Finding Users we Trust: Scaling up Verified Twitter Users Using their Communication Patterns

Authors

  • Martin Hentschel Microsoft
  • Omar Alonso Microsoft
  • Scott Counts Microsoft Research
  • Vasileios Kandylas Microsoft

DOI:

https://doi.org/10.1609/icwsm.v8i1.14569

Keywords:

Twitter, trust, fake accounts, spam, communication

Abstract

We present a technique to identify Twitter users we trust to be regular Twitter users and not spam or fake accounts. The technique starts with an initial set of trusted users based on Twitter's verified users and recursively includes other users the trusted users communicate with. Conversations must be initiated by trusted users. We show that this technique produces a set of users that is over 200 times larger than Twitter's verified users. Our evaluation shows that the share of non-spam users within the resulting set of trusted users is more than 92% while the share of non-spam users within all tweeting users is 74%.

Downloads

Published

2014-05-16

How to Cite

Hentschel, M., Alonso, O., Counts, S., & Kandylas, V. (2014). Finding Users we Trust: Scaling up Verified Twitter Users Using their Communication Patterns. Proceedings of the International AAAI Conference on Web and Social Media, 8(1), 591-594. https://doi.org/10.1609/icwsm.v8i1.14569