HOME

TheInfoList



OR:

A social bot, or also described as a social AI or social algorithm, is a
software agent In computer science, a software agent or software AI is a computer program that acts for a user or other program in a relationship of agency, which derives from the Latin ''agere'' (to do): an agreement to act on one's behalf. Such "action on behal ...
that communicates autonomously on
social media Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social medi ...
. The messages (e.g. tweets) it distributes can be simple and operate in groups and various configurations with partial human control (hybrid) via
algorithm In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algorithms are used as specificat ...
. Social bots can also use
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech re ...
to express messages in more natural human dialogue.


Uses

* To influence peoples decisions, e.g.: advertise a product, support a political campaign, increase engagement statistics for social media pages, etc. * To provide low cost customer service agent to answer questions that their users might have. * To automatically answer commonly asked questions on Social media such as Discord. Lutz Finger identifies five immediate uses for social bots: *foster fame: having an arbitrary number of (unrevealed) bots as (fake) followers can help simulate real success. *
Influence-for-hire Influence-for-hire or collective influence, refers to the economy that has emerged around buying and selling influence on social media platforms. Overview Companies that engage in the influence-for-hire industry range from content farms to high ...
: refers to the economy that has emerged around buying and selling influence on social media platforms. *
ghost followers Ghost followers, also referred to as ghosts and ghost accounts or lurkers, are users on social media platforms who remain inactive or do not engage in activity. They register on platforms such as Twitter and Instagram. These users follow active me ...
: are users on social media platforms who remain inactive or do not engage in activity, but do not partake in liking, commenting, messaging, and posting. *
spamming Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especial ...
: having advertising bots in online chats is similar to email spam, but a lot more direct. * social influence bias: which makes users overcompensate for negative ratings but amplify positive ones. *
mischief Mischief or malicious mischief is the name for a criminal offenses that is defined differently in different legal jurisdictions. While the wrongful acts will often involve what is popularly described as vandalism, there can be a legal differenti ...
: e.g. signing up an opponent with a lot of fake identities and spam the account or help others discover it to discredit the opponent. *
public opinion Public opinion is the collective opinion on a specific topic or voting intention relevant to a society. It is the people's views on matters affecting them. Etymology The term "public opinion" was derived from the French ', which was first use ...
bias Bias is a disproportionate weight ''in favor of'' or ''against'' an idea or thing, usually in a way that is closed-minded, prejudicial, or unfair. Biases can be innate or learned. People may develop biases for or against an individual, a group, ...
: influence trends by countless messages of similar content with different phrasings. *limit
free speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been ...
: important messages can be pushed out of sight by a deluge of automated bot messages. *to
phish Phish is an American rock band formed in Burlington, Vermont, in 1983. The band is known for musical improvisation, extended jams, blending of genres, and a dedicated fan base. The band consists of guitarist Trey Anastasio, bassist Mike Gordon ...
password A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
s or other
personal data Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
.


History

Bots have coexisted with computer technology since its creation. Social bots have therefore risen in popularity simultaneously with the rise of social media. Social bots, besides being able to (re-)produce or reuse messages autonomously, also share many traits with
spambot A spambot is a computer program designed to assist in the sending of spam. Spambots usually create accounts and send spam messages with them. Web hosts and website operators have responded by banning spammers, leading to an ongoing struggle betw ...
s with respect to their tendency to infiltrate large user groups.
Twitterbot A Twitter bot is a type of software bot that controls a Twitter account via the Twitter API. The social bot software may autonomously perform actions such as tweeting, re-tweeting, liking, following, unfollowing, or direct messaging other account ...
s are already well-known examples, but corresponding
autonomous agent An autonomous agent is an intelligent agent operating on a user's behalf but without any interference of that user. An intelligent agent, however appears according to an IBM white paper as: Intelligent agents are software entities that carry out ...
s on
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin M ...
and elsewhere have also been observed. Nowadays, social bots are equipped with or can generate convincing
internet persona Internet identity (IID), also online identity or internet persona, is a social identity that an Internet user establishes in online communities and websites. It may also be an actively constructed presentation of oneself. Although some people cho ...
s that are well capable of influencing real people. Using social bots is against the terms of service of many platforms, such as Twitter and
Instagram Instagram is a photo and video sharing social networking service owned by American company Meta Platforms. The app allows users to upload media that can be edited with filters and organized by hashtags and geographical tagging. Posts can ...
, although it is allowed to some degree by others, such as
Reddit Reddit (; stylized in all lowercase as reddit) is an American social news aggregation, content rating, and discussion website. Registered users (commonly referred to as "Redditors") submit content to the site such as links, text posts, images ...
and
Discord Discord is a VoIP and instant messaging social platform. Users have the ability to communicate with voice calls, video calls, text messaging, media and files in private chats or as part of communities called "servers".The developer documenta ...
. Even for social media platforms that restrict social bots, a certain degree of automation is of course intended by making social media
API An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software Interface (computing), interface, offering a service to other pieces of software. A document or standa ...
s available. Social media platforms have also developed their own automated tools to filter out messages that come from bots, although they are not advanced enough to detect all bot messages. The topic of a legal regulation of social bots is becoming more urgent to policy makers in many countries, however due to the difficulty of recognizing social bots and separating them from "eligible" automation via social media
API An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software Interface (computing), interface, offering a service to other pieces of software. A document or standa ...
s, it is currently unclear how that can be done and also if it can be enforced. In any case, social bots are expected to play a role in future shaping of
public opinion Public opinion is the collective opinion on a specific topic or voting intention relevant to a society. It is the people's views on matters affecting them. Etymology The term "public opinion" was derived from the French ', which was first use ...
by autonomously acting as incessant and never-tiring
influencer An Internet celebrity (also known as a social media influencer, social media personality, internet personality, or simply influencer) is a celebrity who has acquired or developed their fame and notability through the Internet. The rise of social m ...
. Leading up to the present day, the impact of social bots has grown so much that they are now affecting society through social media, by manipulating public opinions (especially in a political sense, which is considered a sub-category of social bots called political bots), stock market manipulation, concealed advertisements and malicious extortion of
spear-phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
attempts which is why there has been an emergence of urgency to create more research, policies, and detection of bots on the many platforms that they affect.


Detection

The first generation of bots could sometimes be distinguished from real users by their often
superhuman The term superhuman refers to humans or human-like beings with enhanced qualities and abilities that exceed those naturally found in humans. These qualities may be acquired through natural ability, self-actualization or technological aids. Th ...
capacities to post messages around the clock (and at massive rates). Later developments have succeeded in imprinting more "human" activity and
behavioral pattern In software engineering, behavioral design patterns are design patterns that identify common communication patterns among objects. By doing so, these patterns increase flexibility in carrying out communication. Design patterns Examples of this t ...
s in the agent. With enough bots, it might be even possible to achieve artificial
social proof Social proof is a psychological and social phenomenon wherein people copy the actions of others in an attempt to undertake behavior in a given situation. The term was coined by Robert Cialdini in his 1984 book '' Influence: Science and Practice'' ...
. To unambiguously detect social bots as what they are, a variety of criteria must be applied together using
pattern detection Pattern recognition is the automated recognition of patterns and regularities in data. It has applications in statistical data analysis, signal processing, image analysis, information retrieval, bioinformatics, data compression, computer graphics ...
techniques, some of which are: *
cartoon A cartoon is a type of visual art that is typically drawn, frequently animated, in an unrealistic or semi-realistic style. The specific meaning has evolved over time, but the modern usage usually refers to either: an image or series of images ...
figures as user pictures *sometimes also random real user pictures are captured (
identity fraud Identity fraud is the use by one person of another person's personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person. Most identity fraud is committed in the context of financial ad ...
) *reposting rate *temporal patterns *sentiment expression *followers-to-friends ratio *length of
user name A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), accoun ...
s *variability in (re)posted messages *engagement rate (
like In English, the word ''like'' has a very flexible range of uses, ranging from conventional to non-standard. It can be used as a noun, verb, adverb, adjective, preposition, particle, conjunction, hedge, filler, and quotative. Uses Comparisons ' ...
/ followers rate) Social bots are always becoming increasingly difficult to detect and understand, some of the greatest challenges for the detection of bots include: social big data, modern social bots datasets, detect the bots' human-like behavior in the wild, ever-changing behavior of the bots, lack of appropriate visualization tools and the sheer volume of bots covering every platform. Botometer (formerly BotOrNot) is a public Web service that checks the activity of a Twitter account and gives it a score based on how likely the account is to be a bot. The system leverages over a thousand features. An active method that worked well in detecting early spam bots was to set up honeypot accounts where obvious nonsensical content was posted and then dumbly reposted (retweeted) by bots. However, recent studies show that bots evolve quickly and detection methods have to be updated constantly, because otherwise they may get useless after a few years. One method still in development, but showing promise is the use of
Benford's Law Benford's law, also known as the Newcomb–Benford law, the law of anomalous numbers, or the first-digit law, is an observation that in many real-life sets of numerical data, the leading digit is likely to be small.Arno Berger and Theodore ...
for predicting the frequency distribution of significant leading digits to detect malicious bots online. This study was first introduced at the
University of Pretoria The University of Pretoria ( af, Universiteit van Pretoria, nso, Yunibesithi ya Pretoria) is a multi-campus public university, public research university in Pretoria, the administrative and de facto capital of South Africa. The university was ...
in 2020 and had successful trials in the field. Another method that has also proven to be quite successful in research and in the field is artificial-intelligence-driven detection which simply put, evens the playing field when putting artificial intelligence against itself. Some of the most popular sub-categories of this type of detection would be active learning loop flow,
feature engineering Feature engineering or feature extraction or feature discovery is the process of using domain knowledge to extract features (characteristics, properties, attributes) from raw data. The motivation is to use these extra features to improve the qual ...
, unsupervised learning and outliers identification,
supervised learning Supervised learning (SL) is a machine learning paradigm for problems where the available data consists of labelled examples, meaning that each data point contains features (covariates) and an associated label. The goal of supervised learning alg ...
, correlation discovery, and system adaptability. An important mode of operation of bots is by working together in a synchronized way. For example, ISIS used Twitter to amplify its Islamic content by numerous orchestrated accounts which further pushed an item to the Hot List news, thus further amplifying the selected news to a larger audience. This mode of synchronized bots accounts is an efficient method to further spread a desired news and is also used as a modern tool of propaganda as well as stock markets manipulations. Research and development to detect malicious bots continue to be an important topic throughout the tech world. Social media sites like
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
, which are among the most affected with CNBC reporting up to 48 million of the 319 million users (roughly 15%) were bots in 2017, continue to fight against the spread of misinformation, scams and other harmful activities on their platforms.


Platforms


Instagram

Instagram Instagram is a photo and video sharing social networking service owned by American company Meta Platforms. The app allows users to upload media that can be edited with filters and organized by hashtags and geographical tagging. Posts can ...
reached a billion active monthly users in June 2018, but of those 1 billion active users it was estimated that up to 10% were being run by automated social bots. Instagram's unique platform for sharing pictures and videos makes it one of the biggest targets for malicious social bot attacks, especially porn bot accounts, because imagery resonates with the platform's users more than simple words on platforms like Twitter. While malicious propaganda posting bots are still popular, many individual users use engagement bots to propel themselves to a false virality, making them seem more popular on the app. These engagement bots can do everything from like, watch, follow, and comment on the users' posts. Around the same time that the platform achieved the 1 billion monthly user plateau,
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin M ...
(Instagram and
WhatsApp WhatsApp (also called WhatsApp Messenger) is an internationally available freeware, cross-platform, centralized instant messaging (IM) and voice-over-IP (VoIP) service owned by American company Meta Platforms (formerly Facebook). It allows us ...
's parent company) planned to hire 10 000 to provide additional security to their platforms, this would include combatting the rising number of bots and malicious posts on the platforms. Due to increased security on the platform and enhanced detecting methods by Instagram, some botting companies are reporting issues with their services because Instagram imposes interaction limit thresholds based on past and current app usage and many payment and email platforms deny the companies access to their services, preventing potential clients from being able to purchase them.


Twitter

Twitter's bot problem is being caused by the ease of use in creating and maintaining them. To create an account you must have a phone number, email address, and CAPTCHA recognition. The ease of creating the account as and the many APIs that allow for complete automation of the accounts are leading to excessive amounts of organizations and individuals using these tools to push their own needs. CNBC claiming that about 15% of the 319 million Twitter users in 2017 were bots, the exact number is 48 million. As of July 7, 2022, Twitter is claiming that they remove 1 million spam bots on their platform each and every day. Twitter bots are not all malicious, some bots are used to automate scheduled tweets, download videos, set reminders and even send warnings of natural disasters. Those are examples of bot accounts, but Twitter's
API An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software Interface (computing), interface, offering a service to other pieces of software. A document or standa ...
allows for real accounts (individuals or organizations) to use certain levels of bot automation on their accounts, and even encourages the use of them to improve user experiences and interactions.


See also

*
Ambient awareness Ambient awareness (AmA) is a term used by social scientists to describe a new form of peripheral social awareness. This awareness is propagated from relatively constant contact with one's friends and colleagues via social networking platforms on th ...
*
Astroturfing Astroturfing is the practice of masking the sponsors of a message or organization (e.g., political, advertising, religious or public relations) to make it appear as though it originates from and is supported by grassroots participants. It is a p ...
*
Attention inequality Attention is the behavioral and cognitive process of selectively concentrating on a discrete aspect of information, whether considered subjective or objective, while ignoring other perceivable information. William James (1890) wrote that "Atte ...
*
Chatbot A chatbot or chatterbot is a Software agent, software application used to conduct an on-line chat conversation via text or Speech synthesis, text-to-speech, in lieu of providing direct contact with a live human agent. Designed to convincingly si ...
*
Crowd manipulation Crowd manipulation is the intentional or unwitting use of techniques based on the principles of crowd psychology to engage, control, or influence the desires of a crowd in order to direct its behavior toward a specific action. This practice is co ...
*
Devumi Devumi was an American company which sold fake influence on social media. They were the first company punished by the United States government for selling followers and likes on social media. Overview Devumi sold more than 200 million fake followe ...
*
Doxing Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the internet. Historically, the term has been used interchangeably to refer to both the aggregation of this i ...
*
Fake news website Fake news websites (also referred to as hoax news websites) are websites on the Internet that deliberately publish fake news— hoaxes, propaganda, and disinformation purporting to be real news—often using social media to drive web traffic and ...
*
Ghost followers Ghost followers, also referred to as ghosts and ghost accounts or lurkers, are users on social media platforms who remain inactive or do not engage in activity. They register on platforms such as Twitter and Instagram. These users follow active me ...
*
Influence-for-hire Influence-for-hire or collective influence, refers to the economy that has emerged around buying and selling influence on social media platforms. Overview Companies that engage in the influence-for-hire industry range from content farms to high ...
*
Internet bot An Internet bot, web robot, robot or simply bot, is a software application that runs automated tasks (scripts) over the Internet, usually with the intent to imitate human activity on the Internet, such as messaging, on a large scale. An Internet ...
*
Marketing and artificial intelligence The fields of marketing and artificial intelligence converge in systems which assist in areas such as market forecasting, and automation of processes and decision making, along with increased efficiency of tasks which would usually be performed by ...
*
Messaging spam Messaging spam, sometimes called SPIM, is a type of spam targeting users of instant messaging (IM) services, SMS, or private messages within websites. Instant messaging applications Instant messaging systems, such as Telegram, WhatsApp, Twitter ...
*
On the Internet, nobody knows you're a dog "On the Internet, nobody knows you're a dog" is an adage and Internet meme about Internet anonymity which began as a caption to a cartoon drawn by Peter Steiner, published by ''The New Yorker'' on July 5, 1993. dead link The words are those of ...
*
Post-truth politics Post-truth politics (also called post-factual politics and post-reality politics) is a political culture where true/false, honesty/lying have become a focal concern of public life and are viewed by popular commentators and academic researchers a ...
* Radical trust *
Review bomb A review bomb is an Internet phenomenon in which a large number of people or a few people with multiple accounts post negative user reviews online in an attempt to harm the sales or popularity of a product, a service, or a business. While a large ...
*
Search engine manipulation effect The search engine manipulation effect (SEME) is a term invented by Robert Epstein in 2015 to describe a hypothesized change in consumer preferences and voting preferences by search engines. Rather than search engine optimization where advocates ...
*
Smear campaign A smear campaign, also referred to as a smear tactic or simply a smear, is an effort to damage or call into question someone's reputation, by propounding negative propaganda. It makes use of discrediting tactics. It can be applied to individual ...
* Social influence bias * Social media bias * Social spam *
Sockpuppet (Internet) A sock puppet is defined as a person whose actions are controlled by another. It is a reference to the manipulation of a simple hand puppet made from a sock, and is often used to refer to alternative online identities or user accounts used fo ...
*
Sybil attack Sibyls were oracular women believed to possess prophetic powers in ancient Greece. Sybil or Sibyl may also refer to: Films * ''Sybil'' (1921 film) * ''Sybil'' (1976 film), a film starring Sally Field * ''Sybil'' (2007 film), a remake of the 19 ...
*
Tay (bot) Tay was an artificial intelligence chatbot that was originally released by Microsoft Corporation via Twitter on March 23, 2016; it caused subsequent controversy when the bot began to post inflammatory and offensive tweets through its Twitter acco ...
*
Technoself studies Technoself studies, commonly referred to as TSS, is an emerging, interdisciplinarity domain of scholarly research dealing with all aspects of human identity in a technological societyLuppicini pp. 1–25 focusing on the changing nature of relat ...
*
Turing test The Turing test, originally called the imitation game by Alan Turing in 1950, is a test of a machine's ability to artificial intelligence, exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human. Turing propos ...
*
Twitter bomb The term twitter bomb or tweet bomb (also spelled as one word) refers to posting numerous (pejoratively, "spamming") Tweets with the same hashtags and other similar content, including @messages, from multiple accounts, with the goal of advertising ...
*
Votebots A votebot is a software automation built to fraudulently participate in online polls, elections, and to upvote and downvote on social media. Simple votebots are easy to code and deploy, yet they are often effective against many polls online, as ...
*
Whispering campaign A whispering campaign or whisper campaign is a method of persuasion in which damaging rumors or innuendo are spread about the target, while the source of the rumors seeks to avoid being detected while they are spread. For example, a political camp ...


References


External links


The Computational Propaganda Research Project
University of Oxford
What is a Social Media Bot? , Social Media Bot Definition
Cloudflare {{Disinformation Internet bots Social media Public relations Social influence Social information processing Mass media monitoring Internet manipulation and propaganda