skip to main content
10.1145/2806416.2806551acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Deep Semantic Frame-Based Deceptive Opinion Spam Analysis

Published:17 October 2015Publication History

ABSTRACT

User-generated content is becoming increasingly valuable to both individuals and businesses due to its usefulness and influence in e-commerce markets. As consumers rely more on such information, posting deceptive opinions, which can be deliberately used for potential profit, is becoming more of an issue. Existing work on opinion spam detection focuses mainly on linguistic features such as n-grams, syntactic patterns, or LIWC. However, deep semantic analysis remains largely unstudied. In this paper, we propose a frame-based deep semantic analysis method for understanding rich characteristics of deceptive and truthful opinions written by various types of individuals including crowdsourcing workers, employees who have expert-level domain knowledge about local businesses, and online users who post on Yelp and TripAdvisor. Using our proposed semantic frame feature, we developed a classification model that outperforms the baseline model and achieves an accuracy of nearly 91%. Also, we performed qualitative analysis of deceptive and truthful review datasets and considered their semantic differences. Finally, we successfully found some interesting features that existing methods were unable to identify.

References

  1. 2013 study: 79% of consumers trust online reviews as much as personal recommendations, "http://searchengineland.com/2013-study-79-of-consumers-trust-online-reviews-as-much-as-personal-recommendations-164565". Accessed: 2015-04-05.Google ScholarGoogle Scholar
  2. A. A. Benczur, K. Csalogany, T. Sarlos, and M. Uher. Spamrank--fully automatic link spam detection work in progress. In Proceedings of the first international workshop on adversarial information retrieval on the web, AIRWeb '05, Chiba, Japan, 2005.Google ScholarGoogle Scholar
  3. C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: Web spam detection using the web topology. In Proceedings of SIGIR, Amsterdam, Netherlands, July 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Feng, R. Banerjee, and Y. Choi. Syntactic stylometry for deception detection. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Fillmore, C. Johnson, and M. Petruck. Background to framenet. International journal of lexicography, 16(3):235, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  6. C. J. Fillmore. Frame semantics and the nature of language. In Origins and Evolution of Language and Speech, 280, 1976.Google ScholarGoogle Scholar
  7. T. Gamerschlag, D. Gerland, R. Osswald, and W. Petersen. Frames and Concept Types: Applications in Language and Philosophy, volume 94 of 0924--4662. Springer International Publishing, 1 edition, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  8. Z. Gyöngyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Proceedings of the Thirtieth international conference on Very large data bases-Volume 30, VLDB '04, pages 576--587, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. Jindal and B. Liu. Opinion spam and analysis. In Proceedings of the 2008 International Conference on Web Search and Data Mining, WSDM '08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. Jindal, B. Liu, and E.-P. Lim. Finding unusual review patterns using unexpected rules. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10, pages 1549--1552, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Li, M. Ott, C. Cardie, and E. Hovy. Towards a general rule for identifying deceptive opinion spam. In Proceedings of the 52th Annual Meeting of the Association for Computational Linguistics, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  12. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Mukherjee, B. Liu, and N. S. Glance. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st World Wide Web Conference, WWW 2012, Lyon, France, April 16-20, 2012, pages 191--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Mukherjee, V. Venkataraman, B. Liu, and N. S. Glance. What yelp fake review filter might be doing? In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8-11, 2013.Google ScholarGoogle Scholar
  15. M. Ott, Y. Choi, C. Cardie, and J. T. Hancock. Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. W. Pennebaker, C. K. Chung, M. Ireland, A. Gonzales, and R. J. Booth. The Development and Psychometric Properties of LIWC2007. Austin, TX, USA LIWC. Net.Google ScholarGoogle Scholar
  17. N. Spirin and J. Han. Survey on web spam detection: principles and algorithms. ACM SIGKDD Explorations Newsletter, 13(2):50--64, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Wang, S. Xie, B. Liu, and P. S. Yu. Review graph based online store review spammer detection. In Proceedings of the 2011 IEEE 11th International Conference on Data Mining, ICDM '11, pages 1242--1247, Washington, DC, USA, 2011. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Deep Semantic Frame-Based Deceptive Opinion Spam Analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CIKM '15: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management
        October 2015
        1998 pages
        ISBN:9781450337946
        DOI:10.1145/2806416

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 October 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CIKM '15 Paper Acceptance Rate165of646submissions,26%Overall Acceptance Rate1,861of8,427submissions,22%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader