{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:28Z","timestamp":1775229328987,"version":"3.50.1"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031182525","type":"print"},{"value":"9783031182532","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18253-2_6","type":"book-chapter","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T03:31:02Z","timestamp":1664508662000},"page":"79-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["New Automation for\u00a0Social Bots: From Trivial Behavior to\u00a0AI-Powered Communication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8608-8773","authenticated-orcid":false,"given":"Christian","family":"Grimme","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5251-1169","authenticated-orcid":false,"given":"Janina","family":"Pohl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0170-2445","authenticated-orcid":false,"given":"Stefano","family":"Cresci","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"L\u00fcling","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4681-1346","authenticated-orcid":false,"given":"Mike","family":"Preuss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,4]]},"reference":[{"key":"6_CR1","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1007\/978-3-030-44041-1_114","volume-title":"Advanced Information Networking and Applications","author":"DI Adelani","year":"2020","unstructured":"Adelani, D.I., Mai, H., Fang, F., Nguyen, H.H., Yamagishi, J., Echizen, I.: Generating sentiment-preserving fake online reviews using neural language models and their human- and machine-based detection. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) AINA 2020. AISC, vol. 1151, pp. 1341\u20131354. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44041-1_114"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Alabdulkarim, A., Li, S., Peng, X.: Automatic story generation: challenges and attempts (2021). https:\/\/doi.org\/10.48550\/ARXIV.2102.12634. https:\/\/arxiv.org\/abs\/2102.12634","DOI":"10.48550\/ARXIV.2102.12634"},{"key":"6_CR3","unstructured":"Alam, F., et al.: A survey on multimodal disinformation detection. In: The 29th International Conference on Computational Linguistics (COLING 2022). ACL (2022)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-030-96960-8_20","volume-title":"Information for a Better World: Shaping the Global Future","author":"F Alhayan","year":"2022","unstructured":"Alhayan, F., Pennington, D.R., Ruthven, I.: \u201cShe seems more human\u2019\u2019: understanding twitter users\u2019 credibility assessments of dementia-related information. In: Smits, M. (ed.) Information for a Better World: Shaping the Global Future. LNCS, vol. 13193, pp. 292\u2013313. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96960-8_20"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"102694","DOI":"10.1016\/j.ijhcs.2021.102694","volume":"155","author":"J Arsenyan","year":"2021","unstructured":"Arsenyan, J., Mirowska, A.: Almost human? A comparative case study on the social media presence of virtual influencers. Int. J. Hum. Comput. Stud. 155, 102694 (2021). https:\/\/doi.org\/10.1016\/j.ijhcs.2021.102694","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Assenmacher, D., Clever, L., Frischlich, L., Quandt, T., Trautmann, H., Grimme, C.: Demystifying social bots: on the intelligence of automated social media actors. Soc. Media + Soc. 6(3) (2020). https:\/\/doi.org\/10.1177\/2056305120939264","DOI":"10.1177\/2056305120939264"},{"key":"6_CR7","doi-asserted-by":"publisher","DOI":"10.1177\/08944393211012268","author":"D Assenmacher","year":"2021","unstructured":"Assenmacher, D., et al.: Benchmarking crisis in social media analytics: a solution for the data-sharing problem. Soc. Sci. Comput. Rev. (2021). https:\/\/doi.org\/10.1177\/08944393211012268","journal-title":"Soc. Sci. Comput. Rev."},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Bessi, A., Ferrara, E.: Social bots distort the 2016 U.S. Presidential election online discussion. First Monday 21(11) (2016). https:\/\/doi.org\/10.5210\/fm.v21i11.7090. https:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/7090","DOI":"10.5210\/fm.v21i11.7090"},{"issue":"3","key":"6_CR9","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1002\/ab.21948","volume":"47","author":"M Bilewicz","year":"2021","unstructured":"Bilewicz, M., et al.: Artificial intelligence against hate: intervention reducing verbal aggression in the social network environment. Aggress. Behav. 47(3), 260\u2013266 (2021)","journal-title":"Aggress. Behav."},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MSEC.2019.2934193","volume":"17","author":"D Boneh","year":"2019","unstructured":"Boneh, D., Grotto, A.J., McDaniel, P., Papernot, N.: How relevant is the Turing test in the age of sophisbots? IEEE Secur. Priv. 17(6), 64\u201371 (2019)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR11","unstructured":"Brown, T., et al.: Language models are few-shot learners. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M.F., Lin, H. (eds.) Advances in Neural Information Processing Systems, vol. 33, pp. 1877\u20131901. Curran Associates, Inc. (2020)"},{"key":"6_CR12","unstructured":"Chen, D., Dolan, W.: Collecting highly parallel data for paraphrase evaluation. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Portland, Oregon, USA, pp. 190\u2013200. Association for Computational Linguistics (2011). https:\/\/aclanthology.org\/P11-1020"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.future.2018.01.055","volume":"92","author":"L Ciechanowski","year":"2019","unstructured":"Ciechanowski, L., Przegalinska, A., Magnuski, M., Gloor, P.: In the shades of the uncanny valley: an experimental study of human-chatbot interaction. Futur. Gener. Comput. Syst. 92, 539\u2013548 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.01.055","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"10","key":"6_CR14","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/3409116","volume":"63","author":"S Cresci","year":"2020","unstructured":"Cresci, S.: A decade of social bot detection. Commun. ACM 63(10), 72\u201383 (2020)","journal-title":"Commun. ACM"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: The 26th International Conference on World Wide Web Companion (WWW 2017), pp. 963\u2013972 (2017)","DOI":"10.1145\/3041021.3055135"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Cresci, S., Petrocchi, M., Spognardi, A., Tognazzi, S.: The coming age of adversarial social bot detection. First Monday 26(7) (2021)","DOI":"10.5210\/fm.v26i7.11474"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Cresci, S., Trujillo, A., Fagni, T.: Personalized interventions for online moderation. In: The 33rd ACM Conference on Hypertext and Social Media (HT 2022), pp. 248\u2013251. ACM (2022)","DOI":"10.1145\/3511095.3536369"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), Minneapolis, Minnesota, pp. 4171\u20134186. Association for Computational Linguistics (2019). https:\/\/doi.org\/10.18653\/v1\/N19-1423","DOI":"10.18653\/v1\/N19-1423"},{"key":"6_CR19","series-title":"Advances in Information Security","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60618-3","volume-title":"New Dimensions of Information Warfare","author":"R Di Pietro","year":"2021","unstructured":"Di Pietro, R., Caprolu, M., Raponi, S., Cresci, S.: New Dimensions of Information Warfare. Advances in Information Security, vol. 84. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-60618-3"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Cresci, S.: Metaverse: security and privacy issues. In: The 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS 2021), pp. 281\u2013288. IEEE (2021)","DOI":"10.1109\/TPSISA52974.2021.00032"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Echeverr\u00eda, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Stringhini, G., Zhou, S.: LOBO: evaluation of generalization deficiencies in Twitter bot classifiers. In: The 34th Annual Computer Security Applications Conference (ACSAC 2018), pp. 137\u2013146 (2018)","DOI":"10.1145\/3274694.3274738"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.chb.2016.07.003","volume":"65","author":"C Edwards","year":"2016","unstructured":"Edwards, C., Beattie, A.J., Edwards, A., Spence, P.R.: Differences in perceptions of communication quality between a twitterbot and human agent for information seeking and learning. Comput. Hum. Behav. 65, 666\u2013671 (2016). https:\/\/doi.org\/10.1016\/j.chb.2016.07.003","journal-title":"Comput. Hum. Behav."},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.chb.2013.08.013","volume":"33","author":"C Edwards","year":"2014","unstructured":"Edwards, C., Edwards, A., Spence, P.R., Shelton, A.K.: Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on twitter. Comput. Hum. Behav. 33, 372\u2013376 (2014). https:\/\/doi.org\/10.1016\/j.chb.2013.08.013","journal-title":"Comput. Hum. Behav."},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Eichenberg, C., Black, S., Weinbach, S., Parcalabescu, L., Frank, A.: Magma-multimodal augmentation of generative models through adapter-based finetuning. arXiv preprint arXiv:2112.05253 (2021). https:\/\/doi.org\/10.48550\/arXiv.2112.05253","DOI":"10.48550\/arXiv.2112.05253"},{"issue":"5","key":"6_CR25","doi-asserted-by":"publisher","first-page":"e0251415","DOI":"10.1371\/journal.pone.0251415","volume":"16","author":"T Fagni","year":"2021","unstructured":"Fagni, T., Falchi, F., Gambini, M., Martella, A., Tesconi, M.: TweepFake: about detecting deepfake tweets. PLoS ONE 16(5), e0251415 (2021)","journal-title":"PLoS ONE"},{"issue":"7","key":"6_CR26","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016)","journal-title":"Commun. ACM"},{"key":"6_CR27","unstructured":"Gallwitz, F., Kreil, M.: The rise and fall of \u2018social bot\u2019 research. SSRN 3814191 (2021). https:\/\/ssrn.com\/abstract=3814191"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Gillespie, T.: Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. Yale University Press, New Haven (2018)","DOI":"10.12987\/9780300235029"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-91521-0_32","volume-title":"Social Computing and Social Media. User Experience and Behavior","author":"C Grimme","year":"2018","unstructured":"Grimme, C., Assenmacher, D., Adam, L.: Changing perspectives: is it sufficient to detect social bots? In: Meiselwitz, G. (ed.) SCSM 2018. LNCS, vol. 10913, pp. 445\u2013461. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91521-0_32"},{"issue":"4","key":"6_CR30","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1089\/big.2017.0044","volume":"5","author":"C Grimme","year":"2017","unstructured":"Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5(4), 279\u2013293 (2017). https:\/\/doi.org\/10.1089\/big.2017.0044","journal-title":"Big Data"},{"key":"6_CR31","volume-title":"Fundamentals of Modern Manufacturing: Materials, Processes, and Systems","author":"M Groover","year":"2010","unstructured":"Groover, M.: Fundamentals of Modern Manufacturing: Materials, Processes, and Systems. Wiley, Hoboken (2010)"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"He, B., Ahamad, M., Kumar, S.: PETGEN: personalized text generation attack on deep sequence embedding-based classification models. In: The 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD 2021), pp. 575\u2013584 (2021)","DOI":"10.1145\/3447548.3467390"},{"issue":"4","key":"6_CR33","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1093\/joc\/jqy026","volume":"68","author":"A Ho","year":"2018","unstructured":"Ho, A., Hancock, J., Miner, A.S.: Psychological, relational, and emotional effects of self-disclosure after conversations with a chatbot. J. Commun. 68(4), 712\u2013733 (2018). https:\/\/doi.org\/10.1093\/joc\/jqy026","journal-title":"J. Commun."},{"key":"6_CR34","doi-asserted-by":"publisher","unstructured":"Im, J., Tandon, S., Chandrasekharan, E., Denby, T., Gilbert, E.: Synthesized social signals: computationally-derived social signals from account histories. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA. ACM (2020). https:\/\/doi.org\/10.1145\/3313831.3376383","DOI":"10.1145\/3313831.3376383"},{"key":"6_CR35","doi-asserted-by":"publisher","unstructured":"Ippolito, D., Duckworth, D., Callison-Burch, C., Eck, D.: Automatic detection of generated text is easiest when humans are fooled. In: Proceedings of the 58th Annual Meeting of the ACL, pp. 1808\u20131822. ACL (2020). https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.164","DOI":"10.18653\/v1\/2020.acl-main.164"},{"key":"6_CR36","doi-asserted-by":"publisher","unstructured":"Jeon, Y.A.: Reading social media marketing messages as simulated self within a metaverse: an analysis of gaze and social media engagement behaviors within a metaverse platform. In: 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), pp. 301\u2013303 (2022). https:\/\/doi.org\/10.1109\/VRW55335.2022.00068","DOI":"10.1109\/VRW55335.2022.00068"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Jhaver, S., Boylston, C., Yang, D., Bruckman, A.: Evaluating the effectiveness of deplatforming as a moderation strategy on Twitter. In: The 24th ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW 2021). ACM (2021)","DOI":"10.1145\/3479525"},{"key":"6_CR38","unstructured":"Johnson, M.R.: Collecting highly parallel data for paraphrase evaluation. In: Proceedings of the 6th Workshop on Procedural Content Generation. Dundee, Scotland, UK (2016). https:\/\/www.pcgworkshop.com"},{"issue":"2","key":"6_CR39","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s42438-022-00300-9","volume":"4","author":"J Knox","year":"2022","unstructured":"Knox, J.: The metaverse, or the serious business of tech frontiers. Postdigit. Sci. Educ. 4(2), 207\u2013215 (2022). https:\/\/doi.org\/10.1007\/s42438-022-00300-9","journal-title":"Postdigit. Sci. Educ."},{"key":"6_CR40","unstructured":"Lee, L.H., et al.: All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda (2021). arXiv Preprint. https:\/\/doi.org\/10.48550\/ARXIV.2110.05352"},{"issue":"1","key":"6_CR41","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TG.2018.2870876","volume":"11","author":"A Liapis","year":"2019","unstructured":"Liapis, A., Yannakakis, G.N., Nelson, M.J., Preuss, M., Bidarra, R.: Orchestrating game generation. IEEE Trans. Games 11(1), 48\u201368 (2019). https:\/\/doi.org\/10.1109\/TG.2018.2870876","journal-title":"IEEE Trans. Games"},{"key":"6_CR42","unstructured":"Lin, C.Y.: ROUGE: a package for automatic evaluation of summaries. In: Text Summarization Branches Out, Barcelona, Spain, pp. 74\u201381. ACL (2004). https:\/\/aclanthology.org\/W04-1013"},{"issue":"1","key":"6_CR43","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1111293.1111303","volume":"4","author":"D Livingstone","year":"2006","unstructured":"Livingstone, D.: Turing\u2019s test and believable AI in games. Comput. Entertain. 4(1), 6 (2006). https:\/\/doi.org\/10.1145\/1111293.1111303","journal-title":"Comput. Entertain."},{"issue":"1","key":"6_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3419369","volume":"39","author":"M Mendoza","year":"2020","unstructured":"Mendoza, M., Tesconi, M., Cresci, S.: Bots in social and interaction networks: detection and impact estimation. ACM Trans. Inf. Syst. 39(1), 1\u201332 (2020)","journal-title":"ACM Trans. Inf. Syst."},{"key":"6_CR45","unstructured":"Meta Platforms: The Facebook Company Is Now Meta (2021). https:\/\/about.fb.com\/news\/2021\/10\/facebook-company-is-now-meta\/. Accessed 22 May 2022"},{"issue":"7540","key":"6_CR46","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529\u2013533 (2015). https:\/\/doi.org\/10.1038\/nature14236","journal-title":"Nature"},{"issue":"4","key":"6_CR47","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MRA.2012.2192811","volume":"7","author":"M Mori","year":"1970","unstructured":"Mori, M.: The uncanny valley. Energy 7(4), 33\u201335 (1970). https:\/\/doi.org\/10.1109\/MRA.2012.2192811","journal-title":"Energy"},{"issue":"4","key":"6_CR48","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TG.2021.3127967","volume":"13","author":"M Mozgovoy","year":"2021","unstructured":"Mozgovoy, M., Preuss, M., Bidarra, R.: Guest editorial special issue on team AI in games. IEEE Trans. Games 13(4), 327\u2013329 (2021). https:\/\/doi.org\/10.1109\/TG.2021.3127967","journal-title":"IEEE Trans. Games"},{"key":"6_CR49","doi-asserted-by":"publisher","unstructured":"Nass, C., Steuer, J., Tauber, E.R.: Computers are social actors. In: Conference Companion on Human Factors in Computing Systems, Boston, MA, USA, CHI 1994, p. 204. Association for Computing Machinery (1994). https:\/\/doi.org\/10.1145\/259963.260288","DOI":"10.1145\/259963.260288"},{"key":"6_CR50","doi-asserted-by":"crossref","unstructured":"Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., Tesconi, M.: Coordinated behavior on social media in 2019 UK general election. In: The 15th International AAAI Conference on Web and Social Media (ICWSM 2021), pp. 443\u2013454. AAAI (2021)","DOI":"10.1609\/icwsm.v15i1.18074"},{"key":"6_CR51","doi-asserted-by":"publisher","unstructured":"Papineni, K., Roukos, S., Ward, T., Zhu, W.J.: BLEU: a method for automatic evaluation of machine translation. In: Proceedings of the 40th Annual Meeting on Association for Computational Linguistics - ACL 2002, Philadelphia, Pennsylvania, p. 311. Association for Computational Linguistics (2001). https:\/\/doi.org\/10.3115\/1073083.1073135","DOI":"10.3115\/1073083.1073135"},{"key":"6_CR52","unstructured":"Pohl, J.S., Assenmacher, D., Seiler, M.V., Trautmann, H., Grimme, C.: Artificial social media campaign creation for benchmarking and challenging detection approaches. In: Proceedings of the 16th International Conference on Web and Social Media. NEATCLasS, Association for the Advancement of Artificial Intelligence (AAI), Hybrid: Atlanta, Georgia, US and Online (2022)"},{"key":"6_CR53","unstructured":"Rabkin, M.: Connect 2021 Recap: Horizon Home, the Future of Work, Presence Platform, and More (2021). https:\/\/www.oculus.com\/blog\/connect-2021-recap-horizon-home-the-future-of-work-presence-platform-and-more\/. Accessed 22 May 2022"},{"key":"6_CR54","unstructured":"Radford, A., Narasimhan, K., Salimans, T., Sutskever, I.: Improving language understanding by generative pre-training. Technical report, OpenAI (2018)"},{"key":"6_CR55","doi-asserted-by":"publisher","unstructured":"Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., Chen, M.: Hierarchical text-conditional image generation with clip latents. arXiv preprint arXiv:2204.06125 (2022). https:\/\/doi.org\/10.48550\/ARXIV.2204.06125","DOI":"10.48550\/ARXIV.2204.06125"},{"issue":"10","key":"6_CR56","doi-asserted-by":"publisher","first-page":"e0241045","DOI":"10.1371\/journal.pone.0241045","volume":"15","author":"A Rauchfleisch","year":"2020","unstructured":"Rauchfleisch, A., Kaiser, J.: The false positive problem of automatic bot detection in social science research. PLoS ONE 15(10), e0241045 (2020)","journal-title":"PLoS ONE"},{"key":"6_CR57","doi-asserted-by":"publisher","first-page":"107289","DOI":"10.1016\/j.chb.2022.107289","volume":"133","author":"PA Rauschnabel","year":"2022","unstructured":"Rauschnabel, P.A., Felix, R., Hinsch, C., Shahab, H., Alt, F.: What is XR? Towards a framework for augmented and virtual reality. Comput. Hum. Behav. 133, 107289 (2022). https:\/\/doi.org\/10.1016\/j.chb.2022.107289","journal-title":"Comput. Hum. Behav."},{"key":"6_CR58","doi-asserted-by":"publisher","unstructured":"Reed, S., et al.: A generalist agent (2022). https:\/\/doi.org\/10.48550\/ARXIV.2205.06175. https:\/\/arxiv.org\/abs\/2205.06175","DOI":"10.48550\/ARXIV.2205.06175"},{"key":"6_CR59","unstructured":"Reeves, B., Nass, C.: The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Pla. Bibliovault OAI Repository, the University of Chicago Press (1996)"},{"key":"6_CR60","unstructured":"Riedl, M.O.: Computational narrative intelligence: a human-centered goal for artificial intelligence. arXiv preprint arXiv:1602.06484 (2016)"},{"issue":"1","key":"6_CR61","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13218-020-00647-w","volume":"34","author":"S Risi","year":"2020","unstructured":"Risi, S., Preuss, M.: From chess and atari to StarCraft and beyond: how game AI is driving the world of AI. KI - K\u00fcnstliche Intelligenz 34(1), 7\u201317 (2020). https:\/\/doi.org\/10.1007\/s13218-020-00647-w","journal-title":"KI - K\u00fcnstliche Intelligenz"},{"issue":"4","key":"6_CR62","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1093\/scan\/nsr025","volume":"7","author":"AP Saygin","year":"2012","unstructured":"Saygin, A.P., Chaminade, T., Ishiguro, H., Driver, J., Frith, C.: The thing that should not be: predictive coding and the uncanny valley in perceiving human and humanoid robot actions. Soc. Cogn. Affect. Neurosci. 7(4), 413\u2013422 (2012). https:\/\/doi.org\/10.1093\/scan\/nsr025","journal-title":"Soc. Cogn. Affect. Neurosci."},{"issue":"11","key":"6_CR63","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1089\/cyber.2019.0122","volume":"22","author":"M Shin","year":"2019","unstructured":"Shin, M., Song, S.W., Chock, T.M.: Uncanny valley effects on friendship decisions in virtual social networking service. Cyberpsychol. Behav. Soc. Netw. 22(11), 700\u2013705 (2019). https:\/\/doi.org\/10.1089\/cyber.2019.0122","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"issue":"7587","key":"6_CR64","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver, D., et al.: Mastering the game of go with deep neural networks and tree search. Nature 529(7587), 484\u2013489 (2016). https:\/\/doi.org\/10.1038\/nature16961","journal-title":"Nature"},{"key":"6_CR65","doi-asserted-by":"publisher","unstructured":"Skjuve, M., Haugstveit, I., F\u00f8lstad, A., Brandtzaeg, P.: Help! Is my chatbot falling into the uncanny valley? An empirical study of user experience in human-chatbot interaction. Hum. Technol. 15, 30\u201354 (2019). https:\/\/doi.org\/10.17011\/ht\/urn.201902201607","DOI":"10.17011\/ht\/urn.201902201607"},{"issue":"1","key":"6_CR66","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/0144929X.2018.1514425","volume":"38","author":"PR Spence","year":"2019","unstructured":"Spence, P.R., Edwards, A., Edwards, C., Jin, X.: \u2018The bot predicted rain, grab an umbrella\u2019: few perceived differences in communication quality of a weather twitterbot versus professional and amateur meteorologists. Behav. Inf. Technol. 38(1), 101\u2013109 (2019). https:\/\/doi.org\/10.1080\/0144929X.2018.1514425","journal-title":"Behav. Inf. Technol."},{"key":"6_CR67","unstructured":"Stephenson, N.: Snow Crash. Metropolis Media (1992)"},{"key":"6_CR68","unstructured":"Sundar, S.S.: The MAIN Model: A Heuristic Approach to Understanding Technology Effects on Credibility. Digital Media, p. 29 (2008)"},{"key":"6_CR69","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-030-49570-1_26","volume-title":"Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis","author":"S Tardelli","year":"2020","unstructured":"Tardelli, S., Avvenuti, M., Tesconi, M., Cresci, S.: Characterizing social bots spreading financial disinformation. In: Meiselwitz, G. (ed.) HCII 2020. LNCS, vol. 12194, pp. 376\u2013392. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49570-1_26"},{"key":"6_CR70","doi-asserted-by":"crossref","unstructured":"Tekiroglu, S., Bonaldi, H., Fanton, M., Guerini, M.: Using pre-trained language models for producing counter narratives against hate speech: a comparative study. In: Findings of the Association for Computational Linguistics (ACL 2022), pp. 3099\u20133114. ACL (2022)","DOI":"10.18653\/v1\/2022.findings-acl.245"},{"key":"6_CR71","unstructured":"Togelius, J.: We tried learning AI from games. How about learning from players? (2022). https:\/\/modl.ai\/learning-ai-from-players. modl.ai blog"},{"key":"6_CR72","doi-asserted-by":"publisher","unstructured":"Togelius, J., et al.: Procedural content generation: goals, challenges and actionable steps. In: Lucas, S.M., Mateas, M., Preuss, M., Spronck, P., Togelius, J. (eds.) Artificial and Computational Intelligence in Games, Dagstuhl Follow-Ups, vol. 6, pp. 61\u201375. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany (2013). https:\/\/doi.org\/10.4230\/DFU.Vol6.12191.61. http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2013\/4336","DOI":"10.4230\/DFU.Vol6.12191.61"},{"key":"6_CR73","doi-asserted-by":"crossref","unstructured":"Trujillo, A., Cresci, S.: Make reddit great again: assessing community effects of moderation interventions on r\/The_Donald. In: The 25th ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW 2022). ACM (2022)","DOI":"10.1145\/3555639"},{"key":"6_CR74","unstructured":"Tsimpoukelli, M., Menick, J., Cabi, S., Eslami, S.M.A., Vinyals, O., Hill, F.: Multimodal few-shot learning with frozen language models. In: Beygelzimer, A., Dauphin, Y., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems (2021)"},{"key":"6_CR75","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS 2017, pp. 6000\u20136010. Curran Associates Inc., Red Hook (2017)"},{"issue":"1","key":"6_CR76","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1177\/009365096023001001","volume":"23","author":"JB Walther","year":"1996","unstructured":"Walther, J.B.: Computer-mediated communication: impersonal, interpersonal, and hyperpersonal interaction. Commun. Res. 23(1), 3\u201343 (1996). https:\/\/doi.org\/10.1177\/009365096023001001","journal-title":"Commun. Res."},{"issue":"1","key":"6_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-021-00815-2","volume":"11","author":"D Weber","year":"2021","unstructured":"Weber, D., Neumann, F.: Amplifying influence through coordinated behaviour in social networks. Soc. Netw. Anal. Min. 11(1), 1\u201342 (2021). https:\/\/doi.org\/10.1007\/s13278-021-00815-2","journal-title":"Soc. Netw. Anal. Min."},{"issue":"1","key":"6_CR78","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1093\/jcmc\/zmz023","volume":"25","author":"K Xu","year":"2020","unstructured":"Xu, K., Liao, T.: Explicating cues: a typology for understanding emerging media technologies. J. Comput.-Mediat. Commun. 25(1), 32\u201343 (2020). https:\/\/doi.org\/10.1093\/jcmc\/zmz023","journal-title":"J. Comput.-Mediat. Commun."},{"issue":"8","key":"6_CR79","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR80","doi-asserted-by":"publisher","unstructured":"Yang, K.C., Varol, O., Hui, P.M., Menczer, F.: Scalable and generalizable social bot detection through data selection. In: Proceedings of the AAAI Conference on Artificial Intelligence, New York, NY, USA, vol. 34 (2020). https:\/\/doi.org\/10.1609\/aaai.v34i01.5460","DOI":"10.1609\/aaai.v34i01.5460"},{"issue":"3","key":"6_CR81","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/T-AFFC.2011.6","volume":"2","author":"GN Yannakakis","year":"2011","unstructured":"Yannakakis, G.N., Togelius, J.: Experience-driven procedural content generation. IEEE Trans. Affect. Comput. 2(3), 147\u2013161 (2011). https:\/\/doi.org\/10.1109\/T-AFFC.2011.6","journal-title":"IEEE Trans. Affect. Comput."},{"key":"6_CR82","unstructured":"Zhang, T., Kishore, V., Wu, F., Weinberger, K.Q., Artzi, Y.: BERTScore: evaluating text generation with BERT. arXiv preprint arXiv:1904.09675 (2019)"}],"container-title":["Lecture Notes in Computer Science","Disinformation in Open Online Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18253-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T05:31:47Z","timestamp":1676957507000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18253-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031182525","9783031182532"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18253-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MISDOOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Multidisciplinary International Symposium on Disinformation in Open Online Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boise, ID","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"misdoom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.boisestate.edu\/misdoom-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}