Quantifying information overload in social media and its impact on social contagions

MG Rodriguez, K Gummadi, B Schoelkopf - Proceedings of the …, 2014 - ojs.aaai.org
Abstract Information overload has become an ubiquitous problem in modern society. Social
media users and microbloggers receive an endless flow of information, often at a rate far …

Breaking the news: First impressions matter on online news

J Rieis, F de Souza, PV de Melo, R Prates… - Proceedings of the …, 2015 - ojs.aaai.org
A growing number of people are changing the way they consume news, replacing the
traditional physical newspapers and magazines by their virtual online versions or/and …

Inside the right-leaning echo chambers: Characterizing gab, an unmoderated social system

L Lima, JCS Reis, P Melo, F Murai… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
The moderation of content in many social media systems, such as Twitter and Facebook,
motivated the emergence of a new social network system that promotes free speech, named …

Warningbird: A near real-time detection system for suspicious urls in twitter stream

S Lee, J Kim - IEEE transactions on dependable and secure …, 2013 - ieeexplore.ieee.org
Twitter is prone to malicious tweets containing URLs for spar, phishing, and malware
distribution. Conventional Twitter spar detection schemes utilize account features such as …

[PDF][PDF] Warningbird: Detecting suspicious urls in twitter stream.

S Lee, J Kim - Ndss, 2012 - academia.edu
Twitter can suffer from malicious tweets containing suspicious URLs for spam, phishing, and
malware distribution. Previous Twitter spam detection schemes have used account features …

PhishAri: Automatic realtime phishing detection on twitter

A Aggarwal, A Rajadesingan… - 2012 eCrime …, 2012 - ieeexplore.ieee.org
With the advent of online social media, phishers have started using social networks like
Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely …

Misinformation and professional news on largely unmoderated platforms: the case of telegram

A Herasimenka, J Bright, A Knuutila… - Journal of Information …, 2023 - Taylor & Francis
To date, there is little research to measure the scale of misinformation and understand how it
spreads on largely unmoderated platforms. Our analysis of 200,000 Telegram posts …

Phi. sh/$ ocial: the phishing landscape through short urls

S Chhabra, A Aggarwal, F Benevenuto… - Proceedings of the 8th …, 2011 - dl.acm.org
Size, accessibility, and rate of growth of Online Social Media (OSM) has attracted cyber
crimes through them. One form of cyber crime that has been increasing steadily is phishing …

On word-of-mouth based discovery of the web

T Rodrigues, F Benevenuto, M Cha… - Proceedings of the …, 2011 - dl.acm.org
Traditionally, users have discovered information on the Web by browsing or searching.
Recently, word-of-mouth has emerged as a popular way of discovering the Web, particularly …

Khaleesi: Breaker of advertising and tracking request chains

U Iqbal, C Wolfe, C Nguyen, S Englehardt… - 31st USENIX Security …, 2022 - usenix.org
Request chains are being used by advertisers and trackers for information sharing and
circumventing recently introduced privacy protections in web browsers. There is little prior …