Misleading Repurposing on Twitter

We present the first in-depth and large-scale study of misleading repurposing, in which a malicious user changes the identity of their social media account via, among other things, changes to the profile attributes in order to use the account for a new purpose while retaining their followers. We pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Elmas, Tuğrulcan, Overdorf, Rebekah, Aberer, Karl
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Elmas, Tuğrulcan
Overdorf, Rebekah
Aberer, Karl
description We present the first in-depth and large-scale study of misleading repurposing, in which a malicious user changes the identity of their social media account via, among other things, changes to the profile attributes in order to use the account for a new purpose while retaining their followers. We propose a definition for the behavior and a methodology that uses supervised learning on data mined from the Internet Archive's Twitter Stream Grab to flag repurposed accounts. We found over 100,000 accounts that may have been repurposed. We also characterize repurposed accounts and found that they are more likely to be repurposed after a period of inactivity and deleting old tweets. We also provide evidence that adversaries target accounts with high follower counts to repurpose, and some make them have high follower counts by participating in follow-back schemes. The results we present have implications for the security and integrity of social media platforms, for data science studies in how historical data is considered, and for society at large in how users can be deceived about the popularity of an opinion.
doi_str_mv 10.48550/arxiv.2010.10600
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2010_10600</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2010_10600</sourcerecordid><originalsourceid>FETCH-LOGICAL-a670-12f53d5c030558b1ad010502fd42fa44aef7ce940a0f462558439d051e6719ad3</originalsourceid><addsrcrecordid>eNotjskKwkAQROfiQdQP8KR-QLRn6SxHETdQBMk9tJkZGYhJmLj-vXE5VVEUVY-xIYepihFhRv7p7lMBbcAhBOiyyd41hSHtyvP4aOqbr6vm46tynD7c9Wp8n3UsFY0Z_LXH0tUyXWyC3WG9Xcx3AYURBFxYlBpzkIAYnzjp9gRBWK2EJaXI2Cg3iQICq0LRdpRMNCA3YcQT0rLHRr_ZL2NWe3ch_8o-rNmXVb4Byuo3mg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Misleading Repurposing on Twitter</title><source>arXiv.org</source><creator>Elmas, Tuğrulcan ; Overdorf, Rebekah ; Aberer, Karl</creator><creatorcontrib>Elmas, Tuğrulcan ; Overdorf, Rebekah ; Aberer, Karl</creatorcontrib><description>We present the first in-depth and large-scale study of misleading repurposing, in which a malicious user changes the identity of their social media account via, among other things, changes to the profile attributes in order to use the account for a new purpose while retaining their followers. We propose a definition for the behavior and a methodology that uses supervised learning on data mined from the Internet Archive's Twitter Stream Grab to flag repurposed accounts. We found over 100,000 accounts that may have been repurposed. We also characterize repurposed accounts and found that they are more likely to be repurposed after a period of inactivity and deleting old tweets. We also provide evidence that adversaries target accounts with high follower counts to repurpose, and some make them have high follower counts by participating in follow-back schemes. The results we present have implications for the security and integrity of social media platforms, for data science studies in how historical data is considered, and for society at large in how users can be deceived about the popularity of an opinion.</description><identifier>DOI: 10.48550/arxiv.2010.10600</identifier><language>eng</language><subject>Computer Science - Computers and Society ; Computer Science - Social and Information Networks</subject><creationdate>2020-10</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2010.10600$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2010.10600$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Elmas, Tuğrulcan</creatorcontrib><creatorcontrib>Overdorf, Rebekah</creatorcontrib><creatorcontrib>Aberer, Karl</creatorcontrib><title>Misleading Repurposing on Twitter</title><description>We present the first in-depth and large-scale study of misleading repurposing, in which a malicious user changes the identity of their social media account via, among other things, changes to the profile attributes in order to use the account for a new purpose while retaining their followers. We propose a definition for the behavior and a methodology that uses supervised learning on data mined from the Internet Archive's Twitter Stream Grab to flag repurposed accounts. We found over 100,000 accounts that may have been repurposed. We also characterize repurposed accounts and found that they are more likely to be repurposed after a period of inactivity and deleting old tweets. We also provide evidence that adversaries target accounts with high follower counts to repurpose, and some make them have high follower counts by participating in follow-back schemes. The results we present have implications for the security and integrity of social media platforms, for data science studies in how historical data is considered, and for society at large in how users can be deceived about the popularity of an opinion.</description><subject>Computer Science - Computers and Society</subject><subject>Computer Science - Social and Information Networks</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotjskKwkAQROfiQdQP8KR-QLRn6SxHETdQBMk9tJkZGYhJmLj-vXE5VVEUVY-xIYepihFhRv7p7lMBbcAhBOiyyd41hSHtyvP4aOqbr6vm46tynD7c9Wp8n3UsFY0Z_LXH0tUyXWyC3WG9Xcx3AYURBFxYlBpzkIAYnzjp9gRBWK2EJaXI2Cg3iQICq0LRdpRMNCA3YcQT0rLHRr_ZL2NWe3ch_8o-rNmXVb4Byuo3mg</recordid><startdate>20201020</startdate><enddate>20201020</enddate><creator>Elmas, Tuğrulcan</creator><creator>Overdorf, Rebekah</creator><creator>Aberer, Karl</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20201020</creationdate><title>Misleading Repurposing on Twitter</title><author>Elmas, Tuğrulcan ; Overdorf, Rebekah ; Aberer, Karl</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a670-12f53d5c030558b1ad010502fd42fa44aef7ce940a0f462558439d051e6719ad3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer Science - Computers and Society</topic><topic>Computer Science - Social and Information Networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Elmas, Tuğrulcan</creatorcontrib><creatorcontrib>Overdorf, Rebekah</creatorcontrib><creatorcontrib>Aberer, Karl</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Elmas, Tuğrulcan</au><au>Overdorf, Rebekah</au><au>Aberer, Karl</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Misleading Repurposing on Twitter</atitle><date>2020-10-20</date><risdate>2020</risdate><abstract>We present the first in-depth and large-scale study of misleading repurposing, in which a malicious user changes the identity of their social media account via, among other things, changes to the profile attributes in order to use the account for a new purpose while retaining their followers. We propose a definition for the behavior and a methodology that uses supervised learning on data mined from the Internet Archive's Twitter Stream Grab to flag repurposed accounts. We found over 100,000 accounts that may have been repurposed. We also characterize repurposed accounts and found that they are more likely to be repurposed after a period of inactivity and deleting old tweets. We also provide evidence that adversaries target accounts with high follower counts to repurpose, and some make them have high follower counts by participating in follow-back schemes. The results we present have implications for the security and integrity of social media platforms, for data science studies in how historical data is considered, and for society at large in how users can be deceived about the popularity of an opinion.</abstract><doi>10.48550/arxiv.2010.10600</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2010.10600
ispartof
issn
language eng
recordid cdi_arxiv_primary_2010_10600
source arXiv.org
subjects Computer Science - Computers and Society
Computer Science - Social and Information Networks
title Misleading Repurposing on Twitter
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T13%3A18%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Misleading%20Repurposing%20on%20Twitter&rft.au=Elmas,%20Tu%C4%9Frulcan&rft.date=2020-10-20&rft_id=info:doi/10.48550/arxiv.2010.10600&rft_dat=%3Carxiv_GOX%3E2010_10600%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true