Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
An army of me: sockpuppets in online discussion communities
Kumar S., Cheng J., Leskovec J., Subrahmanian V.  WWW 2017 (Proceedings of the 26th International World Wide Web Conference, Perth, Australia,  Apr 3-7, 2017) 857-866. 2017. Type: Proceedings
Date Reviewed: Jun 21 2021

Online discussion platforms have become an important part of social life. However, they may be abused, for instance, to deceive and create an illusion of public consensus or save people from being banned, or to vandalize content on platforms like Wikipedia using “sockpuppets”--sockpuppets are multiple accounts owned by a single user on a single online discussion platform.

The authors use anonymized data from nine discussion platforms; they look at about two million discussions and about 62 million posts, and identify 3656 sockpuppet accounts of 1623 puppetmasters (the owners of such accounts). They study the sockpuppets using linguistic trade analysis, activity and interaction characteristics, and communication network structure features. They classify sockpuppet pairs as pretenders or non-pretenders (depending on the effort to maintain the perception of different accounts) and supporters versus dissenters (based on behavior).

Using the above dataset, they derive options to answer two questions: Is an account a sockpuppet, and are two sockpuppet accounts pairs? First, some of the results seem directly linked to the objective of the puppetmaster, where one endorses the other or otherwise adds to the credibility of the first one. Second, linguistic analysis as a means to identify sockpuppets shows differing characteristics and similarities to other deceptive writings.

This large-scale examination shows that sockpuppets are a real threat. In the cyberworld, they are harder to expose than their equivalent in real life. In a world of fake news and deepfakes, research that helps to detect cheaters in online discussion fora is welcome. The data in this paper can serve as a wake-up call for those who minimize the risk, as well as for those who want a better understanding of the prevalence of the issue. It may encourage researchers to further investigate this topic.

Reviewer:  A. Mariën Review #: CR147290 (2109-0243)
Bookmark and Share
  Editor Recommended
Featured Reviewer
General (H.0 )
Security and Protection (C.2.0 ... )
Social Networking (H.3.4 ... )
World Wide Web (WWW) (H.3.4 ... )
Would you recommend this review?
Other reviews under "General": Date
Incorporating system-level objectives into recommender systems
Abdollahpouri H.  WWW 2019 (Companion Proceedings of the 2019 World Wide Web Conference, San Francisco, CA,  May 13-17, 2019) 2-6, 2019. Type: Proceedings
Jan 20 2022
Integrating runtime data with development data to monitor external quality: challenges from practice
Aghabayli A., Pfahl D., Martínez-Fernández S., Trendowicz A.  SQUADE 2019 (Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, Tallinn, Estonia,  Aug 26, 2019) 20-26, 2019. Type: Proceedings
Jan 18 2022
Distributed joins and data placement for minimal network traffic
Polychroniou O., Zhang W., Ross K.  ACM Transactions on Database Systems 43(3): 1-45, 2018. Type: Article
Jan 13 2022

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy