We present a technique to identify Twitter users we trust to be regular Twitter users and not spam or fake accounts. The technique starts with an initial set of trusted users based on Twitter's verified users and recursively includes other users the trusted users communicate with. Conversations must be initiated by trusted users. We show that this technique produces a set of users that is over 200 times larger than Twitter's verified users. Our evaluation shows that the share of non-spam users within the resulting set of trusted users is more than 92% while the share of non-spam users within all tweeting users is 74%..
CITATION STYLE
Hentschel, M., Alonso, O., Counts, S., & Kandylas, V. (2014). Finding users we trust: Scaling up verified twitter users using their communication patterns. In Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM 2014 (pp. 591–594). The AAAI Press. https://doi.org/10.1609/icwsm.v8i1.14569
Mendeley helps you to discover research relevant for your work.