CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques

by Suhas Pandhe, Sahil Pawar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 12
Year of Publication: 2015
Authors: Suhas Pandhe, Sahil Pawar
10.5120/20391-2670

Suhas Pandhe, Sahil Pawar . Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques. International Journal of Computer Applications. 116, 12 ( April 2015), 35-40. DOI=10.5120/20391-2670

@article{ 10.5120/20391-2670,
author = { Suhas Pandhe, Sahil Pawar },
title = { Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 12 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number12/20391-2670/ },
doi = { 10.5120/20391-2670 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:57.891082+05:30
%A Suhas Pandhe
%A Sahil Pawar
%T Algorithm to Monitor Suspicious Activity on Social Networking Sites using Data Mining Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 12
%P 35-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world social networks have become a platform to express opinions or feelings related to current events or any other topics. But sometimes provocative posts related to renowned people, religion, sexuality, countries or any other sensitive topics create havoc in the society. Such posts must be administered and removed before they spread and hurt people's feelings resulting into tension in the society and possible riots. This paper discusses about the techniques to identify such suspicious posts and report them to curb the spread of provoking posts.

References
  1. S. Somasundaran and J. Wiebe. Recognizing stances in ideological online debates. In Workshop on Computational Approaches to Analysis and Generation of Emotion in Text, pages 116–124. ACM, 2010
  2. Mostafa Karamibekr and Ali A. Ghorbani,Sentiment Analysis of Social Issues. In 2012 International Conference on Social Informatics, Pages 215 – 221. IEEE,2012
  3. Data Mining: Concepts and Techniques by Han and Kamber[Online].
  4. http://www. codeproject. com/Articles/259241/ID-Decision-Tree-Algorithm-Part
  5. Managem MacDougall, R. (2005), Identity, electronic ethos, and blogs: a technological analysis of symbolic exchange on the new news medium, American Behavioral Scientist, Vol. 49, No. 4,575–599.
  6. T. Wilson,. , J. Wiebe,. , R. Hwa,. 2004. Just how mad are you? Finding strong and weak opinion clauses. In: the Association for the Advancement of Artificial Intelligence, pp. 761--769.
  7. W. Jin, H. Hay Ho, and R. Srihari, 2009. Opinion Miner: A Novel Machine Learning System for Web Opinion Mining and Extraction. Proceeding of International conference on Knowledge Discovery and Data Mining Paris, France.
  8. Rakesh Agrawal, Sridhar Rajagopalan, Ramakrishnan Srikant, and Yirong Xu. Mining newsgroups using networks arising from social behavior. In Proceedings of WWW, pages 529–535, 2003.
  9. Gharehchopogh, F. S, Khalifelu, Z. A, 2011, Application Data Mining Methods for Detection Useful Knowledge in Health Center: A Case Study Using Decision Tree, International Conference on Computer Applications and Network Security (ICCANS 2011), 1-5.
  10. Cecilia Ovesdotter Alm, Dan Roth, and Richard Sproat. Emotions from text: machine learning for text-based emotion prediction. In Proceedings of the Human Language Technology Conference and the Conference on Empirical Methods in Natural Language Processing (HLT/EMNLP), 2005
  11. Usama Fayyad;Gregory Piatetsky-Shapiro and Padhraic Smyth,From Data Mining to Knowledge Discovery in Databases. In American Association for Artificial Intelligence,2006
  12. Aggarwal, C. : An introduction to social network data analytics. Springer US, 2011
  13. Liu, B. : Sentiment analysis and opinion Mining. AAAI-2011, San Francisco, USA, 2011
  14. Ku, L. -W. , Liang, Y. -T. , Chen, H. -H. : Opinion extraction, summarization and tracking in news and blog corpora. In Proc. of the AAAI-CAAW'06, 2006
Index Terms

Computer Science
Information Sciences

Keywords

Data mining Data Analysis ID3 Decision Tree