skip to main content
research-article

Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber

Published:07 December 2015Publication History
Skip Abstract Section

Abstract

Social network users take advantage of anonymity to share rumors or gossip about others, making it important to provide means to report offensive conduct. This article presents a proposal to automatically manage these reports. We consider not only the users’ public behavior, but also private messages between users. The automatic approach is based, in both cases, on the reporters’ reputation along with other metrics intrinsic to social networks. Promising results from adopting the proposed reporting methods on Frisber, a geolocalized social network in production, are presented as well as some experiments based on real data extracted from Frisber.

References

  1. Nisha Aggarwal. 2014. Mining YouTube Metadata for Detecting Privacy Invading Harassment and Misdemeanour Videos. Master’s thesis. Indraprastha Institute of Information Technology, New Delhi, India.Google ScholarGoogle Scholar
  2. Vinicius Almendra and Denis Enăchescu. 2011. A supervised learning process to elicit fraud cases in online auction sites. In Proceedings of the 2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. IEEE, Los Alamitos, CA, 168--174. DOI:http://dx.doi.org/10.1109/SYNASC.2011.15 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fabrício Benevenuto, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida, and Marcos Gonçalves. 2009. Detecting spammers and content promoters in online video social networks. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York, NY, 620--627. DOI:http://dx.doi.org/10.1145/1571941.1572047 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, Matei Ripeanu, and Adriana Iamnitchi. 2014. Cheating in online games: A social network perspective. ACM Transactions on Internet Technology 13, 3, Article 9, 25 pages. DOI:http://dx.doi.org/10.1145/2602570 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ying Chen. 2011. Detecting Offensive Language in Social Medias for Protection of Adolescent Online Safety. Master’s thesis. Department of Computer Science and Engineering, The Pennsylvania State University, State College, PA.Google ScholarGoogle Scholar
  6. Luca De Alfaro, Ashutosh Kulshreshtha, Ian Pye, and B. Thomas Adler. 2011. Reputation systems for open collaboration. Communications of the ACM 54, 8, 81--87. DOI:http://dx.doi.org/10.1145/1978542.1978560 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ronald Deibert, Jonathan L. Zittrain, John Palfrey, and Rafal Rohozinski. 2012. Access Contested: Security, Identity, and Resistance in Asian Cyberspace. MIT Press, Cambridge, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ginés Dólera Tormo, Félix Gómez Mármol, and Gregorio Martínez Pérez. 2014. Towards the integration of reputation management in OpenID. Computer Standards and Interfaces 36, 3, 438--453. DOI:http://dx.doi.org/10.1016/j.csi.2013.08.018 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rebecca Dredge, John Gleeson, and Xochitl de la Piedad Garcia. 2014. Cyberbullying in social networking sites: An adolescent victim’s perspective. Computers in Human Behavior 36, 13--20. DOI:http://dx.doi.org/10.1016/j.chb.2014.03.026Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Facebook. 2012. What happens after you click “Report.” Retrieved October 22, 2015 from https://www.facebook.com/notes/432670926753695.Google ScholarGoogle Scholar
  11. Robert Faris, Stephanie Wang, and John Palfrey. 2008. Censorship 2.0. Innovations 3, 2, 165--187. DOI:http://dx.doi.org/10.1162/itgg.2008.3.2.165Google ScholarGoogle ScholarCross RefCross Ref
  12. Frisber. 2015. Main website of Frisber. Retrieved October 22, 2015 from http://frisber.inf.um.es.Google ScholarGoogle Scholar
  13. Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, and Antonio F. Skarmeta Gómez. 2013. RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms. Journal of Network and Systems Management 21, 1, 128--167. DOI:http://dx.doi.org/10.1007/s10922-012-9230-8 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Félix Gómez Mármol, Manuel Gil Pérez, and Gregorio Martínez Pérez. 2014. Reporting offensive content in social networks: Toward a reputation-based assessment approach. IEEE Internet Computing 18, 2, 32--40. DOI:http://dx.doi.org/10.1109/MIC.2013.132Google ScholarGoogle ScholarCross RefCross Ref
  15. Google Inc. 2015. Google App Engine. Retrieved October 22, 2015 from http://appengine.google.com. (2015).Google ScholarGoogle Scholar
  16. Lisa M. Jones, Kimberly J. Mitchell, and David Finkelhor. 2012. Trends in youth Internet victimization: Findings from three youth Internet safety surveys 2000-2010. Journal of Adolescent Health 50, 2, 179--186. DOI:http://dx.doi.org/10.1016/j.jadohealth.2011.09.015Google ScholarGoogle ScholarCross RefCross Ref
  17. Raquel Justo, Thomas Corcoran, Stephanie M. Lukin, Marilyn Walker, and M. Ins Torres. 2014. Extracting relevant knowledge for the detection of sarcasm and nastiness in the social Web. Knowledged-Based Systems 69, 124--133. DOI:http://dx.doi.org/10.1016/j.knosys.2014.05.021Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kazuhiro Kazama, Miyuki Imada, and Keiichiro Kashiwagi. 2012. Characteristics of information diffusion in blogs, in relation to information source type. Neurocomputing 76, 1, 84--92. DOI:http://dx.doi.org/10.1016/j.neucom.2011.04.036 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. LinkedIn Corp. 2015. Reporting inappropriate content, messages, or safety concerns. Frequently Asked Questions. Retrieved October 22, 2015 from https://help.linkedin.com/app/safety/answers/detail/a_id/146. (2015).Google ScholarGoogle Scholar
  20. Amir H. Razavi, Diana Inkpen, Sasha Uritsky, and Stan Matwin. 2010. Offensive language detection using multi-level classification. In Advances in Artificial Intelligence. Lecture Notes in Computer Science, Vol. 6085. Springer, Berlin, 16--27. DOI:http://dx.doi.org/10.1007/978-3-642-13059-5_5 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yigal D. Rubinstein, Mitu Singh, Qing Guo, Arturo Bejar, and Arda Cebeci. 2013. Content report management in a social networking system. US patent 2013/0151609 A1.Google ScholarGoogle Scholar
  22. Tanaya Saha and Akancha Srivastava. 2014. Indian women at risk in the cyber space: A conceptual model of reasons of victimization. International Journal of Cyber Criminology 8, 1, 57--67.Google ScholarGoogle Scholar
  23. Mathangi Subramanian. 2014. Bullying: The ultimate teen guide. Rowman & Littlefield Publishers, Inc., New York, NY.Google ScholarGoogle Scholar
  24. Prashant Tomer, Shrikant Lade, Manish Kumar Suman, and Deepak Patel. 2013. On line social network content and image filtering, classifications. International Journal of Engineering Research and Science & Technology 2, 4, 42--55.Google ScholarGoogle Scholar
  25. Twitter, Inc. 2014a. Reporting abusive behavior. Retrieved October 22, 2015 from https://support.twitter.com/articles/20169998. (2014).Google ScholarGoogle Scholar
  26. Twitter, Inc. 2014b. Someone on Twitter is engaging in abusive or harassing behavior. Retrieved October 22, 2015 from https://support.twitter.com/forms/abusiveuser. (2014).Google ScholarGoogle Scholar
  27. Niklas Udd. 2008. Automatic Filtering of Abuse Reports. Master’s thesis. Department of Computer and Systems Sciences, Stockholm University and Royal Institute of Technology, Stockholm, Sweden.Google ScholarGoogle Scholar
  28. Kathleen Van Royen, Karolien Poels, Walter Daelemans, and Heidi Vandebosch. 2015. Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics 32, 1, 89--97. DOI:http://dx.doi.org/10.1016/j.tele.2014.04.002Google ScholarGoogle ScholarCross RefCross Ref
  29. Ellen Wauters, Eva Lievens, and Peggy Valcke. 2014. Towards a better protection of social media users: A legal perspective on the terms of use of social networking sites. International Journal of Law and Information Technology 22, 3, 254--294. DOI:http://dx.doi.org/10.1093/ijlit/eau002Google ScholarGoogle ScholarCross RefCross Ref
  30. James D. Work, Allen Blue, and Reid Hoffman. 2011. Method and system for reputation evaluation of online users in a social networking scheme. US patent 8,010,460 B2.Google ScholarGoogle Scholar
  31. Guang Xiang, Bin Fan, Ling Wang, Jason Hong, and Carolyn Rose. 2012. Detecting offensive tweets via topical feature discovery over a large scale Twitter corpus. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM, New York, NY, 1980--1984. DOI:http://dx.doi.org/10.1145/2396761.2398556 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 15, Issue 4
            Special Issue on Trust in Social Networks and Systems
            December 2015
            88 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/2851090
            • Editor:
            • Munindar P. Singh
            Issue’s Table of Contents

            Copyright © 2015 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 December 2015
            • Accepted: 1 June 2015
            • Revised: 1 April 2015
            • Received: 1 August 2014
            Published in toit Volume 15, Issue 4

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!