Abstract
Bots have been playing a crucial role in online platform ecosystems, as efficient and automatic tools to generate content and diffuse information to the social media human population. In this chapter, we will discuss the role of social bots in content spreading dynamics in social media. In particular, we will first investigate some differences between diffusion dynamics of content generated by bots, as opposed to humans, in the context of political communication, then study the characteristics of bots behind the diffusion dynamics of social media spam campaigns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
RoboLike: https://robolike.com/.
- 2.
Pandora bot: https://developer.pandorabots.com/.
- 3.
- 4.
Twitter Search API: https://dev.twitter.com/rest/public/search.
- 5.
Twitter Stream API: https://dev.twitter.com/streaming/overview.
- 6.
Bot or Not Python API: https://github.com/truthy/botornot-python.
- 7.
Bot or Not Website: https://truthy.indiana.edu/botornot/.
- 8.
The combination of the top 250 non-spam keywords, plus the 87 spam keywords, accounts for over 90% of all tweets in the original dataset.
References
Abokhodair N, Yoo D, McDonald DW (2015) Dissecting a social botnet: growth, content, and influence in twitter. In: Proceedings of the 18th ACM conference on computer-supported cooperative work and social computing. ACM, New York
Adamic LA, Glance N (2005) The political blogosphere and the 2004 us election: divided they blog. In: 3rd international workshop on link discovery. ACM, New York, pp 36–43
Ahn Y-Y, Han S, Kwak H, Moon S, Jeong H (2007) Analysis of topological characteristics of huge online social networking services. In: Proceedings of the 16th international conference on world wide web. ACM, New York, pp 835–844
Aiello LM, Deplano M, Schifanella R, Ruffo G (2012) People are strange when you’re a stranger: impact and influence of bots on social networks
Allem J-P, Ferrara E (2016) The importance of debiasing social media data to better understand e-cigarette-related attitudes and behaviors. J Med Internet Res 18(8):e219
Alvisi L, Clement A, Epasto A, Lattanzi S, Panconesi A (2013) Sok: the evolution of sybil defense via social networks. In: 2013 IEEE symposium on security and privacy. IEEE, Piscataway, pp 382–396
Aral S, Walker D (2011) Creating social contagion through viral product design: a randomized trial of peer influence in networks. Manag Sci 57(9):1623–1639
Barabasi A-L (2005) The origin of bursts and heavy tails in human dynamics. Nature 435(7039):207–211
Barberá P, Wang N, Bonneau R, Jost JT, Nagler J, Tucker J, González-Bailón S (2015) The critical periphery in the growth of social protests. PLoS One 10(11):e0143611
Bekafigo MA, McBride A (2013) Who tweets about politics? Political participation of twitter users during the 2011gubernatorial elections. Soc Sci Comp Rev 31(5)
Bessi A, Ferrara E (2016) Social bots distort the 2016 US presidential election online discussion. First Monday 21(11):1–14
Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M (2011) The socialbot network: when bots socialize for fame and money. In: Proceedings of the 27th annual computer security applications conference. ACM, New York, pp 93–102
Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M (2013) Design and analysis of a social botnet. Comput Netw 57(2):556–578
Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15(5):662–679
Carlisle JE, Patton RC (2013) Is social media changing how we understand political engagement? An analysis of facebook and the 2008 presidential election. Polit Res Q 66(4):883–895
Catanese SA, De Meo P, Ferrara E, Fiumara G, Provetti A (2011) Crawling facebook for social network analysis purposes. In: ACM WIMS ’11: international conference on web intelligence, mining and semantics. ACM, New York, pp 52–59
Centola D (2011) An experimental study of homophily in the adoption of health behavior. Science 334(6060):1269–1272
Cha M, Haddadi H, Benevenuto F, Gummadi KP (2010) Measuring user influence in twitter: the million follower fallacy. In: Fourth international AAAI conference on weblogs and social media (ICWSM 2010). AAAI Press, Palo Alto, pp 10–17
Chu Z, Widjaja I, Wang H (2012) Detecting social spam campaigns on twitter. In: International conference on applied cryptography and network security. Springer, Berlin, Heidelberg, pp 455–472
Coburn Z, Marra G (2011) Realboy: believable twitter bots. http://ca.olin.edu/2008/realboy/
Conover M, Ratkiewicz J, Francisco MR, Gonçalves B, Menczer F, Flammini A (2011) Political polarization on twitter. ICWSM 133:89–96
Conover MD, Davis C, Ferrara E, McKelvey K, Menczer F, Flammini A (2013) The geospatial characteristics of a social movement communication network. PLoS One 8(3):e55957
Conover MD, Ferrara E, Menczer F, Flammini A (2013) The digital evolution of occupy wall street. PLoS One 8(5):e64679
Davis CA, Varol O, Ferrara E, Flammini A, Menczer F (2016) Botornot: a system to evaluate social bots. In: WWW ’16 companion proceedings of the 25th international conference companion on world wide web. ACM, New York, pp 273–274
DiGrazia J, McKelvey K, Bollen J, Rojas F (2013) More tweets, more votes: social media as a quantitative indicator of political behavior. PLoS One 8(11):e79449
Effing R, Hillegersberg JV, Huibers T (2011) Social media and political participation: are facebook, twitter and youtube democratizing our political systems? In: International conference on electronic participation. Springer, Berlin, pp 25–35
El-Khalili S (2013) Social media as a government propaganda tool in post-revolutionary Egypt. First Monday 18(3)
Elovici Y, Fire M, Herzberg A, Shulman H (2013) Ethical considerations when employing fake identities in online social networks for research. Sci Eng Ethics 20:1–17
Elyashar A, Fire M, Kagan D, Elovici Y (2013) Homing socialbots: intrusion on a specific organization’s employee using socialbots. In: Proceedings of the 2013 international conference on advances in social networks analysis and mining. ACM, New York, pp 1358–1365
Ferrara E (2015) Manipulation and abuse on social media. ACM SIGWEB Newsletter (4). ACM, New York
Ferrara E (2017) Contagion dynamics of extremist propaganda in social networks. Inf Sci 418:1–12
Ferrara E (2017) Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday 22(8)
Ferrara E, Yang Z (2015) Measuring emotional contagion in social media. PLoS One 10(11):e0142390
Ferrara E, Yang Z (2015) Quantifying the effect of sentiment on information diffusion in social media. Peer J Comput Sci 1:e26
Ferrara E, De Meo P, Fiumara G, Baumgartner R (2014) Web data extraction, applications and techniques: a survey. Knowl-Based Syst 70:301–323
Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun. ACM 59(7):96–104
Ferrara E, Varol O, Menczer F, Flammini A (2016) Detection of promoted social media campaigns. In: 10th international AAAI conference on web and social media, pp 563–566
Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM conference on internet measurement. ACM, New York, pp 35–47
Gao H, Barbier G, Goolsby R (2011) Harnessing the crowdsourcing power of social media for disaster relief. IEEE Intell Syst 26(3):10–14
González-Bailón S, Borge-Holthoefer J, Rivero A, Moreno Y (2011) The dynamics of protest recruitment through an online network. Sci Rep 1:197
González-Bailón S, Borge-Holthoefer J, Moreno Y (2013) Broadcasters and hidden influentials in online protest diffusion. Am Behav Sci 57:943–965. https://doi.org/10.1177/0002764213479371
Hadgu AT, Garimella K, Weber I (2013) Political hashtag hijacking in the us. In: Proceedings of the 22nd international conference on world wide web. ACM, New York, pp 55–56
Heymann P, Koutrika G, Garcia-Molina H (2007) Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6):36–45
Howard PN (2006) New media campaigns and the managed citizen. Cambridge University Press, Cambridge
Howard PN, Kollanyi B (2016) Bots, #strongerin, and #brexit: computational propaganda during the uk-eu referendum. Available at SSRN 2798311
Hwang T, Pearce I, Nanis M (2012) Socialbots: voices from the fronts. Interactions 19(2):38–45
Jackson SJ, Welles BF (2015) Hijacking# mynypd: social media dissent and networked counterpublics. J Commun 65(6):932–952
Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100
Jain N, Agarwal P, Pruthi J (2015) Hashjacker-detection and analysis of hashtag hijacking on twitter. Int J Comput Appl 114(19):17–20
Jin X, Lin C, Luo J, Han J (2011) A data mining-based spam detection system for social media networks. Proc VLDB Endowment 4(12):1458–1461
Jindal N, Liu B (2007) Review spam detection. In: Proceedings of the 16th international conference on world wide web. ACM, New York, pp 1189–1190
Klotz RJ (2007) Internet campaigning for grassroots and astroturf support. Soc Sci Comput Rev 25(1):3–12
Kollanyi B, Howard PN, Woolley SC (2016) Bots and automation over twitter during the first us presidential debate. Technical report, COMPROP Data Memo
Kramer AD, Guillory JE, Hancock JT (2014) Experimental evidence of massive-scale emotional contagion through social networks. Proc Natl Acad Sci 111(24):8788–8790
Kümpel AS, Karnowski V, Keyling T (2015) News sharing in social media: a review of current research on news sharing users, content, and networks. Social Media+ Society 1(2):2056305115610141
Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on world wide web, pp 591–600
Latonero M, Shklovski I (2013) Emergency management, twitter, and social media evangelism. In: Using social and information technologies for disaster and crisis management. IGI Global, Hershey, pp 196–212
Lazer D, Pentland AS, Adamic L, Aral S, Barabasi AL, Brewer D, Christakis N, Contractor N, Fowler J, Gutmann M et al (2009) Life in the network: the coming age of computational social science. Science (New York, NY) 323(5915):721
Lee K, Caverlee J, Webb S (2010) The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on world wide web. ACM, New York, pp 1139–1140
Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 435–442
Lutz C, Hoffmann CP, Meckel M (2014) Beyond just politics: a systematic literature review of online participation. First Monday 19(7)
Lyon TP, Maxwell JW (2004) Astroturf: Interest group lobbying and corporate strategy. J Econ Manag Strateg 13(4):561–597
Markines B, Cattuto C, Menczer F (2009) Social spam detection. In: Proceedings of the 5th international workshop on adversarial information retrieval on the web, pp 41–48
Mayzlin D, Dover Y, Chevalier J (2014) Promotional reviews: an empirical investigation of online review manipulation. Am Econ Rev 104(8):2421–2455
Messias J, Schmidt L, Oliveira R, Benevenuto F (2013) You followed my bot! transforming robots into influential users in twitter. First Monday 18(7)
Metaxas PT, Mustafaraj E (2012) Social media and the elections. Science 338(6106):472–473
Mønsted B, Sapieżyński P, Ferrara E, Lehmann S (2017) Evidence of complex contagion of information in social media: an experiment using twitter bots. PLos One 12: e0184148
Morstatter F, Pfeffer J, Liu H, Carley KM (2013) Is the sample good enough? Comparing data from twitter’s streaming API with twitter’s firehose. In: 7th international AAAI conference on weblogs and social media
Mukherjee A, Liu B, Glance N (2012) Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st international conference on world wide web, pp 191–200
Pang B, Lee L et al (2008) Opinion mining and sentiment analysis. Found Trends Inf Retr 2(1–2):1–135
Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Flammini A, Menczer F (2011) Detecting and tracking political abuse in social media. ICWSM 11:297–304
Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F (2011) Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th international conference companion on world wide web. ACM, New York, pp 249–252
Shorey S, Howard PN (2016) Automation, algorithms, and politics— automation, big data and politics: a research review. Int J Commun 10:24
Song J, Lee S, Kim J (2011) Spam filtering in twitter using sender-receiver relationship. In: International workshop on recent advances in intrusion detection, pp 301–317
Stein T, Chen E, Mangla K (2011) Facebook immune system. In: Proceedings of the 4th workshop on social network systems, p 8. ACM, New York
Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference, p 1–9. ACM, New York
Subrahmanian V, Azaria A, Durst S, Kagan V, Galstyan A, Lerman K, Zhu L, Ferrara E, Flammini A, Menczer F et al (2016) The DARPA Twitter bot challenge. IEEE Comput 49(6):38–46
Sutton JN, Palen L, Shklovski I (2008) Backchannels on the front lines: emergency uses of social media in the 2007 Southern California wildfires. University of Colorado, Boulder
Thelwall M (2013) Heart and soul: sentiment strength detection in the social web with sentistrength. In: Proceedings of the CyberEmotions, pp 1–14
Thelwall M, Buckley K, Paltoglou G, Cai D, Kappas A (2010) Sentiment strength detection in short informal text. J Am Soc Inf Sci Technol 61(12):2544–2558
Theocharis Y, Lowe W, van Deth JW, García-Albacete G (2015) Using twitter to mobilize protest action: online mobilization patterns and action repertoires in the occupy wall street, indignados, and aganaktismenoi movements. Inf Commun Soc 18(2):202–220
Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. ACM, New York, pp 243–258
Thomas K, McCoy D, Grier C, Kolcz A, Paxson V (2013) Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse. In: Usenix security, vol 13, pp 195–210
Varol O, Ferrara E, Ogan CL, Menczer F, Flammini A (2014) Evolution of online user behavior during a social upheaval. In: Proceedings 2014 ACM conference on web science, pp 81–90
Varol O, Ferrara E, Davis C, Menczer F, Flammini A (2017) Online human-bot interactions: detection, estimation, and characterization. In: International AAAI conference on web and social media
Varol O, Ferrara E, Menczer F, Flammini A (2017) Early detection of promoted campaigns on social media. EPJ Data Sci 6(1):13
Wagner CH (1982) Simpson’s paradox in real life. Am Stat 36(1):46–48
Wang G, Mohanlal M, Wilson C, Wang X, Metzger M, Zheng H, Zhao BY (2013) Social turing tests: crowdsourcing sybil detection. In: NDSS. The Internet Society, Reston
Yang C, Harkreader R, Zhang J, Shin S, Gu G (2012) Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on world wide web. ACM, New York, pp 71–80
Yang X, Chen B-C, Maity M, Ferrara E (2016) Social politics: agenda setting and political communication on social media. In: International conference on social informatics. Springer, Berlin, pp 330–344
Yates D, Paquette S (2011) Emergency knowledge management and social media technologies: a case study of the 2010 haitian earthquake. Int J Inf Manag 31(1):6–13
Yin J, Lampert A, Cameron M, Robinson B, Power R (2012) Using social media to enhance emergency situation awareness. IEEE Intell Syst 27(6):52–59
Zangerle E, Specht G (2014) “Sorry, I was hacked” a classification of compromised twitter accounts. In: SAC: the 29th symposium on applied computing
Zhang X, Zhu S, Liang W (2012) Detecting spam and promoting campaigns in the twitter social network. In: IEEE 12th international conference on data mining (ICDM), 2012. IEEE, Piscataway, pp 1194–1199
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Ferrara, E. (2018). Measuring Social Spam and the Effect of Bots on Information Diffusion in Social Media. In: Lehmann, S., Ahn, YY. (eds) Complex Spreading Phenomena in Social Systems. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-77332-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-77332-2_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77331-5
Online ISBN: 978-3-319-77332-2
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)