Knowledge

Social spam

Source 📝

232:
is a comment that contains strongly offensive content directed against people of a specific race, gender, sexual orientation, etc. According to a Council of Europe survey, across the European Union, 78% of respondents had encountered hate speech online; 40% felt personally attacked or threatened; and
174:
Bulk submissions are a set of comments repeated multiple times with the same or very similar text. These messages, also called as spam-bombs, can come in the form of one spammer sending out duplicate messages to a group of people in a short period of time, or many active spam accounts simultaneously
271:
Fraudulent reviews are reviews of a product or service from users that never actually used it, and therefore insincere or misleading. These are often solicited by the proprietor of the product or service, who contracts positive reviews, known as “reviews-for-hire”. Some companies are attempting to
187:
User-submitted comments that contain swear words or slurs are classified as profanity. Common techniques to circumvent censorship include “cloaking”, which works by using symbols and numbers in place of letters or inserting punctuation inside the word (for example, "w.o.r.d.s" instead of "words").
157:
segments, or use common fan pages or groups to send notes from fraudulent accounts. Such notes may include embedded links to pornographic or other product sites designed to sell something. In response to this, many social networks have included a "report spam/abuse" button or address to contact.
250:
to the user's device, directing the user to sites designed to steal personal information, drawing unaware users into participating in concealed advertising campaigns, and other harmful consequences. Malware can be very dangerous to the user, and can manifest in several forms: viruses, worms,
284:
often try to gain credibility by following verified accounts, such as those for popular celebrities and public figures. If that account owner follows the spammer back, it legitimizes the spam account, enabling it to do more damage.
117:. Recent analysis showed social spammers content preferences changing slightly, with apparel and sports accounting for 36% of all posts. Others included: porn and pills (16%), SEO/web development (23%), and mortgage loans (12%). 165:
Facebook pages with pictures and text asking readers to e.g. "show your support" or "vote" are used to gather likes, comments and shares which improve the pages' ranking. The page is then slightly changed and sold for profit.
83:
Social spam is on the rise, with analysts reporting over a tripling of social spam activity in six months. It is estimated that up to 40% of all social user accounts are fake, depending on the site. In August, 2012,
241:
User-submitted comments can include malicious links that will inappropriately harm, mislead, or otherwise damage a user or computer. These links are most commonly found on video entertainment sites, such as
80:, fake accounts, or real people. Social spammers often capitalize on breaking news stories to plant malicious links or dominate the comment sections of websites with disruptive or offensive content. 212:
User-submitted threats of violence are comments that contain mild or strong threats of physical violence against a person or group. In September 2012, Eric Yee was arrested for making threats in an
648: 514: 395: 196:
User-submitted insults are comments that contain mildly or strongly insulting language against a specific person or persons. These comments range from mild name-calling to severe
204:. Hiding behind a screen name allows users to say mean, insulting comments with anonymity; these bullies rarely have to take responsibility for their comments and actions. 1023:
Ghosh, Saptarshi; Viswanath, Bimal; Kooti, Farshad; Sharma, Naveen Kumar; Korlam, Gautam; Benevenuto, Fabricio; Ganguly, Niloy; Gummadi, Krishna Phani (16 April 2012).
293:
User-submitted comments that inappropriately display full names, physical addresses, email addresses, phone numbers, or credit card numbers are considered leaks of
831: 570: 752: 916: 179:
to trend highly. For example, in 2009, a large number of spam accounts began simultaneously posting links to a website, causing ‘ajobwithgoogle’ to trend.
652: 832:"ESPN aids authorities in arresting a man accused of making threats against children in a post about LeBron James | Ball Don't Lie - Yahoo Sports" 518: 220:
shoes, but quickly turned into a stream of racist and insulting comments, and threats against children. This is a more serious example of social spam.
854: 1464: 894: 474: 941: 878: 972: 600: 488: 1268: 1044: 72:. Over 90% of social network users have experienced social spam in some form. Those doing the “spamming” can be automated 1308: 294: 53: 578: 1283: 1096: 760: 423: 188:
The words are still recognizable by the human eye, though are often missed by website monitors due to the misspelling.
373: 623: 448: 68:
filters became more effective, catching over 95% of these messages, spammers have moved to a new target – the
1060: 809: 1263: 1145: 855:"Eric Yee, Yale Dropout, Allegedly Threatened to Shoot Valencia Schoolkids, Aurora Style, in ESPN Chatroom" 360:. 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb '09). pp. 41–48. 153:
accounts are used for spam. These spammers can utilize the social network's search tools to target certain
358:
Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web - AIRWeb '09
786: 696: 315: – spam targeting users of instant messaging (IM) services, sms or private messages within websites 1303: 88:
admitted through its updated regulatory filing that 8.7% of its 955 million active accounts were fake.
1469: 126: 29: 1278: 1175: 1140: 721: 327: 256: 390: 114: 1113: 1089: 105:
is a comment that has commercial content irrelevant to the discussion at hand. Many of the old
37: 1318: 1288: 1255: 949: 280:
Fake friends occurs when several fake accounts connect or become “friends”. These users or
541: 8: 1293: 1135: 875: 110: 159: 33: 1459: 1273: 1216: 1082: 1040: 468: 369: 25: 1074: 998: 40:(comments, chat, etc.). It can be manifested in many ways, including bulk messages, 1414: 1361: 1032: 1031:. WWW '12. New York, NY, USA: Association for Computing Machinery. pp. 61–70. 404: 391:"A review on social spam detection: Challenges, open issues, and future directions" 361: 356:
Benjamin Markines; Ciro Cattuto; Filippo Menczer (2009). "Social spam detection".
1426: 1396: 1130: 882: 674: 102: 1436: 1406: 1356: 1298: 1221: 1211: 1155: 408: 312: 150: 1453: 1371: 1336: 1236: 1170: 321: 246:. When a user clicks on a malicious link, the result can include downloading 201: 197: 1036: 365: 355: 1419: 1376: 1346: 1196: 217: 1024: 125:
Social networking spam is spam directed specifically at users of internet
1191: 229: 200:. Online bullies often use insults in their interactions, referred to as 154: 49: 1025:"Understanding and combating link farming in the twitter social network" 389:
Rao, Sanjeev; Verma, Anil Kumar; Bhatia, Tarunpreet (30 December 2021).
1351: 1328: 1201: 1160: 1122: 306: 272:
tackle this problem by warning users that not all reviews are genuine.
106: 77: 69: 65: 175:
posting duplicate messages. Bulk messages can cause certain topics or
1386: 1366: 1241: 333: 138: 41: 452: 1431: 1341: 1226: 1206: 1105: 281: 142: 134: 130: 85: 73: 1029:
Proceedings of the 21st international conference on World Wide Web
1313: 1231: 1165: 252: 247: 243: 176: 146: 675:"How do I report spam on Facebook? | Facebook Help Center" 260: 45: 1391: 1150: 216:
comment section. He started out discussing the high price of
876:
kernel (1) / Error - Young People against hate speech online
158:
Spammers, however, frequently change their address from one
999:"Yelp Cracks Down on Fake Reviews With New Consumer Alerts" 213: 109:
content resurfaced on social networks, from Viagra ads, to
895:"Video sites pose highest risk of malicious links in 2011" 1022: 753:"How 'Liking' a page on Facebook makes cash for spammers" 52:, malicious links, fraudulent reviews, fake friends, and 542:"Social Media Spam Increased 355% in First Half of 2013" 336: – Deliberate manipulation of search engine indexes 338:
Pages displaying short descriptions of redirect targets
288: 1104: 973:"Yelp's new weapon against fake reviews: User alerts" 917:"Socializing with malware on Facebook and Twitter..." 539: 489:"What is Social Spam? (And How to Avoid Creating It)" 317:
Pages displaying wikidata descriptions as a fallback
624:"83 million Facebook accounts are fakes and dupes" 780: 778: 540:Franceschi-Bicchierai, Lorenzo (1 October 2013). 1451: 787:"New Twitter spam-bomb offers A Job With Google" 724:Why 'Liking' Facebook virals makes scammers rich 564: 562: 775: 388: 1090: 784: 559: 330: – Paid commercial segment on television 697:"Why is it so difficult to catch a spammer?" 233:1 in 20 have posted hate speech themselves. 829: 568: 1097: 1083: 1061:"Get a high paying social media job today" 571:"'Likejacking': Spammers Hit Social Media" 149:. Experts estimate that as many as 40% of 996: 424:"Social spam is taking over the Internet" 309: – Advertisements on Internet forums 120: 162:to another, and are thus hard to track. 807: 1452: 852: 473:: CS1 maint: archived copy as title ( 1078: 750: 621: 421: 266: 1465:Internet manipulation and propaganda 853:Wilson, Simone (18 September 2012). 997:Fiegerman, Seth (18 October 2012). 970: 808:Hendrie, Alison (5 February 2010). 295:personally identifiable information 289:Personally identifiable information 54:personally identifiable information 13: 1284:Distributed Checksum Clearinghouse 785:Martin Bryant (1 September 2009). 236: 18:Spam on social networking services 14: 1481: 1269:Challenge–response spam filtering 1106:Unsolicited digital communication 1070: 942:"Malware – Good to Know – Google" 830:Kelly Dwyer (19 September 2012). 971:Hsu, Tiffany (18 October 2012). 810:"Complaint Box - Online Insults" 622:Kelly, Heather (3 August 2012). 396:Expert Systems with Applications 1053: 1016: 990: 964: 934: 909: 887: 869: 846: 823: 801: 744: 714: 689: 667: 641: 615: 275: 649:"Impermium – Google Impermium" 593: 533: 515:"Impermium – Google Impermium" 507: 481: 441: 415: 382: 349: 223: 1: 751:Coles, Sarah (15 July 2016). 343: 182: 36:sites, and any website with 7: 569:Olga Kharif (25 May 2012). 422:Tynan, Dan (3 April 2012). 300: 10: 1486: 1304:Naive Bayes spam filtering 409:10.1016/j.eswa.2021.115742 324: – Form of spamdexing 207: 191: 127:social networking services 59: 30:social networking services 1405: 1327: 1254: 1184: 1121: 1112: 897:. Kaspersky. 1 March 2012 1279:Disposable email address 1141:Directory harvest attack 328:Television advertisement 91: 1037:10.1145/2187836.2187846 881:March 28, 2013, at the 366:10.1145/1531914.1531924 169: 115:counterfeit merchandise 96: 121:Social networking spam 38:user-generated content 28:content appearing on 1289:Email authentication 857:. Blogs.laweekly.com 655:on 15 September 2012 111:work-from-home scams 1136:Bulk email software 1063:. 10 November 2022. 952:on 19 October 2011 834:. Sports.yahoo.com 521:on 15 October 2012 455:on 15 October 2011 267:Fraudulent reviews 160:throw-away account 34:social bookmarking 1447: 1446: 1274:Context filtering 1250: 1249: 1046:978-1-4503-1229-5 977:Los Angeles Times 732:. 24 October 2012 1477: 1470:Social influence 1415:Advance-fee scam 1362:Keyword stuffing 1119: 1118: 1099: 1092: 1085: 1076: 1075: 1065: 1064: 1057: 1051: 1050: 1020: 1014: 1013: 1011: 1009: 994: 988: 987: 985: 983: 968: 962: 961: 959: 957: 948:. Archived from 938: 932: 931: 929: 927: 922:. 27 August 2015 913: 907: 906: 904: 902: 891: 885: 873: 867: 866: 864: 862: 850: 844: 843: 841: 839: 827: 821: 820: 818: 816: 805: 799: 798: 796: 794: 782: 773: 772: 770: 768: 759:. Archived from 748: 742: 741: 739: 737: 718: 712: 711: 709: 707: 693: 687: 686: 684: 682: 671: 665: 664: 662: 660: 651:. Archived from 645: 639: 638: 636: 634: 619: 613: 612: 610: 608: 597: 591: 590: 588: 586: 577:. Archived from 566: 557: 556: 554: 552: 537: 531: 530: 528: 526: 517:. Archived from 511: 505: 504: 502: 500: 493:Constant Contact 485: 479: 478: 472: 464: 462: 460: 451:. Archived from 445: 439: 438: 436: 434: 419: 413: 412: 386: 380: 379: 353: 339: 318: 1485: 1484: 1480: 1479: 1478: 1476: 1475: 1474: 1450: 1449: 1448: 1443: 1427:Make Money Fast 1401: 1397:URL redirection 1323: 1246: 1180: 1131:Address munging 1108: 1103: 1073: 1068: 1059: 1058: 1054: 1047: 1021: 1017: 1007: 1005: 995: 991: 981: 979: 969: 965: 955: 953: 940: 939: 935: 925: 923: 915: 914: 910: 900: 898: 893: 892: 888: 883:Wayback Machine 874: 870: 860: 858: 851: 847: 837: 835: 828: 824: 814: 812: 806: 802: 792: 790: 783: 776: 766: 764: 749: 745: 735: 733: 720: 719: 715: 705: 703: 695: 694: 690: 680: 678: 673: 672: 668: 658: 656: 647: 646: 642: 632: 630: 620: 616: 606: 604: 599: 598: 594: 584: 582: 567: 560: 550: 548: 538: 534: 524: 522: 513: 512: 508: 498: 496: 495:. 20 March 2012 487: 486: 482: 466: 465: 458: 456: 449:"Archived copy" 447: 446: 442: 432: 430: 420: 416: 387: 383: 376: 354: 350: 346: 337: 316: 303: 291: 278: 269: 239: 237:Malicious links 228:User-submitted 226: 210: 194: 185: 172: 123: 99: 94: 62: 19: 12: 11: 5: 1483: 1473: 1472: 1467: 1462: 1445: 1444: 1442: 1441: 1440: 1439: 1429: 1424: 1423: 1422: 1411: 1409: 1407:Internet fraud 1403: 1402: 1400: 1399: 1394: 1389: 1384: 1379: 1374: 1369: 1364: 1359: 1357:Google bombing 1354: 1349: 1344: 1339: 1333: 1331: 1325: 1324: 1322: 1321: 1316: 1311: 1306: 1301: 1299:List poisoning 1296: 1291: 1286: 1281: 1276: 1271: 1266: 1260: 1258: 1252: 1251: 1248: 1247: 1245: 1244: 1239: 1234: 1229: 1224: 1219: 1214: 1209: 1204: 1199: 1194: 1188: 1186: 1182: 1181: 1179: 1178: 1173: 1168: 1163: 1158: 1156:Email spoofing 1153: 1148: 1143: 1138: 1133: 1127: 1125: 1116: 1110: 1109: 1102: 1101: 1094: 1087: 1079: 1072: 1071:External links 1069: 1067: 1066: 1052: 1045: 1015: 989: 963: 946:www.google.com 933: 908: 886: 868: 845: 822: 800: 789:. The Next Web 774: 763:on 29 May 2016 743: 713: 688: 666: 640: 614: 592: 581:on 25 May 2012 558: 532: 506: 480: 440: 414: 381: 374: 347: 345: 342: 341: 340: 331: 325: 319: 313:Messaging spam 310: 302: 299: 290: 287: 277: 274: 268: 265: 238: 235: 225: 222: 209: 206: 193: 190: 184: 181: 171: 168: 151:social network 122: 119: 98: 95: 93: 90: 61: 58: 17: 9: 6: 4: 3: 2: 1482: 1471: 1468: 1466: 1463: 1461: 1458: 1457: 1455: 1438: 1435: 1434: 1433: 1430: 1428: 1425: 1421: 1418: 1417: 1416: 1413: 1412: 1410: 1408: 1404: 1398: 1395: 1393: 1390: 1388: 1385: 1383: 1380: 1378: 1375: 1373: 1372:Referrer spam 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1353: 1350: 1348: 1345: 1343: 1340: 1338: 1335: 1334: 1332: 1330: 1326: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1261: 1259: 1257: 1253: 1243: 1240: 1238: 1237:Telemarketing 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1189: 1187: 1183: 1177: 1174: 1172: 1171:Pink contract 1169: 1167: 1164: 1162: 1159: 1157: 1154: 1152: 1149: 1147: 1144: 1142: 1139: 1137: 1134: 1132: 1129: 1128: 1126: 1124: 1120: 1117: 1115: 1111: 1107: 1100: 1095: 1093: 1088: 1086: 1081: 1080: 1077: 1062: 1056: 1048: 1042: 1038: 1034: 1030: 1026: 1019: 1004: 1000: 993: 978: 974: 967: 951: 947: 943: 937: 921: 918: 912: 896: 890: 884: 880: 877: 872: 856: 849: 833: 826: 811: 804: 788: 781: 779: 762: 758: 754: 747: 731: 727: 725: 722:"Yahoo News: 717: 702: 698: 692: 676: 670: 654: 650: 644: 629: 625: 618: 602: 596: 580: 576: 572: 565: 563: 547: 543: 536: 520: 516: 510: 494: 490: 484: 476: 470: 454: 450: 444: 429: 425: 418: 410: 406: 402: 398: 397: 392: 385: 377: 375:9781605584386 371: 367: 363: 359: 352: 348: 335: 332: 329: 326: 323: 322:Spam in blogs 320: 314: 311: 308: 305: 304: 298: 296: 286: 283: 273: 264: 262: 258: 257:Trojan horses 254: 249: 245: 234: 231: 221: 219: 215: 205: 203: 202:cyberbullying 199: 189: 180: 178: 167: 163: 161: 156: 152: 148: 144: 140: 136: 132: 128: 118: 116: 112: 108: 104: 89: 87: 81: 79: 75: 71: 67: 57: 55: 51: 47: 43: 39: 35: 31: 27: 23: 16: 1420:Lottery scam 1381: 1377:Scraper site 1347:Doorway page 1217:Mobile phone 1197:Cold calling 1055: 1028: 1018: 1006:. Retrieved 1002: 992: 980:. Retrieved 976: 966: 954:. Retrieved 950:the original 945: 936: 924:. Retrieved 919: 911: 899:. Retrieved 889: 871: 859:. Retrieved 848: 836:. Retrieved 825: 813:. Retrieved 803: 791:. Retrieved 765:. Retrieved 761:the original 756: 746: 734:. Retrieved 729: 723: 716: 704:. Retrieved 700: 691: 679:. Retrieved 669: 657:. Retrieved 653:the original 643: 631:. Retrieved 627: 617: 605:. Retrieved 595: 583:. Retrieved 579:the original 575:Businessweek 574: 549:. Retrieved 545: 535: 523:. Retrieved 519:the original 509: 497:. Retrieved 492: 483: 457:. Retrieved 453:the original 443: 431:. Retrieved 427: 417: 400: 394: 384: 357: 351: 292: 279: 276:Fake friends 270: 240: 227: 218:LeBron James 211: 195: 186: 173: 164: 124: 100: 82: 63: 24:is unwanted 21: 20: 15: 1382:Social spam 1294:Greylisting 1264:Client-side 1192:Auto dialer 701:Spam Reader 601:"Form 10-Q" 230:hate speech 224:Hate speech 155:demographic 101:Commercial 78:social bots 50:hate speech 22:Social spam 1454:Categories 1387:Spam blogs 1352:Forum spam 1329:Spamdexing 1202:Flyposting 1161:Image spam 1123:Email spam 956:17 January 677:. Facebook 459:5 November 403:: 115742. 344:References 307:Forum spam 107:email spam 70:social web 66:email spam 1367:Link farm 1337:Blog spam 1256:Anti-spam 1222:Newsgroup 1212:Messaging 1114:Protocols 920:BullGuard 815:1 October 659:1 October 603:. Sec.gov 525:1 October 334:Wiki spam 183:Profanity 139:Pinterest 42:profanity 1460:Spamming 1432:Phishing 1342:Cloaking 1319:Spamhaus 1227:Robocall 1207:Junk fax 1008:5 August 1003:Mashable 982:5 August 926:5 August 901:5 August 879:Archived 861:5 August 838:5 August 793:5 August 767:5 August 736:5 August 706:5 August 681:5 August 633:5 August 607:5 August 585:5 August 551:5 August 546:Mashable 499:5 August 469:cite web 433:5 August 301:See also 282:spambots 198:bullying 177:hashtags 143:LinkedIn 135:Facebook 129:such as 86:Facebook 74:spambots 1314:SpamCop 1232:Spambot 1176:Spambot 1166:Joe job 428:ITworld 297:(PII). 253:spyware 248:malware 244:YouTube 208:Threats 192:Insults 147:MySpace 131:Google+ 60:History 46:insults 1043:  372:  261:adware 1437:Voice 1392:Sping 1309:SORBS 1185:Other 1151:DNSWL 1146:DNSBL 730:Yahoo 259:, or 145:, or 113:, to 92:Types 1242:VoIP 1041:ISBN 1010:2016 984:2016 958:2022 928:2016 903:2016 863:2016 840:2016 817:2016 795:2016 769:2016 738:2016 708:2016 683:2016 661:2016 635:2016 609:2016 587:2016 553:2016 527:2016 501:2016 475:link 461:2012 435:2016 370:ISBN 214:ESPN 170:Bulk 103:spam 97:Spam 26:spam 1033:doi 757:AOL 628:CNN 405:doi 401:186 362:doi 64:As 1456:: 1039:. 1027:. 1001:. 975:. 944:. 777:^ 755:. 728:. 699:. 626:. 573:. 561:^ 544:. 491:. 471:}} 467:{{ 426:. 399:. 393:. 368:. 263:. 255:, 141:, 137:, 133:, 56:. 48:, 44:, 32:, 1098:e 1091:t 1084:v 1049:. 1035:: 1012:. 986:. 960:. 930:. 905:. 865:. 842:. 819:. 797:. 771:. 740:. 726:" 710:. 685:. 663:. 637:. 611:. 589:. 555:. 529:. 503:. 477:) 463:. 437:. 411:. 407:: 378:. 364:: 76:/

Index

spam
social networking services
social bookmarking
user-generated content
profanity
insults
hate speech
personally identifiable information
email spam
social web
spambots
social bots
Facebook
spam
email spam
work-from-home scams
counterfeit merchandise
social networking services
Google+
Facebook
Pinterest
LinkedIn
MySpace
social network
demographic
throw-away account
hashtags
bullying
cyberbullying
ESPN

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.