ABSTRACT
Abuse and spam in Twitter have long been a pressing issue, and in response, Twitter regularly purges (i.e., suspends in mass) accounts that violate Twitter Rules. However, there is no available information about the characteristics and activities of these regularly purged users. We have developed a novel and comprehensive measurement mechanism to identify millions of purged Twitter users and collect their tweets. We have identified 2.4M purged users and collected 1M tweets made by them over eight months. Using our dataset, we perform a retrospective analysis to characterize their account properties and behavioral activities. We analyze their tweet content to identify their role and abuse strategy over-time.
Our analysis shows that the abuse on Twitter is pervasive globally and not confined in mere spamming. Alarmingly, more than 60% of the purged users survived on Twitter for more than two years. We observe that politics is a major theme among the purged users irrespective of language and location, and these politically motivated users spread controversial content consistently over time. However, the spammers reorient their agenda across time to participate in multiple marketing campaigns. We also discover interaction and associated communities among purged users. Our analysis sheds new light on the evolving nature of abuse in Twitter that can help researchers understanding the characteristics and behavior of emerging malicious users to develop an effective defense system.
- 2017. Facebook Election 2106 Update. https://about.fb.com/news/2017/09/information-operations-update/Google Scholar
- 2018. How Twitter is fighting spam and malicious automation. https://blog.twitter.com/official/en_us/topics/company/2018/how-twitter-is-fighting-spam-and-malicious-automation.htmlGoogle Scholar
- 2018. Twitter Election 2016 Update. https://blog.twitter.com/en_us/topics/company/2018/2016-election-update.htmlGoogle Scholar
- 2018. Twitter is sweeping out accounts like never before.https://www.washingtonpost.com/technology/2018/07/06/twitter-is-sweeping-out-fake-accounts-like-never-before-putting-user-growth-risk/Google Scholar
- 2019. Mueller report. https://www.justice.gov/storage/report.pdfGoogle Scholar
- 2020. iHeartRadio Music Awards. https://en.wikipedia.org/wiki/IHeartRadio_Music_AwardsGoogle Scholar
- 2020. #Qanon. https://en.wikipedia.org/wiki/QAnonGoogle Scholar
- 2020. Twitter terms of services. https://twitter.com/en/tosGoogle Scholar
- Noor Abu-El-Rub and Abdullah Mueen. 2019. BotCamp: Bot-driven Interactions in Social Campaigns. In The World Wide Web Conference. 2529–2535.Google Scholar
- Hunt Allcott and Matthew Gentzkow. 2017. Social media and fake news in the 2016 election. Journal of economic perspectives 31, 2 (2017), 211–36.Google ScholarCross Ref
- Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Sandy Pentland. 2014. Twitter: who gets caught? observed trends in social micro-blogging spam. In Proceedings of the 2014 ACM conference on Web science. ACM, 33–41.Google ScholarDigital Library
- Ahmer Arif, Leo Graiden Stewart, and Kate Starbird. 2018. Acting the part: Examining information operations within# BlackLivesMatter discourse. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 20.Google ScholarDigital Library
- Adam Badawy, Emilio Ferrara, and Kristina Lerman. 2018. Analyzing the digital traces of political manipulation: The 2016 russian interference twitter campaign. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 258–265.Google ScholarCross Ref
- Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. First Monday 21, 11-7 (2016).Google ScholarCross Ref
- Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 477–488.Google ScholarDigital Library
- Eshwar Chandrasekharan, Mattia Samory, Shagun Jhaver, Hunter Charvat, Amy Bruckman, Cliff Lampe, Jacob Eisenstein, and Eric Gilbert. 2018. The Internet’s Hidden Rules: An Empirical Study of Reddit Norm Violations at Micro, Meso, and Macro Scales. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 32.Google ScholarDigital Library
- Nikan Chavoshi, Hossein Hamooni, and Abdullah Mueen. 2016. DeBot: Twitter Bot Detection via Warped Correlation.. In ICDM. 817–822.Google Scholar
- Michael D Conover, Jacob Ratkiewicz, Matthew Francisco, Bruno Gonçalves, Filippo Menczer, and Alessandro Flammini. 2011. Political polarization on twitter. In Fifth international AAAI conference on weblogs and social media.Google Scholar
- Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. Botornot: A system to evaluate social bots. In Proceedings of the 25th international conference companion on world wide web. 273–274.Google ScholarDigital Library
- Munmun De Choudhury. 2011. Tie formation on twitter: Homophily and structure of egocentric networks. In 2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing. IEEE, 465–470.Google Scholar
- Juan Echeverria and Shi Zhou. 2017. Discovery, Retrieval, and Analysis of the’Star Wars’ Botnet in Twitter. In Proceedings of the 2017 IEEE/ACM international conference on advances in social networks analysis and mining 2017. 1–8.Google ScholarDigital Library
- Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016), 96–104.Google ScholarDigital Library
- Jane Im, Eshwar Chandrasekharan, Jackson Sargent, Paige Lighthammer, Taylor Denby, Ankit Bhargava, Libby Hemphill, David Jurgens, and Eric Gilbert. 2019. Still out there: Modeling and Identifying Russian Troll Accounts on Twitter. arXiv preprint arXiv:1901.11162(2019).Google Scholar
- Sarah J Jackson, Moya Bailey, and Brooke Foucault Welles. 2018. # GirlsLikeUs: Trans advocacy and community building online. New Media & Society 20, 5 (2018), 1868–1888.Google ScholarCross Ref
- Zhiwei Jin, Juan Cao, Han Guo, Yongdong Zhang, Yu Wang, and Jiebo Luo. 2017. Detection and analysis of 2016 us presidential election related rumors on twitter. In International conference on social computing, behavioral-cultural modeling and prediction and behavior representation in modeling and simulation. Springer, 14–24.Google ScholarCross Ref
- Huyen Le, GR Boynton, Zubair Shafiq, and Padmini Srinivasan. 2019. A Postmortem of Suspended Twitter Accounts in the 2016 US Presidential Election. (2019).Google Scholar
- Po-Ching Lin and Po-Min Huang. 2013. A study of effective features for detecting long-surviving Twitter spam accounts. In 2013 15th International Conference on Advanced Communications Technology (ICACT). IEEE, 841–846.Google Scholar
- Amanda Minnich, Nikan Chavoshi, Danai Koutra, and Abdullah Mueen. 2017. BotWalk: Efficient adaptive exploration of Twitter bot networks. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017. 467–474.Google ScholarDigital Library
- Mark EJ Newman. 2006. Modularity and community structure in networks. Proceedings of the national academy of sciences 103, 23(2006), 8577–8582.Google ScholarCross Ref
- Jacob Ratkiewicz, Michael D Conover, Mark Meiss, Bruno Gonçalves, Alessandro Flammini, and Filippo Menczer Menczer. 2011. Detecting and tracking political abuse in social media. In Fifth international AAAI conference on weblogs and social media.Google Scholar
- Caitlin M Rivers and Bryan L Lewis. 2014. Ethical research standards in a world of big data. F1000Research 3(2014).Google Scholar
- Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 243–258.Google ScholarDigital Library
- Onur Varol, Emilio Ferrara, Clayton A Davis, Filippo Menczer, and Alessandro Flammini. 2017. Online human-bot interactions: Detection, estimation, and characterization. In Eleventh international AAAI conference on web and social media.Google ScholarCross Ref
- Svitlana Volkova and Eric Bell. 2017. Identifying effective signals to predict deleted and suspended accounts on twitter across languages. In Eleventh International AAAI Conference on Web and Social Media.Google Scholar
- Wei Wei, Kenneth Joseph, Huan Liu, and Kathleen M Carley. 2015. The fragility of Twitter social networks against suspended users. In 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 9–16.Google ScholarDigital Library
- Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web. 71–80.Google ScholarDigital Library
- Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2019. Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls. In Proceedings of the 10th ACM Conference on Web Science. ACM, 353–362.Google ScholarDigital Library
Index Terms
- On Twitter Purge: A Retrospective Analysis of Suspended Users
Recommendations
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web
WWW '19: Companion Proceedings of The 2019 World Wide Web ConferenceOver the past couple of years, anecdotal evidence has emerged linking coordinated campaigns by state-sponsored actors with efforts to manipulate public opinion on the Web, often around major political events, through dedicated accounts, or “trolls.” ...
Suspended accounts in retrospect: an analysis of twitter spam
IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conferenceIn this study, we examine the abuse of online social networks at the hands of spammers through the lens of the tools, techniques, and support infrastructure they rely upon. To perform our analysis, we identify over 1.1 million accounts suspended by ...
A sentiment analysis of audiences on twitter: who is the positive or negative audience of popular twitterers?
ICHIT'11: Proceedings of the 5th international conference on Convergence and hybrid information technologyMicroblogging is a new informal communication medium of blogging that differs from a traditional blog in which content is much shorter. Microbloggers post about topics that describe their current status. Twitter is a popular microblogging service and ...
Comments