Quantifying information overload in social media and its impact on social contagions
Abstract Information overload has become an ubiquitous problem in modern society. Social
media users and microbloggers receive an endless flow of information, often at a rate far …
media users and microbloggers receive an endless flow of information, often at a rate far …
Breaking the news: First impressions matter on online news
A growing number of people are changing the way they consume news, replacing the
traditional physical newspapers and magazines by their virtual online versions or/and …
traditional physical newspapers and magazines by their virtual online versions or/and …
Inside the right-leaning echo chambers: Characterizing gab, an unmoderated social system
The moderation of content in many social media systems, such as Twitter and Facebook,
motivated the emergence of a new social network system that promotes free speech, named …
motivated the emergence of a new social network system that promotes free speech, named …
Warningbird: A near real-time detection system for suspicious urls in twitter stream
Twitter is prone to malicious tweets containing URLs for spar, phishing, and malware
distribution. Conventional Twitter spar detection schemes utilize account features such as …
distribution. Conventional Twitter spar detection schemes utilize account features such as …
[PDF][PDF] Warningbird: Detecting suspicious urls in twitter stream.
Twitter can suffer from malicious tweets containing suspicious URLs for spam, phishing, and
malware distribution. Previous Twitter spam detection schemes have used account features …
malware distribution. Previous Twitter spam detection schemes have used account features …
PhishAri: Automatic realtime phishing detection on twitter
With the advent of online social media, phishers have started using social networks like
Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely …
Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely …
Misinformation and professional news on largely unmoderated platforms: the case of telegram
To date, there is little research to measure the scale of misinformation and understand how it
spreads on largely unmoderated platforms. Our analysis of 200,000 Telegram posts …
spreads on largely unmoderated platforms. Our analysis of 200,000 Telegram posts …
Phi. sh/$ ocial: the phishing landscape through short urls
Size, accessibility, and rate of growth of Online Social Media (OSM) has attracted cyber
crimes through them. One form of cyber crime that has been increasing steadily is phishing …
crimes through them. One form of cyber crime that has been increasing steadily is phishing …
On word-of-mouth based discovery of the web
Traditionally, users have discovered information on the Web by browsing or searching.
Recently, word-of-mouth has emerged as a popular way of discovering the Web, particularly …
Recently, word-of-mouth has emerged as a popular way of discovering the Web, particularly …
Khaleesi: Breaker of advertising and tracking request chains
Request chains are being used by advertisers and trackers for information sharing and
circumventing recently introduced privacy protections in web browsers. There is little prior …
circumventing recently introduced privacy protections in web browsers. There is little prior …