{"title":"网络军队操纵舆论的操作剖析","authors":"Chang-Po Chiang, Hung-Yuan Chen, Tyan-muh Tsai, Shih-Hao Chang, Ying-Chin Chen, Shiuh-Jeng Wang","doi":"10.1145/3404709.3404766","DOIUrl":null,"url":null,"abstract":"Detecting cyber army in manipulating public opinions has been a new issue with the popularity of social media. This paper will take the first social media cyber army case in Taiwan to analyze embedding operation systems. By analyzing suspended accounts' activity by the PTT official relating this case, this group's accounts activity type and how cyber army operates will be presented. The illustrated results would be the foundation on profiling this new type cyber army to benefit future studies in more efficiency.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Profiling Operations of Cyber Army in Manipulating Public Opinions\",\"authors\":\"Chang-Po Chiang, Hung-Yuan Chen, Tyan-muh Tsai, Shih-Hao Chang, Ying-Chin Chen, Shiuh-Jeng Wang\",\"doi\":\"10.1145/3404709.3404766\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Detecting cyber army in manipulating public opinions has been a new issue with the popularity of social media. This paper will take the first social media cyber army case in Taiwan to analyze embedding operation systems. By analyzing suspended accounts' activity by the PTT official relating this case, this group's accounts activity type and how cyber army operates will be presented. The illustrated results would be the foundation on profiling this new type cyber army to benefit future studies in more efficiency.\",\"PeriodicalId\":149643,\"journal\":{\"name\":\"Proceedings of the 6th International Conference on Frontiers of Educational Technologies\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 6th International Conference on Frontiers of Educational Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3404709.3404766\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3404709.3404766","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Profiling Operations of Cyber Army in Manipulating Public Opinions
Detecting cyber army in manipulating public opinions has been a new issue with the popularity of social media. This paper will take the first social media cyber army case in Taiwan to analyze embedding operation systems. By analyzing suspended accounts' activity by the PTT official relating this case, this group's accounts activity type and how cyber army operates will be presented. The illustrated results would be the foundation on profiling this new type cyber army to benefit future studies in more efficiency.