Encyclopedia of Social Network Analysis and Mining

2018 Edition
| Editors: Reda Alhajj, Jon Rokne

Detecting Crowdturfing in Social Media

  • Liang WuEmail author
  • Huan Liu
Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-7131-2_110196




Astroturfing is the campaign that masks its supporters and sponsors to make it appear to be launched by grassroots participants


Crowdsourcing is the process of obtaining needed services, ideas, or content by soliciting contributions from a group of people. Internet services facilitate the process by connecting customers and crowdsourcing workers

Ground truth

Ground truth is the accurate annotation of data examples, which is used in statistical models to prove or disprove research hypotheses

Heterogeneous data

Heterogeneous data are the data involving multiple modalities, such as a social media post containing texts and video clips

Information diffusion

Information diffusion happens between individuals when a flow of information travels from one individual to another

Misinformation and disinformation

Misinformation and disinformation are the inaccurate or false information. While disinformation is...

This is a preview of subscription content, log in to check access.


  1. Acemoglu D, Ozdaglar A, ParandehGheibi A (2010) Spread of (mis) information in social networks. Games Econ Behav 70(2):194–227MathSciNetzbMATHCrossRefGoogle Scholar
  2. Beder S (1998) Public relations’ role in manufacturing artificial grass roots coalitions. Public Relat Q 43(2):20Google Scholar
  3. Benevenuto F, Rodrigues T, Almeida V, Almeida J, Gonçalves M (2009) Detecting spammers and content promoters in online video social networks. In: Proceedings of the 32nd international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 620–627Google Scholar
  4. Cao C, Caverlee J (2015) Detecting spam urls in social media via behavioral analysis. In: European conference on information retrieval. Springer, pp 703–714Google Scholar
  5. Centola D (2010) The spread of behavior in an online social network experiment. Science 329(5996):1194–1197CrossRefGoogle Scholar
  6. Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of the 2010 IEEE International Conference on Data Mining. IEEE Computer Society Washington, DC, USA, pp 88–97Google Scholar
  7. Gao J, Liang F, Fan W, Wang C, Sun Y, Han J (2010) On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. Washington, DC, USA, pp 813–822Google Scholar
  8. Givel M (2007) Consent and counter-mobilization: the case of the national smokers alliance. J Health Commun 12(4):339–357CrossRefGoogle Scholar
  9. Jagabathula S, Subramanian L, Venkataraman A (2014) Reputation-based worker filtering in crowdsourcing. NIPS’14 Proceedings of the 27th International Conference on Neural Inf Proces Syst 2492–2500Google Scholar
  10. Kaplan AM, Haenlein M (2010) Users of the world, unite! The challenges and opportunities of social media. Bus Horiz 53(1):59–68CrossRefGoogle Scholar
  11. Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 137–146CrossRefGoogle Scholar
  12. Kermack WO, McKendrick AG (1927) A contribution to the mathematical theory of epidemics. Proc Roy Soc Lond a Math Phys Eng Sci 115:700–721zbMATHCrossRefGoogle Scholar
  13. Lee K, Eoff BD, Caverlee J (2011) Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings of the Fifth International Conference on Weblogs and Social Media, Barcelona, Catalonia, SpainGoogle Scholar
  14. Lee K, Tamilarasan P, Caverlee J (2013) Crowdturfers, campaigns, and social media: Tracking and revealing crowdsourced manipulation of social media. In: ICWSMGoogle Scholar
  15. Lee K, Webb S, Ge H (2014) The dark side of micro-task marketplaces: Characterizing fiverr and automatically detecting crowdturfing. arXiv preprint arXiv:1406.0574Google Scholar
  16. Lim SH, Kim SW, Kim S, Park S (2011) Construction of a blog network based on information diffusion. In: Proceedings of the 2011 ACM symposium on applied computing. ACM, New York, pp 937–941CrossRefGoogle Scholar
  17. Mccord M, Chuah M (2011) Spam detection on twitter using traditional classifiers. In: Autonomic and trusted computing. Springer, pp 175–186Google Scholar
  18. McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: Homophily in social networks. Annu rev Social 27:415–444CrossRefGoogle Scholar
  19. Menn J, Sanders E (2001a, August 21) Report: Microsoft funded ‘grass roots’ campaign. Associated PressGoogle Scholar
  20. Menn J, Sanders E (2001b, August 23) Lobbyists tied to microsoft wrote citizens’ letters. The LA TimesGoogle Scholar
  21. Morstatter F, Wu L, Nazer TH, Carley KM, Liu H (2016) A new approach to bot detection: striking the balance between precision and recall. The 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). San Francisco, CA, USAGoogle Scholar
  22. Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F (2010) Detecting and tracking the spread of astroturf memes in microblog streams. arXiv preprint arXiv:1011.3768Google Scholar
  23. Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F (2011) Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th international conference companion on world Wide web. ACM, New York, pp 249–252Google Scholar
  24. Shen J, Deng RH, Cheng Z, Nie L, Yan S (2015) On robust image spam filtering via comprehensive visual modeling. Pattern Recogn 48(10):3227–3238CrossRefGoogle Scholar
  25. Song J, Lee S, Kim J (2015) Crowdtarget: target-based detection of crowdturfing in online social networks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, New York, pp 793–804Google Scholar
  26. Tian RY, Zhang XF, Liu YJ (2015) Ssic model: a multi-layer model for intervention of online rumors spreading. Physica a Stat Mech Appl 427:181–191CrossRefGoogle Scholar
  27. Wang G, Wilson C, Zhao X, Zhu Y, Mohanlal M, Zheng H, Zhao BY (2012) Serf and turf: crowdturfing for fun and profit. In: Proceedings of the 21st international conference on world Wide web. ACM, New York, pp 679–688CrossRefGoogle Scholar
  28. Wang T, Wang G, Li X, Zheng H, Zhao BY (2013) Characterizing and detecting malicious crowdsourcing. ACM SIGCOMM Comput Commun rev 43(4):537–538CrossRefGoogle Scholar
  29. Henry J. Pulizzi (2009) White house brushes off health-care protests. Wall Street Journal (August 4)Google Scholar
  30. Wu L, Morstatter F, Hu X, Liu H (2016) Mining misinformation in social media. In: Chapter 5, Big Data in Complex and Social Networks. CRC Press, Boca Raton, FL, USA, pp 123–152Google Scholar
  31. Xie S, Wang G, Lin S, Yu PS (2012) Review spam detection via time series pattern discovery. In: Proceedings of the 21st international conference on world Wide web. ACM, New York, pp 635–636Google Scholar
  32. Yang X, Yang Q, Wilson C (2015) Penny for your thoughts: searching for the 50 cent party on sina weibo. In Proceedings of the International AAAI Conference on Weblogs and Social Media (ICWSM 2015). Oxford, UK, MayGoogle Scholar
  33. Zafarani R, Liu H (2009) Social computing data repository at ASU. http://socialcomputing.asu.edu
  34. Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th international conference on world Wide web. ACM, New York, pp 1395–1405CrossRefGoogle Scholar

Recommended Reading

  1. Mining misinformation in social media, Liang Wu, Fred Morstatter, Xia Hu, and Huan Liu. To appear in Big Data in Complex and Social Networks, 2016Google Scholar
  2. Social media mining: an introduction, Reza Zafarani, Mohammad Ali Abbasi, and Huan Liu. Cambridge University Press, 2014Google Scholar

Copyright information

© Springer Science+Business Media LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Data Mining and Machine Learning Lab, School of Computing, Informatics, and Decision Systems EngineeringArizona State UniversityTempeUSA

Section editors and affiliations

  • Guandong Xu
    • 1
  • Peng Cui
    • 2
  1. 1.University of Technology SydneySydneyAustralia
  2. 2.Tsinghua UniversityBeijingP. R. China