Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media

A. Tundis, Gaurav Bhatia, Archita Jain, M. Mühlhäuser
{"title":"Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media","authors":"A. Tundis, Gaurav Bhatia, Archita Jain, M. Mühlhäuser","doi":"10.1109/NCA.2018.8548321","DOIUrl":null,"url":null,"abstract":"The exploitation of Internet technology represents for terrorists and criminals a convenient means for establishing and advertising illegal activities. Especially, social networks facilitate new collaborations as well as the spreading of information with a lower risk of being exposed and fetched. Indeed, due to the increasing number of social media and the huge amount of data continuously generated from them, the discovering process of cyber-criminals is a hard task to be performed by the Law Enforcement Agencies and Police Forces if only based on traditional approaches. It becomes even harder if the heterogeneous nature of data, due to multi-cultural aspects, such as the variety of languages, is considered during the searching process. As a consequence, the adoption of a computer-based approach represents a viable solution. In particular, this paper aims at supporting the automatic identification process of potential online suspicious users, who act on social media. A methodological process, centered on the combination of well-known text analysis techniques by considering multi-language aspects, is proposed. In addition, an evaluation approach, based on the exploitation of different qualitative evaluation criteria, is employed to assess the level of suspiciousness of the identified users. Finally, a software tool that supports the execution of the proposed process is developed and its experimentation is shown through a case study on Twitter.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2018.8548321","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

The exploitation of Internet technology represents for terrorists and criminals a convenient means for establishing and advertising illegal activities. Especially, social networks facilitate new collaborations as well as the spreading of information with a lower risk of being exposed and fetched. Indeed, due to the increasing number of social media and the huge amount of data continuously generated from them, the discovering process of cyber-criminals is a hard task to be performed by the Law Enforcement Agencies and Police Forces if only based on traditional approaches. It becomes even harder if the heterogeneous nature of data, due to multi-cultural aspects, such as the variety of languages, is considered during the searching process. As a consequence, the adoption of a computer-based approach represents a viable solution. In particular, this paper aims at supporting the automatic identification process of potential online suspicious users, who act on social media. A methodological process, centered on the combination of well-known text analysis techniques by considering multi-language aspects, is proposed. In addition, an evaluation approach, based on the exploitation of different qualitative evaluation criteria, is employed to assess the level of suspiciousness of the identified users. Finally, a software tool that supports the execution of the proposed process is developed and its experimentation is shown through a case study on Twitter.
支持对Twitter社交媒体上可疑用户的识别和评估
利用互联网技术为恐怖分子和犯罪分子提供了建立和宣传非法活动的便利手段。特别是,社交网络促进了新的合作以及信息的传播,暴露和获取的风险较低。事实上,由于社交媒体的数量不断增加,并且不断产生大量的数据,如果仅仅基于传统的方法,执法机构和警察部队很难完成网络犯罪分子的发现过程。如果在搜索过程中考虑到由于多种文化因素(如语言的多样性)而导致的数据的异构性,则会变得更加困难。因此,采用以计算机为基础的办法是一种可行的解决办法。特别是,本文旨在支持在社交媒体上行为的潜在在线可疑用户的自动识别过程。在此基础上,提出了一种基于多语言分析方法的文本分析方法。此外,采用基于不同定性评价标准的评价方法,对被识别用户的怀疑程度进行评价。最后,开发了一个支持执行所提议流程的软件工具,并通过Twitter上的案例研究展示了其实验。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信