Skip to main content
Article
Detecting Anomalous Twitter Users by Extreme Group Behaviors
Proceedings of the ACM International Conference on Net Science (NetSci)
  • Hanbo DAI, Singapore Management University
  • Ee-peng LIM, Singapore Management University
  • Feida ZHU, Singapore Management University
  • Hwee Hwa PANG, Singapore Management University
Publication Type
Conference Proceeding Article
Version
submittedVersion
Publication Date
7-2012
Abstract

Twitter has enjoyed tremendous popularity in the recent years. To help categorizing and search tweets, Twitter users assign hashtags to their tweets. Given that hashtag assignment is the primary way to semantically categorizing and search tweets, it is highly susceptible to abuse by spammers and other anomalous users [1]. Popular hashtags such as #Obama and #ladygaga could be hijacked by having them added to unrelated tweets with the intent of misleading many other users or promoting specific agenda to the users. The users performing this act are known as the hashtag hijackers. As the hijackers usually abuse common sets of hashtags, they demonstrate common extreme group behaviors which can be used for detection.

City or Country
Chicago, Illinois
Copyright Owner and License
LARC
Creative Commons License
Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International
Citation Information
Hanbo DAI, Ee-peng LIM, Feida ZHU and Hwee Hwa PANG. "Detecting Anomalous Twitter Users by Extreme Group Behaviors" Proceedings of the ACM International Conference on Net Science (NetSci) (2012) p. 1 - 2
Available at: http://works.bepress.com/hweehwa-pang/20/