{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:13:26Z","timestamp":1743120806993,"version":"3.40.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688868"},{"type":"electronic","value":"9783030688875"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68887-5_1","type":"book-chapter","created":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T15:22:40Z","timestamp":1613056960000},"page":"3-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New Dimensions of Information Warfare: The Economic Pillar\u2014Fintech and Cryptocurrencies"],"prefix":"10.1007","author":[{"given":"Maurantonio","family":"Caprolu","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Cresci","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Raponi","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,12]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3396374","volume":"53","author":"IM Ali","year":"2020","unstructured":"Ali, I.M., Caprolu, M., Di Pietro, R.: Foundations, properties, and security applications of puzzles: a survey. ACM Comput. Surv. (CSUR) 53(4), 1\u201338 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jfds.2018.02.002","volume":"4","author":"A Atkins","year":"2018","unstructured":"Atkins, A., Niranjan, M., Gerding, E.: Financial news predicts stock market volatility better than close price. J. Fin. Data Sci. 4(2), 120\u2013137 (2018)","journal-title":"J. Fin. Data Sci."},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1017\/S0022109018001096","volume":"54","author":"M Baron","year":"2019","unstructured":"Baron, M., Brogaard, J., Hagstr\u00f6mer, B., Kirilenko, A.: Risk and return in high-frequency trading. J. Fin. Quant. Anal. 54(3), 993\u20131024 (2019)","journal-title":"J. Fin. Quant. Anal."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin Ponzi schemes. In: The 1st Crypto Valley Conference on Blockchain Technology (CVCBT 2018), pp. 75\u201384. IEEE (2018)","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Bellia, M., Christensen, K., Kolokolov, A., Pelizzon, L., Ren\u00f2, R.: High-frequency trading during flash crashes: walk of fame or hall of shame? SAFE Working Paper (2020)","DOI":"10.2139\/ssrn.3560238"},{"key":"1_CR6","unstructured":"Bendiksen, C., Gibbons, S.: The bitcoin mining network - trends, composition, average creation cost, electricity consumption & sources. CoinShares Research, Whitepaper, December 2019"},{"issue":"1","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jocs.2010.12.007","volume":"2","author":"J Bollen","year":"2011","unstructured":"Bollen, J., Mao, H., Zeng, X.: Twitter mood predicts the stock market. J. Comput. Sci. 2(1), 1\u20138 (2011)","journal-title":"J. Comput. Sci."},{"issue":"1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10623-003-6154-z","volume":"35","author":"DR Brown","year":"2005","unstructured":"Brown, D.R.: Generic groups, collision resistance, and ECDSA. Des. Codes Crypt. 35(1), 119\u2013152 (2005)","journal-title":"Des. Codes Crypt."},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-23822-2_20","volume-title":"Computer Security \u2013 ESORICS 2011","author":"BB Brumley","year":"2011","unstructured":"Brumley, B.B., Tuveri, N.: Remote timing attacks are still practical. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 355\u2013371. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23822-2_20"},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1093\/qje\/qjv027","volume":"130","author":"E Budish","year":"2015","unstructured":"Budish, E., Cramton, P., Shim, J.: The high-frequency trading arms race: frequent batch auctions as a market design response. Q. J. Econ. 130(4), 1547\u20131621 (2015)","journal-title":"Q. J. Econ."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Bujari, A., Furini, M., Laina, N.: On using cashtags to predict companies stock trends. In: Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference (CCNC 2017), pp. 25\u201328. IEEE (2017)","DOI":"10.1109\/CCNC.2017.7983075"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Chavoshi, N., Hamooni, H., Mueen, A.: DeBot: Twitter bot detection via warped correlation. In: The 16th International Conference on Data Mining (ICDM 2016), pp. 817\u2013822. IEEE (2016)","DOI":"10.1109\/ICDM.2016.0096"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Chesterman, S.: \u2018Move fast and break things\u2019: law, technology, and the problem of speed. NUS Law Working Paper (2020)","DOI":"10.2139\/ssrn.3516032"},{"issue":"10","key":"1_CR14","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/3409116","volume":"63","author":"S Cresci","year":"2020","unstructured":"Cresci, S.: A decade of social bot detection. Commun. ACM 63(10), 72\u201383 (2020)","journal-title":"Commun. ACM"},{"issue":"4","key":"1_CR15","first-page":"561","volume":"15","author":"S Cresci","year":"2017","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Trans. Dependable Secure Comput. 15(4), 561\u2013576 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: \\$FAKE: evidence of spam and bot activity in stock microblogs on Twitter. In: The 12th International AAAI Conference on Web and Social Media (ICWSM 2018), pp. 580\u2013583. AAAI (2018)","DOI":"10.1609\/icwsm.v12i1.15073"},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313184","volume":"13","author":"S Cresci","year":"2019","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on twitter. ACM Trans. Web (TWEB) 13(2), 1\u201327 (2019)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Cresci, S., Petrocchi, M., Spognardi, A., Tognazzi, S.: From reaction to proaction: Unexplored ways to the detection of evolving spambots. In: Companion Proceedings of the Web Conference 2018 (WWW 2018), pp. 1469\u20131470 (2018)","DOI":"10.1145\/3184558.3191595"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Cresci, S., Petrocchi, M., Spognardi, A., Tognazzi, S.: Better safe than sorry: an adversarial approach to improve social bot detection. In: The 11th ACM Conference on Web Science (WebSci 2019), pp. 47\u201356 (2019)","DOI":"10.1145\/3292522.3326030"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Da San Martino, G., Cresci, S., Barr\u00f3n-Cede\u00f1o, A., Yu, S., Di Pietro, R., Nakov, P.: A survey on computational propaganda detection. In: The 29th International Joint Conference on Artificial Intelligence (IJCAI 2020), pp. 4826\u20134832 (2020)","DOI":"10.24963\/ijcai.2020\/672"},{"issue":"4","key":"1_CR21","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1111\/fima.12297","volume":"48","author":"SR Das","year":"2019","unstructured":"Das, S.R.: The future of fintech. Financ. Manage. 48(4), 981\u20131007 (2019)","journal-title":"Financ. Manage."},{"issue":"3","key":"1_CR22","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1007\/s11948-012-9412-5","volume":"19","author":"M Davis","year":"2013","unstructured":"Davis, M., Kumiega, A., Van Vliet, B.: Ethics, finance, and automation: a preliminary survey of problems in high frequency trading. Sci. Eng. Ethics 19(3), 851\u2013874 (2013)","journal-title":"Sci. Eng. Ethics"},{"key":"1_CR23","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-030-49443-8_2","volume-title":"Information Systems Security and Privacy","author":"R Di Pietro","year":"2020","unstructured":"Di Pietro, R., Caprolu, M., Raponi, S.: Next generation information warfare: rationales, scenarios, threats, and open issues. In: Mori, P., Furnell, S., Camp, O. (eds.) ICISSP 2019. CCIS, vol. 1221, pp. 24\u201347. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49443-8_2"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Di Pietro, R., Raponi, S., Caprolu, M., Cresci, S.: New Dimensions of Information Warfare, pp. 1\u20134. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-60618-3_1","DOI":"10.1007\/978-3-030-60618-3_1"},{"key":"1_CR25","unstructured":"Ding, X., Zhang, Y., Liu, T., Duan, J.: Deep learning for event-driven stock prediction. In: The 24th International Joint Conference on Artificial Intelligence (IJCAI 2015) (2015)"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"114351","DOI":"10.1016\/j.eswa.2020.114351","volume":"168","author":"L Evans","year":"2020","unstructured":"Evans, L., Owda, M., Crockett, K., Vilas, A.F.: Credibility assessment of financial stock tweets. Expert Syst. Appl. 168, 114351 (2020)","journal-title":"Expert Syst. Appl."},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Ferrara, E.: Manipulation and abuse on social media. ACM SIGWEB Newsl. (Spring), \u00a01\u20139 (2015)","DOI":"10.1145\/2749279.2749283"},{"issue":"2\u20133","key":"1_CR28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1002\/isaf.1408","volume":"24","author":"S Galeshchuk","year":"2017","unstructured":"Galeshchuk, S.: Technological bias at the exchange rate market. Intell. Syst. Account. Fin. Manage. 24(2\u20133), 80\u201386 (2017)","journal-title":"Intell. Syst. Account. Fin. Manage."},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Glenski, M., Saldanha, E., Volkova, S.: Characterizing speed and scale of cryptocurrency discussion spread on reddit. In: The 28th International Conference on World Wide Web (WWW 2019), pp. 560\u2013570 (2019)","DOI":"10.1145\/3308558.3313702"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Grahl, J., Lysandrou, P.: The European commission\u2019s proposal for a financial transactions tax: a critical assessment. JCMS J. Common Market Stud. 52(2), 234\u2013249 (2014)","DOI":"10.1111\/jcms.12086"},{"issue":"4","key":"1_CR31","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.finmar.2013.05.003","volume":"16","author":"J Hasbrouck","year":"2013","unstructured":"Hasbrouck, J., Saar, G.: Low-latency trading. J. Financial Mark. 16(4), 646\u2013679 (2013)","journal-title":"J. Financial Mark."},{"issue":"4","key":"1_CR32","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1017\/S0022109013000471","volume":"48","author":"T Hendershott","year":"2013","unstructured":"Hendershott, T., Riordan, R.: Algorithmic trading and the market for liquidity. J. Financial Quant. Anal. 48(4), 1001\u20131024 (2013)","journal-title":"J. Financial Quant. Anal."},{"issue":"2","key":"1_CR33","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10115-015-0883-y","volume":"48","author":"M Jiang","year":"2016","unstructured":"Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Inferring lockstep behavior from connectivity pattern in large graphs. Knowl. Inf. Syst. 48(2), 399\u2013428 (2016)","journal-title":"Knowl. Inf. Syst."},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Kharratzadeh, M., Coates, M.: Weblog analysis for predicting correlations in stock price evolutions. In: The 6th International Conference on Web and Social Media (ICWSM 2012). AAAI (2012)","DOI":"10.1609\/icwsm.v6i1.14323"},{"issue":"5","key":"1_CR35","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSPEC.2011.5753230","volume":"48","author":"D Kushner","year":"2011","unstructured":"Kushner, D.: Sony vs. the hackers. IEEE Spectr. 48(5), 16 (2011)","journal-title":"IEEE Spectr."},{"key":"1_CR36","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1146\/annurev-economics-063016-104407","volume":"10","author":"O Linton","year":"2018","unstructured":"Linton, O., Mahmoodzadeh, S.: Implications of high-frequency trading for security markets. Ann. Rev. Econ. 10, 237\u2013259 (2018)","journal-title":"Ann. Rev. Econ."},{"issue":"5","key":"1_CR37","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3905\/jpm.2004.442611","volume":"30","author":"AW Lo","year":"2004","unstructured":"Lo, A.W.: The adaptive markets hypothesis. J. Portfolio Manage. 30(5), 15\u201329 (2004)","journal-title":"J. Portfolio Manage."},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., Tesconi, M.: RTbust: exploiting temporal patterns for botnet detection on twitter. In: The 11th International Conference on Web Science (WebSci 2019), pp. 183\u2013192. ACM (2019)","DOI":"10.1145\/3292522.3326015"},{"issue":"1","key":"1_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3419369","volume":"39","author":"M Mendoza","year":"2020","unstructured":"Mendoza, M., Tesconi, M., Cresci, S.: Bots in social and interaction networks: detection and impact estimation. ACM Trans. Inf. Syst. (TOIS) 39(1), 1\u201332 (2020)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"issue":"4","key":"1_CR40","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.finmar.2013.06.006","volume":"16","author":"AJ Menkveld","year":"2013","unstructured":"Menkveld, A.J.: High frequency trading and the new market makers. J. Financial Mark. 16(4), 712\u2013740 (2013)","journal-title":"J. Financial Mark."},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-36095-4_9","volume-title":"Topics in Cryptology \u2013 CT-RSA 2013","author":"K Michaelis","year":"2013","unstructured":"Michaelis, K., Meyer, C., Schwenk, J.: Randomly failed! the state of randomness in current java implementations. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 129\u2013144. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36095-4_9"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Mirtaheri, M., Abu-El-Haija, S., Morstatter, F., Steeg, G.V., Galstyan, A.: Identifying and analyzing cryptocurrency manipulations in social media. arXiv preprint arXiv:1902.03110 (2019)","DOI":"10.31219\/osf.io\/dqz89"},{"key":"1_CR43","series-title":"Palgrave Studies in Digital Business & Enabling Technologies","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-030-02330-0_4","volume-title":"Disrupting Finance","author":"E Monaco","year":"2019","unstructured":"Monaco, E.: What FinTech can learn from high-frequency trading: economic consequences, open issues and future of corporate disclosure. In: Lynn, T., Mooney, J.G., Rosati, P., Cummins, M. (eds.) Disrupting Finance. PSDBET, pp. 51\u201370. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-02330-0_4"},{"issue":"16","key":"1_CR44","doi-asserted-by":"publisher","first-page":"7653","DOI":"10.1016\/j.eswa.2014.06.009","volume":"41","author":"AK Nassirtoussi","year":"2014","unstructured":"Nassirtoussi, A.K., Aghabozorgi, S., Wah, T.Y., Ngo, D.C.L.: Text mining for market prediction: a systematic review. Expert Syst. Appl. 41(16), 7653\u20137670 (2014)","journal-title":"Expert Syst. Appl."},{"key":"1_CR45","unstructured":"Neyret, A.: Stock market cybercrime. Technical report, Autorit\u00e9 des March\u00e9s Financiers (AMF) (2020)"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., Tesconi, M.: Coordinated behavior on social media in 2019 UK general election. arXiv preprint arXiv:2008.08370 (2020)","DOI":"10.1609\/icwsm.v15i1.18074"},{"key":"1_CR47","doi-asserted-by":"publisher","first-page":"113230","DOI":"10.1109\/ACCESS.2020.3003370","volume":"8","author":"L Nizzoli","year":"2020","unstructured":"Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., Tesconi, M., Ferrara, E.: Charting the landscape of online cryptocurrency manipulation. IEEE Access 8, 113230\u2013113245 (2020)","journal-title":"IEEE Access"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Pacheco, D., Hui, P.M., Torres-Lugo, C., Truong, B.T., Flammini, A., Menczer, F.: Uncovering coordinated networks on social media. arXiv preprint arXiv:2001.05658 (2020)","DOI":"10.1609\/icwsm.v15i1.18075"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Rajesh, N., Gandy, L.: CashTagNN: using sentiment of tweets with CashTags to predict stock market prices. In: The 11th International Conference on Intelligent Systems: Theories and Applications (SITA 2016), pp. 1\u20134. IEEE (2016)","DOI":"10.1109\/SITA.2016.7772262"},{"issue":"2","key":"1_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1462198.1462204","volume":"27","author":"RP Schumaker","year":"2009","unstructured":"Schumaker, R.P., Chen, H.: Textual analysis of stock market prediction using breaking financial news: the AZFin text system. ACM Trans. Inf. Syst. (TOIS) 27(2), 1\u201319 (2009)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Sornette, D., von der Becke, S.: Crashes and high frequency trading: an evaluation of risks posed by high-speed algorithmic trading. The Future of Computer Trading in Financial Markets (2011)","DOI":"10.2139\/ssrn.1976249"},{"key":"1_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-030-49570-1_26","volume-title":"Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis","author":"S Tardelli","year":"2020","unstructured":"Tardelli, S., Avvenuti, M., Tesconi, M., Cresci, S.: Characterizing social bots spreading financial disinformation. In: Meiselwitz, G. (ed.) HCII 2020. LNCS, vol. 12194, pp. 376\u2013392. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49570-1_26"},{"key":"1_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-662-58820-8_8","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2019","unstructured":"Vasek, M., Moore, T.: Analyzing the Bitcoin Ponzi scheme ecosystem. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 101\u2013112. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_8"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Voukelatou, V., et al.: Measuring objective and subjective well-being: dimensions and data sources. Int. J. Data Sci. Anal. 1\u201331 (2020)","DOI":"10.1007\/s41060-020-00224-2"},{"key":"1_CR55","doi-asserted-by":"publisher","first-page":"36664","DOI":"10.1109\/ACCESS.2020.2975630","volume":"8","author":"B Wu","year":"2020","unstructured":"Wu, B., Liu, L., Yang, Y., Zheng, K., Wang, X.: Using improved conditional generative adversarial networks to detect social bots on twitter. IEEE Access 8, 36664\u201336680 (2020)","journal-title":"IEEE Access"},{"key":"1_CR56","unstructured":"Xu, J., Livshits, B.: The anatomy of a cryptocurrency pump-and-dump scheme. In: The 28th USENIX Security Symposium (SEC 2019), pp. 1609\u20131625 (2019)"},{"key":"1_CR57","doi-asserted-by":"crossref","unstructured":"Zaborovskaya, A., Zaborovskiy, V., Pletnev, K.: Possibilities of preventing manipulative transactions on the stock market in the conditions of new industrialization. In: The 2nd International Scientific Conference on New Industrialization: Global, National, Regional Dimension (SICNI 2018), pp. 154\u2013160. Atlantis Press (2019)","DOI":"10.2991\/sicni-18.2019.31"},{"issue":"5","key":"1_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3395046","volume":"53","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Zafarani, R.: A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput. Surv. (CSUR) 53(5), 1\u201340 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68887-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T18:31:43Z","timestamp":1671215503000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-68887-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688868","9783030688875"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68887-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"12 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRiSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Risks and Security of Internet and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crisis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.crisis-conference.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}