{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:25:38Z","timestamp":1767651938411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319915203"},{"type":"electronic","value":"9783319915210"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91521-0_32","type":"book-chapter","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T13:23:21Z","timestamp":1527686601000},"page":"445-461","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Changing Perspectives: Is It Sufficient to Detect Social Bots?"],"prefix":"10.1007","author":[{"given":"Christian","family":"Grimme","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Assenmacher","sequence":"additional","affiliation":[]},{"given":"Lena","family":"Adam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,31]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: The socialbot network: when bots socialize for fame and money. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 93\u2013102. ACM, New York (2011)","DOI":"10.1145\/2076732.2076746"},{"key":"32_CR2","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: Key challenges in defending against malicious socialbots. In: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2012, pp. 1\u20134. USENIX Association, Berkeley (2012)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Messias, J., Schmidt, L., Oliveira, R., Benevenuto, F.: You followed my bot! Transforming robots into influential users in Twitter, First Monday (2013)","DOI":"10.5210\/fm.v18i7.4217"},{"key":"32_CR4","first-page":"10","volume":"10","author":"N Mar\u00e9chal","year":"2016","unstructured":"Mar\u00e9chal, N.: Automation, algorithms, and politics \u2014 when bots tweet: toward a normative framework for bots on social networking sites (feature). Int. J. Commun. 10, 10 (2016)","journal-title":"Int. J. Commun."},{"issue":"7","key":"32_CR5","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"Emilio Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots, vol. 59, pp. 96\u2013104 (2016)","journal-title":"Communications of the ACM"},{"key":"32_CR6","unstructured":"Tynan, D.: Social Spam is taking over the Internet, Apr 2012. http:\/\/www.itworld.com\/article\/2832566\/it-management\/social-spam-is-taking-over-the-internet.html"},{"key":"32_CR7","unstructured":"Fredheim, R.: Putin\u2019s bot army - part one: a bit about bots (2013). http:\/\/quantifyingmemory.blogspot.co.uk\/2013\/06\/putins-bots-part-one-bit-about-bots.html"},{"key":"32_CR8","unstructured":"Elliott, C.: The readers\u2019 editor on pro-Russia trolling below the line on Ukraine stories, May 2014. http:\/\/www.theguardian.com\/commentisfree\/2014\/may\/04\/pro-russia-trolls-ukraine-guardian-online"},{"key":"32_CR9","unstructured":"Ohlheiser, A.: Trolls turned tay, microsoft\u2019s fun millennial ai bot, into a genocidal maniac, March 2016"},{"key":"32_CR10","unstructured":"Rosenbach, M.S.: Internet-Kommentare von Automaten: AfD will im Wahlkampf Meinungsroboter einsetzen, October 2016"},{"key":"32_CR11","unstructured":"Pfaffenzeller, M.: Bundestagswahlkampf: CDU erw\u00e4gt Einsatz von Chatbots, March 2017"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Kollanyi, B.: Bots, #StrongerIn, and #Brexit: Computational Propaganda during the UK-EU Referendum (2016)","DOI":"10.2139\/ssrn.2798311"},{"key":"32_CR13","unstructured":"Kollanyi, B., Howard, P.N., Woolley, S.C.: Bots and automation over Twitter during the US election. Technical report Data Memo 2016.4, Project on Computational Propaganda, Oxford, UK (2016). www.politicalbots.org"},{"key":"32_CR14","unstructured":"Neudert, L.M.N.: Computational propaganda in Germany: a cautionary Tale. Project on Computational Propaganda. Technical report (2017). www.politicalbots.org"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online Human-Bot Interactions: Detection, Estimation, and Characterization (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"issue":"4","key":"32_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1089\/big.2017.0044","volume":"5","author":"C Grimme","year":"2017","unstructured":"Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5(4), 279\u2013293 (2017)","journal-title":"Big Data"},{"issue":"5","key":"32_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MIC.2014.81","volume":"18","author":"A Paradise","year":"2014","unstructured":"Paradise, A., Puzis, R., Shabtai, A.: Anti-reconnaissance tools: detecting targeted socialbots. IEEE Internet Comput. 18(5), 11\u201319 (2014)","journal-title":"IEEE Internet Comput."},{"issue":"1","key":"32_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2556609","volume":"8","author":"Zhi Yang","year":"2014","unstructured":"Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1), 2:1\u20132:29 (2014)","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"32_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jocs.2015.11.002","volume":"16","author":"EM Clark","year":"2016","unstructured":"Clark, E.M., Williams, J.R., Galbraith, R.A., Jones, C.A., Danforth, C.M., Dodds, P.S.: Sifting robotic from organic text: a natural language approach for detecting automation on Twitter. J. Comput. Sci. 16, 1\u20137 (2016)","journal-title":"J. Comput. Sci."},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: A system to evaluate social bots. CoRR abs\/1602.00975 (2016)","DOI":"10.1145\/2872518.2889302"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Hegelich, S., Janetzko, D.: Are social bots on twitter political actors? empirical evidence from a Ukrainian social botnet. In: International AAAI Conference on Web and Social Media, pp. 579\u2013582 (2016)","DOI":"10.1609\/icwsm.v10i1.14764"},{"key":"32_CR22","unstructured":"Echeverr\u00eda, J., Zhou, S.: The \u2018Star Wars\u2019 botnet with $$>$$350k Twitter bots. CoRR abs\/1701.02405 (2017)"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Cao, Q., Yang, X., Yu, J., Palow, C.: Uncovering large groups of active malicious accounts in online social networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 477\u2013488. ACM, New York (2014)","DOI":"10.1145\/2660267.2660269"},{"key":"32_CR24","unstructured":"Grimme, C., Assenmacher, D., Adam, L., Preuss, M., Stockdiek, J.F.H.L.: Bundestagswahl 2017: Social-Media-Angriff auf das #kanzlerduell? Technical report 2017.1, Project PropStop, M\u00fcnster, Germany (2017). www.propstop.de"},{"key":"32_CR25","unstructured":"Schmehl, K.: Diese geheimen Chats zeigen, wer hinter dem Meme-Angriff #Verr\u00e4terduell aufs TV-Duell steckt, September 2017"},{"issue":"1","key":"32_CR26","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1140\/epjds\/s13688-017-0111-y","volume":"6","author":"O Varol","year":"2017","unstructured":"Varol, O., Ferrara, E., Menczer, F., Flammini, A.: Early detection of promoted campaigns on social media. EPJ Data Sci. 6(1), 13 (2017)","journal-title":"EPJ Data Sci."}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media. User Experience and Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91521-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:24:42Z","timestamp":1709832282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91521-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319915203","9783319915210"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91521-0_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"31 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCSM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Computing and Social Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Vegas, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ocsc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.hci.international\/scsm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}