skip to main content
10.1145/3230905.3230922acmotherconferencesArticle/Chapter ViewAbstractPublication PageslopalConference Proceedingsconference-collections
research-article

Opinion Spam Detection: A Review of the Literature

Authors Info & Claims
Published:02 May 2018Publication History

ABSTRACT

Thanks to the rapid advances in Internet technologies in the last decade, there has been an exponential growth in the development and use of a large variety of social media platforms. Today, these online spaces are widely around the world as they enable people to generate content and share their opinions about different topics, products and services. Given the valuable information that they include, these online reviews are often one of the primary sources up on which a customer's decision to purchase a product or a service is based. These opinions are also a valuable source of information that businesses resort to in order to determine public opinion on their goods and services. Nevertheless, the truthfulness or veracity of these opinions is questionable. In fact, many of these are opinion spams whose purpose is merely to destroy the reputation of a company's products or services or to promote another company's low quality goods. The objective of this paper is, therefore, to review the most important works that have been addressed opinion spam detection. The findings of the study revealed that the approaches, which were based on machine learning and natural language processing techniques, can be classified into three categories: linguistic, behavioral and statistical.

References

  1. Jindal, N., & Liu, B. (2008). Opinion spam and analysis. In Proceedings of the 2008 International Conference on Web Search and Data Mining, WSDM'08, February 11-12, 2008, Palo Alto, California, USA, (pp. 219--230). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Faizi, R., El Fkihi, S., El Afia, A. & Chiheb R. "Extracting Business Value from Big Data," Proceedings of the 29th International Business Information Management Association (IBIMA), ISBN: 978-0-9860419-7-6, 3-4 May 2017, Vienna, Austria, (pp. 997--1002).Google ScholarGoogle Scholar
  3. Chen, Y. R., & Chen, H. H. (2015). Opinion spam detection in web forum: a real case study. In Proceedings of the 24th International Conference on World Wide Web. May 18-22, 2015, Florence, Italy, (pp. 173--183). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lin, Y., Wang, X., & Zhou, A. (2016). Opinion Analysis for Online Reviews. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rastogi, A., & Mehrotra, M. (2017). Opinion Spam Detection in Online Reviews. Journal of Information & Knowledge Management. Vol. 16, No. 4 September 14, 2017, 1750036, (38 pages).Google ScholarGoogle ScholarCross RefCross Ref
  6. Ott, M., Cardie, C., & Hancock, J. T. (2013). Negative deceptive opinion spam. In Proceedings of the 2013 conference of the north American chapter of the association for computational linguistics: human language technologies. ISBN 978-1-937284-47-3, 9-14 June 2013, Atlanta, Georgia, (pp. 497--501).Google ScholarGoogle Scholar
  7. Yoo KH., Gretzel U. (2009) Comparison of Deceptive and Truthful Travel Reviews. In: Höpken W., Gretzel U., Law R. (eds) Information and Communication Technologies in Tourism 2009. Springer, Vienna, (pp 37--47)Google ScholarGoogle Scholar
  8. Newman, M. L., Pennebaker, J. W., Berry, D. S., & Richards, J. M. (2003). Lying words: Predicting deception from linguistic styles. Personality and social psychology bulletin, PSPB, Vol. 29, No. 5, May 2003, 665--675 29(5), (pp. 665--675).Google ScholarGoogle Scholar
  9. Chen C., Zhao H., Yang Y. (2015) Deceptive Opinion Spam Detection Using Deep Level Linguistic Features. In: Li J., Ji H., Zhao D., Feng Y. (eds) Natural Language Processing and Chinese Computing. Lecture Notes in Computer Science, vol 9362. Springer, Cham, (pp. 465--474). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Qingxi P., & Ming Z. (2014). Detecting Spam Review through Sentiment Analysis. In proceeding of journal of software, vol. 9, n№. 8, August 2014 (pp. 2065--2072).Google ScholarGoogle Scholar
  11. Li, J., Ott, M., Cardie, C., & Hovy, E. (2014). Towards a general rule for identifying deceptive opinion spam. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics. Vol. 1, June 23-25 2014, Baltimore, Maryland, USA, (pp. 1566--1576).Google ScholarGoogle ScholarCross RefCross Ref
  12. Rayson, P., Wilson, A., & Leech, G. (2002). Grammatical word class variation within the British National Corpus sampler. Language and Computers, UCREL, Lancaster University, 36, 295--306. (pp. 295--306).Google ScholarGoogle Scholar
  13. Lim, E. P., Nguyen, V. A., Jindal, N., Liu, B., & Lauw, H. W. (2010). Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM international conference on Information and knowledge management. CIKM'10, October 26-30, 2010, Toronto, Ontario, Canada, (pp. 939--948). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., & Ghosh, R. (2013). Exploiting Burstiness in Reviews for Review Spammer Detection. In proceedings of the Seventh International AAAI Conference on Weblogs and Social Media, July 8-11, 2013, Cambridge, Massachusetts, USA, (pp. 175--184).Google ScholarGoogle Scholar
  15. Kolli S., Sagar H, Sohan S., Vanipriya C.H. (2015). Fraud Detection in Online Reviews using Machine Learning Techniques. International Journal of Computational Engineering Research (IJCER), ISSN (e): 2250-3005, Vol. 05, Issue 5, May - 2015, (pp. 52--56).Google ScholarGoogle Scholar
  16. Sanketi P. R., & Chitra W. (2017). Efficient and Trustworthy Review/Opinion Spam Detection. International Journal on Recent and Innovation Trends in Computing and Communication, ISSN: 2321-8169, Vol. 5, Issue 4, April 2017, (pp. 86--94).Google ScholarGoogle Scholar
  17. Simran Bajaj, Niharika Garg and Sandeep Kumar Singh. (2017). A Novel User-based Spam Review Detection. In proceeding of the 5th International Conference on Information Technology and Quantitative Management (ITQM) December 8-10, New Delhi, India, (pp. 1009--1015).Google ScholarGoogle Scholar
  18. Qian, T., & Liu, B. (2013). Identifying multiple userids of the same author. In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, Seattle, Washington, USA, 18-21 October 2013, (pp. 1124--1135).Google ScholarGoogle Scholar
  19. Junting Ye, Santhosh Kumar, Leman Akoglu. (2016). Temporal Opinion Spam Detection by Multivariate Indicative Signals. In proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016), Cologne, Germany, May 17-20, 2016, (pp. 743--746).Google ScholarGoogle Scholar
  20. Michael Crawford, Taghi M. Khoshgoftaar and Joseph D. Prusa. (2016). Reducing Feature Set Explosion to Facilitate Real-World Review Spam Detection. In proceeding of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, Key Largo, Florida. May 16-18, 2016, (pp. 304--309).Google ScholarGoogle Scholar
  21. Yu-Ren Chen and Hsin-Hsi Chen (2015). Opinion Spam Detection in Web Forum: A Real Case Study. In proceeding of the International World Wide Web Conference Committee (IW3C2). May 18-22, 2015, Florence, Italy. ACM 978-1-4503-3469-3/15/05. (pp. 173--183). Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    LOPAL '18: Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications
    May 2018
    357 pages
    ISBN:9781450353045
    DOI:10.1145/3230905

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 May 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    LOPAL '18 Paper Acceptance Rate61of141submissions,43%Overall Acceptance Rate61of141submissions,43%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader