Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Social media

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Use Of Verified Twitter Accounts During Crisis Events, Kai Anderson Aug 2018

Use Of Verified Twitter Accounts During Crisis Events, Kai Anderson

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This thesis reports on the use of verified Twitter accounts during crisis events. Twitter is a social media platform that allows users to broadcast and exchange public text messages and it can be used as a communication tool during crisis events. Verified Twitter accounts are those accounts that Twitter has investigated and found to be genuinely maintained by the claimed owner. Celebrities, public officials, and other well-known persons or companies often seek this account status. The owners of these accounts are likely to provide more accurate or relevant information during a crisis event because they represent a brand, whether themselves …


Fake And Spam Messages: Detecting Misinformation During Natural Disasters On Social Media, Meet Rajdev May 2015

Fake And Spam Messages: Detecting Misinformation During Natural Disasters On Social Media, Meet Rajdev

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

During natural disasters or crises, users on social media tend to easily believe contents of postings related to the events, and retweet the postings, hoping that the postings will be reached by many other users. Unfortunately, there are malicious users who understand the tendency and post misinformation such as spam and fake messages with expecting wider propagation. To resolve the problem, in this paper we conduct a case study of the 2013 Moore Tornado and Hurricane Sandy. Concretely, we (i) understand behaviors of these malicious users; (ii) analyze properties of spam, fake and legitimate messages; (iii) propose flat and hierarchical …