Friend or foe: Twitter users under magnification

N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In today's digital ecosystem, where people share vital information on a daily basis, it is imperative to identify security loopholes and vulnerability in social networks. Through identity resolution and disambiguation, information leakage and identity hijacking by malicious parties, can be reduced significantly. In this paper, we develop a simple model for successfully classifying Twitter users as suspicious and non-suspicious in their user activity. Our aim is to be able to find a concrete set of users that encompasses most users who misrepresent their identity on Twitter. Using user and tweet meta-data, we devised a mathematical model to tag users as listener, talker, hub, seed and absorber, and further conjugate the values generated by these equations, to identify suspicious and non-suspicious users in our 49,991-user dataset. This model of classification can be extended for integration with rigorous security mechanisms to identify true malicious users on Twitter and other online social platforms. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Sharma, A. D., Ahluwalia, A., Deep, S., & Bansal, D. (2014). Friend or foe: Twitter users under magnification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8337 LNCS, pp. 251–262). Springer Verlag. https://doi.org/10.1007/978-3-319-04483-5_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free