{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T10:26:06Z","timestamp":1768731966283,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-19-2-1000"],"award-info":[{"award-number":["FA8750-19-2-1000"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006919","name":"Massachusetts Institute of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100006919","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Powerful actors have engaged in information control for centuries, restricting, promoting, or influencing the information environment as it suits their evolving agendas. In the Digital Age, information control has moved online, and information operations now target the online platforms that play a critical role in news engagement and civic debate. In this paper, we use a discrete-time stochastic model to analyze coordinated activity in an online social network, representing the behaviors of accounts as interacting Markov chains. From a dataset of 31,521 tweets posted by 206 accounts, half of which were identified by Twitter as participating in a state-linked information operation, we evaluate the coordination, measured by the apparent influence, between pairs of state-linked accounts compared to unaffiliated accounts. Our analysis reveals that state-linked actors demonstrate significantly higher levels of coordination among themselves compared to their coordination with unaffiliated accounts. Furthermore, the degree of coordination observed between state-linked accounts is more than seven times greater than the coordination observed between unaffiliated accounts. Moreover, we find that the account that represented the most coordinated activity in the network <jats:italic>had no followers<\/jats:italic>, demonstrating the power of our modeling approach to unearth hidden connections even in the absence of explicit network structure.<\/jats:p>","DOI":"10.1007\/s10588-023-09382-7","type":"journal-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T08:06:42Z","timestamp":1693296402000},"page":"161-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Hidden messages: mapping nations\u2019 media campaigns"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1341-5569","authenticated-orcid":false,"given":"Keeley","family":"Erhardt","sequence":"first","affiliation":[]},{"given":"Alex","family":"Pentland","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"issue":"30","key":"9382_CR6","doi-asserted-by":"publisher","first-page":"eabb5824","DOI":"10.1126\/sciadv.abb5824","volume":"6","author":"M Alizadeh","year":"2020","unstructured":"Alizadeh M, Shapiro JN, Buntain C, Tucker JA (2020) Content-based features predict social media influence operations. Sci Adv 6(30):eabb5824","journal-title":"Sci Adv"},{"key":"9382_CR11","unstructured":"Asavathiratham C (2001) The influence model: A tractable representation for the dynamics of networked markov chains. PhD thesis, Massachusetts Institute of Technology"},{"issue":"6","key":"9382_CR12","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/37.969135","volume":"21","author":"C Asavathiratham","year":"2001","unstructured":"Asavathiratham C, Roy S, Lesieutre B, Verghese G (2001) The influence model. IEEE Control Syst Mag 21(6):52\u201364","journal-title":"IEEE Control Syst Mag"},{"key":"9382_CR15","volume-title":"Learning human interactions with the influence model","author":"S Basu","year":"2001","unstructured":"Basu S, Choudhury T, Clarkson B, Pentland A (2001) Learning human interactions with the influence model. NIPS, San Francisco"},{"key":"9382_CR13","doi-asserted-by":"crossref","unstructured":"Dong W, Lepri B, Cappelletti A, Pentland A, Pianesi F, Zancanaro M (2007) Using the influence model to recognize functional roles in meetings. In: Proceedings of the 9th International Conference on Multimodal Interfaces, pp. 271\u2013278","DOI":"10.1145\/1322192.1322239"},{"key":"9382_CR3","unstructured":"Erhardt K, Pentland A (2021) Disambiguating disinformation: extending beyond the veracity of online content. In: Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media"},{"key":"9382_CR2","unstructured":"Facebook (2021) Threat report the state of influence operations 2017-2020. Facebook. https:\/\/web.archive.org\/web\/20221121175615\/https:\/\/about.fb.com\/wp-content\/uploads\/2021\/05\/IO-Threat-Report-May-20-2021.pdf Accessed 22 Nov 2022"},{"issue":"3","key":"9382_CR5","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1017\/S0003055417000144","volume":"111","author":"G King","year":"2017","unstructured":"King G, Pan J, Roberts ME (2017) How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. Am Political Sci Rev 111(3):484\u2013501","journal-title":"Am Political Sci Rev"},{"key":"9382_CR9","doi-asserted-by":"crossref","unstructured":"Luceri L, Giordano S, Ferrara E (2020) Detecting troll behavior via inverse reinforcement learning: A case study of russian trolls in the 2016 us election. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 14, pp. 417\u2013427","DOI":"10.1609\/icwsm.v14i1.7311"},{"key":"9382_CR10","unstructured":"Magelinski T, Carley KM (2020) Detecting coordinated behavior in the twitter campaign to reopen America. In: Center for Informed Democracy & Social-Cybersecurity Annual Conference, IDeaS"},{"issue":"2","key":"9382_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MSP.2011.942737","volume":"29","author":"W Pan","year":"2012","unstructured":"Pan W, Dong W, Cebrian M, Kim T, Fowler JH, Pentland A (2012) Modeling dynamical influence in human interaction: using data to make better inferences about influence within social systems. IEEE Signal Processing Mag 29(2):77\u201386","journal-title":"IEEE Signal Processing Mag"},{"key":"9382_CR16","unstructured":"Pompeo M (2021) Determination of the secretary of state on atrocities in Xinjiang. U.S. Department of State. https:\/\/web.archive.org\/web\/20221121175851\/https:\/\/2017-2021.state.gov\/determination-of-the-secretary-of-state-on-atrocities-in-xinjiang\/index.html Accessed 22 Nov 2022"},{"issue":"3","key":"9382_CR7","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1080\/19331681.2021.1879705","volume":"18","author":"L Rheault","year":"2021","unstructured":"Rheault L, Musulan A (2021) Efficient detection of online communities and social bot activity during electoral campaigns. J Inf Technol Politics 18(3):324\u2013337","journal-title":"J Inf Technol Politics"},{"key":"9382_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359229","volume":"3","author":"K Starbird","year":"2019","unstructured":"Starbird K, Arif A, Wilson T (2019) Disinformation as collaborative work: surfacing the participatory nature of strategic information operations. Proc ACM Hum Comput Interact 3:1\u201326","journal-title":"Proc ACM Hum Comput Interact"},{"key":"9382_CR1","unstructured":"Twitter (2022) Transparency report: information operations. Twitter. https:\/\/web.archive.org\/web\/20221118021353\/https:\/\/transparency.twitter.com\/en\/reports\/moderation-research.html Accessed 22 Nov 2022"},{"key":"9382_CR8","doi-asserted-by":"crossref","unstructured":"Vargas L, Emami P, Traynor P (2020) On the detection of disinformation campaign activity with network analysis. In: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 133\u2013146","DOI":"10.1145\/3411495.3421363"},{"key":"9382_CR17","unstructured":"Wang S, Shen C, Badea A, Priebe CE, Vogelstein JT (2018) Signal subgraph estimation via vertex screening. arXiv preprint arXiv:1801.07683"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-023-09382-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10588-023-09382-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-023-09382-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T07:09:35Z","timestamp":1715756975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10588-023-09382-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["9382"],"URL":"https:\/\/doi.org\/10.1007\/s10588-023-09382-7","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"3 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}