked encyclopedias, textbooks and prestigious newspapers served as the primary and authentic sources of information, people could rely on the information available in these sources (Vedder – Wachbroit 2003).
The situation however has dramatically changed (Whitty – Joinson 2008). Today, as the internet became the primary and for many people the only source of information, the authority and righteousness of many sources has become increasingly questionable.
Fake news is not only used for financial or political gain. Areas such as vaccination are also plagued by fake news (Susarla 2021). But which news is fake? How to identify fake news? Some people use the term fake news simply for facts or statements they do not agree with.
DISADVANTAGE :
Legal Consequences: Engaging in the creation or distribution of fake identification documents is illegal in most countries. Legal repercussions can include fines, imprisonment, or both.
Ethical Issues: Creating fake IDs can be used for illegal activities such as identity theft, fraud, underage drinking, or other criminal actions. It can harm individuals and institutions by facilitating dishonest behavior.
Trust and Reputation: If caught, individuals or organizations involved in creating fake IDs can face severe damage to their reputation and trustworthiness. This can affect future job prospects, relationships, and legal standing.
Technical Limitations: From a technical standpoint using ASP.NET or any technology, the disadvantages might include the potential for security breaches, as such applications could be targeted by law enforcement or security agencies monitoring illegal activities.
PROPOSED SYSTEM :
Nowadays, people are vastly relied on social networking platforms to get knowledge, information and current happenings as it provides the same in a quite new, fluent, speedier and portable manner. The content or news has significant influence on their day today life.
It is even capable of changing their perspective, opinion or mindset. US election in 2016 is best example of it to describe. There arises a high chance to modify the view of person to exploit the opportunity in their favor.
Sometimes media may handle the information differently to achieve someone's personal gain. Several activists, groups, or political parties may false propagate information on these social networking platforms.
ADVANTAGE :
real-time Verification: ASP.NET allows for real-time verification of news sources and articles. This can involve checking against trusted databases or using algorithms to analyze the content for authenticity.
Scalability: ASP.NET applications can be easily scaled to handle large volumes of requests and data, crucial for a system that needs to verify numerous news articles continuously.
Integration: ASP.NET integrates well with other Microsoft technologies and frameworks, such as Azure services for cloud-based operations or SQL Server for database management, enhancing the system's capabilities.
Security: ASP.NET provides robust security features, including authentication, authorization, and secure communication protocols, ensuring that the system itself is protected from unauthorized access and tampering.
|