A Decade of Social Bot Detection∗

Total Page:16

File Type:pdf, Size:1020Kb

A Decade of Social Bot Detection∗ A Decade of Social Bot Detection∗ STEFANO CRESCI, Institute of Informatics and Telematics, National Research Council (IIT-CNR) ACM Reference Format: Stefano Cresci. 2020. A Decade of Social Bot Detection. Commun. ACM 1, 1 (July 2020), 16 pages. https://doi.org/10.1145/ nnnnnnn.nnnnnnn On the morning of November 9th 2016, the world woke up to the shocking outcome of the US Presidential elections: Donald Trump was the 45th President of the United States of America. An unexpected event that still has tremendous consequences all over the world. Today, we know that a minority of social bots – automated social media accounts mimicking humans – played a central role in spreading divisive messages and disinformation, possibly contributing to Trump’s victory [16, 19]. In the aftermath of the 2016 US elections, the world started to realize the gravity of widespread deception in social media. Following Trump’s exploit, we witnessed to the emergence of a strident dissonance between the multitude of efforts for detecting and removing bots, and the increasing effects that these malicious actorsseem to have on our societies [27, 29]. This paradox opens a burning question: What strategies should we enforce in order to stop this social bot pandemic? In these times – during the run-up to the 2020 US elections – the question appears as more crucial than ever. Particularly so, also in light of the recent reported tampering of the electoral debate by thousands of AI-powered accounts1. What stroke social, political and economic analysts after 2016 – deception and automation – has been however a matter of study for computer scientists since at least 2010. In this work, we briefly survey the first decade of research in social bot detection. Via a longitudinal analysis, we discuss the main trends of research in the fight against bots, the major results that were achieved, and the factors that make this never-ending battleso challenging. Capitalizing on lessons learned from our extensive analysis, we suggest possible innovations that could give us the upper hand against deception and manipulation. Studying a decade of endeavours at social bot detection can also inform strategies for detecting and mitigating the effects of other – more recent – forms of online deception, such as strategic information operations and political trolls. ∗Forthcoming article accepted for publication in Communications of the ACM. 1https://about.fb.com/news/2019/12/removing-coordinated-inauthentic-behavior-from-georgia-vietnam-and-the-us/ arXiv:2007.03604v2 [cs.CY] 8 Jul 2020 Author’s address: Stefano Cresci, [email protected], Institute of Informatics and Telematics, National Research Council (IIT-CNR), via G. Moruzzi, 1, Pisa, Italy, 56124. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation onthefirst page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © 2020 Association for Computing Machinery. 1557-7317/2020/7-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Commun. ACM, Vol. 1, No. 1, Article . Publication date: July 2020. 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 M R D A C F B H G K M N S S F S B L N o e u c t c a i b e a e e e o e o u c c u r r c h h t r s g l u y o l r K s k l n e k s k ó w e e ä u t a e d k t e e l a q o i o n a r r f z l c e l h e a l r e i e l i u v s f - i v c h w r e s o a G e e r e i " t " e e h a e t o s d C r i D t t r e u e c y t a r t t a n a e a a o t i d e z t z j a g a l e i e t l l m . m e a t r a e l . i l t e e t t . a . " t l a l a e t " " p t . H á a t . a " " l D R a l l t u a . P " T n l a . " a l o . l p J . e e J t a l " " l . h o l a w . A a " . r e . " u C t d l " e l P e o t C . " i p " t " n r U i t h F t o D c b p B e " o i a o B o k a c D s i r t n o a l n o e n i m o a l i s r i n n m t a t g . i n e e t t ’ s i m o l s s s e g c e p l a " g x s s b a c D a c w p u d n 2 i e i e b i o n o t n s t l a r t o e d 0 s i c o t i a b b e o n c b l p s t a 1 n t t t i e s . n o p a g i o b u s t i . , 4 n . a o c c . t . a n . t o l b " i . g . a s a o u . t m . G " . t . e i " . n S s t n n r . " a a . e P " " t i e e " " d I g t t o n o n A R y e n r O O n s O s O c o d n t f s . s t e . u o r , t . I I . c I I o o a S i . I I t r . s I t T c I C a " o . " a h c c C C s c i C w C n p . a C o P l i . k P i i . a . O O r a O . i l O m . i . r J . o C . r " . l " . o . o . M M . m M . M . m " o P o " . P c " " . " c " . P m P f B . p P r . P P " r P P P o B & o C W R l R i A R P R r p e r r g r c c i o o o o o g C O O x S r O . O W . R c D c c o c m A M o P P I D . N P . P . c e E a W c m S W I I . I a e v t R R E C C C C R R a O M 2 t t e C 3 a w E 3 e e W W W S e e 2 5 N b I 7 0 p p o o p C p ( 5 C ( I S S S S ( A 1 ( o o m S 4 r o o ( 1 1 A W k M M 4 4 c r M r M ) r r I ) ) p t t s . I t . i t ) ) . A S J F N M U C R C S W R F o u e r d y t a o o r n i a n r a e á e l l h s s r r a e e t e u l r s s a h t e l s e u l r s a i g c t a r n n l i z a d e l a h i " e o e g - a " t o t H e S t t S t " y e e a e e t D a e " a a a o t r l t t C a c r i l . k l c a s . r . a e a l k o i " e . i a l a " " n i l t l P . m n B . " D t l e f " a T o o g o " " m o T p e t l D C p h , r . t u " h t a m e s u e e b O e h " t e l d l A a c o t a . a i a p n e n . t t i t r " t . r n i i a s c n c i a . n I o t o " n fl . r h t r e c g n . a S i a n e u c o . e w t a " n d e a o i e p n I a . l d i i n . r s c n o n a g . n i p o e t " z c l fl p i m M d i r B n f i J t e u o p n e i f b - u c e s e p o r g o s x a o a l o o d n .
Recommended publications
  • Arxiv:1805.10105V1 [Cs.SI] 25 May 2018
    Effects of Social Bots in the Iran-Debate on Twitter Andree Thieltges, Orestis Papakyriakopoulos, Juan Carlos Medina Serrano, Simon Hegelich Bavarian School of Public Policy Technical University of Munich Abstract Ahmadinejad caused nationwide unrests and protests. As these protests grew, the Iranian government shut down for- 2018 started with massive protests in Iran, bringing back the eign news coverage and restricted the use of cell phones, impressions of the so called “Arab Spring” and it’s revolution- text-messaging and internet access. Nevertheless, Twitter ary impact for the Maghreb states, Syria and Egypt. Many reports and scientific examinations considered online social and Facebook “became vital tools to relay news and infor- mation on anti-government protest to the people inside and networks (OSN’s) such as Twitter or Facebook to play a criti- 1 cal role in the opinion making of people behind those protests. outside Iran” . While Ayatollah Khameini characterized the Beside that, there is also evidence for directed manipulation influence of Twitter as “deviant” and inappropriate on Ira- of opinion with the help of social bots and fake accounts. nian domestic affairs2, most of the foreign news coverage So, it is obvious to ask, if there is an attempt to manipulate hailed Twitter to be “a new and influential medium for social the opinion-making process related to the Iranian protest in movements and international politics” (Burns and Eltham OSN by employing social bots, and how such manipulations 2009). Beside that, there was already a critical view upon will affect the discourse as a whole. Based on a sample of the influence of OSN’s as “tools” to express political opin- ca.
    [Show full text]
  • Predicting the Political Alignment of Twitter Users
    2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing Predicting the Political Alignment of Twitter Users Michael D. Conover, Bruno Gonc¸alves, Jacob Ratkiewicz, Alessandro Flammini and Filippo Menczer Center for Complex Networks and Systems Research School of Informatics and Computing Indiana University, Bloomington Abstract—The widespread adoption of social media for po- Of particular interest to political campaigns is how the scale litical communication creates unprecedented opportunities to of the Twitter platform creates the potential to monitor political monitor the opinions of large numbers of politically active opinions in real time. For example, imagine a campaign individuals in real time. However, without a way to distinguish between users of opposing political alignments, conflicting signals interested in tracking voter opinion relating to a specific piece at the individual level may, in the aggregate, obscure partisan of legislation. One could easily envision applying sentiment differences in opinion that are important to political strategy. analysis tools to the set of tweets containing keyword relating In this article we describe several methods for predicting the to the bill. However, without the ability to distinguish between political alignment of Twitter users based on the content and users with different political affiliations, aggregation over structure of their political communication in the run-up to the 2010 U.S. midterm elections. Using a data set of 1,000 manually- conflicting partisan signals would likely obscure the nuances annotated individuals, we find that a support vector machine most relevant to political strategy. (SVM) trained on hashtag metadata outperforms an SVM trained Here we explore several different approaches to the problem on the full text of users’ tweets, yielding predictions of political of discriminating between users with left- and right-leaning affiliations with 91% accuracy.
    [Show full text]
  • Political Astroturfing Across the World
    Political astroturfing across the world Franziska B. Keller∗ David Schochy Sebastian Stierz JungHwan Yang§ Paper prepared for the Harvard Disinformation Workshop Update 1 Introduction At the very latest since the Russian Internet Research Agency’s (IRA) intervention in the U.S. presidential election, scholars and the broader public have become wary of coordi- nated disinformation campaigns. These hidden activities aim to deteriorate the public’s trust in electoral institutions or the government’s legitimacy, and can exacerbate political polarization. But unfortunately, academic and public debates on the topic are haunted by conceptual ambiguities, and rely on few memorable examples, epitomized by the often cited “social bots” who are accused of having tried to influence public opinion in various contemporary political events. In this paper, we examine “political astroturfing,” a particular form of centrally co- ordinated disinformation campaigns in which participants pretend to be ordinary citizens acting independently (Kovic, Rauchfleisch, Sele, & Caspar, 2018). While the accounts as- sociated with a disinformation campaign may not necessarily spread incorrect information, they deceive the audience about the identity and motivation of the person manning the ac- count. And even though social bots have been in the focus of most academic research (Fer- rara, Varol, Davis, Menczer, & Flammini, 2016; Stella, Ferrara, & De Domenico, 2018), seemingly automated accounts make up only a small part – if any – of most astroturf- ing campaigns. For instigators of astroturfing, relying exclusively on social bots is not a promising strategy, as humans are good at detecting low-quality information (Pennycook & Rand, 2019). On the other hand, many bots detected by state-of-the-art social bot de- tection methods are not part of an astroturfing campaign, but unrelated non-political spam ∗Hong Kong University of Science and Technology yThe University of Manchester zGESIS – Leibniz Institute for the Social Sciences §University of Illinois at Urbana-Champaign 1 bots.
    [Show full text]
  • Understanding Users' Perspectives of News Bots in the Age of Social Media
    sustainability Article Utilizing Bots for Sustainable News Business: Understanding Users’ Perspectives of News Bots in the Age of Social Media Hyehyun Hong 1 and Hyun Jee Oh 2,* 1 Department of Advertising and Public Relations, Chung-Ang University, Seoul 06974, Korea; [email protected] 2 Department of Communication Studies, Hong Kong Baptist University, Kowloon Tong, Kowloon, Hong Kong SAR, China * Correspondence: [email protected] Received: 15 July 2020; Accepted: 10 August 2020; Published: 12 August 2020 Abstract: The move of news audiences to social media has presented a major challenge for news organizations. How to adapt and adjust to this social media environment is an important issue for sustainable news business. News bots are one of the key technologies offered in the current media environment and are widely applied in news production, dissemination, and interaction with audiences. While benefits and concerns coexist about the application of bots in news organizations, the current study aimed to examine how social media users perceive news bots, the factors that affect their acceptance of bots in news organizations, and how this is related to their evaluation of social media news in general. An analysis of the US national survey dataset showed that self-efficacy (confidence in identifying content from a bot) was a successful predictor of news bot acceptance, which in turn resulted in a positive evaluation of social media news in general. In addition, an individual’s perceived prevalence of social media news from bots had an indirect effect on acceptance by increasing self-efficacy. The results are discussed with the aim of providing a better understanding of news audiences in the social media environment, and practical implications for the sustainable news business are suggested.
    [Show full text]
  • Topical Web Crawlers: Evaluating Adaptive Algorithms
    Topical Web Crawlers: Evaluating Adaptive Algorithms FILIPPO MENCZER, GAUTAM PANT and PADMINI SRINIVASAN The University of Iowa Topical crawlers are increasingly seen as a way to address the scalability limitations of universal search engines, by distributing the crawling process across users, queries, or even client comput- ers. The context available to such crawlers can guide the navigation of links with the goal of efficiently locating highly relevant target pages. We developed a framework to fairly evaluate top- ical crawling algorithms under a number of performance metrics. Such a framework is employed here to evaluate different algorithms that have proven highly competitive among those proposed in the literature and in our own previous research. In particular we focus on the tradeoff be- tween exploration and exploitation of the cues available to a crawler, and on adaptive crawlers that use machine learning techniques to guide their search. We find that the best performance is achieved by a novel combination of explorative and exploitative bias, and introduce an evolution- ary crawler that surpasses the performance of the best non-adaptive crawler after sufficiently long crawls. We also analyze the computational complexity of the various crawlers and discuss how performance and complexity scale with available resources. Evolutionary crawlers achieve high efficiency and scalability by distributing the work across concurrent agents, resulting in the best performance/cost ratio. Categories and Subject Descriptors: H.3.3 [Information Storage
    [Show full text]
  • Supplementary Materials For
    www.sciencemag.org/content/359/6380/1094/suppl/DC1 Supplementary Materials for The science of fake news David M. J. Lazer,*† Matthew A. Baum,* Yochai Benkler, Adam J. Berinsky, Kelly M. Greenhill, Filippo Menczer, Miriam J. Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, Michael Schudson, Steven A. Sloman, Cass R. Sunstein, Emily A. Thorson, Duncan J. Watts, Jonathan L. Zittrain *These authors contributed equally to this work. †Corresponding author. Email: [email protected] Published 9 March 2018, Science 359, 1094 (2018) DOI: 10.1126/science.aao2998 This PDF file includes: List of Author Affiliations Supporting Materials References List of Author Affiliations David M. J. Lazer,1,2*† Matthew A. Baum,3* Yochai Benkler,4,5 Adam J. Berinsky,6 Kelly M. Greenhill,7,3 Filippo Menczer,8 Miriam J. Metzger,9 Brendan Nyhan,10 Gordon Pennycook,11 David Rothschild,12 Michael Schudson,13 Steven A. Sloman,14 Cass R. Sunstein,4 Emily A. Thorson,15 Duncan J. Watts,12 Jonathan L. Zittrain4,5 1Network Science Institute, Northeastern University, Boston, MA 02115, USA. 2Institute for Quantitative Social Science, Harvard University, Cambridge, MA 02138, USA 3John F. Kennedy School of Government, Harvard University, Cambridge, MA 02138, USA. 4Harvard Law School, Harvard University, Cambridge, MA 02138, USA. 5 Berkman Klein Center for Internet and Society, Cambridge, MA 02138, USA. 6Department of Political Science, Massachussets Institute of Technology, Cambridge, MA 02139, USA. 7Department of Political Science, Tufts University, Medford, MA 02155, USA. 8School of Informatics, Computing, and Engineering, Indiana University, Bloomington, IN 47405, USA. 9Department of Communication, University of California, Santa Barbara, Santa Barbara, CA 93106, USA.
    [Show full text]
  • Frame Viral Tweets.Pdf
    BIG IDEAS! Challenging Public Relations Research and Practice Viral Tweets, Fake News and Social Bots in Post-Factual Politics: The Case of the French Presidential Elections 2017 Alex Frame, Gilles Brachotte, Eric Leclercq, Marinette Savonnet [email protected] 20th Euprera Congress, Aarhus, 27-29th September 2018 Post-Factual Politics in the Age of Social Media 1. Algorithms based on popularity rather than veracity, linked to a business model based on views and likes, where novelty and sensationalism are of the essence; 2. Social trends of “whistle-blowing” linked to conspiracy theories and a pejorative image of corporate or institutional communication, which cast doubt on the neutrality of traditionally so-called expert figures, such as independent bodies or academics; 3. Algorithm-fuelled social dynamics on social networking sites which structure publics by similarity, leading to a fragmented digital public sphere where like-minded individuals congregate digitally, providing an “echo-chamber” effect susceptible to encourage even the most extreme political views and the “truths” upon which they are based. Fake News at the Presidential Elections Fake News at the Presidential Elections Fake News at the Presidential Elections Political Social Bots on Twitter Increasingly widespread around the world, over at least the last decade. Kremlin bot army (Lawrence Alexander on GlobalVoices.org; Stukal et al., 2017). DFRLab (Atlantic Council) Social Bots A “social bot” is: “a computer algorithm that automatically produces content and
    [Show full text]
  • Empirical Comparative Analysis of Bot Evidence in Social Networks
    Bots in Nets: Empirical Comparative Analysis of Bot Evidence in Social Networks Ross Schuchard1(&) , Andrew Crooks1,2 , Anthony Stefanidis2,3 , and Arie Croitoru2 1 Computational Social Science Program, Department of Computational and Data Sciences, George Mason University, Fairfax, VA 22030, USA [email protected] 2 Department of Geography and Geoinformation Science, George Mason University, Fairfax, VA 22030, USA 3 Criminal Investigations and Network Analysis Center, George Mason University, Fairfax, VA 22030, USA Abstract. The emergence of social bots within online social networks (OSNs) to diffuse information at scale has given rise to many efforts to detect them. While methodologies employed to detect the evolving sophistication of bots continue to improve, much work can be done to characterize the impact of bots on communication networks. In this study, we present a framework to describe the pervasiveness and relative importance of participants recognized as bots in various OSN conversations. Specifically, we harvested over 30 million tweets from three major global events in 2016 (the U.S. Presidential Election, the Ukrainian Conflict and Turkish Political Censorship) and compared the con- versational patterns of bots and humans within each event. We further examined the social network structure of each conversation to determine if bots exhibited any particular network influence, while also determining bot participation in key emergent network communities. The results showed that although participants recognized as social bots comprised only 0.28% of all OSN users in this study, they accounted for a significantly large portion of prominent centrality rankings across the three conversations. This includes the identification of individual bots as top-10 influencer nodes out of a total corpus consisting of more than 2.8 million nodes.
    [Show full text]
  • Disinformation, and Influence Campaigns on Twitter 'Fake News'
    Disinformation, ‘Fake News’ and Influence Campaigns on Twitter OCTOBER 2018 Matthew Hindman Vlad Barash George Washington University Graphika Contents Executive Summary . 3 Introduction . 7 A Problem Both Old and New . 9 Defining Fake News Outlets . 13 Bots, Trolls and ‘Cyborgs’ on Twitter . 16 Map Methodology . 19 Election Data and Maps . 22 Election Core Map Election Periphery Map Postelection Map Fake Accounts From Russia’s Most Prominent Troll Farm . 33 Disinformation Campaigns on Twitter: Chronotopes . 34 #NoDAPL #WikiLeaks #SpiritCooking #SyriaHoax #SethRich Conclusion . 43 Bibliography . 45 Notes . 55 2 EXECUTIVE SUMMARY This study is one of the largest analyses to date on how fake news spread on Twitter both during and after the 2016 election campaign. Using tools and mapping methods from Graphika, a social media intelligence firm, we study more than 10 million tweets from 700,000 Twitter accounts that linked to more than 600 fake and conspiracy news outlets. Crucially, we study fake and con- spiracy news both before and after the election, allowing us to measure how the fake news ecosystem has evolved since November 2016. Much fake news and disinformation is still being spread on Twitter. Consistent with other research, we find more than 6.6 million tweets linking to fake and conspiracy news publishers in the month before the 2016 election. Yet disinformation continues to be a substantial problem postelection, with 4.0 million tweets linking to fake and conspiracy news publishers found in a 30-day period from mid-March to mid-April 2017. Contrary to claims that fake news is a game of “whack-a-mole,” more than 80 percent of the disinformation accounts in our election maps are still active as this report goes to press.
    [Show full text]
  • Social Bots and Social Media Manipulation in 2020: the Year in Review
    Social Bots and Social Media Manipulation in 2020: The Year in Review Ho-Chun Herbert Chang∗a, Emily Chen∗b,c, Meiqing Zhang∗a, Goran Muric∗b, and Emilio Ferraraa,b,c aUSC Annenberg School of Communication bUSC Information Sciences Institute cUSC Department of Computer Science *These authors contributed equally to this work Abstract The year 2020 will be remembered for two events of global significance: the COVID-19 pandemic and 2020 U.S. Presidential Election. In this chapter, we summarize recent studies using large public Twitter data sets on these issues. We have three primary ob- jectives. First, we delineate epistemological and practical considerations when combin- ing the traditions of computational research and social science research. A sensible bal- ance should be struck when the stakes are high between advancing social theory and concrete, timely reporting of ongoing events. We additionally comment on the compu- tational challenges of gleaning insight from large amounts of social media data. Second, we characterize the role of social bots in social media manipulation around the discourse on the COVID-19 pandemic and 2020 U.S. Presidential Election. Third, we compare re- sults from 2020 to prior years to note that, although bot accounts still contribute to the emergence of echo-chambers, there is a transition from state-sponsored campaigns to do- mestically emergent sources of distortion. Furthermore, issues of public health can be confounded by political orientation, especially from localized communities of actors who spread misinformation. We conclude that automation and social media manipulation arXiv:2102.08436v1 [cs.SI] 16 Feb 2021 pose issues to a healthy and democratic discourse, precisely because they distort repre- sentation of pluralism within the public sphere.
    [Show full text]
  • The Rise of Social Botnets: Attacks and Countermeasures
    1 The Rise of Social Botnets: Attacks and Countermeasures Jinxue Zhang, Student Member, IEEE, Rui Zhang, Member, IEEE, Yanchao Zhang, Senior Member, IEEE, and Guanhua Yan Abstract—Online social networks (OSNs) are increasingly threatened by social bots which are software-controlled OSN accounts that mimic human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster, which collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation through real experiments on Twitter and also trace-driven simulations. We also propose the corresponding countermeasures and evaluate their effectiveness. Our results can help understand the potentially detrimental effects of social botnets and help OSNs improve their bot(net) detection systems. Index Terms—Social bot, social botnet, spam distribution, digital influence F 1 INTRODUCTION NLINE social networks (OSNs) are increasingly threat- two new social botnet attacks on Twitter, one of the most O ened by social bots [2] which are software-controlled OSN popular OSNs with over 302M monthly active users as of June accounts that mimic human users with malicious intentions. 2015 and over 500M new tweets daily. Then we propose two For example, according to a May 2012 article in Bloomberg defenses on the reported attacks, respectively. Our results help Businessweek,1 as many as 40% of the accounts on Facebook, understand the potentially detrimental effects of social botnets Twitter, and other popular OSNs are spammer accounts (or and shed the light for Twitter and other OSNs to improve their social bots), and about 8% of the messages sent via social bot(net) detection systems.
    [Show full text]
  • Supervised Machine Learning Bot Detection Techniques to Identify
    SMU Data Science Review Volume 1 | Number 2 Article 5 2018 Supervised Machine Learning Bot Detection Techniques to Identify Social Twitter Bots Phillip George Efthimion Southern Methodist University, [email protected] Scott aP yne Southern Methodist University, [email protected] Nicholas Proferes University of Kentucky, [email protected] Follow this and additional works at: https://scholar.smu.edu/datasciencereview Part of the Theory and Algorithms Commons Recommended Citation Efthimion, hiP llip George; Payne, Scott; and Proferes, Nicholas (2018) "Supervised Machine Learning Bot Detection Techniques to Identify Social Twitter Bots," SMU Data Science Review: Vol. 1 : No. 2 , Article 5. Available at: https://scholar.smu.edu/datasciencereview/vol1/iss2/5 This Article is brought to you for free and open access by SMU Scholar. It has been accepted for inclusion in SMU Data Science Review by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. Efthimion et al.: Supervised Machine Learning Bot Detection Techniques to Identify Social Twitter Bots Supervised Machine Learning Bot Detection Techniques to Identify Social Twitter Bots Phillip G. Efthimion1, Scott Payne1, Nick Proferes2 1Master of Science in Data Science, Southern Methodist University 6425 Boaz Lane, Dallas, TX 75205 {pefthimion, mspayne}@smu.edu [email protected] Abstract. In this paper, we present novel bot detection algorithms to identify Twitter bot accounts and to determine their prevalence in current online discourse. On social media, bots are ubiquitous. Bot accounts are problematic because they can manipulate information, spread misinformation, and promote unverified information, which can adversely affect public opinion on various topics, such as product sales and political campaigns.
    [Show full text]