The Fragility of Twitter Social Networks Against Suspended Users

作者: Wei Wei , Kenneth Joseph , Huan Liu , Kathleen M. Carley

DOI: 10.1145/2808797.2809316

关键词:

摘要: Social media is rapidly becoming one of the mediums choice for understanding cultural pulse a region; e.g., identifying what population concerned with and kind help needed in crisis. To assess this it critical to have an accurate assessment who saying social media. However, also home malicious users engaged disruptive, disingenuous, potentially illegal activity. A range users, both human non-human, carry out such cyber-attacks. We ask, extent does presence or absence influence our ability region? conduct series experiments analyze fragility network assessments based on Twitter data by comparing changes structural content results when suspended are left taken out. Because account can be various reasons including spamming spreading ideas that lead extremism terrorism, we separately impacts removing apparent spam bots extremists. Experimental demonstrate Twitter-based structures unstable, highly impacted removal users. Further, exhibit regional temporal variation may related political situation civil unrest. provides guidance differential impact different types suspend-able

参考文章(28)
Kwan Hui Lim, Amitava Datta, A Topological Approach for Detecting Twitter Communities with Common Interests Ubiquitous Social Media Analysis. pp. 23- 43 ,(2013) , 10.1007/978-3-642-45392-2_2
Igor Santos, Igor Miñambres-Marcos, Carlos Laorden, Patxi Galán-García, Aitor Santamaría-Ibirika, Pablo García Bringas, Twitter Content-Based Spam Filtering soco-cisis-iceute. pp. 449- 458 ,(2014) , 10.1007/978-3-319-01854-6_46
Teng-Sheng Moh, Alexander J. Murmann, Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers international conference on information systems, technology and management. pp. 210- 220 ,(2010) , 10.1007/978-3-642-12035-0_21
Jacob Ratkiewicz, Alessandro Flammini, Mark Meiss, Michael D. Conover, Filippo Menczer Menczer, Bruno Goncalves, Detecting and Tracking Political Abuse in Social Media international conference on weblogs and social media. ,(2011)
Wei Wei, Juergen Pfeffer, Jeffrey Reminga, Kathleen M. Carley, Handling Weighted, Asymmetric, Self-Looped, and Disconnected Networks in ORA Social Science Research Network. ,(2011) , 10.21236/ADA550859
Jac M. Anthonisse, The rush in a directed graph Journal of Computational Physics. pp. 1- 10 ,(1971)
Richard J. Bolton, David J. Hand, Foster Provost, Leo Breiman, Richard J. Bolton, David J. Hand, Statistical Fraud Detection: A Review Statistical Science. ,vol. 17, pp. 235- 255 ,(2002) , 10.1214/SS/1042727940
Vern Paxson, Chris Grier, Damon McCoy, Alek Kolcz, Kurt Thomas, Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse usenix security symposium. pp. 195- 210 ,(2013)
David M Blei, Andrew Y Ng, Michael I Jordan, None, Latent dirichlet allocation Journal of Machine Learning Research. ,vol. 3, pp. 993- 1022 ,(2003) , 10.5555/944919.944937
Alex Hai Wang, Don't follow me: Spam detection in Twitter international conference on security and cryptography. pp. 142- 151 ,(2010)