{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:27Z","timestamp":1778605827147,"version":"3.51.4"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T00:00:00Z","timestamp":1776384000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100024370","name":"Governo Italiano Ministero dell'Istruzione dell'Universita e della Ricerca","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100024370","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111191","type":"journal-article","created":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:28:37Z","timestamp":1776781717000},"page":"111191","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Evaluating the acceptance of users\u2019 reactions to prevent the escalation of information disorder"],"prefix":"10.1016","volume":"135","author":[{"given":"Gennaro Junior","family":"Pezzullo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5042-3384","authenticated-orcid":false,"given":"Salvatore","family":"Venticinque","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-8148","authenticated-orcid":false,"given":"Alba","family":"Amato","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7613-1312","authenticated-orcid":false,"given":"Beniamino","family":"Di Martino","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.compeleceng.2026.111191_b1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/s13278-023-01028-5","article-title":"Fake news, disinformation and misinformation in social media: a review","volume":"13","author":"A\u00efmeur","year":"2023","journal-title":"Soc Netw Anal Min"},{"key":"10.1016\/j.compeleceng.2026.111191_b2","series-title":"Information disorder:?Toward an interdisciplinary framework for research and policy making","author":"Wardle","year":"2017"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111191_b3","first-page":"1","article-title":"Linguistic drivers of misinformation diffusion on social media during a health crisis: The COVID-19 infodemic","volume":"6","author":"Di Domenico","year":"2021","journal-title":"Appl Netw Sci"},{"key":"10.1016\/j.compeleceng.2026.111191_b4","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.ins.2019.05.035","article-title":"A survey on fake news and rumour detection techniques","volume":"497","author":"Bondielli","year":"2019","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111191_b5","first-page":"315","article-title":"Modeling and measuring expressed (dis) belief in (mis) information","volume":"vol. 14","author":"Jiang","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111191_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102300","article-title":"Emotion detection for misinformation: A review","volume":"107","author":"Liu","year":"2024","journal-title":"Inf Fusion"},{"key":"10.1016\/j.compeleceng.2026.111191_b7","series-title":"International conference on emerging internet, data & web technologies","first-page":"607","article-title":"Support for automated story telling using natural language processing techniques aimed at recognizing narrative elements","author":"Di Martino","year":"2024"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111191_b8","first-page":"51009","article-title":"Fake news detection","volume":"83","author":"Ahmed","year":"2024","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111191_b9","doi-asserted-by":"crossref","first-page":"49","DOI":"10.3390\/data7040049","article-title":"The missing case of disinformation from the cybersecurity risk framework","volume":"7","author":"Various","year":"2022","journal-title":"Data"},{"key":"10.1016\/j.compeleceng.2026.111191_b10","article-title":"Disinformation is a cybersecurity threat","author":"Jaiman","year":"2021","journal-title":"Medium"},{"key":"10.1016\/j.compeleceng.2026.111191_b11","series-title":"DISINFOX: an open-source threat exchange platform serving intelligence on disinformation and influence operations","author":"Gonz\u00e1lez","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111191_b12","series-title":"Companion proceedings of the 2019 world wide web conference","isbn-type":"print","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1145\/3308560.3316742","article-title":"Misinfosec","author":"Walker","year":"2019","ISBN":"https:\/\/id.crossref.org\/isbn\/9781450366755"},{"key":"10.1016\/j.compeleceng.2026.111191_b13","unstructured":"Syed Z, Padia A, Mathews ML, Finin T, Joshi A, et al. UCO: A unified cybersecurity ontology. In: Proceedings of the AAAI workshop on artificial intelligence for cyber security. 2016, p. 195\u2013202."},{"key":"10.1016\/j.compeleceng.2026.111191_b14","series-title":"Elevating cyber threat intelligence against disinformation campaigns with LLM-based concept extraction and the FakeCTI dataset","author":"Cotroneo","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111191_b15","series-title":"Toward interoperable representation and sharing of disinformation incidents in cyber threat intelligence","author":"Gonz\u00e1lez","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111191_b16","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.compeleceng.2017.05.020","article-title":"Fake profile detection techniques in large-scale online social networks: A comprehensive review","volume":"65","author":"Ramalingam","year":"2018","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111191_b17","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.compeleceng.2019.03.003","article-title":"Hybrid approach for detection of malicious profiles in twitter","volume":"76","author":"Sahoo","year":"2019","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111191_b18","series-title":"A sensitivity analysis of (and practitioners\u2019 guide to) convolutional neural networks for sentence classification","author":"Zhang","year":"2018"},{"issue":"6380","key":"10.1016\/j.compeleceng.2026.111191_b19","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1126\/science.aap9559","article-title":"The spread of true and false news online","volume":"359","author":"Vosoughi","year":"2018","journal-title":"Science"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111191_b20","doi-asserted-by":"crossref","DOI":"10.2196\/32378","article-title":"Charting the information and misinformation landscape to characterize misinfodemics on social media: COVID-19 infodemiology study at a planetary scale","volume":"2","author":"Chen","year":"2022","journal-title":"JMIR Infodemiology"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.111191_b21","doi-asserted-by":"crossref","first-page":"pgae396","DOI":"10.1093\/pnasnexus\/pgae396","article-title":"Measuring receptivity to misinformation at scale on a social media platform","volume":"3","author":"Tokita","year":"2024","journal-title":"PNAS Nexus"},{"key":"10.1016\/j.compeleceng.2026.111191_b22","article-title":"One year of COVID-19 vaccine misinformation on Twitter: Longitudinal study","volume":"25","author":"Pierri","year":"2023","journal-title":"JMIR Public Health Surveill"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111191_b23","article-title":"Understanding how and by whom COVID-19 misinformation is spread on social media: Coding and network analyses","volume":"24","author":"Deng","year":"2022","journal-title":"J Med Internet Res"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111191_b24","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1073\/pnas.1517441113","article-title":"The spreading of misinformation online","volume":"113","author":"Del Vicario","year":"2016","journal-title":"Proc Natl Acad Sci"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111191_b25","first-page":"1","article-title":"Anatomy of an online misinformation network","volume":"23","author":"Shao","year":"2018","journal-title":"First Monday"},{"key":"10.1016\/j.compeleceng.2026.111191_b26","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s41109-024-00610-w","article-title":"Modeling disinformation networks on Twitter: structure, behavior, and impact","volume":"9","author":"AuthorList","year":"2024","journal-title":"Appl Netw Sci"},{"key":"10.1016\/j.compeleceng.2026.111191_b27","series-title":"Identifying different writing styles in a document intrinsically using stylometric analysis","author":"Elahi","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.111191_b28","doi-asserted-by":"crossref","first-page":"3999","DOI":"10.47191\/ijmcr\/v12i2.01","article-title":"Clustering fake news with K-means and agglomerative clustering based on Word2Vec","volume":"12","author":"Tianda","year":"2024","journal-title":"Int J Math Comput Res"},{"key":"10.1016\/j.compeleceng.2026.111191_b29","series-title":"PHEME dataset for Rumour Detection and Veracity Classification","author":"Kochkina","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.111191_b30","series-title":"International conference on advanced information networking and applications","first-page":"417","article-title":"NLP-Driven analysis of users\u2019 reaction for estimation of information disorder propagation","author":"Pezzullo","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111191_b31","first-page":"1343","article-title":"GreenCharge simulation tool","volume":"1150 AISC","author":"Aversa","year":"2020","journal-title":"Adv Intell Syst Comput"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111191_b32","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/3137597.3137600","article-title":"Fake news detection on social media: A data mining perspective","volume":"19","author":"Shu","year":"2017","journal-title":"ACM SIGKDD Explor Newsl"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111191_b33","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1002\/acp.3068","article-title":"Auditory pareidolia: Effects of contextual priming on perceptions of purportedly paranormal and ambiguous auditory stimuli","volume":"29","author":"Nees","year":"2015","journal-title":"Appl Cogn Psychol"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111191_b34","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1038\/s41562-020-0833-x","article-title":"Exposure to untrustworthy websites in the 2016 US election","volume":"4","author":"Guess","year":"2020","journal-title":"Nat Hum Behav"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111191_b35","first-page":"17757","article-title":"The echo chamber effect on social media","volume":"117","author":"Cinelli","year":"2020","journal-title":"Proc Natl Acad Sci"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111191_b36","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/2818717","article-title":"The rise of social bots","volume":"59","author":"Ferrara","year":"2016","journal-title":"Commun ACM"},{"issue":"6380","key":"10.1016\/j.compeleceng.2026.111191_b37","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1126\/science.aao2998","article-title":"The science of fake news","volume":"359","author":"Lazer","year":"2018","journal-title":"Science"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111191_b38","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1073\/pnas.1517441113","article-title":"Spreading of misinformation online","volume":"113","author":"Del Vicario","year":"2016","journal-title":"Proc Natl Acad Sci"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002636?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002636?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:30:27Z","timestamp":1778603427000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":38,"alternative-id":["S0045790626002636"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111191","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evaluating the acceptance of users\u2019 reactions to prevent the escalation of information disorder","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111191","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"111191"}}