首页 > 最新文献

Online Social Networks and Media最新文献

英文 中文
Ready-to-(ab)use: From fake account trafficking to coordinated inauthentic behavior on Twitter 随时可用:从虚假账户贩运到Twitter上的协调不真实行为
Q1 Social Sciences Pub Date : 2022-09-01 DOI: 10.1016/j.osnem.2022.100224
Michele Mazza , Guglielmo Cola , Maurizio Tesconi

Fake accounts are the primary means for misuse and abuse of social media platforms, giving rise to coordinated inauthentic behaviors. Despite ongoing efforts to limit their exploitation, ready-to-use fake accounts can be found for sale on several underground markets. For the present study, we devised an innovative approach to detect accounts for sale on an underground market. Between June 2019 and July 2021, we detected more than 60,000 fake accounts, which we continuously tracked for changes in profile information and timeline. Afterward, we focused on the 23,579 accounts that produced at least one tweet in 2020, identifying the main characteristics like the most used names and profile descriptions. Also, we analyzed more than five million interactions, including mentions, replies, retweets, and the use of hashtags and URLs in tweets. These analyses exposed behavioral patterns indicating coordination, like using similar profile names or retweeting the same user. In particular, we spotted four coordinated campaigns, whose behavior ranged from attempting to influence the political debate in Buenos Aires to aggressive spam activity aimed at scamming cryptocurrency users or advertising counterfeit goods.

虚假账户是滥用和滥用社交媒体平台的主要手段,引发了相互协调的不真实行为。尽管一直在努力限制他们的利用,但在几个地下市场上仍然可以找到现成的假账户。在本研究中,我们设计了一种创新的方法来检测地下市场上的销售账户。在2019年6月至2021年7月期间,我们发现了6万多个虚假账户,并持续跟踪其个人资料信息和时间线的变化。之后,我们关注了在2020年至少发过一条推文的23579个账户,确定了最常用的名字和个人资料描述等主要特征。此外,我们还分析了500多万次互动,包括提及、回复、转发以及推文中标签和url的使用。这些分析揭示了表明协调的行为模式,比如使用相似的个人资料名称或转发同一用户。特别是,我们发现了四个协调的活动,其行为范围从试图影响布宜诺斯艾利斯的政治辩论到旨在欺骗加密货币用户或宣传假冒商品的激进垃圾邮件活动。
{"title":"Ready-to-(ab)use: From fake account trafficking to coordinated inauthentic behavior on Twitter","authors":"Michele Mazza ,&nbsp;Guglielmo Cola ,&nbsp;Maurizio Tesconi","doi":"10.1016/j.osnem.2022.100224","DOIUrl":"10.1016/j.osnem.2022.100224","url":null,"abstract":"<div><p>Fake accounts are the primary means for misuse and abuse of social media platforms<span><span>, giving rise to coordinated inauthentic behaviors. Despite ongoing efforts to limit their exploitation, ready-to-use fake accounts can be found for sale on several underground markets. For the present study, we devised an innovative approach to detect accounts for sale on an underground market. Between June 2019 and July 2021, we detected more than 60,000 fake accounts, which we continuously tracked for changes in profile information and timeline. Afterward, we focused on the 23,579 accounts that produced at least one tweet in 2020, identifying the main characteristics like the most used names and profile descriptions. Also, we analyzed more than five million interactions, including mentions, replies, retweets, and the use of hashtags and URLs in tweets. These analyses exposed behavioral patterns indicating coordination, like using similar profile names or retweeting the same user. In particular, we spotted four coordinated campaigns, whose behavior ranged from attempting to influence the political debate in Buenos Aires to aggressive </span>spam<span> activity aimed at scamming cryptocurrency users or advertising counterfeit goods.</span></span></p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"31 ","pages":"Article 100224"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Exploiting optimised communities in directed weighted graphs for link prediction 利用有向加权图中的优化社区进行链接预测
Q1 Social Sciences Pub Date : 2022-09-01 DOI: 10.1016/j.osnem.2022.100222
Faima Abbasi , Muhammad Muzammal , Kashif Naseer Qureshi , Ibrahim Tariq Javed , Tiziana Margaria , Noel Crespi

The most developing issue in analysing complex networks and graph mining is link prediction, which can be studied for both content and structural-based analysis in a social network. Link prediction deals with the prediction of missing links by determining whether a link can be created between two nodes in a future snapshot of a given directed weighted graph. Existing link prediction methods are only studied for unsigned graphs and work on principles of the common neighbourhood. However, the link prediction problem can also be studied for signed graphs where signed links can give an interesting insight into user associations. Obstruction of studies in this domain is caused by imbalance of class, i.e., positive links are frequent than negative ones, and forbearance of hidden communities. A signed network is a combination of dense and hidden communities. A hidden community structure is overlooked by majority of existing applications, taking dense community structure, i.e., one whole graph as input for developing a link prediction model. Hence, complete network information is required by majority of existing approaches, which seems unrealistic in modern social network analytics. In this article, we exploit hidden network communities to address link prediction problem in the signed network, focusing on negative links. A number of observation were made regarding negative links and a principle ensemble framework, i.e., E NeLp, is proposed, having two phases, i.e, network embedding and classifier prediction. Using a probabilistic embedding framework, network representation of hidden signed communities is learned, which were then passed to a learning classifier to predict negative links, keeping intact the ensemble framework. Despite the limited availability of signed network datasets, an extensive experimental study was performed to evaluate E NeLp pertinency, robustness, and scalability. The performance result shows that E NeLp can be a promising consideration for addressing link prediction tasks in signed networks and gives encouraging results.

在复杂网络分析和图挖掘中发展最快的问题是链接预测,它既可以用于基于内容的分析,也可以用于基于结构的分析。链路预测通过确定是否可以在给定有向加权图的未来快照中在两个节点之间创建链路来处理缺失链路的预测。现有的链路预测方法只对无符号图进行了研究,并且基于共同邻域原理。然而,链接预测问题也可以研究签名图,其中签名链接可以提供对用户关联的有趣洞察。阻碍这一领域研究的主要原因是阶级失衡,即积极联系多于消极联系,以及隐蔽社区的隐忍。签名网络是密集社区和隐藏社区的组合。现有的大多数应用程序都忽略了隐藏的社区结构,将密集的社区结构,即一个完整的图作为输入来开发链接预测模型。因此,现有的大多数方法都需要完整的网络信息,这在现代社会网络分析中似乎是不现实的。在本文中,我们利用隐藏的网络社区来解决签名网络中的链接预测问题,重点关注负链接。对负链接进行了大量的观察,并提出了一个主要的集成框架,即E - NeLp,该框架分为两个阶段,即网络嵌入和分类器预测。使用概率嵌入框架,学习隐藏签名社区的网络表示,然后将其传递给学习分类器来预测负链接,保持集成框架的完整性。尽管签名网络数据集的可用性有限,但我们进行了广泛的实验研究,以评估E - NeLp的相关性、鲁棒性和可伸缩性。性能结果表明,E - NeLp可以成为解决签名网络中链路预测任务的一个有希望的考虑因素,并给出了令人鼓舞的结果。
{"title":"Exploiting optimised communities in directed weighted graphs for link prediction","authors":"Faima Abbasi ,&nbsp;Muhammad Muzammal ,&nbsp;Kashif Naseer Qureshi ,&nbsp;Ibrahim Tariq Javed ,&nbsp;Tiziana Margaria ,&nbsp;Noel Crespi","doi":"10.1016/j.osnem.2022.100222","DOIUrl":"10.1016/j.osnem.2022.100222","url":null,"abstract":"<div><p><span>The most developing issue in analysing complex networks and graph mining is link prediction, which can be studied for both content and structural-based analysis in a social network. Link prediction deals with the prediction of missing links by determining whether a link can be created between two nodes in a future snapshot of a given directed weighted graph. Existing link prediction methods are only studied for unsigned graphs and work on principles of the common neighbourhood. However, the link prediction problem can also be studied for signed graphs where signed links can give an interesting insight into user associations. Obstruction of studies in this domain is caused by imbalance of class, i.e., positive links are frequent than negative ones, and forbearance of hidden communities. A signed network is a combination of dense and hidden communities. A hidden community structure is overlooked by majority of existing applications, taking dense community structure, i.e., one whole graph as input for developing a link prediction model. Hence, complete network information is required by majority of existing approaches, which seems unrealistic in modern social network analytics. In this article, we exploit hidden network communities to address link prediction problem in the signed network, focusing on negative links. A number of observation were made regarding negative links and a principle ensemble framework, i.e., </span><span><math><mi>E</mi></math></span> <span>NeLp</span>, is proposed, having two phases, i.e, network embedding and classifier prediction. Using a probabilistic embedding framework, network representation of hidden signed communities is learned, which were then passed to a learning classifier to predict negative links, keeping intact the ensemble framework. Despite the limited availability of signed network datasets, an extensive experimental study was performed to evaluate <span><math><mi>E</mi></math></span> <span>NeLp</span> pertinency, robustness, and scalability. The performance result shows that <span><math><mi>E</mi></math></span> <span>NeLp</span> can be a promising consideration for addressing link prediction tasks in signed networks and gives encouraging results.</p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"31 ","pages":"Article 100222"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121649566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A protocol for anonymous short communications in social networks and its application to proximity-based services 社交网络中的匿名短通信协议及其在基于邻近的服务中的应用
Q1 Social Sciences Pub Date : 2022-09-01 DOI: 10.1016/j.osnem.2022.100221
Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, Cecilia Labrini

Several innovative applications could be advantageously placed within social networks, to be effective, attractive, and pervasive. Examples of application domains that could benefit from social networks are e-democracy, e-participation, online surveys, crowdsourcing, and proximity-based services. In all the above cases, users’ anonymity could represent a considerable added value or could be even necessary to develop the service. We observe that all the above domains are characterized by the fact that only a few asynchronous messages should be exchanged. Therefore, we do not need the full communication power of anonymous communication networks, in which low-latency and connection-oriented communication should be supported. On the other hand, unlike communication networks, the threat model we have to consider assumes the presence of an adversary (represented by an honest-but-curious social network provider) able to monitor the entire flow of the exchanged messages. In this paper, we propose an anonymous communication protocol for short communications in social networks, based on a collaborative approach. The proposed solution hides from the social network provider not only the content of the messages but also the communication itself, which, per se, can result in considerable privacy leakage (think of the case of proximity testing performed between two users). This enables the implementation, within the social network, of the above-mentioned applications. To give a concrete proof of this statement, we develop a privacy-preserving proximity-based solution which provides both symmetric and asymmetric proximity testing entirely within social networks.

一些创新的应用程序可以被有利地放置在社交网络中,从而变得有效、有吸引力和普及。可以从社交网络中受益的应用领域包括电子民主、电子参与、在线调查、众包和基于邻近的服务。在上述所有情况下,用户的匿名性可能代表着相当大的附加价值,甚至可能是开发服务所必需的。我们注意到,上述所有域的特点都是只需要交换少量异步消息。因此,我们不需要匿名通信网络的全部通信能力,其中应该支持低延迟和面向连接的通信。另一方面,与通信网络不同,我们必须考虑的威胁模型假设存在对手(由诚实但好奇的社交网络提供者表示),能够监视交换消息的整个流。在本文中,我们提出了一种基于协作方法的社交网络短通信匿名通信协议。所提出的解决方案不仅对社交网络提供商隐藏了消息的内容,而且还隐藏了通信本身,这本身可能导致相当大的隐私泄露(想想在两个用户之间执行接近测试的情况)。这使得在社交网络内实现上述应用程序成为可能。为了给出这一说法的具体证明,我们开发了一个保护隐私的基于邻近性的解决方案,该解决方案完全在社交网络中提供对称和非对称邻近性测试。
{"title":"A protocol for anonymous short communications in social networks and its application to proximity-based services","authors":"Francesco Buccafurri,&nbsp;Vincenzo De Angelis,&nbsp;Maria Francesca Idone,&nbsp;Cecilia Labrini","doi":"10.1016/j.osnem.2022.100221","DOIUrl":"10.1016/j.osnem.2022.100221","url":null,"abstract":"<div><p><span>Several innovative applications could be advantageously placed within social networks, to be effective, attractive, and pervasive. Examples of application domains that could benefit from social networks are e-democracy, e-participation, online surveys, crowdsourcing, and proximity-based services. In all the above cases, users’ anonymity could represent a considerable added value or could be even necessary to develop the service. We observe that all the above domains are characterized by the fact that only a few asynchronous messages should be exchanged. Therefore, we do not need the full communication power of anonymous communication networks, in which low-latency and connection-oriented communication should be supported. On the other hand, unlike communication networks, the threat model we have to consider assumes the presence of an adversary (represented by an honest-but-curious social network provider) able to monitor the entire flow of the exchanged messages. In this paper, we propose an anonymous communication protocol for short communications in social networks, based on a collaborative approach. The proposed solution hides from the social network provider not only the content of the messages but also the communication itself, which, per se, can result in considerable </span>privacy leakage (think of the case of proximity testing performed between two users). This enables the implementation, within the social network, of the above-mentioned applications. To give a concrete proof of this statement, we develop a privacy-preserving proximity-based solution which provides both symmetric and asymmetric proximity testing entirely within social networks.</p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"31 ","pages":"Article 100221"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Early depression detection in social media based on deep learning and underlying emotions 基于深度学习和潜在情绪的社交媒体早期抑郁检测
Q1 Social Sciences Pub Date : 2022-09-01 DOI: 10.1016/j.osnem.2022.100225
José Solenir L. Figuerêdo, Ana Lúcia L.M. Maia, Rodrigo Tripodi Calumby

Depression is a challenge to public health, frequently related to disability and one of the reasons that lead to suicide. Many of the ones who suffer depression use social media to obtain information or even to talk about their problem. Some studies have proposed to detect potentially depressive users in these online environments. However, unsatisfactory effectiveness is still a barrier to practical application. Hence, we propose a method of early detection of depression in social media based on a convolutional neural network in combination with context-independent word embeddings and Early and Late Fusion approaches. These approaches are experimentally evaluated, considering the importance of the underlying emotions encoded in the emoticons. The results show that the proposed method was able to detect potentially depressive users, reaching a precision of 0.76 with equivalent or superior effectiveness in relation to many baselines (F1(0.71)). In addition, the semantic mapping of emoticons allowed to obtain significantly better results, including higher recall and precision with gains of 46.3% and 32.1%, respectively. Regarding the baseline word embedding approach, the higher recall and precision gains of our semantic mapping of emoticons were 14.5% and 40.8%. In terms of overall effectiveness, this work advanced the state-of-the-art, considering both individual embeddings and the fusion-based approaches. Moreover, it is demonstrated that emotions expressed by depressed people and encoded through emoticons are important suggestive evidence of the problem and a valuable asset for early detection.

抑郁症是对公共卫生的挑战,通常与残疾有关,也是导致自杀的原因之一。许多抑郁症患者使用社交媒体来获取信息,甚至谈论他们的问题。一些研究建议在这些网络环境中检测潜在的抑郁用户。然而,效果不理想仍然是实际应用的障碍。因此,我们提出了一种基于卷积神经网络的社交媒体抑郁症早期检测方法,该方法结合了与上下文无关的词嵌入和早期和晚期融合方法。考虑到在表情符号中编码的潜在情绪的重要性,这些方法经过实验评估。结果表明,所提出的方法能够检测潜在的抑郁用户,达到0.76的精度,与许多基线(F1(0.71))相比具有同等或更高的有效性。此外,表情符号的语义映射可以获得明显更好的结果,包括更高的召回率和准确率,分别提高了46.3%和32.1%。在基线词嵌入方法下,表情符号语义映射的查全率和查准率分别提高了14.5%和40.8%。就整体有效性而言,考虑到个体嵌入和基于融合的方法,这项工作推进了最先进的技术。此外,研究还表明,抑郁症患者通过表情符号表达和编码的情绪是问题的重要暗示证据,也是早期发现的宝贵资产。
{"title":"Early depression detection in social media based on deep learning and underlying emotions","authors":"José Solenir L. Figuerêdo,&nbsp;Ana Lúcia L.M. Maia,&nbsp;Rodrigo Tripodi Calumby","doi":"10.1016/j.osnem.2022.100225","DOIUrl":"10.1016/j.osnem.2022.100225","url":null,"abstract":"<div><p><span>Depression is a challenge to public health, frequently related to disability and one of the reasons that lead to suicide. Many of the ones who suffer depression use social media to obtain information or even to talk about their problem. Some studies have proposed to detect potentially depressive users in these online environments. However, unsatisfactory effectiveness is still a barrier to practical application. Hence, we propose a method of early detection of depression in social media based on a convolutional neural network<span> in combination with context-independent word embeddings and Early and Late Fusion approaches. These approaches are experimentally evaluated, considering the importance of the underlying emotions encoded in the emoticons. The results show that the proposed method was able to detect potentially depressive users, reaching a precision of 0.76 with equivalent or superior effectiveness in relation to many baselines (</span></span><span><math><mrow><msub><mrow><mi>F</mi></mrow><mrow><mn>1</mn></mrow></msub><mspace></mspace><mrow><mo>(</mo><mn>0</mn><mo>.</mo><mn>71</mn><mo>)</mo></mrow></mrow></math></span><span>). In addition, the semantic mapping of emoticons allowed to obtain significantly better results, including higher recall and precision with gains of 46.3% and 32.1%, respectively. Regarding the baseline word embedding approach, the higher recall and precision gains of our semantic mapping of emoticons were 14.5% and 40.8%. In terms of overall effectiveness, this work advanced the state-of-the-art, considering both individual embeddings and the fusion-based approaches. Moreover, it is demonstrated that emotions expressed by depressed people and encoded through emoticons are important suggestive evidence of the problem and a valuable asset for early detection.</span></p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"31 ","pages":"Article 100225"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128639391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
How to reward the Web: The social dApp Yup 如何奖励网络:社交dApp是的
Q1 Social Sciences Pub Date : 2022-09-01 DOI: 10.1016/j.osnem.2022.100229
Barbara Guidi , Andrea Michienzi

With the advent of blockchain technology, new Online Social Networks (OSNs) were proposed under the name of Blockchain Online Social Media (BOSM). Among the most well-known BOSMs, the introduction of blockchain is geared towards providing a decentralised social platform, together with an auditable and transparent rewarding system. While some current BOSMs have gathered a large set of dedicated users, they can hardly fight against the hegemony of the most well known centralised platforms, such as Twitter or Facebook. Yup tries to overcome this issue by proposing a rewarding system that can integrate with existing platforms. Its rewarding system keeps track of any piece of content uniquely identified by an URL, so its usage is not restricted to OSNs only. Given its unique approach, its rewarding system represents an important case study that, to the best of our knowledge, is not covered in the literature. In this paper, we close this gap by presenting the rewarding system provided by Yup and understanding its implications on the social activity of the users. Our analyses uncover that the voting activity favours the creation of echo chambers, and that the rewarding system is unfair. Additionally, we identify some limitations that can help design new rewarding systems.

随着区块链技术的出现,新的在线社交网络(OSN)以区块链在线社交媒体(BOSM)的名义被提出。在最知名的BOSM中,区块链的引入旨在提供一个去中心化的社交平台,以及一个可审计和透明的奖励系统。虽然目前的一些BOSM已经聚集了大量的专用用户,但它们很难对抗推特或脸书等最知名的集中平台的霸权。Yup试图通过提出一个可以与现有平台集成的奖励系统来克服这个问题。它的奖励系统会跟踪由URL唯一标识的任何内容,因此它的使用不仅限于OSN。鉴于其独特的方法,其奖励制度代表了一个重要的案例研究,据我们所知,文献中没有涵盖这一点。在本文中,我们通过介绍Yup提供的奖励系统并了解其对用户社交活动的影响来缩小这一差距。我们的分析表明,投票活动有利于建立回音室,而奖励制度是不公平的。此外,我们还发现了一些有助于设计新的奖励系统的局限性。
{"title":"How to reward the Web: The social dApp Yup","authors":"Barbara Guidi ,&nbsp;Andrea Michienzi","doi":"10.1016/j.osnem.2022.100229","DOIUrl":"https://doi.org/10.1016/j.osnem.2022.100229","url":null,"abstract":"<div><p>With the advent of blockchain technology<span>, new Online Social Networks (OSNs) were proposed under the name of Blockchain Online Social Media (BOSM). Among the most well-known BOSMs, the introduction of blockchain is geared towards providing a decentralised social platform, together with an auditable and transparent rewarding system. While some current BOSMs have gathered a large set of dedicated users, they can hardly fight against the hegemony of the most well known centralised platforms, such as Twitter or Facebook. Yup tries to overcome this issue by proposing a rewarding system that can integrate with existing platforms. Its rewarding system keeps track of any piece of content uniquely identified by an URL, so its usage is not restricted to OSNs only. Given its unique approach, its rewarding system represents an important case study that, to the best of our knowledge, is not covered in the literature. In this paper, we close this gap by presenting the rewarding system provided by Yup and understanding its implications on the social activity of the users. Our analyses uncover that the voting activity favours the creation of echo chambers, and that the rewarding system is unfair. Additionally, we identify some limitations that can help design new rewarding systems.</span></p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"31 ","pages":"Article 100229"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72280580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest 剖析德国推特森林中入侵的推特鸟群的鸣叫模式
Q1 Social Sciences Pub Date : 2022-09-01 DOI: 10.1016/j.osnem.2022.100228
Jan Ludwig Reubold , Stephan Escher , Johannes Pflugmacher , Thorsten Strufe

Twitter as a platform is used for news dissemination, with high volumes of campaigning and populism. This situation coincides with the growth of audiences who embrace social media as their primary news source. In general, effects like the deterioration of political education, misinformation, or ideological segregation then arguably represent a tremendous risk for democratic societies.

We analyze a comprehensive data set of the German-speaking Twitter community – a concise, well-defined Twitter population – to understand the extent and form of consumption of controversial news.

Our results affirm a high interest of German Twitter users in daily news and corresponding discussions. In-depth studies on the behavior, including tweeting- and grouping patterns, revealed the emergence of a new, more self-assured form of echo chambers.

Twitter作为新闻传播的平台,有大量的竞选和民粹主义。这种情况与将社交媒体作为主要新闻来源的受众的增长不谋而合。总的来说,政治教育的恶化、错误信息或意识形态隔离等影响可以说对民主社会构成了巨大的风险。我们分析了德语推特社区的综合数据集——一个简洁、定义明确的推特人群——以了解有争议新闻的消费程度和形式。我们的研究结果证实了德国Twitter用户对每日新闻和相应讨论的高度兴趣。对这种行为的深入研究,包括发推特和分组模式,揭示了一种新的、更自信的回声室形式的出现。
{"title":"Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest","authors":"Jan Ludwig Reubold ,&nbsp;Stephan Escher ,&nbsp;Johannes Pflugmacher ,&nbsp;Thorsten Strufe","doi":"10.1016/j.osnem.2022.100228","DOIUrl":"10.1016/j.osnem.2022.100228","url":null,"abstract":"<div><p>Twitter as a platform is used for news dissemination, with high volumes of campaigning and populism. This situation coincides with the growth of audiences who embrace social media as their primary news source. In general, effects like the deterioration of political education, misinformation, or ideological segregation then arguably represent a tremendous risk for democratic societies.</p><p>We analyze a comprehensive data set of the German-speaking Twitter community – a concise, well-defined Twitter population – to understand the extent and form of consumption of controversial news.</p><p>Our results affirm a high interest of German Twitter users in daily news and corresponding discussions. In-depth studies on the behavior, including tweeting- and grouping patterns, revealed the emergence of a new, more self-assured form of echo chambers.</p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"31 ","pages":"Article 100228"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123467278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel attributed community detection by integration of feature weighting and node centrality 基于特征加权和节点中心性的属性社区检测方法
Q1 Social Sciences Pub Date : 2022-07-01 DOI: 10.1016/j.osnem.2022.100219
Mehrdad Rostami, Mourad Oussalah

Community detection is one of the primary problems in social network analysis and this problem has more challenges in attributed social networks. The purpose of community detection in attributed social networks is to discover communities with not only homogeneous node properties but also adherent structures. Although community detection has been extensively studied, attributed community detection of large social networks with a large number of attributes remains a vital challenge. To address this challenge, in this paper a novel attributed community detection method is developed by integration of feature weighting with node centrality techniques. The developed method includes two main phases: (1) Weight Matrix Calculation, (2) Label Propagation Algorithm-based Attributed Community Detection. The aim of the first phase is to calculate the weight between two linked nodes using structural and attribute similarities, while, in the second phase, an improved label propagation algorithm-based community detection method in the attributed social network is proposed. The purpose of the second phase is to detect different communities by employing the calculated weight matrix and node popularity. After implementing the proposed method, its performance is compared with several other state of the art methods using some benchmarked real-world datasets. The results indicate that the developed method outperforms several other state-of-the-art methods and ascertain the effectiveness of the developed method for attributed community detection.

社区检测是社会网络分析中的主要问题之一,在属性社会网络中,社区检测问题更具挑战性。在属性社会网络中,社区检测的目的是发现既具有同质节点属性又具有粘附结构的社区。虽然社区检测已经得到了广泛的研究,但对具有大量属性的大型社会网络的属性社区检测仍然是一个重要的挑战。为了解决这一问题,本文将特征加权与节点中心性技术相结合,提出了一种新的属性社区检测方法。该方法包括两个主要阶段:(1)权重矩阵计算;(2)基于标签传播算法的属性社区检测。第一阶段的目标是利用结构和属性相似性计算两个链接节点之间的权重,而在第二阶段,提出了一种改进的基于标签传播算法的属性社交网络社区检测方法。第二阶段的目的是利用计算的权重矩阵和节点流行度来检测不同的社区。在实现所提出的方法后,使用一些基准的真实世界数据集将其性能与其他几种最先进的方法进行比较。结果表明,所开发的方法优于其他几种最先进的方法,并确定了所开发的方法用于属性社区检测的有效性。
{"title":"A novel attributed community detection by integration of feature weighting and node centrality","authors":"Mehrdad Rostami,&nbsp;Mourad Oussalah","doi":"10.1016/j.osnem.2022.100219","DOIUrl":"https://doi.org/10.1016/j.osnem.2022.100219","url":null,"abstract":"<div><p>Community detection is one of the primary problems in social network analysis and this problem has more challenges in attributed social networks. The purpose of community detection in attributed social networks is to discover communities with not only homogeneous node properties but also adherent structures. Although community detection has been extensively studied, attributed community detection of large social networks with a large number of attributes remains a vital challenge. To address this challenge, in this paper a novel attributed community detection method is developed by integration of feature weighting with node centrality techniques. The developed method includes two main phases: (1) Weight Matrix Calculation, (2) Label Propagation Algorithm-based Attributed Community Detection. The aim of the first phase is to calculate the weight between two linked nodes using structural and attribute similarities, while, in the second phase, an improved label propagation algorithm-based community detection method in the attributed social network is proposed. The purpose of the second phase is to detect different communities by employing the calculated weight matrix and node popularity. After implementing the proposed method, its performance is compared with several other state of the art methods using some benchmarked real-world datasets. The results indicate that the developed method outperforms several other state-of-the-art methods and ascertain the effectiveness of the developed method for attributed community detection.</p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"30 ","pages":"Article 100219"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2468696422000234/pdfft?md5=7057476a7093b441e70457f1f1d16af8&pid=1-s2.0-S2468696422000234-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91601739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hidden behind the obvious: Misleading keywords and implicitly abusive language on social media 显而易见的背后隐藏着:社交媒体上误导性的关键词和含蓄的辱骂性语言
Q1 Social Sciences Pub Date : 2022-07-01 DOI: 10.1016/j.osnem.2022.100210
Wenjie Yin, Arkaitz Zubiaga

While social media offers freedom of self-expression, abusive language carry significant negative social impact. Driven by the importance of the issue, research in the automated detection of abusive language has witnessed growth and improvement. However, these detection models display a reliance on strongly indicative keywords, such as slurs and profanity. This means that they can falsely (1a) miss abuse without such keywords or (1b) flag non-abuse with such keywords, and that (2) they perform poorly on unseen data. Despite the recognition of these problems, gaps and inconsistencies remain in the literature. In this study, we analyse the impact of keywords from dataset construction to model behaviour in detail, with a focus on how models make mistakes on (1a) and (1b), and how (1a) and (1b) interact with (2). Through the analysis, we provide suggestions for future research to address all three problems.

虽然社交媒体提供了自我表达的自由,但辱骂性语言会带来严重的负面社会影响。在这个问题的重要性的推动下,对辱骂性语言的自动检测的研究得到了发展和改进。然而,这些检测模型显示了对强烈指示性关键字的依赖,如诽谤和亵渎。这意味着它们可能会错误地(1a)忽略没有这些关键字的滥用,或(1b)标记有这些关键字的非滥用,以及(2)它们在看不见的数据上表现不佳。尽管认识到了这些问题,但文献中仍然存在差距和不一致之处。在本研究中,我们详细分析了从数据集构建到模型行为的关键字的影响,重点关注模型如何在(1a)和(1b)上犯错误,以及(1a)和(1b)如何与(2)相互作用。通过分析,我们为未来的研究提供了解决这三个问题的建议。
{"title":"Hidden behind the obvious: Misleading keywords and implicitly abusive language on social media","authors":"Wenjie Yin,&nbsp;Arkaitz Zubiaga","doi":"10.1016/j.osnem.2022.100210","DOIUrl":"https://doi.org/10.1016/j.osnem.2022.100210","url":null,"abstract":"<div><p>While social media offers freedom of self-expression, abusive language carry significant negative social impact. Driven by the importance of the issue, research in the automated detection of abusive language has witnessed growth and improvement. However, these detection models display a reliance on strongly indicative keywords, such as slurs and profanity. This means that they can falsely (1a) miss abuse without such keywords or (1b) flag non-abuse with such keywords, and that (2) they perform poorly on unseen data. Despite the recognition of these problems, gaps and inconsistencies remain in the literature. In this study, we analyse the impact of keywords from dataset construction to model behaviour in detail, with a focus on how models make mistakes on (1a) and (1b), and how (1a) and (1b) interact with (2). Through the analysis, we provide suggestions for future research to address all three problems.</p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"30 ","pages":"Article 100210"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2468696422000143/pdfft?md5=ee7d87179b98cdab8269c5284ee10fcf&pid=1-s2.0-S2468696422000143-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137054072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A social network of crime: A review of the use of social networks for crime and the detection of crime 犯罪的社会网络:社会网络在犯罪和犯罪侦查中的应用综述
Q1 Social Sciences Pub Date : 2022-07-01 DOI: 10.1016/j.osnem.2022.100211
Brett Drury , Samuel Morais Drury , Md Arafatur Rahman , Ihsan Ullah

Social media is used to commit and detect crimes. With automated methods, it is possible to scale both crime and detection of crime to a large number of people. The ability of criminals to reach large numbers of people has made this area subject to frequent study, and consequently, there have been several surveys that have reviewed specific crimes committed on social platforms. Until now, there has not been a review article that considers all types of crimes on social media, their similarity as well as their detection. The demonstration of similarity between crimes and their detection methods allows for the transfer of techniques and data between domains. This survey, therefore, seeks to document the crimes that have been committed on social media, and demonstrate their similarity through a taxonomy of crimes. Also, this survey documents publicly available datasets. Finally, this survey provides suggestions for further research in this field.

社交媒体被用来实施和侦查犯罪。有了自动化的方法,可以将犯罪和犯罪侦查规模扩大到大量的人。犯罪分子接触大量人群的能力使这一领域成为频繁研究的对象,因此,有几项调查审查了在社交平台上犯下的具体罪行。到目前为止,还没有一篇评论文章考虑到社交媒体上所有类型的犯罪,它们的相似性以及它们的检测。证明犯罪及其侦查方法之间的相似性,可以在不同领域之间转让技术和数据。因此,这项调查旨在记录在社交媒体上犯下的罪行,并通过对犯罪的分类来证明它们的相似性。此外,本调查记录了公开可用的数据集。最后,本文对该领域的进一步研究提出了建议。
{"title":"A social network of crime: A review of the use of social networks for crime and the detection of crime","authors":"Brett Drury ,&nbsp;Samuel Morais Drury ,&nbsp;Md Arafatur Rahman ,&nbsp;Ihsan Ullah","doi":"10.1016/j.osnem.2022.100211","DOIUrl":"10.1016/j.osnem.2022.100211","url":null,"abstract":"<div><p>Social media is used to commit and detect crimes. With automated methods, it is possible to scale both crime and detection of crime to a large number of people. The ability of criminals to reach large numbers of people has made this area subject to frequent study, and consequently, there have been several surveys that have reviewed specific crimes committed on social platforms. Until now, there has not been a review article that considers all types of crimes on social media, their similarity as well as their detection. The demonstration of similarity between crimes and their detection methods allows for the transfer of techniques and data between domains. This survey, therefore, seeks to document the crimes that have been committed on social media, and demonstrate their similarity through a taxonomy of crimes. Also, this survey documents publicly available datasets. Finally, this survey provides suggestions for further research in this field.</p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"30 ","pages":"Article 100211"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2468696422000155/pdfft?md5=20a07ef98209445e0d56492856150415&pid=1-s2.0-S2468696422000155-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey on Political Viewpoints Identification 政治观点识别调查
Q1 Social Sciences Pub Date : 2022-07-01 DOI: 10.1016/j.osnem.2022.100208
Tu My Doan, Jon Atle Gulla

Political viewpoints identification (PVI) is a task in Natural Language Processing that takes political texts and recognizes the writer’s opinions towards a political matter. PVI reduces the ambiguity in texts by identifying the underlying meaning and clarifying the bias margin along the political spectrum (bias leaning). Thus, even non-experts can better understand political texts. For instance, they can identify misinformation, bias, and hidden political agendas. In this paper, we formally define the concept of political viewpoints identification, explain its importance and discuss to what extent current techniques can be used for extracting political views from text. Existing techniques address the problem of PVI inadequately. We outline their deficiencies and present a research agenda to advance PVI.

政治观点识别(PVI)是自然语言处理中的一项任务,它提取政治文本并识别作者对政治问题的观点。PVI通过识别潜在意义和澄清政治光谱上的偏见边际(偏见倾向)来减少文本中的歧义。因此,即使是非专家也能更好地理解政治文本。例如,它们可以识别错误信息、偏见和隐藏的政治议程。在本文中,我们正式定义了政治观点识别的概念,解释了它的重要性,并讨论了当前技术在多大程度上可以用于从文本中提取政治观点。现有的技术不足以解决PVI的问题。我们概述了它们的不足之处,并提出了推进PVI的研究议程。
{"title":"A Survey on Political Viewpoints Identification","authors":"Tu My Doan,&nbsp;Jon Atle Gulla","doi":"10.1016/j.osnem.2022.100208","DOIUrl":"10.1016/j.osnem.2022.100208","url":null,"abstract":"<div><p>Political viewpoints identification (PVI) is a task in Natural Language Processing that takes political texts and recognizes the writer’s opinions towards a political matter. PVI reduces the ambiguity in texts by identifying the underlying meaning and clarifying the bias margin along the political spectrum (bias leaning). Thus, even non-experts can better understand political texts. For instance, they can identify misinformation, bias, and hidden political agendas. In this paper, we formally define the concept of political viewpoints identification, explain its importance and discuss to what extent current techniques can be used for extracting political views from text. Existing techniques address the problem of PVI inadequately. We outline their deficiencies and present a research agenda to advance PVI.</p></div>","PeriodicalId":52228,"journal":{"name":"Online Social Networks and Media","volume":"30 ","pages":"Article 100208"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S246869642200012X/pdfft?md5=bd321c6c5936cd74474205188aafd644&pid=1-s2.0-S246869642200012X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114589922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Online Social Networks and Media
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1