TY - JOUR T1 - An Analysis of the Characteristics of Verified Twitter Users TT - Doğrulanmış Twitter Hesaplarının Karakteristiklerinin Analizi AU - Kabakuş, Abdullah Talha AU - Şimşek, Mehmet PY - 2019 DA - December Y2 - 2019 DO - 10.35377/saucis.02.03.649708 JF - Sakarya University Journal of Computer and Information Sciences JO - SAUCIS PB - Sakarya University WT - DergiPark SN - 2636-8129 SP - 180 EP - 186 VL - 2 IS - 3 LA - en AB - Twitter, themost popular microblog, contains a large variety of users as a result of itshuge popularity. Twitter manually verifies the accounts which are deemed worthyof public interest. As a natural consequence of being verified, users trust theseverified accounts since they represent legitimate users, and are managed byauthorized users. To the best of our knowledge, Twitter has never revealed therequirements of being verified. In this study, in order to shed light on thecharacteristics of verified Twitter users, a software,which is based on Python programming language that utilizes a recentdataset, which consists of 297,798 verified Twitter users, was implementedwithin the scope of this study. The characteristics of verified Twitter users suchas being public, and having a customized profile were revealed as a result ofthe analysis of the utilized dataset. KW - Twitter KW - microblog KW - social media analysis KW - verified users KW - verification N2 - En popüler mikroblog olan Twitter, sahip olduğu devasapopüleritenin sonucu olarak çok çeşitli kullanıcı kitlesine sahiptir. Twitterkamu yararına olacağı inanılan hesapları elle doğrulamaktadır. Doğrulanmanındoğal bir sonucu olarak kullanıcılar, bu hesapların meşru kullanıcıları temsiletmesinden ve yetkili kullanıcılar tarafından yönetilmesinden dolayı buhesaplara güven duymaktadır. Elde ettiğimiz en iyi verilere göre, Twitterdoğrulanmanın gereksinimlerini hiçbir zaman açıklamamıştır. Bu çalışmada, doğrulanmışkullanıcıların karakteristiklerine ışık tutmak amacıyla bu çalışma kapsamında Pythonprogramlam dili tabanlı 297.798 doğrulanmış Twitter kullanıcısı içeren güncelbir verisetini kullanan bir yazılım geliştirilmiştir. Bu veriseti üzerindeyapılan analizler sonucunda doğrulanmış kullanıcıların kamuya açık olma,kişiselleştirilmiş bir profile sahip olma gibi ortak karakteristikleri açığaçıkartılmıştır. CR - [1] “Q1 2019 Earnings Report,” Twitter, 2019. [Online]. Available: https://s22.q4cdn.com/826641620/files/doc_financials/2019/q1/Q1-2019-Slide-Presentation.pdf. [Accessed: 15-Nov-2019]. CR - [2] “Agency Playbook,” Twitter, 2019. [Online]. Available: https://cdn.cms-twdigitalassets.com/content/dam/business-twitter/resources/Twitter_Agency_Playbook_2019.pdf. [Accessed: 15-Nov-2019]. CR - [3] “2018 Twitter Report,” Mention, 2018. [Online]. Available: https://info.mention.com/hubfs/Twitter Engagement Report 2018 %7C Mention.pdf. [Accessed: 15-Nov-2019]. CR - [4] A. Pak and P. Paroubek, “Twitter as a Corpus for Sentiment Analysis and Opinion Mining,” in Proceedings of LREC’10, the Seventh International Conference on Language Resources and Evaluation, 2010, pp. 1320–1326. CR - [5] S. Waisbord and A. Amado, “Populist communication by digital means: presidential Twitter in Latin America,” Inf. Commun. Soc., vol. 20, no. 9, pp. 1330–1346, 2017. CR - [6] H. Kwak, C. Lee, H. Park, and S. Moon, “What is Twitter, a social network or a news media?,” in Proceedings of the 19th International Conference on World Wide Web (WWW ’10), 2010, pp. 591–600. CR - [7] R. Li, K. H. Lei, R. Khadiwala, and K. C. C. Chang, “TEDAS: A twitter-based event detection and analysis system,” in Proceedings of the 2012 IEEE 28th International Conference on Data Engineering, 2012, pp. 1273–1276. CR - [8] I. Paul, A. Khattar, P. Kumaraguru, M. Gupta, and S. Chopra, “Elites Tweet? Characterizing the Twitter Verified User Network,” in Proceedings of the 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), 2019. CR - [9] M. Hentschel, O. Alonso, S. Counts, and V. Kandylas, “Finding Users We Trust: Scaling Up Verified Twitter Users Using Their Communication Patterns,” in Proceedings of the 8th International AAAI Conference on Weblogs and Social Media (ICWSM 2014), 2014, pp. 591–594. CR - [10] O. Varol, E. Ferrara, C. A. Davis, F. Menczer, and A. Flammini, “Online Human-Bot Interactions: Detection, Estimation, and Characterization,” in Proceedings of the 11th International Conference on Web and Social Media (ICWSM 2017), 2017. CR - [11] C. De Micheli and A. Stroppa, “Twitter and the underground market,” 2013. [Online]. Available: https://nexa.polito.it/nexacenterfiles/lunch-11-de_micheli-stroppa.pdf. [Accessed: 16-Nov-2019]. CR - [12] Y. Roth and D. Harvey, “How Twitter is fighting spam and malicious automation,” Twitter, 2018. [Online]. Available: https://blog.twitter.com/en_us/topics/company/2018/how-twitter-is-fighting-spam-and-malicious-automation.html. [Accessed: 16-Nov-2019]. CR - [13] H. L. LaMarre and Y. Suzuki-Lambrecht, “Tweeting democracy? Examining Twitter as an online public relations strategy for congressional campaigns’,” Public Relat. Rev., vol. 39, no. 4, pp. 360–368, 2013. CR - [14] Jason Baumgartner, “All Verified Twitter Users (100% complete) in ndjson format : datasets,” pushshift.io, 2018. [Online]. Available: https://www.reddit.com/r/datasets/comments/8s6nqz/all_verified_twitter_users_100_complete_in_ndjson/. [Accessed: 15-Nov-2019]. CR - [15] “API reference index — Twitter Developers,” Twitter, 2019. [Online]. Available: https://developer.twitter.com/en/docs/api-reference-index. [Accessed: 15-Nov-2019]. CR - [16] B. Erşahin, Ö. Aktaş, D. Kilmç, and C. Akyol, “Twitter fake account detection,” in 2nd International Conference on Computer Science and Engineering (UBMK 2017), 2017, pp. 388–392. CR - [17] “pandas: Python Data Analysis Library,” 2019. [Online]. Available: https://pandas.pydata.org. [Accessed: 16-Nov-2019]. CR - [18] “Matplotlib: Python plotting — Matplotlib 3.1.1 documentation,” 2019. [Online]. Available: https://matplotlib.org. [Accessed: 16-Nov-2019]. CR - [19] T. Velayutham and P. K. Tiwari, “Bot Identification: Helping Analysts for Right Data in Twitter,” in Proceedings - 2017 3rd International Conference on Advances in Computing, Communication and Automation (Fall) (ICACCA 2017), 2018, pp. 1–5. CR - [20] S. Yardi, D. Romero, G. Schoenebeck, and D. Boyd, “Detecting spam in a Twitter network,” First Monday, vol. 15, no. 1, 2010. UR - https://doi.org/10.35377/saucis.02.03.649708 L1 - https://dergipark.org.tr/en/download/article-file/912346 ER -