{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:11:18Z","timestamp":1775283078613,"version":"3.50.1"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2008,10]]},"abstract":"<jats:p>\n            Tagging systems allow users to interactively annotate a pool of shared resources using descriptive strings called\n            <jats:italic>tags<\/jats:italic>\n            . Tags are used to guide users to interesting resources and help them build communities that share their expertise and resources. As tagging systems are gaining in popularity, they become more susceptible to\n            <jats:italic>tag spam<\/jats:italic>\n            : misleading tags that are generated in order to increase the visibility of some resources or simply to confuse users. Our goal is to understand this problem better. In particular, we are interested in answers to questions such as: How many malicious users can a tagging system tolerate before results significantly degrade? What types of tagging systems are more vulnerable to malicious attacks? What would be the effort and the impact of employing a trusted moderator to find bad postings? Can a system automatically protect itself from spam, for instance, by exploiting user tag patterns? In a quest for answers to these questions, we introduce a framework for modeling tagging systems and user tagging behavior. We also describe a method for ranking documents matching a tag based on taggers' reliability. Using our framework, we study the behavior of existing approaches under malicious attacks and the impact of a moderator and our ranking method.\n          <\/jats:p>","DOI":"10.1145\/1409220.1409225","type":"journal-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T12:18:30Z","timestamp":1225196310000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Combating spam in tagging systems"],"prefix":"10.1145","volume":"2","author":[{"given":"Georgia","family":"Koutrika","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Frans Adjie","family":"Effendi","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Zolt\u00b4n","family":"Gy\u00f6ngyi","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Paul","family":"Heymann","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Hector","family":"Garcia-Molina","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"3spots. http:\/\/3spots.blogspot.com\/2006\/01\/all-social-that-can-bookmark.html.  3spots. http:\/\/3spots.blogspot.com\/2006\/01\/all-social-that-can-bookmark.html."},{"key":"e_1_2_1_2_1","unstructured":"Adlam T. 2006. Tag and ping phenomenon. http:\/\/www.optiniche.com\/blog\/174\/tag-and-ping\/.  Adlam T. 2006. Tag and ping phenomenon. http:\/\/www.optiniche.com\/blog\/174\/tag-and-ping\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135869"},{"key":"e_1_2_1_4_1","unstructured":"CiteULike. http:\/\/www.citeulike.org\/.  CiteULike. http:\/\/www.citeulike.org\/."},{"key":"e_1_2_1_5_1","unstructured":"Control N. http:\/\/asp.net\/ajax\/control-toolkit\/live\/NoBot\/NoBot.aspx.  Control N. http:\/\/asp.net\/ajax\/control-toolkit\/live\/NoBot\/NoBot.aspx."},{"key":"e_1_2_1_6_1","unstructured":"del.icio.us. http:\/\/del.icio.us\/.  del.icio.us. http:\/\/del.icio.us\/."},{"key":"e_1_2_1_7_1","unstructured":"Diigo. http:\/\/www.diigo.com\/.  Diigo. http:\/\/www.diigo.com\/."},{"key":"e_1_2_1_8_1","unstructured":"EbiquityBlogger. 2007 http:\/\/ebiquity.umbc.edu\/blogger\/2007\/01\/24\/tag-spam-on-the-rise.  EbiquityBlogger. 2007 http:\/\/ebiquity.umbc.edu\/blogger\/2007\/01\/24\/tag-spam-on-the-rise."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the Collaborative Web Tagging Workshop in conjunction with the 15th International Conference on the World Wide Web.","author":"Farrell S."},{"key":"e_1_2_1_10_1","unstructured":"Flickr. url: http:\/\/www.flickr.com\/.  Flickr. url: http:\/\/www.flickr.com\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506062337"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 32nd International Conference on Very Large Databases. 439--450","author":"Gy\u00f6ngyi Z."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web. 39--47","author":"Gy\u00f6ngyi Z."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 30th International Conference on Very Large Databases. 576--587","author":"Gy\u00f6ngyi Z."},{"key":"e_1_2_1_16_1","first-page":"3","article-title":"Link analysis in web information retrieval","volume":"23","author":"Henzinger M.","year":"2000","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the Collaborative Web Tagging Workshop in conjunction with the 15th International Conference on the World Wide Web.","author":"John A."},{"key":"e_1_2_1_18_1","unstructured":"Jots. http:\/\/www.jots.com\/.  Jots. http:\/\/www.jots.com\/."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244420"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150476"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1149941.1149949"},{"key":"e_1_2_1_22_1","unstructured":"Mathes A. 2004. Folksonomies\u2014cooperative classification and communication through shared metadata. Computer Mediated Communication LIS590CMC (Doctoral Seminar) Graduate School of Library and Information Science University of Illinois Urbana-Champaign.  Mathes A. 2004. Folksonomies\u2014cooperative classification and communication through shared metadata. Computer Mediated Communication LIS590CMC (Doctoral Seminar) Graduate School of Library and Information Science University of Illinois Urbana-Champaign."},{"key":"e_1_2_1_23_1","unstructured":"Merholz P. 2004. Metadata for the masses. http:\/\/www.adaptivepath.com\/ideas\/essays\/archives\/000361.php.  Merholz P. 2004. Metadata for the masses. http:\/\/www.adaptivepath.com\/ideas\/essays\/archives\/000361.php."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135961"},{"key":"e_1_2_1_25_1","unstructured":"MyWeb. http:\/\/myweb2.search.yahoo.com\/.  MyWeb. http:\/\/myweb2.search.yahoo.com\/."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 15th International Conference on the World Wide Web.","author":"Ohkura T."},{"key":"e_1_2_1_27_1","unstructured":"Rawsugar. http:\/\/rawsugar.com\/.  Rawsugar. http:\/\/rawsugar.com\/."},{"key":"e_1_2_1_28_1","unstructured":"RealTravel X. http:\/\/realtravel.com\/.  RealTravel X. http:\/\/realtravel.com\/."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the Collaborative Web Tagging Workshop in conjunction with the 15th International Conference on the World Wide Web.","author":"Schmitz P.","year":"2006"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180904"},{"key":"e_1_2_1_31_1","unstructured":"Slideshare. http:\/\/slideshare.net\/.  Slideshare. http:\/\/slideshare.net\/."},{"key":"e_1_2_1_32_1","unstructured":"Technorati. http:\/\/www.technorati.com\/.  Technorati. http:\/\/www.technorati.com\/."},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Wasserman S. and Faust K. 1994. Social Network Analysis: Methods and Applications. Cambridge University Press Cambridge UK.  Wasserman S. and Faust K. 1994. Social Network Analysis: Methods and Applications. Cambridge University Press Cambridge UK.","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135792"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the Collaborative Web Tagging Workshop in 15th International Conference on the World Wide Web.","author":"Xu Z."},{"key":"e_1_2_1_36_1","unstructured":"YouTube. http:\/\/www.youtube.com\/.  YouTube. http:\/\/www.youtube.com\/."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409220.1409225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1409220.1409225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:21Z","timestamp":1750258041000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409220.1409225"}},"subtitle":["An evaluation"],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["10.1145\/1409220.1409225"],"URL":"https:\/\/doi.org\/10.1145\/1409220.1409225","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10]]},"assertion":[{"value":"2007-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}