Affiliation:
1. Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia
Abstract
It is obvious that one of the most significant challenges posed by Twitter is the proliferation of fraudulent and fake accounts, as well as the challenge of identifying these accounts. As a result, the primary focus of this paper is on the identification of fraudulent accounts, fake information, and fake accounts on Twitter, in addition to the flow of content that these accounts post. The research utilized a design science methodological approach and developed a bot account referred to as “Fake Account Detector” that assists with the detection of inappropriate posts that are associated with fake accounts. To develop this detector, previously published tweets serve as the datasets for the training session. This data comes from Twitter and are obtained through the REST API. The technique of machine learning with random forest (RF) is then used to train the data. The high levels of accuracy (99.4%) obtained from the RF detection results served as the foundation for the development of the bot account. This detector tool, developed using this model, can be utilized by individuals, businesses, and government agencies to assist in the detection and prevention of Twitter problems related to fake news and fake accounts.
Funder
University of Jeddah, Jeddah, Saudi Arabia
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference45 articles.
1. Conger, K., and Hirsch, L. (2023, February 25). Elon Musk Completes $44 Billion Deal to Own Twitter. The New York Times 2022. Available online: https://www.nytimes.com/2022/10/27/technology/elon-musk-twitter-deal-complete.html.
2. A playbook for effective age advocacy on Twitter;Ng;J. Am. Geriatr. Soc.,2022
3. The Role of Twitter in the World of Business;Curran;Int. J. Bus. Data Commun. Netw.,2011
4. Using Twitter™ to drive research impact: A discussion of strategies, opportunities and challenges;Schnitzler;Int. J. Nurs. Stud.,2016
5. Predicting crime using Twitter and kernel density estimation;Gerber;Decis. Support Syst.,2014
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献