{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:14:33Z","timestamp":1775258073702,"version":"3.50.1"},"reference-count":59,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508646","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T19:19:29Z","timestamp":1540495169000},"page":"258-265","source":"Crossref","is-referenced-by-count":216,"title":["Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign"],"prefix":"10.1109","author":[{"given":"Adam","family":"Badawy","sequence":"first","affiliation":[]},{"given":"Emilio","family":"Ferrara","sequence":"additional","affiliation":[]},{"given":"Kristina","family":"Lerman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"mele","year":"2017","journal-title":"Combating fake news An agenda for research and action"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2011.592648"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1038\/srep00197","article-title":"The dynamics of protest recruitment through an online network","volume":"1","author":"gonz\u00e1lez-bail\u00f3n","year":"2011","journal-title":"Scientific Reports"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/0002764213479371"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/13689880600950527"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1145\/2808797.2809292","article-title":"Reverse engineering socialbot infiltration strategies in twitter","author":"freitas","year":"2015","journal-title":"ASONAM"},{"key":"ref37","author":"kollanyi","year":"2016","journal-title":"Bots and automation over twitter during the first us presidential debate"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2090150.2090161"},{"key":"ref35","author":"howard","year":"2006","journal-title":"New media campaigns and the managed citizen"},{"key":"ref34","article-title":"Selective exposure to misinformation: Evidence from the consumption of fake news during the 2016 u.s. presidential campaign","author":"guess","year":"2018","journal-title":"Tech Rep"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref27","article-title":"Disinformation and social bot operations in the run up to the 2017 french presidential election","volume":"22","author":"ferrara","year":"2017","journal-title":"First Monday"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133147"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.036"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134277"},{"key":"ref20","first-page":"1","article-title":"The igraph software package for complex network research","volume":"1695","author":"csardi","year":"2006","journal-title":"InterJournal Complex Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753504"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/2872518.2889302","article-title":"Botornot: A system to evaluate social bots","author":"davis","year":"2016","journal-title":"Proc International World Wide Web Conference"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/978-3-642-23333-3_3","article-title":"Social media and political participation: are facebook, twitter and youtube democratizing our political systems?","author":"effing","year":"2011","journal-title":"Electronic Participation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0079449"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.782330"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v18i3.4620","article-title":"Social media as a government propaganda tool in post-revolutionary egypt","volume":"18","author":"el-khalili","year":"2013","journal-title":"First Monday"},{"key":"ref50","author":"shao","year":"2017","journal-title":"The spread of fake news by social bots"},{"key":"ref51","first-page":"28","article-title":"The political power of social media: Technology, the public sphere, and political change","author":"shirky","year":"2011","journal-title":"Foreign Affairs"},{"key":"ref59","author":"zannettou","year":"2018","journal-title":"Disinformation warfare Understanding state-sponsored trolls on twitter and their influence on the web"},{"key":"ref58","article-title":"Automation, algorithms, and politics: Introduction","volume":"10","author":"woolley","year":"2016","journal-title":"Int J Commun"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2615569.2615699"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1609\/icwsm.v11i1.14871","article-title":"Online human-bot interactions: Detection, estimation, and characterization","author":"varol","year":"2017","journal-title":"ICWSM"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2012.01629.x"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14517","article-title":"Big questions for social media big data: Representativeness, validity and other methodological pitfalls","author":"tufekci","year":"2014","journal-title":"ICWSM"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"ref52","article-title":"Automation, algorithms, and politics: A research review","volume":"10","author":"shorey","year":"2016","journal-title":"Int J Commun"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1038\/nature11421","article-title":"A 61-milllon-person experiment in social influence and political mobilization","volume":"489","author":"bond","year":"2012","journal-title":"Nature"},{"key":"ref11","article-title":"The use of twitter hashtags in the formation of ad hoc publics","author":"bruns","year":"2011","journal-title":"Proceedings of the 6th ECPR General Conference"},{"key":"ref40","article-title":"You followed my bot! transforming robots into influential users in twitter","volume":"18","author":"messias","year":"2013","journal-title":"First Monday"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2014.01.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/1065912913482758"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1126\/science.1185231","article-title":"The spread of behavior in an online social network experiment","volume":"329","author":"centola","year":"2010","journal-title":"Science"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1126\/science.1207055","article-title":"An experimental study of homophily in the adoption of health behavior","volume":"334","author":"centola","year":"2011","journal-title":"Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.34"},{"key":"ref17","first-page":"89","article-title":"Political polarization on twitter","volume":"133","author":"conover","year":"2011","journal-title":"ICWSM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0055957"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0064679"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1073\/pnas.0908800106","article-title":"Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks","volume":"106","author":"aral","year":"2009","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1126\/science.1215842","article-title":"Identifying influential and susceptible members of social networks","volume":"337","author":"aral","year":"2012","journal-title":"Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0894439313490405"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1126\/science.aaa1160","article-title":"Exposure to ideologically diverse news and opinion on facebook","volume":"348","author":"bakshy","year":"2015","journal-title":"Science"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819985"},{"key":"ref9","article-title":"Social bots distort the 2016 us presidential election online discussion","volume":"21","author":"bessi","year":"2016","journal-title":"First Monday"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.036106"},{"key":"ref45","author":"pennycook","year":"2017","journal-title":"Who falls for fake news? the roles of analytic thinking motivated reasoning political ideology and bullshit receptivity"},{"key":"ref48","first-page":"297","article-title":"Detecting and tracking political abuse in social media","volume":"11","author":"ratkiewicz","year":"2011","journal-title":"ICWSM"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0184148"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1126\/science.1230456","article-title":"Social media and the elections","volume":"338","author":"metaxas","year":"2012","journal-title":"Science"},{"key":"ref44","author":"pennycook","year":"0","journal-title":"Assessing the Effect of &#x201C;Disputed&#x201D; Warnings and Source Salience on Perceptions of Fake News Accuracy"},{"key":"ref43","first-page":"400","article-title":"Is the sample good enough? comparing data from twitter's streaming api with twitter's firehose","author":"morstatter","year":"0","journal-title":"ICWSM"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"Barcelona","start":{"date-parts":[[2018,8,28]]},"end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508646.pdf?arnumber=8508646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:51:38Z","timestamp":1775253098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508646","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}