{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T09:35:24Z","timestamp":1747733724206,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030803865"},{"type":"electronic","value":"9783030803872"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80387-2_15","type":"book-chapter","created":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T06:05:06Z","timestamp":1625292306000},"page":"153-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Simulating Social-Cyber Maneuvers to\u00a0Deter Disinformation Campaigns"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8719-3367","authenticated-orcid":false,"given":"Janice T.","family":"Blane","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6477-8338","authenticated-orcid":false,"given":"J. D.","family":"Moffitt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6356-0238","authenticated-orcid":false,"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,7,4]]},"reference":[{"issue":"5","key":"15_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1287\/mnsc.15.5.215","volume":"15","author":"FM Bass","year":"1969","unstructured":"Bass, F.M.: A new product growth for model consumer durables. Manag. Sci. 15(5), 215\u2013227 (1969)","journal-title":"Manag. Sci."},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-319-93372-6_42","volume-title":"Social, Cultural, and Behavioral Modeling","author":"KM Carley","year":"2018","unstructured":"Carley, K.M., Cervone, G., Agarwal, N., Liu, H.: Social cyber-security. In: Thomson, R., Dancy, C., Hyder, A., Bisgin, H. (eds.) SBP-BRiMS 2018. LNCS, vol. 10899, pp. 389\u2013394. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93372-6_42"},{"key":"15_CR3","unstructured":"Beskow, D., Carley, K.M., Bisgin, H., Hyder, A., Dancy, C., Thomson, R.: Introducing bot-hunter: a tiered approach to detection and characterizing automated activity on Twitter. In: SBP-BRiMS. Springer, Heidelberg (2018)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Beskow, D.M., Carley, K.M.: Agent based simulation of bot disinformation maneuvers in twitter. In: 2019 WinterSim, pp. 750\u2013761. IEEE (2019)","DOI":"10.1109\/WSC40007.2019.9004942"},{"issue":"1","key":"15_CR5","first-page":"44","volume":"7","author":"KM Carley","year":"1990","unstructured":"Carley, K.M.: Group stability: asocio-cognitive approach. Adv. Group Process. 7(1), 44 (1990)","journal-title":"Adv. Group Process."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Carley, K.M.: Social cybersecurity: an emerging science. Comput. Math. Organ. Theory 26, 365\u2013381 (2020)","DOI":"10.1007\/s10588-020-09322-9"},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1111\/j.1756-8765.2009.01037.x","volume":"1","author":"KM Carley","year":"2009","unstructured":"Carley, K.M., Martin, M.K., Hirshman, B.R.: The etiology of social change. Topics Cogn. Sci. 1(4), 621\u2013650 (2009)","journal-title":"Topics Cogn. Sci."},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1093\/imamat\/1.1.42","volume":"1","author":"DJ Daley","year":"1965","unstructured":"Daley, D.J., Kendall, D.G.: Stochastic rumours. IMA J. Appl. Math. 1(1), 42\u201355 (1965)","journal-title":"IMA J. Appl. Math."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Hagberg, A.A., Schult, D.A., Swart, P.J.: Exploring network structure, dynamics, and function using networkx. In: Varoquaux, G., Vaught, T., Millman, J. (eds.) Proceedings of the 7th Python in Science Conference, pp. 11\u201315. Pasadena, CA USA (2008)","DOI":"10.25080\/TCWV9851"},{"key":"15_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38179-4","volume-title":"Expressive Order Confirming Sentiments in Social Actions","author":"DR Heise","year":"2007","unstructured":"Heise, D.R.: Expressive Order Confirming Sentiments in Social Actions, 1st edn. Springer, New York (2007). https:\/\/doi.org\/10.1007\/978-0-387-38179-4","edition":"1"},{"key":"15_CR11","unstructured":"Pew Research Center: Internet, Science & Tech, Pew Research Center: Demographics of Social Media Users and Adoption in the United States (2021). http:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/. Accessed 26 April 2021"},{"key":"15_CR12","unstructured":"Maki, D.P., Thompson, M.: Mathematical Models and Applications: With Emphasis on the Social, Life, and Management Sciences, Prentice-Hall, Englewood Cliffs (1973)"},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: homophily in social networks. Ann. Rev. Sociol. 27(1), 415\u2013444 (2001)","journal-title":"Ann. Rev. Sociol."},{"key":"15_CR14","unstructured":"Morstatter, F., Pfeffer, J., Liu, H., Carley, K.M.: Is the sample good enough? Comparing data from twitter\u2019s streaming API with twitter\u2019s firehose. arXiv preprint arXiv:1306.5204 (2013)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Serrano, E., Iglesias, C.\u00c1., Garijo, M.: A novel agent-based rumor spreading model in twitter. In: Proceedings of the 24th International Conference on World Wide Web, pp. 811\u2013814 (2015)","DOI":"10.1145\/2740908.2742466"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Wang, C., Tan, Z.X., Ye, Y., Wang, L., Cheong, K.H., Xie, N.g.: A rumor spreading model based on information entropy. Sci. Rep. 7(1), 1\u201314 (2017)","DOI":"10.1038\/s41598-017-09171-8"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1038\/srep00335","volume":"2","author":"L Weng","year":"2012","unstructured":"Weng, L., Flammini, A., Vespignani, A., Menczer, F.: Competition among memes in a world with limited attention. Sci. Rep. 2, 335 (2012)","journal-title":"Sci. Rep."},{"issue":"4","key":"15_CR18","doi-asserted-by":"publisher","first-page":"041908","DOI":"10.1103\/PhysRevE.65.041908","volume":"65","author":"DH Zanette","year":"2002","unstructured":"Zanette, D.H.: Dynamics of rumor propagation on small-world networks. Phys. Rev. E 65(4), 041908 (2002)","journal-title":"Phys. Rev. E"}],"container-title":["Lecture Notes in Computer Science","Social, Cultural, and Behavioral Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80387-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T07:32:46Z","timestamp":1725348766000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80387-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030803865","9783030803872"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80387-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SBP-BRiMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sbp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sbp-brims.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}