- Malicious accounts
- Content moderation evasion
- Inability to detect fraudulent accounts
- Handling additional workflows
- Wide range of flagged user-generated content
- Gaps in detection policies
Overview
A prominent social media platform faced challenges with bad actors creating multiple coded accounts for Coordinated Inauthentic Behavior (CIB) and malicious activities, compromising platform security. Tech Mahindra implemented a comprehensive solution to review flagged content, ensure policy compliance, and optimize workflows, enabling the client to improve user trust and maintain community standards effectively.More
A prominent social media platform faced challenges with bad actors creating multiple coded accounts for Coordinated Inauthentic Behavior (CIB) and malicious activities, compromising platform security. Tech Mahindra implemented a comprehensive solution to review flagged content, ensure policy compliance, and optimize workflows, enabling the client to improve user trust and maintain community standards effectively. The solution helped eliminate over 20,000 fraudulent accounts, reduce user reporting by 24%, and enhance platform safety.
Less
Business Challenge
Strategy and Implementation
Pattern-Based Manual Reviews
Conducted a detailed manual review of accounts displaying suspicious patterns.
Profile Bio Moderation
New policy and workflows to ensure compliance and minimize account information misuse.
AI/ML Rule Development
Leveraged automated content moderation tools for filtering fraudulent accounts
Advanced Moderator Training
To recognize nuanced signals like coded language, symbols, misspelled words, and visual flags.