A Two-Phase Framework for Detecting Manipulation Campaigns in Social Media

D Assenmacher, L Clever, JS Pohl, H Trautmann, C Grimme

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Abstract

The identification of coordinated campaigns within Social Media is a complex task that is often hindered by missing labels and large amounts of data that have to be processed. We propose a new two-phase framework that uses unsupervised stream clustering for detecting suspicious trends over time in a first step. Afterwards, traditional offline analyses are applied to distinguish between normal trend evolution and malicious manipulation attempts. We demonstrate the applicability of our framework in the context of the final days of the Brexit in 2019/2020.
Original languageEnglish
Title of host publicationSocial Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis
Subtitle of host publication12th International Conference, SCSM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I
EditorsG Meiselwitz
Place of PublicationCham
PublisherSpringer International Publishing AG
Pages201-214
Number of pages14
ISBN (Print)978-3-030-49570-1
DOIs
Publication statusPublished - 2020
Externally publishedYes
Event12th International Conference on Social Computing and Social Media, SCSM 2020 - Virtual Event
Duration: 19 Jul 202024 Jul 2020
Conference number: 12
http://2020.hci.international/scsm.html

Publication series

NameLecture Notes in Computer Science book series
Volume12194

Conference

Conference12th International Conference on Social Computing and Social Media, SCSM 2020
Abbreviated titleSCSM 2020
CityVirtual Event
Period19/07/2024/07/20
OtherHeld as Part of the 22nd HCI International Conference, HCII 2020
Internet address

Fingerprint Dive into the research topics of 'A Two-Phase Framework for Detecting Manipulation Campaigns in Social Media'. Together they form a unique fingerprint.

Cite this