{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:44:09Z","timestamp":1730274249306,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624686","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T18:55:42Z","timestamp":1638298542000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Corporate Political Trends Online"],"prefix":"10.1109","author":[{"given":"Lauren","family":"Maunder","sequence":"first","affiliation":[]},{"given":"Joshua","family":"Lyons","sequence":"additional","affiliation":[]},{"given":"Lauren","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"Joe","family":"Harrison","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Timana-Gomez","sequence":"additional","affiliation":[]},{"given":"Paul","family":"O'Donnell","sequence":"additional","affiliation":[]},{"given":"Kiernan B.","family":"George","sequence":"additional","affiliation":[]},{"given":"Alan J.","family":"Michaels","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"ref11","first-page":"667","article-title":"Privacy versus security","volume":"103","author":"bambauer","year":"2013","journal-title":"J Crim L & Criminology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2010010105"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.27"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0149206310392233"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3140565"},{"key":"ref17","article-title":"Identifying political bias in news articles","volume":"12","author":"lazaridou","year":"2016","journal-title":"Bulletin of the IEEE TCDL"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2019.05.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1057\/s41311-017-0113-1"},{"journal-title":"Spoofed political emails","year":"2020","key":"ref4"},{"key":"ref3","first-page":"2238","article-title":"An approach for malicious spam detection in email with comparison of different classifiers","volume":"4","author":"sah","year":"2017","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"ref6","first-page":"397","article-title":"Who&#x2019;s calling? characterizing robocalls through audio and metadata analysis","author":"prasad","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref5","article-title":"Profiling and targeting opportunities in pervasive advertising","author":"shannon","year":"2009","journal-title":"1st Workshop on Pervasive Advertising Pervasive"},{"key":"ref8","article-title":"Use & abuse of personal information","author":"michaels","year":"2021","journal-title":"BlackHat"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1006\/mare.1994.1020"},{"key":"ref2","first-page":"140","article-title":"Reining in the data traders: A tort for the misuse of personal information","volume":"66","author":"ludington","year":"2006","journal-title":"Md L Rev"},{"journal-title":"UaA GitHub","year":"2021","author":"michaels","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_25"},{"key":"ref20","first-page":"15","article-title":"Recent trends in online foreign influence efforts","volume":"18","author":"martin","year":"2019","journal-title":"Journal of Information Warfare"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2017.1372999"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5907.2011.00523.x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1257\/jep.28.2.51"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v19i7.4901"},{"journal-title":"Browse data","year":"0","key":"ref26"},{"journal-title":"Donor lookup","year":"0","key":"ref25"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2021,11,2]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624686.pdf?arnumber=9624686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:53:49Z","timestamp":1652187229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624686","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}