Skip to main content

Information Abuse in Twitter and Online Social Networks: A Survey

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2018)

Abstract

With the Internet accessible to more than half of the global population, online social network, especially Twitter, has become a highly impactful source of news and information. However not all the information spread through Twitter are credible. Spammers, scammer, people with agendas and so on may use the services of Twitter, making it difficult for the users to tell the difference between what is credible and what is not. Current researchers work on several ways to monitor the tweets and the users who spread falsehoods. This paper aims to study a few papers in this field and that employs the usage of several algorithms as well as human intuition to track credibility of tweets and also the different ways the features of Twitter and other online social network are exploited to spread misinformation by certain users for their own benefits and profits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, Lyon, France. ACM (2012)

    Google Scholar 

  2. Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: the million follower fallacy. In: Proceedings of the 4th International Conference on Weblogs and Social Media (ICWSM), Washington DC, USA. AAAI (2010)

    Google Scholar 

  3. Mustafaraj, E., Metaxas, P.T.: From obscurity to prominence in minutes: political speech and real-time search. In: WebSci10: Extending the Frontiers of Society On-Line, Raleigh, USA. The Web Science Trust (2010)

    Google Scholar 

  4. Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proceedings of the 20th International Conference on World Wide Web, Hyderabad, USA. ACM (2011)

    Google Scholar 

  5. Morris, M.R., Counts, S., Roseway, A., Hoff, A., Schwarz, J.: Tweeting is believing?: Understanding microblog credibility perceptions. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, Raleigh, USA. ACM (2012)

    Google Scholar 

  6. Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT? In: Proceedings of the First Workshop on Social Media Analytics, Washington DC, USA. ACM (2010)

    Google Scholar 

  7. Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web. ACM, Raleigh, USA (2010)

    Google Scholar 

  8. Mathioudakis, M., Koudas, N.: TwitterMonitor: trend detection over the twitter stream. In: Proceedings of the 2010 International Conference on Management of Data, pp. 1155–1158. ACM (2010)

    Google Scholar 

  9. Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, 04–08 October 2010, Chicago, Illinois, USA (2010)

    Google Scholar 

  10. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, New York, NY, USA, pp. pp. 665–674. ACM (2011)

    Google Scholar 

  11. Goyal, A., Bonchi, F., Lakshmanan, L., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 3, 1–14 (2012)

    Google Scholar 

  12. Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57–66, 26–29 August 2001, San Francisco, California (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. J. Akshay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Akshay, M.J., Ala Mohammed, N., Vyas, A., Shony, P.B., Correa, S.K. (2018). Information Abuse in Twitter and Online Social Networks: A Survey. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2907-4_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2906-7

  • Online ISBN: 978-981-13-2907-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics