Abstract
Over the past years, political events and public opinion on the Web have been allegedly manipulated by “Pathogenic Social Media (PSM)” accounts dedicated to spreading disinformation and performing malicious activities. These accounts are often controlled by terrorist supporters, water armies, or fake news writers and hence can pose threats to social media and general public. Understanding and analyzing PSMs could help social media devise sophisticated techniques to stop them from reaching their audience and consequently reduce their threat. In this chapter, probabilistic causal inference and well-known statistical technique Hawkes processes are utilized to distinguish between PSM and non-PSM accounts. Results on real-world ISIS-related datasets from Twitter demonstrate that PSMs behave significantly differently from regular users while disseminating information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Throughout this book, we may use terms normal, non-PSM, or regular users interchangeably to refer to the accounts that do not intend to do harm to the public and social media.
- 2.
- 3.
- 4.
- 5.
References
H. Alvari, P. Shakarian, Hawkes process for understanding the influence of pathogenic social media accounts, in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), pp. 36–42 (June 2019)
H. Alvari, E. Shaabani, P. Shakarian, Early identification of pathogenic social media accounts. IEEE Intelligent and Security Informatics (2018). arXiv:1809.09331
H. Alvari, E. Shaabani, S. Sarkar, G. Beigi, P. Shakarian, Less is more: Semi-supervised causal inference for detecting pathogenic users in social media, in Companion Proceedings of The 2019 World Wide Web Conference, WWW ’19 (Association for Computing Machinery, New York, NY, USA, 2019), pp. 154–161
E. Bacry, T. Jaisson, J.-F. Muzy, Estimation of slowly decreasing Hawkes kernels: application to high-frequency order book dynamics. Quantitative Finance 16(8), 1179–1201 (2016)
C. Chen, K. Wu, S. Venkatesh, X. Zhang, Battling the internet water army: Detection of hidden paid posters. CoRR, abs/1111.4297 (2011)
C. Chen, K. Wu, S. Venkatesh, R.K. Bharadwaj, The best answers? think twice: online detection of commercial campaigns in the CQA forums, in ASONAM (2013)
D.J. Daley, D. Vere-Jones, An Introduction to the Theory of Point Processes: Volume II: General Theory and Structure (Springer Science & Business Media, 2007)
M. Gomez-Rodriguez, J. Leskovec, B. Schölkopf, Modeling information propagation with survival theory, in International Conference on Machine Learning, pp. 666–674 (2013)
A. Goyal, F. Bonchi, L.V. Lakshmanan, Learning influence probabilities in social networks, in WSDM (2010)
A. Gupta, H. Lamba, P. Kumaraguru, $1.00 per rt #bostonmarathon #prayforboston: Analyzing fake content on twitter, in 2013 APWG eCrime Researchers Summit (2013)
A. Gupta, P. Kumaraguru, C. Castillo, P. Meier, TweetCred: Real-Time Credibility Assessment of Content on Twitter (Springer International Publishing, 2014)
A.G. Hawkes, Spectra of some self-exciting and mutually exciting point processes. Biometrika 58(1), 83–90 (1971)
M. Khader, Combating Violent Extremism and Radicalization in the Digital Era. Advances in Religious and Cultural Studies (IGI Global, 2016)
J. Klausen, C. Marks, T. Zaman, Finding online extremists in social networks. CoRR, abs/1610.06242 (2016)
S. Kleinberg, B. Mishra, The temporal logic of causal structures. CoRR, abs/1205.2634 (2012)
J. Pearl, Causality: Models, Reasoning and Inference, 2nd edn. (Cambridge University Press, New York, NY, USA, 2009)
E. Shaabani, R. Guo, P. Shakarian, Detecting pathogenic social media accounts without content or network structure, in 2018 1st International Conference on Data Intelligence and Security (ICDIS) (IEEE, 2018), pp. 57–64
P. Suppes, A probabilistic theory of causality (1970)
K. Thomas, C. Grier, D. Song, V. Paxson, Suspended accounts in retrospect: an analysis of twitter spam, in Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (ACM, 2011), pp. 243–258
S. Zannettou, T. Caulfield, E. De Cristofaro, N. Kourtelris, I. Leontiadis, M. Sirivianos, G. Stringhini, J. Blackburn, The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources, in Proceedings of the 2017 Internet Measurement Conference (ACM, 2017), pp. 405–417
K. Zhou, H. Zha, L. Song, Learning social infectivity in sparse low-rank networks using multi-dimensional Hawkes processes, in Artificial Intelligence and Statistics, pp. 641–649 (2013)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alvari, H., Shaabani, E., Shakarian, P. (2021). Characterizing Pathogenic Social Media Accounts. In: Identification of Pathogenic Social Media Accounts. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-61431-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-61431-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-61430-0
Online ISBN: 978-3-030-61431-7
eBook Packages: Computer ScienceComputer Science (R0)