The Guardian. Social media overtakes entertainment as favourite online activity. Available at: https://www.theguardian.com/media/2015/sep/02/social‐media‐overtakes‐entertainmemt‐as‐favourite‐online‐activity. (Accessed August 2016).
Perrin, A. Social media usage: 2005–2015; 2015. Available at: http://www.pewinternet.org/files/2015/10/PI_2015‐10‐08_Social‐Networking‐Usage‐2005‐2015_FINAL.pdf, Pew Research Center. (Accessed October 2015).
Friedkin, NE, Jia, P, Bullo, F. A theory of the evolution of social power: natural trajectories of interpersonal influence systems along issue sequences. Sociol Sci 2016, 3:444–472.
Kleinberg, J, Tardos, É. Balanced outcomes in social exchange networks. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC ’08. New York, NY: ACM; 2008, 295–304.
Schumann, DW, Thorson, E. Internet Advertising: Theory and Research. revised ed. Hillsdale, NJ: L. Erlbaum Associates Inc.; 2007.
Chaston, I. Internet Marketing and Big Data Exploitation. Basingstoke, UK: Palgrave MacMillan; 2015.
Li, I, Dey, AK, Forlizzi, J. Understanding my data, myself: supporting self‐reflection with ubicomp technologies. In: Proceedings of the 13th International Conference on Ubiquitous Computing, UbiComp ’11. New York, NY: ACM; 2011, 405–414.
Carty SL. Social Networking Abuse. Available at: http://socialnetworking.lovetoknow.com/Social_Networking_Abuse. (Accessed August 16, 2016).
Livingstone, S. Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self‐expression. New Media Soc 2008, 10:393–411.
Sternberg, J. Misbehavior in Cyber Places: The Regulation of Online Conduct in Virtual Communities on the Internet. Lanham, MI: Rowman %26 Littlefield; 2012.
Mazzetti, M, Gordon, MR. Isis is winning the social media war, U.S. concludes. Available at: http://www.nytimes.com/2015/06/13/world/middleeast/isis‐is‐winning‐message‐war‐us‐concludes.html?_r=1. (Accessed June 2015).
WHOA. HaltAbuse statistics. Available at: http://www.haltabuse.org. (Accessed August 16, 2016).
Stop Forum SPam. Available at: http://www.stopforumspam.com. (Accessed August 16, 2016).
Diener, E, Lusk, R, DeFour, D, Flax, R. Deindividuation: effects of group size, density, number of observers, and group member similarity on self‐consciousness and disinhibited behavior. J Pers Soc Psychol 1980, 39:449.
Festinger, L, Pepitone, A, Newcomb, T. Some consequences of de‐individuation in a group. J Abnorm Soc Psychol 1952, 47:382.
Postmes, T, Spears, R. Deindividuation and antinormative behavior: a meta‐analysis. Psychol Bull 1998, 123:238–259.
Kiesler, S, Lee, S. Group decision making and communication technology. Organ Behav Hum Decis Process June 1992, 52:96–123.
Nazir, A, Raza, S, Chuah, C‐N, Schipper, B. Ghostbusting facebook: detecting and characterizing phantom profiles in online social gaming applications. In: Proceedings of the 3rd Conference on Online Social Networks, WOSN’10. Berkeley, CA: USENIX Association; 2010, 1–1.
Benevenuto, F, Rodrigues, T, Cha, M, Almeida, V. Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’09, Chicago, IL, USA, 2009, 49–62.
Baker, M. 1,500 scientists lift the lid on reproducibility. Nature May 2016, 533:452–454.
Chen, W, Wang, C, Wang, Y. Scalable influence maximization for prevalent viral marketing in large‐scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington DC, DC, USA, 2010, 1029–1038.
De Bruyn, A, Lilien, GL. A multi‐stage model of word‐of‐mouth influence through viral marketing. Int J Res Market 2008, 25:151–163.
Rodriguez, P. Web infrastructure for the 21st century; 2009. Available at: https://www.scribd.com/doc/14645918/WWW09KeynotePabloRodriguez. (Accessed August 16, 2016).
Bruckman, A, Danis, C, Lampe, C, Sternberg, J, Waldron, C. Managing deviant behavior in online communities. In: CHI Extended Abstracts, Montreal, Quebec, Canada, 2006, 21–24.
Davis, NJ. Labeling theory in deviance research: a critique and reconsideration. Sociol Q 1972, 13:447–474.
Denegri‐Knott, J, Taylor, J. The labeling game: a conceptual exploration of deviance on the internet. Soc Sci Comput Rev 2005, 23:93–107.
Shaver, P, Schwartz, J, Kirson, D, O`Connor, C. Emotion knowledge further exploration of a prototype approach. J Pers Soc Psychol 1987, 52:1061–1086.
Suler, JR, Phillips, WL. The bad boys of cyberspace: deviant behavior in a multimedia chat community. CyberPsychol Behav 1998, 1:275–294.
Griffin, C, Squicciarini, A. Toward a game theoretic model of information release in social media with experimental results. In: Proceedings of the 2nd Workshop on Semantic Computing and Security, San Francisco, CA, 28 May, 2012.
Squicciarini, A, Griffin, C. An informed model of personal information release in social networking sites. In: 2012 ASE/IEEE Conference on Privacy, Security, Risk and Trust, Amsterdam, Netherlands, September 2012, 3–5.
Antonucci, A, de Campos, CP. Decision making by credal nets. In: 2011 International Conference on Intelligent Human‐Machine Systems and Cybernetics (IHMSC), vol 1, Washington, DC, USA, August 2011, 201–204.
Lee, K, Caverlee, J, Webb, S. Uncovering social spammers: social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, Geneva, Switzerland, 2010, 435–442.
Moh, T‐S, Murmann, AJ. Can you judge a man by his friends? Enhancing spammer detection on the twitter microblogging platform using friends and followers. In Proc. 4th International Conference on Information Systems, Technology and Management, Bangkok, Thailand, 2010:210–220.
Sureka, A. Mining user comment activity for detecting forum spammers in youtube. CoRR, abs/1103.5044, 2011.
Wang, AH. Detecting spam bots in online social networking sites: a machine learning approach. In: Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec’10. Berlin/Heidelberg: Springer‐Verlag; 2010, 335–342.
Xing, X, Liang, Y‐L, Huang, S, Cheng, H, Han, R, Lv, Q, Xue, L, Mishra, S, Zhu, Y. Scalable misbehavior detection in online video chat services. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’12. New York, NY: ACM; 2012, 552–560.
Blackburn, J, Simha, R, Long, C, Zuo, X, Kourtellis, N, Skvoretz, J, Iamnitchi, A. Cheaters in a gaming social network. ACM SIGMETRICS Perform Eval Rev 2011, 39:101–103.
Squicciarini, AC, McGill, W, Petracca, G, Huang, S. Early detection of policies violations in a social media site: a bayesian belief network approach. In: 2012 I.E. International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, NC, USA, July 2012, 45–52.
Squicciarini, A, Griffin, C. Why and how to deceive: game results with sociological evidence. Soc Netw Anal Min 2014, 4:1–13.
Kayes, I, Kourtellis, N, Quercia, D, Iamnitchi, A, Bonchi, F. The social world of content abusers in community question answering. In: Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, Florence, Italy, 2015, 570–580.
Chhabra, S, Aggarwal, A, Benevenuto, F, Kumaraguru, P. Phi.sh/$ocial: the phishing landscape through short urls. In: 8th Annual Collaboration, Electronic Messaging, Anti‐Abuse and Spam Conference, CEAS ’11, Perth, Australia, 2011, 92–101.
Gao, H, Hu, J, Wilson, C, Li, Z, Chen, Y, Zhao, BY. Detecting and characterizing social spam campaigns. In: 10th Annual Conference on Internet Measurement, IMC ’10, Melbourne, Australia, 2010, 35–47.
Bully on Line. Issues related to cyber bullies. Available at: http://www.bullyonline.org/related/cyber.htm. (Accessed August 16, 2016).
Bullying Statistics. Anti‐bullying help, facts, and more. Available at: http://www.bullyingstatistics.org/. (Accessed August 2016).
Sabella, RA, Patchin, JW, Hinduja, S. Cyberbullying myths and realities. Comput Human Behav 2013, 29:2703–2711.
Nadali, S, Murad, MAA, Sharef, NM, Mustapha, A, Shojaee, S. A review of cyberbullying detection: an overview. In: 2013 13th International Conference on Intellient Systems Design and Applications, Universiti Putra Malaysia, Malaysia, December 2013, 325–330.
Huang, Q, Singh, VK, Atrey, PK. Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd International Workshop on Socially‐Aware Multimedia, SAM ’14, Orlando, FL, USA, 2014, 3–6.
Squicciarini, A, Rajtmajer, S, Liu, Y, Griffin, C. Identification and characterization of cyberbullying dynamics in an online social network. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ASONAM ’15. New York, NY: ACM; 2015, 280–285.
Nobata, C, Tetreault, J, Thomas, A, Mehdad, Y, Chang, Y. Abusive language detection in online user content. In: Proceedings of the 25th International Conference on World Wide Web, WWW ’16. Republic and Canton of Geneva: International World Wide Web Conferences Steering Committee; 2016, 145–153.
Hu, X, Tang, Jiliang, Zhang, Yanchao, Liu, Huan. Social spammer detection in microblogging. In: Proceedings of the Twenty‐Third International Joint Conference on Artificial Intelligence, IJCAI’13, Beijing, China, 2013, 2633–2639.
Java, A, Kolari, P, Finin, T, Oates, T. Modeling the spread of influence on the blogosphere. In: Proceedings of the 15th International World Wide Web Conference, Edinburgh, Scotland UK, 2006, 22–26.
Kantchelian, A, Ma, J, Huang, L, Afroz, S, Joseph, A, Tygar, JD. Robust detection of comment spam using entropy rate. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec ’12. New York, NY: ACM; 2012, 59–70.
Sridharan, V, Shankar, V, Gupta, M. Twitter games: how successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC ’12. New York, NY: ACM; 2012, 389–398.
Thomas, K, Grier, C, Song, D, Paxson, Vern. Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11. New York, NY: ACM; 2011, 243–258.
Antonakaki, D, Polakis, I, Athanasopoulos, E, Ioannidis, S, Fragopoulou, P. Exploiting abused trending topics to identify spam campaigns in twitter. Soc Netw Anal Min 2016, 6:1–11.
Chen, C, Wen, S, Zhang, J, Xiang, Y, Oliver, J, Alelaiwi, A, Hassan, MM. Investigating the deceptive information in twitter spam. Future Gener Comput Syst. In press.
Liu, C, Wang, J, Lei, K. Detecting spam comments posted in micro‐blogs using the self‐extensible spam dictionary. In: 2016 I.E. International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016, 1–7.
Xu, H, Sun, W, Javaid, A. Efficient spam detection across online social networks. In: 2016 I.E. International Conference on Big Data Analysis (ICBDA), Hang Zhou, China, March 2016, 1–6.
Boyd, J. In community we trust: online security communication at ebay. J Comput Mediat Commun 2002, 7.
David, S, Pinch, T. Six degrees of reputation: the use and abuse of online review and recommendation systems. First Monday 2006, 11.
Douceur, JR. The sybil attack. In: Proceedings of the First International Workshop on Peer‐to‐Peer Systems, Cambridge, MA, USA, 2004.
Castro, M, Druschel, P, Ganesh, A, Rowstron, A, Wallach, DS. Secure routing for structured peer‐to‐peer overlay networks. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, OSDI ’02. Berkeley, CA: USENIX Association; 2002, 299–314.
Cheng, A, Friedman, E. Sybil proof reputation mechanisms. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer‐to‐Peer Systems, P2PECON ’05. New York, NY: ACM, 2005, 128–132.
DeFigueiredo, DB, Barr, ET. Trustdavis: a non‐exploitable online reputation system. In: Seventh IEEE International Conference on E‐Commerce Technology (CEC’05), Newport Beach, CA, USA, July 2005, 274–283.
Kesidis, G, Tangpong, A, Griffin, C. A sybil‐proof referral system based on multiplicative reputation chains. IEEE Commun Lett 2009, 13:862–864.
DiMicco, J, Millen, D. Identity management: multiple presentations of self in facebook. In: GROUP ’07: Proceedings of the 2007 International ACM Conference on Supporting Group Work. New York, NY: ACM; 2007, 383–386.
Lampe, CAC, Ellison, N, Steinfield, C. A familiar face(book): profile elements as signals in an online social network. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’07, San Jose, CA, USA, 2007, 435–444.
Stutzman, F. An evaluation of identity‐sharing behavior in social network communities. iDMAa J 2006, 3.
Ahn, G‐J, Ko, M, Shehab, M. Privacy‐enhanced user‐centric identity management. In: IEEE International Conference on Communications, Dresden, Germany, 2009, 1–5.
Ahern, S, Eckles, D, Good, NS, King, S, Naaman, M, Nair, R. Over‐exposed? Privacy patterns and considerations in online and mobile photo sharing. In: CHI ’07: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, 2007, 357–366.
Goffman, E. The Presentation of Self in Everyday Life. New York City, NY: Random House; 1959.
Donath, J. Signals, Truth and Design. Forthcoming.
Wilson, C, Sala, A, Puttaswamy, KPN, Zhao, BY. Beyond social graphs: user interactions in online social networks and their implications. ACM Trans Web 2012, 6:17:1–17:31.
Burke, M, Marlow, C, Lento, T. Feed me: motivating newcomer contribution in social network sites. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI ’09, Boston, MA, USA, 2009, 945–954.
Bhagat, S, Cormode, G, Krishnamurthy, B, Srivastava, D. Privacy in dynamic social networks. In: WWW ’10: Proceedings of the 19th International Conference on World Wide Web, Raleigh, NC, USA, 2010, 1059–1060.
Liu, K, Terzi, E. Towards identity anonymization on graphs. In: SIGMOD ’08: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. New York, NY: ACM; 2008, 93–106.
Thompson, B, Yao, D. The union‐split algorithm and cluster‐based anonymization of social networks. In: ASIACCS ’09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. New York, NY: ACM; 2009, 218–227.
Hogg, T, Adamic, L. Enhancing reputation mechanisms via online social networks. In: EC ’04: Proceedings of the 5th ACM Conference on Electronic Commerce. New York, NY: ACM; 2004. 236–237.
Windley, PJ, Daley, D, Cutler, B, Tew, K. Using reputation to augment explicit authorization. In: DIM ’07: Proceedings of the 2007 ACM Workshop on Digital Identity Management. New York, NY: ACM; 2007, 72–81.
Nurmi, P. A bayesian framework for online reputation systems. In: International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications, 2006, AICT‐ICIW ’06, Guadeloupe, French Caribbean, February 2006, 121.
Bolton, G, Katok, E, Ockenfels, A. How Effective Are Online Reputation Mechanisms? Papers on Strategic Interaction 2002–25. Jena, Germany: Max Planck Institute of Economics, Strategic Interaction Group; 2002.
Shapiro, C. Consumer Information, Product Quality, and Seller Reputation. The Bell Journal of Economics Spring, 1982, 13:20–35.
IEEE. Third IEEE conference on decision theory and game for security. Available at: http://www.gamesec‐conf.org. (Accessed August 16, 2016).
Ely, J, Fundenberg, D, Levine, DK. When is reputation bad? Games Econ Behav 2008, 63:498–526.
Aberer, K, Despotovic, Z. On Reputation in Game Theory Application on Online Settings. 2004.
Kleinberg, J, Papadimitriou, CH, Raghavan, P. On the value of private information. In: Proceedings of the 8th Conference on Theoretical Aspects of Rationality and Knowledge, TARK ’01. San Francisco, CA: Morgan Kaufmann Publishers Inc; 2001, 249–257.
Nguyen, KC, Alpcan, T, Basar, T. Stochastic games for security in networks with interdependent nodes. CoRR, abs/1003.2440, 2010.
Alpcan, T, Örencik, C, Levi, A, SavaS¸, E. A game theoretic model for digital identity and trust in online communities. In: ASIACCS ’10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010, 341–344.
Guadagno, RE, Okdie, BM, Kruse, SA. Dating deception: gender, online dating, and exaggerated self‐presentation. Comput Human Behav 2012, 28:642–647.
Huang, JM, Stringhini, G, Yong, P. Quit playing games with my heart: understanding online dating scams. In: Almgren M, Gulisano V, Maggi F. (eds.). Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2015.
Rajtmajer, S, Griffin, C, Squicciarini, A. Determining a Discrete Set of Site‐Constrained Privacy Options for Users in Social Networks Through Stackelberg Games. Cham: Springer International Publishing; 2015, 208–227.
Rajtmajer, S, Squicciarini, A, Griffin, C, Karumanchi, S, Tyagi, A. Constrained social‐energy minimization for multi‐party sharing in online social networks. In: Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’16. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems; 2016, 680–688.
Bakshy, E, Rosenn, I, Marlow, C, Adamic, LA. The role of social networks in information diffusion. In: WWW, Lyon, France, 2012.
Cheng, J, Adamic, LA, Kleinberg, JM, Leskovec, J. Do cascades recur? In: Proceedings of the 25th International Conference on World Wide Web, WWW ’16. Republic and Canton of Geneva: International World Wide Web Conferences Steering Committee; 2016, 671–681.
Gruhl, D, Guha, R, Liben‐Nowell, D, Tomkins, A. Information diffusion through blogspace. In: WWW, New York, NY, USA, 2004.
Yang, J, Counts, S. Predicting the speed, scale, and range of information diffusion in twitter. In: ICSWM, Washington DC, USA, 2010.
Gladwell, M. The Tipping Point: How Little Things Can Make a Big Difference. New York, NY: Back Bay Books; 2002.
Kielhöfer, H. Bifurcation Theory. New York, NY: Springer; 2012.
Arnold, VI. Catastrophe Theory. New York, NY: Springer; 2004.
Granovetter, M. Threshold models of collective behavior. Am J Sociol 1978, 83:1420–1443.
Easley, D, Kleinberg, J. Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge, UK: Cambridge University Press; 2010.
Friedkin, NE, Johnsen, EC. Social Influence Network Theory: A Sociological Examination of Small Group Dynamics. Cambridge, UK: Cambridge University Press; 2011.
Styer, S, Squicciarini, A, Griffin, C. Identifying multi‐regime behaviors of memes in twitter data. In: Proceedings of the Science and Information Conference, London, UK, 27–29 August, 2014.
Hethcote, HW. The mathematics of infectious diseases. SIAM Rev 2000, 42:599–653.
Coviello, L, Sohn, Y, Kramer, ADI, Marlow, C, Franceschetti, M, Christakis, NA, Fowler, JH. Detecting emotional contagion in massive social networks. PLoS ONE 2014, 9:e90315.
Kramer, ADI, Guillory, JE, Hancock, JT. Experimental evidence of massive‐scale emotional contagion through social networks. Proc Natl Acad Sci USA 2014, 111:8788–8790.
Christakis, NA, Fowler, JH. The spread of obesity in a large social network over 32 years. N Engl J Med 2007, 357:370–379. PMID: 17652652.
Christakis, NA, James, H. Fowler Social contagion theory: examining dynamic social networks and human behavior. Stat Med 2013, 32:556–577.
Cohen‐Cole, E, Fletcher, JM. Is obesity contagious? Social networks vs. environmental factors in the obesity epidemic. J Health Econ 2008, 27:1382–1387.
Liao, C, Squicciarini, A, Griffin, C, Rajtmajer, S. A hybrid epidemic model for deindividuation and antinormative behavior in online social networks. Soc Netw Anal Min 2016, 6:1–11.
Canuto, C, Fagnani, F, Tilli, P. An eulerian approach to the analysis of krause`s consensus models. SIAM J Control Opt 2012, 50:243–265.
Cucker, F, Smale, S. Emergent Behavior in Flocks. IEEE Trans Autom Control 2007, 52:852–862.