Publication Type

Conference Proceeding Article

Publication Date

7-2012

Abstract

Twitter has enjoyed tremendous popularity in the recent years. To help categorizing and search tweets, Twitter users assign hashtags to their tweets. Given that hashtag assignment is the primary way to semantically categorizing and search tweets, it is highly susceptible to abuse by spammers and other anomalous users [1]. Popular hashtags such as #Obama and #ladygaga could be hijacked by having them added to unrelated tweets with the intent of misleading many other users or promoting specific agenda to the users. The users performing this act are known as the hashtag hijackers. As the hijackers usually abuse common sets of hashtags, they demonstrate common extreme group behaviors which can be used for detection.

Discipline

Computer Sciences | Databases and Information Systems | Social Media

Research Areas

Software and Cyber-Physical Systems; Data Management and Analytics

Publication

Proceedings of the ACM International Conference on Net Science (NetSci)

First Page

1

Last Page

2

City or Country

Chicago, Illinois

Copyright Owner and License

Authors

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Share

COinS