Zusammenfassung
A social bot is a piece of software designed to have a presence on the Internet, especially on social media. Bots are algorithms acting on social media networks, engineered to achieve some purpose, and programmed to appear as real people on social networks, tweeting, having followers and using matching Facebook accounts. They are designed to make something seem to be happening that is not, or looking like persons to promote specific messages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literatur
Abokhodair N./Yoo D./McDonald DW. (2015) Dissecting a social botnet: growth, content, and influence in twitter, Proceedings of the 18th ACM conference on computer supported cooperative work & social computing, ACM: 839-851.
Aiello, L.M./ Deplano, M./Schifanella, R./Ruffo, G. (2012). People are strange when you’re a stranger: Impact and influence of bots on social networks. In Proceedings of the 6th AAAI International Conference on Weblogs and Social Media: 10-17.
Alotibi G./Li F./Clarke N./Furnell S. (2015). Behavioral-based feature abstraction from network traffic, in ICCWS 2015-The proceedings of the 10th international conference on cyber warfare and security, Academic Conferences Limited, 2015: 1.
Alves de Lima Sarge, C./Berente, N. (2017) Computing Ethics. Is That Social Bot Behaving Unethically? A procedure for reflection and discourse on the behavior of bots in the context of law, deception, and societal norms. Communications of the ACM, 60(9): 29-31.
Baltazar J./ Costoya J./Flores R. (2009). The real face of koobface: the largest web 2.0 botnet explained. Trend Micro Research (9):10.
Bollen, J./Mao, H./Zeng, X. (2011). Twitter mood predicts the stock market. J. Computational Science 2, 1: 1-8.
Boshmaf, Y./Muslukhov, I../Beznosov, K./Ripeanu, M. (2013). Design and analysis of a social botnet. Computer Networks 57, 2: 556-578.
Brito F./Petiz I./Salvador P./Nogueira A./Rocha E. (2013) Detecting social-network bots based on multiscale behavioral analysis, SECURWARE, The seventh international conference on emerging security information, systems and technologies: 81-85.
Burghouwt P./Spruit M., Sips H. (2011). Towards detection of botnet communication through social media by monitoring user activity. Proceedings of the 7th international conference on information systems security, ICISS′11: 131-143.
Cassa, C.A., Chunara, R., Mandl, K. and Brownstein, J.S. (2013). Twitter as a sentinel in emergency situations: Lessons from the Boston marathon explosions. PLoS Currents: Disasters (July 2013); http://dx.doi.org/10.1371/currents.dis.ad70cd1c8bc585e9470046cde334ee4b.
Clarke, R. (1994). The Digital Persona and its Application to Data Surveillance. In: The Information Society: 77-92.
Conover, M./Ratkiewicz, J./Francisco, M./Gonçalves, B./Menczer, F. and Flammini, A. (2011). Political polarization on Twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media: 89-96.
Cossu, J.-V./Labatut, V./Dugué, N. (2016): A review of features for the discrimination of Twitter users: application to the prediction of offline influence. Soc. Netw. Anal. Min.6: 1-23.
Cossu, J.V./Dugue, N./Labatut, V. (2015): Detecting real-world influence through Twitter. Proceedings - 2nd European Network Intelligence Conference, 2015, 83-90.
Davis, C./Varol, O./Ferrara, E./Menczer, F./Flammini, A. (2016). Bot Or Not: A System to Evaluate Social Bots, Proceedings of the 25th International Conference Companion on World Wide Web, April 11-15 2016, Montreal, Canada: 273-274.
Dietrich CJ./Rossow C./Pohlmann N. (2013) Cocospot: clustering and recognizing botnet command and control channels using traffic analysis. Comput Netw 57(2): 475-486.
Edwards, C./Edwards, A./Spence, P.R./Shelton, A.K. (2014). Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on Twitter. Computers in Human Behavior 33: 372-376.
Ferrara, E./Varol, O./Davis, C./Menczer, F./Flammini, A. (2016). The Rise of Social Bots, in: Communications of the ACM, Vol. 59, Nr. 7: 96-104.
Grimme, C./Preuss, M./Adam, L./Trautmann, H. (2017) Social Bots: Human-Like by Means of Human Control? Big Data 5(4): 279-293.
Hwang, T./Pearce, I. and Nanis, M. (2012). Socialbots: Voices from the fronts. ACM Interactions 19, 2: 38-45.
Kramer, A.D./Guillory, J.E. and Hancock, J.T. (2014) Experimental evidence of massive-scale emotional contagion through social networks. In Proceedings of the National Academy of Sciences.
Lee, K./Eoff, B.D. and Caverlee, J. (2011). Seven months with the devils: A long-term study of content polluters on Twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media: 185-192.
Li, B./He, J./Huang, J./Shi, YQ. (2011). A survey on image steganography and steganalysis. JIHMSP. 2(2):142-172.
Metaxas, P.T./Mustafaraj, E. (2012). Social media and the elections. Science 338, 6106: 472-473.
Misener, D. (2011) Rise of the socialbots: They could be influencing you online. CBC News, 29. March 2011. Online http://www.cbc.ca/news/technology/rise-of-the-socialbots-they-could-be-influencing-you-online-1.981796. Accessed: 25 Feb 2018.
Nappa, A./Xu, Z./Rafique, M.Z./Caballero, J./ Gu, G.(2014). Cyberprobe: towards internet-scale active detection of malicious servers, Network and Distributed System Security (NDSS) Symposium: 1-15.
Natarajan V./Sheen S./Anitha R. (2012) Detection of stegobot: a covert social network botnet, in Proceedings of the first international conference on security of internet of things, ACM: 36-41.
Paavola, J./Helo, T./Jalonen, H./Sartonen, M./Huhtinen, A.K. (2016). The Automated Detection of Trolling Bots and Cyborgs and the Analysis of Their Impact in the Social Media, in Proceedings of the 15th European Conference on Cyber Warfare and Security, 7-8 July 2016, Munich, Germany: 237-245.
Ratkiewicz, J./Conover, M./Meiss, M./Gonçalves, B./Flammini, A. and Menczer, F. (2011). Detecting and tracking political abuse in social media. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media: 297-304.
Ratkiewicz, J./Conover, M./Meiss, M./Gonçalves, B./Patil, S./Flammini, A./Menczer, F. (2011) Truthy: mapping the spread of astroturf in microblog streams. Proceedings of 20th International Conference Companion World Wide Web (WWW 2011): 249-252.
Seymour, J./Tully, P. (2016). Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter. Online: https://www.blackhat.com/docs/us-16/materials/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf. Accessed: 25 Feb 2018.
Stein T./Chen E./Mangla K.(2011) Facebook immune system, Proceedings of the 4th workshop on social network systems: 8.
Stieglitz, S./Brachten, F./Berthele, D./Schlaus, M./Venetopoulou, C./Veutgen, D. (2017) Do Social Bots (Still) Act Different to Humans? Comparing Metrics of Social Bots with Those of Humans, G. Meiselwitz (Ed.): SCSM 2017, Part I, Springer, LNCS 10282: 379-395.
Turing, A.M. (1950). Computing machinery and intelligence. Mind 49, 236: 433-460.
Weizenbaum, J. (1966). ELIZA - A computer program for the study of natural language communication between man and machine. Commun. ACM 9, 1: 36-45.
Wu, X./Feng, Z./Fan, W./Gao, J. and Yu, Y. (2013). Detecting marionette microblog users for improved information credibility. Machine Learning and Knowledge Discovery in Databases. Springer: 483-498.
Zhang J./Zhang R./Zhang Y./Yan G. (2013). On the impact of social botnets for spam distribution and digital-influence manipulation, in: Communications and Network Security (CNS), 2013 IEEE conference on, IEEE: 46-54.
Zhang, J./Carpenter, D./Ko, M. (2013) Online astroturfing: a theoretical perspective. In: 19th American Conference on Information Systems, AMCIS 2013, 4: 2559-2565.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Oberer, B., Erkollar, A., Stein, A. (2019). Social Bots – Act Like a Human, Think Like a Bot. In: Stumpf, M. (eds) Digitalisierung und Kommunikation . Europäische Kulturen in der Wirtschaftskommunikation, vol 31. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-26113-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-658-26113-9_19
Published:
Publisher Name: Springer VS, Wiesbaden
Print ISBN: 978-3-658-26112-2
Online ISBN: 978-3-658-26113-9
eBook Packages: Social Science and Law (German Language)