{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:25:58Z","timestamp":1760833558409,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032086228","type":"print"},{"value":"9783032086235","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08623-5_19","type":"book-chapter","created":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:42:20Z","timestamp":1760784140000},"page":"358-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Conceptual Modeling of\u00a0Disinformation Campaigns"],"prefix":"10.1007","author":[{"given":"Sidbewendin Angelique","family":"Yameogo","sequence":"first","affiliation":[]},{"given":"R\u00e9gis","family":"Fleurquin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0163-8757","authenticated-orcid":false,"given":"Nicolas","family":"Belloir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4515-7461","authenticated-orcid":false,"given":"Wassila","family":"Ouerdane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,19]]},"reference":[{"issue":"2","key":"19_CR1","first-page":"100052","volume":"1","author":"W Ansar","year":"2021","unstructured":"Ansar, W., Goswami, S.: Combating the menace: a survey on characterization and detection of fake news from a data science perspective. Int. J. Inf. Manage. Data Insights 1(2), 100052 (2021)","journal-title":"Int. J. Inf. Manage. Data Insights"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta, A.B., et al.: Explainable artificial intelligence (xai): concepts, taxonomies, opportunities and challenges toward responsible ai. Inf. Fusion 58, 82\u2013115 (2020)","journal-title":"Inf. Fusion"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Atanasova, P.: A diagnostic study of explainability techniques for text classification. In: Accountable and Explainable Methods for Complex Reasoning over Text, pp. 155\u2013187. Springer (2024)","DOI":"10.1007\/978-3-031-51518-7_7"},{"key":"19_CR4","unstructured":"Avis Independent: Il n\u2019y a presque plus de c\u00e9r\u00e9ales en ukraine. https:\/\/web.archive.org\/web\/20220701205550\/, https:\/\/avisindependent.eu\/il-ny-a-presque\/ (2022), Accessed 02 Jun 2025, via Internet Archive"},{"key":"19_CR5","unstructured":"Bork, D., Ali, S.J., Roelens, B.: Conceptual modeling and artificial intelligence: a systematic mapping study. arXiv preprint arXiv:2303.06758 (2023)"},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s13278-023-01185-7","volume":"14","author":"R Chalehchaleh","year":"2024","unstructured":"Chalehchaleh, R., Salehi, M., Farahbakhsh, R., Crespi, N.: Brag: a hybrid multi-feature framework for fake news detection on social media. Soc. Netw. Anal. Min. 14(1), 35 (2024)","journal-title":"Soc. Netw. Anal. Min."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Varela\u00a0da Costa, J., Bogea\u00a0Gomes, S., Mira\u00a0da Silva, M.: Fake news: a conceptual model for risk management. Hum. Soc. Sci. Commun. 11(1), 1\u201311 (2024)","DOI":"10.1057\/s41599-024-03096-0"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Do\u00a0Nascimento, I.J.B., et al.: Infodemics and health misinformation: a systematic review of reviews. Bull. World Health Organ. 100(9), 544 (2022)","DOI":"10.2471\/BLT.21.287654"},{"key":"19_CR9","unstructured":"EU DisinfoLab: Doppelg\u00e4nger: Russian information operation impersonates western media outlets. Technical Report, Graphika, September 2022, https:\/\/www.disinfo.eu\/wp-content\/uploads\/2022\/09\/Doppelganger-1.pdf, Accessed 17 Jun 2023"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Gonzalez-Perez, C.: Conceptual modelling of temporality and subjectivity as cross-cutting concerns. Softw. Syst. Model. 1\u201316 (2024)","DOI":"10.1007\/s10270-024-01247-0"},{"key":"19_CR11","unstructured":"Graphika: Spamouflage goes to the beach: pro-chinese influence operation targets france with disinformation campaigns. Technical Report, Graphika (2023), https:\/\/public-assets.graphika.com\/reports\/graphika_report_spamouflage.pdf, Accessed 21 May 2024"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Helmus, T.C., et l.: Russian social media influence: understanding Russian propaganda in Eastern Europe. Rand Corporation (2018)","DOI":"10.7249\/CT496"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.aiopen.2022.09.001","volume":"3","author":"L Hu","year":"2022","unstructured":"Hu, L., Wei, S., Zhao, Z., Wu, B.: Deep learning for fake news detection: a comprehensive survey. AI Open 3, 133\u2013155 (2022)","journal-title":"AI Open"},{"key":"19_CR14","unstructured":"Koh, P.W., et al.: Concept bottleneck models. In: International Conference on Machine Learning, pp. 5338\u20135348. PMLR (2020)"},{"issue":"3","key":"19_CR15","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s10462-024-10702-9","volume":"57","author":"B Lakzaei","year":"2024","unstructured":"Lakzaei, B., Haghir Chehreghani, M., Bagheri, A.: Disinformation detection using graph neural networks: a survey. Artif. Intell. Rev. 57(3), 52 (2024)","journal-title":"Artif. Intell. Rev."},{"issue":"6380","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"DM Lazer","year":"2018","unstructured":"Lazer, D.M., et al.: The science of fake news. Science 359(6380), 1094\u20131096 (2018)","journal-title":"Science"},{"key":"19_CR17","unstructured":"Lin, H.: Developing responses to cyber-enabled information warfare and influence operations. Lawfare (2023)"},{"key":"19_CR18","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"19_CR19","unstructured":"Mannocci, L., Mazza, M., Monreale, A., Tesconi, M., Cresci, S.: Detection and characterization of coordinated online behavior: a survey. arXiv preprint arXiv:2408.01257 (2024)"},{"key":"19_CR20","unstructured":"NATO: Media (dis)information security: information warfare. https:\/\/www.nato.int\/cps\/en\/natohq\/topics_219728.htm (2020), Accessed 12 Apr 2024"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Phan, H.T., Nguyen, N.T., Hwang, D.: Fake news detection: a survey of graph neural network methods. Appl. Soft Comput. 110235 (2023)","DOI":"10.1016\/j.asoc.2023.110235"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Rashkin, H., Choi, E., Jang, J.Y., Volkova, S., Choi, Y.: Truth of varying shades: analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 2931\u20132937 (2017)","DOI":"10.18653\/v1\/D17-1317"},{"key":"19_CR23","unstructured":"RRN World: Caesar, or how france is responsible for war crimes. https:\/\/web.archive.org\/web\/20220820064248\/, https:\/\/rrn.world\/stories\/caesar-or-how-france-is-responsible-for-war-crimes\/ (2022). Accessed 02 Jun 2025, via Internet Archive"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Shao, C., Ciampaglia, G.L., Flammini, A., Menczer, F.: Hoaxy: a platform for tracking online misinformation. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 745\u2013750 (2016)","DOI":"10.1145\/2872518.2890098"},{"issue":"6","key":"19_CR25","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/fi13060158","volume":"13","author":"K Sikelis","year":"2021","unstructured":"Sikelis, K., Tsekouras, G.E., Kotis, K.: Ontology-based feature selection: a survey. Future Internet 13(6), 158 (2021)","journal-title":"Future Internet"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Starbird, K., Arif, A., Wilson, T.: Disinformation as collaborative work: surfacing the participatory nature of strategic information operations. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1\u201326 (2019)","DOI":"10.1145\/3359229"},{"key":"19_CR27","unstructured":"Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., Thomas, C.B.: Mitre att &ck: design and philosophy. MITRE Corporation, Technical Report (2018)"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Terp, S.J., Breuer, P.: Disarm: a framework for analysis of disinformation campaigns. In: 2022 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp.\u00a01\u20138. IEEE (2022)","DOI":"10.1109\/CogSIMA54611.2022.9830669"},{"key":"19_CR29","doi-asserted-by":"publisher","first-page":"103627","DOI":"10.1016\/j.artint.2021.103627","volume":"302","author":"I Tiddi","year":"2022","unstructured":"Tiddi, I., Schlobach, S.: Knowledge graphs as tools for explainable machine learning: a survey. Artif. Intell. 302, 103627 (2022)","journal-title":"Artif. Intell."},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Vargas, L., Emami, P., Traynor, P.: On the detection of disinformation campaign activity with network analysis. In: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 133\u2013146 (2020)","DOI":"10.1145\/3411495.3421363"},{"key":"19_CR31","unstructured":"VIGINUM: Rrn: a complex and persistent information manipulation campaign. https:\/\/www.sgdsn.gouv.fr\/files\/files\/Publications\/20230719_NP_VIGINUM_RAPPORT-CAMPAGNE-RRN_EN.pdf, July 2023, Accessed 13 Aug 2025"},{"issue":"2","key":"19_CR32","doi-asserted-by":"publisher","first-page":"102025","DOI":"10.1016\/j.ipm.2019.03.004","volume":"57","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Ghorbani, A.A.: An overview of online fake news: characterization, detection, and discussion. Inf. Process. Manage. 57(2), 102025 (2020)","journal-title":"Inf. Process. Manage."},{"issue":"5","key":"19_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3395046","volume":"53","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Zafarani, R.: A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput. Surv. (CSUR) 53(5), 1\u201340 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08623-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:42:29Z","timestamp":1760784149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08623-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"ISBN":["9783032086228","9783032086235"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08623-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,19]]},"assertion":[{"value":"19 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poitiers","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/er2025.ensma.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}