SlideShare a Scribd company logo
1 of 11
SOCIAL MEDIA OR
ROBOT MEDIA?
THE PROLIFERATION OF BOTS ON SOCIAL MEDIA SITES
HOW TO SPOT FEMBOTS?
Followers
Following
Tweets
Photos
6/30/2014Luke Maniskas 2
ACROSS ALL SOCIAL NETWORKS
6/30/2014Luke Maniskas 3
WHO RUNS ACCOUNT?
6/30/2014Luke Maniskas 4
VERIFIED VS UNVERIFIED
Fake celebrity accounts
6/30/2014Luke Maniskas 5
USERNAMES?
Look closely
6/30/2014Luke Maniskas 6
SAME GIRL DIFFERENT NAME
SAD GINA? KINKY KAY KAY?
6/30/2014Luke Maniskas 7
SAME RETWEETS
6/30/2014Luke Maniskas 8
NOW IMAGINE HOW MANY PROFILES THEY FOLLOW?
6/30/2014Luke Maniskas 9
Suspect
Sad
Gina Kinky
Kay Kay
Kyle
Duran
Aubree
Shirley
THE BOT PROLIFERATION
• How accurate can follower counts be?
• How accurate can Likes be?
• How accurate can circle count or +1's be?
• How accurate can Instagram likes be?
• Who runs these accounts?
• Who profits from these accounts
• How much pain and suffering has these accounts caused being online?
• If Social Media is meant for people why are there so many bots?
6/30/2014Luke Maniskas 10
Luke Maniskas
About.me/tom2.0live
6/30/2014Luke Maniskas 11
For more Information on Social Bots read this
Q and A : Everything you need to know about Social Bots

More Related Content

More from Luke Maniskas

More from Luke Maniskas (9)

14 general principles (Highlighted)
14 general principles (Highlighted)14 general principles (Highlighted)
14 general principles (Highlighted)
 
Internet Protocols of Humanity Version Covid-19
Internet Protocols of Humanity Version Covid-19Internet Protocols of Humanity Version Covid-19
Internet Protocols of Humanity Version Covid-19
 
Analytics of Social Networks MySpace
Analytics of Social Networks MySpaceAnalytics of Social Networks MySpace
Analytics of Social Networks MySpace
 
The Tom 2.0 Live Spy Metting of China and America
The Tom 2.0 Live Spy Metting of China and AmericaThe Tom 2.0 Live Spy Metting of China and America
The Tom 2.0 Live Spy Metting of China and America
 
Hu will Win the Future?
Hu will Win the Future?Hu will Win the Future?
Hu will Win the Future?
 
Countries around the world - A Tom 2.0 Live Adventure
Countries around the world - A Tom 2.0 Live AdventureCountries around the world - A Tom 2.0 Live Adventure
Countries around the world - A Tom 2.0 Live Adventure
 
Tom 2.0 Live in China
Tom 2.0 Live in ChinaTom 2.0 Live in China
Tom 2.0 Live in China
 
Parliament House of Australia Web 2.0
Parliament House of Australia Web 2.0Parliament House of Australia Web 2.0
Parliament House of Australia Web 2.0
 
The Search For Tom 2.0 Live
The Search For Tom 2.0 LiveThe Search For Tom 2.0 Live
The Search For Tom 2.0 Live
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

Social Bots: Proliferation on Social Networks