We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

HashJacker- Detection and Analysis of Hashtag Hijacking on Twitter

by Nikita Jain, Pooja Agarwal, Juhi Pruthi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 19
Year of Publication: 2015
Authors: Nikita Jain, Pooja Agarwal, Juhi Pruthi
10.5120/20085-2111

Nikita Jain, Pooja Agarwal, Juhi Pruthi . HashJacker- Detection and Analysis of Hashtag Hijacking on Twitter. International Journal of Computer Applications. 114, 19 ( March 2015), 17-20. DOI=10.5120/20085-2111

@article{ 10.5120/20085-2111,
author = { Nikita Jain, Pooja Agarwal, Juhi Pruthi },
title = { HashJacker- Detection and Analysis of Hashtag Hijacking on Twitter },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 19 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number19/20085-2111/ },
doi = { 10.5120/20085-2111 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:53:17.311074+05:30
%A Nikita Jain
%A Pooja Agarwal
%A Juhi Pruthi
%T HashJacker- Detection and Analysis of Hashtag Hijacking on Twitter
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 19
%P 17-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social media has become a multi purpose platform where users tend to discuss their common topics of interest as well as utilise it for endorsement and campaigns. Twitter being one of the most widely used social media platforms,provides a mechanism known as Hashtag which enables diversified online users, having coinciding interests to connect with each other. Hashtagging a tweet provides the most effective way of promoting a content as it steadily acquires the reader's attention because of it's symbolic denotation. With increasing hits on a particular Hashtag, it comes under one of the "trending topics". Soon this trending topic becomes a line of sight for people using Twitter. Users tend to hijack these popular Hashtags for distributing un-related content, spam, negative sentiments to tarnish the intended motive of Hashtag making its presence counter-productive. We propose a tool: HashJacker which detects and analyses hijacking of Hashtag tweets. Also, we have discussed best practises to circumvent wrecked Hashtag tweets.

References
  1. How to Use Hashtags on Twitter:A simple guide for Marketers,May2012,http://www. scoop. it/t/social-media-and-curation?page=4
  2. K. Hill;#McDStories: When A Hashtag Becomes A Bashtag ,Jan2012,http://www. forbes. com/sites/kashmirhill/2012/01/24/mcdstories-when-a-hashtag-becomes-a-bashtag/
  3. H. Wu and R. Luk and K. Wong and K. Kwok. "Interpreting TF-IDF term weights as making relevance decisions". ACM Transactions on Information Systems, 26 (3). 2008.
  4. Wikipedia, the free encyclopedia,http://en. wikipedia. org/wiki/Tf
  5. D. Berkowitz,Hashtag Marketing:9 ways to avert disaster,Feb 2014,http://mashable. com/2012/02/14/hashtag-marketing-disaster-tips/
  6. PR AGENCY ADVICE: HOW TO AVOID HASHTAG HIJAKING,http://reimaginepr. com/pr-agency-advice-how-to-avoid-hashtag-hijaking/
  7. Social Media Best Practices:Selecting a Hashtag and Livetweet-ing,University of Michigan,2014
Index Terms

Computer Science
Information Sciences

Keywords

Hashtag tweet tf-idf trend hijacking.