[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3038912.3052677acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

An Army of Me: Sockpuppets in Online Discussion Communities

Published: 03 April 2017 Publication History

Abstract

In online discussion communities, users can interact and share information and opinions on a wide variety of topics. However, some users may create multiple identities, or sockpuppets, and engage in undesired behavior by deceiving others or manipulating discussions. In this work, we study sockpuppetry across nine discussion communities, and show that sockpuppets differ from ordinary users in terms of their posting behavior, linguistic traits, as well as social network structure. Sockpuppets tend to start fewer discussions, write shorter posts, use more personal pronouns such as ``I'', and have more clustered ego-networks. Further, pairs of sockpuppets controlled by the same individual are more likely to interact on the same discussion at the same time than pairs of ordinary users. Our analysis suggests a taxonomy of deceptive behavior in discussion communities. Pairs of sockpuppets can vary in their deceptiveness, i.e., whether they pretend to be different users, or their supportiveness, i.e., if they support arguments of other sockpuppets controlled by the same user. We apply these findings to a series of prediction tasks, notably, to identify whether a pair of accounts belongs to the same underlying user or not. Altogether, this work presents a data-driven view of deception in online discussion communities and paves the way towards the automatic detection of sockpuppets.

References

[1]
Wikipedia sockpuppet investigation policy. https://goo.gl/89ieoY. Accessed: 2016-10-24.
[2]
S. Afroz, M. Brennan, and R. Greenstadt. Detecting hoaxes, frauds, and deception in writing style online. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 461--475. IEEE, 2012.
[3]
S. Argamon and S. Levitan. Measuring the usefulness of function words for authorship attribution. In Proceedings of the 2005 ACH/ALLC Conference, 2005.
[4]
J. Blackburn, R. Simha, N. Kourtellis, X. Zuo, M. Ripeanu, J. Skvoretz, and A. Iamnitchi. Branded with a scarlet c: cheaters in a gaming social network. In Proceedings of the 21st international conference on World Wide Web, pages 81--90. ACM, 2012.
[5]
M. Brennan, S. Afroz, and R. Greenstadt. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Transactions on Information and System Security (TISSEC), 15(3):12, 2012.
[6]
Z. Bu, Z. Xia, and J. Wang. A sock puppet detection algorithm on virtual spaces. Knowledge-Based Systems, 37:366--377, 2013.
[7]
E. E. Buckels, P. D. Trapnell, and D. L. Paulhus. Trolls just want to have fun. Personality and individual Differences, 67:97--102, 2014.
[8]
D. B. Buller and J. K. Burgoon. Interpersonal deception theory. Communication theory, 6(3):203--242, 1996.
[9]
A. Caspi and P. Gorsky. Online deception: Prevalence, motivation, and emotion. CyberPsychology & Behavior, 9(1):54--59, 2006.
[10]
K.-T. Chen and L.-W. Hong. User identification based on game-play activity patterns. In Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games, pages 7--12. ACM, 2007.
[11]
J. Cheng, C. Danescu-Niculescu-Mizil, and J. Leskovec. Antisocial behavior in online discussion communities. In Ninth International AAAI Conference on Web and Social Media, 2015.
[12]
J. P. Dickerson, V. Kagan, and V. Subrahmanian. Using sentiment to detect bots on twitter: Are humans more opinionated than bots? In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on, pages 620--627. IEEE, 2014.
[13]
J. S. Donath et al. Identity and deception in the virtual community. Communities in cyberspace, 1999.
[14]
K. Gani, H. Hacid, and R. Skraba. Towards multiple identity detection in social networks. In Proceedings of the 21st International Conference on World Wide Web, pages 503--504. ACM, 2012.
[15]
R. Gilbert, V. Thadani, C. Handy, H. Andrews, T. Sguigna, A. Sasso, and S. Payne. The psychological functions of avatars and alt (s): A qualitative study. Computers in Human Behavior, 32:1--8, 2014.
[16]
R. L. Gilbert, J. A. Foss, and N. A. Murphy. Multiple personality order: Physical and personality characteristics of the self, primary avatar and alt. In Reinventing ourselves: Contemporary concepts of identity in virtual worlds, pages 213--234. Springer, 2011.
[17]
J. T. Hancock. Digital deception. Oxford handbook of internet psychology, pages 289--301, 2007.
[18]
C. J. Hutto and E. Gilbert. Vader: A parsimonious rule-based model for sentiment analysis of social media text. In Eighth International AAAI Conference on Weblogs and Social Media, 2014.
[19]
P. Jain, P. Kumaraguru, and A. Joshi. @ i seek'fb. me': Identifying users across multiple online social networks. In Proceedings of the 22nd international conference on World Wide Web, pages 1259--1268. ACM, 2013.
[20]
F. Johansson, L. Kaati, and A. Shrestha. Detecting multiple aliases in social media. In Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, pages 1004--1011. ACM, 2013.
[21]
F. Johansson, L. Kaati, and A. Shrestha. Timeprints for identifying social media users with multiple aliases. Security Informatics, 4(1):7, 2015.
[22]
P. Juola. Detecting stylistic deception. In Proceedings of the Workshop on Computational Approaches to Deception Detection, pages 91--96. Association for Computational Linguistics, 2012.
[23]
Y. B. Kafai, D. A. Fields, and M. Cook. Your second selves: avatar designs and identity play in a teen virtual world. In Proceedings of DIGRA, volume 2007, 2007.
[24]
S. Kumar, F. Spezzano, and V. Subrahmanian. Vews: A wikipedia vandal early warning system. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 607--616. ACM, 2015.
[25]
S. Kumar, R. West, and J. Leskovec. Disinformation on the web: Impact, characteristics, and detection of wikipedia hoaxes. In Proceedings of the 25th International Conference on World Wide Web, pages 591--602. International World Wide Web Conferences Steering Committee, 2016.
[26]
D. Liu, Q. Wu, W. Han, and B. Zhou. Sockpuppet gang detection on social media sites. Frontiers of Computer Science, 10(1):124--135, 2016.
[27]
A. Mukherjee, V. Venkataraman, B. Liu, and N. Glance. What yelp fake review filter might be doing? In Seventh International AAAI Conference on Weblogs and Social Media, 2013.
[28]
A. Narayanan, H. Paskov, N. Z. Gong, J. Bethencourt, E. Stefanov, E. C. R. Shin, and D. Song. On the feasibility of internet-scale author identification. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 300--314. IEEE, 2012.
[29]
J. Novak, P. Raghavan, and A. Tomkins. Anti-aliasing on the web. In Proceedings of the 13th international conference on World Wide Web, pages 30--39. ACM, 2004.
[30]
P. P. Paul, M. Sultana, S. A. Matei, and M. Gavrilova. Editing behavior to recognize authors of crowdsourced content. In Systems, Man, and Cybernetics (SMC), 2015 IEEE International Conference on, pages 1676--1681. IEEE, 2015.
[31]
J. W. Pennebaker, M. E. Francis, and R. J. Booth. Linguistic inquiry and word count: Liwc 2001. Mahway: Lawrence Erlbaum Associates, 71(2001):2001, 2001.
[32]
M. Potthast, B. Stein, and R. Gerling. Automatic vandalism detection in wikipedia. In European Conference on Information Retrieval, pages 663--668. Springer, 2008.
[33]
T. Qian and B. Liu. Identifying multiple userids of the same author. In EMNLP, pages 1124--1135, 2013.
[34]
P. R. Rosenbaum and D. B. Rubin. The central role of the propensity score in observational studies for causal effects. Biometrika, pages 41--55, 1983.
[35]
C. Seife. Virtual Unreality: Just Because the Internet Told You, how Do You Know It's True? Penguin, 2014.
[36]
G. Silvestri, J. Yang, A. Bozzon, and A. Tagarelli. Linking accounts across social networks: the case of stackoverflow, github and twitter. In International Workshop on Knowledge Discovery on the WEB, pages 41--52, 2015.
[37]
T. Solorio, R. Hasan, and M. Mizan. A case study of sockpuppet detection in wikipedia. In Workshop on Language Analysis in Social Media (LASM) at NAACL HLT, pages 59--68, 2013.
[38]
B. Stone and M. Richtel. The hand that controls the sock puppet could get slapped. New York Times, 2007.
[39]
C. L. Toma and J. T. Hancock. What lies beneath: The linguistic traces of deception in online dating profiles. Journal of Communication, 62(1):78--97, 2012.
[40]
M. Tsikerdekis and S. Zeadally. Multiple account identity deception detection in social media using nonverbal behavior. IEEE Transactions on Information Forensics and Security, 9(8):1311--1321, 2014.
[41]
M. Tsikerdekis and S. Zeadally. Online deception in social media. Communications of the ACM, 57(9):72--80, 2014.
[42]
G. Venkatadri, O. Goga, C. Zhong, B. Viswanath, K. P. Gummadi, and N. Sastry. Strengthening weak identities through inter-domain trust transfer. In Proceedings of the 25th International Conference on World Wide Web, pages 1249--1259. International World Wide Web Conferences Steering Committee, 2016.
[43]
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review, 40(4):363--374, 2010.
[44]
Z. Yamak, J. Saunier, and L. Vercouter. Detection of multiple identity manipulation in collaborative projects. In Proceedings of the 25th International Conference Companion on World Wide Web, pages 955--960. International World Wide Web Conferences Steering Committee, 2016.
[45]
H. Yuan, D. O. Clifton, P. Stone, and H. H. Blumberg. Positive and negative words: Their association with leadership talent and effectiveness. The Psychologist-Manager Journal, 4(2):199, 2000.
[46]
R. Zafarani and H. Liu. Connecting users across social media sites: a behavioral-modeling approach. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 41--49. ACM, 2013.
[47]
X. Zheng, Y. M. Lai, K.-P. Chow, L. C. Hui, and S.-M. Yiu. Sockpuppet detection in online discussion forums. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on, pages 374--377. IEEE, 2011.
[48]
L. Zhou and Y.-w. Sung. Cues to deception in online chinese groups. In Hawaii international conference on system sciences, proceedings of the 41st annual, pages 146--146. IEEE, 2008.

Cited By

View all
  • (2024)Artificial Intelligence and the Transformation in Political Communication and CampaignsUnderstanding Generative AI in a Cultural Context10.4018/979-8-3693-7235-7.ch019(461-490)Online publication date: 27-Dec-2024
  • (2024)Understanding the Internet Water Army: Domain, Characteristics, Purposes, Messages and Affordances, and ConsequencesAsian Communication Research10.20879/acr.2024.21.01621:2(20-20)Online publication date: 2024
  • (2024)Negotiating Sociotechnical Boundaries: Moderation Work to Counter Racist Attacks in Online CommunitiesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642688(1-15)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WWW '17: Proceedings of the 26th International Conference on World Wide Web
April 2017
1678 pages
ISBN:9781450349130

Sponsors

  • IW3C2: International World Wide Web Conference Committee

In-Cooperation

Publisher

International World Wide Web Conferences Steering Committee

Republic and Canton of Geneva, Switzerland

Publication History

Published: 03 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. antisocial behavior
  2. malicious users
  3. multiple account use

Qualifiers

  • Research-article

Conference

WWW '17
Sponsor:
  • IW3C2

Acceptance Rates

WWW '17 Paper Acceptance Rate 164 of 966 submissions, 17%;
Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)62
  • Downloads (Last 6 weeks)9
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Artificial Intelligence and the Transformation in Political Communication and CampaignsUnderstanding Generative AI in a Cultural Context10.4018/979-8-3693-7235-7.ch019(461-490)Online publication date: 27-Dec-2024
  • (2024)Understanding the Internet Water Army: Domain, Characteristics, Purposes, Messages and Affordances, and ConsequencesAsian Communication Research10.20879/acr.2024.21.01621:2(20-20)Online publication date: 2024
  • (2024)Negotiating Sociotechnical Boundaries: Moderation Work to Counter Racist Attacks in Online CommunitiesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642688(1-15)Online publication date: 11-May-2024
  • (2024)SockDef: A Dynamically Adaptive Defense to a Novel Attack on Review Fraud Detection EnginesIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.332134511:4(5253-5265)Online publication date: Aug-2024
  • (2024)Review bombing: ideology-driven polarisation in online ratings: The case study of The Last of Us (part II)Quality & Quantity10.1007/s11135-024-01981-zOnline publication date: 25-Sep-2024
  • (2024)A network-based matching design for text mining of controversial online reviewsAnnals of Operations Research10.1007/s10479-024-06422-6Online publication date: 23-Dec-2024
  • (2023)Strategies and vulnerabilities of participants in venezuelan influence operationsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620611(6683-6700)Online publication date: 9-Aug-2023
  • (2023)Advances in AI for web integrity, equity, and well-beingFrontiers in Big Data10.3389/fdata.2023.11250836Online publication date: 5-May-2023
  • (2023)Social Media Data for Firearms Research: Promise and PerilsThe ANNALS of the American Academy of Political and Social Science10.1177/00027162231174320704:1(267-291)Online publication date: 20-Jun-2023
  • (2023)Social Media as a Vector for Escort Ads:A Study on OnlyFans advertisements on TwitterProceedings of the 15th ACM Web Science Conference 202310.1145/3578503.3583609(260-270)Online publication date: 30-Apr-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media