{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T02:00:39Z","timestamp":1768356039354,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030495695","type":"print"},{"value":"9783030495701","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49570-1_14","type":"book-chapter","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T00:25:10Z","timestamp":1594340710000},"page":"201-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Two-Phase Framework for Detecting Manipulation Campaigns in Social Media"],"prefix":"10.1007","author":[{"given":"Dennis","family":"Assenmacher","sequence":"first","affiliation":[]},{"given":"Lena","family":"Clever","sequence":"additional","affiliation":[]},{"given":"Janina Susanne","family":"Pohl","sequence":"additional","affiliation":[]},{"given":"Heike","family":"Trautmann","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Grimme","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2641190.2641194","volume":"15","author":"CC Aggarwal","year":"2014","unstructured":"Aggarwal, C.C.: Mining text and social streams: a review. SIGKDD Explor. Newsl. 15(2), 9\u201319 (2014). https:\/\/doi.org\/10.1145\/2641190.2641194","journal-title":"SIGKDD Explor. Newsl."},{"key":"14_CR2","unstructured":"Assenmacher, D., Adam, L., Trautmann, H., Grimme, C.: Semi-automatic campaign detection by means of text stream clustering. In: Proceedings of the Thirty-Three International Florida Artificial Intelligence Research Society Conference (FLAIRS 2020), Florida, USA. AAAI Press (2020). accepted"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Bessi, A., Ferrara, E.: Social bots distort the 2016 us presidential election online discussion. First Monday 21(11) (2016). https:\/\/doi.org\/10.5210\/fm.v21i11.7090","DOI":"10.5210\/fm.v21i11.7090"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Carnein, M., Assenmacher, D., Trautmann, H.: An empirical comparison of stream clustering algorithms. In: Proceedings of the ACM International Conference on Computing Frontiers (CF 2017), pp. 361\u2013365. ACM (2017). https:\/\/doi.org\/10.1145\/3075564.3078887","DOI":"10.1145\/3075564.3078887"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-70625-2_8","volume-title":"Advances in Conceptual Modeling","author":"M Carnein","year":"2017","unstructured":"Carnein, M., Assenmacher, D., Trautmann, H.: Stream clustering of chat messages with applications to twitch streams. In: de Cesare, S., Frank, U. (eds.) ER 2017. LNCS, vol. 10651, pp. 79\u201388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70625-2_8"},{"key":"14_CR6","unstructured":"Chaffey, D.: Global social media research summary (2019). https:\/\/www.smartinsights.com\/social-media-marketing\/social-media-strategy\/new-global-social-media-research\/. Accessed 21 Feb 2020"},{"key":"14_CR7","unstructured":"Chen, Z., Subramanian, D.: An unsupervised approach to detect spam campaigns that use botnets on twitter. CoRR abs\/1804.05232 (2018). http:\/\/arxiv.org\/abs\/1804.05232"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on twitter: human, bot, or cyborg? pp. 21\u201330 (2010). https:\/\/doi.org\/10.1145\/1920261.1920265","DOI":"10.1145\/1920261.1920265"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.osnem.2018.10.005","volume":"9","author":"S Cresci","year":"2019","unstructured":"Cresci, S., Petrocchi, M., Spognardi, A., Tognazzi, S.: On the capability of evolved spambots to evade detection via genetic engineering. Online Soc. Netw. Media 9, 1\u201316 (2019). https:\/\/doi.org\/10.1016\/j.osnem.2018.10.005. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S246869641830065X","journal-title":"Online Soc. Netw. Media"},{"key":"14_CR10","unstructured":"Ferrara, E., Varol, O., Menczer, F., Flammini, A.: Detection of promoted social media campaigns (2016). https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM16\/paper\/view\/13034"},{"key":"14_CR11","unstructured":"Fredheim, R.: Putin\u2019s bot army - part one: a bit about bots (2013). http:\/\/quantifyingmemory.blogspot.co.uk\/2013\/06\/putins-bots-part-one-bit-about-bots.html"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-91521-0_32","volume-title":"Social Computing and Social Media. User Experience and Behavior","author":"C Grimme","year":"2018","unstructured":"Grimme, C., Assenmacher, D., Adam, L.: Changing perspectives: is it sufficient to detect social bots? In: Meiselwitz, G. (ed.) SCSM 2018. LNCS, vol. 10913, pp. 445\u2013461. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91521-0_32"},{"issue":"4","key":"14_CR13","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1089\/big.2017.0044","volume":"5","author":"C Grimme","year":"2017","unstructured":"Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5(4), 279\u2013293 (2017)","journal-title":"Big Data"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Hegelich, S., Janetzko, D.: Are social bots on twitter political actors? empirical evidence from a Ukrainian social botnet. In: International AAAI Conference on Web and Social Media, pp. 579\u2013582 (2016). https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM16\/paper\/view\/13015","DOI":"10.1609\/icwsm.v10i1.14764"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-030-39627-5_10","volume-title":"Disinformation in Open Online Media","author":"P Kessling","year":"2020","unstructured":"Kessling, P., Grimme, C.: Analysis of account engagement in onsetting twitter message cascades. In: Grimme, C., Preuss, M., Takes, F.W., Waldherr, A. (eds.) MISDOOM 2019. LNCS, vol. 12021, pp. 115\u2013126. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39627-5_10"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Lee, K., Caverlee, J., Cheng, Z., Sui, D.Z.: Campaign extraction from social media. ACM Trans. Intell. Syst. Technol. 5(1) (2014). https:\/\/doi.org\/10.1145\/2542182.2542191","DOI":"10.1145\/2542182.2542191"},{"key":"14_CR17","volume-title":"Introduction to the Theory of Statistics","author":"AM Mood","year":"1974","unstructured":"Mood, A.M., Graybill, F.A., Boes, D.C.: Introduction to the Theory of Statistics, 3rd edn. McGraw-Hill, New York (1974)","edition":"3"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Ross, B., Pilz, L., Cabrera, B., Brachten, F., Neubaum, G., Stieglitz, S.: Are social bots a real threat? an agent-based model of the spiral of silence to analyse the impact of manipulative actors in social networks. Eur. J. Inf. Syst. 1\u201319 (2019). https:\/\/doi.org\/10.1080\/0960085X.2018.1560920","DOI":"10.1080\/0960085X.2018.1560920"},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"13:1","DOI":"10.1145\/2522968.2522981","volume":"46","author":"JA Silva","year":"2013","unstructured":"Silva, J.A., Faria, E.R., Barros, R.C., Hruschka, E.R., Carvalho, A.C.D., Gama, J.: Data stream clustering: a survey. ACM Comput. Surv. 46(1), 13:1\u201313:31 (2013). https:\/\/doi.org\/10.1145\/2522968.2522981","journal-title":"ACM Comput. Surv."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: International AAAI Conference on Web and Social Media, pp. 280\u2013289. AAAI (2017). https:\/\/aaai.org\/ocs\/index.php\/ICWSM\/ICWSM17\/paper\/view\/15587\/14817","DOI":"10.1609\/icwsm.v11i1.14871"},{"issue":"1","key":"14_CR21","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1140\/epjds\/s13688-017-0111-y","volume":"6","author":"O Varol","year":"2017","unstructured":"Varol, O., Ferrara, E., Menczer, F., Flammini, A.: Early detection of promoted campaigns on social media. EPJ Data Sci. 6(1), 13 (2017). https:\/\/doi.org\/10.1140\/epjds\/s13688-017-0111-y","journal-title":"EPJ Data Sci."},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Woolley, S.: Automating power: social bot interference in global politics. First Monday 21(4)(2016)","DOI":"10.5210\/fm.v21i4.6161"},{"issue":"1","key":"14_CR23","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1002\/hbe2.115","volume":"1","author":"KC Yang","year":"2019","unstructured":"Yang, K.C., Varol, O., Davis, C.A., Ferrara, E., Flammini, A., Menczer, F.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1(1), 48\u201361 (2019). https:\/\/doi.org\/10.1002\/hbe2.115. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/hbe2.115","journal-title":"Hum. Behav. Emerg. Technol."}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49570-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T23:04:10Z","timestamp":1720566250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49570-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030495695","9783030495701"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49570-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}