2016 IEEE International Conference on Big Data (Big Data) 2016
DOI: 10.1109/bigdata.2016.7840796
|View full text |Cite
|
Sign up to set email alerts
|

Identifying trolls and determining terror awareness level in social networks using a scalable framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Since intent is difficult to ascertain, we only coded tweets as disinformation if they were associated with troll accounts, or accounts that used popular memes to distort general perceptions about an event (Mutlu et al, 2016). We began by identifying memes about school shootings using the following links: www.knowyourmeme.com and www.me.me.com, and then searched the (re)tweets in our sample for keywords associated with popular memes such as “Sam Hyde is the shooter,” which emerged after the University of California (UC) Santa Barbara shooting.…”
Section: Cases and Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since intent is difficult to ascertain, we only coded tweets as disinformation if they were associated with troll accounts, or accounts that used popular memes to distort general perceptions about an event (Mutlu et al, 2016). We began by identifying memes about school shootings using the following links: www.knowyourmeme.com and www.me.me.com, and then searched the (re)tweets in our sample for keywords associated with popular memes such as “Sam Hyde is the shooter,” which emerged after the University of California (UC) Santa Barbara shooting.…”
Section: Cases and Methodsmentioning
confidence: 99%
“…Consequently, if an account was still active and the user retweeted a meme from a troll account, we assumed that the user was unfamiliar with the meme and coded the retweet as misinformation. This categorization is more conservative than that used by other scholars, who label trolls as individuals circulating “malicious” information or “disruptive activity” designed to lure people into pointless debate (Abril, 2016; Mutlu et al, 2016). We used a more conservative approach in an effort to better assess who served as opinion leaders and the quality of information they shared.…”
Section: Cases and Methodsmentioning
confidence: 99%
“…Peimen and others [22] use external lexicons and TF-IDF features extraction for finding a correlation between Twitter sentiment and events that have occurred. Bursa et al [23] identify malicious users on social media who propagate false opinions and distort the general perception, using KNN, Naïve Bayes, and decision tree machine learning algorithms. They also determine terror awareness level on social media using a scalable framework.…”
Section: Related Workmentioning
confidence: 99%
“…As future work, our next step will be a semantic analysis [38,41], and ranking [18] of the collected SPARQL endpoints. This will help to get a better understanding about the contents of the discovered Linked Data sources, making it possible to classify SPARQL endpoints according to their domain or context [31][32][33]. Moreover, since it was observed that a small number of endpoints was not discovered by SpEnD (due to search engines' limitations) but were still available on the static repositories, we will put some effort into improving our overall approach to better include, in an automatic way, endpoints and datasets listed only on those repositories.…”
Section: Comparison Of Spend With Existing Sparql Endpoints Repositoriesmentioning
confidence: 99%