Reputation-based credibility analysis of Twitter social network users
Majed Alrubaian
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorMuhammad Al-Qurishi
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorMabrook Al-Rakhami
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorCorresponding Author
Mohammad Mehedi Hassan
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Correspondence to: Mohammad Mehedi Hassan, Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia.
E-mail: [email protected]
Search for more papers by this authorAtif Alamri
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorMajed Alrubaian
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorMuhammad Al-Qurishi
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorMabrook Al-Rakhami
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorCorresponding Author
Mohammad Mehedi Hassan
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Correspondence to: Mohammad Mehedi Hassan, Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia.
E-mail: [email protected]
Search for more papers by this authorAtif Alamri
Chair of Pervasive and Mobile Computing (CPMC), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
Search for more papers by this authorSummary
This paper addresses the problem of finding credible sources among Twitter social network users to detect and prevent various malicious activities, such as spreading false information on a potentially inflammatory topic, forging accounts for false identities, etc. Existing research works related to source credibility are graph-based, considering the relationships among users to predict the spread information; human-based, using human perspectives to determine reliable sources; or machine learning-based, relying on training classifiers to predict users' credibility. Very few of these approaches consider a user's sentimentality when analyzing his/her credibility as a source. In this paper, we propose a novel approach that combines analysis of the user's reputation on a given topic within the social network, as well as a measure of the user's sentiment to identify topically relevant and credible sources of information. In particular, we propose a new reputation metric that introduces several new features into the existing models. We evaluated the performance of the proposed metric in comparison with two machine learning techniques, determining that the accuracy of the proposed approach satisfies the stated purpose of identifying credible Twitter users. Copyright © 2016 John Wiley & Sons, Ltd.
Reference
- 1Al-Rubaian M, Al-Qurishi M, Al-Rakhami M, Rahman SMM, Alamri A. A multistage credibility analysis model for microblogs. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, August 2015. IEEE: Paris, France, 2015.
- 2Al-Qurishi M, Aldrees R, Al-Rubaian M, Al-Rakhami M, Rahman SMM, Alamri A. A new model for classifying social media users according to their behaviors. 2nd World Symposium on Web Applications and Networking (WSWAN), 2015. IEEE: Tunisia, 2015; 1-5.
- 3Feller E, Ramakrishnan L, Morin C. Performance and energy efficiency of big data applications in cloud environments: a hadoop case study. Journal of Parallel and Distributed Computing 2015; 79: 80–89.
- 4Wani M, Alrubaian MA, Abulaish M. A user-centric feature identification and modeling approach to infer social ties in OSNs. Proceedings of International Conference on Information Integration and Web-based Applications & Services, 2013, ACM: Brussels, Belgium, 2013; 107.
- 5Jin L, Chen Y, Wang T, Hui P, Vasilakos AV. Understanding user behavior in online social networks: a survey. IEEE Communications Magazine 2013; 51: 144–150.
- 6Al-Qurishi M, Al-Rakhami M, Al-Rubaian M, Alamri A, Al-Hougbany M. Online social network management systems: state of the art. Procedia Computer Science 2015; 66: 17–24.
- 7Al-Qurishi M, Al-Rakhami M, Al-Rubaian M, Alarifi A, Rahman SMM, Alamri A. Selecting the best open source tools for collecting and visualizing social media content. 2nd World Symposium on Web Applications and Networking (WSWAN), 2015. IEEE: Tunisia, 2015;1-6.
- 8Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M. The socialbot network: when bots socialize for fame and money. Proceedings of the 27th Annual Computer Security Applications Conference, 2011. ACM: Orlando, USA, 2011; 93-102.
- 9Abokhodair N, Yoo D, McDonald DW. Dissecting a social botnet: growth, content and influence in Twitter. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015. ACM: Vancouver, Canada, 2015; 839-851.
- 10Dong C, Zhou B. Spam detection, e-mail/social network. In Encyclopedia of Social Network Analysis and Mining. Springer: New York, 2014; 1954–1960.
10.1007/978-1-4614-6170-8_294 Google Scholar
- 11Kang B, O'Donovan J, Höllerer T. Modeling topic specific credibility on Twitter. Proceedings of the 2012 ACM International Conference on Intelligent User Interfaces, 2012. ACM: Lisboa, Portugal, 2012; 179-188.
- 12Canini KR, Suh B, Pirolli PL. Finding credible information sources in social networks based on content and social structure. IEEE 3rd International Conference on Privacy, Security, Risk and Trust, 2011. IEEE: Boston, USA, 2011; 1-8.
- 13Gupta M, Zhao P, Han J. Evaluating event credibility on Twitter. Security Distributing and Marketing Magazine 2012. 153-164.
- 14Riquelme F. Measuring User Influence on Twitter: A Survey. Universidad de Santiago: Santiago, Chile, 2015. arXiv preprint arXiv:1508.07951.
- 15Castillo C, Mendoza M, Poblete B. Information credibility on Twitter. Proceedings of the 20th International Conference on World Wide Web, 2011. ACM: Hyderabad, India, 2011.
- 16Castillo C, Mendoza M, Poblete B. Predicting information credibility in time-sensitive social media. Internet Research: Electronic Networking Applications and Policy 2013; 23: 560–588.
- 17Yang J, Counts S, Morris MR, Hoff A. Microblog credibility perceptions: comparing the USA and China. Proceedings of the 2013 Conference on Computer Supported Cooperative Work, 2013. ACM: San Antonia, USA, 2013; 575-586.
- 18Morris MR, Counts S, Roseway A, Hoff A, Schwarz J. Tweeting is believing?: understanding microblog credibility perceptions. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, 2012. ACM: Seattle, USA, 2012; 441-450.
- 19Indrawan-Santiago M, Han H, Nakawatase H, Oyama K. Evaluating credibility of interest reflection on Twitter. International Journal of Web Information Systems 2014; 10: 343–362.
10.1108/IJWIS-04-2014-0019 Google Scholar
- 20Morozov E, Sen M. Analysing the Twitter social graph: whom can we trust? 2014.
- 21Gupta A, Lamba H, Kumaraguru P, Joshi A. Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy. Proceedings of the 22nd International Conference on World Wide Web, 2013. ACM: Rio de Janeiro, Brazil, 2013.
- 22Gupta A, Kumaraguru P. Credibility ranking of tweets during high impact events. Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, 2012. ACM: Lyon, France, 2012; 2.
- 23Cha M, Haddadi H, Benevenuto F, Gummadi PK. Measuring user influence in Twitter: the million follower fallacy. International Conference on the Web and Social Media 2010; 10: 30.
- 24Schmierbach M, Oeldorf-Hirsch A. A little bird told me, so I didn't believe it: Twitter, credibility, and issue perceptions. Communication Quarterly 2012; 60: 317–337.
10.1080/01463373.2012.688723 Google Scholar
- 25Ratkiewicz J, Conover M, Meiss M, Gonçalves B, Patil S, Flammini A, Menczer F. Truthy: mapping the spread of astroturf in microblog streams. Proceedings of the 20th International Conference Companion on World Wide Web, 2011. ACM: Hyderabad, India, 2011; 249-252.
- 26Gupta A, Kumaraguru P, Castillo C, Meier P. Tweetcred: real-time credibility assessment of content on Twitter. In Social Informatics. Springer: New York, 2014; 228–243.
10.1007/978-3-319-13734-6_16 Google Scholar
- 27Qazvinian V, Rosengren E, Radev DR, Mei Q. Rumor has it: identifying misinformation in microblogs. Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2011. ACM: Stroudsburg, USA, 2011; 1589-1599.
- 28Sun J, Tang J. A survey of models and algorithms for social influence analysis. In Social Network Data Analytics. Springer: New York, USA, 2011; 177–214.
10.1007/978-1-4419-8462-3_7 Google Scholar
- 29Bravo-Marquez F, Mendoza M, Poblete B. Combining strengths, emotions and polarities for boosting Twitter sentiment analysis. Proceedings of the 2nd International Workshop on Issues of Sentiment Discovery and Opinion Mining, 2013. ACM: Chicago, USA, 2013; 2.
- 30Mendoza M, Poblete B, Castillo C. Twitter under crisis: can we trust what we RT? Proceedings of the 1st Workshop on Social Media Analytics, 2010. ACM: Washington, DC, USA, 2010; 71-79.