Detection of Fake Reviews Using Machine Learning Techniques

Wesam Asaad, Y. Ali, Ragheed Allami
{"title":"Detection of Fake Reviews Using Machine Learning Techniques","authors":"Wesam Asaad, Y. Ali, Ragheed Allami","doi":"10.59992/ijsr.2023.v2n5p4","DOIUrl":null,"url":null,"abstract":"Online marketing generates vast amounts of digital information, which is then used to advertise millions of goods and services. Finding the best services or goods that meet the need is, therefore, difficult. Customers make decisions based on evaluations or opinions expressed by third parties. In this cutthroat environment. For the past few years, some businesses have employed writers to fabricate favorable reviews of their services or goods or unfairly critical reviews of those of their rivals in order to increase the number of false reviews. Review sites are increasingly having to deal with the distribution of false information that either benefits or hurts particular firms. Different types of opinion spam are used to deceive both human readers and automated sentiment analysis and opinion mining systems. Different strategies have been put forth as a result, allowing for the evaluation of the user-generated content's credibility. The current paper provides a quick introduction to the examination of opinion mining and the review-centric attributes that have been suggested for use in machine learning techniques that use graphical methods to identify bogus reviews. Along with a review of the related literature and a discussion of it.","PeriodicalId":13846,"journal":{"name":"International Journal for Scientific Research and Development","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal for Scientific Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59992/ijsr.2023.v2n5p4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Online marketing generates vast amounts of digital information, which is then used to advertise millions of goods and services. Finding the best services or goods that meet the need is, therefore, difficult. Customers make decisions based on evaluations or opinions expressed by third parties. In this cutthroat environment. For the past few years, some businesses have employed writers to fabricate favorable reviews of their services or goods or unfairly critical reviews of those of their rivals in order to increase the number of false reviews. Review sites are increasingly having to deal with the distribution of false information that either benefits or hurts particular firms. Different types of opinion spam are used to deceive both human readers and automated sentiment analysis and opinion mining systems. Different strategies have been put forth as a result, allowing for the evaluation of the user-generated content's credibility. The current paper provides a quick introduction to the examination of opinion mining and the review-centric attributes that have been suggested for use in machine learning techniques that use graphical methods to identify bogus reviews. Along with a review of the related literature and a discussion of it.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用机器学习技术检测虚假评论
在线营销产生了大量的数字信息,这些信息随后被用来为数百万种商品和服务做广告。因此,找到满足需求的最佳服务或商品是困难的。客户根据第三方的评价或意见做出决定。在这个残酷的环境中。在过去的几年里,一些企业雇佣作家编造对他们的服务或商品的好评,或者对竞争对手的不公平的批评,以增加虚假评论的数量。评论网站越来越多地不得不处理虚假信息的传播,这些虚假信息要么有利于某些公司,要么损害某些公司。不同类型的意见垃圾邮件被用来欺骗人类读者和自动情感分析和意见挖掘系统。因此,提出了不同的策略,允许对用户生成内容的可信度进行评估。本文简要介绍了意见挖掘的检查和以评论为中心的属性,这些属性已被建议用于使用图形方法识别虚假评论的机器学习技术。同时对相关文献进行回顾和讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Twenty-First Century Skills and Their Relationship to The Quality of Psychological Life Among a Sample of Students at King Abdulaziz University in Jeddah Computerizing The Security of Ambiguity in Morphological Semantics The Difference in the Synonymous Meanings of the Holy Quran Between the Inhibitors and the Gallant Advancements in Optical Technologies for Medical Imaging and Diagnosis Fugitive Identity in London’s Victoria Station When Khalid Amine Frames the Road to Seniority Through a Cross-cultural Performance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1