2015
DOI: 10.1007/s11390-015-1584-4
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Marionette Microblog Users for Improved Information Credibility

Abstract: In this paper, we propose to detect a special group of microblog users: the "marionette" users, who are created or employed by backstage "puppeteers", either through programs or manually. Unlike normal users that access microblog for information sharing or social communication, the marionette users perform specific tasks to earn financial profits. For example, they follow certain users to increase their "statistical popularity", or retweet some tweets to amplify their "statistical impact". The fabricated follo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Consequently, misinformation may spread widely and can cause a lot of damage before human operators detect it. However, others [84], [109]- [118] have stressed that manual methods of credibility assessment are more accurate than automation-based methods. They used statistical analyses to interpret results and measure user behavior regarding particular news.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Consequently, misinformation may spread widely and can cause a lot of damage before human operators detect it. However, others [84], [109]- [118] have stressed that manual methods of credibility assessment are more accurate than automation-based methods. They used statistical analyses to interpret results and measure user behavior regarding particular news.…”
Section: Discussionmentioning
confidence: 99%
“…Cognitive ability can be defined ''psychological function of knowledge that consists of elements like vigilance, sensory system, learning, and thought processes'' [109], correlating exactly which concerns are being regarded, including beliefs, reasons, intuitions, and expertise [110]. Beyond social network analysis, cognitive psychology helps to identify the mental ability tasked with data dissemination [111].…”
Section: ) Cognitive and Perception Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…They considered that there may be only a small amount of labeled data and a large amount of unlabeled data in many scenarios. At present, the features used to distinguish between spammers and non-spammers mainly include account-based features [3], content-based features [24], relationship(graph)based features [5], [28], behavior-based features [25], [27], time-based features [29], and hybrid features [1], [2].…”
Section: A Spammer Detection Approachesmentioning
confidence: 99%
“…In addition, most existing methods (e.g. Wu et al [2013]) consider the typical and out-dated model of a fraudster who has uniform posting frequency and a followers-to-followees ratio close to 1 -nowadays, many fraudsters are more sophisticated. Ghosh et al [2011] address a problem similar to ours, but use the URLs found in tweets instead of retweet threads in conjunction with a time and user-based entropy to classify posting activity and content.…”
Section: Fraud Detection On Twittermentioning
confidence: 99%