Skip to main content
Erschienen in: Information Systems Frontiers 3/2018

03.11.2017

Detection of Spammers in Twitter marketing: A Hybrid Approach Using Social Media Analytics and Bio Inspired Computing

verfasst von: Reema Aswani, Arpan Kumar Kar, P. Vigneswara Ilavarasan

Erschienen in: Information Systems Frontiers | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Customer engagement is drastically improved through Web 2.0 technologies, especially social media platforms like Twitter. These platforms are often used by organizations for marketing, of which creation of numerous spam profiles for content promotion is common. The present paper proposes a hybrid approach for identifying the spam profiles by combining social media analytics and bio inspired computing. It adopts a modified K-Means integrated Levy flight Firefly Algorithm (LFA) with chaotic maps as an extension to Firefly Algorithm (FA) for spam detection in Twitter marketing. A total of 18,44,701 tweets have been analyzed from 14,235 Twitter profiles on 13 statistically significant factors derived from social media analytics. A Fuzzy C-Means Clustering approach is further used to identify the overlapping users in two clusters of spammers and non-spammers. Six variants of K-Means integrated FA including chaotic maps and levy flights are tested. The findings indicate that FA with chaos for tuning attractiveness coefficient using Gauss Map converges to a working solution the fastest. Further, LFA with chaos for tuning the absorption coefficient using sinusoidal map outperforms the rest of the approaches in terms of accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aswani, R., Ghrera, S.P., Chandra, S., Kar, A.K. (2017a). Outlier detection among influencer blogs based on off-site web analytics data. Forthcoming in Lecture Notes in Computer Science. In Proceedings of 16th IFIP Conference on e-Business, e-Services and e-Society. Springer International Publishing., in press. Aswani, R., Ghrera, S.P., Chandra, S., Kar, A.K. (2017a). Outlier detection among influencer blogs based on off-site web analytics data. Forthcoming in Lecture Notes in Computer Science. In Proceedings of 16th IFIP Conference on e-Business, e-Services and e-Society. Springer International Publishing., in press.
Zurück zum Zitat Aswani, R., Ghrera, S. P., Kar, A. K., & Chandra, S. (2017b). Identifying buzz in social media: a hybrid approach using artificial bee colony and k-nearest neighbors for outlier detection. Social Network Analysis and Mining, 7(1), 38. Aswani, R., Ghrera, S. P., Kar, A. K., & Chandra, S. (2017b). Identifying buzz in social media: a hybrid approach using artificial bee colony and k-nearest neighbors for outlier detection. Social Network Analysis and Mining, 7(1), 38.
Zurück zum Zitat Aswani, R., Ghrera, S.P., Chandra, S., Kar, A.K. (2017c). Identifying popular online news: An approach using chaotic cuckoo search algorithm. Forthcoming in International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), IEEE, in press. Aswani, R., Ghrera, S.P., Chandra, S., Kar, A.K. (2017c). Identifying popular online news: An approach using chaotic cuckoo search algorithm. Forthcoming in International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), IEEE, in press.
Zurück zum Zitat Aswani, R., Kar, A.K., Aggarwal, S., Ilavarasan, P.V. (2017d). Exploring content virality in Facebook: A semantic based approach. Forthcoming in Lecture Notes in Computer Science. In Proceedings of 16th IFIP Conference on e-Business, e-Services and e-Society. Springer International Publishing., in press. Aswani, R., Kar, A.K., Aggarwal, S., Ilavarasan, P.V. (2017d). Exploring content virality in Facebook: A semantic based approach. Forthcoming in Lecture Notes in Computer Science. In Proceedings of 16th IFIP Conference on e-Business, e-Services and e-Society. Springer International Publishing., in press.
Zurück zum Zitat Aswani, R., Kar, A. K., Ilavarasan, P. V., & Dwivedi, Y. K. (2018). Search engine marketing is not all gold: insights from Twitter and SEOClerks. International Journal of Information Management, 38(1), 107–116. Aswani, R., Kar, A. K., Ilavarasan, P. V., & Dwivedi, Y. K. (2018). Search engine marketing is not all gold: insights from Twitter and SEOClerks. International Journal of Information Management, 38(1), 107–116.
Zurück zum Zitat Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L. (2012). The role of social networks in information diffusion. In Proceedings of the 21st international conference on World Wide Web (pp. 519–528). ACM. Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L. (2012). The role of social networks in information diffusion. In Proceedings of the 21st international conference on World Wide Web (pp. 519–528). ACM.
Zurück zum Zitat Baroncelli, L., Freitas, A. (2011). The Visibility of the Self on the Web: A Struggle for Recognition’, Proceedings of the ACM WebSci’11, June 14-17 2011, Koblenz, Germany, pp. 1–2. Available at http://journal.webscience.org/502/. Accessed 20 Mar 2017. Baroncelli, L., Freitas, A. (2011). The Visibility of the Self on the Web: A Struggle for Recognition’, Proceedings of the ACM WebSci’11, June 14-17 2011, Koblenz, Germany, pp. 1–2. Available at http://​journal.​webscience.​org/​502/​. Accessed 20 Mar 2017.
Zurück zum Zitat Baur, A. W. (2017). Harnessing the social web to enhance insights into people’s opinions in business, government and public administration. Information Systems Frontiers, 19(2), 231–251.CrossRef Baur, A. W. (2017). Harnessing the social web to enhance insights into people’s opinions in business, government and public administration. Information Systems Frontiers, 19(2), 231–251.CrossRef
Zurück zum Zitat Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010). Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), 6, 12. Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010). Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), 6, 12.
Zurück zum Zitat Berthon, P. R., Pitt, L. F., Plangger, K., & Shapiro, D. (2012). Marketing meets web 2.0, social media, and creative consumers: Implications for international marketing strategy. Business Horizons, 55(3), 261–271.CrossRef Berthon, P. R., Pitt, L. F., Plangger, K., & Shapiro, D. (2012). Marketing meets web 2.0, social media, and creative consumers: Implications for international marketing strategy. Business Horizons, 55(3), 261–271.CrossRef
Zurück zum Zitat Bezdek, J. C., Ehrlich, R., & Full, W. (1984). FCM: The fuzzy c-means clustering algorithm. Computers & Geosciences, 10(2–3), 191–203.CrossRef Bezdek, J. C., Ehrlich, R., & Full, W. (1984). FCM: The fuzzy c-means clustering algorithm. Computers & Geosciences, 10(2–3), 191–203.CrossRef
Zurück zum Zitat Blom, J. N., & Hansen, K. R. (2015). Click bait: Forward-reference as lure in online news headlines. Journal of Pragmatics, 76, 87–100.CrossRef Blom, J. N., & Hansen, K. R. (2015). Click bait: Forward-reference as lure in online news headlines. Journal of Pragmatics, 76, 87–100.CrossRef
Zurück zum Zitat Bradley, P. (2010). Be where the conversations are: The critical importance of social media. Business Information Review, 27(4), 248–252.CrossRef Bradley, P. (2010). Be where the conversations are: The critical importance of social media. Business Information Review, 27(4), 248–252.CrossRef
Zurück zum Zitat Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K. (2008). Social networks and context-aware spam. In Proceedings of ACM conference on Computer supported cooperative work (pp. 403–412). ACM. Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K. (2008). Social networks and context-aware spam. In Proceedings of ACM conference on Computer supported cooperative work (pp. 403–412). ACM.
Zurück zum Zitat Cao, X., Guo, X., Liu, H., & Gu, J. (2015). The role of social media in supporting knowledge integration: A social capital analysis. Information Systems Frontiers, 17(2), 351–362.CrossRef Cao, X., Guo, X., Liu, H., & Gu, J. (2015). The role of social media in supporting knowledge integration: A social capital analysis. Information Systems Frontiers, 17(2), 351–362.CrossRef
Zurück zum Zitat Case, C. J., & King, D. L. (2011). Twitter usage in the fortune 50: A marketing opportunity? Journal of marketing development and competitiveness, 5(3), 94–103. Case, C. J., & King, D. L. (2011). Twitter usage in the fortune 50: A marketing opportunity? Journal of marketing development and competitiveness, 5(3), 94–103.
Zurück zum Zitat Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. In Proceedings of the 20th international conference on World wide web (pp. 675–684). ACM. Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. In Proceedings of the 20th international conference on World wide web (pp. 675–684). ACM.
Zurück zum Zitat Chae, B. K. (2015). Insights from hashtag# supplychain and twitter analytics: Considering twitter and twitter data for supply chain practice and research. International Journal of Production Economics, 165, 247–259.CrossRef Chae, B. K. (2015). Insights from hashtag# supplychain and twitter analytics: Considering twitter and twitter data for supply chain practice and research. International Journal of Production Economics, 165, 247–259.CrossRef
Zurück zum Zitat Chakraborty A., Kar A.K. (2016) A Review of Bio-Inspired Computing Methods and Potential Applications. In D. Lobiyal, D. Mohapatra, A. Nagar, M. Sahoo (Eds.), Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering (vol 396, pp. 155–161). Springer, New Delhi. Chakraborty A., Kar A.K. (2016) A Review of Bio-Inspired Computing Methods and Potential Applications. In D. Lobiyal, D. Mohapatra, A. Nagar, M. Sahoo (Eds.), Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering (vol 396, pp. 155–161). Springer, New Delhi.
Zurück zum Zitat Chakraborty, A., Kar, A. K. (2017). Swarm intelligence: A review of algorithms. In Nature-Inspired Computing and Optimization (pp. 475–494). Springer International Publishing. Chakraborty, A., Kar, A. K. (2017). Swarm intelligence: A review of algorithms. In Nature-Inspired Computing and Optimization (pp. 475–494). Springer International Publishing.
Zurück zum Zitat Chen, Y., & Bharadwaj, A. (2009). An empirical analysis of contract structures in IT outsourcing. Information Systems Research, 20(4), 484–506.CrossRef Chen, Y., & Bharadwaj, A. (2009). An empirical analysis of contract structures in IT outsourcing. Information Systems Research, 20(4), 484–506.CrossRef
Zurück zum Zitat Chu, Z., Gianvecchio, S., Wang, H., & Jajodia, S. (2012). Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Transactions on Dependable and Secure Computing, 9(6), 811–824.CrossRef Chu, Z., Gianvecchio, S., Wang, H., & Jajodia, S. (2012). Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Transactions on Dependable and Secure Computing, 9(6), 811–824.CrossRef
Zurück zum Zitat Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., & Tesconi, M. (2015). Fame for sale: Efficient detection of fake twitter followers. Decision Support Systems, 80, 56–71. Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., & Tesconi, M. (2015). Fame for sale: Efficient detection of fake twitter followers. Decision Support Systems, 80, 56–71.
Zurück zum Zitat De Vries, L., Gensler, S., & Leeflang, P. S. (2012). Popularity of brand posts on brand fan pages: An investigation of the effects of social media marketing. Journal of Interactive Marketing, 26(2), 83–91.CrossRef De Vries, L., Gensler, S., & Leeflang, P. S. (2012). Popularity of brand posts on brand fan pages: An investigation of the effects of social media marketing. Journal of Interactive Marketing, 26(2), 83–91.CrossRef
Zurück zum Zitat Denecke, K., & Nejdl, W. (2009). How valuable is medical social media data? Content analysis of the medical web. Information Sciences, 179(12), 1870–1880.CrossRef Denecke, K., & Nejdl, W. (2009). How valuable is medical social media data? Content analysis of the medical web. Information Sciences, 179(12), 1870–1880.CrossRef
Zurück zum Zitat Dickey, I. J., & Lewis, W. F. (2010). The evolution (revolution) of social media and social networking as a necessary topic in the marketing curriculum: a case for integrating social media into marketing classes. Society for Marketing Advances Proceedings, (pp. 140–143). Mobile, AL: Society for Marketing Advances. Dickey, I. J., & Lewis, W. F. (2010). The evolution (revolution) of social media and social networking as a necessary topic in the marketing curriculum: a case for integrating social media into marketing classes. Society for Marketing Advances Proceedings, (pp. 140–143). Mobile, AL: Society for Marketing Advances.
Zurück zum Zitat dos Santos Coelho, L., & Mariani, V. C. (2008). Use of chaotic sequences in a biologically inspired algorithm for engineering design optimization. Expert Systems with Applications, 34(3), 1905–1913.CrossRef dos Santos Coelho, L., & Mariani, V. C. (2008). Use of chaotic sequences in a biologically inspired algorithm for engineering design optimization. Expert Systems with Applications, 34(3), 1905–1913.CrossRef
Zurück zum Zitat Erdoğmuş, İ. E., & Cicek, M. (2012). The impact of social media marketing on brand loyalty. Procedia-Social and Behavioral Sciences, 58, 1353–1360.CrossRef Erdoğmuş, İ. E., & Cicek, M. (2012). The impact of social media marketing on brand loyalty. Procedia-Social and Behavioral Sciences, 58, 1353–1360.CrossRef
Zurück zum Zitat Fire, M., Kagan, D., Elyashar, A., & Elovici, Y. (2014). Friend or foe? Fake profile identification in online social networks. Social Network Analysis and Mining, 4(1), 1–23.CrossRef Fire, M., Kagan, D., Elyashar, A., & Elovici, Y. (2014). Friend or foe? Fake profile identification in online social networks. Social Network Analysis and Mining, 4(1), 1–23.CrossRef
Zurück zum Zitat Fister, I., Yang, X. S., & Brest, J. (2013). A comprehensive review of firefly algorithms. Swarm and Evolutionary Computation, 13, 34–46.CrossRef Fister, I., Yang, X. S., & Brest, J. (2013). A comprehensive review of firefly algorithms. Swarm and Evolutionary Computation, 13, 34–46.CrossRef
Zurück zum Zitat Gallaugher, J., Ransbotham, S. (2010). Social media and customer dialog management at Starbucks. MIS Quarterly Executive, 9(4), 197–212. Gallaugher, J., Ransbotham, S. (2010). Social media and customer dialog management at Starbucks. MIS Quarterly Executive, 9(4), 197–212.
Zurück zum Zitat Gandomi, A. H., Yang, X. S., Talatahari, S., & Alavi, A. H. (2013). Firefly algorithm with chaos. Communications in Nonlinear Science and Numerical Simulation, 18(1), 89–98.CrossRef Gandomi, A. H., Yang, X. S., Talatahari, S., & Alavi, A. H. (2013). Firefly algorithm with chaos. Communications in Nonlinear Science and Numerical Simulation, 18(1), 89–98.CrossRef
Zurück zum Zitat Gayo Avello, D., Brenes Martínez, D. J. (2010). Overcoming spammers in Twitter--A tale of five algorithms. In Proceedings of the 1st Spanish Conference on Information Retrieval (pp. 41–52). Madrid: CERI. Gayo Avello, D., Brenes Martínez, D. J. (2010). Overcoming spammers in Twitter--A tale of five algorithms. In Proceedings of the 1st Spanish Conference on Information Retrieval (pp. 41–52). Madrid: CERI.
Zurück zum Zitat Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals' social capital, civic engagement and political participation. Journal of Computer-Mediated Communication, 17(3), 319–336.CrossRef Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals' social capital, civic engagement and political participation. Journal of Computer-Mediated Communication, 17(3), 319–336.CrossRef
Zurück zum Zitat Gillin, P., Moore, G. A. (2009). The new influencers: A marketer’s guide to the new social media. Sanger, CA: Quill Driver Books. Gillin, P., Moore, G. A. (2009). The new influencers: A marketer’s guide to the new social media. Sanger, CA: Quill Driver Books.
Zurück zum Zitat Go, E., & You, K. H. (2016). But not all social media are the same: Analyzing organizations’ social media usage patterns. Telematics and Informatics, 33(1), 176–186.CrossRef Go, E., & You, K. H. (2016). But not all social media are the same: Analyzing organizations’ social media usage patterns. Telematics and Informatics, 33(1), 176–186.CrossRef
Zurück zum Zitat Goh, K. Y., Heng, C. S., & Lin, Z. (2013). Social media brand community and consumer behavior: Quantifying the relative impact of user-and marketer-generated content. Information Systems Research, 24(1), 88–107.CrossRef Goh, K. Y., Heng, C. S., & Lin, Z. (2013). Social media brand community and consumer behavior: Quantifying the relative impact of user-and marketer-generated content. Information Systems Research, 24(1), 88–107.CrossRef
Zurück zum Zitat Grover, P., & Kar, A. K. (2017). Big data analytics: A review on theoretical contributions and tools used in literature. Global Journal of Flexible Systems Management, 18(3), 203–229.CrossRef Grover, P., & Kar, A. K. (2017). Big data analytics: A review on theoretical contributions and tools used in literature. Global Journal of Flexible Systems Management, 18(3), 203–229.CrossRef
Zurück zum Zitat Hanna, R., Rohm, A., & Crittenden, V. L. (2011). We’re all connected: The power of the social media ecosystem. Business Horizons, 54(3), 265–273.CrossRef Hanna, R., Rohm, A., & Crittenden, V. L. (2011). We’re all connected: The power of the social media ecosystem. Business Horizons, 54(3), 265–273.CrossRef
Zurück zum Zitat Jin, X., Lin, C., Luo, J., & Han, J. (2011). A data mining-based spam detection system for social media networks. Proceedings of the VLDB Endowment, 4(12), 1458–1461. Jin, X., Lin, C., Luo, J., & Han, J. (2011). A data mining-based spam detection system for social media networks. Proceedings of the VLDB Endowment, 4(12), 1458–1461.
Zurück zum Zitat Joseph, N., Kar, A. K., Ilavarasan, P. V., & Ganesh, S. (2017). Review of discussions on internet of things (IoT): Insights from twitter analytics. Journal of Global Information Management (JGIM), 25(2), 38–51.CrossRef Joseph, N., Kar, A. K., Ilavarasan, P. V., & Ganesh, S. (2017). Review of discussions on internet of things (IoT): Insights from twitter analytics. Journal of Global Information Management (JGIM), 25(2), 38–51.CrossRef
Zurück zum Zitat Jothiprakash, V., & Arunkumar, R. (2013). Optimization of hydropower reservoir using evolutionary algorithms coupled with chaos. Water Resources Management, 27(7), 1963–1979.CrossRef Jothiprakash, V., & Arunkumar, R. (2013). Optimization of hydropower reservoir using evolutionary algorithms coupled with chaos. Water Resources Management, 27(7), 1963–1979.CrossRef
Zurück zum Zitat Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59–68.CrossRef Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59–68.CrossRef
Zurück zum Zitat Kar, A. K. (2016). Bio inspired computing–a review of algorithms and scope of applications. Expert Systems with Applications, 59, 20–32.CrossRef Kar, A. K. (2016). Bio inspired computing–a review of algorithms and scope of applications. Expert Systems with Applications, 59, 20–32.CrossRef
Zurück zum Zitat Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54(3), 241–251.CrossRef Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54(3), 241–251.CrossRef
Zurück zum Zitat Kim, A. J., & Ko, E. (2012). Do social media marketing activities enhance customer equity? An empirical study of luxury fashion brand. Journal of Business Research, 65(10), 1480–1486.CrossRef Kim, A. J., & Ko, E. (2012). Do social media marketing activities enhance customer equity? An empirical study of luxury fashion brand. Journal of Business Research, 65(10), 1480–1486.CrossRef
Zurück zum Zitat Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is Twitter, a social network or a news media?. In Proceedings of the 19th international conference on World wide web (WWW ’10) (pp. 591–600). New York: ACM. Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is Twitter, a social network or a news media?. In Proceedings of the 19th international conference on World wide web (WWW ’10) (pp. 591–600). New York: ACM.
Zurück zum Zitat Lee, K., Caverlee, J., Webb, S. (2010). Uncovering social spammers: social honeypots+ machine learning. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval (pp. 435–442). ACM. Lee, K., Caverlee, J., Webb, S. (2010). Uncovering social spammers: social honeypots+ machine learning. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval (pp. 435–442). ACM.
Zurück zum Zitat Lee, K., Eoff, B. D., Caverlee, J. (2011). Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. In Proceedings of the 5th International Conference on Weblogs and Social Media (ICWSM) (pp. 185–192). Barcelona, Spain. Lee, K., Eoff, B. D., Caverlee, J. (2011). Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. In Proceedings  of  the  5th  International Conference  on  Weblogs  and  Social  Media  (ICWSM) (pp. 185–192). Barcelona, Spain.
Zurück zum Zitat Li, Y., Qian, M., Jin, D., Hui, P., & Vasilakos, A. V. (2015). Revealing the efficiency of information diffusion in online social networks of microblog. Information Sciences, 293, 383–389.CrossRef Li, Y., Qian, M., Jin, D., Hui, P., & Vasilakos, A. V. (2015). Revealing the efficiency of information diffusion in online social networks of microblog. Information Sciences, 293, 383–389.CrossRef
Zurück zum Zitat Lipsman, A., Mudd, G., Rich, M., & Bruich, S. (2012). The power of “like”. Journal of Advertising Research, 52(1), 40–52.CrossRef Lipsman, A., Mudd, G., Rich, M., & Bruich, S. (2012). The power of “like”. Journal of Advertising Research, 52(1), 40–52.CrossRef
Zurück zum Zitat Łukasik, S., Żak, S. (2009). Firefly algorithm for continuous constrained optimization tasks. In International Conference on Computational Collective Intelligence (pp. 97–106). Springer Berlin Heidelberg. Łukasik, S., Żak, S. (2009). Firefly algorithm for continuous constrained optimization tasks. In International Conference on Computational Collective Intelligence (pp. 97–106). Springer Berlin Heidelberg.
Zurück zum Zitat Mangold, W. G., & Faulds, D. J. (2009). Social media: The new hybrid element of the promotion mix. Business Horizons, 52(4), 357–365.CrossRef Mangold, W. G., & Faulds, D. J. (2009). Social media: The new hybrid element of the promotion mix. Business Horizons, 52(4), 357–365.CrossRef
Zurück zum Zitat Mantegna, R. N. (1994). Fast, accurate algorithm for numerical simulation of levy stable stochastic processes. Physical Review E, 49(5), 4677.CrossRef Mantegna, R. N. (1994). Fast, accurate algorithm for numerical simulation of levy stable stochastic processes. Physical Review E, 49(5), 4677.CrossRef
Zurück zum Zitat Markines, B., Cattuto, C., Menczer, F. (2009). Social spam detection. In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (pp. 41–48). ACM. Markines, B., Cattuto, C., Menczer, F. (2009). Social spam detection. In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (pp. 41–48). ACM.
Zurück zum Zitat Myers, S. A., Zhu, C., & Leskovec, J. (2012). Information diffusion and external influence in networks. In Proceedings of international conference on Knowledge discovery and data mining (pp. 33–41). ACM. Myers, S. A., Zhu, C., & Leskovec, J. (2012). Information diffusion and external influence in networks. In Proceedings of international conference on Knowledge discovery and data mining (pp. 33–41). ACM.
Zurück zum Zitat Nagle, T., & Pope, A. (2013). Understanding social media business value, a prerequisite for social media selection. Journal of Decision Systems, 22(4), 283–297.CrossRef Nagle, T., & Pope, A. (2013). Understanding social media business value, a prerequisite for social media selection. Journal of Decision Systems, 22(4), 283–297.CrossRef
Zurück zum Zitat Naylor, R. W., Lamberton, C. P., & West, P. M. (2012). Beyond the “like” button: The impact of mere virtual presence on brand evaluations and purchase intentions in social media settings. Journal of Marketing, 76(6), 105–120.CrossRef Naylor, R. W., Lamberton, C. P., & West, P. M. (2012). Beyond the “like” button: The impact of mere virtual presence on brand evaluations and purchase intentions in social media settings. Journal of Marketing, 76(6), 105–120.CrossRef
Zurück zum Zitat Neti, S. (2011). Social media and its role in marketing. International Journal of Enterprise Computing and Business Systems, 1(2), 1–15. Neti, S. (2011). Social media and its role in marketing. International Journal of Enterprise Computing and Business Systems, 1(2), 1–15.
Zurück zum Zitat Nielsen, R. K., & Schrøder, K. C. (2014). The relative importance of social media for accessing, finding, and engaging with news: An eight-country cross-media comparison. Digital journalism, 2(4), 472–489.CrossRef Nielsen, R. K., & Schrøder, K. C. (2014). The relative importance of social media for accessing, finding, and engaging with news: An eight-country cross-media comparison. Digital journalism, 2(4), 472–489.CrossRef
Zurück zum Zitat O'Keeffe, G. S., & Clarke-Pearson, K. (2011). The impact of social media on children, adolescents, and families. Pediatrics, 127(4), 800–804.CrossRef O'Keeffe, G. S., & Clarke-Pearson, K. (2011). The impact of social media on children, adolescents, and families. Pediatrics, 127(4), 800–804.CrossRef
Zurück zum Zitat Patino, A., Pitta, D. A., & Quinones, R. (2012). Social media's emerging importance in market research. Journal of Consumer Marketing, 29(3), 233–237.CrossRef Patino, A., Pitta, D. A., & Quinones, R. (2012). Social media's emerging importance in market research. Journal of Consumer Marketing, 29(3), 233–237.CrossRef
Zurück zum Zitat Plume, C. J., Dwivedi, Y. K., Slade, E. L. (2016). Social Media in the Marketing Context: A State of the Art Analysis and Future Directions, 1st edition. Oxford: Chandos Publishing. Plume, C. J., Dwivedi, Y. K., Slade, E. L. (2016). Social Media in the Marketing Context: A State of the Art Analysis and Future Directions, 1st edition. Oxford: Chandos Publishing.
Zurück zum Zitat Rathore, A. K., Ilavarasan, P. V., & Dwivedi, Y. K. (2016). Social media content and product co-creation: An emerging paradigm. Journal of Enterprise Information Management, 29(1), 7–18.CrossRef Rathore, A. K., Ilavarasan, P. V., & Dwivedi, Y. K. (2016). Social media content and product co-creation: An emerging paradigm. Journal of Enterprise Information Management, 29(1), 7–18.CrossRef
Zurück zum Zitat Romero D.M., Galuba W., Asur S., Huberman B.A. (2011) Influence and Passivity in Social Media. In: D. Gunopulos, T. Hofmann, D. Malerba, M. Vazirgiannis (Eds.), Machine Learning and Knowledge Discovery in Databases. ECML PKDD 2011. Lecture Notes in Computer Science (vol 6913, pp. 18–22). Springer: Berlin, Heidelberg. Romero D.M., Galuba W., Asur S., Huberman B.A. (2011) Influence and Passivity in Social Media. In: D. Gunopulos, T. Hofmann, D. Malerba, M. Vazirgiannis (Eds.), Machine Learning and Knowledge Discovery in Databases. ECML PKDD 2011. Lecture Notes in Computer Science (vol 6913, pp. 18–22). Springer: Berlin, Heidelberg.
Zurück zum Zitat Rosenberger, M., Lehrer, C., & Jung, R. (2017). Integrating data from user activities of social networks into public administrations. Information Systems Frontiers, 19(2), 253–266.CrossRef Rosenberger, M., Lehrer, C., & Jung, R. (2017). Integrating data from user activities of social networks into public administrations. Information Systems Frontiers, 19(2), 253–266.CrossRef
Zurück zum Zitat Ross, S. A. (1973). The economic theory of agency: The principal's problem. The American Economic Review, 63(2), 134–139. Ross, S. A. (1973). The economic theory of agency: The principal's problem. The American Economic Review, 63(2), 134–139.
Zurück zum Zitat Safko, L. (2010). The social media bible: tactics, tools, and strategies for business success, 1st edition. Hoboken: Wiley John & Sons, Inc. Safko, L. (2010). The social media bible: tactics, tools, and strategies for business success, 1st edition. Hoboken: Wiley John & Sons, Inc.
Zurück zum Zitat Santos, I., Minambres-Marcos, I., Laorden, C., Galán-García, P., Santamaría-Ibirika, A., Bringas, P. G. (2014). Twitter content-based spam filtering. In International Joint Conference SOCO’13-CISIS’13-ICEUTE’13 (pp. 449–458). Springer International Publishing. Santos, I., Minambres-Marcos, I., Laorden, C., Galán-García, P., Santamaría-Ibirika, A., Bringas, P. G. (2014). Twitter content-based spam filtering. In International Joint Conference SOCO’13-CISIS’13-ICEUTE’13 (pp. 449–458). Springer International Publishing.
Zurück zum Zitat Senthilnath, J., Omkar, S. N., & Mani, V. (2011). Clustering using firefly algorithm: Performance study. Swarm and Evolutionary Computation, 1(3), 164–171.CrossRef Senthilnath, J., Omkar, S. N., & Mani, V. (2011). Clustering using firefly algorithm: Performance study. Swarm and Evolutionary Computation, 1(3), 164–171.CrossRef
Zurück zum Zitat Shirky, C. (2011). The political power of social media: Technology, the public sphere, and political change. Foreign affairs, 90(1), 28–41. Shirky, C. (2011). The political power of social media: Technology, the public sphere, and political change. Foreign affairs, 90(1), 28–41.
Zurück zum Zitat Song, J., Lee, S., & Kim, J. (2011). Spam filtering in twitter using sender-receiver relationship. In International Workshop on Recent Advances in Intrusion Detection (pp. 301–317). Springer Berlin Heidelberg. Song, J., Lee, S., & Kim, J. (2011). Spam filtering in twitter using sender-receiver relationship. In International Workshop on Recent Advances in Intrusion Detection (pp. 301–317). Springer Berlin Heidelberg.
Zurück zum Zitat Sprenger, M., Mettler, T., & Winter, R. (2017). A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions. Information Systems Frontiers, 19(4), 899–922.CrossRef Sprenger, M., Mettler, T., & Winter, R. (2017). A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions. Information Systems Frontiers, 19(4), 899–922.CrossRef
Zurück zum Zitat Tang, R., Fong, S., Yang, X. S., Deb, S. (2012). Integrating nature-inspired optimization algorithms to K-means clustering. In Seventh International Conference on Digital Information Management (ICDIM) (pp. 116–123). IEEE. Tang, R., Fong, S., Yang, X. S., Deb, S. (2012). Integrating nature-inspired optimization algorithms to K-means clustering. In Seventh International Conference on Digital Information Management (ICDIM) (pp. 116–123). IEEE.
Zurück zum Zitat Thackeray, R., Neiger, B. L., Hanson, C. L., & McKenzie, J. F. (2008). Enhancing promotional strategies within social marketing programs: Use of web 2.0 social media. Health Promotion Practice, 9(4), 338–343.CrossRef Thackeray, R., Neiger, B. L., Hanson, C. L., & McKenzie, J. F. (2008). Enhancing promotional strategies within social marketing programs: Use of web 2.0 social media. Health Promotion Practice, 9(4), 338–343.CrossRef
Zurück zum Zitat Tsimonis, G., & Dimitriadis, S. (2014). Brand strategies in social media. Marketing Intelligence & Planning, 32(3), 328–344.CrossRef Tsimonis, G., & Dimitriadis, S. (2014). Brand strategies in social media. Marketing Intelligence & Planning, 32(3), 328–344.CrossRef
Zurück zum Zitat Vance, K., Howe, W., & Dellavalle, R. P. (2009). Social internet sites as a source of public health information. Dermatologic Clinics, 27(2), 133–136.CrossRef Vance, K., Howe, W., & Dellavalle, R. P. (2009). Social internet sites as a source of public health information. Dermatologic Clinics, 27(2), 133–136.CrossRef
Zurück zum Zitat Vishwanath, A. (2015). Diffusion of deception in social media: Social contagion effects and its antecedents. Information Systems Frontiers, 17(6), 1353–1367.CrossRef Vishwanath, A. (2015). Diffusion of deception in social media: Social contagion effects and its antecedents. Information Systems Frontiers, 17(6), 1353–1367.CrossRef
Zurück zum Zitat Wang, A.H. (2010a). Don't follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on (pp. 1–10). IEEE. Wang, A.H. (2010a). Don't follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on (pp. 1–10). IEEE.
Zurück zum Zitat Wang, A.H. (2010b). Detecting spam bots in online social networking sites: a machine learning approach. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 335–342). Springer Berlin Heidelberg. Wang, A.H. (2010b). Detecting spam bots in online social networking sites: a machine learning approach. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 335–342). Springer Berlin Heidelberg.
Zurück zum Zitat Wang, F., & Vaughan, L. (2014). Firm web visibility and its business value. Internet Research, 24(3), 292–312.CrossRef Wang, F., & Vaughan, L. (2014). Firm web visibility and its business value. Internet Research, 24(3), 292–312.CrossRef
Zurück zum Zitat Wang, G. G., Guo, L., Gandomi, A. H., Hao, G. S., & Wang, H. (2014). Chaotic krill herd algorithm. Information Sciences, 274, 17–34.CrossRef Wang, G. G., Guo, L., Gandomi, A. H., Hao, G. S., & Wang, H. (2014). Chaotic krill herd algorithm. Information Sciences, 274, 17–34.CrossRef
Zurück zum Zitat Wang, B., Zubiaga, A., Liakata, M., Procter, R. (2015). Making the most of tweet-inherent features for social spam detection on Twitter. In Proceedings of the the 5th Workshop on Making Sense of Microposts co-located with the 24th International World Wide Web Conference (pp. 10–16). CEUR-WS. Wang, B., Zubiaga, A., Liakata, M., Procter, R. (2015). Making the most of tweet-inherent features for social spam detection on Twitter. In Proceedings of the the 5th Workshop on Making Sense of Microposts co-located with the 24th International World Wide Web Conference (pp. 10–16). CEUR-WS.
Zurück zum Zitat Webb, S., Caverlee, J., Pu, C. (2008). Social Honeypots: Making Friends With A Spammer Near You. In Procedings of Proceedings of the Conference on Email and Anti-Spam (pp. 1–10). Mountain View, CA. Webb, S., Caverlee, J., Pu, C. (2008). Social Honeypots: Making Friends With A Spammer Near You. In Procedings of Proceedings of the Conference on Email and Anti-Spam (pp. 1–10). Mountain View, CA.
Zurück zum Zitat Xiang, Z., & Gretzel, U. (2010). Role of social media in online travel information search. Tourism Management, 31(2), 179–188.CrossRef Xiang, Z., & Gretzel, U. (2010). Role of social media in online travel information search. Tourism Management, 31(2), 179–188.CrossRef
Zurück zum Zitat Yang, X.S. (2009). Firefly algorithms for multimodal optimization. In International symposium on stochastic algorithms (pp. 169–178). Springer Berlin Heidelberg. Yang, X.S. (2009). Firefly algorithms for multimodal optimization. In International symposium on stochastic algorithms (pp. 169–178). Springer Berlin Heidelberg.
Zurück zum Zitat Yang, X.S. (2010a). Firefly algorithm. Engineering Optimization (pp. 221–230). John Wiley & Sons, Inc., Hoboken, NJ, USA. Yang, X.S. (2010a). Firefly algorithm. Engineering Optimization (pp. 221–230). John Wiley & Sons, Inc., Hoboken, NJ, USA.
Zurück zum Zitat Yang, X.S. (2010b). Firefly algorithm, Levy flights and global optimization. In Research and development in intelligent systems XXVI (pp. 209–218). London: Springer. Yang, X.S. (2010b). Firefly algorithm, Levy flights and global optimization. In Research and development in intelligent systems XXVI (pp. 209–218). London: Springer.
Zurück zum Zitat Yang, X. S. (2010c). Firefly algorithm, stochastic test functions and design optimisation. International Journal of Bio-Inspired Computation, 2(2), 78–84.CrossRef Yang, X. S. (2010c). Firefly algorithm, stochastic test functions and design optimisation. International Journal of Bio-Inspired Computation, 2(2), 78–84.CrossRef
Zurück zum Zitat Yang, X.S. (2010d). Nature-inspired metaheuristic algorithms, 2nd edition. Bristol: Luniver Press. Yang, X.S. (2010d). Nature-inspired metaheuristic algorithms, 2nd edition. Bristol: Luniver Press.
Zurück zum Zitat Yang, X. S., & He, X. (2013). Firefly algorithm: Recent advances and applications. International Journal of Swarm Intelligence, 1(1), 36–50.CrossRef Yang, X. S., & He, X. (2013). Firefly algorithm: Recent advances and applications. International Journal of Swarm Intelligence, 1(1), 36–50.CrossRef
Zurück zum Zitat Zhang, X., Zhu, S., Liang, W. (2012). Detecting spam and promoting campaigns in the twitter social network. In Data Mining (ICDM), 2012 I.E. 12th International Conference on (pp. 1194–1199). IEEE. Zhang, X., Zhu, S., Liang, W. (2012). Detecting spam and promoting campaigns in the twitter social network. In Data Mining (ICDM), 2012 I.E. 12th International Conference on (pp. 1194–1199). IEEE.
Zurück zum Zitat Zheng, X., Zeng, Z., Chen, Z., Yu, Y., & Rong, C. (2015). Detecting spammers on social networks. Neurocomputing, 159, 27–34.CrossRef Zheng, X., Zeng, Z., Chen, Z., Yu, Y., & Rong, C. (2015). Detecting spammers on social networks. Neurocomputing, 159, 27–34.CrossRef
Zurück zum Zitat Ziegler, C. N., & Lausen, G. (2005). Propagation models for trust and distrust in social networks. Information Systems Frontiers, 7(4–5), 337–358.CrossRef Ziegler, C. N., & Lausen, G. (2005). Propagation models for trust and distrust in social networks. Information Systems Frontiers, 7(4–5), 337–358.CrossRef
Metadaten
Titel
Detection of Spammers in Twitter marketing: A Hybrid Approach Using Social Media Analytics and Bio Inspired Computing
verfasst von
Reema Aswani
Arpan Kumar Kar
P. Vigneswara Ilavarasan
Publikationsdatum
03.11.2017
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 3/2018
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-017-9805-8

Weitere Artikel der Ausgabe 3/2018

Information Systems Frontiers 3/2018 Zur Ausgabe

Premium Partner