{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:20:15Z","timestamp":1742937615181,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030456900"},{"type":"electronic","value":"9783030456917"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45691-7_16","type":"book-chapter","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T21:03:32Z","timestamp":1591563812000},"page":"170-180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Fact-Check Spreading Behavior in Twitter: A Qualitative Profile for False-Claim News"],"prefix":"10.1007","author":[{"given":"Francisco S.","family":"Marcondes","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Jo\u00e3o","family":"Almeida","sequence":"additional","affiliation":[]},{"given":"Dalila","family":"Dur\u00e3es","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Novais","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,8]]},"reference":[{"unstructured":"Aiello, L.M., Deplano, M., Schifanella, R., Ruffo, G.: People are strange when you\u2019re a stranger: impact and influence of bots on social networks. In: Sixth International AAAI Conference on Weblogs and Social Media (2012)","key":"16_CR1"},{"unstructured":"Bickmore, T.W., Picard, R.W.: Establishing and maintaining long-term human-computer relationships. ACM Trans. Comput.-Hum. Interact. 12, 293\u2013327 (2005)","key":"16_CR2"},{"doi-asserted-by":"crossref","unstructured":"Brooker, P.: My unexpectedly militant bots: a case for programming-as-social-science. Sociol. Rev. 67(6), 1228\u20131248 (2019)","key":"16_CR3","DOI":"10.1177\/0038026119840988"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., et al.: The rise of social bots. CACM 59, 7 (2016)","journal-title":"CACM"},{"doi-asserted-by":"crossref","unstructured":"Jingling, Z., Huiyun, Z., Baojiang, C.: Sentence similarity based on semantic vector model. In: Proceedings of the 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (Washington, DC, USA), 3PGCIC 2014, pp.\u00a0499\u2013503. IEEE Computer Society (2014)","key":"16_CR5","DOI":"10.1109\/3PGCIC.2014.101"},{"doi-asserted-by":"crossref","unstructured":"Lucas, G.M., Boberg, J., Traum, D., Artstein, R., Gratch, J., Gainer, A., Johnson, E., Leuski, A., Nakano, M.: Culture, errors, and rapport-building dialogue in social agents. In: Proceedings of the 18th International Conference on Intelligent Virtual Agents (New York, NY, USA), IVA 2018, pp.\u00a051\u201358. Association for Computing Machinery (2018)","key":"16_CR6","DOI":"10.1145\/3267851.3267887"},{"doi-asserted-by":"crossref","unstructured":"Luceri, L., Deb, A., Badawy, A., Ferrara, E.: Red bots do it better: comparative analysis of social bot partisan behavior. In: Companion Proceedings of the 2019 World Wide Web Conference, pp.\u00a01007\u20131012. ACM (2019)","key":"16_CR7","DOI":"10.1145\/3308560.3316735"},{"doi-asserted-by":"crossref","unstructured":"Marcondes, F.S., Almeida, J.J., Novais, P.: A short survey on chatbot technology: failure in raising the state of the art. In: International Symposium on Distributed Computing and Artificial Intelligence, pp.\u00a028\u201336. Springer, Heidelberg (2019)","key":"16_CR8","DOI":"10.1007\/978-3-030-23887-2_4"},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MRA.2012.2192811","volume":"19","author":"M Mori","year":"2012","unstructured":"Mori, M., MacDorman, K.F., Kageki, N.: The uncanny valley [from the field]. IEEE Robot. Autom. Mag. 19(2), 98\u2013100 (2012)","journal-title":"IEEE Robot. Autom. Mag."},{"doi-asserted-by":"crossref","unstructured":"Nass, C., Steuer, J., Tauber, E.R.: Computers are social actors. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.\u00a072\u201378. ACM (1994)","key":"16_CR10","DOI":"10.1145\/259963.260288"},{"issue":"1","key":"16_CR11","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Yang, K.-C., Flammini, A., Menczer, F.: The spread of low-credibility content by social bots. Nat. Commun. 9(1), 4787 (2018)","journal-title":"Nat. Commun."},{"doi-asserted-by":"crossref","unstructured":"Shao, C., Hui, P., Wang, L., Jiang, X., Flammini, A., Menczer, F., Ciampaglia, G.: Anatomy of an online misinformation network. PLoS One 13, e0196087 (2018)","key":"16_CR12","DOI":"10.1371\/journal.pone.0196087"},{"doi-asserted-by":"crossref","unstructured":"Vo, N., Lee, K.: The rise of guardians: fact-checking URL recommendation to combat fake news. In: The 41st International ACM SIGIR Conference on Research (New York, NY, USA), SIGIR 2018, vol. 38, pp.\u00a0275\u2013284. ACM (2018)","key":"16_CR13","DOI":"10.1145\/3209978.3210037"},{"issue":"6380","key":"16_CR14","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146\u20131151 (2018)","journal-title":"Science"},{"unstructured":"Waller, J.: Strategic Influence: Public Diplomacy, Counterpropaganda, and Political Warfare. Institute of World Politics Press (2009)","key":"16_CR15"},{"issue":"3","key":"16_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/3144592.3144598","volume":"47","author":"MJ Wolf","year":"2017","unstructured":"Wolf, M.J., Miller, K., Grodzinsky, F.S.: Why we should have seen that coming: comments on microsoft\u2019s tay \u201cexperiment,\u201d and wider implications. SIGCAS Comput. Soc. 47(3), 54\u201364 (2017)","journal-title":"SIGCAS Comput. Soc."},{"unstructured":"Woolley, S., Howard, P.: Computational Propaganda: Political Parties, Politicians, and Political Manipulation on Social Media. Oxford Studies in Digital Politics. Oxford University Press (2018)","key":"16_CR17"}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Innovations in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45691-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T21:10:20Z","timestamp":1591564220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45691-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030456900","9783030456917"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45691-7_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montenegro","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}