Abstract
With the Internet accessible to more than half of the global population, online social network, especially Twitter, has become a highly impactful source of news and information. However not all the information spread through Twitter are credible. Spammers, scammer, people with agendas and so on may use the services of Twitter, making it difficult for the users to tell the difference between what is credible and what is not. Current researchers work on several ways to monitor the tweets and the users who spread falsehoods. This paper aims to study a few papers in this field and that employs the usage of several algorithms as well as human intuition to track credibility of tweets and also the different ways the features of Twitter and other online social network are exploited to spread misinformation by certain users for their own benefits and profits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, Lyon, France. ACM (2012)
Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: the million follower fallacy. In: Proceedings of the 4th International Conference on Weblogs and Social Media (ICWSM), Washington DC, USA. AAAI (2010)
Mustafaraj, E., Metaxas, P.T.: From obscurity to prominence in minutes: political speech and real-time search. In: WebSci10: Extending the Frontiers of Society On-Line, Raleigh, USA. The Web Science Trust (2010)
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proceedings of the 20th International Conference on World Wide Web, Hyderabad, USA. ACM (2011)
Morris, M.R., Counts, S., Roseway, A., Hoff, A., Schwarz, J.: Tweeting is believing?: Understanding microblog credibility perceptions. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, Raleigh, USA. ACM (2012)
Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT? In: Proceedings of the First Workshop on Social Media Analytics, Washington DC, USA. ACM (2010)
Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web. ACM, Raleigh, USA (2010)
Mathioudakis, M., Koudas, N.: TwitterMonitor: trend detection over the twitter stream. In: Proceedings of the 2010 International Conference on Management of Data, pp. 1155–1158. ACM (2010)
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, 04–08 October 2010, Chicago, Illinois, USA (2010)
Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, New York, NY, USA, pp. pp. 665–674. ACM (2011)
Goyal, A., Bonchi, F., Lakshmanan, L., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 3, 1–14 (2012)
Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57–66, 26–29 August 2001, San Francisco, California (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Akshay, M.J., Ala Mohammed, N., Vyas, A., Shony, P.B., Correa, S.K. (2018). Information Abuse in Twitter and Online Social Networks: A Survey. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-13-2907-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2906-7
Online ISBN: 978-981-13-2907-4
eBook Packages: Computer ScienceComputer Science (R0)