{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:46:02Z","timestamp":1771922762831,"version":"3.50.1"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/snams67467.2025.11391134","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:45:45Z","timestamp":1771879545000},"page":"172-179","source":"Crossref","is-referenced-by-count":0,"title":["The Anatomy of Disinformation Networks: A Hybrid Graph-Based Framework for Echo Chamber Detection in the Italian Twitter\/X Sphere"],"prefix":"10.1109","author":[{"given":"Daniele","family":"Pasquini","sequence":"first","affiliation":[{"name":"University of Rome &#x201C;Tor Vergata&#x201D;,Department of Enterprise Engineering,Rome,Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paola","family":"Vocca","sequence":"additional","affiliation":[{"name":"University of Rome &#x201C;Tor Vergata&#x201D;,Department of Enterprise Engineering,Rome,Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giambattista","family":"Amati","sequence":"additional","affiliation":[{"name":"Fondazione Ugo Bordoni Rome,Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2022.113819"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3501247.3531543"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3144139"},{"issue":"6656","key":"ref4","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1126\/science.abp9364","article-title":"How do social media feed algorithms affect attitudes and behavior in an election campaign?","volume":"381","author":"Guess","year":"2023","journal-title":"Science"},{"key":"ref5","volume-title":"Echo Chamber: Rush Limbaugh and the Conservative Media Establishment.","author":"Jamieson","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5860\/choice.50-0926"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/epi.2018.32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.2.2.175"},{"issue":"1","key":"ref9","first-page":"22","article-title":"Digital trace data collection for social media effects research: Apis, data donation, and (screen) tracking","volume":"15","author":"Boeschoten","year":"2021","journal-title":"Communication Methods and Measures"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4324\/9781315771359"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-021-09471-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv8xnhtd"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"issue":"9","key":"ref14","doi-asserted-by":"crossref","first-page":"e2023301118","DOI":"10.1073\/pnas.2023301118","article-title":"The echo chamber effect on social media","volume":"118","author":"Cinelli","year":"2021","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"ref15","first-page":"235","article-title":"Social media, echo chambers, and political polarization","volume":"24","author":"Barber\u00e1","year":"2021","journal-title":"Annual Review of Political Science"},{"issue":"2","key":"ref16","article-title":"The echo chamber is overstated: Ideological segregation online","volume":"6","author":"Dubois","year":"2020","journal-title":"Social Media + Society"},{"key":"ref17","first-page":"1","article-title":"How do social media feed algorithms affect polarization?","volume":"14","author":"Guess","year":"2023","journal-title":"Nature Communications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/20563051231186368"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/14558"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1145\/3687006","article-title":"Transformer-based quantification of the echo chamber effect in online communities","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media (ICWSM)","author":"Ghafouri"},{"key":"ref21","first-page":"100304","article-title":"Towards echo chamber assessment via aspect-based sentiment (absa) and consensus metrics","volume":"38","author":"Zhang","year":"2024","journal-title":"Online Social Networks and Media"},{"key":"ref22","first-page":"1","article-title":"A sociolinguistic study of online echo chambers on twitter","volume-title":"Proceedings of the 1st Workshop on NLP for Computational Social Science (NLP+CSS)","author":"Duseja"},{"key":"ref23","article-title":"Political polarization in social media: Analysis of the \u201dtwitter political field\u201d in japan","author":"Takikawa","year":"2017","journal-title":"arXiv preprint arXiv:1708.08025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3472720.3483622"},{"issue":"1","key":"ref25","doi-asserted-by":"crossref","first-page":"e0227821","DOI":"10.1371\/journal.pone.0227821","article-title":"Investigating italian disinformation spreading on twitter in the context of 2019 european elections","volume":"15","author":"Pierri","year":"2020","journal-title":"PLOS ONE"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-41695-z"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/14782804.2020.1843415"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741637"},{"issue":"2","key":"ref29","article-title":"Twitter temporal evolution analysis: comparing event and topic driven retweet graphs","volume":"11","author":"Amati","year":"2016","journal-title":"IADIS International Journal on Computer Science & Information Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5220\/0005616906120619"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-024-00456-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-023-01615-w"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"issue":"1","key":"ref34","article-title":"Confounding the crowd: Characterizing and detecting malicious facebook pages at scale","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"12","author":"Shore"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2024.100276"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2105\/ajph.2018.304567"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14778\/3554821.3554901"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.33"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-12-2015-0378"},{"key":"ref42","first-page":"1","article-title":"The use of twitter hashtags in the formation of ad hoc publics","volume-title":"Proceedings of the 6th European consortium for political research (ECPR) general conference 2011. The European Consortium for Political Research (ECPR)","author":"Bruns"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2478\/jec-2018-0006"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2011.554572"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/p10008"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87479-9_45"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.90.012811"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.84.016114"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNM.2015.069776"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/BF01908075"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2006.11.013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2307\/2786835"}],"event":{"name":"2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Vienna, Austria","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11390733\/11390881\/11391134.pdf?arnumber=11391134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:40:52Z","timestamp":1771918852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391134\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/snams67467.2025.11391134","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}