{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:56:37Z","timestamp":1772794597133,"version":"3.50.1"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infcomw.2019.8845094","type":"proceedings-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T02:23:05Z","timestamp":1569291785000},"page":"157-164","source":"Crossref","is-referenced-by-count":4,"title":["Distorting Political Communication: The Effect Of Hyperactive Users In Online Social Networks"],"prefix":"10.1109","author":[{"given":"Orestis","family":"Papakyriakopoulos","sequence":"first","affiliation":[{"name":"Bavarian School of Public Policy, Technical University of Munich, Munich, D-80333, Germany"}]},{"given":"Morteza","family":"Shahrezaye","sequence":"additional","affiliation":[{"name":"Bavarian School of Public Policy, Technical University of Munich, Munich, D-80333, Germany"}]},{"given":"Juan Carlos Medina","family":"Serrano","sequence":"additional","affiliation":[{"name":"Bavarian School of Public Policy, Technical University of Munich, Munich, D-80333, Germany"}]},{"given":"Simon","family":"Hegelich","sequence":"additional","affiliation":[{"name":"Bavarian School of Public Policy, Technical University of Munich, Munich, D-80333, Germany"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Americans online news use is closing in on tv news use","author":"Gottfried","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18278\/epa.1.2.8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.782330"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12193"},{"key":"ref5","volume-title":"Social Media Report: The 2017 German Federal Elections","author":"Serrano","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/2053951718811844"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1086\/267990"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1160"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/0894439316639561"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/0894439314556599"},{"key":"ref12","volume-title":"The democratic paradox","author":"Mouffe","year":"2000"},{"key":"ref13","volume-title":"Are human interactivity times lognormal?","author":"Blenn","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2011-20124-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644900"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/0191453706061095"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.369"},{"key":"ref19","volume-title":"Republic: Divided democracy in the age of social media","author":"Sunstein","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812440159"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316212783"},{"key":"ref22","volume-title":"Using the graph api - documentation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2011-016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2307\/1912557"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"ref27","volume-title":"Outliers in statistical data","author":"Barnett","year":"1974"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/2533879"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/cem.1123"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2007.11.008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1198\/106186004X12632"},{"key":"ref33","first-page":"111","article-title":"More efficient topic modelling through a noun only approach","volume-title":"Proceedings of the Australasian Language Technology Association Workshop 2015","author":"Martin","year":"2015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1162"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11168-004-7431-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.03.006"},{"key":"ref37","first-page":"3878","article-title":"Conic scan-and-cover algorithms for nonparametric topic modeling","author":"Yurochkin","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/44565"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2307\/2288805"},{"key":"ref41","volume-title":"Explanation of log-normal distributions and power-law distributions in biology and social science","author":"Sun","year":"2004"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1063\/1.4745586"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1093\/ijpor\/edv050"},{"key":"ref44","volume-title":"Effects of social bots in the iran-debate on twitter","author":"Thieltges","year":"2018"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-06930-7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.09.003"},{"key":"ref47","volume-title":"The demographics of social media users - 2012","author":"Duggan","year":"2013"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i1.14128"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.17"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.16"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/3477.809023"},{"key":"ref53","volume-title":"Criticality in formal languages and statistical physics","author":"Lin","year":"2016"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref55","volume-title":"On the (statistical) detection of adversarial examples","author":"Grosse","year":"2017"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645740"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642713"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02547-2_6"},{"key":"ref59","article-title":"Business models in social networking","volume-title":"CMI International Conference on Social Networking and Communities","author":"Falch","year":"2009"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1126\/science.346.6213.1063"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716679679"},{"key":"ref62","first-page":"1367","article-title":"From preemption to circumvention: if technology regulates, why do we need regulation (and vice versa)","volume":"26","author":"Nissenbaum","year":"2011","journal-title":"Berkeley Technology Law Journal"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"ref64","first-page":"1","article-title":"Auditing algorithms: Research methods for detecting discrimination on internet platforms","author":"Sandvig","year":"2014","journal-title":"Data and discrimination: converting critical concerns into productive inquiry"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2014.976411"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Paris, France","start":{"date-parts":[[2019,4,29]]},"end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8831168\/8845034\/08845094.pdf?arnumber=8845094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T12:03:50Z","timestamp":1709294630000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8845094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2019.8845094","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}