SlideShare a Scribd company logo
Igor Santos
Igor Miñambres-Marcos
Carlos Laorden
Patxi Galán-García
Aitor Santamaría-Ibirika
Pablo G. Bringas
Detecting spammer accounts
Content-based analysis
(TweetSpike) (Legitimate)
spam ham
t1
t2
t3
m1
m2
m10
m3
m9
m4
m7
m8
m5
m11
m6
legitimate
spam
legitimate
spam
testing
probability
Dynamic Markov Chain (DMC)
Prediction by Partial Match (PPM)
Classifier Acc. Sp Sr F-Measure AUC
Random Forest N=50 96.42 0.98 0.94 0.96 0.99
DMC without Adaptation 95.99 0.96 0.95 0.96 0.99
Random Forest N=10 95.96 0.97 0.94 0.95 0.99
PPM without Adaptation 94.80 0.97 0.91 0.94 0.99
Naive Bayes Multinomial Word Frequency 94.94 0.95 0.93 0.94 0.98
Bayes K2 94.12 0.99 0.88 0.93 0.98
DMC with Adaptation 93.11 0.94 0.90 0.92 0.98
C4.5 95.79 0.98 0.92 0.95 0.97
KNN K=3 93.71 0.97 0.89 0.93 0.97
SVM PVK 95.81 0.97 0.93 0.95 0.96
PPM with Adaptation 76.50 0.78 0.69 0.72 0.86
Naive Bayes 72.72 0.64 0.89 0.75 0.76
A new and public dataset of twitter
spam to serve as evaluation
Adaptation of content-based
spam filtering to Twitter
A new compression-based text
filtering library for the ML tool WEKA
enhance this approach using social
network features
semantic capabilities by studying
the linguistic relationships
1. Follow me: http://files.twiyo-magazine.com/200000231-
1dfbb1ef57/follow-me-twitter.png
2. Twitter: http://www.redunonet.co/twitter.png
3. Twitter Infography: http://expandedramblings.com/index.php/march-
2013-by-the-numbers-a-few-amazing-twitter-stats
4. Twitter news: http://techtips.biz/wp-
content/uploads/sites/9/2013/07/twitter-news.jpg
5. Customer service: http://www.parature.com/wp-
content/uploads/2012/04/customerservice_twitter.jpg
6. MUSI Deusto: https://twitter.com/MUSIDeusto
7. Gossip: http://polskilive.pl/wp-content/uploads/2013/02/bigstock-
Gossiping-Women-Retro-Clip-A-17343494.jpg
8. Cyber-bullying:
http://jodielouiseuow.files.wordpress.com/2013/05/2010-10-21-cyber-
bullies.jpg
9. Sad teddy bear: http://thumbs.dreamstime.com/x/sad-lonely-teddy-
bear-15726476.jpg
10. Spam bird: http://all4boys.ru/_pu/0/52734883.png
11. Dollars: http://vegasgravy.com/News-detail/two-women-caught-for-
transporting-drug-money-from-vegas/dollars/
12. Day 97: Infected by dustywrath:
http://www.flickr.com/photos/10921499@N07/2187318683
13. my bank sucks by B Rosen:
http://www.flickr.com/photos/rosengrant/3537904106/
14. Spam wall by freezelight:
http://www.flickr.com/photos/63056612@N00/155554663/
15. Bird with boxing gloves: http://www.fightlikeagirlclub.com/wp-
content/uploads/2010/11/Bird-with-Boxing-Gloves.png
16. Twitter media: http://media.meltybuzz.fr/article-1440806-
ajust_930/media.jpg
17. Construction bird: http://i1-news.softpedia-
static.com/images/news2/Malicious-URL-Filtering-on-Twitter-2.jpg
18. Bird in egg: http://needsomeonetoblog.com/wp-
content/uploads/2013/07/bigstock-Blue-bird-in-egg-6079257.jpg
19. Document folder:
http://www.gsstr.nl/upload/9/4/1/gsstr/documentfolder.large.jpg?0.7202
662836172612
20. ZIP: http://www.kohl.bz/fileadmin/template/ZIP.png
21. Bird in pole: http://www.microcenterblog.com/wp-
content/uploads/2013/01/Fake-or-Real-150x150.jpg
22. Bird screaming: http://www.bluewaterbrand.com/wp-
content/uploads/2013/04/168_2671597.jpg
23. Bird with sign: http://blog.retirementincomenetwork.com/wp-
content/uploads/2013/05/twitter-bird.jpg
24. Bird in lineup: http://sparkboutik.com/wp-
content/uploads/2012/01/twitterfauxpas.jpg

More Related Content

Viewers also liked

Graph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS DetectionGraph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS Detection
SOYEON KIM
 
Bulk sms
Bulk smsBulk sms
Bulk sms
Partha Bala
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
iNazneen
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
newsan2001
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
Umar Alharaky
 
Enhancing Twitter spam discovery using cross account pattern matching.
Enhancing Twitter spam discovery using cross account pattern matching.Enhancing Twitter spam discovery using cross account pattern matching.
Enhancing Twitter spam discovery using cross account pattern matching.
Ambarish Pande
 
Spam
SpamSpam

Viewers also liked (7)

Graph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS DetectionGraph-based KNN Algorithm for Spam SMS Detection
Graph-based KNN Algorithm for Spam SMS Detection
 
Bulk sms
Bulk smsBulk sms
Bulk sms
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Enhancing Twitter spam discovery using cross account pattern matching.
Enhancing Twitter spam discovery using cross account pattern matching.Enhancing Twitter spam discovery using cross account pattern matching.
Enhancing Twitter spam discovery using cross account pattern matching.
 
Spam
SpamSpam
Spam
 

More from Carlos Laorden

Collective Classification for Packed Executable Identification - CEAS 2011
Collective Classification for Packed Executable Identification - CEAS 2011Collective Classification for Packed Executable Identification - CEAS 2011
Collective Classification for Packed Executable Identification - CEAS 2011
Carlos Laorden
 
Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011
Carlos Laorden
 
Puma: Permission Usage to detect Malware in Android - CISIS 2012
Puma: Permission Usage to detect Malware in Android - CISIS 2012Puma: Permission Usage to detect Malware in Android - CISIS 2012
Puma: Permission Usage to detect Malware in Android - CISIS 2012
Carlos Laorden
 
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
Carlos Laorden
 
Negobot: A conversational agent based on game theory for the detection of pae...
Negobot: A conversational agent based on game theory for the detection of pae...Negobot: A conversational agent based on game theory for the detection of pae...
Negobot: A conversational agent based on game theory for the detection of pae...
Carlos Laorden
 
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Carlos Laorden
 
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Carlos Laorden
 
Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011
Carlos Laorden
 
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
Carlos Laorden
 
Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011
Carlos Laorden
 

More from Carlos Laorden (10)

Collective Classification for Packed Executable Identification - CEAS 2011
Collective Classification for Packed Executable Identification - CEAS 2011Collective Classification for Packed Executable Identification - CEAS 2011
Collective Classification for Packed Executable Identification - CEAS 2011
 
Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011
 
Puma: Permission Usage to detect Malware in Android - CISIS 2012
Puma: Permission Usage to detect Malware in Android - CISIS 2012Puma: Permission Usage to detect Malware in Android - CISIS 2012
Puma: Permission Usage to detect Malware in Android - CISIS 2012
 
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
 
Negobot: A conversational agent based on game theory for the detection of pae...
Negobot: A conversational agent based on game theory for the detection of pae...Negobot: A conversational agent based on game theory for the detection of pae...
Negobot: A conversational agent based on game theory for the detection of pae...
 
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
 
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
 
Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011
 
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
 
Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011Anomaly-based Spam Filtering - SECRYPT 2011
Anomaly-based Spam Filtering - SECRYPT 2011
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

Twitter Content-based Spam Filtering - CISIS 2013

  • 1. Igor Santos Igor Miñambres-Marcos Carlos Laorden Patxi Galán-García Aitor Santamaría-Ibirika Pablo G. Bringas
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 28.
  • 29.
  • 31.
  • 33.
  • 34.
  • 37. Dynamic Markov Chain (DMC) Prediction by Partial Match (PPM)
  • 38.
  • 39. Classifier Acc. Sp Sr F-Measure AUC Random Forest N=50 96.42 0.98 0.94 0.96 0.99 DMC without Adaptation 95.99 0.96 0.95 0.96 0.99 Random Forest N=10 95.96 0.97 0.94 0.95 0.99 PPM without Adaptation 94.80 0.97 0.91 0.94 0.99 Naive Bayes Multinomial Word Frequency 94.94 0.95 0.93 0.94 0.98 Bayes K2 94.12 0.99 0.88 0.93 0.98 DMC with Adaptation 93.11 0.94 0.90 0.92 0.98 C4.5 95.79 0.98 0.92 0.95 0.97 KNN K=3 93.71 0.97 0.89 0.93 0.97 SVM PVK 95.81 0.97 0.93 0.95 0.96 PPM with Adaptation 76.50 0.78 0.69 0.72 0.86 Naive Bayes 72.72 0.64 0.89 0.75 0.76
  • 40.
  • 41. A new and public dataset of twitter spam to serve as evaluation Adaptation of content-based spam filtering to Twitter A new compression-based text filtering library for the ML tool WEKA
  • 42. enhance this approach using social network features semantic capabilities by studying the linguistic relationships
  • 43.
  • 44.
  • 45. 1. Follow me: http://files.twiyo-magazine.com/200000231- 1dfbb1ef57/follow-me-twitter.png 2. Twitter: http://www.redunonet.co/twitter.png 3. Twitter Infography: http://expandedramblings.com/index.php/march- 2013-by-the-numbers-a-few-amazing-twitter-stats 4. Twitter news: http://techtips.biz/wp- content/uploads/sites/9/2013/07/twitter-news.jpg 5. Customer service: http://www.parature.com/wp- content/uploads/2012/04/customerservice_twitter.jpg 6. MUSI Deusto: https://twitter.com/MUSIDeusto 7. Gossip: http://polskilive.pl/wp-content/uploads/2013/02/bigstock- Gossiping-Women-Retro-Clip-A-17343494.jpg 8. Cyber-bullying: http://jodielouiseuow.files.wordpress.com/2013/05/2010-10-21-cyber- bullies.jpg 9. Sad teddy bear: http://thumbs.dreamstime.com/x/sad-lonely-teddy- bear-15726476.jpg
  • 46. 10. Spam bird: http://all4boys.ru/_pu/0/52734883.png 11. Dollars: http://vegasgravy.com/News-detail/two-women-caught-for- transporting-drug-money-from-vegas/dollars/ 12. Day 97: Infected by dustywrath: http://www.flickr.com/photos/10921499@N07/2187318683 13. my bank sucks by B Rosen: http://www.flickr.com/photos/rosengrant/3537904106/ 14. Spam wall by freezelight: http://www.flickr.com/photos/63056612@N00/155554663/ 15. Bird with boxing gloves: http://www.fightlikeagirlclub.com/wp- content/uploads/2010/11/Bird-with-Boxing-Gloves.png 16. Twitter media: http://media.meltybuzz.fr/article-1440806- ajust_930/media.jpg 17. Construction bird: http://i1-news.softpedia- static.com/images/news2/Malicious-URL-Filtering-on-Twitter-2.jpg 18. Bird in egg: http://needsomeonetoblog.com/wp- content/uploads/2013/07/bigstock-Blue-bird-in-egg-6079257.jpg
  • 47. 19. Document folder: http://www.gsstr.nl/upload/9/4/1/gsstr/documentfolder.large.jpg?0.7202 662836172612 20. ZIP: http://www.kohl.bz/fileadmin/template/ZIP.png 21. Bird in pole: http://www.microcenterblog.com/wp- content/uploads/2013/01/Fake-or-Real-150x150.jpg 22. Bird screaming: http://www.bluewaterbrand.com/wp- content/uploads/2013/04/168_2671597.jpg 23. Bird with sign: http://blog.retirementincomenetwork.com/wp- content/uploads/2013/05/twitter-bird.jpg 24. Bird in lineup: http://sparkboutik.com/wp- content/uploads/2012/01/twitterfauxpas.jpg