In this work there is an analysis based on historical inauthentic Information Operations (IOs) detected by Twitter and removed from the social, used as a ground truth, to study patterns of inauthentic and harmful coordination and to compare them with a dataset of Twitter messages recovered using the Twitter APIs and based on the most used hashtags in the selected IOs. These can be considered authentic and harmless, because surely they don’t come from users involved in the campaign, banned by Twitter. From the archive, the selected IOs come from Honduras and United Arab Emirates (UAE), which used different information strategies. The first was focused only on political aspects and is based on retweets; the second concerned both political and...
Recently, major social media platforms such as Facebook and Twitter have announced efforts to counte...
In the latest years, a number of citizen movements and protests have spread across the world. One of...
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 20...
Narratives can influence people on social media, and coordinating their dissemination can amplify th...
Large-scale manipulations on social media have two important characteristics: (i) use of propaganda ...
In this study we investigate the characteristics of malicious account behaviors on Twitter based on ...
The presence of organisations in Online Social Networks (OSNs) has motivated malicious users to look...
The presence of organisations in Online Social Networks (OSNs) has motivated malicious users to look...
The issue of quantifying and characterizing various forms of social media manipulation and abuse has...
The main objective of this thesis is to describe the work done to create a tool capable of detecting...
This dataset contains the IDs of about 5,458,582 tweets from 23,582 fake accounts for sale on buyacc...
Since the harmful consequences of the online publication of fake news have emerged clearly, many res...
Today, people of all ages are increasingly using Web platforms for social interaction. Consequently,...
International Conference on Artificial Intelligence and Data Processing (IDAP) -- SEP 28-30, 2018 --...
With the huge widespread and usage of social media in our life, it becomes an effective tool to sha...
Recently, major social media platforms such as Facebook and Twitter have announced efforts to counte...
In the latest years, a number of citizen movements and protests have spread across the world. One of...
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 20...
Narratives can influence people on social media, and coordinating their dissemination can amplify th...
Large-scale manipulations on social media have two important characteristics: (i) use of propaganda ...
In this study we investigate the characteristics of malicious account behaviors on Twitter based on ...
The presence of organisations in Online Social Networks (OSNs) has motivated malicious users to look...
The presence of organisations in Online Social Networks (OSNs) has motivated malicious users to look...
The issue of quantifying and characterizing various forms of social media manipulation and abuse has...
The main objective of this thesis is to describe the work done to create a tool capable of detecting...
This dataset contains the IDs of about 5,458,582 tweets from 23,582 fake accounts for sale on buyacc...
Since the harmful consequences of the online publication of fake news have emerged clearly, many res...
Today, people of all ages are increasingly using Web platforms for social interaction. Consequently,...
International Conference on Artificial Intelligence and Data Processing (IDAP) -- SEP 28-30, 2018 --...
With the huge widespread and usage of social media in our life, it becomes an effective tool to sha...
Recently, major social media platforms such as Facebook and Twitter have announced efforts to counte...
In the latest years, a number of citizen movements and protests have spread across the world. One of...
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 20...