Detecting covert disruptive behavior in online interaction by analyzing conversational features and norm violations

Henna Paakki*, Heidi Vepsäläinen, Antti Salovaara, Bushra Zafar

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

1 Citation (Scopus)
73 Downloads (Pure)

Abstract

Disruptive behavior is a prevalent threat to constructive online engagement. Covert behaviors, such as trolling, are especially challenging to detect automatically, because they utilize deceptive strategies to manipulate conversation. We illustrate a novel approach to their detection: analyzing conversational structures instead of focusing only on messages in isolation. Building on conversation analysis, we demonstrate that (1) conversational actions and their norms provide concepts for a deeper understanding of covert disruption, and that (2) machine learning, natural language processing and structural analysis of conversation can complement message-level features to create models that surpass earlier approaches to trolling detection. Our models, developed for detecting overt (aggression) as well as covert (trolling) behaviors using prior studies' message-level features and new conversational action features, achieved high accuracies (0.90 and 0.92, respectively). The findings offer a theoretically grounded approach to computationally analyzing social media interaction and novel methods for effectively detecting covert disruptive conversations online.

Original languageEnglish
Article number20
JournalACM Transactions on Computer-Human Interaction
Volume31
Issue number2
Early online date2023
DOIs
Publication statusPublished - 29 Jan 2024
MoE publication typeA1 Journal article-refereed

Keywords

  • Additional Key Words and PhrasesDisruptive behavior
  • detection
  • machine learning
  • natural language processing
  • online aggression
  • online trolling

Fingerprint

Dive into the research topics of 'Detecting covert disruptive behavior in online interaction by analyzing conversational features and norm violations'. Together they form a unique fingerprint.

Cite this