{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:58Z","timestamp":1740099658836,"version":"3.37.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030396268"},{"type":"electronic","value":"9783030396275"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39627-5_9","type":"book-chapter","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T05:46:14Z","timestamp":1580795174000},"page":"101-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Inside the Tool Set of Automation: Free Social Bot Code Revisited"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9219-1956","authenticated-orcid":false,"given":"Dennis","family":"Assenmacher","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0926-6326","authenticated-orcid":false,"given":"Lena","family":"Adam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5039-5301","authenticated-orcid":false,"given":"Lena","family":"Frischlich","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9788-8282","authenticated-orcid":false,"given":"Heike","family":"Trautmann","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8608-8773","authenticated-orcid":false,"given":"Christian","family":"Grimme","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","unstructured":"Abokhodair, N., Yoo, D., McDonald, D.W.: Dissecting a social botnet: growth, content and influence in Twitter. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2015, pp. 839\u2013851. ACM, New York (2015). \nhttps:\/\/doi.org\/10.1145\/2675133.2675208","DOI":"10.1145\/2675133.2675208"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Bessi, A., Ferrara, E.: Social bots distort the 2016 US presidential election online discussion. First Monday 21(11) (2016). \nhttps:\/\/doi.org\/10.5210\/fm.v21i11.7090","DOI":"10.5210\/fm.v21i11.7090"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Cao, Q., Yang, X., Yu, J., Palow, C.: Uncovering large groups of active malicious accounts in online social networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 477\u2013488. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2660267.2660269","DOI":"10.1145\/2660267.2660269"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on Twitter: human, bot, or cyborg? In: ACSAC 2010 Proceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, USA, 6\u201310 December 2010, pp. 21\u201330 (2010). \nhttps:\/\/doi.org\/10.1145\/1920261.1920265\n\n. \nhttp:\/\/portal.acm.org\/citation.cfm?doid=1920261.1920265","DOI":"10.1145\/1920261.1920265"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jocs.2015.11.002","volume":"16","author":"EM Clark","year":"2016","unstructured":"Clark, E.M., Williams, J.R., Galbraith, R.A., Jones, C.A., Danforth, C.M., Dodds, P.S.: Sifting robotic from organic text: a natural language approach for detecting automation on Twitter. J. Comput. Sci. 16, 1\u20137 (2016)","journal-title":"J. Comput. Sci."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Cornelissen, L.A., Barnett, R.J., Schoonwinkel, P., Eichstadt, B.D., Magodla, H.B.: A network topology approach to bot classification. CoRR abs\/1809.06190 (2018)","DOI":"10.1145\/3278681.3278692"},{"issue":"7","key":"9_CR7","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016). \nhttps:\/\/doi.org\/10.1145\/2818717","journal-title":"Commun. ACM"},{"key":"9_CR8","unstructured":"Fredheim, R.: Putin\u2019s bot army - part one: a bit about bots (2013). \nhttp:\/\/quantifyingmemory.blogspot.co.uk\/2013\/06\/putins-bots-part-one-bit-about-bots.html"},{"key":"9_CR9","unstructured":"Frischlich, L., Boberg, S., Schatto-Eckrodt, T., Quandt, T.: Would the real reader please stand up? Erkennung von Fake Accounts und Social Bots in partizipativen journalistischen Angeboten. In: DGPUK, Mannheim, Germany (2018)"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Gorwa, R., Guilbeault, D.: Unpacking the social media bot: a typology to guide research and policy. Policy Internet, 1\u201324. \nhttps:\/\/doi.org\/10.1002\/poi3.184","DOI":"10.1002\/poi3.184"},{"key":"9_CR11","unstructured":"Graves, A.: Generating sequences with recurrent neural networks. CoRR abs\/1308.0850 (2013). \nhttp:\/\/arxiv.org\/abs\/1308.0850"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-91521-0_32","volume-title":"Social Computing and Social Media. User Experience and Behavior","author":"C Grimme","year":"2018","unstructured":"Grimme, C., Assenmacher, D., Adam, L.: Changing perspectives: is it sufficient to detect social bots? In: Meiselwitz, G. (ed.) SCSM 2018. LNCS, vol. 10913, pp. 445\u2013461. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-91521-0_32"},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1089\/big.2017.0044","volume":"5","author":"Christian Grimme","year":"2017","unstructured":"Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control (2017). \nhttps:\/\/arxiv.org\/pdf\/1706.07624.pdf","journal-title":"Big Data"},{"key":"9_CR14","unstructured":"Hegelich, S., Janetzko, D.: Are social bots on Twitter political actors? Empirical evidence from a Ukrainian social botnet. In: International AAAI Conference on Web and Social Media, pp. 579\u2013582 (2016). \nhttps:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM16\/paper\/view\/13015"},{"issue":"8","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"9_CR16","unstructured":"Howard, P.N., Kollanyi, B.: Bots, #Strongerin, and #Brexit: computational propaganda during the UK-EU referendum. SSRN (2016). \nhttps:\/\/ssrn.com\/abstract=2798311"},{"key":"9_CR17","unstructured":"Karasz, P.: What is telegram, and why are Iran and Russia trying to ban it? (2018). \nhttps:\/\/www.nytimes.com\/2018\/05\/02\/world\/europe\/telegram-iran-russia.html"},{"issue":"June","key":"9_CR18","first-page":"4932","volume":"10","author":"B Kollanyi","year":"2016","unstructured":"Kollanyi, B.: Where do bots come from? An analysis of bot codes shared on GitHub. Int. J. Commun. 10(June), 4932\u20134951 (2016)","journal-title":"Int. J. Commun."},{"key":"9_CR19","doi-asserted-by":"publisher","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010, pp. 435\u2013442. ACM, New York (2010). \nhttps:\/\/doi.org\/10.1145\/1835449.1835522","DOI":"10.1145\/1835449.1835522"},{"key":"9_CR20","unstructured":"Mar\u00e9chal, N.: Automation, algorithms, and politics| when bots Tweet: toward a normative framework for bots on social networking sites (feature). Int. J. Commun. 10 (2016)"},{"key":"9_CR21","unstructured":"Microsoft News Center: Microsoft to acquire GitHub for \\$7.5 billion (2018). \nhttps:\/\/news.microsoft.com\/2018\/06\/04\/microsoft-to-acquire-github-for-7-5-billion\/"},{"issue":"5","key":"9_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MIC.2014.81","volume":"18","author":"A Paradise","year":"2014","unstructured":"Paradise, A., Puzis, R., Shabtai, A.: Anti-reconnaissance tools: detecting targeted socialbots. IEEE Internet Comput. 18(5), 11\u201319 (2014). \nhttps:\/\/doi.org\/10.1109\/MIC.2014.81","journal-title":"IEEE Internet Comput."},{"key":"9_CR23","unstructured":"\u0158eh\u016f\u0159ek, R., Sojka, P.: Software framework for topic modelling with large corpora. In: Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pp. 45\u201350. ELRA, Valletta, May 2010. \nhttp:\/\/is.muni.cz\/publication\/884893\/en"},{"issue":"C","key":"9_CR24","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.chb.2018.02.008","volume":"83","author":"J Shin","year":"2018","unstructured":"Shin, J., Jian, L., Driscoll, K., Bar, F.: The diffusion of misinformation on social media. Comput. Hum. Behav. 83(C), 278\u2013287 (2018). \nhttps:\/\/doi.org\/10.1016\/j.chb.2018.02.008","journal-title":"Comput. Hum. Behav."},{"key":"9_CR25","unstructured":"Statista: We Are Social (2018). Most famous social network sites worldwide as of October 2018, ranked by number of active users (in millions) (2018). \nhttps:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/"},{"key":"9_CR26","unstructured":"Stieglitz, S., Brachten, F., Ross, B., Jung, A.K.: Do social bots dream of electric sheep? A categorisation of social media bot accounts. CoRR abs\/1710.04044 (2017)"},{"issue":"5","key":"9_CR27","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1177\/1461444817712086","volume":"20","author":"CJ Vargo","year":"2018","unstructured":"Vargo, C.J., Guo, L., Amazeen, M.A.: The agenda-setting power of fake news: a big data analysis of the online media landscape from 2014 to 2016. New Media Soc. 20(5), 2028\u20132049 (2018). \nhttps:\/\/doi.org\/10.1177\/1461444817712086","journal-title":"New Media Soc."},{"key":"9_CR28","unstructured":"Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the Eleventh International AAAI Conference on Web and Social Media (ICWSM 2017) Online, pp. 280\u2013289 (2017). \nhttp:\/\/arxiv.org\/abs\/1703.03107"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Varvello, M., Voelker, G.M.: Second life: a social network of humans and bots. In: Proceedings of the 20th International Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV 2010, pp. 9\u201314. ACM, New York (2010). \nhttps:\/\/doi.org\/10.1145\/1806565.1806570","DOI":"10.1145\/1806565.1806570"},{"key":"9_CR30","unstructured":"Vibhuti Sharma, S.M.: GitLab gains developers after Microsoft buys rival GitHub (2018). \nhttps:\/\/www.reuters.com\/article\/us-github-microsoft-gitlab\/gitlab-gains-developers-after-microsoft-buys-rival-github-idUSKCN1J12BR"},{"key":"9_CR31","unstructured":"Volpicelli, G.: Can Instagram keep its nose clean? (2019). \nhttps:\/\/www.theguardian.com\/technology\/2018\/apr\/28\/instagram-at-the-crossroads-profits-facebook-data-scandal-politics-influencers-mental-health"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Woolley, S.: Automating power: social bot interference in global politics. First Monday 21(4) (2016)","DOI":"10.5210\/fm.v21i4.6161"}],"container-title":["Lecture Notes in Computer Science","Disinformation in Open Online Media"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39627-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T05:53:57Z","timestamp":1580795637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-39627-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030396268","9783030396275"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39627-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MISDOOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Multidisciplinary International Symposium on Disinformation in Open Online Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"misdoom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.misdoom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}