{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T07:19:27Z","timestamp":1765610367790,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819951765"},{"type":"electronic","value":"9789819951772"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-5177-2_4","type":"book-chapter","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T23:02:34Z","timestamp":1691017354000},"page":"58-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Did State-Sponsored Trolls Shape the\u00a02016 US Presidential Election Discourse? Quantifying Influence on\u00a0Twitter"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0643-3424","authenticated-orcid":false,"given":"Nikos","family":"Salamanos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7287-168X","authenticated-orcid":false,"given":"Michael J.","family":"Jensen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7424-7482","authenticated-orcid":false,"given":"Costas","family":"Iordanou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6500-581X","authenticated-orcid":false,"given":"Michael","family":"Sirivianos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,3]]},"reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-17572-5_1","volume-title":"Internet and Network Economics","author":"KV Aadithya","year":"2010","unstructured":"Aadithya, K.V., Ravindran, B., Michalak, T.P., Jennings, N.R.: Efficient Computation of the Shapley Value for Centrality in Networks. In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 1\u201313. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17572-5_1"},{"key":"4_CR2","unstructured":"Adamczewski, K., Matejczyk, S., Michalak, T.: How good is the shapley value-based approach to the influence maximization problem? Front. Artif. Intell. Appl. 263 (2014)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Badawy, A., Ferrara, E., Lerman, K.: Analyzing the digital traces of political manipulation: The 2016 Russian interference twitter campaign. In: Proceedings of the 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining. pp. 258\u2013265. ASONAM 2018 (2018)","DOI":"10.1109\/ASONAM.2018.8508646"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Badawy, A., Lerman, K., Ferrara, E.: Who falls for online political manipulation? In: Companion Proceedings of The 2019 World Wide Web Conference. pp. 162\u2013168. WWW 2019, ACM (2019)","DOI":"10.1145\/3308560.3316494"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Benkler, Y., Faris, R., Roberts, H.: Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. Oxford University Press (2018)","DOI":"10.1093\/oso\/9780190923624.001.0001"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Bovet, A., Makse, H.A.: Influence of fake news in twitter during the 2016 us presidential election. Nat. Commun. 10(7) (2019)","DOI":"10.1038\/s41467-018-07761-2"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bovet, A., Morone, F., Makse, H.A.: Validation of twitter opinion trends with national polling aggregates: Hillary clinton vs donald trump. Sci. Rep. 8(1) (2018)","DOI":"10.1038\/s41598-018-26951-y"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: A system to evaluate social bots. In: Proceedings of the 25th International Conference Companion on World Wide Web. pp. 273\u2013274. WWW 2016 Companion (2016)","DOI":"10.1145\/2872518.2889302"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Goel, S., Anderson, A., Hofman, J., Watts, D.J.: The structural virality of online diffusion. Manag. Sci. 2(1) (2015)","DOI":"10.1287\/mnsc.2015.2158"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Grinberg, N., Joseph, K., Friedland, L., Swire-Thompson, B., Lazer, D.: Fake news on twitter during the 2016 u.s. presidential election. Science 363(6425), 374\u2013378 (2019)","DOI":"10.1126\/science.aau2706"},{"key":"4_CR11","unstructured":"Jamieson, K.H.: Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don\u2019t, Can\u2019t, and Do Know. Oxford University Press (2018)"},{"key":"4_CR12","unstructured":"Jensen, M.: Russian trolls and fake news: Information or identity logics? J. Int. Affairs 71(1.5), 115\u2013124 (2018)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kitsak, M., et al.: Identification of influential spreaders in complex networks. Nat. Phys. 6, 888\u2013893 (2010)","DOI":"10.1038\/nphys1746"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Le, H., Boynton, G.R., Shafiq, Z., Srinivasan, P.: A postmortem of suspended twitter accounts in the 2016 U.S. presidential election. In: Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining. pp. 258\u2013265. ASONAM 2019, ACM (2019)","DOI":"10.1145\/3341161.3342878"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Mazarr, M., et al.: Hostile Social Manipulation: Present Realities and Emerging Trends. Santa Monica: Rand Corporation (March 2019). https:\/\/www.rand.org\/pubs\/research_reports\/RR2713.html","DOI":"10.7249\/RR2713"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Michalak, T., Aadithya, K., Szczepa\u0144ski, P., Ravindran, B., Jennings, N.: Efficient computation of the shapley value for game-theoretic network centrality. J. Artif.l Intelll. Res 46(2014)","DOI":"10.1613\/jair.3806"},{"issue":"7563","key":"4_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1038\/nature14604","volume":"524","author":"F Morone","year":"2015","unstructured":"Morone, F., Makse, H.A.: Influence maximization in complex networks through optimal percolation. Nature 524(7563), 65\u201368 (2015)","journal-title":"Nature"},{"key":"4_CR18","unstructured":"Mueller, R.S.: Report on the Investigation into Russian Interference in the 2016 Presidential Election. Washington, DC: Department of Justice (2019). https:\/\/www.justice.gov\/storage\/report.pdf"},{"issue":"1","key":"4_CR19","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TASE.2010.2052042","volume":"8","author":"R Narayanam","year":"2011","unstructured":"Narayanam, R., Narahari, Y.: A shapley value-based approach to discover influential nodes in social networks. IEEE Trans. Autom. Sci. Eng. 8(1), 130\u2013147 (2011)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/978-3-642-23783-6_35","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P Papapetrou","year":"2011","unstructured":"Papapetrou, P., Gionis, A., Mannila, H.: A shapley value approach for influence attribution. In: Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M. (eds.) ECML PKDD 2011. LNCS (LNAI), vol. 6912, pp. 549\u2013564. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23783-6_35"},{"key":"4_CR21","first-page":"307","volume-title":"Contributions to the Theory of Games II","author":"LS Shapley","year":"1953","unstructured":"Shapley, L.S.: A value for n-person games. In: Kuhn, H.W., Tucker, A.W. (eds.) Contributions to the Theory of Games II, pp. 307\u2013317. Princeton University Press, Princeton (1953)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Sides, J., Tesler, M., Vavreck, L.: Identity Crisis: The 2016 Presidential Campaign and the Battle for the Meaning of America. Princeton University Press (2018)","DOI":"10.1515\/9781400888306"},{"key":"4_CR23","unstructured":"Suri, N.R., Narahari, Y.: Determining the top-k nodes in social networks using the shapley value. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3. pp. 1509\u20131512. AAMAS 20\u201908 (2008)"},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1609\/icwsm.v11i1.14871","volume":"11","author":"O Varol","year":"2017","unstructured":"Varol, O., Ferrara, E., Davis, C., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. Proceedings of the International AAAI Conference on Web and Social Media 11(1), 280\u2013289 (2017). https:\/\/doi.org\/10.1609\/icwsm.v11i1.14871","journal-title":"Proceedings of the International AAAI Conference on Web and Social Media"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Vosoughi, S., Mohsenvand, M.N., Roy, D.: Rumor gauge: predicting the veracity of rumors on twitter. ACM Trans. Knowl. Discov. Data 11(4) (2017)","DOI":"10.1145\/3070644"},{"issue":"6380","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146\u20131151 (2018)","journal-title":"Science"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Yang, K.C., Varol, O., Hui, P.M., Menczer, F.: Scalable and generalizable social bot detection through data selection (2019)","DOI":"10.1609\/aaai.v34i01.5460"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Caulfield, T., De Cristofaro, E., Sirivianos, M., Stringhini, G., Blackburn, J.: Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web. In: Workshop on Computational Methods in Online Misbehavior, pp. 218\u2013226. ACM (2019)","DOI":"10.1145\/3308560.3316495"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Caulfield, T., Setzer, W., Sirivianos, M., Stringhini, G., Blackburn, J.: Who let the trolls out?: Towards understanding state-sponsored trolls. In: Proceedings of the 10th ACM Conference on Web Science, pp. 353\u2013362. WebSci \u201919, ACM (2019)","DOI":"10.1145\/3292522.3326016"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-5177-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T23:05:53Z","timestamp":1691017553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-5177-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819951765","9789819951772"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-5177-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canterbury","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nss-socialsec2023.cyber.kent.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}