2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf 2019
DOI: 10.1109/dasc/picom/cbdcom/cyberscitech.2019.00042
|View full text |Cite
|
Sign up to set email alerts
|

The Central Community of Twitter ego-Networks as a Means for Fake Influencer Detection

Abstract: The central community of social networks, usually represented through the highest degree k-core of the corresponding graph, is proposed here as a compact representation of large social networks. We show that the central community of egocentric social media networks, such as the ego networks on Twitter and Instagram, tell us much more about the actual influence of the ego than the whole egocentric network itself. We also propose a novel genetic algorithm for the identification of central community of egocentric… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 23 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…SMIs can also gain a significant source of income from endorsement deals (i.e., Scipioni, 2021) if they have enough of a following. The ability to make a lot of money quickly has led to many influencers using less than ethical means of gaining followers and influence (i.e., Tsapatsoulis et al, 2019). For example, by spoofing or stealing content from more popular profiles, social media users could trick followers who thought they were following legitimate accounts (Marwick & Boyd, 2011).…”
Section: Introductionmentioning
confidence: 99%
“…SMIs can also gain a significant source of income from endorsement deals (i.e., Scipioni, 2021) if they have enough of a following. The ability to make a lot of money quickly has led to many influencers using less than ethical means of gaining followers and influence (i.e., Tsapatsoulis et al, 2019). For example, by spoofing or stealing content from more popular profiles, social media users could trick followers who thought they were following legitimate accounts (Marwick & Boyd, 2011).…”
Section: Introductionmentioning
confidence: 99%
“…This can lead a brand to think that it can be a great investment to hire this account to spread their products or services, but in reality it would be a waste of money because these accounts really generate interaction with accounts managed by bots and other non-real accounts, so there is no real interaction. Detecting these accounts requires network analysis, and according to Tsapatsoulis, Anastasopoulou, and Ntalianis (2019), they are usually egocentric accounts easily identified by network analysis algorithms based on centrality.…”
Section: Challengesmentioning
confidence: 99%