Profile characteristics of fake Twitter accounts
نویسندگان
چکیده
منابع مشابه
Behavioral Tracing of Twitter Accounts
“Trolls” individuals who engage in malicious behavior are a common occurrence within online communities. Yet simply banning accounts associated with trolls is often ineffective as individuals may register new accounts under pseudonyms and resume their activity. In this paper, we demonstrate how this can be addressed through a behavioral trace. Specifically, we show that by analyzing the posts o...
متن کاملDetection of Fake Accounts in Social Networks Based on One Class Classification
Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...
متن کاملSpotting Fake Retweeting Activity in Twitter
Given the retweeting activity around the posts of several Twitter users, how can we spot organic users’ reactions from fake retweets that aim to boost a post’s appearance of popularity? Our main intuition is that organic behavior has more variability, while fraudulent behavior is more synchronized. We refer to the detection of such fraudulent activities as the Retweet Fraud problem and propose:...
متن کاملDiscovering similar Twitter accounts using semantics
On daily basis, millions of Twitter accounts post a vast number of tweets including numerous Twitter entities (mentions, replies, hashtags, photos, URLs). Many of these entities are used in common by many accounts. The more common entities are found in the messages of two different accounts, the more similar, in terms of content or interest, they tend to be. Towards this direction, we introduce...
متن کاملMining Anonymity: Identifying Sensitive Accounts on Twitter
We explore the feasibility of automatically finding accounts that publish sensitive content on Twitter. One natural approach to this problem is to first create a list of sensitive keywords, and then identify Twitter accounts that use these words in their tweets. But such an approach may overlook sensitive accounts that are not covered by the subjective choice of keywords. In this paper, we inst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Big Data & Society
سال: 2016
ISSN: 2053-9517,2053-9517
DOI: 10.1177/2053951716674236