Research Article

Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques

by  Suhas Pandhe, Sahil Pawar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Issue 12
Published: April 2015
Authors: Suhas Pandhe, Sahil Pawar
10.5120/20391-2670
PDF

Suhas Pandhe, Sahil Pawar . Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques. International Journal of Computer Applications. 116, 12 (April 2015), 35-40. DOI=10.5120/20391-2670

                        @article{ 10.5120/20391-2670,
                        author  = { Suhas Pandhe,Sahil Pawar },
                        title   = { Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 116 },
                        number  = { 12 },
                        pages   = { 35-40 },
                        doi     = { 10.5120/20391-2670 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Suhas Pandhe
                        %A Sahil Pawar
                        %T Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques%T 
                        %J International Journal of Computer Applications
                        %V 116
                        %N 12
                        %P 35-40
                        %R 10.5120/20391-2670
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world social networks have become a platform to express opinions or feelings related to current events or any other topics. But sometimes provocative posts related to renowned people, religion, sexuality, countries or any other sensitive topics create havoc in the society. Such posts must be administered and removed before they spread and hurt people's feelings resulting into tension in the society and possible riots. This paper discusses about the techniques to identify such suspicious posts and report them to curb the spread of provoking posts.

References
  • S. Somasundaran and J. Wiebe. Recognizing stances in ideological online debates. In Workshop on Computational Approaches to Analysis and Generation of Emotion in Text, pages 116–124. ACM, 2010
  • Mostafa Karamibekr and Ali A. Ghorbani,Sentiment Analysis of Social Issues. In 2012 International Conference on Social Informatics, Pages 215 – 221. IEEE,2012
  • Data Mining: Concepts and Techniques by Han and Kamber[Online].
  • http://www. codeproject. com/Articles/259241/ID-Decision-Tree-Algorithm-Part
  • Managem MacDougall, R. (2005), Identity, electronic ethos, and blogs: a technological analysis of symbolic exchange on the new news medium, American Behavioral Scientist, Vol. 49, No. 4,575–599.
  • T. Wilson,. , J. Wiebe,. , R. Hwa,. 2004. Just how mad are you? Finding strong and weak opinion clauses. In: the Association for the Advancement of Artificial Intelligence, pp. 761--769.
  • W. Jin, H. Hay Ho, and R. Srihari, 2009. Opinion Miner: A Novel Machine Learning System for Web Opinion Mining and Extraction. Proceeding of International conference on Knowledge Discovery and Data Mining Paris, France.
  • Rakesh Agrawal, Sridhar Rajagopalan, Ramakrishnan Srikant, and Yirong Xu. Mining newsgroups using networks arising from social behavior. In Proceedings of WWW, pages 529–535, 2003.
  • Gharehchopogh, F. S, Khalifelu, Z. A, 2011, Application Data Mining Methods for Detection Useful Knowledge in Health Center: A Case Study Using Decision Tree, International Conference on Computer Applications and Network Security (ICCANS 2011), 1-5.
  • Cecilia Ovesdotter Alm, Dan Roth, and Richard Sproat. Emotions from text: machine learning for text-based emotion prediction. In Proceedings of the Human Language Technology Conference and the Conference on Empirical Methods in Natural Language Processing (HLT/EMNLP), 2005
  • Usama Fayyad;Gregory Piatetsky-Shapiro and Padhraic Smyth,From Data Mining to Knowledge Discovery in Databases. In American Association for Artificial Intelligence,2006
  • Aggarwal, C. : An introduction to social network data analytics. Springer US, 2011
  • Liu, B. : Sentiment analysis and opinion Mining. AAAI-2011, San Francisco, USA, 2011
  • Ku, L. -W. , Liang, Y. -T. , Chen, H. -H. : Opinion extraction, summarization and tracking in news and blog corpora. In Proc. of the AAAI-CAAW'06, 2006
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Data mining Data Analysis ID3 Decision Tree

Powered by PhDFocusTM