{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:14:25Z","timestamp":1730297665171,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/snams52053.2020.9336579","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T23:20:56Z","timestamp":1612394456000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Homophily and Transitivity in Bot Disinformation Networks"],"prefix":"10.1109","author":[{"given":"Evan M.","family":"Williams","sequence":"first","affiliation":[{"name":"Accenture"}]},{"given":"Valerie","family":"Novak","sequence":"additional","affiliation":[{"name":"Accenture"}]},{"given":"Dylan","family":"Blackwell","sequence":"additional","affiliation":[{"name":"Accenture"}]},{"given":"Paul","family":"Platzman","sequence":"additional","affiliation":[{"name":"Accenture"}]},{"given":"Ian","family":"McCulloh","sequence":"additional","affiliation":[{"name":"Accenture"}]},{"given":"Nolan","family":"Edward Phillips","sequence":"additional","affiliation":[{"name":"Accenture"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.08.013"},{"key":"ref38","article-title":"Dormant bots in social media: Twitter and the 2018 US senate election","author":"richard","year":"0","journal-title":"Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2006.08.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508333"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v024.i01"},{"journal-title":"entiment Calculate Text Polarity Sentiment version2 7 1","year":"2019","author":"rinker","key":"ref30"},{"key":"ref37","first-page":"55","article-title":"Bot stamina: examining the influence and staying power of bots in online social networks","volume":"4 1","author":"ross","year":"2019","journal-title":"Applied Network Science"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1198\/016214507000000446"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2006.08.001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1990.10475327"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1803470115"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0684-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3209542.3209563"},{"key":"ref12","first-page":"21.11","article-title":"Social bots distort the 2016 US Presidential election online discussion","volume":"21","author":"bessi","year":"2016","journal-title":"First Monday"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809292"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1089\/big.2017.0038"},{"key":"ref15","article-title":"Online Human-Bot Interactions: Detection, Estimation, and Characterization","author":"varol","year":"0","journal-title":"Proc International AAAI Conf on Web and Social Media (ICWSM)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2019.1661888"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2798311"},{"key":"ref18","article-title":"Bots and Automation over Twitter during the US Election","author":"howard","year":"2016","journal-title":"Computational Propaganda Project Working Paper Series"},{"key":"ref19","article-title":"Indigenous Ecuadorians too strong to be ignored after deal to end portests","author":"collyns","year":"2019","journal-title":"The Guardian"},{"journal-title":"Twitter Bots Make Maduro World's Third Most Retweeted Celebrity Panam Post","article-title":"PanAm Post","year":"2015","key":"ref28"},{"journal-title":"A multi-layer approach to disinformation detection on Twitter","year":"2020","author":"pierri","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2635800"},{"key":"ref3","article-title":"Media Manipulation and Disinformation Online","author":"marwick","year":"2017","journal-title":"Data & Society Research Institute"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145346"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.10732.82562"},{"key":"ref5","first-page":"435","article-title":"A familiar face (book) profile elements as signals in an online social network","author":"lampe","year":"0","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"ref8","article-title":"People are strange when you're a stranger: Impact and influence of bots on social networks","author":"aiello","year":"0","journal-title":"Sixth International AAAI Conference on Weblogs and Social Media"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1594173.1594174"},{"key":"ref2","first-page":"11","article-title":"Social bots distort the 2016 US Presidential election online discussion","volume":"21","author":"bessi","year":"2016","journal-title":"First Monday"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0196087"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"journal-title":"Correa's Social-Media Troll Center Exposed in Quito","year":"2015","author":"mirla","key":"ref20"},{"journal-title":"Ecuador's president wages social media counterattack aimed at &#x2018;defamers&#x2018;","article-title":"The Guardian","year":"2015","key":"ref22"},{"year":"0","key":"ref21"},{"key":"ref24","article-title":"Bribery trial begins against ex-Ecuador leader Rafael Correa","author":"armario","year":"2020","journal-title":"AP"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1142\/S0217979218501424"},{"key":"ref23","article-title":"#HackingTeam Leaks: Ecuador is Spending Millions on Malware, Pro-Government Trolls","author":"woolley","year":"2015","journal-title":"Advox GlobalVoices"},{"journal-title":"BBC","article-title":"Ecuador court orders ex-president Correa's arrest","year":"2018","key":"ref26"},{"key":"ref25","first-page":"218","article-title":"(2019, April). Presidential Elections in Ecuador: Bot Presence in Twitter","author":"rofrio","year":"0","journal-title":"2019 Sixth International Conference on eDemocracy eGovernment (ICEDEG)"}],"event":{"name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2020,12,14]]},"location":"Paris, France","end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9336519\/9336528\/09336579.pdf?arnumber=9336579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:20Z","timestamp":1656602300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9336579\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/snams52053.2020.9336579","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}