Filters








5 Hits in 2.1 sec

Guest editorial: special issue on trust, privacy, and security in crowdsourcing computing

An Liu, Guanfeng Liu, Mehmet A. Orgun, Qing Li
2020 World wide web (Bussum)  
The human-centric and cooperationoriented feature of crowdsourcing prompts us to reexamine the trust, privacy, and security issues in this new paradigm since the individuals in the crowd typically are  ...  In the following, we will highlight the contributions of each paper. surveys existing blockchain technology to security, privacy, and trust issues in crowdsourcing services from the direction of industry  ...  Paper "Co-Detection of Crowdturfing Microblogs and Spammers in Online Social Networks" by Bo Liu, Xiangguo Sun, Zeyang Ni, Jiuxin Cao, Junzhou Luo, Benyuan Liu, and Xinwen Fu investigates the problem of  ... 
doi:10.1007/s11280-019-00772-z fatcat:sm4giziwtzetvdl6jtymhravyy

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey [article]

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 arXiv   pre-print
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives.  ...  In this paper, we conducted an extensive survey, covering (i) the multidisciplinary concepts of social deception; (ii) types of OSD attacks and their unique characteristics compared to other social network  ...  Crowdturfing activities in social media exploit social networking platforms (e.g., instant message groups, microblogs, blogs, and online forums) as the main information channel of the campaign [162] .  ... 
arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe

An analysis of 14 Million tweets on hashtag-oriented spamming*

Surendra Sedhai, Aixin Sun
2017 Journal of the Association for Information Science and Technology  
First, we compare the usage of hashtags in spam and ham tweets based on frequency, position, orthography, and co-occurrence.  ...  However, the popularity of Twitter has attracted not only legitimate users but also spammers who exploit social graphs, popular keywords, and hashtags for malicious purposes.  ...  Network and content information of users have been effectively used to detect social spammers on micro-blogs [20] .  ... 
doi:10.1002/asi.23836 fatcat:ihcrmf4onjhwvpnimfg2vsglr4

Online Misinformation

Miriam Fernandez, Harith Alani
2018 Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18  
Misinformation and its generation, propagation, impact, and management is being studied through a variety of lenses (computer science, social science, journalism, psychology, etc.) since it widely affects  ...  In this paper we analyse the phenomenon of misinformation from a technological point of view.  ...  detection of malicious accounts we can highlight works that aim to identify spammers [69] , bots [21] , crowdturfing [68] [40] and malicious accounts in general [19] [41] .  ... 
doi:10.1145/3184558.3188730 dblp:conf/www/FernandezA18 fatcat:cw62kvcsovehdgdamywcbqpdny

Battling the internet water army

Cheng Chen, Kui Wu, Venkatesh Srinivasan, Xudong Zhang
2013 Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining - ASONAM '13  
These messages come from a special group of online users, called online paid posters, or termed "Internet water army" in China, represents a new type of online job opportunities.  ...  We design and validate a new detection mechanism, including both non-semantic analysis and semantic analysis, to identify potential online paid posters.  ...  ACKNOWLEDGEMENTS The two-year graduate study in the University of Victoria is a fascinating experience for me.  ... 
doi:10.1145/2492517.2492637 dblp:conf/asunam/ChenWSZ13 fatcat:ly4zk55i3vdnvjlaobdgeokw3m