Nothing Special   »   [go: up one dir, main page]

skip to main content
review-article
Open access

The rise of social bots

Published: 24 June 2016 Publication History

Abstract

Today's social bots are sophisticated and sometimes menacing. Indeed, their presence can endanger online ecosystems as well as our society.

References

[1]
Abokhodair, N., Yoo, D. and McDonald, D.W. Dissecting a social botnet: Growth, content, and influence in Twitter. In Proceedings of the 18th ACM Conference on Computer-Supported Cooperative Work and Social Computing (2015). ACM.
[2]
Aiello, L.M., Deplano, M., Schifanella, R. and Ruffo, G. People are strange when you're a stranger: Impact and influence of bots on social networks. In Proceedings of the 6th AAAI International Conference on Weblogs and Social Media (2012). AAAI, 10--17.
[3]
Alvisi, L., Clement, A., Epasto, A., Lattanzi, S. and Panconesi, A. Sok: The evolution of sybil defense via social networks. In Proceedings of the 2013 IEEE Symposium on Security and Privacy. IEEE, 382--396.
[4]
Beutel, A., Xu, W., Guruswami, V., Palow, C. and Faloutsos, C. Copy-Catch: stopping group attacks by spotting lockstep behavior in social networks. In Proceedings of the 22nd International Conference on World Wide Web (2013), 119--130.
[5]
Bollen, J., Mao, H. and Zeng, X. Twitter mood predicts the stock market. J. Computational Science 2, 1 (2011), 1--8.
[6]
Boshmaf, Y., Muslukhov, I., Beznosov, K. and Ripeanu, M. Key challenges in defending against malicious socialbots. In Proceedings of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats, Vol. 12 (2012).
[7]
Boshmaf, Y., Muslukhov, I., Beznosov, K. and Ripeanu, M. 2013. Design and analysis of a social botnet. Computer Networks 57, 2 (2013), 556--578.
[8]
Briscoe, E.J., Appling, D.S. and Hayes, H. Cues to deception in social media communications. In Proceedings of the 47th Hawaii International Conference on System Sciences (2014). IEEE, 1435--1443.
[9]
Cao, Q., Sirivianos, M., Yang, X. and Pregueiro, T. Aiding the detection of fake accounts in large scale social online services. NSDI (2012). 197--210.
[10]
Cao, Q., Yang, X., Yu, J. and Palow, C. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 477--488.
[11]
Cassa, C.A., Chunara, R., Mandl, K. and Brownstein, J.S. Twitter as a sentinel in emergency situations: Lessons from the Boston marathon explosions. PLoS Currents: Disasters (July 2013); http://dx.doi.org/10.1371/currents.dis.ad70cd1c8bc585e9470046cde334ee4b
[12]
Conover, M., Ratkiewicz, J., Francisco, M., Gonçalves, B., Menczer, F. and Flammini, A. Political polarization on Twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (2011), 89--96.
[13]
Davis, C.A., Varol, O., Ferrara, E., Flammini, A. and Menczer, F. BotOrNot: A system to evaluate social bots. In Proceedings of the 25th International World Wide Web Conference Companion (2016); http://dx.doi.org/10.1145/2872518.2889302 Forthcoming. Preprint arXiv:1602.00975.
[14]
Edwards, C., Edwards, A., Spence, P.R. and Shelton, A.K. Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on Twitter. Computers in Human Behavior 33 (2014), 372--376.
[15]
Elovici, Y., Fire, M., Herzberg, A. and Shulman, H. Ethical considerations when employing fake identities in online social networks for research. Science and Engineering Ethics (2013), 1--17.
[16]
Elyashar, A., Fire, M., Kagan, D. and Elovici, Y. Homing socialbots: Intrusion on a specific organization's employee using Socialbots. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 1358--1365.
[17]
Freitas, C.A. et al. Reverse engineering socialbot infiltration strategies in Twitter. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM 2015.
[18]
Ghosh, R., Surachawala, T. and Lerman, K. Entropy-based classification of "retweeting" activity on Twitter. In Proceedings of the KDD Workshop on Social Network Analysis (2011).
[19]
Golder, S.A. and Macy, M.W. Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures. Science 333, 6051 (2011), 1878--1881.
[20]
Gupta, A., Lamba, H. and Kumaraguru, P. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. eCrime Researchers Summit. IEEE (2013), 1--12.
[21]
Heymann, P., Koutrika, G. and Garcia-Molina, H. Fighting spam on social web sites: A survey of approaches and future challenges. Internet Computing 11, 6 (2007). IEEE, 36--45.
[22]
Hwang, T., Pearce, I. and Nanis, M. Socialbots: Voices from the fronts. ACM Interactions 19, 2 (2012), 38--45.
[23]
Kramer, A.D. Guillory, J.E. and Hancock, J.T. Experimental evidence of massive-scale emotional contagion through social networks. In Proceedings of the National Academy of Sciences (2014), 201320040.
[24]
Lee, K., Eoff, B.D., and Caverlee, J. Seven months with the devils: A long-term study of content polluters on Twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (2011), 185--192.
[25]
Messias, J., Schmidt, L., Oliveira, R. and Benevenuto, F. You followed my bot! Transforming robots into influential users in Twitter. First Monday 18, 7 (2013).
[26]
Metaxas, P.T. and Mustafaraj, E. Social media and the elections. Science 338, 6106 (2012), 472--473.
[27]
Paradise, A., Puzis, R. and Shabtai, A. Anti-reconnaissance tools: Detecting targeted socialbots. Internet Computing 18, 5 (2014), 11--19.
[28]
Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Flammini, A. and Menczer, F. Detecting and tracking political abuse in social media. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (2011). 297--304.
[29]
Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Patil, S., Flammini, A. and Menczer, F. Truthy: Mapping the spread of astroturf in microblog streams. In Proceedings of the 20th International Conference on the World Wide Web (2011), 249--252.
[30]
Stein, T., Chen, E. and Mangla, K. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems (2011). ACM, 8.
[31]
Stringhini, G., Kruegel, C. and Vigna, G. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (2010), ACM, 1--9.
[32]
Subrahmanian, VS, Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F. and others. The DARPA Twitter Bot Challenge. IEEE Computer (2016). In press. Preprint arXiv:1601.05140.
[33]
Turing, A.M. Computing machinery and intelligence. Mind 49, 236 (1950), 433--460.
[34]
Viswanath, B., Post, A., Gummadi, K.P. and Mislove, A. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 363--374.
[35]
Wagner, C., Mitter, S., Körner, S. and Strohmaier, M. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the 21st International Conference on World Wide Web (2012), 41--48.
[36]
Wald, R., Khoshgoftaar, T.M., Napolitano, A. and Sumner, C. Predicting susceptibility to social bots on Twitter. In Proceedings of the 14th IEEE International Conference on Information Reuse and Integration. IEEE, 6--13.
[37]
Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H. and Zhao, B.Y. You are how you click: Clickstream analysis for sybil detection. USENIX Security (2013), 241--256.
[38]
Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H. and Zhao, B.Y. Social turing tests: Crowdsourcing sybil detection. NDSS. The Internet Society, 2013.
[39]
Weizenbaum, J. ELIZA---A computer program for the study of natural language communication between man and machine. Commun. ACM 9, 1 (Sept. 1966), 36--45.
[40]
Wu, X., Feng, Z., Fan, W., Gao, J. and Yu, Y. Detecting marionette microblog users for improved information credibility. Machine Learning and Knowledge Discovery in Databases. Springer, 2013, 483--498.
[41]
Xie, Y., Yu, F., Ke, Q., Abadi, M., Gillum, E., Vitaldevaria, K., Walter, J., Huang, J. and Mao, Z.M. Innocent by association: Early recognition of legitimate users. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM, 353--364.
[42]
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y. and Dai, Y. 2014. Uncovering social network sybils in the wild. ACM Trans. Knowledge Discovery from Data 8, 1 (2014), 2.
[43]
Zangerle, E. and Specht, G. 'Sorry, I was hacked' A classification of compromised Twitter accounts. In Proceedings of the 29th Symposium On Applied Computing (2014).

Cited By

View all
  • (2024)Des cultures à l’interculturation. Penser le changement culturel médiatisé à l’ère de la mondialisation10.62688/edul/b9782384510559Online publication date: 2024
  • (2024)Más allá del número de seguidoresBeyond the number of followersVISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual10.62161/revvisual.v16.526016:3(239-250)Online publication date: 9-May-2024
  • (2024)Estudio de proyectos I+D en inteligencia artificial aplicada al periodismo en España (2013-2023)Study of R&D projects in artificial intelligence applied to journalism in Spain (2013-2023)VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual10.62161/revvisual.v16.519216:5(1-17)Online publication date: 29-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 59, Issue 7
July 2016
118 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2963119
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 June 2016
Published in CACM Volume 59, Issue 7

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Review-article
  • Popular
  • Refereed

Funding Sources

  • NSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6,986
  • Downloads (Last 6 weeks)919
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Des cultures à l’interculturation. Penser le changement culturel médiatisé à l’ère de la mondialisation10.62688/edul/b9782384510559Online publication date: 2024
  • (2024)Más allá del número de seguidoresBeyond the number of followersVISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual10.62161/revvisual.v16.526016:3(239-250)Online publication date: 9-May-2024
  • (2024)Estudio de proyectos I+D en inteligencia artificial aplicada al periodismo en España (2013-2023)Study of R&D projects in artificial intelligence applied to journalism in Spain (2013-2023)VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual10.62161/revvisual.v16.519216:5(1-17)Online publication date: 29-Jul-2024
  • (2024)Impact of AI on Communication Relationship and Social Dynamics: A qualitative ApproachBulletin of Business and Economics (BBE)10.61506/01.0028313:2(282-289)Online publication date: 1-Jun-2024
  • (2024)Una aproximación al mapa sobre la investigación en inteligencia artificial aplicada al periodismo en Europa (2013-2023)Revista Latina de Comunicación Social10.4185/rlcs-2024-2256(1-18)Online publication date: 19-Apr-2024
  • (2024)Harnessing AI for Political EngagementSustainable Development, Humanities, and Social Sciences for Society 5.010.4018/979-8-3693-7989-9.ch008(143-160)Online publication date: 18-Oct-2024
  • (2024)Creating a Bot-tleneck for malicious AI: Psychological methods for bot detectionBehavior Research Methods10.3758/s13428-024-02357-956:6(6258-6275)Online publication date: 1-Apr-2024
  • (2024)Fake News Detection Revisited: An Extensive Review of Theoretical Frameworks, Dataset Assessments, Model Constraints, and Forward-Looking Research AgendasTechnologies10.3390/technologies1211022212:11(222)Online publication date: 6-Nov-2024
  • (2024)Scalable Learning Framework for Detecting New Types of Twitter Spam with Misuse and Anomaly DetectionSensors10.3390/s2407226324:7(2263)Online publication date: 2-Apr-2024
  • (2024)Harnessing Machine Learning to Unveil Emotional Responses to Hateful Content on Social MediaComputers10.3390/computers1305011413:5(114)Online publication date: 29-Apr-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media