{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:44:43Z","timestamp":1772725483584,"version":"3.50.1"},"reference-count":85,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,13]]},"DOI":"10.1109\/istas57930.2023.10306047","type":"proceedings-article","created":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T18:55:50Z","timestamp":1699383350000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Circulation of Fake News: Threat Analysis Model to Assess the Impact on Society and Public Safety"],"prefix":"10.1109","author":[{"given":"Amal","family":"Dabbous","sequence":"first","affiliation":[{"name":"Saint-Joseph University,Faculty of Business and Management,Beirut,Lebanon"}]},{"given":"Abbas","family":"Tarhini","sequence":"additional","affiliation":[{"name":"Lebanese American University,Information Technology &#x0026; Operations Management Department,Beirut,Lebanon"}]},{"given":"Antoine","family":"Harfouche","sequence":"additional","affiliation":[{"name":"University Paris Nanterre,Department Of Management Sciences,Paris,France"}]}],"member":"263","reference":[{"key":"ref13","article-title":"To fight fake news on WhatsApp","author":"burgess","year":"2018","journal-title":"India is turning off the internet"},{"key":"ref57","author":"dvorin","year":"2014","journal-title":"IDF Bans Soldiers From Using WhatsApp"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"ref56","author":"osborne","year":"2017","journal-title":"WhatsApp is among the most blacklisted apps in the enterprise"},{"key":"ref15","article-title":"Disinformation is becoming unstoppable","author":"ghosh","year":"2018","journal-title":"Time"},{"key":"ref59","article-title":"Search Warrant. United States District Court for the Western District of New York","year":"2014","journal-title":"Case No 14-MJ-635 Filed 08\/06\/2014 Search Warrant United States District Court for the District of New Hampshire Case No 1 14-mc-00021-AJ Filed 06\/13\/2014"},{"key":"ref14","article-title":"Facebook promised to tackle fake news","author":"levin","year":"2017","journal-title":"But the evidence shows it's not working The Guardian"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2023.i1.5-40"},{"key":"ref53","author":"ashford","year":"2018","journal-title":"ck Point warns of WhatsApp vulnerabilities"},{"key":"ref52","article-title":"Olsen Exclusive: WhatsApp Cofounder Brian Acton Gives the Inside Story On #DeleteFacebook and Why He Left $850 Million Behind","author":"parmy","year":"2018","journal-title":"Forbes Magazine"},{"key":"ref11","article-title":"Selective exposure to misinformation: evidence from the consumption of fake news during the 2016 US presidential campaign","author":"guess","year":"2018","journal-title":"Working Paper EURIsCO"},{"key":"ref55","author":"wire","year":"2018","journal-title":"Symantec Acquires Appthority to Enhance Protection From Mobile Application Vulnerabilities"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"ref54","first-page":"269","article-title":"WhatsApp security and role of metadata in preserving privacy","author":"rastogi","year":"2017","journal-title":"ICMLG2017 5th International Conference on Management Leadership and Governance"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/YC-03-2022-1491"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/20563051221150412"},{"key":"ref19","article-title":"Forget About Backdoors","author":"brewster","year":"2017","journal-title":"This Is The Data WhatsApp Actually Hands To Cops"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.37016\/mr-2020-035"},{"key":"ref51","author":"smith","year":"2018","journal-title":"WhatsApp is getting ads next year but will it lose end-to-end encryption?"},{"key":"ref50","author":"lomas","year":"2018","journal-title":"WhatsApp founder Brian Acton says Facebook used him to get its acquisition past EU regulators"},{"key":"ref46","first-page":"25","article-title":"WhatsApp marketing: a study on WhatsApp brand communication and the role of trust in self-disclosure","volume":"15","author":"zarouali","year":"2021","journal-title":"International Journal of Communication"},{"key":"ref45","author":"rowan","year":"2018","journal-title":"The inside story of Jan Koum and how Facebook bought WhatsApp"},{"key":"ref48","year":"2015","journal-title":"First on CNN Paris attackers likely used encrypted apps officials say"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1093\/heapol\/czab024"},{"key":"ref42","first-page":"50","article-title":"Commanding the Trend: Social Media as Information Warfare","volume":"11","author":"prier","year":"2017","journal-title":"Strategic Studies Quarterly"},{"key":"ref41","article-title":"What Can We Learn About People from Their social media?","author":"seidman","year":"2020","journal-title":"Our social media profiles and activity can reveal a lot about our personalities"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"ref44","author":"jowett","year":"2018","journal-title":"Propaganda and Persuasion"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-022-01008-3"},{"key":"ref49","author":"groll","year":"2016","journal-title":"How Hillary Clinton helped build the ultimate impenetrable communications tool"},{"key":"ref8","article-title":"The case for Brexit was built on lies","author":"hutton","year":"2021","journal-title":"Five years later deceit is routine in our politics The Guardian"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2017.1360143"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/2336825X1802600305"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/jopy.12476"},{"key":"ref3","article-title":"The Impact of Fake News on Brands and Social Media.(c20 18) (Doctoral dissertation","author":"mahdi","year":"2018","journal-title":"Lebanese American University"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-08-2020-0333"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/14747731.2021.1927470"},{"key":"ref82","article-title":"Market quavers after fake AP tweet says Obama was hurt in White House explosions","author":"el boghdady","year":"2013","journal-title":"The Washington Post"},{"key":"ref81","article-title":"WhatsApp Has A Viral Rumor Problem With Real Consequences","author":"aragao","year":"2017","journal-title":"Buzz Feed News"},{"key":"ref40","author":"hasen","year":"2022","journal-title":"Cheap Speech How Disinformation Poisons Our Politics-And How to Cure It"},{"key":"ref84","year":"2018","journal-title":"Internet Shutdowns"},{"key":"ref83","article-title":"When Whatsapp's fake news problem threatens public health","author":"molteni","year":"2018","journal-title":"Wired"},{"key":"ref80","article-title":"When social media rumours on child abduction trigger mob lynchings","author":"deepalakshmi","year":"2018","journal-title":"The Hindu"},{"key":"ref35","article-title":"WhatsApp's Fake News Problem Has Turned Deadly in India","author":"nugent","year":"2018","journal-title":"Here's How to Stop It URL"},{"key":"ref79","article-title":"WhatsApp Has a Viral Rumor Problem with Real Consequences","author":"aragao","year":"2017","journal-title":"BuzzFeed News"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"ref78","author":"kang","year":"2016","journal-title":"Washington pizzeria attack fake news brought real guns"},{"key":"ref37","author":"ben","year":"2017","journal-title":"Who is winning the Global Instant Messaging Battle?"},{"key":"ref36","article-title":"On WhatsApp, fake news is fast - and can be fatal","author":"dwoskin","year":"2018","journal-title":"The Washington Post"},{"key":"ref31","article-title":"Information Disorder: Toward an Interdisciplinary Framework for Research and Policymaking","author":"wardle","year":"2017","journal-title":"Council of Europe"},{"key":"ref75","year":"2022","journal-title":"Dozens injured in days of unrest in Sweden sparked by anti -immigrant rally"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4185\/RLCS-2019?1406en"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1080\/09692290.2015.1011682"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073640"},{"key":"ref77","article-title":"Anatomy of a Fake News Scandal","author":"robb","year":"2017","journal-title":"Rolling Stone"},{"key":"ref32","first-page":"143","article-title":"Deep Learning Applications on Edge Computing","author":"trivedi","year":"2023","journal-title":"Machine Learning for Edge Computing"},{"key":"ref76","author":"corera","year":"2018","journal-title":"Swedish security chief warning on fake news"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eap.2022.11.014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0252830"},{"key":"ref39","article-title":"Computational propaganda worldwide: Executive summary","author":"woolley","year":"2017","journal-title":"Computational Propaganda Research Project"},{"key":"ref38","author":"ruby","year":"2023","journal-title":"Whatsapp Statistics 2023 - How Many People Use Whatsapp"},{"key":"ref71","first-page":"132","article-title":"Critical security tradition in IR","volume":"4","author":"mir","year":"2014","journal-title":"ZENITH International Journal of Multidisciplinary Research"},{"key":"ref70","author":"buzan","year":"1998","journal-title":"Security A New Framework for Analysis"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/BF01410870"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1093\/restud\/rdac038"},{"key":"ref24","author":"king","year":"2018","journal-title":"Ending fake news-The future of media education policies and practices"},{"key":"ref68","first-page":"77","volume":"27","author":"houston","year":"1960","journal-title":"Insurance and Risk Theory"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1353\/ken.2017.0025"},{"key":"ref67","article-title":"Theoretical Sources for a Theory of Safety and Security. Proceedings of The Tenth International Conference on Emerging Security Information, Systems and Technologies","author":"lukas","year":"2016","journal-title":"IARIA"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1108\/SJME-09-2021-0170"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/14782804.2020.1843415"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1300\/J257v02n01_01"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.47152\/rkkp.60.1.4"},{"key":"ref64","article-title":"More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema","author":"ros ier","year":"2018","journal-title":"2018 IEEE Symposium on Security and Privacy"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_22"},{"key":"ref22","article-title":"Fake News: A Legal Perspective","author":"klein","year":"2017","journal-title":"Journal of Internet Law"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30505-9_15"},{"key":"ref21","author":"shao","year":"2017","journal-title":"The spread of misinformation by social bots"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17172-2_4"},{"key":"ref28","author":"iradah","year":"2018","journal-title":"Classification of Fake News on Social Media A Brief Review"},{"key":"ref27","article-title":"Characterization of Fake News: A Positioning Paper","author":"belloir","year":"2022","journal-title":"16th International Conference on Research Challenges in Information Science (RCIS'22)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.10.1109\/ACCESS.2022.3159651"},{"key":"ref60","author":"li","year":"2016","journal-title":"WhatsApp Security Paper Analysis"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18497-0_41"},{"key":"ref61","year":"2018","journal-title":"Jamal Khashoggi's private WhatsApp messages may offer new clues to killing"}],"event":{"name":"2023 IEEE International Symposium on Technology and Society (ISTAS)","location":"Swansea, United Kingdom","start":{"date-parts":[[2023,9,13]]},"end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10305708\/10305722\/10306047.pdf?arnumber=10306047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:22:33Z","timestamp":1702322553000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10306047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/istas57930.2023.10306047","relation":{},"subject":[],"published":{"date-parts":[[2023,9,13]]}}}