skip to main content
10.1145/3320269.3405433acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan

Published:05 October 2020Publication History

ABSTRACT

Social network platforms have become popular channels for election campaigns and political propaganda in recent years. However, some entities may employ a group of accounts to generate and shape public opinions. This study investigated the publication and commenting activities by collecting a 6-month-long user behavior data on the most extensively used online forum in Taiwan during a local election in 2018. A series of comparative studies between normal and verified malicious accounts are conducted. From the results, we find malicious authors published articles with more comments and received polarized ratings from online users.

References

  1. Samantha Bradshaw and Philip N Howard. 2018. Challenging truth and trust: A global inventory of organized social media manipulation. The Computational Propaganda Project (2018).Google ScholarGoogle Scholar
  2. Jidong Chen and Yiqing Xu. 2017. Information manipulation and reform in authoritarian regimes. Political Science Research and Methods, Vol. 5, 1 (2017), 163--178.Google ScholarGoogle ScholarCross RefCross Ref
  3. Justin Cheng, Michael Bernstein, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2017. Anyone can become a troll: Causes of trolling behavior in online discussions. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. 1217--1230.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
        October 2020
        957 pages
        ISBN:9781450367509
        DOI:10.1145/3320269

        Copyright © 2020 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 October 2020

        Check for updates

        Qualifiers

        • poster

        Acceptance Rates

        Overall Acceptance Rate418of2,322submissions,18%
      • Article Metrics

        • Downloads (Last 12 months)6
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader