Abstract
Online social media allow users to interact with one another by sharing opinions, and these opinions have a critical impact on the way readers think and behave. Accordingly, an increasing number of <i>manipulators</i> deliberately spread messages to influence the public, often in an organized manner. In particular, political manipulation—manipulation of opponents to win political advantage—can result in serious consequences: antigovernment riots can break out, leading to candidates’ defeat in an election. A few approaches have been proposed to detect such manipulation based on the level of social interaction (i.e., manipulators actively post opinions but infrequently befriend and reply to other users). However, several studies have shown that the interactions can be forged at a low cost and thus may not be effective measures of manipulation.
To go one step further, we collect a dataset for real, large-scale political manipulation, which consists of opinions found on Internet forums. These opinions are divided into manipulators and nonmanipulators. Using this collection, we demonstrate that manipulators inevitably work hard, in teams, to quickly influence a large audience. With this in mind, it could be said that a high level of collaborative efforts strongly indicates manipulation. For example, a group of manipulators may jointly post numerous opinions with a consistent theme and selectively recommend the same, well-organized opinion to promote its rank. We show that the effort measures, when combined with a supervised learning algorithm, successfully identify greater than 95% of the manipulators. We believe that the proposed method will help system administrators to accurately detect manipulators in disguise, significantly decreasing the intensity of manipulation.
- Paul Adams. 2011. Grouped: How Small Groups of Friends Are the Key to Influence on the Social Web (Voices That Matter). New Riders, Berkeley, CA.Google Scholar
- Rakesh Agrawal and Ramakrishnan Srikant. 1994. Fast algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference on Very Large Databases. 487--499. Google Scholar
Digital Library
- Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in Warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the 22nd USENIX Conference on Security. 257--272. Available at https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/akhawe. Google Scholar
Digital Library
- Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, and Alessandro Panconesi. 2013. SoK: The evolution of sybil defense via social networks. In Proceedings of the IEEE Symposium on Security and Privacy. 382--396. DOI:http://dx.doi.org/10.1109/SP.2013.33 Google Scholar
Digital Library
- BBC News Technology. 2011. Russian Twitter Political Protests ‘Swamped by Spam.’ Retrieved February 18, 2014, from http://www.bbc.co.uk/news/technology-16108876.Google Scholar
- Kyle Becker. 2012. The Handbook of Political Manipulation. Retrieved July 1, 2014, from http://www.conservativedailynews.com/2012/05/the-handbook-of-political-manipulation-a-e-2/.Google Scholar
- Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. 2010. Detecting spammers on Twitter. In Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference. Available at http://ceas.cc/2010/papers/Paper%2021.pdf.Google Scholar
- Fabricio Benevenuto, Tiago Rodrigues, Virgilio Almeida, Jussara Almeida, and Marcos Goncalves. 2009. Detecting spammers and content promoters in online video social networks. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York, NY, 620--627. DOI:http://dx.doi.org/10.1145/1571941.1572047 Google Scholar
Digital Library
- Robert M. Bond, Christopher J. Fariss, Jason J. Jones, Adam D. I. Kramer, Cameron Marlow, Jaime E. Settle, and James H. Fowler. 2012. A 61-million-person experiment in social influence and political mobilization. Nature 489,7415, 295--298. DOI:http://dx.doi.org/10.1038/nature11421Google Scholar
- Leo Breiman. 2001. Random forests. Springer Machine Learning 45, 1, 5--32. DOI:http://dx.doi.org/10.1023/A:1010933404324 Google Scholar
Digital Library
- Rebecca Burns. 2012. Social Media Outranks TV as UK's Favourite Pastime. Retrieved July 1, 2014, from http://www.fourthsource.com/news/social-media-outranks-tv-as-uks-favourite-pastime-6218.Google Scholar
- Stephan Busemann, Sven Schmeier, and Roman G. Arens. 2000. Message classification in the call center. In Proceedings of the 6th Applied Natural Language Processing Conference. 158--165. DOI:http://dx.doi.org/10.3115/974147.974169 Google Scholar
Digital Library
- Damon Centola. 2010. The spread of behavior in an online social network experiment. Science 329, 5996, 1194--1197. DOI:http://dx.doi.org/10.1126/science.1185231Google Scholar
- Chih-Chung Chang and Chih-Jen Lin. 2013. LIBSVM—A Library for Support Vector Machines (LIBSVM). Retrieved January 27, 2014 from http://www.csie.ntu.edu.tw/∼cjlin/libsvm/.Google Scholar
- Sang-Hun Choe. 2013. Prosecutors Detail Attempt to Sway South Korean Election. Retrieved July 1, 2014, from http://www.nytimes.com/2013/11/22/world/asia/prosecutors-detail-bid-to-sway-south-korean-election.html?_r=0.Google Scholar
- Mark Clayton. 2013. In Cyber Arms Race, North Korea Emerging as a Power, Not a Pushover. Retrieved February 18, 2014, from http://www.csmonitor.com/World/Security-Watch/2013/1019/In-cyberarms-race-North-Korea-emerging-as-a-power-not-a-pushover.Google Scholar
- Daum. 2014. Clean Center Policies. Retrieved July 1, 2014, from http://cs.daum.net/faq/site/85.html.Google Scholar
- Georges Dupret and Masato Koda. 2001. Bootstrap re-sampling for unbalanced data in supervised learning. Elsevier European Journal of Operational Research 134, 1, 141--156. DOI:http://dx.doi.org/10.1016/S0377-2217(00)00244-7Google Scholar
Cross Ref
- Harry Fawcett. 2013. South Korea's Political Cyber War. Retrieved February 18, 2014, from http://blogs.aljazeera.com/blog/asia/south-koreas-political-cyber-war.Google Scholar
- Usama M. Fayyad and Keki B. Irani. 1993. Multi-interval discretization of continuous-valued attributes for classification learning. In Proceedings of the International Joint Conferences on Artificial Intelligence. 1022--1027. Available at http://ijcai.org/Past%20Proceedings/IJCAI-93-VOL2/PDF/022.pdf.Google Scholar
- Joseph L. Fleiss. 1971. Measuring nominal scale agreement among many raters. Psychological Bulletin 76, 5, 378--382.Google Scholar
Cross Ref
- Matthew Fraser and Soumitra Dutta. 2008. Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World. Wiley, Chichester, West Sussex, UK. Google Scholar
Digital Library
- Yoav Freund and Robert E. Schapire. 1999. A short introduction to boosting. Journal of Japanese Society for Artificial Intelligence 14, 5, 1--14.Google Scholar
- Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben. Y. Zhao. 2010. Detecting and characterizing social spam campaigns. In Proceedings of the 10th Internet Measurement Conference. ACM, New York, NY, 35--47.DOI:http://dx.doi.org/10.1145/1879141.1879147 Google Scholar
Digital Library
- R. Kelly Garrett and Brian E. Weeks. 2013. The promise and peril of real-time corrections to political misperceptions. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. ACM, New York, NY. 1047--1058. DOI:http://dx.doi.org/10.1145/2441776.2441895 Google Scholar
Digital Library
- Amy Gesenhues. 2013. Survey: 90% of Customers Say Buying Decisions Are Influenced by Online Reviews. Retrieved July 1, 2014, from http://marketingland.com/survey-customers-more-frustrated-by-how-long-it-takes-to-resolve-a-customer-service-issue-than-the-resolution-38756.Google Scholar
- Rumi Ghosh, Tawan Surachawala, and Kristina Lerman. 2011. Entropy-based classification of ‘Retweeting’ activity on Twitter. In Proceedings of the KDD Workshop on Social Network Analysis. ACM, New York. NY.Google Scholar
- Lee Howell. 2013. Digital wildfires in a hyperconnected world. In Global Risks 2013 (8th ed.). World Economic Forum. Available at http://reports.weforum.org/global-risks-2013/title-page/.Google Scholar
- iNews. 2009. A Close Match between Nate and Duam in Weekly Visits. Retrieved July 1, 2014, from http://news.inews24.com/php/news_view.php?g_menu=020300&g__serial=453619.Google Scholar
- Mahdi Jalili. 2012. Effects of leaders and social power on opinion formation in complex networks. Transactions of the Society for Modeling and Simulation International 89, 5, 578--588. DOI:http://dx.doi.org/10.1177/0037549712462621 Google Scholar
Digital Library
- Nitin Jindal and Bing Liu. 2008. Opinion spam and analysis. In Proceedings of the International Conference on Web Search and Data Mining. ACM, New York, NY, 219--230. Google Scholar
Digital Library
- Anna Joy. 2013. Infographic: How South Korean Intelligence Interfered in Election. Retrieved July 1, 2014, from http://www.koreabang.com/2013/features/infographic-how-south-korean-intelligence-manipulated-election.html.Google Scholar
- Arthur Jung. 2012. Evidence of Manipulating Recommendation Counts. Retrieved July 1, 2014, from http://arthurjung.tistory.com/120.Google Scholar
- Hyun-Kyung Kang. 2013. Police Suspected of Destroying Evidence Involving NIS Probe. Retrieved November 4, 2014, from www.koreatimes.co.kr/www/news/nation/2013/08/116_136430.html.Google Scholar
- Myungsook Klassen. 2013. Twitter data preprocessing for spam detection. In Proceedings of the 5th International Conference on Future Computational Technologies and Applications. 56--61.Google Scholar
- Ken Koo. 2013. Korean Spy Agency Accused of Influencing Presidential Election. Retrieved February 18, 2014, from http://www.koreabang.com/2013/stories/korean-spy-agency-accused-of-influencing-presidential-election.html.Google Scholar
- Sejeong Kwon, Meeyoung Cha, Kyomin Jung, Wei Chen, and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In Proceedings of IEEE 13th International Conference on Data Mining. IEEE, Los Alamitos, CA, 1103--1108. DOI:http://dx.doi.org/10.1109/ICDM.2013.61Google Scholar
Cross Ref
- J. Richard Landis and Gary G. Koch. 1977. The measurement of observer agreement for categorical data. Biometrics 33, 159--174.Google Scholar
- Gyeduk Lee. 2013. Manipulation of Recommendation Counts Spotted by Netizen. Retrieved November 4, 2014, from http://www.pressbyple.com/news/articleView.html?idxno=11841.Google Scholar
- Sihyung Lee. 2014. Popular List of Political-Campaign Words. Retrieved June 30, 2014, from https://sites.google.com/site/sihyungleeweb/research/political_manipulation/popular-list-of-political-campaign-words.Google Scholar
- Bing Liu. 2011. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. Springer, New York, NY. Google Scholar
Digital Library
- Media Today. 2013. Manipulation of Recommendation Counts by the Military and Government Agencies. Retrieved July 1, 2014, from http://www.mediatoday.co.kr/news/articleView.html?idxno=112725.Google Scholar
- Delia Mocanu, Luca Rossi, Qian Zhang, Marton Karsai, and Walter Quattrociocchi. 2014. Collective Attention in the Age of Misinformation. Retrieved July 1, 2014, from http://arxiv.org/abs/1403.3344.Google Scholar
- Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. 2011. Dirty jobs: The role of freelance labor in Web service abuse. In Proceedings of the 20th USENIX Conference on Security. Available at https://www.usenix.org/legacy/events/sec11/tech/full_papers/Motoyama.pdf. Google Scholar
Digital Library
- Arjun Mukherjee, Bing Liu, and Natalie Glance. 2012. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st International Conference on World Wide Web. ACM, New York, NY, 191--200. Google Scholar
Digital Library
- Nate. 2014. Responsibility of Users for Their Postings. Retrieved July 1, 2014, from http://www.nate.com/policy/legal.html.Google Scholar
- Giang H. Nguyen, Abdesselam Bouzerdoum, and Son Lam Phung. 2008. A supervised learning approach for imbalanced data sets. In Proceedings of the 19th International Conference on Pattern Recognition. 1--4. DOI:http://dx.doi.org/10.1109/ICPR.2008.4761278Google Scholar
Cross Ref
- Harald Olsen. 2012. North Korea Weighs in on South Korean Presidential Election. Retrieved February 18, 2014, from http://www.koreabang.com/2012/stories/north-korea-weighs-in-on-south-korean-presidential-election.html.Google Scholar
- Bo Pang and Lillian Lee. 2008. Opinion Mining and Sentiment Analysis. Now Publishers, Delft, Netherlands.Google Scholar
- Scott Rasmussen and Doug Schoen. 2010. Mad as Hell: How the Tea Party Movement Is Fundamentally Remaking Our Two-Party System. HarperCollins. New York, NY.Google Scholar
- Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Goncalves, Alessandro Flammini, and Filippo Menczer. 2011. Detecting and tracking political abuse in social media. In Proceedings of the 5th International Conference on Weblogs and Social Media. 297--304.Google Scholar
- William H. Riker. 1986. The Art of Political Manipulation. Yale University Press, New Haven, CT.Google Scholar
- Kyungmin Shin. 2013. NIS (National Intelligence Service). Medici Media, Seoul.Google Scholar
- Judith S. Trent, Robert V. Friedenberg, and Robert E. Denton Jr. 2011. Political Campaign Communication: Principles and Practices (7th ed.). Rowman & Littlefield, Lanham, MD.Google Scholar
- Johan Ugander, Lars Backstrom, Cameron Marlow, and Jon Kleinberg. 2012. Structural diversity in social contagion. Proceedings of the National Academy of Sciences of the United States of America 109, 16, 5962--5966. DOI:http://dx.doi.org/10.1073/pnas.1116502109Google Scholar
Cross Ref
- Vladimir Vapnik. 2000. The Nature of Statistical Learning Theory (2nd ed.). Springer, New York, NY. Google Scholar
Digital Library
- Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben Y. Zhao. 2013. You are how you click: Clickstream analysis for sybil detection. In Proceedings of the 22nd USENIX Conference on Security. 241--256. Available at https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang. Google Scholar
Digital Library
- Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, and Ben Y. Zhao. 2012. Serf and turf: CrowdTurfing for fun and profit. In Proceedings of the 21st International Conference on World Wide Web. ACM, New York, NY, 679--688. DOI:http://dx.doi.org/10.1145/2187836.2187928 Google Scholar
Digital Library
- Weka. 2014. Weka 3: Data Mining Software in Java. Retrieved July 1, 2014, from http://www.cs.waikato.ac.nz/ml/weka/index.html.Google Scholar
- Danielle R. Wiese. 2005. Campaign 2004: Developments in cyberpolitics. In The 2004 Presidential Campaign: A Communication Perspective, R. E. Denton (Ed.). Rowman & Littlefield, Lanham, MD, 217--240.Google Scholar
- Chang Xu, Jie Zhang, Kuiyu Chang, and Chong Long. 2013. Uncovering collusive spammers in Chinese review Websites. In Proceedings of the ACM Conference of Information and Knowledge Management. ACM, New York, NY, 979--988. Google Scholar
Digital Library
- Yiming Yang. 1999. An evaluation of statistical approaches to text categorization. Journal of Information Retrieval 1, 1--2, 69--90. DOI:http://dx.doi.org/10.1023/A:1009982220290 Google Scholar
Digital Library
- Yiming Yang and Jan O. Pedersen. 1997. A comparative study on feature selection in text categorization. In Proceedings of the 14th International Conference on Machine Learning. 412--420. Google Scholar
Digital Library
- Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM Transactions on Knowledge Discovery from Data 8, 1, Article No. 2. DOI:http://dx.doi.org/10.1145/2556609 Google Scholar
Digital Library
- Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao. 2010. SybilLimit: A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking 18, 3, 885--898. DOI:http://dx.doi.org/10.1109/TNET.2009.2034047 Google Scholar
Digital Library
- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham D. Flaxman. 2008. SybilGuard: Defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking 16, 3, 576--589. DOI:http://dx.doi.org/10.1109/TNET.2008.923723 Google Scholar
Digital Library
Index Terms
Detection of Political Manipulation in Online Communities through Measures of Effort and Collaboration
Recommendations
Who Falls for Online Political Manipulation?
WWW '19: Companion Proceedings of The 2019 World Wide Web ConferenceSocial media, once hailed as a vehicle for democratization and the promotion of positive social change across the globe, are under attack for becoming a tool of political manipulation and spread of disinformation. A case in point is the alleged use of ...
Spread of Hate Speech in Online Social Media
WebSci '19: Proceedings of the 10th ACM Conference on Web ScienceHate speech is considered to be one of the major issues currently plaguing the online social media. With online hate speech culminating in gruesome scenarios like the Rohingya genocide in Myanmar, anti-Muslim mob violence in Sri Lanka, and the ...
Modelling Formation of Online Temporal Communities
WWW '18: Companion Proceedings of the The Web Conference 2018Contemporary social media networks can be viewed as a break to the early two-step flow model in which influential individuals act as intermediaries between the media and the public for information diffusion. Today's social media platforms enable users ...








Comments