Académique Documents
Professionnel Documents
Culture Documents
Abstract. Recently, online social networks have been popular for elec-
tion campaigns to monitor public opinion, spread information, and even
try to influence the discussion among the platforms. In this study, we
focus on the collusion of potential political teams or individuals who
attempt to produce discussions and a series of positive/negative com-
ments to support/attack specific candidates. We collect the user behavior
in the most extensive online forum in Taiwan before a national election
and use statistical analysis to identify such users. We also verify the
results by manually reading the published content of the users. From
the results, we hope this study can benefit users to identify underneath
information manipulation and retain the trustiness of online society.
1 Introduction
Online social media such as Twitter, Facebook, and Reddit have been important
platforms for political discussions, as many users publish, endorse and comment
on political issues and their thoughts. Such phenomenon attracts mass media,
political organizations, the government, and even individuals to understand the
online public opinion. Furthermore, scientists use the online data to predict the
election results [7, 10, 11].
With the increasing concentration from the public to these platforms, polit-
ical organizations start to conduct election campaigns on social networks. They
may recruit professional web users, who we called “cyber army,” to monitor dis-
cussions, promote their candidates, and even try to influence the public opinion.
However, when such behaviors become common, normal users are not easy to
distinguish whether messages are from election campaigns or the public. More-
over, some users may leave when they consider cyber armies have flooded the
platforms.
To retain the trustiness of online platforms about the political messages, in
this study, we aim to identify the professional users according to their behaviors.
First, we consider the recruited users should be firm in their political stands.
They may endorse specific candidates and attack other candidates. To investigate
such characteristics, we attempt to address the following research questions.
c Springer Nature Switzerland AG 2019
L. M. Aiello et al. (Eds.): COMPLEX NETWORKS 2018, SCI 813, pp. 437–446, 2019.
https://doi.org/10.1007/978-3-030-05414-4_35
438 M.-H. Wang et al.
2 Related Works
Understanding user influence in social networks is getting more attention from
researchers [1–3, 8]. Many scholars have examined the comments, tweeting, and
retweeting to analyzing user behavior. In [6], Lei et al. identified the character-
istics of the temporal tweeting, retweeting, and commenting on Weibo’s users
to cluster the users into different groups. Jamali et al. [5] used the user’s com-
ments to identify user relationship and predict the popularity of the comment.
To analyze user influence from different microblogging services, Tsugawa et al.
[9] proposed an influencer detection method that used sampling data from Twit-
ter and Facebook to identify influencers. Different metrics have been used for
evaluating the reliability of the method such as degree, closeness, and PageR-
ank. However, this study is not a suitable solution for a social network such as
political networking site due to its special characteristic.
In politics domain, social networks have been used as a tool for diffusion
information and exchanging political opinion. Hoang et al. [4] examined political
tweets in Twitter to evaluate the influence of tweet sentiment on user behavior.
They found that the sentiment impacts the user in different ways. In [13], Wong
et al. proposed a method to infer the political leaning of Twitter users based
on their tweets and retweets. Wang and Lei [12] provide regression models to
predict influence authors and articles by evaluating the very first rating score
and reply quantity.
Some studies have focused on analyzing online messages to predict the elec-
tions. Tumasjan et al. [10] collected 100,000 Twitter messages relating to the
Detecting Cyber Armies Based on Behavioral Analysis 439
3 Methodology
From the crawled dataset, we extracted the articles into 3-subdataset, accord-
ing to the articles related to the 3 major candidates, Wen-Je Ko (the current
mayor of Taipei city), Wen-Chih Yao (nominated by the ruling party, Democratic
Progressive Party), and Shou-Chung Ting (nominated by the major opposition
party, Kuomingtang). A summary of our dataset is demonstrated in Table 1.
4 Result
From Table 1, we can find the current city mayor, Wen-Je Ko, is the most
popular of the three candidates. From Fig. 1, we can see the AUC (area-under-
curve) of Ko is the largest, indicating that Ko receives much more attention
than the other two. From another viewpoint, we can see the distribution of
# comments (x-axis) and # commenters (y-axis) in the same figure. From the
figure, the distributions of the three candidates follow the power-law distribution
(for better readability, we take the logarithm on both axes), which demonstrates
that most of the commenters have a small number of comments while only a
small portion of commenters publish a significant number of comments. These
active commenters appear very often in articles related to candidates. Comparing
with most users who do not comment very often, we consider these users should
be investigated more.
P olarityc = P Rc − N Rc (1)
Fig. 2. Analysis of polarity and number of articles of the top 100 commenters for each
candidate
discussions than in the other two candidates. Because Ko is emerging and getting
popular on the Internet in the last few years, the result is reasonable. We also
find Yao’s commenters are more willing to comment than Ting’s commenters.
Interestingly, we find more comments do not correspond to higher online
ratings, especially for Yao. From Fig. 2, we find the slope of the correlation line
in Ko’s dataset is steeper than Ting’s and Yao’s with a positive relationship.
The results demonstrate the commenters willing to give more positive ratings
toward Ko’s discussions and deliver more negative responses to Yao’s articles
and Ting’s articles. The results match the latest election poll results 1 , where Ko
receives much more support than the other two candidates.
From the above results, we observe some outliers may be our targets, “pro-
fessional users,” who we like to identify in this study. However, from only one
polarity perspective, we consider it is not enough for us to judge these users to
be recruited by candidates. In the following paragraph, we discuss the between-
candidate polarity of each user to investigate.
1
Wikipedia maintains a series of poll results of the 2018 Taipei mayor election, as
shown in this Wiki entry.
Detecting Cyber Armies Based on Behavioral Analysis 443
top 20% commenters with most comments or smallest response time in yellow
diamonds in the figure. From the results, we find user 010 and 063 filtered from
previous analysis responded very fast to articles related to the three candidates.
User 001 and 003 also reply rapidly to articles related to candidates. There are
also multiple users comment a lot on a single candidate and feedback to the
related articles in a short period.
Table 2 shows the polarity and response time of selected users toward
the three candidates. From the table, we find users 010, 063, 001, and 003
responded very fast (the median of response time <20 min) to candidates’ arti-
cles and they show apparent political leaning according to the ratings toward
three candidates2 . Based on the results, we manually verify our results with
the published content from these users. The material posted by the users cor-
responds to the polarity of their ratings toward the candidates. According to
the results, we consider these users are the users we like to identify in our two
research questions.
2
Here we apply a strict threshold (i.e., 20 min) to avoid false positive identification
on cyber armies. Meanwhile, there may be some cyber armies not recognized in the
above results.
444 M.-H. Wang et al.
Fig. 4. Analysis of response time (median) and number of comments of the top 100
commenters for each candidate
Table 2. Polarity and the median of response time (minutes) of selected users
ID Polarity Ko Polarity Yao Polarity Ting Response Ko Response Yao Response Ting
010 132.0 −245.0 −94.0 5.0 4.0 5.0
063 48.0 −17.0 −63.0 6.0 4.0 6.0
052 97.0 −19.0 −29.0 30.0 27.0 22.0
050 156.0 −29.0 −20.0 28.0 27.0 22.0
005 −200.0 2.0 −5.0 113.0 21.0 34.0
001 1,317.0 151.0 61.0 10.0 10.5 9.0
003 486.0 59.0 93.0 18.0 11.5 12.5
5 Conclusion
To decrease the influence of cyber armies of election campaigns and retrain the
trustiness of online platforms, we conduct behavioral analysis to identify poten-
tial recruited users using a 7-month observation of a popular forum. Starting
from analyzing the polarity of users toward candidates, we filter several users
who regularly rate positively/negatively to specific candidates. Second, from
another point of view, we investigate the response time of users after political
discussions were published. Other groups of users are found that they always
respond to articles in only 10 min after articles were posted online. Combining
Detecting Cyber Armies Based on Behavioral Analysis 445
the previous two findings, we manually check the response content of the detected
users, and they indicate their support to specific candidates. From this study, we
provide a study on potential cyber army identification. The main contributions
of this study are 3-fold:
References
1. Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing user behavior
in online social networks. In: Proceedings of the 9th ACM SIGCOMM Conference
on Internet Measurement, pp. 49–62. ACM (2009)
2. Boutet, A., Kim, H., Yoneki, E.: Whats in twitter, i know what parties are popular
and who you are supporting now! Soc. Netw. Anal. Min. 3(4), 1379–1391 (2013)
3. Guo, D., Lin, F., Chen, C.: User behaviors in an online social network. In: IEEE
International Conference on Network Infrastructure and Digital Content, 2009,
IC-NIDC 2009, pp. 430–434. IEEE (2009)
4. Hoang, T.A., Cohen, W.W., Lim, E.P., Pierce, D., Redlawsk, D.P.: Politics, sharing
and emotion in icroblogs. In: Proceedings of the 2013 IEEE/ACM International
Conference on Advances in Social Networks Analysis and Mining, pp. 282–289.
ACM (2013)
446 M.-H. Wang et al.
5. Jamali, S., Rangwala, H.: Digging digg: comment mining, popularity prediction,
and social network analysis. In: International Conference on Web Information Sys-
tems and Mining, 2009. WISM 2009, pp. 32–38. IEEE (2009)
6. Lei, K., et al.: Understanding user behavior in sina weibo online social network: a
community approach. IEEE Access 6, 13302–13316 (2018)
7. O’Connor, B., Balasubramanyan, R., Routledge, B.R., Smith, N.A.: From tweets
to polls: linking text sentiment to public opinion time series. In: Proceedings of the
Fourth International AAAI Conference on Weblogs and Social Media, pp. 122–129.
AAAI Press, Menlo Park, Washington, D.C. (2010)
8. Priambodo, R., Satria, R.: User behavior pattern of mobile online social network
service. In: International Conference on Cloud Computing and Social Networking
(ICCCSN), 2012, pp. 1–4. IEEE (2012)
9. Tsugawa, S., Kimura, K.: Identifying influencers from sampled social networks.
Phys. A: Stat. Mech. Its Appl. 507, 294–303 (2018)
10. Tumasjan, A., Sprenger, T., Sandner, P., Welpe, I.: Predicting elections with Twit-
ter: What 140 characters reveal about political sentiment. In: Proceedings of the
Fourth International AAAI Conference on Weblogs and Social Media, pp. 178–185.
AAAI Press, Menlo Park, Washington, D.C. (2010)
11. Wang, M.H., Lei, C.L.: Boosting election prediction accuracy by crowd wisdom
on social forums. In: 2016 13th IEEE Annual Consumer Communications and
Networking Conference (CCNC), pp. 348–353. IEEE (2016)
12. Wang, M.H., Lei, C.L.: SocialDNA: a novel approach for distinguishing notable
articles and authors through social events. J. Inf. Sci. Eng. 34(6), 1579–1598 (2018)
13. Wong, F.M.F., Tan, C.W., Sen, S., Chiang, M.: Quantifying political leaning from
tweets, retweets, and retweeters. IEEE Trans. Knowl. Data Eng. 28(8), 2158–2172
(2016)