Advertisement

Information Abuse in Twitter and Online Social Networks: A Survey

  • M. J. AkshayEmail author
  • N. Ala Mohammed
  • Amit Vyas
  • Palayil Baby Shony
  • Sheldon Kevin Correa
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 950)

Abstract

With the Internet accessible to more than half of the global population, online social network, especially Twitter, has become a highly impactful source of news and information. However not all the information spread through Twitter are credible. Spammers, scammer, people with agendas and so on may use the services of Twitter, making it difficult for the users to tell the difference between what is credible and what is not. Current researchers work on several ways to monitor the tweets and the users who spread falsehoods. This paper aims to study a few papers in this field and that employs the usage of several algorithms as well as human intuition to track credibility of tweets and also the different ways the features of Twitter and other online social network are exploited to spread misinformation by certain users for their own benefits and profits.

Keywords

Credibility Misinformation Online social network Twitter 

References

  1. 1.
    Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, Lyon, France. ACM (2012)Google Scholar
  2. 2.
    Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: the million follower fallacy. In: Proceedings of the 4th International Conference on Weblogs and Social Media (ICWSM), Washington DC, USA. AAAI (2010)Google Scholar
  3. 3.
    Mustafaraj, E., Metaxas, P.T.: From obscurity to prominence in minutes: political speech and real-time search. In: WebSci10: Extending the Frontiers of Society On-Line, Raleigh, USA. The Web Science Trust (2010)Google Scholar
  4. 4.
    Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proceedings of the 20th International Conference on World Wide Web, Hyderabad, USA. ACM (2011)Google Scholar
  5. 5.
    Morris, M.R., Counts, S., Roseway, A., Hoff, A., Schwarz, J.: Tweeting is believing?: Understanding microblog credibility perceptions. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, Raleigh, USA. ACM (2012)Google Scholar
  6. 6.
    Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT? In: Proceedings of the First Workshop on Social Media Analytics, Washington DC, USA. ACM (2010)Google Scholar
  7. 7.
    Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web. ACM, Raleigh, USA (2010)Google Scholar
  8. 8.
    Mathioudakis, M., Koudas, N.: TwitterMonitor: trend detection over the twitter stream. In: Proceedings of the 2010 International Conference on Management of Data, pp. 1155–1158. ACM (2010)Google Scholar
  9. 9.
    Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, 04–08 October 2010, Chicago, Illinois, USA (2010)Google Scholar
  10. 10.
    Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, New York, NY, USA, pp. pp. 665–674. ACM (2011)Google Scholar
  11. 11.
    Goyal, A., Bonchi, F., Lakshmanan, L., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 3, 1–14 (2012)Google Scholar
  12. 12.
    Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57–66, 26–29 August 2001, San Francisco, California (2001)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Information and Communication TechonolgyMIT, Manipal, MAHEManipalIndia
  2. 2.Department of Computer Science and EngineeringMIT, Manipal, MAHEManipalIndia

Personalised recommendations