{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T07:09:16Z","timestamp":1773385756106,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s41109-019-0164-x","type":"journal-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T09:02:55Z","timestamp":1564650175000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Bot stamina: examining the influence and staying power of bots in online social networks"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0070-6030","authenticated-orcid":false,"given":"Ross","family":"Schuchard","sequence":"first","affiliation":[]},{"given":"Andrew T.","family":"Crooks","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Stefanidis","sequence":"additional","affiliation":[]},{"given":"Arie","family":"Croitoru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"key":"164_CR1","first-page":"839","volume-title":"Proc. of 18th ACM CSCW 2015","author":"N Abokhodair","year":"2015","unstructured":"Abokhodair N, Yoo D, McDonald DW (2015) Dissecting a social botnet: growth, content and influence in twitter. In: Proc. of 18th ACM CSCW 2015, pp 839\u2013851"},{"key":"164_CR2","first-page":"10","volume-title":"Proc. of the 6th AAAI international Conf. On weblogs and social media","author":"LM Aiello","year":"2014","unstructured":"Aiello LM, Deplano M, Schifanella R, Ruffo G (2014) People are strange when you\u2019re a stranger: impact and influence of bots on social networks. In: Proc. of the 6th AAAI international Conf. On weblogs and social media. AAAI, Dublin, pp 10\u201317"},{"key":"164_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MIC.2016.115","volume":"20","author":"M Avvenuti","year":"2016","unstructured":"Avvenuti M, Cresci S, Marchetti A et al (2016a) Predictability or early warning: using social media in modern emergency response. IEEE Internet Comput 20:4\u20136","journal-title":"IEEE Internet Comput"},{"key":"164_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2016.134","volume":"49","author":"M Avvenuti","year":"2016","unstructured":"Avvenuti M, Cresci S, Vigna FD, Tesconi M (2016b) Impromptu crisis mapping to prioritize emergency response. Computer 49:28\u201337","journal-title":"Computer"},{"key":"164_CR5","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1935826.1935845","volume-title":"Proc of the Fourth ACM International Conf on Web Search and Data Mining","author":"E Bakshy","year":"2011","unstructured":"Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone\u2019s an influencer: quantifying influence on twitter. In: Proc of the Fourth ACM International Conf on Web Search and Data Mining. ACM, New York, pp 65\u201374"},{"key":"164_CR6","unstructured":"Beskow DM, Carley KM (2018, 2018) Bot-hunter: a tiered approach to Detecting & Characterizing Automated Activity on twitter. SBP-BRiMS 2018. Intl. Conf. on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation"},{"key":"164_CR7","doi-asserted-by":"crossref","unstructured":"Bessi A, Ferrara E (2016) Social bots distort the 2016 U.S. presidential election online discussion. First Monday 21(11)","DOI":"10.5210\/fm.v21i11.7090"},{"key":"164_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.paid.2017.04.039","volume":"116","author":"D Blackwell","year":"2017","unstructured":"Blackwell D, Leaman C, Tramposch R et al (2017) Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction. Personal Individ Differ 116:69\u201372","journal-title":"Personal Individ Differ"},{"key":"164_CR9","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.socnet.2007.04.002","volume":"29","author":"P Bonacich","year":"2007","unstructured":"Bonacich P (2007) Some unique properties of eigenvector centrality. Soc Networks 29:555\u2013564","journal-title":"Soc Networks"},{"key":"164_CR10","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.comnet.2012.06.006","volume":"57","author":"Y Boshmaf","year":"2013","unstructured":"Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M (2013) Design and analysis of a social botnet. Comput Netw 57:556\u2013578","journal-title":"Comput Netw"},{"key":"164_CR11","first-page":"1","volume-title":"Proceedings of the 2010 43rd Hawaii international conference on system sciences","author":"D Boyd","year":"2010","unstructured":"Boyd D, Golder S, Lotan G (2010) Tweet, tweet, retweet: conversational aspects of retweeting on twitter. In: Proceedings of the 2010 43rd Hawaii international conference on system sciences. IEEE Computer Society, Washington, pp 1\u201310"},{"key":"164_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. Comput Netw ISDN Syst 30:107\u2013117","journal-title":"Comput Netw ISDN Syst"},{"key":"164_CR13","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.2105\/AJPH.2018.304567","volume":"108","author":"DA Broniatowski","year":"2018","unstructured":"Broniatowski DA, Jamison AM, Qi S et al (2018) Weaponized health communication: twitter bots and Russian trolls amplify the vaccine debate. Am J Public Health 108:1378\u20131384","journal-title":"Am J Public Health"},{"key":"164_CR14","first-page":"10","volume-title":"Proceedings of the fourth international AAAI conference on weblogs and social media (ICWSM 2010)","author":"M Cha","year":"2010","unstructured":"Cha M, Haddadi H, Benevenuto F, Gummadi KP (2010) Measuring user influence in twitter : the million follower fallacy. In: Proceedings of the fourth international AAAI conference on weblogs and social media (ICWSM 2010). AAAI Press, Washington, DC, pp 10\u201317"},{"key":"164_CR15","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1109\/ICDM.2016.0096","volume-title":"2016 IEEE 16th International Conference on Data Mining (ICDM)","author":"N Chavoshi","year":"2016","unstructured":"Chavoshi N, Hamooni H, Mueen A (2016) DeBot: twitter bot detection via warped correlation. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp 817\u2013822"},{"key":"164_CR16","first-page":"1601","volume-title":"Proc. of 26th International Conf. on WWW","author":"N Chavoshi","year":"2017","unstructured":"Chavoshi N, Hamooni H, Mueen A (2017) Temporal patterns in bot activities. In: Proc. of 26th International Conf. on WWW, pp 1601\u20131606"},{"key":"164_CR17","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/ASONAM.2018.8508279","volume-title":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) IEEE","author":"N Chavoshi","year":"2018","unstructured":"Chavoshi N, Mueen A (2018) Model bots, not humans on social media. In: 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) IEEE, pp 178\u2013185"},{"key":"164_CR18","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9:811\u2013824","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"164_CR19","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s42001-017-0005-6","volume":"1","author":"GL Ciampaglia","year":"2018","unstructured":"Ciampaglia GL (2018) Fighting fake news: a role for computational social science in the fight against digital misinformation. J Comput Soc Sc 1:147\u2013153","journal-title":"J Comput Soc Sc"},{"key":"164_CR20","first-page":"10","volume-title":"Fifth international AAAI conference on weblogs and social media","author":"MD Conover","year":"2011","unstructured":"Conover MD, Ratkiewicz J, Francisco M et al (2011) Political polarization on twitter. In: Fifth international AAAI conference on weblogs and social media, pp 10\u201317"},{"key":"164_CR21","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1145\/3041021.3055135","volume-title":"Proceedings of the 26th international conference on world wide web companion","author":"S Cresci","year":"2017","unstructured":"Cresci S, Di Pietro R, Petrocchi M et al (2017) The paradigm-shift of social Spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th international conference on world wide web companion. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, pp 963\u2013972"},{"key":"164_CR22","first-page":"580","volume-title":"Twelfth international AAAI conference on web and social media","author":"S Cresci","year":"2018","unstructured":"Cresci S, Lillo F, Regoli D et al (2018a) $ FAKE: evidence of spam and bot activity in stock microblogs on twitter. In: Twelfth international AAAI conference on web and social media, pp 580\u2013583"},{"key":"164_CR23","doi-asserted-by":"publisher","first-page":"11:1","DOI":"10.1145\/3313184","volume":"13","author":"S Cresci","year":"2019","unstructured":"Cresci S, Lillo F, Regoli D et al (2019a) Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on twitter. ACM Trans Web 13:11:1\u201311:27","journal-title":"ACM Trans Web"},{"key":"164_CR24","first-page":"1469","volume-title":"WWW (Companion Volume)","author":"S Cresci","year":"2018","unstructured":"Cresci S, Petrocchi M, Spognardi A, Tognazzi S (2018b) From reaction to Proaction: unexplored ways to the detection of evolving Spambots. In: WWW (Companion Volume), pp 1469\u20131470"},{"key":"164_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.osnem.2018.10.005","volume":"9","author":"S Cresci","year":"2019","unstructured":"Cresci S, Petrocchi M, Spognardi A, Tognazzi S (2019b) On the capability of evolved spambots to evade detection via genetic engineering. Online Soc Netw Media 9:1\u201316","journal-title":"Online Soc Netw Media"},{"key":"164_CR26","doi-asserted-by":"crossref","unstructured":"Cresci S, Petrocchi M, Spognardi A, Tognazzi S (2019c) Better safe than sorry: an adversarial approach to improve social bot detection. In WebSci '19: Proc. of the 11th ACM Conference on Web Scienc. ACM, New York, pp 47-56","DOI":"10.1145\/3292522.3326030"},{"key":"164_CR27","first-page":"561","volume":"15","author":"S Cresci","year":"2018","unstructured":"Cresci S, Pietro RD, Petrocchi M et al (2018c) Social fingerprinting: detection of Spambot groups through DNA-inspired behavioral modeling. IEEE Trans Dependable Secure Comp 15:561\u2013576","journal-title":"IEEE Trans Dependable Secure Comp"},{"key":"164_CR28","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1111\/j.1467-9671.2012.01359.x","volume":"17","author":"A Crooks","year":"2013","unstructured":"Crooks A, Croitoru A, Stefanidis A, Radzikowski J (2013) #earthquake: twitter as a distributed sensor system. Trans GIS 17:124\u2013147","journal-title":"Trans GIS"},{"key":"164_CR29","unstructured":"Davis CA, Varol O, Ferrara E et al (2016) In WWW '16 Companion: Proc. of the 25th Intl. Conf. Companion on World Wide Web, IW3C2, Geneva, pp 273\u2013274"},{"key":"164_CR30","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1089\/big.2017.0041","volume":"6","author":"A Duh","year":"2018","unstructured":"Duh A, Slak Rupnik M, Koro\u0161ak D (2018) Collective behavior of social bots is encoded in their temporal twitter activity. Big Data 6:113\u2013123","journal-title":"Big Data"},{"issue":"18","key":"164_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.07.030","volume":"4","author":"E Ferrara","year":"2017","unstructured":"Ferrara E (2017) Contagion dynamics of extremist propaganda in social networks. Inf Sci 4(18):1\u201312","journal-title":"Inf Sci"},{"key":"164_CR32","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara E, Varol O, Davis C et al (2016) The rise of social bots. Commun ACM 59:96\u2013104","journal-title":"Commun ACM"},{"key":"164_CR33","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman LC (1977) A set of measures of centrality based on Betweenness. Sociometry 40:35\u201341","journal-title":"Sociometry"},{"key":"164_CR34","first-page":"37","volume":"12","author":"C Fuchs","year":"2005","unstructured":"Fuchs C (2005) The internet as a self-organizing socio-technological system. Cybernetics Human Knowing 12:37\u201381","journal-title":"Cybernetics Human Knowing"},{"key":"164_CR35","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1126\/science.aau2706","volume":"363","author":"N Grinberg","year":"2019","unstructured":"Grinberg N, Joseph K, Friedland L et al (2019) Fake news on twitter during the 2016 U.S. presidential election. Science 363:374\u2013378","journal-title":"Science"},{"key":"164_CR36","unstructured":"Hagberg A, Schult D, Swart P (2008) Exploring network structure, dynamics, and function using NetworkX. In SciPy2008: Proc. of the 7th Python in science conference, pp 11\u201315"},{"key":"164_CR37","doi-asserted-by":"crossref","unstructured":"Hecking T, Steinert L, Masias VH, Ulrich Hoppe H (2018) Relational patterns in cross-media information diffusion networks. In: Cherifi C, Cherifi H, Karsai M, Musolesi M (eds) Complex Networks & Their Applications VI. Springer International Publishing, Cham, pp 1002\u20131014","DOI":"10.1007\/978-3-319-72150-7_81"},{"key":"164_CR38","unstructured":"Hegelich S, Janetzko D (2016) Are Social Bots on Twitter Political Actors? Empirical Evidence from a Ukrainian Social Botnet. In: Proc. Of the 10th Intl. Conf. on Web and Social Media (ICWSM), ICWSM, pp 579\u2013582"},{"key":"164_CR39","doi-asserted-by":"publisher","unstructured":"Howard PN, Kollanyi B (2016) Bots, #StrongerIn, and #Brexit: computational propaganda during the UK-EU referendum. SSRN, https:\/\/doi.org\/10.2139\/ssrn.2798311","DOI":"10.2139\/ssrn.2798311"},{"key":"164_CR40","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1080\/19331681.2018.1448735","volume":"15","author":"PN Howard","year":"2018","unstructured":"Howard PN, Woolley S, Calo R (2018) Algorithms, bots, and political communication in the US 2016 election: the challenge of automated political communication for election law and administration. J Inform Tech Polit 15:81\u201393","journal-title":"J Inform Tech Polit"},{"key":"164_CR41","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1145\/1772690.1772751","volume-title":"Proceedings of the 19th international conference on world wide web","author":"H Kwak","year":"2010","unstructured":"Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on world wide web. ACM, New York, pp 591\u2013600"},{"key":"164_CR42","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"DMJ Lazer","year":"2018","unstructured":"Lazer DMJ, Baum MA, Benkler Y et al (2018) The science of fake news. Science 359:1094\u20131096","journal-title":"Science"},{"key":"164_CR43","doi-asserted-by":"crossref","unstructured":"Mazza M, Cresci S, Avvenuti M et al (2019) RTbust: exploiting temporal patterns for botnet detection on twitter. In WebSci '19: Proc. of the 11th ACM Conference on Web Science. ACM, New York, pp 183\u2013192","DOI":"10.1145\/3292522.3326015"},{"key":"164_CR44","unstructured":"Mitchell A (2018) Americans still prefer watching to Reading the news - and mostly still through television. Pew Research Center, Washington, D.C."},{"key":"164_CR45","doi-asserted-by":"publisher","first-page":"e0184148","DOI":"10.1371\/journal.pone.0184148","volume":"12","author":"B M\u00f8nsted","year":"2017","unstructured":"M\u00f8nsted B, Sapie\u017cy\u0144ski P, Ferrara E, Lehmann S (2017) Evidence of complex contagion of information in social media: an experiment using twitter bots. PLoS One 12:e0184148","journal-title":"PLoS One"},{"key":"164_CR46","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/ASONAM.2016.7752287","volume-title":"2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","author":"F Morstatter","year":"2016","unstructured":"Morstatter F, Wu L, Nazer TH et al (2016) A new approach to bot detection: striking the balance between precision and recall. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 533\u2013540"},{"key":"164_CR47","first-page":"20","volume":"10","author":"D Murthy","year":"2016","unstructured":"Murthy D, Powell AB, Tinati R et al (2016) Automation, algorithms, and politics| bots and political influence: a sociotechnical investigation of social network capital. Int J Commun 10:20","journal-title":"Int J Commun"},{"key":"164_CR48","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/3209542.3209563","volume-title":"Proceedings of the 29th on hypertext and social media","author":"D Perna","year":"2018","unstructured":"Perna D, Tagarelli A (2018) Learning to rank social bots. In: Proceedings of the 29th on hypertext and social media. ACM, New York, pp 183\u2013191"},{"issue":"1","key":"164_CR49","doi-asserted-by":"publisher","first-page":"e53095","DOI":"10.1371\/journal.pone.0053095","volume":"8","author":"M Piraveenan","year":"2013","unstructured":"Piraveenan M, Prokopenko M, Hossain L (2013) Percolation centrality: quantifying graph-theoretic impact of nodes during percolation in networks. PLoS One 8(1):e53095","journal-title":"PLoS One"},{"key":"164_CR50","doi-asserted-by":"publisher","first-page":"13006","DOI":"10.1038\/s41598-017-12961-9","volume":"7","author":"AG Reece","year":"2017","unstructured":"Reece AG, Reagan AJ, Lix KLM et al (2017) Forecasting the onset and course of mental illness with twitter data. Sci Rep 7:13006","journal-title":"Sci Rep"},{"key":"164_CR51","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.ipm.2016.04.003","volume":"52","author":"F Riquelme","year":"2016","unstructured":"Riquelme F, Gonz\u00e1lez-Cantergiani P (2016) Measuring user influence on twitter: a survey. Inf Process Manag 52:949\u2013975","journal-title":"Inf Process Manag"},{"key":"164_CR52","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1126\/science.346.6213.1063","volume":"346","author":"D Ruths","year":"2014","unstructured":"Ruths D, Pfeffer J (2014) Social media for large studies of behavior. Science 346:1063\u20131064","journal-title":"Science"},{"key":"164_CR53","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TKDE.2012.29","volume":"25","author":"T Sakaki","year":"2013","unstructured":"Sakaki T, Okazaki M, Matsuo Y (2013) Tweet analysis for real-time event detection and earthquake reporting system development. IEEE Trans Knowl Data Eng 25:919\u2013931","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"164_CR54","first-page":"424","volume-title":"Studies in Computational Intelligence","author":"Ross Schuchard","year":"2018","unstructured":"Schuchard R, Crooks A, Stefanidis A, Croitoru A (2019) Bots in nets: empirical comparative analysis of bot evidence in social networks. In: Aiello LM, Cherifi C, Cherifi H et al (eds) Complex networks and their applications VII. Springer International Publishing, Cham, pp 424\u2013436"},{"key":"164_CR55","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao C, Ciampaglia GL, Varol O et al (2018) The spread of low-credibility content by social bots. Nat Commun 9:4787","journal-title":"Nat Commun"},{"key":"164_CR56","doi-asserted-by":"publisher","first-page":"12435","DOI":"10.1073\/pnas.1803470115","volume":"115","author":"M Stella","year":"2018","unstructured":"Stella M, Ferrara E, Domenico MD (2018) Bots increase exposure to negative and inflammatory content in online social systems. PNAS 115:12435\u201312440","journal-title":"PNAS"},{"key":"164_CR57","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MIS.2014.80","volume":"29","author":"M Strohmaier","year":"2014","unstructured":"Strohmaier M, Wagner C (2014) Computational social science for the world wide web. IEEE Intell Syst 29:84\u201388","journal-title":"IEEE Intell Syst"},{"key":"164_CR58","first-page":"269","volume-title":"Lecture Notes in Computer Science","author":"Pablo Su\u00e1rez-Serrato","year":"2016","unstructured":"Su\u00e1rez-Serrato P, Roberts ME, Davis C, Menczer F (2016) On the influence of social bots in online protests. In: Spiro E, Ahn Y-Y (eds) Social informatics. Springer International Publishing, Berlin, pp 269\u2013278"},{"key":"164_CR59","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2016.183","volume":"49","author":"VS Subrahmanian","year":"2016","unstructured":"Subrahmanian VS, Azaria A, Durst S et al (2016) The DARPA twitter bot challenge. Computer 49:38\u201346","journal-title":"Computer"},{"key":"164_CR60","doi-asserted-by":"crossref","unstructured":"Sunstein CR (2018) #republic: divided democracy in the age of social media. Princeton University Press, Princeton, NJ","DOI":"10.2307\/j.ctv8xnhtd"},{"key":"164_CR61","doi-asserted-by":"crossref","unstructured":"Tufekci Z (2014) Big questions for social media big data: representativeness, validity and other methodological pitfalls. In ICWSM \u201914: Proc. of the 8th Intl. AAAI Conference on Weblogs and Social Media. AAAI, Palo Alto, pp 505\u2013514.","DOI":"10.1609\/icwsm.v8i1.14517"},{"key":"164_CR62","first-page":"280","volume-title":"Proc. of the 11th international AAAI Conf. On web and social media","author":"O Varol","year":"2017","unstructured":"Varol O, Ferrara E, Davis CA et al (2017) Online human-bot interactions: detection, estimation, and characterization. In: Proc. of the 11th international AAAI Conf. On web and social media. AAAI, Montr\u00e9al, pp 280\u2013289"},{"key":"164_CR63","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi S, Roy D, Aral S (2018) The spread of true and false news online. Science 359:1146\u20131151","journal-title":"Science"},{"key":"164_CR64","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications, 1st edn. Cambridge University Press, Cambridge","edition":"1"},{"key":"164_CR65","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1145\/1718487.1718520","volume-title":"Proceedings of the Third ACM International Conference on Web Search and Data Mining","author":"J Weng","year":"2010","unstructured":"Weng J, Lim E-P, Jiang J, He Q (2010) TwitterRank: finding topic-sensitive influential Twitterers. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining. ACM, New York, pp 261\u2013270"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0164-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41109-019-0164-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0164-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T19:14:44Z","timestamp":1695064484000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-019-0164-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,1]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["164"],"URL":"https:\/\/doi.org\/10.1007\/s41109-019-0164-x","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,1]]},"assertion":[{"value":"28 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"55"}}