Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying

被引:79
作者
Galan-Garcia, Patxi [1 ]
de la Puerta, Jose Gaviria [1 ]
Gomez, Carlos Laorden [1 ]
Santos, Igor [1 ]
Bringas, Pablo Garcia [1 ]
机构
[1] Univ Deusto, DeustoTech Comp, Bilbao, Spain
关键词
Online social networks; trolling; information retrieval; cyberbullying; IDENTIFICATION;
D O I
10.1093/jigpal/jzv048
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The use of new technologies along with the popularity of social networks has given the power of anonymity to the users. The ability to create an alter-ego with no relation to the actual user, creates a situation in which no one can certify the match between a profile and a real person. This problem generates situations, repeated daily, in which users with fake accounts, or at least not related to their real identity, publish news, reviews or multimedia material trying to discredit or attack other people who may or may not be aware of the attack. These acts can have great impact on the affected victims' environment generating situations in which virtual attacks escalate into fatal consequences in real life. In this article, we present a methodology to detect and associate fake profiles on Twitter social network which are employed for defamatory activities to a real profile within the same network by analysing the content of the comments generated by both profiles. Accompanying this approach we also present a successful real life use case in which this methodology was applied to detect and stop a cyberbullying situation in a real elementary school.
引用
收藏
页码:42 / 53
页数:12
相关论文
共 35 条
[21]  
Luhn H.P., 1958, AUTOENCODING DOCUMEN
[23]  
Palfrey J., 2008, Enhancing child safety and on-line technologies
[24]  
Platt JC, 1999, ADVANCES IN KERNEL METHODS, P185
[25]  
QUINLAN JR, 1993, C4 5 PROGRAMS MACHIN
[26]  
Salton G., 1983, INTRO MODERN INFORM
[27]  
Salzberg SL, 1994, Mach. Learn, V16, P235, DOI DOI 10.1007/BF00993309
[28]  
Sanz Borja., 2010, Proceedings of the 11th Reunion Espanola de Criptografia y Seguridad de la Informacion (RECSI), 7-10th September, Tarragona (Spain), P343
[29]  
Simanjuntak D. A., 2010, 2010 Proceedings of Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT 2010), P198, DOI 10.1109/ACT.2010.40
[30]   Comparative analysis of regression and machine learning methods for predicting fault proneness models [J].
Singh, Yogesh ;
Kaur, Arvinder ;
Malhotra, Ruchika .
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2009, 35 (2-4) :183-193