skip to main content
10.1145/2665943.2665966acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Stylometric Linkability of Tweets

Published: 03 November 2014 Publication History

Abstract

Microblogging is a very popular Internet activity that informs and entertains a large number of people via terse messages; e.g., tweets on Twitter. Even though microblogging does not emphasize privacy, authors can easily hide behind pseudonyms and multiple accounts on the same, or across multiple, site(s). In this paper, we explore stylometric linkability of tweets. Our results clearly demonstrate that multiple sets of tweets by the same author are easily linkable even when the number of possible authors is large. This is also confirmed by showing that linkability holds for a set of actual Twitter users who admittedly tweet via multiple accounts.

References

[1]
A. Abbasi and H. Chen. Writeprints: A Stylometric Approach to Identity-Level Identification and Similarity Detection in Cyberspace. In ACM Transactions on Information Systems, 2008.
[2]
M. Almishari and G. Tsudik. Exploring linkability in user reviews. In European Symposium on Research in Computer Security, 2012.
[3]
M. Bhargava, P. Mehndiratta, and K. Asawa. Stylometric Analysis for Authorship Attribution on Twitter. In Big Data Analytics, 2013.
[4]
C. Bishop. Pattern Recognition and Machine Learning. Springer, 2006.
[5]
S. R. Boutwell. Authorship Attribution of Short Messages Using Multimodal Features. In Master Thesis, Naval Postgraduate School, 2011.
[6]
R. Layton, P. Watters, and R. Dazeley. Authorship Attribution for Twitter in 140 Characters or Less. In Cybercrime and Trustworthy Computing Workshop (CTC), 2010.
[7]
M. A. Mishari, D. Kaafar, G. Tsudik, and E. Oguz. Are 140 characters enough? A large-scale linkability study of tweets. CoRR, abs/1406.2746, 2014.
[8]
T. Mitchell. Machine Learning. McGraw Hill, 1997.
[9]
A. Narayanan, H. Paskov, N. Gong, J. Bethencourt, E. Stefanov, E. Shin, and D. Song. On the Feasibility of Internet-Scale Author Identification. In IEEE Symposium on Security and Privacy, 2012.
[10]
R. Silva and G. Laboreiro and L. Sarmento and T. Grant and E. Oliveira and B. Maia. Automatic Authorship Analysis of Micro-Blogging Messages. In NLDB, 2011.
[11]
E. Stamatatos. A Survey of Modern Authorship Attribution Methods. In Journal of the American Society for Information Science and Technology, 2009.
[12]
J. Yang and J. Leskovec. Patterns of temporal variation in online media. In WSDM, 2011.

Cited By

View all
  • (2022)Breaking Anonymity of Social Media by Profiling from Multimodal Information2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)10.1109/QRS-C57518.2022.00028(137-144)Online publication date: Dec-2022
  • (2021)Real-time privacy risk quantification in online social networksProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1145/3487351.3488272(74-81)Online publication date: 8-Nov-2021
  • (2021)A Method of Search Space Adaptation in the False Pseudonyms Detection ProcedureArtificial Intelligence in Intelligent Systems10.1007/978-3-030-77445-5_10(110-120)Online publication date: 16-Jul-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
November 2014
218 pages
ISBN:9781450331487
DOI:10.1145/2665943
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. author attribution
  2. linkability
  3. microblogging

Qualifiers

  • Research-article

Funding Sources

Conference

CCS'14
Sponsor:

Acceptance Rates

WPES '14 Paper Acceptance Rate 26 of 67 submissions, 39%;
Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Breaking Anonymity of Social Media by Profiling from Multimodal Information2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)10.1109/QRS-C57518.2022.00028(137-144)Online publication date: Dec-2022
  • (2021)Real-time privacy risk quantification in online social networksProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1145/3487351.3488272(74-81)Online publication date: 8-Nov-2021
  • (2021)A Method of Search Space Adaptation in the False Pseudonyms Detection ProcedureArtificial Intelligence in Intelligent Systems10.1007/978-3-030-77445-5_10(110-120)Online publication date: 16-Jul-2021
  • (2020)The Improvement of the Stylometry-Based Cognitive Assistant Performance in Conditions of Big Data AnalysisApplied Informatics and Cybernetics in Intelligent Systems10.1007/978-3-030-51974-2_8(85-99)Online publication date: 8-Aug-2020
  • (2019)A Girl Has No Name: Automated Authorship Obfuscation using Mutant-XProceedings on Privacy Enhancing Technologies10.2478/popets-2019-00582019:4(54-71)Online publication date: 30-Jul-2019
  • (2019)Hi Doppelgänger : Towards Detecting Manipulation in News CommentsCompanion Proceedings of The 2019 World Wide Web Conference10.1145/3308560.3316496(197-205)Online publication date: 13-May-2019
  • (2019)A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)10.1109/ICAwST.2019.8923378(1-8)Online publication date: Oct-2019
  • (2019)Re-identifying people from anonymous histories of their activities2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)10.1109/ICAwST.2019.8923333(1-5)Online publication date: Oct-2019
  • (2018)Authorship Attribution for Online Social MediaSocial Network Analytics for Contemporary Business Organizations10.4018/978-1-5225-5097-6.ch008(141-165)Online publication date: 2018
  • (2018)Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on WaveletsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/318350614:1s(1-17)Online publication date: 26-Mar-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media