skip to main content
10.1145/3297280.3297486acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Identification of credulous users on Twitter

Published: 08 April 2019 Publication History

Abstract

Social networks can quickly propagate information to large audiences and can be used to spread fake news or to provide false figures of popularity. Social bots, i.e., software robots that automatically interact with human users and produce content under a fictive identity, are used for such harmful activities. In this paper, we study the relationship between bots and genuine human users with the aim of identifying those "credulous" users who are particularly exposed, and unintentionally contribute, to the activities planned by a network of bots. Spotting credulous users is useful to service providers to display warnings on their dashboards, scan their activities for early signs of attacks, or take more active measures to prevent or limit the negative effects of their activities.
Here we aim at identifying credulous users on Twitter starting from those involved in any social relation with a bot. To that end, we rely on an existing bot detector along with its dataset of genuine users and bots that we extend with additional information about the friends of each genuine user. To single out credulous users out of genuine ones, we study the effectiveness of different metrics or combinations thereof. We see this as a first step towards singling out features that can be used to detect credulous users without resorting to the expensive analysis of the nature of their friends.

References

[1]
Flora Amato, Aniello Castiglione, Aniello De Santo, Vincenzo Moscato, Antonio Picariello, Fabio Persia, and Giancarlo Sperlí. 2018. Recognizing human behaviours in online social networks. Computers & Security 74 (2018), 355--370.
[2]
Sotirios Antoniadis, Iouliana Litou, and Vana Kalogeraki. 2015. A model for identifying misinformation in online social networks. In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems". Springer, 473--482.
[3]
Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5--32.
[4]
Nikan Chavoshi, Hossein Hamooni, and Abdullah Mueen. 2016. DeBot: Twitter Bot Detection via Warped Correlation. In Proceedings of the IEEE International Conference on Data Mining. 817--822.
[5]
Nikan Chavoshi, Hossein Hamooni, and Abdullah Mueen. 2017. Temporal patterns in bot activities. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 1601--1606.
[6]
Shu-I Chiu and Kuo-Wei Hsu. 2018. Predicting Political Tendency of Posts on Facebook. In International Conference on Software and Computer Applications (ICSCA). ACM, 110--114.
[7]
Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. 2012. Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Transactions on Dependable and Secure Computing 9, 6 (2012), 811--824.
[8]
William W. Cohen. 1995. Fast Effective Rule Induction. In International Conference on Machine Learning. 115--123.
[9]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the International Conference on World Wide Web Companion. 963--972.
[10]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2018. Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Transactions on Dependable and Secure Computing 15, 4 (2018), 561--576.
[11]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2015. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems 80 (2015), 56--71.
[12]
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2018. Social Fingerprinting: Detection ofSpambot Groups Through DNA-Inspired Behavioral Modeling. IEEE Trans. Dependable Sec. Comput. 15, 4 (2018), 561--576.
[13]
Isaac David, Oscar S Siordia, and Daniela Moctezuma. 2016. Features combination for the detection of malicious Twitter accounts. In IEEE International Autumn Meetingon Power, Electronics and Computing. 1--6.
[14]
Michela Del Vicario, Walter Quattrociocchi, Antonio Scala, and Fabiana Zollo. 2018. Polarization and fake news: Early warning of Potential misinformation targets. arXiv preprint arXiv.1802.01400 (2018).
[15]
John P Dickerson, Vadim Kagan, and VS Subrahmanian. 2014. Using sentiment to detect bots on twitter: Are humans more opinionated than bots?. In Proceedings of the International Conference on Advances in Social Networks Analysis and Mining. 620--627.
[16]
Phillip George Efthimion, Scott Payne, and Nicholas Proferes. 2018. Supervised Machine Learning Bot Detection Techniques to Identify Social Twitter Bots. SMU Data Science Review 1, 2 (2018), 5.
[17]
Frank Eibe, MA Hall, and IH Witten. 2016. The WEKA Workbench. Online Appendix for" Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann (2016).
[18]
Tom Fawcett. 2006. An introduction to ROC analysis. Pattern recognition letters 27, 8 (2006), 861--874.
[19]
Amir Fayazi, Kyumin Lee, James Caverlee, and Anna Squicciarini. 2015. Uncovering crowdsourced manipulation of online reviews. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval. 233--242.
[20]
Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016), 96--104.
[21]
Zafar Gilani, Reza Farahbakhsh, and Jon Crowcroft. 2017. Do Bots impact Twitter activity?. In Proceedings of the International Conference on World Wide Web Companion. 781--782.
[22]
Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge.
[23]
Aditi Gupta and Ponnurangam Kumaraguru. 2014. Misinformation in Social Networks, Analyzing Twitter During Crisis Events. In Encyclopedia of Social Network Analysis and Mining. Springer, 922--931.
[24]
Mufaddal Haidermota, Ashwini Pansare, and Drishit Mitra. 2018. Classifying twitter user as a bot or not and comparing different classification algorithms. International Journal of Advanced Research in Computer Science 9, 3 (2018).
[25]
Fang Jin, Wei Wang, Liang Zhao, Edward R Dougherty, Yang Cao, Chang-Tien Lu, and Naren Ramakrishnan. 2014. Misinformation propagation in the age of twitter. IEEE Computer 47, 12 (2014), 90--94.
[26]
Kyumin Lee, Prithivi Tamilarasan, and James Caverlee. 2013. Crowdturfers, Campaigns, and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM).
[27]
Kyumin Lee, Steve Webb, and Hancheng Ge. 2015. Characterizing and automatically detecting crowdturfing in Fiverr and Twitter. Social Network Analysis and Mining 5, 1 (2015), 2.
[28]
Filippo Menczer. 2016. The spread of misinformation in social media. In Proceedings of the International Conference Companion on World Wide Web. 717--717.
[29]
Amanda Minnich, Nikan Chavoshi, Danai Koutra, and Abdullah Mueen. 2017. BotWalk: Efficient adaptive exploration of Twitter bot networks. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 467--474.
[30]
David Martin Powers. 2011. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. (2011).
[31]
SiHua Qi, Lulwah AlKulaib, and David A Broniatowski. 2018. Detecting and Characterizing Bot-Like Behavior on Twitter. In International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation. Springer, 228--232.
[32]
Ross Quinlan. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers.
[33]
PV Savyan and S Mary Saira Bhanu. 2017. Behaviour Profiling of Reactions in Facebook Posts for Anomaly Detection. In 2017 Ninth International Conference on Advanced Computing(ICoAC). IEEE, 220--226.
[34]
Jieun Shin, Lian Jian, Kevin Driscoll, and François Bar. 2018. The diffusion of misinformation on social media: Temporal pattern, message, and source. Computers in Human Behavior 83 (2018), 278--287.
[35]
Neharika Singh and Madhumita Chatterjee. 2017. BotDefender: A Framework to Detect Bots in Online Social Media. Journal of Network Communications and Emerging Technologies 7, 9 (2017).
[36]
Stefan Stieglitz, Florian Brachten, Davina Berthelé, Mira Schlaus, Chrissoula Venetopoulou, and Daniel Veutgen. 2017. Do Social Bots (Still) Act Different to Humans?-Comparing Metrics of Social Bots with Those of Humans. In International Conference on Social Computing and Social Media. Springer, 379--395.
[37]
Pablo Suárez-Serrato, Margaret E Roberts, Clayton Davis, and Filippo Menczer. 2016. On the influence of social bots in online protests. In Proceedings of the International Conference on Social Informatics. 269--278.
[38]
VS Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, Filippo Menczer, et al. 2016. The DARPA Twitter bot challenge. arXiv preprint arXiv:1601.05140 (2016).
[39]
Marcella Tambuscio, Giancarlo Ruffo, Alessandro Flammini, and Filippo Menczer. 2015. Fact-checking effect on viral hoaxes: A model of misinformation spread in social networks. In Proceedings of the International conference on World Wide Web (WWW). 977--982.
[40]
Tayfun Tuna, Esra Akbas, Ahmet Aksoy, Muhammed Abdullah Canbaz, Umit Karabiyik, Bilal Gonen, and Ramazan Aygun. 2016. User characterization for online social networks. Social Netw. Analys. Mining 6, 1 (2016), 104:1--104:28.
[41]
Onur Varol, Emilio Ferrara, Clayton A Davis, Filippo Menczer, and Alessandro Flammini. 2017. Online human-bot interactions: Detection, estimation, and characterization. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM).
[42]
Monika Verma and Sanjeev Sofat. 2014. Techniques to detect spammers in twitter-a survey. International Journal of Computer Applications 85, 10 (2014).
[43]
Hyui Geon Yoon, Hyungjun Kim, Chang Ouk Kim, and Min Song. 2016. Opinion polarity detection in Twitter data combining shrinkage regression and topic modeling. Journal of Informetrics 10, 2 (2016), 634--644.

Cited By

View all
  • (2023)Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents?International Journal of Information and Communication Technology Research10.61186/itrc.15.1.3515:1(35-44)Online publication date: 1-Feb-2023
  • (2023)¿La alfabetización digital activa la incredulidad en noticias falsas? Eficacia de las actitudes y estrategias contra la desinformación en MéxicoRevista de Comunicación10.26441/RC22.2-2023-3246Online publication date: 14-Aug-2023
  • (2022)A Deep Learning Approach for Robust Detection of Bots in Twitter Using Transformers ModelInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-4610(395-403)Online publication date: 11-Jun-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing
April 2019
2682 pages
ISBN:9781450359337
DOI:10.1145/3297280
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 April 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Twitter
  2. bots
  3. social networks
  4. user analysis

Qualifiers

  • Research-article

Conference

SAC '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)3
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Identifying Persian bots on Twitter; which feature is more important: Account Information or Tweet Contents?International Journal of Information and Communication Technology Research10.61186/itrc.15.1.3515:1(35-44)Online publication date: 1-Feb-2023
  • (2023)¿La alfabetización digital activa la incredulidad en noticias falsas? Eficacia de las actitudes y estrategias contra la desinformación en MéxicoRevista de Comunicación10.26441/RC22.2-2023-3246Online publication date: 14-Aug-2023
  • (2022)A Deep Learning Approach for Robust Detection of Bots in Twitter Using Transformers ModelInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-4610(395-403)Online publication date: 11-Jun-2022
  • (2021)Methods and Challenges in Social Bots Detection: A Systematic ReviewProceedings of the XVII Brazilian Symposium on Information Systems10.1145/3466933.3466973(1-8)Online publication date: 7-Jun-2021
  • (2021)Social Media Identity Deception DetectionACM Computing Surveys10.1145/344637254:3(1-35)Online publication date: 17-Apr-2021
  • (2021)A Deep Learning Approach for Robust Detection of Bots in Twitter Using TransformersIEEE Access10.1109/ACCESS.2021.30686599(54591-54601)Online publication date: 2021
  • (2021)Malicious accounts detection from online social networks: a systematic review of literatureInternational Journal of General Systems10.1080/03081079.2021.197677350:7(741-814)Online publication date: 21-Sep-2021
  • (2020)Credulous Users and Fake News: a Real Case Study on the Propagation in Twitter2020 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS)10.1109/EAIS48028.2020.9122764(1-8)Online publication date: May-2020
  • (2020)You talkin’ to me? Exploring Human/Bot Communication Patterns during Riot EventsInformation Processing and Management: an International Journal10.1016/j.ipm.2019.10212657:1Online publication date: 1-Jan-2020
  • (2019)Do You Really Follow Them? Automatic Detection of Credulous Twitter UsersIntelligent Data Engineering and Automated Learning – IDEAL 201910.1007/978-3-030-33607-3_44(402-410)Online publication date: 14-Nov-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media