Title

這是業配文嗎?網軍的貼文型態與網絡分析

Translated Titles

Is This a Fake Review? Analytics on Types of Opinion Posting and Social Network of Spammers

Authors

林昱叡

Key Words

社會網絡分析 ; 網軍偵測 ; 虛假評論 ; social network analysis ; spammer detection ; fake reivews ; K-core ; Clique

PublicationName

臺北大學資訊管理研究所學位論文

Volume or Term/Year and Month of Publication

2016年

Academic Degree Category

碩士

Advisor

汪志堅;戴敏育

Content Language

英文

Chinese Abstract

現今社會中,有許多網路寫手存在於各大評論網站,並且這個議題越來越受到許多人的重視。而過去研究中,大多數研究僅針對網路寫手所貼出的文章以及他們的線索進行分析,鮮少根據網路寫手與其它寫手之間會具有一定的關連性進行分析,因此本研究試圖利用社會網絡分析進行偵測網軍。   本研究採用三個實證研究進行偵測網軍,實證研究一發現,以人工的方式無效,但耗費太多的時間、精力及金錢,因此採用自動化的方式進行偵測。實證研究二中採用社會網絡分析特徵值進行分析,並試圖偵測網軍。實證研究三中,則利用社會網絡視覺化的方式進行偵測,將所有作者進行分群,以找到網軍。研究結果顯示,社會網絡分析是可以利用網軍之間的緊密關係找尋網軍。

English Abstract

In recent years, there has many spammer exist in many review websites, and more importantly, the more researchers focus on these issues. However, the past researches focused on the articles spammer wrote and used these articles as a cue to detect them. They few research the relationships among spammers. Thus, this study try the possibility of using social network techniques to detect spammer. This study tried three empirical researches to detect spammers. The result of study 1 indicate that there has no possible to detect by humankind, and it must take a lot of time and money to detect them. Thus, we used an automatic method to detect spammers. The result of study 2, we used social network analysis as features to do it. The result of study 3, we attempt to adopt a real case to analyze the social network of spammers by K-core and Clique analysis. Our research results show that the social connection among spammers is stronger than that among non-spammers. Finally, we propose a novel method of using social network analysis indices as features to detect spammer. The relationship of authors of product reviews posts and their replies might be used for spammer group detection. Moreover, K-cores and cliques can be used as cues to identify spammers.

Topic Category 商學院 > 資訊管理研究所
社會科學 > 管理學
Reference
  1. Borgatti, S. P., Everett, M.G. and Freeman, L.C. (2002). Ucinet for Windows: Software for Social Network Analysis.
    連結:
  2. Chen, Y.-R., & Chen, H.-H. (2015). Opinion spam detection in web forum: a real case study. Paper presented at the Proceedings of the 24th International Conference on World Wide Web.
    連結:
  3. DeBarr, D., & Wechsler, H. (2010). Using social network analysis for spam detection Advances in Social Computing (pp. 62-69): Springer.
    連結:
  4. Freeman, L. C. (1978). Centrality in social networks conceptual clarification. Social networks, 1(3), 215-239.
    連結:
  5. Luo, J. (2010). Lectures on social network analysis. China: Beijing: Social Sciences Academic Press
    連結:
  6. Luo, Q., & Zhong, D. (2015). Using social network analysis to explain communication characteristics of travel-related electronic word-of-mouth on social networking sites. Tourism Management, 46, 274-282.
    連結:
  7. Mukherjee, A., Liu, B., & Glance, N. (2012). Spotting fake reviewer groups in consumer reviews. Paper presented at the Proceedings of the 21st international conference on World Wide Web.
    連結:
  8. Wang, G., Xie, S., Liu, B., & Yu, P. S. (2011). Review graph based online store review spammer detection. Paper presented at the Data mining (icdm), 2011 ieee 11th international conference on.
    連結:
  9. Wernerfelt, B. (1994). On the function of sales assistance. Marketing Science, 13(1), 68-82.
    連結:
  10. Yardi, S., Romero, D., & Schoenebeck, G. (2009). Detecting spam in a twitter network. First Monday, 15(1).
    連結:
  11. Bowden, G. (2015, 10/19). Amazon 'Fake' Reviews Lawsuit Sees 1,114 People Named As 'John Doe' Defendants. Retrieved 5/2, 2016, from http://www.huffingtonpost.co.uk/2015/10/18/amazon-fake-reviews-lawsuit_n_8325172.html
  12. Chang, C.-C., & Lin, C.-J. (2011). LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST), 2(3), 27.
  13. Freeman, L. (2004). The development of social network analysis A Study in the Sociology of Science
  14. Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods (pp. http://faculty.ucr.edu/~hanneman/): University of California Riverside.
  15. Jindal, N., & Liu, B. (2008). Opinion spam and analysis. Paper presented at the Proceedings of the 2008 International Conference on Web Search and Data Mining.
  16. Jindal, N., Liu, B., & Lim, E.-P. (2010). Finding unusual review patterns using unexpected rules. Paper presented at the Proceedings of the 19th ACM international conference on Information and knowledge management.
  17. Lau, R. Y., Liao, S. S., & Xu, K. (2010). An Empirical Study of Online Consumer Review Spam: A Design Science Approach. Paper presented at the ICIS.
  18. Leaks. (2013). Forum beater story. Retrieved 0502, 2016, from http://taiwansamsungleaks.org/
  19. Lim, E.-P., Nguyen, V.-A., Jindal, N., Liu, B., & Lauw, H. W. (2010). Detecting product review spammers using rating behaviors. Paper presented at the Proceedings of the 19th ACM international conference on Information and knowledge management.
  20. Mukherjee, A., Liu, B., Wang, J., Glance, N., & Jindal, N. (2011). Detecting group review spam. Paper presented at the Proceedings of the 20th international conference companion on World wide web.
  21. Ott, M., Cardie, C., & Hancock, J. (2012). Estimating the prevalence of deception in online review communities. Paper presented at the Proceedings of the 21st international conference on World Wide Web.
  22. Srivastava, J., Ahmad, M. A., Pathak, N., & Hsu, D. K.-W. (2008). Data mining based social network analysis from online behavior. Paper presented at the Tutorial at the 8th SIAM International Conference on Data Mining (SDM’08).
  23. W. de Nooy, A. M., V. Batagelj. (2005). Exploratory Social Network Analysis with Pajek. Structural Analysis in the Social Sciences, 27.
  24. Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications (Vol. 8): Cambridge university press.