{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:44Z","timestamp":1750306184002,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":33,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1145\/2971603.2971646","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Detecting blog spam hashtags using topic modeling"],"prefix":"10.1145","author":[{"given":"Yoonjin","family":"Hyun","sequence":"first","affiliation":[{"name":"Kookmin University, Seongbuk-gu, Seoul, Korea"}]},{"given":"Namgyu","family":"Kim","sequence":"additional","affiliation":[{"name":"Kookmin University, Seongbuk-gu, Seoul, Korea"}]}],"member":"320","reference":[{"key":"key-10.1145\/2971603.2971646-1","unstructured":"Economist Intelligence Unit. 2011. Big Data Harnessing a Game-Changing Asset. The Economist."},{"key":"key-10.1145\/2971603.2971646-2","unstructured":"McKinsey Global Institute. 2011. Big Data: The next Frontier for Innovation, Competition, and Productivity. McKinsey and Company."},{"key":"key-10.1145\/2971603.2971646-3","unstructured":"Gartner Inc. 2012. 2012 Hype Cycle for Emerging Technologies. Gartner Inc."},{"key":"key-10.1145\/2971603.2971646-4","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Xiang, Y., and Zhou, W. 2016. Spammers Are Becoming \"Smarter\" on Twitter. Browse Journals &#38; Magazines. 18, 2. DOI= http:\/\/dx.doi.org\/10.1109\/mitp.2016.36","DOI":"10.1109\/MITP.2016.36"},{"key":"key-10.1145\/2971603.2971646-5","doi-asserted-by":"crossref","unstructured":"Liu, B. 2012. Sentiment Analysis and Opinion Mining. Syntehesis Lectures on Human Language Technologies #16, Morgan &#38; Claypool Publisiers.","DOI":"10.1007\/978-3-031-02145-9"},{"key":"key-10.1145\/2971603.2971646-6","unstructured":"Egele, M., Stringhini, G., Kruegel, C., and Vigna, G. 2013. Compa: Detecting Compromised Accounts on Social Networks. Proc. Ann. Network and Distributed System Security Symp. https:\/\/www.cs.ucsb.edu\/~vigna\/publications\/2013_NDSS_compa.pdf."},{"key":"key-10.1145\/2971603.2971646-7","doi-asserted-by":"crossref","unstructured":"Song, J., Lee, S., and Kim, J. 2011. Spam Filtering in Twitter Using Sender-Receiver Relationship. Recent Advances in Intrusion Detection. Volume 6961 of the series Lecture Notes in Computer Science. 301--317. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-23644-0_16","DOI":"10.1007\/978-3-642-23644-0_16"},{"key":"key-10.1145\/2971603.2971646-8","doi-asserted-by":"crossref","unstructured":"Yarde, S., Romero, D., Schoenebeck, G., and Boyd, D. 2010. Detecting Spam in a Twitter Network. Peer-reviewed journal on the Internet. 15, 1(January. 2010). DOI= http:\/\/dx.doi.org\/10.5210\/fm.v15i1.2793","DOI":"10.5210\/fm.v15i1.2793"},{"key":"key-10.1145\/2971603.2971646-9","unstructured":"Wang, A. H. 2010. Don't Follow Me: Spam Detection in Twitter. Security and Cryptography(SECRYPT), Proceedings of the 2010 International Conference on, (July 26-28. 2010)."},{"key":"key-10.1145\/2971603.2971646-10","doi-asserted-by":"crossref","unstructured":"Ma, Y., Niu, Y., Ren, Y., and Xue, Y. 2013. Detecting Spam on Sina Weibo. International Workshop on Cloud Computing and Information Security(CCIS), (October. 2013). DOI= http:\/\/dx.doi.org\/10.2991\/ccis-13.2013.93","DOI":"10.2991\/ccis-13.2013.93"},{"key":"key-10.1145\/2971603.2971646-11","doi-asserted-by":"crossref","unstructured":"Lee, S. and Kim, J. 2013. Warningbird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream. IEEE Transactions on Dependable and Secure Computing. 10, 3 (April. 2013), 183--195. DOI= http:\/\/dx.doi.org\/10.1109\/tdsc.2013.3","DOI":"10.1109\/TDSC.2013.3"},{"key":"key-10.1145\/2971603.2971646-12","unstructured":"Han, J., Kamber, M., and Pei, J. 2011. Data Mining: Concepts and Techniques, 3rd Edition, Morgan Kaufmann Publishers."},{"key":"key-10.1145\/2971603.2971646-13","doi-asserted-by":"crossref","unstructured":"Mooney, R. J. and Bunescu, R. 2006. Mining Knowledge from Text using Information Extraction. ACM SIGKDD Explorations Newsletter - Natural language processing and text mining, 7, 1(June. 2006), 3--10. DOI= http:\/\/dx.doi.org\/10.1145\/1089815.1089817","DOI":"10.1145\/1089815.1089817"},{"key":"key-10.1145\/2971603.2971646-14","unstructured":"Rijsbergen, C. J. V., Information Retrieval, 2nd edition, Butterworth, London, 1979."},{"key":"key-10.1145\/2971603.2971646-15","unstructured":"Kim, K. and Ahn. H. 2005. Development of Web-based Intelligent Recommender Systems using Advanced Data Mining Techniques. Journal of Information Technology Applications and Management. 12, 3 (September. 2005), 41--56."},{"key":"key-10.1145\/2971603.2971646-16","unstructured":"Hur, J. and Kim, J. W. 2008. Characteristics on Inconsistency Pattern Modeling as Hybrid Data Mining Techniques. Journal of Information Technology Applications and Management, 15, 1 (March. 2008), 225--242."},{"key":"key-10.1145\/2971603.2971646-17","unstructured":"Hwang, I. 2004. A Study on Dynamic Query Expansion Using Web Mining in Information Retrieval. Journal of Information Technology Applications and Management. 11, 2 (June. 2004), 227--237."},{"key":"key-10.1145\/2971603.2971646-18","doi-asserted-by":"crossref","unstructured":"Weiss, S. M., Indurkhya, N., and Zhang, T. 2010. Fundamentals of Predictive Text Mining, Springer.","DOI":"10.1007\/978-1-84996-226-1"},{"key":"key-10.1145\/2971603.2971646-19","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim. N., and Cho, Y. 2014. User-Perspective Issue Clustering Using Multi-Layered Two-Mode Network Analysis. Journal of Intelligence and Information Systems. 20, 2 (June. 2014), 93--107. DOI=http:\/\/dx.doi.org\/10.13088\/jiis.2014.20.2.093","DOI":"10.13088\/jiis.2014.20.2.093"},{"key":"key-10.1145\/2971603.2971646-20","doi-asserted-by":"crossref","unstructured":"Hyun, Y., Kim, N., and Cho, Y. 2015. A Multi-Dimensional Issue Clustering from the Perspective Consumers' Interests and R&#38;D. Journal of Information Technology Services. 14, 1 (March. 2015), 237--249. DOI=http:\/\/dx.doi.org\/10.9716\/KITS.2015.14.1.237","DOI":"10.9716\/KITS.2015.14.1.237"},{"key":"key-10.1145\/2971603.2971646-21","unstructured":"Choi, S., Hyun, Y., and Kim, N. 2015. Improving Performance of Recommendation Systems Using Topic Modeling. Journal of Intelligence and Information Systems. 21, 3 (September. 2015), 101--116. DOI=http:\/\/dx.doi.org\/10.13088\/jiis.2015.21.3.103"},{"key":"key-10.1145\/2971603.2971646-22","unstructured":"Hyun, Y., Kim, N., and Cho, Y. 2015. Interest-based Customer Segmentation Methodology Using Topic Modeling. Journal of Information Technology Applications &#38; Management. 22, 1 (March. 2015), 77--93."},{"key":"key-10.1145\/2971603.2971646-23","doi-asserted-by":"crossref","unstructured":"Kim, D., Wong, W. X. S., Lim, M., Liu, C., Kim, N., Park, J., Kil, W., and Yoon, H. 2015. A Methodology for Analyzing Public Opinion about Science and Technology Issues Using Text Analysis. Journal of Information Technology Services, 14, 3 (September. 2015), 33--48. DOI=http:\/\/dx.doi.org\/10.9716\/KITS.2015.14.3.033","DOI":"10.9716\/KITS.2015.14.3.033"},{"key":"key-10.1145\/2971603.2971646-24","doi-asserted-by":"crossref","unstructured":"Lim, M. and Kim, N. 2016. Investigating Dynamic Mutation Process of Issues Using Unstructured Text Analysis. Journal of Intelligence and Information Systems. 22, 1 (March. 2016), 1--18. DOI=http:\/\/dx.doi.org\/10.13088\/jiis.2016.22.1.01","DOI":"10.13088\/jiis.2016.22.1.01"},{"key":"key-10.1145\/2971603.2971646-25","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., and Zhang, M. 2010. @spam: The Underground on 140 Characters or Less. Proceedings of the 17th ACM conference on Computer and communications security. 27--37. DOI=http:\/\/dx.doi.org\/10.1145\/1866307.1866311","DOI":"10.1145\/1866307.1866311"},{"key":"key-10.1145\/2971603.2971646-26","unstructured":"Sahami, M., Dumais, S., Heckerman, D., and Horvitz, E. 1998. A bayesian approach to filtering junk e-mail. In AAAI Workshop on Learning for Text Categorization."},{"key":"key-10.1145\/2971603.2971646-27","doi-asserted-by":"crossref","unstructured":"Jia, X., Zheng, K., Li, W., Liu, T., and Shang, L. 2012. Three-Way Decisions Solution to Filter Spam Email: An Empirical Study. Rough Sets and Current Trends in Computing. Volume 7413 of the series Lecture Notes in Computer Science, 287--296. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-32115-3_34","DOI":"10.1007\/978-3-642-32115-3_34"},{"key":"key-10.1145\/2971603.2971646-28","unstructured":"Klimt, B. and Yang, Y. 2004. Introducing the Enron corpus. In CEAS 2004 - The Conference on Email and Anti-Spam."},{"key":"key-10.1145\/2971603.2971646-29","doi-asserted-by":"crossref","unstructured":"Gyongyi, Z., Garcia-Molina, H., and Pedersen, J. 2004. Combating web spam with trustrank. In VLDB '04: Proceedings of the Thirtieth international conference on Very large data bases. 576--587. VLDB Endowment. DOI= http:\/\/dx.doi.org\/10.1016\/b978-012088469-8\/50052-8","DOI":"10.1016\/B978-012088469-8\/50052-8"},{"key":"key-10.1145\/2971603.2971646-30","unstructured":"Gyongyi, Z., Berkhin, P., Garcia-Molina, H., and Pedersen, J. 2006. Link spam detection based on mass estimation. In VLDB '06: Proceedings of the 32nd international conference on Very large data bases. 439--450. VLDB Endowment."},{"key":"key-10.1145\/2971603.2971646-31","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Najork, M., Manasse, M., and Retterly, D. 2006. Detecting spam web pages through content analysis. Proceedings of the 15th international conference on World Wide Web. (May. 2006), 83--92. DOI=http:\/\/dx.doi.org\/10.1145\/1135777.1135794","DOI":"10.1145\/1135777.1135794"},{"key":"key-10.1145\/2971603.2971646-32","doi-asserted-by":"crossref","unstructured":"Xanthopoulos, P., Panagopoulos, O. P., Bakamitsos, G. A., and Freudmann, E. 2016. Hashtag Hijacking: What it is, why it happens and how to avoid it. Journal of Digital &#38; Social Media Marketing, 3, 4 (February. 2016), 353--362.","DOI":"10.69554\/CPYK7138"},{"key":"key-10.1145\/2971603.2971646-33","doi-asserted-by":"crossref","unstructured":"Sedhai, S. and Sun, A. 2016. Effect on Spam on Hashtag Recommendation for Tweets. Proceedings of the 25th International Conference Companion on World Wide Web. (April. 2016), 97--98. DOI= http:\/\/dx.doi.org\/10.1145\/2872518.2889404","DOI":"10.1145\/2872518.2889404"}],"event":{"number":"18","sponsor":["Suwon City","Haitai, Haitai Confectionery & Foods Co., Ltd.","FKII, The Federation of Korean Infomation Industries","Benple","Tech M, Moneytoday Network Inc.","NIA, National Information Society Agency, Republic of Korea","HAREX, HAREX InfoTech Inc.","ALLWIN","DIPA, Digital Industry Promotion Agency of Yongin City"],"acronym":"ICEC '16","name":"the 18th Annual International Conference","start":{"date-parts":[[2016,8,17]]},"theme":"e-Commerce in Smart connected World","location":"Suwon, Republic of Korea","end":{"date-parts":[[2016,8,19]]}},"container-title":["Proceedings of the 18th Annual International Conference on Electronic Commerce e-Commerce in Smart connected World - ICEC '16"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971603.2971646","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2971646&amp;ftid=1780197&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:03Z","timestamp":1750218603000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2971603.2971646"}},"subtitle":[],"proceedings-subject":"Electronic Commerce","short-title":[],"issued":{"date-parts":[[2016]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1145\/2971603.2971646","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}