{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:29:37Z","timestamp":1729639777083,"version":"3.28.0"},"reference-count":77,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,10]]},"DOI":"10.1109\/bigdata50022.2020.9378279","type":"proceedings-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T21:10:21Z","timestamp":1616188221000},"page":"4318-4324","source":"Crossref","is-referenced-by-count":0,"title":["Understanding Online Information Operations: Development of an Influence Network for Scientific Inquiry Testing Environment (INSITE)"],"prefix":"10.1109","author":[{"given":"Courtney","family":"Crooks","sequence":"first","affiliation":[]},{"given":"Tom","family":"McNeil","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Sawyer","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Canham","sequence":"additional","affiliation":[]},{"given":"David","family":"Muchlinski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1080\/23736992.2018.1477047"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3928\/00485713-20090401-09"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1080\/08037060902727795"},{"key":"ref70","article-title":"Using social and behavioural science to support COVID-19 pandemic response","author":"van bavel","year":"2020","journal-title":"Nature Human Behavior"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701788165"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.96"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2017.03.024"},{"key":"ref39","first-page":"1","article-title":"The dark side of information proliferation","author":"hills","year":"2018","journal-title":"Perspectives on Psychological Science"},{"key":"ref75","first-page":"2","article-title":"A mixed methods empirical examination of changes in emphasis and style in the extremist magazines Dabiq and Rumiyah","volume":"11","author":"wignell","year":"2017","journal-title":"Perspectives on Terrorism"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/pls.2020.3"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0087"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.184"},{"article-title":"Cyber Swarming, Memetic Warfare and Viral Insurgency: How Domestic Militants Organize on Memes to Incite Violent Insurrection and Terror Against Government and Law Enforcement","year":"2020","author":"goldenberg","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/nws.2019.19"},{"key":"ref37","article-title":"The Next Wave: On the Hunt for Al Qaeda&#x2019;s American Recruits","author":"herridge","year":"2012","journal-title":"CRO Forum"},{"key":"ref36","article-title":"Edges of radicalization: Individuals, networks and ideas in violent extremism","author":"helfstein","year":"2012","journal-title":"Combating Terrorism Center at West Point Tech Rep"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3233\/DEV-170233"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mps028"},{"key":"ref60","first-page":"204","article-title":"Internet Memes: A Novel Approach to Distinguish Humans and Bots for Authentication","author":"priyadarshini","year":"2019","journal-title":"Proceedings of the Future Technologies Conference"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0236517"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623373"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1080\/1386979042000258321"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.56021\/9780801840678","article-title":"Persuasion & Healing","author":"frank","year":"1993"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2018.06.039"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1177\/1747016115599568"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.18690\/978-961-286-043-1.41"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/0016-3287(77)90021-0"},{"key":"ref29","volume":"13","author":"friedkin","year":"2006","journal-title":"A Structural Theory of Social Influence"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.02.012"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1017\/S1049096514001772"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1516\/EY30-319C-5DLJ-VCL3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0128-7"},{"key":"ref1","first-page":"xxx","article-title":"Recruitment and Radicalization: The Role of Social Media and New Technology","author":"alarid","year":"2016","journal-title":"Prism The Journal of Complex Operations"},{"article-title":"Social Networking Behavior and Psycho-Social Factors of the Digital Native","year":"2020","author":"crooks","key":"ref20"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1609\/icwsm.v11i1.14891","article-title":"The language of social support in social media and its effect on suicidal ideation risk","author":"de choudhury","year":"2017","journal-title":"ICWSM"},{"key":"ref21","first-page":"490","article-title":"Psychoanalytic social research","volume":"3","author":"dahmer","year":"1993","journal-title":"Free Association"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2020.02.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1517441113"},{"key":"ref26","article-title":"Manipulation and abuse on social media","author":"ferrera","year":"2015","journal-title":"SIGWEB Newsletter"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.22230\/cjc.2019v44n2a3511"},{"key":"ref50","first-page":"13","article-title":"Investigation of the Influence of Personality Traits on Cialdini&#x2019;s Persuasive Strategies","volume":"13","author":"oyibo","year":"2017"},{"key":"ref51","first-page":"1","article-title":"Lexical, morphological and semantic correlates of the dark triad personality traits in Russian facebook texts","author":"panicheva","year":"2016","journal-title":"IEEE Artificial Intelligence and Natural Language Conference (AINL)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9221.2005.00434.x"},{"article-title":"US Army\/Marine counterinsurgency field manual","year":"2006","author":"petraeus","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2020.02.003"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(02)00505-6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(90)90130-J"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-386915-9.00020-6"},{"key":"ref53","article-title":"The Russian &#x201C;Firehose of Falsehood&#x201D; Propaganda Model","author":"paul","year":"2016","journal-title":"RAND"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219173"},{"key":"ref10","article-title":"Connected: The surprising power of our social networks and how they shape our lives","author":"christakis","year":"2009","journal-title":"Little Brown Spark"},{"key":"ref11","article-title":"Pre-suasion: A revolutionary way to influence and persuade","author":"cialdini","year":"2016","journal-title":"Simon & Schuster"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-017-0006-5"},{"key":"ref12","volume":"55","author":"cialdini","year":"2007","journal-title":"Influence The Psychology of Persuasion"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/aps.1632"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1140\/epjst\/e2012-01697-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2016.1157408"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2015.06.012"},{"key":"ref17","first-page":"41","article-title":"Personality and Social Media Use. Organizations and Social Networking","volume":"21","author":"correa","year":"2013","journal-title":"Utilizing Social Media to Engage Consumers"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1089\/vio.2017.0048"},{"key":"ref19","article-title":"Influence and Vulnerability in the Information Environment: Implications for Cyber-Enabled Information Operations and National Security","author":"crooks","year":"0","journal-title":"M ( Kosal Innovate for Future Threats Disruptive Innovation Efforts and Uses of the Technology Environment by State and Non-State Actors"},{"article-title":"Networks and netwars: The future of terror, crime, and militancy","year":"2001","author":"arquilla","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2016.03.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2011.05.010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813740.002"},{"key":"ref8","article-title":"The enduring mystery of repeat clickers","author":"canham","year":"2019","journal-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/fi11050103"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2016.1233871"},{"key":"ref9","article-title":"Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards","author":"canham","year":"0","journal-title":"Sage Special Issue on Organizational Cybersecurity"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0058-x"},{"article-title":"Obedience to Authority","year":"2009","author":"milgram","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1017\/psrm.2020.32"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.004"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cognition.2017.05.005","article-title":"Moral vindications","volume":"167","author":"kumar","year":"2017","journal-title":"Cognition"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112986"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.4324\/9781003023098"}],"event":{"name":"2020 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2020,12,10]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2020,12,13]]}},"container-title":["2020 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377717\/9377728\/09378279.pdf?arnumber=9378279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T11:44:40Z","timestamp":1724672680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9378279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/bigdata50022.2020.9378279","relation":{},"subject":[],"published":{"date-parts":[[2020,12,10]]}}}