Finding users we trust: Scaling up verified twitter users using their communication patterns

19Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

Abstract

We present a technique to identify Twitter users we trust to be regular Twitter users and not spam or fake accounts. The technique starts with an initial set of trusted users based on Twitter's verified users and recursively includes other users the trusted users communicate with. Conversations must be initiated by trusted users. We show that this technique produces a set of users that is over 200 times larger than Twitter's verified users. Our evaluation shows that the share of non-spam users within the resulting set of trusted users is more than 92% while the share of non-spam users within all tweeting users is 74%..

Cite

CITATION STYLE

APA

Hentschel, M., Alonso, O., Counts, S., & Kandylas, V. (2014). Finding users we trust: Scaling up verified twitter users using their communication patterns. In Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM 2014 (pp. 591–594). The AAAI Press. https://doi.org/10.1609/icwsm.v8i1.14569

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free