Content Report Management in a Social Networking System

ABSTRACT

User reports concerning inappropriate content are received by a social networking system and are put into a content report management process that routes the reports into other handling processes based upon the reporting user&#39;s identification of the report type. Reports concerning content that is related to the reporting user are routed into a social resolution process that resolves the complaint through self-help and social resolution. Other reports are handled by a content review process that resolves complaints through automated methods as well as manual review by human agents.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of co-pending U.S. application Ser.No. 13/316,352, filed on Dec. 9, 2011, which is hereby incorporated byreference in its entirety.

BACKGROUND

This invention relates generally to social networking, and in particularto the management of user reports related to offensive, harassing, or“spammy” content in a social network system.

Social networking systems allow users to create accounts that are tiedto their identities. The social networking system allows users to postobjects, such as photos and videos, and to take actions, such ascommenting and messaging (collectively the objects and actions arecalled “content”). Occasionally users of the social networking systemwill encounter content from other users that is offensive, harassing,spammy, or otherwise objectionable to the recipient and/or against theusage policies of the social networking system (collectively called“inappropriate” content). Social networking systems allow users togenerate reports identifying inappropriate content as they encounter it.Typically a social networking system manages these reports through areview process. The review process must handle the case where content isreported that is not inappropriate. The social networking system cannotsimply block all content that every user reports as this may lead tooverbroad censorship of content on the social networking system. Thesocial networking systems review process must contain checks to ensurethat only truly inappropriate content is blocked. For example, when asocial networking system receives a report from a user that identifiesan allegedly offensive photo, the review process may use a human agentto review the photo to confirm that is in fact offensive.

Manual review of reported content may require significant humanresources. In recent years, the volume of reports from users of socialnetworking systems has made the management of these reports anoverwhelming task. In many cases users report content that is notinappropriate simply because they find the content embarrassing oruncomplimentary. For example, a user may report a photo as spam, wherethe photo merely contains an uncomplimentary image of him. Reviewingsuch unjustified reports consumes resources and creates delays inresolving other legitimate reports.

For these reasons there has been a pressing need for a system that cansatisfactorily resolve user reports without consuming human resources,while reducing the number of unjustified reports that are submitted tothe content reviewing process.

SUMMARY

A social networking system provides a method for managing a contentreport received from a reporting user of the system, where the reportindicates reported content posted by a content owner that is allegedlyinappropriate. In response to receiving a report of content, the socialnetworking system sends reporting options for display to the reportinguser. The system then receives from the reporting user a reportingoption selection.

In one embodiment, responsive to receiving the selected reporting optionindicating that the reported content is related to the reporting user,the social networking system initiates a social resolution process thatcomprises sending social reporting options for display to the reportinguser. The reporting user selects a social reporting option thatindicates a complaint type. Responsive to receiving the complaint type,the social networking system offers the reporting user self-help andsocial resolution options, such as the ability to message a trustedthird-party to resolve bullying, block a user that is posting harassingcomments, and/or untag or otherwise disassociate the reporting user withan unflattering photo.

In one embodiment, responsive to receiving the selected reporting optionindicating that the reported content is not related to the reportinguser, the social networking system initiates a content review process.In the content review process, a confidence score is generated for thereported content, where the confidence score comprises a measure of theprobability that the reported content is inappropriate. Based on theconfidence score, the social networking system either sends a request tothe content owner to delete the reported content, or sends informationto the reporting user about what actually constitutes inappropriatecontent and asks them to reconfirm the content report.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a social networking system environment in which oneembodiment of the content report management process is implemented.

FIG. 2A is a flowchart illustrating one embodiment of a content reportmanagement process.

FIG. 2B is a flowchart illustrating one embodiment of a content reviewprocess.

FIG. 2C is a flowchart illustrating one embodiment of a socialresolution process.

The figures depict various embodiments of the present invention forpurposes of illustration only. One skilled in the art will readilyrecognize from the following discussion that alternative embodiments ofthe structures and methods illustrated herein may be employed withoutdeparting from the principles of the invention described herein.

DETAILED DESCRIPTION Overview of the Social Networking SystemEnvironment for Content Report Management

FIG. 1 is a high-level block diagram of the social networking systemenvironment in which the content report management process operates,according to one embodiment. FIG. 1 shows a single user device 100communicating with a social networking system 101, over a network 106.Although one user device 100 and one social networking system 101 areillustrated in this figure, in practice there may be many user devices100 and many social networking systems 101 connected over the network106.

The social networking system 101 allows users to create accounts andestablish links with other users of the social networking system 101.When two users become linked, they are said to be “connections,”“friends,” “contacts,” or “associates” within the context of the socialnetworking system 101. The social networking system 101 includes asocial graph 102. The social graph 102 stores the connections that eachuser has with other users of the social networking system 101.

The social networking system provides a user with various ways tocommunicate with other users, for example, by email (internal andexternal to the social networking system), instant message, textmessage, phone, and the like. The social networking system allows a userto share new content items (such as photographs, videos, and URLs) aswell as to view, comment on, download, endorse, or report another user'scontent items.

The social networking system 101 maintains a user account for each userthat has joined the social networking system. The user that has createdan account on the social networking system is referred to as the“account-holder” for that account. Any action that a particular usercommunicates to the social networking system 101 is associated with theuser's account, through information maintained in an action log 109.Such actions may include, for example, adding a link to the anotheruser, sending a message to another user, reading a message from anotheruser, viewing content associated with another user, attending an eventposted by another user, among others. The action log 109 stores a log ofactions of a user and those of other users with whom the user hasestablished a connection in the social networking system (i.e., theuser's connections). A log entry for an action may include the time ofoccurrence of the action, a type of action performed, the user whoperformed the action, an object on which the action was performed, andany other information related to the action, such as the content of auser's comment or a location associated with the action. For example, inthe action ‘Adrian bought a ring at Tiffany & Co.,’ the type of actionis buying, the object is a ring and extra information includes where thering was bought, Tiffany & Co. The actions may be taken online eitherwithin the social networking system 101 or outside of it, or they may beactions performed in the real world and recorded and communicated to thesocial networking system 101.

The social networking system 101 also maintains a user profile with eachaccount. The user profile describes the account-holder's characteristicssuch as work experience, educational history, hobbies, location, orsimilar data, and may also include data describing one or morerelationships between the account-holder and other users.Account-holders may also post messages specifically to their profiles inthe form of “status updates.” Users of a social networking system mayview the profiles of other users if they have the permission. In someembodiments, becoming a connection of an account-holder automaticallyprovides the permission to view the account-holder's profile. Each useraccount on the social networking system typically has a single userprofile associated with it. In addition to the profile, an account mayhave a “wall” associated with it. The wall is a place where other usersmay post content directed at the account-holder. Permission to postcontent to a user's wall may be restricted to the user's immediateconnections or friends.

Although many user accounts are created by individuals for themselves,other user accounts may be created by individuals for organizations suchas non-profits or corporations. In such cases, although an officer ofthe organization may create the account, the account-holder for thataccount is considered to be the organization rather than the individualofficer creating the account.

The user profile associated with an account may reveal the real identityof the account holder. For example, the real name of an individual,celebrity or organization. The social networking system may require thataccount-holders reveal their real identities, and that they do notimpersonate other people or entities through their user profiles.

Generally being linked in a social networking system 101 allows linkedusers access to more information about each other than would otherwisebe available to unlinked users.

A user interacts with the social networking system 101 using a userdevice 100, such as a personal computer or a mobile phone. The user mayinteract with the social networking system 101 via a web applicationrunning in a web browser executing on the user device 100; or the usermay interact with the social networking system 101 through a nativeapplication running on the user device 100. These applications may bedownloaded to the user device 100 from the social networking system 101,or they may be provided by a third party. Typical interactions betweenthe user device 100 and the social networking system 101 includeoperations such as creating an account, viewing profiles associated withother accounts, contributing and interacting with media items, joininggroups, listing and confirming attendance at events, checking in atlocations, liking certain pages, creating pages, and performing othertasks that facilitate social interaction. A user connected through auser device 100, to the social networking system 101, may also create acontent report to complain about content posted by another user on thesocial networking system 100. The social networking system 101 initiatesa content report management process to deal with such content reports,as described in more detail herein.

The network 106 is the Internet or another system of interconnectedcomputer networks that use standard communications technologies and/orprotocols to facilitate data transmission. Thus, the network 106 caninclude links using technologies such as Ethernet, 802.11, worldwideinteroperability for microwave access (WiMAX), 3G, digital subscriberline (DSL), asynchronous transfer mode (ATM), InfiniBand, PCI ExpressAdvanced Switching, etc. Similarly, the networking protocols used on thenetwork 106 can include multiprotocol label switching (MPLS), thetransmission control protocol/Internet protocol (TCP/IP), the UserDatagram Protocol (UDP), the hypertext transport protocol (HTTP), thesimple mail transfer protocol (SMTP), the file transfer protocol (FTP),etc. The data exchanged over the network 106 can be represented usingtechnologies and/or formats including the hypertext markup language(HTML) and the extensible markup language (XML). In addition, all orsome of links can be encrypted using conventional encryptiontechnologies such as secure sockets layer (SSL), transport layersecurity (TLS), virtual private networks (VPNs), Internet Protocolsecurity (IPsec), etc. In another embodiment, the entities can usecustom and/or dedicated data communications technologies instead of, orin addition to, the ones described above.

The social networking system 101 includes a user interface manager 103that allows a social networking system user to interact with the socialnetworking system 101 through a social networking system interface. Forexample, the user interface manager 103 may generate one or more webpages that are displayed on the user device 100, where the web pagesdisplay social networking system data such as images, video, userprofiles, etc. The user interface manager 103 also generates theinterfaces necessary for the social networking system 101 to request andreceive information from the user operating the user device 100. Forexample, the user interface manager 103 may create a web page form sothat a user can provide biographic information, such as the user's age,for use by the social networking system 101 in creating that user's userprofile. User information is stored by the social networking system inthe data store 108. User information includes not only the biographicinformation provided by users, but also may include content uploaded bya user such as photographs, video, status updates, blog posts etc. Whenother users request the user's profile page, user interface manager 103may retrieve the user's data from the data store 108 and generate a userprofile web page for display on the user device 100. When a user'scontent is requested by another user of the social networking system101, the user interface manager 103 will generate and send a web pagethat includes that content. The generated web page with the user contentmay also include an interface option (such as a link or button) so thata viewing user can report the content.

The authentication manager 106 authenticates a user on user device 100as having an account on the social networking system 101. It allows auser to log into the social networking system 101 through any userdevice 100 that has an application supporting the social networkingsystem 101. In some embodiments, the authentication manager 106validates users that connect to the social networking system 101 throughthird party applications.

The content report manager 104 controls the process that is used tomanage content reports in the social networking system 101. Users mayreport content for a variety of different reasons, and the contentreport manager 104 manages the process of resolving them. The contentreport manager 104 resolves content reports by either initiating asocial resolution process or a content review process. The socialresolution process is invoked when a user indicates that the reportedcontent is related to them. Content that is related to the reportinguser may often be resolved using social techniques as opposed to thecontent review process. Social techniques include messaging the contentowner to request deletion of an unflattering picture, messaging a bullyto request deletion of a harassing message, etc. The social resolutionprocess is managed by the social resolution manager 113, and isdescribed in more detail herein.

The content report manager 104 invokes the content review process whenthe reporting user indicates that the reported content is not related tothem (and therefore unlikely to be resolved through the socialresolution process). The content review process is managed by thecontent review manager 105.

If the content review manager 105 receives a content report from a userthat identifies allegedly inappropriate content (called the “reportedcontent”), the content review manager 105 may use the services of theconfidence score generator 110 to compute a measure of the likelihoodthat the accused content is actually inappropriate. The measure oflikelihood that the accused content is inappropriate is called theconfidence score. The confidence score generator 110 has processes thatare able to generate a confidence score based on features of the contentas well as data in the social graph 102, the action log 109, and datastore 108 (collectively called social data). For example, the confidencescore generator 110 may detect that a photo that is reported as spam hasbeen shared with a large number of users, has many users tagged in it,and has similar image characteristics to other spam images. Based onthis information the confidence score generator 110 may give thereported photo a high confidence score, which indicates to the contentreport manager 105 that there is a high likelihood that the photo is infact spam.

The confidence score generator 110 may utilize the services of themachine-learning module 111 to determine the probability that aparticular piece of content is inappropriate content. Themachine-learning module 111 trains machine-learned models that cangenerate the confidence score for the reported content based on the typeof report (whether for spam, pornography, racism, etc.), social data,and features of the content.

When the content review manager 105 receives a report for a piece ofcontent that has a confidence score greater than a minimum confidencethreshold, the content review manager 105 may request that the contentowner delete the content. If the content owner refuses to delete thecontent, the content can be flagged for manual review by a human agent.The content review process is described in more detail herein.

Content Report Management Process

FIG. 2A illustrates one embodiment of the content report managementprocess as managed by the content report manager 104. The content reportmanagement process begins when a social networking system user, calledthe reporting user, initiates a reporting process through the socialnetworking system interface. The content for which the reporting processis initiated is called the reported content (RC). The reporting user maybe motivated to report the RC because that content is in factinappropriate (e.g. spam, pornography, etc.), or the reporting user maybe motivated to report the RC for other personal reasons (e.g. thecontent may show the reporting user or a third-party in an unflatteringlight). The content report manager 104 displays 201 reporting options tothe reporting user via the social networking system interface managed bythe user interface manager 103.

When the user interface manager 103 “displays” options to the reportinguser through the social networking system interface, in practice theprocess may involve sending the reporting options to the user device100, where the user device 100 ultimately renders the options to ascreen. These reporting options allow the reporting user to select thetype of report that is appropriate for the RC. Depending on whether theRC is related to the user (e.g. an unflattering photograph, a bullyingmessage, etc.), is not related to the user (e.g. the content ispornography, spam, hate speech, generally offensive, illegal, etc.), oris about a third-party (e.g. bullying or abusive content concerning athird-party) the content report manager may initiate different handlingprocesses.

When the RC is related to the reporting user, the content report manager104 initiates 202 the social resolution process. The social resolutionprocess resolves the content report through social solutions, withoutrequiring direct intervention by employees or agents of the socialnetworking system 101. The social resolution process is described inmore detail herein.

When the RC is not related to the reporting user, the content reportmanager 104 initiates 203 the content review process. The content reviewprocess resolves the content report by utilizing automatic means andalso possibly human agents. The content review process is described inmore detail herein.

When the RC is related to a third-party, the content report manager 104gives the reporting user the option of notifying 204 the third-partyabout the RC. If the third-party does not currently have permission toview that content, the social networking system 101 may temporarilygrant the third-party the ability to view the content for reportingpurposes. The content report manager 104 then displays 205 reportingoptions to the third-party. The third-party can then initiate 202 thesocial resolution process.

FIG. 2B illustrates one embodiment of the content review process asmanaged by the content review manager 105. The content review manager105 then utilizes the services of the confidence score generator 110 togenerate 210 a confidence score (CS) for RC. The CS is a measure of theprobability that RC is really inappropriate content, as opposed tomistakenly or maliciously reported innocent content.

In one embodiment CS is generated by the confidence score generator 110using machine-learned algorithms that use social data to determine theprobability that content is inappropriate. The machine-learnedalgorithms may be trained by the machine-learning module 111. Themachine-learned algorithms are trained to recognize the characteristicsof content that are correlated with various sorts of inappropriatecontent like pornography, spam, etc. For example, a photograph withcertain skin tones and many unrelated users tagged in it may berecognized as pornographic spam based on these characteristics. Themachine-learning module 111 may provide different machine-learnedalgorithms to calculate CS based on the type of inappropriate contentidentified by the reporting user. For example, different machine-learnedalgorithms may be selected to generate CS based on the content beingidentified as a spam photo versus a racist photo.

Once CS is determined, the content review manager 105 compares the CSagainst a minimum confidence threshold. The minimum confidence thresholdis a value that is set by the social networking system 101, and which isa measure of the minimum probability of inappropriateness that mustexist before the content review manager 105 contacts the owner of thereported content. Since the content review process may be burdensome tothe content owner, the social networking system 101 may set this minimumthreshold to avoid burdening users that have posted content that hasonly a low probability of being inappropriate. The minimum confidencethreshold may be set by the social networking system 101 based on aglobal policy, or the threshold may be set based on other factorsassessed by the social networking system 101, such as the type of RC(whether photo, video, or text, for example), or demographics of thereporting user or content owner.

If CS is greater than the minimum confidence threshold, then the contentreview manager 105 provides 211 educational information to the contentowner that informs the content owner that the material they haveposted—i.e., the RC—is inappropriate. The type of educationalinformation that the content owner receives may be based on the type ofinappropriate material identified by the reporting user in the contentreport. For example, the educational information will be different if RCis alleged to be pornography versus if it is alleged to be spam. Thecontent review manager 105 then requests 211 that the content ownerdelete RC from the social networking system 101. Requests like this, aswell as others, from the social networking system 101 may becommunicated to the content owner through the social networking systeminterface managed by the user interface manager 103, or they may be sentthrough another form such as email, SMS message, etc.

If the content owner deletes RC, the process is concluded. If thecontent owner does not delete RC, then the content review manager 105queues 213 RC for manual review. In the manual review process a humanagent examines RC and determines if RC is really inappropriate content.If RC is determined to be inappropriate the human agent may delete RC.In addition, the human agent may enroll the content owner in a “timeout”administered through the access restrictions manager 112. The timeoutadministered through the access restrictions manager 112 restricts thecontent owner's ability to post new content for a period of time. Thetimeout period can be extended if the content owner posts inappropriatecontent repeatedly. If the human agent determines that RC is notinappropriate content (i.e. the content owner is innocent), then RC willnot be deleted. In addition, the reporting user may be given a timeoutthrough the access restrictions manager 112 that prevents them fromfiling additional content reports for a time period. The time period canbe extended if the reporting user repeatedly reports innocent content.

If CS is less than the minimum confidence threshold, then the contentreview manager 105 provides 212 educational information to the reportinguser that reminds the reporting user about what types of content areinappropriate. The content review manager 105 then requests 212 that thereporting user reconfirm the content report. If the reporting user doesnot reconfirm the report, then the content review process is terminated,and the content report is considered resolved. If the reporting userdoes reconfirm the content report then RC is queued for manual review bya human agent as described above.

FIG. 2C illustrates one embodiment of the social resolution processmanaged by the social resolution manager 113. The social resolutionprocess is designed to help the reporting user resolve the underlyingreason for their content report without directly involving the socialnetworking system 101. The social resolution manager 113 achieves thisgoal by providing the reporting user with self-help options and socialresolution options as described below.

The content report manager 104 initiates the social resolution processas a result of the reporting user confirming that they object to RCbecause it is related to them. The social resolution manager thendisplays 220 social reporting options to the reporting user through thesocial networking interface managed by the user interface manager 103.The social reporting options allow the reporting user to select thecomplaint type that they have against RC, e.g., the RC may beunflattering, bullying, or otherwise unwanted by the reporting user.Based on these categories, the reporting user is able to select anoption to resolve their complaint. FIG. 2C shows only two options,report for bullying and report for unflattering content, but otheroptions are also possible, such as stalking, sexual harassment, etc.Based on the selected complaint type, the social resolution manager 113offers the reporting user different resolution options.

For example, if the reporting user indicates that the RC is unflatteringcontent (such as an unflattering photo) the social resolution manager113 may display 221 resolution options for that particular complainttype through the social networking interface managed by the userinterface manager 103. In this case the reporting user can choose toself-service 223, for example by untagging the content, blocking thecontent, or unfriending the content owner. Or the reporting user canchoose social resolution, in which case the social resolution manager113 will provide 222 an interface to the reporting user so that they canmessage the content owner to request that they remove the RC. In thecase where the reporting user does not have permission to message thecontent owner directly (e.g. when the content owner is not a friend, orhas blocked the reporting user), the social resolution manager 113 canprovide the reporting user with an interface to send a message through athird-party that is connected to both the reporting user and the contentowner.

In another example, if the reporting user indicates that the RC isbullying, the social resolution manager 113 may display 225 resolutionoptions to resolve the bullying through the social networking interfacemanaged by the user interface manager 103. Again the reporting user canchoose between self-help and social resolution. In this case if thereporting user chooses social resolution, the social resolution manager113 will provide 227 an interface so that the reporting user can composea message to a trusted third-party (such as a teacher) to notify them ofthe bullying. The social resolution manager 113 will automaticallyattach the necessary context to the message, including the bullyingcontent, RC. The self-help resolution is identical to the earlierexample. The social resolution manager 113 allows the reporting user toself-service 223 by untagging the bullying content, blocking it, orunfriending the content owner.

Additional Concerns

The foregoing description of the embodiments of the invention has beenpresented for the purpose of illustration; it is not intended to beexhaustive or to limit the invention to the precise forms disclosed.Persons skilled in the relevant art can appreciate that manymodifications and variations are possible in light of the abovedisclosure.

Some portions of this description describe the embodiments of theinvention in terms of algorithms and symbolic representations ofoperations on information. These algorithmic descriptions andrepresentations are commonly used by those skilled in the dataprocessing arts to convey the substance of their work effectively toothers skilled in the art. These operations, while describedfunctionally, computationally, or logically, are understood to beimplemented by computer programs or equivalent electrical circuits,microcode, or the like. Furthermore, it has also proven convenient attimes, to refer to these arrangements of operations as modules, withoutloss of generality. The described operations and their associatedmodules may be embodied in software, firmware, hardware, or anycombinations thereof

Any of the steps, operations, or processes described herein may beperformed or implemented with one or more hardware or software modules,alone or in combination with other devices. In one embodiment, asoftware module is implemented with a computer program productcomprising a computer-readable medium containing computer program code,which can be executed by a computer processor for performing any or allof the steps, operations, or processes described.

Embodiments of the invention may also relate to an apparatus forperforming the operations herein. This apparatus may be speciallyconstructed for the required purposes, and/or it may comprise ageneral-purpose computing device selectively activated or reconfiguredby a computer program stored in the computer. Such a computer programmay be stored in a non-transitory, tangible computer readable storagemedium, or any type of media suitable for storing electronicinstructions, which may be coupled to a computer system bus.Furthermore, any computing systems referred to in the specification mayinclude a single processor or may be architectures employing multipleprocessor designs for increased computing capability.

Embodiments of the invention may also relate to a product that isproduced by a computing process described herein. Such a product maycomprise information resulting from a computing process, where theinformation is stored on a non-transitory, tangible computer readablestorage medium and may include any embodiment of a computer programproduct or other data combination described herein.

Finally, the language used in the specification has been principallyselected for readability and instructional purposes, and it may not havebeen selected to delineate or circumscribe the inventive subject matter.It is therefore intended that the scope of the invention be limited notby this detailed description, but rather by any claims that issue on anapplication based hereon. Accordingly, the disclosure of the embodimentsof the invention is intended to be illustrative, but not limiting, ofthe scope of the invention, which is set forth in the following claims.

What is claimed is:
 1. A method comprising: receiving a report aboutreported content posted by a content owner, the reported contentreported by a reporting user of a social networking system; receiving anindication from the reporting user about whether the reported content isrelated to the reporting user; and responsive to receiving theindication that the reported content is not related to the reportinguser, initiating a content review process; and responsive to receivingthe indication that the reported content is related to the reportinguser, initiating a social resolution process.
 2. The method of claim 1wherein the content review process further comprises: generating aconfidence score from the reported content, the confidence scorecomprising a measure of the probability that the reported content isinappropriate; comparing the confidence score to a minimum confidencethreshold; and responsive to the confidence score exceeding the minimumconfidence threshold, sending a request to the content owner to deletethe reported content.
 3. The method of claim 2, further comprising,responsive to the confidence score not exceeding the minimum confidencethreshold, sending a request to the reporting user to reconfirm thecontent report.
 4. The method of claim 3, further comprising, responsiveto the reporting user reconfirming the content report, queuing thereported content for manual review.
 5. The method of claim 2, furthercomprising, responsive to the content owner declining to delete thereported content, queuing the reported content for manual review.
 6. Themethod of claim 1, wherein the social resolution process furthercomprises: receiving a social reporting option selection indicating acomplaint type from the reporting user; and responsive to receiving thesocial reporting option selection indicating the complaint type, sendingresolution options for display to the reporting user based on thecomplaint type, the resolution options comprising one or more socialinteractions.
 7. The method of claim 6, wherein the one or more socialinteractions further comprise options that allow the reporting user tounfriend and block the content owner.
 8. The method of claim 6, whereinthe one or more social interactions further comprise an option thatallows the reporting user to untag content that depicts the reportinguser.
 9. The method of claim 6, wherein the one or more socialinteractions further comprise an option that allows the reporting userto send a message to a trusted third-party, the message containing anattachment of the reported content.
 10. The method of claim 6, whereinthe one or more social interactions further comprise an option thatallows the reporting user to send a message to the content owner, themessage containing a request to delete the reported content.
 11. Themethod of claim 6, further comprising: receiving from the reporting usera selection of a resolution option, and performing the one or moresocial interactions associated with the selected resolution option onbehalf of the reporting user in the social networking system withoutinvolvement of a human agent administrator.
 12. A computer programproduct comprising a computer-readable storage medium containingcomputer program code for: receiving a report about reported contentposted by a content owner, the reported content reported by a reportinguser of a social networking system; receiving an indication from thereporting user about whether the reported content is related to thereporting user; and responsive to receiving the indication that thereported content is not related to the reporting user, initiating acontent review process; and responsive to receiving the indication thatthe reported content is related to the reporting user, initiating asocial resolution process.
 13. The computer program product of claim 12wherein the content review process further comprises: generating aconfidence score from the reported content, the confidence scorecomprising a measure of the probability that the reported content isinappropriate; comparing the confidence score to a minimum confidencethreshold; and responsive to the confidence score exceeding the minimumconfidence threshold, sending a request to the content owner to deletethe reported content.
 14. The computer program product of claim 13,further comprising, responsive to the confidence score not exceeding theminimum confidence threshold, sending a request to the reporting user toreconfirm the content report.
 15. The method of claim 14, furthercomprising, responsive to the reporting user reconfirming the contentreport, queuing the reported content for manual review.
 16. The methodof claim 13, further comprising, responsive to the content ownerdeclining to delete the reported content, queuing the reported contentfor manual review.
 17. The method of claim 12, wherein the socialresolution process further comprises: receiving a social reportingoption selection indicating a complaint type from the reporting user;and responsive to receiving the social reporting option selectionindicating the complaint type, sending resolution options for display tothe reporting user based on the complaint type, the resolution optionscomprising one or more social interactions.
 18. The method of claim 17,wherein the one or more social interactions further comprise an optionthat allows the reporting user to untag content that depicts thereporting user.
 19. The method of claim 17, wherein the one or moresocial interactions further comprise an option that allows the reportinguser to send a message to a trusted third-party, the message containingan attachment of the reported content.
 20. The method of claim 17,wherein the one or more social interactions further comprise an optionthat allows the reporting user to send a message to the content owner,the message containing a request to delete the reported content.