Synonyms
Astroturfing; Malicious crowdsourcing
- Astroturfing:
-
Astroturfing is the campaign that masks its supporters and sponsors to make it appear to be launched by grassroots participants.
- Crowdsourcing:
-
Crowdsourcing is the process of obtaining needed services, ideas, or content by soliciting contributions from a group of people. Internet services facilitate the process by connecting customers and crowdsourcing workers.
- Ground truth:
-
Ground truth is the accurate annotation of data examples, which is used in statistical models to prove or disprove research hypotheses.
- Heterogeneous data:
-
Heterogeneous data are the data involving multiple modalities, such as a social media post containing texts and video clips.
- Information diffusion:
-
Information diffusion happens between individuals when a flow of information travels from one individual to another.
- Misinformation and disinformation:
-
Misinformation and disinformation are the inaccurate or false information. While disinformation is...
Keywords
- Ground Truth
- Social Media
- Information Diffusion
- Malicious User
- Social Media Site
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
References
Acemoglu D, Ozdaglar A, ParandehGheibi A (2010) Spread of (mis) information in social networks. Games Econ Behav 70(2):194–227
Beder S (1998) Public relations’ role in manufacturing artificial grass roots coalitions. Public Relat Q 43(2):20
Benevenuto F, Rodrigues T, Almeida V, Almeida J, Gonçalves M (2009) Detecting spammers and content promoters in online video social networks. In: Proceedings of the 32nd international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 620–627
Cao C, Caverlee J (2015) Detecting spam urls in social media via behavioral analysis. In: European conference on information retrieval. Springer, pp 703–714
Centola D (2010) The spread of behavior in an online social network experiment. Science 329(5996):1194–1197
Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of the 2010 IEEE International Conference on Data Mining. IEEE Computer Society Washington, DC, USA, pp 88–97
Gao J, Liang F, Fan W, Wang C, Sun Y, Han J (2010) On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. Washington, DC, USA, pp 813–822
Givel M (2007) Consent and counter-mobilization: the case of the national smokers alliance. J Health Commun 12(4):339–357
Jagabathula S, Subramanian L, Venkataraman A (2014) Reputation-based worker filtering in crowdsourcing. NIPS’14 Proceedings of the 27th International Conference on Neural Inf Proces Syst 2492–2500
Kaplan AM, Haenlein M (2010) Users of the world, unite! The challenges and opportunities of social media. Bus Horiz 53(1):59–68
Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 137–146
Kermack WO, McKendrick AG (1927) A contribution to the mathematical theory of epidemics. Proc Roy Soc Lond a Math Phys Eng Sci 115:700–721
Lee K, Eoff BD, Caverlee J (2011) Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings of the Fifth International Conference on Weblogs and Social Media, Barcelona, Catalonia, Spain
Lee K, Tamilarasan P, Caverlee J (2013) Crowdturfers, campaigns, and social media: Tracking and revealing crowdsourced manipulation of social media. In: ICWSM
Lee K, Webb S, Ge H (2014) The dark side of micro-task marketplaces: Characterizing fiverr and automatically detecting crowdturfing. arXiv preprint arXiv:1406.0574
Lim SH, Kim SW, Kim S, Park S (2011) Construction of a blog network based on information diffusion. In: Proceedings of the 2011 ACM symposium on applied computing. ACM, New York, pp 937–941
Mccord M, Chuah M (2011) Spam detection on twitter using traditional classifiers. In: Autonomic and trusted computing. Springer, pp 175–186
McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: Homophily in social networks. Annu rev Social 27:415–444
Menn J, Sanders E (2001a, August 21) Report: Microsoft funded ‘grass roots’ campaign. Associated Press
Menn J, Sanders E (2001b, August 23) Lobbyists tied to microsoft wrote citizens’ letters. The LA Times
Morstatter F, Wu L, Nazer TH, Carley KM, Liu H (2016) A new approach to bot detection: striking the balance between precision and recall. The 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). San Francisco, CA, USA
Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F (2010) Detecting and tracking the spread of astroturf memes in microblog streams. arXiv preprint arXiv:1011.3768
Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F (2011) Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th international conference companion on world Wide web. ACM, New York, pp 249–252
Shen J, Deng RH, Cheng Z, Nie L, Yan S (2015) On robust image spam filtering via comprehensive visual modeling. Pattern Recogn 48(10):3227–3238
Song J, Lee S, Kim J (2015) Crowdtarget: target-based detection of crowdturfing in online social networks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, New York, pp 793–804
Tian RY, Zhang XF, Liu YJ (2015) Ssic model: a multi-layer model for intervention of online rumors spreading. Physica a Stat Mech Appl 427:181–191
Wang G, Wilson C, Zhao X, Zhu Y, Mohanlal M, Zheng H, Zhao BY (2012) Serf and turf: crowdturfing for fun and profit. In: Proceedings of the 21st international conference on world Wide web. ACM, New York, pp 679–688
Wang T, Wang G, Li X, Zheng H, Zhao BY (2013) Characterizing and detecting malicious crowdsourcing. ACM SIGCOMM Comput Commun rev 43(4):537–538
Henry J. Pulizzi (2009) White house brushes off health-care protests. Wall Street Journal (August 4)
Wu L, Morstatter F, Hu X, Liu H (2016) Mining misinformation in social media. In: Chapter 5, Big Data in Complex and Social Networks. CRC Press, Boca Raton, FL, USA, pp 123–152
Xie S, Wang G, Lin S, Yu PS (2012) Review spam detection via time series pattern discovery. In: Proceedings of the 21st international conference on world Wide web. ACM, New York, pp 635–636
Yang X, Yang Q, Wilson C (2015) Penny for your thoughts: searching for the 50 cent party on sina weibo. In Proceedings of the International AAAI Conference on Weblogs and Social Media (ICWSM 2015). Oxford, UK, May
Zafarani R, Liu H (2009) Social computing data repository at ASU. http://socialcomputing.asu.edu
Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th international conference on world Wide web. ACM, New York, pp 1395–1405
Recommended Reading
Mining misinformation in social media, Liang Wu, Fred Morstatter, Xia Hu, and Huan Liu. To appear in Big Data in Complex and Social Networks, 2016
Social media mining: an introduction, Reza Zafarani, Mohammad Ali Abbasi, and Huan Liu. Cambridge University Press, 2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media LLC
About this entry
Cite this entry
Wu, L., Liu, H. (2017). Detecting Crowdturfing in Social Media. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7163-9_110196-1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7163-9_110196-1
Received:
Accepted:
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7163-9
Online ISBN: 978-1-4614-7163-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering