{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:43:16Z","timestamp":1760236996859,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>A troll is usually defined as somebody who provokes and offends people to make them angry, who wants to dominate any discussion or who tries to manipulate people\u2019s opinions. The problems caused by such persons have increased with the diffusion of social media. Therefore, on the one hand, press bodies and magazines have begun to address the issue and to write articles about the phenomenon and its related problems while, on the other hand, universities and research centres have begun to study the features characterizing trolls and to look for solutions for their identification. This survey aims at introducing the main researches dedicated to the description of trolls and to the study and experimentation of methods for their detection.<\/jats:p>","DOI":"10.3390\/fi12020031","type":"journal-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T09:25:21Z","timestamp":1581413121000},"page":"31","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Survey on Troll Detection"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6030-9435","authenticated-orcid":false,"given":"Michele","family":"Tomaiuolo","sequence":"first","affiliation":[{"name":"Department of Engineering and Architecture, University of Parma, 43124 Parma, Italy"}]},{"given":"Gianfranco","family":"Lombardo","sequence":"additional","affiliation":[{"name":"Department of Engineering and Architecture, University of Parma, 43124 Parma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5916-9770","authenticated-orcid":false,"given":"Monica","family":"Mordonini","sequence":"additional","affiliation":[{"name":"Department of Engineering and Architecture, University of Parma, 43124 Parma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4669-512X","authenticated-orcid":false,"given":"Stefano","family":"Cagnoni","sequence":"additional","affiliation":[{"name":"Department of Engineering and Architecture, University of Parma, 43124 Parma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3528-0260","authenticated-orcid":false,"given":"Agostino","family":"Poggi","sequence":"additional","affiliation":[{"name":"Department of Engineering and Architecture, University of Parma, 43124 Parma, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1002\/asi.23804","article-title":"How does the world connect? Exploring the global diffusion of social network sites","volume":"68","author":"Larosiliere","year":"2017","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Meske, C., and Stieglitz, S. (2013). Adoption and Use of Social Media in Small and Medium-sized Enterprises. Practice Driven Research on Enterprise Transformation (PRET), Proceedings of the 6th Working Conference Lecture Notes in Business Information Processing (LNBIP), Utrecht, The Netherlands, 6 June 2013, Springer.","DOI":"10.1007\/978-3-642-38774-6_5"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1080\/10580530.2019.1652448","article-title":"Enterprise Social Networks as Digital Infrastructures - Understanding the Utilitarian Value of Social Media at the Workplace","volume":"36","author":"Meske","year":"2019","journal-title":"Inf. Syst. Manag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1108\/JEIM-08-2018-0177","article-title":"Explaining the emergence of hedonic motivations in enterprise social networks and their impact on sustainable user engagement - A four-drive perspective","volume":"32","author":"Meske","year":"2019","journal-title":"J. Enterp. Inf. Manag."},{"key":"ref_5","unstructured":"Chinnov, A., Meske, C., Kerschke, P., Stieglitz, S., and Trautmann, H. (2015, January 13\u201315). An Overview of Topic Discovery in Twitter Communication through Social Media Analytics. Proceedings of the 21st Americas Conference on Information Systems (AMCIS), Fajardo, Puerto Rico."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Stieglitz, S., Meske, C., Ro\u00df, B., and Mirbabaie, M. (2018). Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics. Inf. Syst. Front., 1\u201315.","DOI":"10.1007\/s10796-018-9867-2"},{"key":"ref_7","unstructured":"Meske, C., Junglas, I., Schneider, J., and Jakoonm\u00e4ki, R. (2019, January 15\u201318). How Social is Your Social Network? Toward A Measurement Model. Proceedings of the 40th International Conference on Information Systems, Munich, Germany."},{"key":"ref_8","first-page":"215","article-title":"Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions","volume":"6","author":"Hardaker","year":"2010","journal-title":"J. Politeness Res. Language Behav. Culture"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mihaylov, T., Georgiev, G., and Nakov, P. (2015, January 30\u201331). Finding opinion manipulation trolls in news community forums. Proceedings of the Nineteenth Conference on Computational Natural Language Learning, Beijing, China.","DOI":"10.18653\/v1\/K15-1032"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s13278-019-0578-6","article-title":"Characterizing the 2016 Russian IRA influence campaign","volume":"9","author":"Badawy","year":"2018","journal-title":"Social Netw. Anal. Min."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Badawy, A., Lerman, K., and Ferrara, E. (2019, January 13\u201317). Who falls for online political manipulation?. Proceedings of the Web Conference 2019\u2014Companion of the World Wide Web Conference, San Francisco, CA, USA.","DOI":"10.1145\/3308560.3316494"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chun, S.A., Holowczak, R., Dharan, K.N., Wang, R., Basu, S., and Geller, J. (2019, January 18\u201320). Detecting political bias trolls in Twitter data. Proceedings of the 15th International Conference on Web Information Systems and Technologies, WEBIST 2019, Vienna, Austria.","DOI":"10.5220\/0008350303340342"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Sirivianos, M., Caulfield, T., Stringhini, G., De Cristofaro, E., and Blackburn, J. (2019, January 13\u201317). Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web. Proceedings of the Web Conference 2019\u2014Companion of the World Wide Web Conference, WWW 2019, San Francisco, CA, USA.","DOI":"10.1145\/3308560.3316495"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.chb.2018.08.008","article-title":"A holistic system for troll detection on Twitter","volume":"89","author":"Fornacciari","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref_15","unstructured":"Donath, J.S. (2002). Identity and deception in the virtual community. Communities in Cyberspace, Routledge."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kirman, B., Lineham, C., and Lawson, S. (2012). Exploring mischief and mayhem in social computing or: How we learned to stop worrying and love the trolls. CHI\u201912 Extended Abstracts on Human Factors in Computing Systems, ACM.","DOI":"10.1145\/2212776.2212790"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.paid.2014.01.016","article-title":"Trolls just want to have fun","volume":"67","author":"Buckels","year":"2014","journal-title":"Personal. Individ. Differ."},{"key":"ref_18","first-page":"75","article-title":"Trolling is an art: Towards a schematic classification of intention in internet trolling","volume":"3","author":"Morrissey","year":"2010","journal-title":"Griffith Work. Pap. Pragmat. Intercult. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1080\/019722496129350","article-title":"\u201cIf I Want It, It\u2019s OK\u201d: Usenet and the (Outer) Limits of Free Speech","volume":"12","author":"Pfaffenberger","year":"1996","journal-title":"Inf. Soc."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1080\/01972240290108186","article-title":"Searching for safety online: Managing \u201ctrolling\u201d in a feminist forum","volume":"18","author":"Herring","year":"2002","journal-title":"Inf. Soc."},{"key":"ref_21","first-page":"42","article-title":"Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying","volume":"24","author":"Puerta","year":"2016","journal-title":"Log. J. IGPL"},{"key":"ref_22","unstructured":"Cambria, E., Chandra, P., Sharma, A., and Hussain, A. (2010). Do not Feel the Trolls, ISWC."},{"key":"ref_23","unstructured":"Derczynski, L., and Bontcheva, K. (2014, January 7\u201311). Pheme: Veracity in Digital Social Networks. Proceedings of the User Modelling and Personalisation (UMAP) Project Synergy workshop, CEUR Workshop Proceedings, Aalborg, Denmark."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1287\/mnsc.1060.0567","article-title":"Strategic manipulation of internet opinion forums: Implications for consumers and firms","volume":"52","author":"Dellarocas","year":"2006","journal-title":"Manag. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1017\/S0003055417000144","article-title":"How the Chinese government fabricates social media posts for strategic distraction, not engaged argument","volume":"111","author":"King","year":"2017","journal-title":"Am. Polit. Sci. Rev."},{"key":"ref_26","unstructured":"Luceri, L., Giordano, S., and Ferrara, E. (2001). Don\u2019t Feed the Troll: Detecting Troll Behavior via Inverse Reinforcement Learning. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"91","DOI":"10.3916\/C49-2016-09","article-title":"Dimensions and indicators of the information quality in digital media","volume":"24","year":"2016","journal-title":"Comunicar. Media Educ. Res. J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2884","DOI":"10.1016\/j.comnet.2012.05.002","article-title":"Propagation of trust and distrust for the detection of trolls in a social network","volume":"56","author":"Ortega","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_29","unstructured":"Seah, C.W., Chieu, H.L., Chai, K.M.A., Teow, L.N., and Yeong, L.W. (2015, January 6\u20139). Troll detection by domain-adapting sentiment analysis. Proceedings of the 2015 18th IEEE International Conference on Information Fusion, Washington, DC, USA."},{"key":"ref_30","unstructured":"Dollberg, S. (2020, January 07). The Metadata Troll Detector, Swiss Federal Institute of Technology, Zurich, Distributed Computing Group, Computer Engineering and Networks Laboratory. Tech. Rep. Semester Thesis. Available online: https:\/\/pub.tik.ee.ethz.ch\/students\/2014-HS\/SA-2014-32.pdf."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Younus, A., Qureshi, M.A., Saeed, M., Touheed, N., O\u2019Riordan, C., and Pasi, G. (2014, January 7\u201311). Election trolling: Analysing sentiment in tweets during Pakistan elections 2013. Proceedings of the 23rd International Conference on World Wide Web, Seoul, Korea.","DOI":"10.1145\/2567948.2577352"},{"key":"ref_32","unstructured":"Hallman, J., and Lokk, A. (2020, January 07). Viability of sentiment analysis for troll detection on Twitter: A Comparative Study Between the Naive Bayes and Maximum Entropy Algorithms. KTH Royal Institute of Technology - School of Computer Science and Communication - Degree Project in Computing Engineering, Stockholm, Sweden. Available online: https:\/\/kth.diva-portal.org\/smash\/get\/diva2:927326\/FULLTEXT01.pdf."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"de-la-Pena-Sordo, J., Santos, I., Pastor-L\u00f3pez, I., and Bringas, P.G. (2013). Filtering Trolling Comments through Collective Classification. International Conference on Network and System Security, Springer.","DOI":"10.1007\/978-3-642-38631-2_60"},{"key":"ref_34","unstructured":"Bharati, P., Lee, C., and Syed, R. (2020, January 07). Trolls and Social Movement Participation: An Empirical Investigation. Available online: https:\/\/pdfs.semanticscholar.org\/fbd4\/dc4eec69e6114cfd9011576f1f64c1bfbefc.pdf."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Kunegis, J., Lommatzsch, A., and Bauckhage, C. (2009, January 20\u201324). The SlashDot zoo: Mining a social network with negative edges. Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain.","DOI":"10.1145\/1526709.1526809"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dlala, I.O., Attiaoui, D., Martin, A., and Yaghlane, B. (2014, January 10\u201312). Trolls identification within an uncertain framework. Proceedings of the 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, Limassol, Cyprus.","DOI":"10.1109\/ICTAI.2014.153"},{"key":"ref_37","unstructured":"Cheng, J., Danescu-Niculescu-Mizil, C., and Leskovec, J. (2015, January 26\u201329). Antisocial behavior in online discussion communities. Proceedings of the Ninth International AAAI Conference on Web and Social Media, Oxford, UK."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kumar, S., Spezzano, F., and Subrahmanian, V.S. (2014, January 17\u201320). Accurately detecting trolls in slashdot zoo via decluttering. Proceedings of the 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Beijing, China.","DOI":"10.1109\/ASONAM.2014.6921581"},{"key":"ref_39","unstructured":"Atanasov, A., Morales, G.D.F., and Nakov, P. (2020, January 07). Predicting the Role of Political Trolls in Social Media. Available online: https:\/\/arxiv.org\/pdf\/1910.02001.pdf."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Machov\u00e1, K., and Koles\u00e1r, D. (2019). Recognition of Antisocial Behavior in Online Discussions. International Conference on Information Systems Architecture and Technology, Springer.","DOI":"10.1007\/978-3-030-30604-5_23"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kincaid, J.P., Fishburne, R.P., Rogers, R.L., and Chissom, B.S. (1975). Derivation of New Readability Formulas (Automated Readability Index, Fog Count and Flesch Reading Ease Formula) for Navy Enlisted Personnel, University of Central Florida. Available online: https:\/\/stars.library.ucf.edu\/cgi\/viewcontent.cgi?article=1055&context=istlibrary.","DOI":"10.21236\/ADA006655"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Lombardo, G., Fornacciari, P., Mordonini, M., Tomaiuolo, M., and Poggi, A. (2019). A Multi-Agent Architecture for Data Analysis. Future Internet, 11.","DOI":"10.3390\/fi11020049"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/2\/31\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:56:30Z","timestamp":1760172990000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/2\/31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,10]]},"references-count":42,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,2]]}},"alternative-id":["fi12020031"],"URL":"https:\/\/doi.org\/10.3390\/fi12020031","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2020,2,10]]}}}