Abstract
Social network users take advantage of anonymity to share rumors or gossip about others, making it important to provide means to report offensive conduct. This article presents a proposal to automatically manage these reports. We consider not only the users’ public behavior, but also private messages between users. The automatic approach is based, in both cases, on the reporters’ reputation along with other metrics intrinsic to social networks. Promising results from adopting the proposed reporting methods on Frisber, a geolocalized social network in production, are presented as well as some experiments based on real data extracted from Frisber.
- Nisha Aggarwal. 2014. Mining YouTube Metadata for Detecting Privacy Invading Harassment and Misdemeanour Videos. Master’s thesis. Indraprastha Institute of Information Technology, New Delhi, India.Google Scholar
- Vinicius Almendra and Denis Enăchescu. 2011. A supervised learning process to elicit fraud cases in online auction sites. In Proceedings of the 2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. IEEE, Los Alamitos, CA, 168--174. DOI:http://dx.doi.org/10.1109/SYNASC.2011.15 Google Scholar
Digital Library
- Fabrício Benevenuto, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida, and Marcos Gonçalves. 2009. Detecting spammers and content promoters in online video social networks. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York, NY, 620--627. DOI:http://dx.doi.org/10.1145/1571941.1572047 Google Scholar
Digital Library
- Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, Matei Ripeanu, and Adriana Iamnitchi. 2014. Cheating in online games: A social network perspective. ACM Transactions on Internet Technology 13, 3, Article 9, 25 pages. DOI:http://dx.doi.org/10.1145/2602570 Google Scholar
Digital Library
- Ying Chen. 2011. Detecting Offensive Language in Social Medias for Protection of Adolescent Online Safety. Master’s thesis. Department of Computer Science and Engineering, The Pennsylvania State University, State College, PA.Google Scholar
- Luca De Alfaro, Ashutosh Kulshreshtha, Ian Pye, and B. Thomas Adler. 2011. Reputation systems for open collaboration. Communications of the ACM 54, 8, 81--87. DOI:http://dx.doi.org/10.1145/1978542.1978560 Google Scholar
Digital Library
- Ronald Deibert, Jonathan L. Zittrain, John Palfrey, and Rafal Rohozinski. 2012. Access Contested: Security, Identity, and Resistance in Asian Cyberspace. MIT Press, Cambridge, MA. Google Scholar
Digital Library
- Ginés Dólera Tormo, Félix Gómez Mármol, and Gregorio Martínez Pérez. 2014. Towards the integration of reputation management in OpenID. Computer Standards and Interfaces 36, 3, 438--453. DOI:http://dx.doi.org/10.1016/j.csi.2013.08.018 Google Scholar
Digital Library
- Rebecca Dredge, John Gleeson, and Xochitl de la Piedad Garcia. 2014. Cyberbullying in social networking sites: An adolescent victim’s perspective. Computers in Human Behavior 36, 13--20. DOI:http://dx.doi.org/10.1016/j.chb.2014.03.026Google Scholar
Digital Library
- Facebook. 2012. What happens after you click “Report.” Retrieved October 22, 2015 from https://www.facebook.com/notes/432670926753695.Google Scholar
- Robert Faris, Stephanie Wang, and John Palfrey. 2008. Censorship 2.0. Innovations 3, 2, 165--187. DOI:http://dx.doi.org/10.1162/itgg.2008.3.2.165Google Scholar
Cross Ref
- Frisber. 2015. Main website of Frisber. Retrieved October 22, 2015 from http://frisber.inf.um.es.Google Scholar
- Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, and Antonio F. Skarmeta Gómez. 2013. RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms. Journal of Network and Systems Management 21, 1, 128--167. DOI:http://dx.doi.org/10.1007/s10922-012-9230-8 Google Scholar
Digital Library
- Félix Gómez Mármol, Manuel Gil Pérez, and Gregorio Martínez Pérez. 2014. Reporting offensive content in social networks: Toward a reputation-based assessment approach. IEEE Internet Computing 18, 2, 32--40. DOI:http://dx.doi.org/10.1109/MIC.2013.132Google Scholar
Cross Ref
- Google Inc. 2015. Google App Engine. Retrieved October 22, 2015 from http://appengine.google.com. (2015).Google Scholar
- Lisa M. Jones, Kimberly J. Mitchell, and David Finkelhor. 2012. Trends in youth Internet victimization: Findings from three youth Internet safety surveys 2000-2010. Journal of Adolescent Health 50, 2, 179--186. DOI:http://dx.doi.org/10.1016/j.jadohealth.2011.09.015Google Scholar
Cross Ref
- Raquel Justo, Thomas Corcoran, Stephanie M. Lukin, Marilyn Walker, and M. Ins Torres. 2014. Extracting relevant knowledge for the detection of sarcasm and nastiness in the social Web. Knowledged-Based Systems 69, 124--133. DOI:http://dx.doi.org/10.1016/j.knosys.2014.05.021Google Scholar
Digital Library
- Kazuhiro Kazama, Miyuki Imada, and Keiichiro Kashiwagi. 2012. Characteristics of information diffusion in blogs, in relation to information source type. Neurocomputing 76, 1, 84--92. DOI:http://dx.doi.org/10.1016/j.neucom.2011.04.036 Google Scholar
Digital Library
- LinkedIn Corp. 2015. Reporting inappropriate content, messages, or safety concerns. Frequently Asked Questions. Retrieved October 22, 2015 from https://help.linkedin.com/app/safety/answers/detail/a_id/146. (2015).Google Scholar
- Amir H. Razavi, Diana Inkpen, Sasha Uritsky, and Stan Matwin. 2010. Offensive language detection using multi-level classification. In Advances in Artificial Intelligence. Lecture Notes in Computer Science, Vol. 6085. Springer, Berlin, 16--27. DOI:http://dx.doi.org/10.1007/978-3-642-13059-5_5 Google Scholar
Digital Library
- Yigal D. Rubinstein, Mitu Singh, Qing Guo, Arturo Bejar, and Arda Cebeci. 2013. Content report management in a social networking system. US patent 2013/0151609 A1.Google Scholar
- Tanaya Saha and Akancha Srivastava. 2014. Indian women at risk in the cyber space: A conceptual model of reasons of victimization. International Journal of Cyber Criminology 8, 1, 57--67.Google Scholar
- Mathangi Subramanian. 2014. Bullying: The ultimate teen guide. Rowman & Littlefield Publishers, Inc., New York, NY.Google Scholar
- Prashant Tomer, Shrikant Lade, Manish Kumar Suman, and Deepak Patel. 2013. On line social network content and image filtering, classifications. International Journal of Engineering Research and Science & Technology 2, 4, 42--55.Google Scholar
- Twitter, Inc. 2014a. Reporting abusive behavior. Retrieved October 22, 2015 from https://support.twitter.com/articles/20169998. (2014).Google Scholar
- Twitter, Inc. 2014b. Someone on Twitter is engaging in abusive or harassing behavior. Retrieved October 22, 2015 from https://support.twitter.com/forms/abusiveuser. (2014).Google Scholar
- Niklas Udd. 2008. Automatic Filtering of Abuse Reports. Master’s thesis. Department of Computer and Systems Sciences, Stockholm University and Royal Institute of Technology, Stockholm, Sweden.Google Scholar
- Kathleen Van Royen, Karolien Poels, Walter Daelemans, and Heidi Vandebosch. 2015. Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics 32, 1, 89--97. DOI:http://dx.doi.org/10.1016/j.tele.2014.04.002Google Scholar
Cross Ref
- Ellen Wauters, Eva Lievens, and Peggy Valcke. 2014. Towards a better protection of social media users: A legal perspective on the terms of use of social networking sites. International Journal of Law and Information Technology 22, 3, 254--294. DOI:http://dx.doi.org/10.1093/ijlit/eau002Google Scholar
Cross Ref
- James D. Work, Allen Blue, and Reid Hoffman. 2011. Method and system for reputation evaluation of online users in a social networking scheme. US patent 8,010,460 B2.Google Scholar
- Guang Xiang, Bin Fan, Ling Wang, Jason Hong, and Carolyn Rose. 2012. Detecting offensive tweets via topical feature discovery over a large scale Twitter corpus. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM, New York, NY, 1980--1984. DOI:http://dx.doi.org/10.1145/2396761.2398556 Google Scholar
Digital Library
Index Terms
Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber
Recommendations
The impact of network structure on breaking ties in online social networks: unfollowing on twitter
CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsWe investigate the breaking of ties between individuals in the online social network of Twitter, a hugely popular social media service. Building on sociology concepts such as strength of ties, embeddedness, and status, we explore how network structure ...
Characterizing social cascades in flickr
WOSN '08: Proceedings of the first workshop on Online social networksOnline social networking sites like MySpace and Flickr have become a popular way to share and disseminate content. Their massive popularity has led to the viral marketing of content, products, and political campaigns on the sites themselves. Despite the ...
A study of rumor control strategies on social networks
CIKM '10: Proceedings of the 19th ACM international conference on Information and knowledge managementIn this paper we study and evaluate rumor-like methods for combating the spread of rumors on a social network. We model rumor spread as a diffusion process on a network and suggest the use of an "anti-rumor" process similar to the rumor process. We ...






Comments