<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Do Not Feel The Trolls</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Erik</forename><surname>Cambria</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Stirling</orgName>
								<address>
									<settlement>Stirling</settlement>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Praphul</forename><surname>Chandra</surname></persName>
							<email>praphul.chandra@hp.com</email>
							<affiliation key="aff1">
								<orgName type="institution">HP Labs India</orgName>
								<address>
									<settlement>Bangalore</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Avinash</forename><surname>Sharma</surname></persName>
							<email>sharma@hp.com</email>
							<affiliation key="aff1">
								<orgName type="institution">HP Labs India</orgName>
								<address>
									<settlement>Bangalore</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Amir</forename><surname>Hussain</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Stirling</orgName>
								<address>
									<settlement>Stirling</settlement>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Do Not Feel The Trolls</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E34DBD910F5AF17925E591CC8DD55542</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Sentic Computing</term>
					<term>AI</term>
					<term>Semantic Web</term>
					<term>NLP</term>
					<term>Opinion Mining and Sentiment Analysis</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The passage from a read-only to a read-write Web gave people the possibility to freely interact, share and collaborate through social networks, online communities, blogs, wikis and other online collaborative media. The democracy of the Web is what made it so popular in the past decades but such a high degree of freedom of expression also gave birth to negative side effects -the so called 'dark side' of the Web. An example of this is trolling i.e. the exploitation of the anonymity of the Web to post inflammatory and outrageous messages directed to one specific person or community to provoke them into a desired emotional response. Online community masters usually warn users against trolls with messages such as DNFTT (Do Not Feed The Trolls) but so far this has not been enough to stop trolls trolling. The aim of this work is to use Sentic Computing, a new paradigm for the affective analysis of natural language text, to detect trolls and hence prevent web-users from being emotionally hurt by malicious posts.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In Internet slang, a troll is someone who posts inflammatory, extraneous, or offtopic messages in an online community, such as an online discussion forum, chat room, or blog, with the primary intent of provoking other users into a desired emotional response or of otherwise disrupting normal on-topic discussion <ref type="bibr">[1]</ref>.</p><p>The amount of social data on the Web is on an infinite uphill and online social networking is becoming one of the most prevalent means of expression worldwide. Websites like Twitter, Youtube and Blogger are providing a tunnel to link different parts of the world and also different classes of global society.</p><p>The flipside of the coin, on the other hand, is rather dark, fractious and bizarre. Social web is inherently democratic and user anonymity is gratuitous in this space. Be it real world or virtual social web, existence of malicious faction among inhabitants and users is inevitable.</p><p>In social web context, emotional attacks on a person or a group through malicious and vulgar comments in order to provoke response are referred to as 'trolling' and the generator is called 'a troll'. The term was first used in early 1990 and since then a lot of concern has been raised to contain or curb trolls.</p><p>This work proposes a technique based on Sentic Computing <ref type="bibr" target="#b0">[2]</ref>, a novel paradigm for the affective analysis of natural language text, to automatically detect and check web trolls. We present results that are effective in controlling trolls efficiently. To the best of our knowledge this work has no prior.</p><p>The structure of the paper is the following: Section 2 argues about the phenomenon of internet trolling, Section 3 presents the state of the art of malicious post detection, Section 4 and Section 5 explain in detail the techniques used within this work, Section 6 illustrates the overall process for filtering trolls, Section 7 demostrates the potential of such process through an evaluation study, and Section 8 comprises concluding remarks and a description of future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The Internet Trolling Phenomenon</head><p>Trolling is a method of fishing where some baited fishing lines are drawn through the water, usually from a slow-moving boat, with the purpose of hooking unwary fish. An online troll does pretty much the same.</p><p>The trend of trolling, where anonymous online users bombard victims with offensive messages or abuse, appears to have spread a lot recently and it is alarming most of the biggest social networking sites since, in extreme cases such as abuse, has led some teenagers to commit suicide. These attacks usually address not only individuals but also entire communities. For example, reports have claimed that a growing number of Facebook tribute pages had been targeted, including those in memory of the Cumbria shootings victims and soldiers who died in Afghanistan.</p><p>At present users cannot do much rather than manually delete abusive messages. Current anti-trolling methods, in fact, mainly consist in identifing additional accounts that use the same IP address and blocking fake accounts based on name and anomalous site activity e.g. users who send lots of messages to non-friends or whose friend requests are rejected at a high rate.</p><p>In July 2010 Facebook launched an application that gives users a direct link to advice, help and the ability to report cyber problems to the Child Exploitation and Online Protection Centre (CEOP) <ref type="bibr">[3]</ref>. Reporting trouble through a link or a button, however, is a too slow process since social networking websites usually cannot react instantly to these alarms. A button, moreover, does not stop users from being emotionally hurt by trolls and it is more likely to be pushed by people who actually do not need help rather than, for instance, children who are being sexually groomed and do not realize it.</p><p>For these reasons, we need systems able to automatically analyze semantics and sentics, i.e. cognitive and affective information, associated to natural language in order to filter out inopportune messages and, hence, stop users from 'feeling' the trolls.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Related Work</head><p>A prior analysis of the trustworthiness of statements published on the Web has been presented by Rowe and Butters <ref type="bibr" target="#b1">[4]</ref>. Their approach adopts a contextual trust value determined for the person who asserted a statement as the trustworthiness of the statement itself. This study, however, does not focus on the problem of trolling but rather on defining a contextual accountability for the detection of web, email and opinion spam.</p><p>Existing approaches in these fields, in particular, can be grouped into three main categories: keyword spotting <ref type="bibr">[5][6]</ref>, in which text is classified according to the presence of fairly unambiguous spam words, lexical affinity <ref type="bibr" target="#b4">[7]</ref> <ref type="bibr" target="#b5">[8]</ref>, which assigns arbitrary words a probabilistic affinity for spam content, and statistical methods <ref type="bibr" target="#b6">[9]</ref>[10], which consist in calculating the valence of keywords, punctuation and word co-occurrence frequencies on the base of a large training corpus.</p><p>The problem with these approaches is that they mainly rely on parts of text in which web, email and opinion spam is explicitly expressed through spam links, commercial terms or abusive words. But, more generally, spam manifests implicitly through context and domain dependent concepts, which makes keywordbased approaches extremely ineffective.</p><p>To overcome this problem we need to use natural language processing (NLP) techniques that rely on semantics rather than syntactics. Within this work, in particular, we exploit two Sentic Computing tools to extract semantics and sentics from web posts and, eventually, process the results in order to detect and filter trolls.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Sentic Computing</head><p>Sentic Computing is a new opinion mining and sentiment analysis paradigm which exploits AI and Semantic Web techniques to better recognize, interpret and process opinions and sentiments in natural language text.</p><p>The term Sentic Computing derives from the Latin 'sentire' (the root of words such as sentiment and sensation) and 'sense' (intended as common sense) and concerns a kind of computing that relates to, arises from and influences opinions and sentiments in natural language text.</p><p>In Sentic Computing the analysis of text is not based on statistical learning models but rather on common sense reasoning tools <ref type="bibr" target="#b8">[11]</ref> and domain-specific ontologies <ref type="bibr" target="#b9">[12]</ref>. Differently from statistical classification, which generally requires large inputs and thus cannot appraise texts with satisfactory granularity, Sentic Computing enables the analysis of documents not only on the page or paragraphlevel but also on the sentence-level.</p><p>Within this work, in particular, we exploit the combination of two Sentic Computing tools for the extraction of semantics and sentics from web posts i.e. a multi-dimensional vector space of common sense and affective knowledge (Section 4.1) coupled with a novel emotion categorization model born from the idea that our mind consists of four independent emotional spheres, whose different levels of activation make up the total emotional state of the mind (Section 4.2).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">AffectiveSpace</head><p>AffectiveSpace <ref type="bibr" target="#b10">[13]</ref> is a language visualization system which transforms natural language from a linguistic form into a multi-dimensional space. AffectiveSpace is built by blending ConceptNet <ref type="bibr" target="#b11">[14]</ref>, a semantic network of common sense knowledge, and WordNet-Affect <ref type="bibr" target="#b12">[15]</ref>, a linguistic resource for the lexical representation of emotions. This alignment operation yields AffectNet: a new dataset in which common sense and affective knowledge coexist i.e. a matrix 14,301 × 117,365 whose rows are concepts (e.g. 'dog' or 'bake cake'), whose columns are either common sense and affective features (e.g. 'isA-pet' or 'hasEmotion-joy'), and whose values indicate truth values of assertions.</p><p>Therefore, in AffectNet, each concept is represented by a vector in the space of possible features whose values are positive for features that produce an assertion of positive valence (e.g. 'a penguin is a bird'), negative for features that produce an assertion of negative valence (e.g. 'a penguin cannot fly') and zero when nothing is known about the assertion. The degree of similarity between two concepts, then, is the dot product between their rows in AffectNet. The value of such a dot product increases whenever two concepts are described with the same feature and decreases when they are described by features that are negations of each other. When performed on AffectNet, however, these dot products have very high dimensionality (as many dimensions as there are features) and are difficult to work with. In order to approximate these dot products in a useful way, we project all of the concepts from the space of features into a space with many fewer dimensions i.e. we reduce the dimensionality of AffectNet by means of principal component analysis (PCA). In particular, we perform truncated singular value decomposition (TSVD) <ref type="bibr" target="#b13">[16]</ref> on AffectNet and obtain a new matrix, AffectNet*, which forms a low-rank approximation of the original data. This estimation is based on minimizing the Frobenius norm of the difference between AffectNet and AffectNet* under the constraint rank(AffectNet* ) = k and it represents the best approximation of AffectNet in the least-square sense (for the Eckart-Young theorem <ref type="bibr" target="#b14">[17]</ref>).</p><p>In particular, we choose to discard all but the first 100 principal components and hence obtain AffectiveSpace (Fig. <ref type="figure" target="#fig_0">1</ref>), a 100-dimensional space in which different vectors represent different ways of making binary distinctions among concepts and emotions. In AffectiveSpace common sense and affective knowledge are in fact combined, not just concomitant, i.e. everyday life concepts like 'have breakfast', 'meet people' or 'watch tv' are linked to a hierarchy of affective domain labels.</p><p>By exploiting the information sharing property of TSVD, concepts with the same affective valence are likely to have similar features i.e. concepts concerning the same opinion tend to fall near each other in the vector space. Concepts and emotions are represented by vectors of 100 coordinates: these coordinates can be seen as describing concepts in terms of 'eigenmoods' that form the axes of AffectiveSpace i.e. the basis e 0 ,...,e 99 of the vector space. For example, the most significant eigenmood, e 0 , represents concepts with positive affective valence. That is, the larger a concept's component in the e 0 direction is, the more affectively positive it is likely to be. Consequently concepts with negative e 0 components have negative affective valence.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">The Hourglass of Emotions</head><p>This model is a variant of Plutchik's emotion categorization <ref type="bibr" target="#b15">[18]</ref> and constitutes an attempt to emulate Marvin Minsky's conception of emotions. Minsky sees the mind as made of thousands of different resources and believes that our emotional states result from turning some set of these resources on and turning another set of them off <ref type="bibr" target="#b16">[19]</ref>. Each such selection changes how we think by changing our brain's activities: the state of anger, for example, appears to select a set of resources that help us react with more speed and strength while also suppressing some other resources that usually make us act prudently.</p><p>The Hourglass of Emotions (Fig. <ref type="figure" target="#fig_1">2</ref>) is specifically designed to recognize, understand and express emotions in the context of human-computer interaction (HCI). In the model, in fact, affective states are not classified, as often happens in the field of emotion analysis, into basic emotional categories, but rather into four concomitant but independent dimensions in order to understand how much respectively:</p><p>1. the user is happy with the service provided (Pleasantness) 2. the user is interested in the information supplied (Attention) 3. the user is comfortable with the interface (Sensitivity) 4. the user is disposed to use the application (Aptitude) Each affective dimension is characterized by six levels of activation, called 'sentic levels', which determine the intensity of the expressed/perceived emotion as a float ∈ [-3,3]. These levels are also labelled as a set of 24 basic emotions (six for each of the affective dimensions) in a way that the model can specify the affective information associated to text both in a dimensional and in a discrete form. The dimensional form, in particular, is called 'sentic vector' and it is a four dimensional vector that can potentially express any human emotion in terms of Pleasantness, Attention, Sensitivity and Aptitude. Some particular sets of sentic vectors have special names as they specify well-known compound emotions. For example the set of sentic vectors with a level of Pleasantness ∈ (1,2] ('joy'), a null Attention, a null Sensitivity and a level of Aptitude ∈ (1,2] ('trust') are called 'love sentic vectors' since they specify the compound emotion of 'love'. The main aim of the Troll Detector is to identify malicious contents in natural language text with a certain confidence level. To train the detector, we first identify the concepts most commonly used by trolls (Section 5.1) and then expand the resulting knowledge base with semantically related concepts (Section 5.2). We finally define a method to calculate trollness i.e. the probability for a post to be edited by a troll (Section 5.3).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">CF-IOF Weighting</head><p>The technique we use to identify the concepts commonly used by trolls is called CF-IOF <ref type="bibr" target="#b17">[20]</ref> (concept frequency -inverse opinion frequency) and it is an approach similar to TF-IDF weighting which evaluates how important a concept is to a set of opinions concerning the same topic.</p><p>We first calculate the frequency of a concept c i for a given topic j by counting the occurrences of the concept c i in the set of available j-tagged opinions and divide the result by the sum of occurrences of the same concept in the whole set of opinions concerning j. We then multiply this frequency by the logarithm of the total number of opinions divided by the number of opinions containing the concept c i , that is:</p><formula xml:id="formula_0">(CF -IOF ) i = j n i,j k n k,j log |O| |{o : c i ∈ o}|</formula><p>where n i,j is the number of occurrences of the considered concept c i in the opinions tagged with the topic j, |{o : c i ∈ o}| the number of opinions where c i appears and |O| the total number of opinions.</p><p>A high weight in CF-IOF is reached by a high concept frequency (in the given opinions) and a low opinion frequency of the concept in the whole collection of opinions. Therefore, thanks to CF-IOF weights, we manage to filter out common concepts and detect relevant concepts that are usually used by trolls to emotionally attack unaware users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Spectral Association</head><p>In order to expand the set of concepts previously obtained by applying CF-IOF, we use a technique called spectral association <ref type="bibr" target="#b18">[21]</ref> that involves assigning values, or activations, to 'seed concepts' and applying an operation that spreads their values across the ConceptNet graph.</p><p>This operation, an approximation of many steps of spreading activation, transfers the most activation to concepts that are connected to the key concepts by short paths or many different paths in common sense knowledge. In particular, we build a matrix C that relates concepts to other concepts, instead of their features, and add up the scores over all relations that relate one concept to another, disregarding direction.</p><p>Applying C to a vector containing a single concept spreads that concept's value to its connected concepts. Applying C 2 spreads that value to concepts connected by two links (including back to the concept itself). But what we'd really like is to spread the activation through any number of links, with diminishing returns, so perhaps the operator we want is:</p><formula xml:id="formula_1">1 + C + C 2 2! + C 3 3! + ... = e C</formula><p>We can calculate this odd operator, e C , because we can factor C. C is already symmetric, so instead of applying Lanczos' method to CC T and getting the SVD, we can apply it directly to C and get the spectral decomposition C = V ΛV T . As before, we can raise this expression to any power and cancel everything but the power of Λ. Therefore, e C = V e Λ V T . This simple twist on the SVD lets us calculate spreading activation over the whole matrix instantly.</p><p>As with the SVD, we can truncate these matrices to k axes and therefore save space while generalizing from similar concepts. We can also rescale the matrix so that activation values have a maximum of 1 and do not tend to collect in highly-connected concepts such as 'person', by normalizing the truncated rows of V e Λ/2 to unit vectors, and multiplying that matrix by its transpose to get a rescaled version of V e Λ V T .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Calculating Trollness</head><p>In order to calculate the probability for a post to be edited by a troll, we exploit both the semantics and the sentics associated to it.</p><p>For each concept contained in the post, the Troll Detector checks if this belongs to the set of 'troll concepts' calculated through spectral association and exploits its relative sentic vector to check if it carries malicious affective charge. By analyzing a set of 1000 offensive phrases extracted from Wordnik <ref type="bibr">[22]</ref>, in fact, we found that, statistically, a post is likely to be edited by a troll when its average sentic vector has a high absolute value of Sensitivity and a very low polarity. Hence we defined the trollness t i associated to a concept c i as a float ∈ [0, 1] such that:</p><formula xml:id="formula_2">t i (c i ) = s i (c i ) + |Snsit(c i )| − p i (c i ) 5</formula><p>where s i (float ∈ [0, 1]) is the semantic similarity of c i wrt any of the CF-IOF seed concepts, p i (float ∈ [−1, 1]) is the polarity associated to the concept c i and 5 is the normalization factor (the maximum value of the numerator in fact is given by a similarity of 1, a Sensitivity of 3 or -3 and a polarity equal to -1). In particular, p i is defined <ref type="bibr" target="#b19">[23]</ref> as:</p><formula xml:id="formula_3">p i (c i ) = P lsnt(c i ) + |Attnt(c i )| − |Snsit(c i )| + Aptit(c i ) 9</formula><p>where 9 is the normalization factor (since the numerator's maximum value is given by the sentic vectors [3, ±3, 0, 3] and the minimum by [−3, 0, ±3, −3]).</p><p>In the formula, Attention and Sensitivity are taken in absolute value since, from the point of view of polarity rather than affection, all of their sentic values represent positive and negative values respectively (e.g. 'anger' is positive in the sense of level of activation of Sensitivity but negative in terms of polarity and 'surprise' is negative in the sense of lack of Attention but positive from a polarity point of view).</p><p>Hence, the total trollness of a post containing N concepts is defined as:</p><formula xml:id="formula_4">t = 5 9 N i=1 9 s i (c i ) + 10 |Snsit(c i )| − P lsnt(c i ) − |Attnt(c i )| − Aptit(c i ) N</formula><p>This information is stored, together with post type and content plus sender and receiver ID, in an interaction database that keeps trace of all the messages and comments interchanged between users within the same social network.</p><p>Posts with a high level of trollness (current threshold has been set, using a trial and error approach, to 60%) are labelled as troll posts and, whenever a specific user addresses more than two troll posts to the same person or community, his/her sender ID is labelled as troll for that particular receiver ID.</p><p>All the past troll posts sent to that particular receiver ID by that specific sender ID are then automatically deleted from the website (but kept in the database with the possibility for the receiver to either visualize them in an apposite troll folder and, in case, restore them). Moreover, any new post with a high level of trollness edited by a user labelled as troll for that specific receiver is automatically blocked i.e. saved in the interaction database but never displayed in the social networking website.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Troll Filtering Process</head><p>The process for filtering trolls (illustrated in Fig. <ref type="figure" target="#fig_2">3</ref>) comprises four main components: a NLP module, which performs a first skim of the document, a Semantic Parser, whose aim is to extract concepts from the lemmatized text, AffectiveSpace, for the extraction of sentics from the given concepts, and the Troll Detector, whose aim is to detect and eventually block the troll.</p><p>The NLP module interprets all the affective valence indicators usually contained in text such as special punctuation, complete upper-case words, onomatopoeic repetitions, exclamation words, negations, degree adverbs and emoticons, and eventually lemmatizes text.</p><p>The Semantic Parser then deconstructs text into concepts and provides, for each of them, the relative frequency, valence and status i.e. the concept's occurrence in the text, its positive or negative connotation, and the degree of intensity with which the concept is expressed.</p><p>The AffectiveSpace module projects the retrieved concepts into the vector space, clustered wrt the Hourglass model, and it infers the affective valence of these, in terms of Pleasantness, Attention, Sensitivity and Aptitude, according to the positions they occupy in the space. This information, encoded as a sentic vector, is given as input to the Troll Detector which exploits it, together with the semantic information coming directly from the Semantic Parser, to calculate the post's trollness and, eventually, to detect and block the troll (according to the information stored in the interaction database). As an example of Troll Filtering Process output, we can consider a troll post recently addressed to the Indian author Chetan Bhagat: "You can't write, you illiterate douchebag, so quit trying, I say!!!". In this case we have a very high level of Sensitivity (corresponding sentic level 'rage') and a negative polarity, which give a high percentage of trollness, as shown below:</p><p>&lt;Concept: !'write </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Evaluation</head><p>In order to perform a first evaluation of our system, we considered a set of 500 tweets (most of which fetched from Wordnik) manually annotated as troll and non-troll posts. We considered true positives those posts with both a positive troll-flag and a trollness ∈ [0.6, 1] and those with both a negative troll-flag and a trollness ∈ [0, 0.6). The threshold has been set to 60% based on trial and error over a separate dataset of 50 tweets.</p><p>Results show that, by using the Troll Filtering Process, inflammatory and outrageous messages can be identified with good precision (82%) and decorous recall rate (75%). In particular, the F-measure value (78%) is significantly high compared to the corresponding F-measure rates of the baseline methods (53% for keyword spotting, 59% for lexical affinity, 66% for statistical methods).</p><p>However, we expect to obtain much better results by evaluating the process at interaction-level rather than just at post-level. In the next future, in fact, we plan to evaluate the Troll Filtering Process by monitoring not just single posts but also users' holistic behaviour within the same social network (i.e. contents and recipients of their interaction) and submit further results elsewhere for publication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusion and Future Efforts</head><p>As the Web plays a more and more significant role in people's social lives, it contains more and more information concerning their opinions and feelings. After the explosion of Web 2.0, a lot of users have been exploiting this trend, together with the anonymity of the Web, to attack specific people or communities with inflammatory and outrageous messages and, hence, provoke them into a desired emotional response.</p><p>For their fiendish nature, these users have been labelled as trolls. Online community masters have desperately tried to warn users against these mischievous people with messages such as DNFTT (Do Not Feed The Trolls) but so far this has not been enough to stop trolls trolling.</p><p>Within this work we exploited Sentic Computing, a new paradigm for the affective analysis of natural language text, to design a process capable to extract semantics and sentics from web-posts and infer from these the truthfulness of user interaction.</p><p>The main aim of the Troll Filtering Process, in fact, is to exploit the cognitive and affective information associated to natural language text to define a level of trollness of each post and, according to this, classify users and prevent the malicious ones from emotionally hurting other people or communities within the same social network.</p><p>In the next future, we plan to improve the process by using a much bigger dataset for training the Troll Detector and also to perform an evaluation of the system at interaction-level rather than just at post-level, in order to better understand, and hence prevent, trolls' behaviour.</p><p>Eventually, we plan to enhance the system by making most of its functionalities available as web-services in a way that the Troll Filtering Process could be easily embedded in any social networking website and, hence, change the meaning of the popular acronym often displayed in these websites, DNFTT, from a shadowy and often ineffective suggestion to a reassuring and deterrent slogan -Do Not Feel The Trolls.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Affectively positive (bottom-left corner) and affectively negative (up-right corner) concepts in AffectiveSpace</figDesc><graphic coords="4,136.18,381.82,343.00,237.01" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The Hourglass of Emotions</figDesc><graphic coords="6,136.18,330.47,343.00,278.99" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Troll Filtering Process</figDesc><graphic coords="10,136.18,115.84,342.97,151.19" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Sentic Computing: Exploitation of Common Sense for the Development of Emotion-Sensitive Systems</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cambria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Eckl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">5967</biblScope>
			<biblScope unit="page" from="153" to="161" />
			<date type="published" when="2009">2009</date>
			<publisher>Springer-Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Assessing Trust: Contextual Accountability</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rowe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Butters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SPOT at ESWC</title>
				<meeting><address><addrLine>Heraklion</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Mining the Peanut Gallery: Opinion Extraction and Semantic Classification of Product Reviews</title>
		<author>
			<persName><forename type="first">K</forename><surname>Dave</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lawrence</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Pennock</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>WWW</publisher>
			<pubPlace>Budapest</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Towards Phising E-Mail Detection Based on Their Structural Properties</title>
		<author>
			<persName><forename type="first">M</forename><surname>Chandrasekaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Karayanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Upadhyaya</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>SCSS</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Mining and Summarizing Customer Reviews</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>KDD</publisher>
			<pubPlace>Seattle</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Analyzing and Detecting Review Spam</title>
		<author>
			<persName><forename type="first">N</forename><surname>Jindal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>ICDM</publisher>
			<pubPlace>Omaha</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Combining Multiple Email Filters Based on Multivariate Statistical Analysis</title>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zhong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<pubPlace>ISMIS, Bari</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Opinion Spam and Analysis</title>
		<author>
			<persName><forename type="first">N</forename><surname>Jindal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>WSDM</publisher>
			<pubPlace>Palo Alto</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Common Sense Computing: From the Society of Mind to Digital Intuition and Beyond</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cambria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Eckl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">5707</biblScope>
			<biblScope unit="page" from="252" to="259" />
			<date type="published" when="2009">2009</date>
			<publisher>Springer-Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Sentic Computing for Social Media Marketing</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cambria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Grassi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">To appear in: Multimedia Tools and Applications</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">AffectiveSpace: Blending Common Sense and Affective Knowledge to Perform Emotive Reasoning</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cambria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Eckl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WOMSA at CAEPIA</title>
				<meeting><address><addrLine>Seville</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">ConceptNet 3: a Flexible, Multilingual Semantic Network for Common Sense Knowledge</title>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Speer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Alonso</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>RANLP</publisher>
			<pubPlace>Borovets</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">WordNet-Affect: an Affective Extension of WordNet</title>
		<author>
			<persName><forename type="first">C</forename><surname>Strapparava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Valitutti</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>LREC</publisher>
			<pubPlace>Lisbon</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Singular Value Decomposition and Principal Component Analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Wall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rechtsteiner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rocha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">A Practical Approach to Microarray Data Analysis</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Berrar</surname></persName>
		</editor>
		<meeting><address><addrLine>Norwell</addrLine></address></meeting>
		<imprint>
			<publisher>Kluwer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="91" to="109" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Approximation of One Matrix by Another of Lower Rank</title>
		<author>
			<persName><forename type="first">C</forename><surname>Eckart</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Young</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Psychometrika</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="211" to="218" />
			<date type="published" when="1936">1936</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The Nature of Emotions</title>
		<author>
			<persName><forename type="first">R</forename><surname>Plutchik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">American Scientist</title>
		<imprint>
			<biblScope unit="volume">89</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="344" to="350" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">The Emotion Machine</title>
		<author>
			<persName><forename type="first">M</forename><surname>Minsky</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Simon and Schuster</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">SenticNet: a Publicly Available Semantic Resource for Opinion Mining</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cambria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Speer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AAAI CSK10</title>
				<meeting><address><addrLine>Arlington</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Automated Color Selection Using Semantic Knowledge</title>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Speer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Holmgren</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AAAI CSK10</title>
				<meeting><address><addrLine>Arlington</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Cambria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Havasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Eckl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Munro</surname></persName>
		</author>
		<title level="m">Towards Crowd Validation of the UK National Health Service</title>
				<meeting><address><addrLine>WebSci10, Raleigh</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
