{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:04:56Z","timestamp":1767625496989,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030495695"},{"type":"electronic","value":"9783030495701"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49570-1_26","type":"book-chapter","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T00:25:10Z","timestamp":1594340710000},"page":"376-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Characterizing Social Bots Spreading Financial Disinformation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7235-7055","authenticated-orcid":false,"given":"Serena","family":"Tardelli","sequence":"first","affiliation":[]},{"given":"Marco","family":"Avvenuti","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Tesconi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0170-2445","authenticated-orcid":false,"given":"Stefano","family":"Cresci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Albadi, N., Kurdi, M., Mishra, S.: Hateful people or hateful bots? Detection and characterization of bots spreading religious hatred in Arabic social media. In: Proceedings of the ACM on Human-Computer Interaction (HCI), vol. 3, no. CSCW, pp. 1\u201325 (2019)","DOI":"10.1145\/3359163"},{"issue":"8","key":"26_CR2","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.2105\/AJPH.2018.304512","volume":"108","author":"JP Allem","year":"2018","unstructured":"Allem, J.P., Ferrara, E.: Could social bots pose a threat to public health? Am. J. Public Health (AJPH) 108(8), 1005 (2018)","journal-title":"Am. J. Public Health (AJPH)"},{"key":"26_CR3","unstructured":"Berger, J.M., Morgan, J.: The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World, vol. 3, no. 20, pp. 1\u20134 (2015)"},{"issue":"1","key":"26_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10588-018-09290-1","volume":"25","author":"DM Beskow","year":"2019","unstructured":"Beskow, D.M., Carley, K.M.: Its all in a name: detecting and labeling bots by their name. Comput. Math. Organ. Theory (CMOT) 25(1), 24\u201335 (2019). https:\/\/doi.org\/10.1007\/s10588-018-09290-1","journal-title":"Comput. Math. Organ. Theory (CMOT)"},{"key":"26_CR5","doi-asserted-by":"publisher","unstructured":"Bessi, A., Ferrara, E.: Social bots distort the 2016 U.S. Presidential election online discussion. First Monday 21 (2016). https:\/\/doi.org\/10.5210\/fm.v21i11.7090","DOI":"10.5210\/fm.v21i11.7090"},{"issue":"1","key":"26_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jocs.2010.12.007","volume":"2","author":"J Bollen","year":"2011","unstructured":"Bollen, J., Mao, H., Zeng, X.: Twitter mood predicts the stock market. J. Comput. Sci. (JCS) 2(1), 1\u20138 (2011)","journal-title":"J. Comput. Sci. (JCS)"},{"key":"26_CR7","unstructured":"Brachten, F., Stieglitz, S., Hofeditz, L., Kloppenborg, K., Reimann, A.: Strategies and influence of social bots in a 2017 German state election - a case study on Twitter. In: The 28th Australasian Conference on Information Systems (ACIS 2017) (2017)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-39627-5_7","volume-title":"Disinformation in Open Online Media","author":"S Cresci","year":"2020","unstructured":"Cresci, S.: Detecting malicious social bots: story of a never-ending clash. In: Grimme, C., Preuss, M., Takes, F.W., Waldherr, A. (eds.) MISDOOM 2019. LNCS, vol. 12021, pp. 77\u201388. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39627-5_7"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake Twitter followers. Decis. Support Syst. (DSS) 80, 56\u201371 (2015)","journal-title":"Decis. Support Syst. (DSS)"},{"issue":"4","key":"26_CR10","first-page":"561","volume":"15","author":"S Cresci","year":"2017","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Trans. Dependable Secure Comput. (TDSC) 15(4), 561\u2013576 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput. (TDSC)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: The 26th International Conference on World Wide Web Companion (WWW 2017 Companion), pp. 963\u2013972 (2017). IW3C2","DOI":"10.1145\/3041021.3055135"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.comcom.2019.10.019","volume":"150","author":"S Cresci","year":"2020","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Emergent properties, models and laws of behavioral similarities within groups of Twitter users. Comput. Commun. 150, 47\u201361 (2020)","journal-title":"Comput. Commun."},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: \\$FAKE: evidence of spam and bot activity in stock microblogs on Twitter. In: The 12th International AAAI Conference on Web and Social Media (ICWSM 2018). AAAI (2018)","DOI":"10.1609\/icwsm.v12i1.15073"},{"issue":"2","key":"26_CR14","first-page":"11:1","volume":"13","author":"S Cresci","year":"2019","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on Twitter. ACM Trans. Web (TWEB) 13(2), 11:1\u201311:27 (2019)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"26_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-030-11226-4_12","volume-title":"Digital Libraries: Supporting Open Science","author":"S Cresci","year":"2019","unstructured":"Cresci, S., Minutoli, S., Nizzoli, L., Tardelli, S., Tesconi, M.: Enriching digital libraries with crowdsensed data. In: Manghi, P., Candela, L., Silvello, G. (eds.) IRCDL 2019. CCIS, vol. 988, pp. 144\u2013158. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11226-4_12"},{"key":"26_CR16","doi-asserted-by":"publisher","unstructured":"Ferrara, E.: Disinformation and social bot operations in the run up to the 2017 French Presidential election. First Monday 22(8) (2017). https:\/\/doi.org\/10.5210\/fm.v22i8.8005","DOI":"10.5210\/fm.v22i8.8005"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-18038-0_10","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"M Giatsoglou","year":"2015","unstructured":"Giatsoglou, M., Chatzakou, D., Shah, N., Faloutsos, C., Vakali, A.: Retweeting activity on Twitter: signs of deception. In: Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS (LNAI), vol. 9077, pp. 122\u2013134. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18038-0_10"},{"key":"26_CR18","doi-asserted-by":"publisher","unstructured":"Hentschel, M., Alonso, O.: Follow the money: a study of cashtags on Twitter. First Monday 19(8) (2014). https:\/\/doi.org\/10.5210\/fm.v19i8.5385","DOI":"10.5210\/fm.v19i8.5385"},{"issue":"2","key":"26_CR19","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2090150.2090161","volume":"19","author":"T Hwang","year":"2012","unstructured":"Hwang, T., Pearce, I., Nanis, M.: Socialbots: voices from the fronts. Interactions 19(2), 38\u201345 (2012)","journal-title":"Interactions"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: CatchSync: catching synchronized behavior in large directed graphs. In: The 20th SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD 2014), pp. 941\u2013950. ACM (2014)","DOI":"10.1145\/2623330.2623632"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.comcom.2014.08.006","volume":"54","author":"S Lee","year":"2014","unstructured":"Lee, S., Kim, J.: Early filtering of ephemeral malicious accounts on Twitter. Comput. Commun. 54, 48\u201357 (2014)","journal-title":"Comput. Commun."},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Mao, Y., Wei, W., Wang, B., Liu, B.: Correlating S&P 500 stocks with Twitter data. In: The 1st International Workshop on Hot Topics on Interdisciplinary Social Networks Research (SIGKDD 2012 Workshops), pp. 69\u201372. ACM (2012)","DOI":"10.1145\/2392622.2392634"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., Tesconi, M.: RTbust: exploiting temporal patterns for botnet detection on Twitter. In: The 11th International ACM Web Science Conference (WebSci 2019), pp. 183\u2013192. ACM (2019)","DOI":"10.1145\/3292522.3326015"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., Tesconi, M., Ferrara, E.: Charting the landscape of online cryptocurrency manipulation. arXiv preprint arXiv:2001.10289 (2020)","DOI":"10.1109\/ACCESS.2020.3003370"},{"issue":"1","key":"26_CR25","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Yang, K.C., Flammini, A., Menczer, F.: The spread of low-credibility content by social bots. Nat. Commun. 9(1), 4787 (2018)","journal-title":"Nat. Commun."},{"issue":"49","key":"26_CR26","doi-asserted-by":"publisher","first-page":"12435","DOI":"10.1073\/pnas.1803470115","volume":"115","author":"M Stella","year":"2018","unstructured":"Stella, M., Ferrara, E., De Domenico, M.: Bots increase exposure to negative and inflammatory content in online social systems. Proc. Natl. Acad. Sci. 115(49), 12435\u201312440 (2018)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: The 11th International AAAI Conference on Web and Social Media (ICWSM 2017). AAAI (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"issue":"1","key":"26_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds\/s13688-017-0111-y","volume":"6","author":"O Varol","year":"2017","unstructured":"Varol, O., Ferrara, E., Menczer, F., Flammini, A.: Early detection of promoted campaigns on social media. EPJ Data Sci. 6(1), 1\u201319 (2017). https:\/\/doi.org\/10.1140\/epjds\/s13688-017-0111-y","journal-title":"EPJ Data Sci."},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Viswanath, B., et al.: Strength in numbers: robust tamper detection in crowd computations. In: The 2015 ACM Conference on Online Social Networks (COSN 2015), pp. 113\u2013124. ACM (2015)","DOI":"10.1145\/2817946.2817964"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Caulfield, T., De Cristofaro, E., Sirivianos, M., Stringhini, G., Blackburn, J.: Disinformation warfare: understanding state-sponsored trolls on Twitter and their influence on the Web. In: The 2019 World Wide Web Conference Companion (WWW 2019 Companion), pp. 218\u2013226 (2019). IW3C2","DOI":"10.1145\/3308560.3316495"},{"key":"26_CR31","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Caulfield, T., Setzer, W., Sirivianos, M., Stringhini, G., Blackburn, J.: Who let the trolls out? Towards understanding state-sponsored trolls. In: The 11th International ACM Web Science Conference (WebSci 2019), pp. 353\u2013362. ACM (2019)","DOI":"10.1145\/3292522.3326016"}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49570-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:15:38Z","timestamp":1720570538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49570-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030495695","9783030495701"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49570-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}