2016
DOI: 10.1007/s13278-016-0350-0
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral analysis and classification of spammers distributing pornographic content in social media

Abstract: Social spam is a huge and complicated problem plaguing social networking sites in several ways. This includes posts, reviews or blogs containing product promotions and contests, adult content and general spam. It has been found that social media websites such as Twitter is also acting as a distributor of pornographic content, although it is considered against their own stated policy. In this paper, we have reviewed the case of Twitter and found that spammers contributing to pornographic content follow legitima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…Recognizing this, some scholars have begun developing automated (often, ML based) solutions to automate certain aspects of content regulation [28,42,45,68,94,108]. For example, researchers have proposed computational approaches to identify hate speech [18], pornography [98] and pro-eating disorder content [15]. Wulczyn et al created a ML classifier trained on human-annotated data to identify personal attacks in online discussions on Wikipedia [112].…”
Section: Automating Content Regulationmentioning
confidence: 99%
“…Recognizing this, some scholars have begun developing automated (often, ML based) solutions to automate certain aspects of content regulation [28,42,45,68,94,108]. For example, researchers have proposed computational approaches to identify hate speech [18], pornography [98] and pro-eating disorder content [15]. Wulczyn et al created a ML classifier trained on human-annotated data to identify personal attacks in online discussions on Wikipedia [112].…”
Section: Automating Content Regulationmentioning
confidence: 99%
“…To our knowledge, invoice text classification has not been investigated previously1. Work related to text classification of short texts has been applied for microblogs (Singh et al, 2016;Ren et al, 2016;Missier et al, 2016), email subject classification (Alsmadi and Alhami, 2015) and spam detection (Bahgat et al, 2016).…”
Section: Related Workmentioning
confidence: 99%
“…Spammers create and stockpile social media accounts, especially on Twitter because of its simplicity to create new accounts due to weak account opening and verification mechanisms. Spammers use these accounts to launch spamming campaigns that contain profanity, curse words, adult content, promotion of child pornography and exploitation, and harassment [13]. Spammers then disseminate targeted Twitter spam by exploiting weaknesses of the internet censorship and content filtering systems that use the blacklisted keywords, blacklisted URLs, and blacklisted spamming words [14].…”
Section: Spammers In Social Mediamentioning
confidence: 99%
“…In [13], Singh et al used six filthy keywords in Twitter searches to collect a pornographic spammer dataset. The dataset contains more than 73 thousand tweets and more than 18 thousand users.…”
Section: Spammers In Social Mediamentioning
confidence: 99%