{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:31Z","timestamp":1740141331321,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014182106"],"award-info":[{"award-number":["N00014182106"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008047","name":"Carnegie Mellon University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100008047","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Conspiracy theories (CTs) have thrived during the COVID-19 pandemic and continue to spread on social media despite attempts at fact-checking. The isolation and fear associated with this pandemic likely contributed to the generation and spread of these theories. Another possible factor is the high rate of Twitter users linking to off-platform alternative news sources through URL sharing (Moffitt et al. 2021). In this paper, we compare URLs and their parent domains linked in CT and non-CT tweets. First, we searched the parent domains of URLs shared in conspiracy theory and non-conspiracy theory classified tweets for the presence of Google tracking codes. We then constructed meta-networks linking domains, tracking codes, and Twitter users to find connections between domains and evidence of an eco-system that may have contributed to the cultivation and spread of conspiracy theories during the pandemic.<\/jats:p>","DOI":"10.1007\/s10588-023-09379-2","type":"journal-article","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T12:44:11Z","timestamp":1693831451000},"page":"206-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Connecting the domains: an investigation of internet domains found in Covid-19 conspiracy tweets"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6477-8338","authenticated-orcid":false,"given":"J. D.","family":"Moffitt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1636-9887","authenticated-orcid":false,"given":"Catherine","family":"King","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6356-0238","authenticated-orcid":false,"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,4]]},"reference":[{"key":"9379_CR1","volume-title":"Voodoo histories: The role of the conspiracy theory in shaping modern history","author":"D Aaronovitch","year":"2010","unstructured":"Aaronovitch D (2010) Voodoo histories: The role of the conspiracy theory in shaping modern history. Riverhead Books, New York, NY"},{"key":"9379_CR2","unstructured":"Alexander L (2015) Unveiling hidden connections with google analytics ids. https:\/\/www.bellingcat.com\/resources\/how-tos\/2015\/07\/23\/unveiling-hidden-connections-with-google-analytics-ids\/"},{"key":"9379_CR3","unstructured":"Alexander L (2015) Open-source information reveals pro-kremlin web campaign. https:\/\/globalvoices.org\/2015\/07\/13\/open-source-information-reveals-pro-kremlin-web-campaign\/"},{"key":"9379_CR4","volume-title":"Ora user\u2019s guide 2020","author":"N Altman","year":"2020","unstructured":"Altman N, Carley KM, Reminga J (2020) Ora user\u2019s guide 2020. Carnegie Mellon University, Tech. rep."},{"key":"9379_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2018.8620051","author":"S Aphiwongsophon","year":"2018","unstructured":"Aphiwongsophon S, Chongstitvatana P (2018) Detecting fake news with machine learning method. Int Conf Electrical Eng\/Electron Comput Telecommun Inform Technol. https:\/\/doi.org\/10.1109\/ECTICon.2018.8620051","journal-title":"Int Conf Electrical Eng\/Electron Comput Telecommun Inform Technol"},{"key":"9379_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-021-00133-9","author":"M Babcock","year":"2021","unstructured":"Babcock M, Carley KM (2021) Operation gridlock: opposite sides, opposite strategies. J Computat Social Sci. https:\/\/doi.org\/10.1007\/s42001-021-00133-9","journal-title":"J Computat Social Sci"},{"key":"9379_CR7","volume-title":"The power of unreason: conspiracy theories, extremism, and counter-terrorism","author":"J Bartlett","year":"2010","unstructured":"Bartlett J, Miller C (2010) The power of unreason: conspiracy theories, extremism, and counter-terrorism. Demos, London, United Kingdom"},{"key":"9379_CR8","unstructured":"Basu T (2020) How to talk to conspiracy theorists-and still be kind (2020), https:\/\/www.technologyreview.com\/2020\/07\/15\/1004950\/how-to-talk-to-conspiracy-theorists-and-still-be-kind\/"},{"key":"9379_CR9","doi-asserted-by":"publisher","unstructured":"Bessi A, Petroni F, Del\u00a0Vicario M, Zollo F, Anagnostopoulos A, Scala A, Caldarelli G, Quattrociocchi W (2015) Viral Misinformation: The Role of Homophily and Polarization. In: Proceedings of the 24th International Conference on World Wide Web. pp. 355\u2013356. WWW \u201915 Companion, Association for Computing Machinery, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2740908.2745939","DOI":"10.1145\/2740908.2745939"},{"key":"9379_CR10","doi-asserted-by":"publisher","DOI":"10.5040\/9781472944528","volume-title":"Suspicious minds: Why we believe conspiracy theories","author":"R Brotherton","year":"2015","unstructured":"Brotherton R (2015) Suspicious minds: Why we believe conspiracy theories. Bloomsbury Publishing, London"},{"key":"9379_CR11","doi-asserted-by":"publisher","DOI":"10.1057\/9780230349216","volume-title":"Conspiracy theories: A critical introduction","author":"J Byford","year":"2011","unstructured":"Byford J (2011) Conspiracy theories: A critical introduction. Palgrave MacMillan, Basingstoke, United Kingdom"},{"key":"9379_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6170-8_309","volume-title":"Encyclopedia of Social Network Analysis and Mining","author":"KM Carley","year":"2017","unstructured":"Carley KM (2017) Ora: a toolkit for dynamic network analysis and visualization. In: Alhajj R, Rokne J (eds) Encyclopedia of social network analysis and mining. Springer.\u00a0https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_309"},{"key":"9379_CR13","volume-title":"Python requests essentials","author":"RV Chandra","year":"2015","unstructured":"Chandra RV, Varanasi BS (2015) Python requests essentials. Packt Publishing, Birmingham"},{"key":"9379_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/meet.14504701295","volume":"471","author":"HC Chang","year":"2010","unstructured":"Chang HC (2010) A new perspective on Twitter hashtag use: diffusion of innovation theory. Proceed Am Soci Inform Sci Technol 471:1\u20134. https:\/\/doi.org\/10.1002\/meet.14504701295","journal-title":"Proceed Am Soci Inform Sci Technol"},{"issue":"1","key":"9379_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-020-00317-8","volume":"5","author":"IJ Cruickshank","year":"2020","unstructured":"Cruickshank IJ, Carley KM (2020) Characterizing communities of hashtag usage on twitter during the 2020 covid-19 pandemic by multi-view clustering. Appl Netw Sci 5(1):1\u201340","journal-title":"Appl Netw Sci"},{"issue":"4","key":"9379_CR16","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1017\/epi.2017.9","volume":"15","author":"MRX Dentith","year":"2018","unstructured":"Dentith MRX, Orr M (2018) Secrecy and conspiracy. Episteme 15(4):433\u2013450. https:\/\/doi.org\/10.1017\/epi.2017.9 (www.cambridge.org\/core\/journals\/episteme\/article\/abs\/secrecy-and-conspiracy\/4A9A8CB9AD858835E532956380E9E0B4)","journal-title":"Episteme"},{"key":"9379_CR17","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805","author":"J Devlin","year":"2018","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. ArXiv preprint. https:\/\/doi.org\/10.48550\/arXiv.1810.04805","journal-title":"ArXiv preprint"},{"key":"9379_CR18","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1177\/0963721417718261","volume":"26","author":"KM Douglas","year":"2017","unstructured":"Douglas KM, Sutton RM, Cichocka A (2017) The psychology of conspiracy theories. Cur Dir Pscyhol Sci 26:538\u2013542","journal-title":"Cur Dir Pscyhol Sci"},{"issue":"S1","key":"9379_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1111\/pops.12568","volume":"40","author":"KM Douglas","year":"2019","unstructured":"Douglas KM, Uscinski JE, Sutton RM, Cichocka A, Nefes T, Ang CS, Deravi F (2019) Understanding conspiracy theories. Polit Psychol 40(S1):3\u201335. https:\/\/doi.org\/10.1111\/pops.12568.","journal-title":"Polit Psychol"},{"key":"9379_CR20","first-page":"1","volume":"19","author":"S Evanega","year":"2020","unstructured":"Evanega S, Lynas M, Adams J, Smolenyak K, Insights CG (2020) Coronavirus misinformation: quantifying sources and themes in the covid-19 infodemic. JMIR Preprints 19:1","journal-title":"JMIR Preprints"},{"key":"9379_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2020.110201","volume":"166","author":"N Georgiou","year":"2020","unstructured":"Georgiou N, Delfabbro P, Balzan R (2020) Covid-19-related conspiracy beliefs and their relationship with perceived stress and pre-existing conspiracy beliefs. Pers Individ Differ 166:110201","journal-title":"Pers Individ Differ"},{"issue":"2","key":"9379_CR22","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.chb.2011.11.014","volume":"28","author":"M Glassman","year":"2012","unstructured":"Glassman M, Kang MJ (2012) Intelligence in the internet age: the emergence and evolution of open source intelligence (osint). Comput Hum Behav 28(2):673\u2013682","journal-title":"Comput Hum Behav"},{"key":"9379_CR23","unstructured":"Gleicher N, Franklin M, Agranovich D, Nimmo B, Belogolova O, Torrey M (2021) Threat Report: The State of Influence Operations 2017-2020. Facebook"},{"issue":"4","key":"9379_CR24","doi-asserted-by":"publisher","first-page":"731","DOI":"10.2307\/3791630","volume":"15","author":"T Goertzel","year":"1994","unstructured":"Goertzel T (1994) Belief in conspiracy theories. Polit Psychol 15(4):731\u2013742. https:\/\/doi.org\/10.2307\/3791630 (www.jstor.org\/stable\/3791630)","journal-title":"Polit Psychol"},{"key":"9379_CR25","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1214\/aoms\/1177705148","volume":"32","author":"LA Goodman","year":"1961","unstructured":"Goodman LA (1961) Snowball sampling. Annals of Math Stat 32:148\u2013170","journal-title":"Annals of Math Stat"},{"key":"9379_CR26","unstructured":"How adsense works - adsense help, https:\/\/support.google.com\/adsense\/answer\/ 6242051?hl=en"},{"key":"9379_CR28","doi-asserted-by":"crossref","unstructured":"Head T (2017) Surprise, surprise: Multiple websites pushing \u2019white monopoly capital\u2019 agenda traced back to india, https:\/\/www.thesouthafrican.com\/news\/surprise-surprise-multiple-websites-pushing-white-monopoly-capital-agenda-traced-back-to-india\/","DOI":"10.12968\/prps.2017.Sup195.9"},{"issue":"8","key":"9379_CR29","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.1177\/1948550620934692","volume":"11","author":"R Imhoff","year":"2020","unstructured":"Imhoff R, Lamberty P (2020) A bioweapon or a hoax? The link between distinct conspiracy beliefs about the coronavirus disease (COVID-19) outbreak and pandemic behavior. Soci Psychol Pers Sci 11(8):1110\u20131118","journal-title":"Soci Psychol Pers Sci"},{"key":"9379_CR30","doi-asserted-by":"publisher","unstructured":"Lewandowsky S, Cook J, Lombardi D (2020) Debunking Handbook 2020. Doi: https:\/\/doi.org\/10.17910\/B7.1182","DOI":"10.17910\/B7.1182"},{"key":"9379_CR31","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2105.07454","author":"T Magelinski","year":"2021","unstructured":"Magelinski T, Ng LHX, Carley KM (2021) A synchronized action framework for responsible detection of coordination on social media. ArXiv preprint. https:\/\/doi.org\/10.48550\/arXiv.2105.07454","journal-title":"ArXiv preprint"},{"key":"9379_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/20563051211043212","volume":"7","author":"J Moffitt","year":"2021","unstructured":"Moffitt J, King C, Carley KM (2021) Hunting conspiracy theories during the covid-19 pandemic. Soci Media Soci 7(3).\u00a0https:\/\/doi.org\/10.1177\/20563051211043212","journal-title":"Soci Media Soci"},{"key":"9379_CR33","unstructured":"Netanomics: Netmapper (version 1.0.0.68) [computer software & data, retrieved from https:\/\/netanomics.com]"},{"key":"9379_CR34","unstructured":"Newton C (2020) How the \u2018Plandemic\u2019 video hoax went viral , https:\/\/www.theverge.com\/2020\/5\/12\/21254184\/how-plandemic-went-viral-facebook-youtube"},{"key":"9379_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-022-09371-2","author":"LHX Ng","year":"2021","unstructured":"Ng LHX, Cruickshank I, Carley KM (2021) Coordinating narratives and the capitol riots on parler. ArXiv preprint. https:\/\/doi.org\/10.1007\/s10588-022-09371-2","journal-title":"ArXiv preprint"},{"key":"9379_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2020.110289","author":"T Oleksy","year":"2020","unstructured":"Oleksy T, Wnuk A, Maison D, \u0141y\u015b A (2020) Content matters. Different predictors and social consequences of general and government-related conspiracy theories on COVID-19. Pers Individ Diff. https:\/\/doi.org\/10.1016\/j.paid.2020.110289","journal-title":"Pers Individ Diff"},{"issue":"1145\/3366424","key":"9379_CR37","first-page":"3385775","volume":"10","author":"D Pacheco","year":"2020","unstructured":"Pacheco D, Flammini A, Menczer F (2020) Unveiling coordinated groups behind white helmets disinformation. Companion Proceed of the Web Conf 10(1145\/3366424):3385775","journal-title":"Companion Proceed of the Web Conf"},{"key":"9379_CR38","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"9379_CR39","doi-asserted-by":"publisher","unstructured":"Radu RN, Schultz T (2017) Conspiracy Theories and (the) Media (Studies). SSRN Scholarly Paper ID 3089178, Social Science Research Network, Rochester, NY (2017). Doi: https:\/\/doi.org\/10.2139\/ssrn.3089178","DOI":"10.2139\/ssrn.3089178"},{"key":"9379_CR40","unstructured":"Rebello K, Schwieter C, Schliebs M, Joynes-Burgess K, Elswah M, Bright J, Howard PN (2020) Covid-19 news and information from state-backed outlets targeting french, german and spanish-speaking social media users. Project on Computational Propaganda, Oxford"},{"key":"9379_CR41","volume-title":"Diffusion of Innovations","author":"EM Rogers","year":"2010","unstructured":"Rogers EM (2010) Diffusion of Innovations, 4th edn. The Free Press, New York, New York","edition":"4"},{"key":"#cr-split#-9379_CR42.1","doi-asserted-by":"crossref","unstructured":"Samory M, Mitra T (2018) Conspiracies Online: User Discussions in a Conspiracy Community Following Dramatic Events. Proceedings of the International AAAI Conference on Web and Social Media 12","DOI":"10.1609\/icwsm.v12i1.15039"},{"key":"#cr-split#-9379_CR42.2","unstructured":"(1) (2018), https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/15039, number: 1"},{"issue":"2","key":"9379_CR43","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s42001-020-00086-5","volume":"3","author":"S Shahsavari","year":"2020","unstructured":"Shahsavari S, Holur P, Wang T, Tangherlini TR, Roychowdhury V (2020) Conspiracy in the time of corona: automatic detection of emerging COVID-19 conspiracy theories in social media and the news. J Comput Social Sci 3(2):279\u2013317. https:\/\/doi.org\/10.1007\/s42001-020-00086-5","journal-title":"J Comput Social Sci"},{"key":"9379_CR27","unstructured":"Tracking code overview, https:\/\/developers.google.com\/analytics\/resources\/ concepts\/gaConceptsTrackingOverview"},{"key":"9379_CR44","unstructured":"Website traffic - check and analyze any website, https:\/\/www.similarweb.com\/"},{"key":"9379_CR45","doi-asserted-by":"publisher","DOI":"10.31234\/osf.io\/4c6av","author":"A Sternisko","year":"2020","unstructured":"Sternisko A, Cichocka A, Cislak A, Bavel JJV (2020) Collective narcissism predicts the belief and dissemination of conspiracy theories during the COVID-19 pandemic. PsyArXiv. https:\/\/doi.org\/10.31234\/osf.io\/4c6av","journal-title":"PsyArXiv"},{"key":"9379_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.copsyc.2020.02.007","volume":"35","author":"A Sternisko","year":"2020","unstructured":"Sternisko A, Cichocka A, Van Bavel JJ (2020) The dark side of social movements: social identity, non-conformity, and the lure of conspiracy theories. Curr Opin Psychol 35:1\u20136","journal-title":"Curr Opin Psychol"},{"key":"9379_CR47","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0233879","author":"TR Tangherlini","year":"2020","unstructured":"Tangherlini TR, Shahsavari S, Shahbazi B, Ebrahimzadeh E, Roychowdhury V (2020) An automated pipeline for the discovery of conspiracy and conspiracy theory narrative frameworks: Bridgegate Pizzagate and storytelling on the web. PLOS ONE. https:\/\/doi.org\/10.1371\/journal.pone.0233879","journal-title":"PLOS ONE"},{"key":"9379_CR48","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-030-61255-9_11","volume-title":"Social Cultural and Behavioral Modeling Lecture Notes in Computer Science","author":"A Tyagi","year":"2020","unstructured":"Tyagi A, Babcock M, Carley KM, Sicker DC (2020) Polarizing tweets on climate change. In: Thomson R, Bisgin H, Dancy C, Hyder A, Hussain M (eds) Social Cultural and Behavioral Modeling Lecture Notes in Computer Science. Springer International Publishing, Cham, pp 107\u2013117"},{"key":"9379_CR49","unstructured":"UN tackles \u2018infodemic\u2019 of misinformation and cybercrime in COVID-19 crisis (March 2020), https:\/\/www.un.org\/en\/un-coronavirus-communications-team\/un-tackling-\u2018infodemic\u2019-misinformation-and-cybercrime-covid-19"},{"key":"9379_CR50","unstructured":"Wallsten K (2007) How Conspiracies Rise, Spread and Fall: The Case of Voter Fraud, the Blogosphere and the 2004 Election. Working paper, UC Berkeley"},{"issue":"6","key":"9379_CR51","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1177\/1948550611434786","volume":"3","author":"MJ Wood","year":"2012","unstructured":"Wood MJ, Douglas KM, Sutton RM (2012) Dead and alive: beliefs in contradictory conspiracy theories. Social Psychol Pers Sci 3(6):767\u2013773. https:\/\/doi.org\/10.1177\/1948550611434786.\u00a0","journal-title":"Social Psychol Pers Sci"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-023-09379-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10588-023-09379-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-023-09379-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T14:58:21Z","timestamp":1724425101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10588-023-09379-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,4]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["9379"],"URL":"https:\/\/doi.org\/10.1007\/s10588-023-09379-2","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2023,9,4]]},"assertion":[{"value":"15 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}