2014
DOI: 10.1007/s13278-014-0231-3
|View full text |Cite
|
Sign up to set email alerts
|

Detecting anomalies in social network data consumption

Abstract: As the popularity and usage of social media exploded over the years, understanding how social network users’ interests evolve gained importance in diverse fields, ranging from sociological studies to marketing. In this paper, we use two snapshots from the Twitter network and analyze data interest patterns of users in time to understand individual and collective user behavior on social networks. Building topical profiles of users, we propose novel metrics to identify anomalous friendships, and validate our resu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Those include Senators and members of the Australian House of Representatives. (ii) A selected set of users is assembled from three distinguished Australian Twitter lists that are relevant [51] is twofold: (i) to proof the efficiency and applicability of the proposed approach which can be used to eliminate spammers and their content and entrench the domain KG with trustworthy facts; (ii) to embed also the content of domain influencers from a dataset of users whose domains of knowledge are not explicitly known.…”
Section: Dataset Acquisitionmentioning
confidence: 99%
See 2 more Smart Citations
“…Those include Senators and members of the Australian House of Representatives. (ii) A selected set of users is assembled from three distinguished Australian Twitter lists that are relevant [51] is twofold: (i) to proof the efficiency and applicability of the proposed approach which can be used to eliminate spammers and their content and entrench the domain KG with trustworthy facts; (ii) to embed also the content of domain influencers from a dataset of users whose domains of knowledge are not explicitly known.…”
Section: Dataset Acquisitionmentioning
confidence: 99%
“…As mentioned previously our study uses the Twitter graph dataset crawled by Akcora et al [51]. This dataset comprises spammers and other anomalous users.…”
Section: Knowledge Credibility Modulementioning
confidence: 99%
See 1 more Smart Citation
“…Data acquisition is carried out using a PHP script triggered by running a cron job which selects a new user_id and starts collecting historical user information, tweets, replies and the related metadata. The list of Twitterers' user_ids used in the data acquisition phase is extracted from a Twitter graph dataset crawled by Akcora et al [101]. This graph is chosen since it includes the list of users who had less than 5,000 friends in 2013.…”
Section: Case Study On Social Credibility Analysismentioning
confidence: 99%
“…Shu et al [7] outline the human cost of fake, false and misleading information on society as a whole, and we begin there by making a strong case for the need to identify and contain misinformation. Shu makes the point that fake news is very hard to detect from the news item itself, and we need to resort to meta-data such as likes and retweets, friends and followers.Further justification for the utility of meta-data can be found in Akcora [2]. This paper focuses on the clustered behavior of the friend and follower network in Twitter.…”
Section: Related Workmentioning
confidence: 99%