A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
The human-centric and cooperationoriented feature of crowdsourcing prompts us to reexamine the trust, privacy, and security issues in this new paradigm since the individuals in the crowd typically are ... In the following, we will highlight the contributions of each paper. surveys existing blockchain technology to security, privacy, and trust issues in crowdsourcing services from the direction of industry ... Paper "Co-Detection of Crowdturfing Microblogs and Spammers in Online Social Networks" by Bo Liu, Xiangguo Sun, Zeyang Ni, Jiuxin Cao, Junzhou Luo, Benyuan Liu, and Xinwen Fu investigates the problem of ...doi:10.1007/s11280-019-00772-z fatcat:sm4giziwtzetvdl6jtymhravyy
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives. ... In this paper, we conducted an extensive survey, covering (i) the multidisciplinary concepts of social deception; (ii) types of OSD attacks and their unique characteristics compared to other social network ... Crowdturfing activities in social media exploit social networking platforms (e.g., instant message groups, microblogs, blogs, and online forums) as the main information channel of the campaign  . ...arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe
First, we compare the usage of hashtags in spam and ham tweets based on frequency, position, orthography, and co-occurrence. ... However, the popularity of Twitter has attracted not only legitimate users but also spammers who exploit social graphs, popular keywords, and hashtags for malicious purposes. ... Network and content information of users have been effectively used to detect social spammers on micro-blogs  . ...doi:10.1002/asi.23836 fatcat:ihcrmf4onjhwvpnimfg2vsglr4
Misinformation and its generation, propagation, impact, and management is being studied through a variety of lenses (computer science, social science, journalism, psychology, etc.) since it widely affects ... In this paper we analyse the phenomenon of misinformation from a technological point of view. ... detection of malicious accounts we can highlight works that aim to identify spammers  , bots  , crowdturfing   and malicious accounts in general   . ...doi:10.1145/3184558.3188730 dblp:conf/www/FernandezA18 fatcat:cw62kvcsovehdgdamywcbqpdny
These messages come from a special group of online users, called online paid posters, or termed "Internet water army" in China, represents a new type of online job opportunities. ... We design and validate a new detection mechanism, including both non-semantic analysis and semantic analysis, to identify potential online paid posters. ... ACKNOWLEDGEMENTS The two-year graduate study in the University of Victoria is a fascinating experience for me. ...doi:10.1145/2492517.2492637 dblp:conf/asunam/ChenWSZ13 fatcat:ly4zk55i3vdnvjlaobdgeokw3m