{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T10:10:27Z","timestamp":1775211027393,"version":"3.50.1"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T00:00:00Z","timestamp":1642982400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T00:00:00Z","timestamp":1642982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Science Foundation","award":["1757211"],"award-info":[{"award-number":["1757211"]}]},{"name":"Google Open Source"},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000913","name":"James S. McDonnell Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100000913","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Omidyar Fellowship"},{"name":"Applied Complexity Fellowship"},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1807478"],"award-info":[{"award-number":["1807478"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Citizen-generated counter speech is a promising way to fight hate speech and promote peaceful, non-polarized discourse. However, there is a lack of large-scale longitudinal studies of its effectiveness for reducing hate speech. To this end, we perform an exploratory analysis of the effectiveness of counter speech using several different macro- and micro-level measures to analyze 131,366 political conversations that took place on German Twitter over four years. We report on the dynamic interactions of hate and counter speech over time and provide insights into whether, as in \u2018classic\u2019 bullying situations, organized efforts are more effective than independent individuals in steering online discourse. Taken together, our results build a multifaceted picture of the dynamics of hate and counter speech online. While we make no causal claims due to the complexity of discourse dynamics, our findings suggest that organized hate speech is associated with changes in public discourse and that counter speech\u2014especially when organized\u2014may help curb hateful rhetoric in online discourse.<\/jats:p>","DOI":"10.1140\/epjds\/s13688-021-00314-6","type":"journal-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T11:03:24Z","timestamp":1643022204000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Impact and dynamics of hate and counter speech online"],"prefix":"10.1140","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6724-2755","authenticated-orcid":false,"given":"Joshua","family":"Garland","sequence":"first","affiliation":[]},{"given":"Keyan","family":"Ghazi-Zahedi","sequence":"additional","affiliation":[]},{"given":"Jean-Gabriel","family":"Young","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"H\u00e9bert-Dufresne","sequence":"additional","affiliation":[]},{"given":"Mirta","family":"Galesic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,24]]},"reference":[{"key":"314_CR1","unstructured":"Bakalis C (2015) Cyberhate: an Issue of Continued Concern for the Council of Europe\u2019s Anti-racism Commission. Council of Europe"},{"key":"314_CR2","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.avb.2018.05.006","volume":"45","author":"C Blaya","year":"2019","unstructured":"Blaya C (2019) Cyberhate: a review and content analysis of intervention strategies. Aggress Violent Behav 45:163\u2013172","journal-title":"Aggress Violent Behav"},{"key":"314_CR3","volume-title":"Countering online hate speech","author":"I Gagliardone","year":"2015","unstructured":"Gagliardone I, Gal D, Alves T, Martinez G (2015) Countering online hate speech. Unesco Publishing"},{"issue":"3","key":"314_CR4","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1080\/01639625.2016.1196985","volume":"38","author":"J Hawdon","year":"2017","unstructured":"Hawdon J, Oksanen A, R\u00e4s\u00e4nen P (2017) Exposure to online hate in four nations: a cross-national consideration. Deviant Behav 38(3):254\u2013266","journal-title":"Deviant Behav"},{"key":"314_CR5","doi-asserted-by":"crossref","unstructured":"M\u00fcller K, Schwarz C (2019) Fanning the flames of hate: social media and hate crime. Available at SSRN 3082972","DOI":"10.1093\/jeea\/jvaa045"},{"key":"314_CR6","doi-asserted-by":"crossref","unstructured":"Oksanen A, Kaakinen M, Minkkinen J, R\u00e4s\u00e4nen P, Enjolras B, Steen-Johnsen K (2018) Perceived societal fear and cyberhate after the november 2015 paris terrorist attacks. Terrorism Polit Violence 1\u201320","DOI":"10.1080\/09546553.2018.1442329"},{"key":"314_CR7","volume-title":"Manual on hate speech","author":"A Weber","year":"2009","unstructured":"Weber A (2009) Manual on hate speech. Council Of Europe"},{"key":"314_CR8","unstructured":"YouTube: Hate speech policy. https:\/\/support.google.com\/youtube\/answer\/2801939. Accessed: 2020-02-28"},{"key":"314_CR9","unstructured":"Twitter: Hateful conduct policy. https:\/\/help.twitter.com\/en\/rules-and-policies\/hateful-conduct-policy. Accessed: 2020-02-28"},{"key":"314_CR10","unstructured":"Facebook: Hate speech. https:\/\/www.facebook.com\/communitystandards\/hate_speech. Accessed: 2020-02-28"},{"key":"314_CR11","first-page":"1","volume-title":"Proceedings of the ACM on human-computer interaction 1(CSCW)","author":"E Chandrasekharan","year":"2017","unstructured":"Chandrasekharan E, Pavalanathan U, Srinivasan A, Glynn A, Eisenstein J, Gilbert E (2017) You can\u2019t stay here: the efficacy of reddit\u2019s 2015 ban examined through hate speech. In: Proceedings of the ACM on human-computer interaction 1(CSCW), pp\u00a01\u201322"},{"key":"314_CR12","doi-asserted-by":"crossref","unstructured":"Benesch S, Ruths D, Dillon K, Saleem H, Wright L (2016) Considerations for successful counterspeech. Dangerous Speech Proj. Report available at https:\/\/dangerousspeech.org","DOI":"10.15868\/socialsector.34065"},{"issue":"4","key":"314_CR13","doi-asserted-by":"crossref","first-page":"459","DOI":"10.5771\/2192-4007-2018-4-459","volume":"7","author":"D Rieger","year":"2018","unstructured":"Rieger D, Schmitt JB, Frischlich L (2018) Hate and counter-voices in the Internet: introduction to the special issue. SCM Stud Commun Media 7(4):459\u2013472","journal-title":"SCM Stud Commun Media"},{"issue":"20","key":"314_CR14","doi-asserted-by":"crossref","DOI":"10.3390\/ijerph16203992","volume":"16","author":"S Wachs","year":"2019","unstructured":"Wachs S, Wright MF, Sittichai R, Singh R, Biswal R, Kim E-M, Yang S, G\u00e1mez-Guadix M, Almendros C, Flora K et al. (2019) Associations between witnessing and perpetrating online hate in eight countries: the buffering effects of problem-focused coping. Int J Environ Res Public Health 16(20):3992","journal-title":"Int J Environ Res Public Health"},{"key":"314_CR15","doi-asserted-by":"crossref","unstructured":"Buerger C, Wright L (2019) Counterspeech: a literature review","DOI":"10.15868\/socialsector.36916"},{"issue":"4","key":"314_CR16","doi-asserted-by":"crossref","first-page":"525","DOI":"10.5771\/2192-4007-2018-4-525","volume":"7","author":"M Ziegele","year":"2018","unstructured":"Ziegele M, Jost P, Bormann M, Heinbach D (2018) Journalistic counter-voices in comment sections: patterns, determinants, and potential consequences of interactive moderation of uncivil user comments. SCM Stud Commun Media 7(4):525\u2013554","journal-title":"SCM Stud Commun Media"},{"key":"314_CR17","volume-title":"Between facts and norms: contributions to a discourse theory of law and democracy","author":"J Habermas","year":"2015","unstructured":"Habermas J (2015) Between facts and norms: contributions to a discourse theory of law and democracy. Wiley, New York"},{"key":"314_CR18","unstructured":"Brassard-Gourdeau \u00c9, Khoury R (2018) Impact of sentiment detection to recognize toxic and subversive online comments. arXiv preprint arXiv:1812.01704"},{"key":"314_CR19","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.techfore.2013.04.013","volume":"95","author":"P Burnap","year":"2015","unstructured":"Burnap P, Rana OF, Avis N, Williams M, Housley W, Edwards A, Morgan J, Sloan L (2015) Detecting tension in online communities with computational Twitter analysis. Technol Forecast Soc Change 95:96\u2013108","journal-title":"Technol Forecast Soc Change"},{"issue":"1","key":"314_CR20","doi-asserted-by":"crossref","DOI":"10.1140\/epjds\/s13688-016-0072-6","volume":"5","author":"P Burnap","year":"2016","unstructured":"Burnap P, Williams ML (2016) Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Sci 5(1):11","journal-title":"EPJ Data Sci"},{"key":"314_CR21","doi-asserted-by":"crossref","unstructured":"MacAvaney S, Yao H-R, Yang E, Russell K, Goharian N, Frieder O (2019) Hate speech detection: challenges and solutions. PLoS ONE 14(8)","DOI":"10.1371\/journal.pone.0221152"},{"key":"314_CR22","volume-title":"Twelfth international AAAI conference on web and social","author":"MH Ribeiro","year":"2018","unstructured":"Ribeiro MH, Calais PH, Santos YA, Almeida VA, Meira W Jr (2018) Characterizing and detecting hateful users on Twitter. In: Twelfth international AAAI conference on web and social, Media"},{"issue":"5","key":"314_CR23","doi-asserted-by":"crossref","first-page":"925","DOI":"10.3233\/SW-180338","volume":"10","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Luo L (2019) Hate speech detection: a solved problem? The challenging case of long tail on Twitter. Semant Web 10(5):925\u2013945","journal-title":"Semant Web"},{"key":"314_CR24","volume-title":"Proceedings of the eleventh international conference on language resources and evaluation (LREC 2018)","author":"S Zimmerman","year":"2018","unstructured":"Zimmerman S, Kruschwitz U, Fox C (2018) Improving hate speech detection with deep learning ensembles. In: Proceedings of the eleventh international conference on language resources and evaluation (LREC 2018)"},{"issue":"4","key":"314_CR25","doi-asserted-by":"crossref","first-page":"540","DOI":"10.5771\/2192-4007-2020-4-540","volume":"9","author":"N Keller","year":"2020","unstructured":"Keller N, Askanius T (2020) Combatting hate and trolling with love and reason? A qualitative analysis of the discursive antagonisms between organized hate speech and counterspeech online. SCM Stud Commun Media 9(4):540\u2013572","journal-title":"SCM Stud Commun Media"},{"key":"314_CR26","doi-asserted-by":"crossref","unstructured":"Buerger C (2020) The anti-hate brigade: how a group of thousands responds collectively to online vitriol. Available at SSRN 3748803","DOI":"10.2139\/ssrn.3748803"},{"key":"314_CR27","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.avb.2018.07.002","volume":"45","author":"H Gaffney","year":"2019","unstructured":"Gaffney H, Farrington DP, Espelage DL, Ttofi MM (2019) Are cyberbullying intervention and prevention programs effective? A systematic and meta-analytical review. Aggress Violent Behav 45:134\u2013153","journal-title":"Aggress Violent Behav"},{"key":"314_CR28","unstructured":"Mathew B, Kumar N, Goyal P, Mukherjee A (2018) Analyzing the hate and counter speech accounts on Twitter. arXiv preprint arXiv:1812.02712"},{"key":"314_CR29","first-page":"369","volume-title":"Proceedings of the international AAAI conference on web and social media","author":"B Mathew","year":"2019","unstructured":"Mathew B, Saha P, Tharad H, Rajgaria S, Singhania P, Maity SK, Goyal P, Mukherjee A (2019) Thou shalt not hate: countering online hate speech. In: Proceedings of the international AAAI conference on web and social media, vol\u00a013, pp\u00a0369\u2013380"},{"issue":"2","key":"314_CR30","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1111\/jcc4.12104","volume":"20","author":"NJ Stroud","year":"2015","unstructured":"Stroud NJ, Scacco JM, Muddiman A, Curry AL (2015) Changing deliberative norms on news organizations\u2019 Facebook sites. J Comput-Mediat Commun 20(2):188\u2013203","journal-title":"J Comput-Mediat Commun"},{"key":"314_CR31","doi-asserted-by":"crossref","first-page":"57","DOI":"10.18653\/v1\/W17-3009","volume-title":"Proceedings of the first workshop on abusive language online","author":"L Wright","year":"2017","unstructured":"Wright L, Ruths D, Dillon KP, Saleem HM, Benesch S (2017) Vectors for counterspeech on Twitter. In: Proceedings of the first workshop on abusive language online, pp\u00a057\u201362"},{"key":"314_CR32","doi-asserted-by":"publisher","unstructured":"Garland J, Ghazi-Zahedi K, Young J-G, H\u00e9bert-Dufresne L, Galesic M (2020) Countering hate on social media: large scale classification of hate and counter speech. In: Proceedings of the fourth workshop on online abuse and harms. Association for Computational Linguistics, Online, pp\u00a0102\u2013112. https:\/\/doi.org\/10.18653\/v1\/2020.alw-1.13. https:\/\/www.aclweb.org\/anthology\/2020.alw-1.13","DOI":"10.18653\/v1\/2020.alw-1.13"},{"issue":"4","key":"314_CR33","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1080\/00405841.2014.947222","volume":"53","author":"C Salmivalli","year":"2014","unstructured":"Salmivalli C (2014) Participant roles in bullying: how can peer bystanders be utilized in interventions? Theory Pract 53(4):286\u2013292","journal-title":"Theory Pract"},{"issue":"1","key":"314_CR34","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.adolescence.2007.05.002","volume":"31","author":"G Gini","year":"2008","unstructured":"Gini G, Albiero P, Benelli B, Altoe G (2008) Determinants of adolescents\u2019 active defending and passive bystanding behavior in bullying. J Adolesc 31(1):93\u2013105","journal-title":"J Adolesc"},{"issue":"5","key":"314_CR35","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1080\/15374416.2011.597090","volume":"40","author":"C Salmivalli","year":"2011","unstructured":"Salmivalli C, Voeten M, Poskiparta E (2011) Bystanders matter: associations between reinforcing, defending, and the frequency of bullying behavior in classrooms. J Clin Child Adolesc Psychol 40(5):668\u2013676","journal-title":"J Clin Child Adolesc Psychol"},{"key":"314_CR36","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511664113","volume-title":"Citizens, politics and social communication: information and influence in an election campaign","author":"RR Huckfeldt","year":"1995","unstructured":"Huckfeldt RR, Sprague J (1995) Citizens, politics and social communication: information and influence in an election campaign. Cambridge University Press, Cambridge"},{"issue":"1","key":"314_CR37","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1017\/S1049096510001873","volume":"44","author":"D Lazer","year":"2011","unstructured":"Lazer D (2011) Networks in political science: back to the future. PS Polit Sci Polit 44(1):61\u201368","journal-title":"PS Polit Sci Polit"},{"key":"314_CR38","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226922836.001.0001","volume-title":"The social citizen: peer networks and political behavior","author":"B Sinclair","year":"2012","unstructured":"Sinclair B (2012) The social citizen: peer networks and political behavior. University of Chicago Press, Chicago"},{"issue":"1","key":"314_CR39","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1002\/bdm.1827","volume":"28","author":"GD Brown","year":"2015","unstructured":"Brown GD, Wood AM, Ogden RS, Maltby J (2015) Do student evaluations of university reflect inaccurate beliefs or actual experience? A relative rank model. J Behav Decis Mak 28(1):14\u201326","journal-title":"J Behav Decis Mak"},{"key":"314_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ecolecon.2017.04.017","volume":"140","author":"K Farrow","year":"2017","unstructured":"Farrow K, Grolleau G, Ibanez L (2017) Social norms and pro-environmental behavior: a review of the evidence. Ecol Econ 140:1\u201313","journal-title":"Ecol Econ"},{"key":"314_CR41","doi-asserted-by":"crossref","unstructured":"Banerjee A, Chandrasekhar AG, Duflo E, Jackson MO (2013) The diffusion of microfinance. Science 341(6144)","DOI":"10.1126\/science.1236498"},{"issue":"7415","key":"314_CR42","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1038\/nature11421","volume":"489","author":"RM Bond","year":"2012","unstructured":"Bond RM, Fariss CJ, Jones JJ, Kramer AD, Marlow C, Settle JE, Fowler JH (2012) A 61-million-person experiment in social influence and political mobilization. Nature 489(7415):295\u2013298","journal-title":"Nature"},{"issue":"2\u20133","key":"314_CR43","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.ypmed.2009.07.006","volume":"49","author":"H Croker","year":"2009","unstructured":"Croker H, Whitaker K, Cooke L, Wardle J (2009) Do social norms affect intended food choice? Prev Med 49(2\u20133):190\u2013193","journal-title":"Prev Med"},{"key":"314_CR44","unstructured":"Christakis NA, Fowler JH (2009) Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. Little, Brown Spark"},{"issue":"3","key":"314_CR45","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1093\/esr\/jcy005","volume":"34","author":"A \u00c1lvarez-Benjumea","year":"2018","unstructured":"\u00c1lvarez-Benjumea A, Winter F (2018) Normative change and culture of hate: an experiment in online environments. Eur Sociol Rev 34(3):223\u2013237","journal-title":"Eur Sociol Rev"},{"issue":"20","key":"314_CR46","doi-asserted-by":"crossref","first-page":"9785","DOI":"10.1073\/pnas.1813486116","volume":"116","author":"JN Matias","year":"2019","unstructured":"Matias JN (2019) Preventing harassment and increasing group participation through social norms in 2190 online science discussions. Proc Natl Acad Sci 116(20):9785\u20139789","journal-title":"Proc Natl Acad Sci"},{"key":"314_CR47","volume-title":"The fringe insurgency. Connectivity, convergence and mainstreaming of the extreme right","author":"J Davey","year":"2017","unstructured":"Davey J, Ebner J (2017) The fringe insurgency. Connectivity, convergence and mainstreaming of the extreme right. Institute for Strategic Dialogue"},{"key":"314_CR48","unstructured":"Gensing P (2018) Information war by all means. Tagesschau. tagesschau.de\/faktenfinder\/inland\/organisierte-trolle-101.html"},{"key":"314_CR49","unstructured":"Anders R (2018) L\u00f6sch Dich! So organisiert ist der Hate im Netz I Doku \u00fcber Hater und Trolle. Funk net Documentary. youtube.com\/watch?v=zvKjfWSPI7s"},{"key":"314_CR50","unstructured":"Reconquista Internet Codex. https:\/\/www.reddit.com\/r\/ReconquistaInternet\/wiki\/index#wiki_reconquistainternet_wiki"},{"key":"314_CR51","unstructured":"News Portals from Germany. https:\/\/www.deutschland.de\/en\/topic\/knowledge\/news"},{"key":"314_CR52","first-page":"1","volume-title":"Proceedings of the fifth international workshop on natural language processing for social media","author":"A Schmidt","year":"2017","unstructured":"Schmidt A, Wiegand M (2017) A survey on hate speech detection using natural language processing. In: Proceedings of the fifth international workshop on natural language processing for social media, pp\u00a01\u201310"},{"key":"314_CR53","first-page":"1188","volume-title":"International conference on machine learning","author":"Q Le","year":"2014","unstructured":"Le Q, Mikolov T (2014) Distributed representations of sentences and documents. In: International conference on machine learning, pp\u00a01188\u20131196"},{"key":"314_CR54","first-page":"45","volume-title":"Proceedings of the LREC 2010 workshop on new challenges for NLP frameworks","author":"R \u0158eh\u016f\u0159ek","year":"2010","unstructured":"\u0158eh\u016f\u0159ek R, Sojka P (2010) Software framework for topic modelling with large corpora. In: Proceedings of the LREC 2010 workshop on new challenges for NLP frameworks. ELRA, Valletta, pp\u00a045\u201350. http:\/\/is.muni.cz\/publication\/884893\/en"},{"key":"314_CR55","doi-asserted-by":"crossref","unstructured":"Lau JH, Baldwin T (2016) An empirical evaluation of doc2vec with practical insights into document embedding generation. arXiv preprint arXiv:1607.05368","DOI":"10.18653\/v1\/W16-1609"},{"key":"314_CR56","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"314_CR57","unstructured":"Ziems C, He B, Soni S, Kumar S (2020) Racism is a virus: anti-asian hate and counterhate in social media during the covid-19 crisis. arXiv preprint arXiv:2005.12423"},{"key":"314_CR58","unstructured":"Jaki S, De Smedt T (2019) Right-wing german hate speech on Twitter: analysis and automatic detection. arXiv preprint arXiv:1910.07518"},{"issue":"1","key":"314_CR59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/0034-6527.00321","volume":"72","author":"A Abadie","year":"2005","unstructured":"Abadie A (2005) Semiparametric difference-in-differences estimators. Rev Econ Stud 72(1):1\u201319","journal-title":"Rev Econ Stud"},{"key":"314_CR60","doi-asserted-by":"crossref","unstructured":"Granger CW (1969) Investigating causal relations by econometric models and cross-spectral methods. Econometrica, 424\u2013438","DOI":"10.2307\/1912791"},{"issue":"2","key":"314_CR61","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.85.461","volume":"85","author":"T Schreiber","year":"2000","unstructured":"Schreiber T (2000) Measuring information transfer. Phys Rev Lett 85(2):461","journal-title":"Phys Rev Lett"},{"key":"314_CR62","first-page":"366","volume-title":"Dynamical systems and turbulence","author":"F Takens","year":"1981","unstructured":"Takens F (1981) Detecting strange attractors in turbulence. In: Dynamical systems and turbulence. Springer, Warwick, pp\u00a0366\u2013381"},{"issue":"6106","key":"314_CR63","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1126\/science.1227079","volume":"338","author":"G Sugihara","year":"2012","unstructured":"Sugihara G, May R, Ye H, Hsieh C-H, Deyle E, Fogarty M, Munch S (2012) Detecting causality in complex ecosystems. Science 338(6106):496\u2013500","journal-title":"Science"},{"issue":"500","key":"314_CR64","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1080\/01621459.2012.737745","volume":"107","author":"R Killick","year":"2012","unstructured":"Killick R, Fearnhead P, Eckley IA (2012) Optimal detection of changepoints with a linear computational cost. J Am Stat Assoc 107(500):1590\u20131598","journal-title":"J Am Stat Assoc"},{"issue":"2","key":"314_CR65","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10115-016-0987-z","volume":"51","author":"S Aminikhanghahi","year":"2017","unstructured":"Aminikhanghahi S, Cook DJ (2017) A survey of methods for time series change point detection. Knowl Inf Syst 51(2):339\u2013367","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"314_CR66","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1257\/jep.15.4.101","volume":"15","author":"J Stock","year":"2001","unstructured":"Stock J, Watson MW (2001) Vector autoregressions. J Econ Perspect 15(4):101\u2013116","journal-title":"J Econ Perspect"},{"issue":"366a","key":"314_CR67","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1080\/01621459.1979.10482531","volume":"74","author":"DA Dickey","year":"1979","unstructured":"Dickey DA, Fuller WA (1979) Distribution of the estimators for autoregressive time series with a unit root. J Am Stat Assoc 74(366a):427\u2013431","journal-title":"J Am Stat Assoc"},{"key":"314_CR68","doi-asserted-by":"crossref","unstructured":"Ziegele M, Jost PB (2016) Not funny? the effects of factual versus sarcastic journalistic responses to uncivil user comments. Commun Res 0093650216671854","DOI":"10.1177\/0093650216671854"},{"key":"314_CR69","doi-asserted-by":"crossref","unstructured":"Jahnke S, Abad Borger K, Beelmann A (2021) Predictors of political violence outcomes among young people: a systematic review and meta-analysis. Polit Psychol","DOI":"10.1111\/pops.12743"},{"issue":"3","key":"314_CR70","volume":"129","author":"JT Jost","year":"2003","unstructured":"Jost JT, Glaser J, Kruglanski AW, Sulloway FJ (2003) Political conservatism as motivated social cognition. Psychol Bull 129(3):339","journal-title":"Psychol Bull"},{"issue":"5","key":"314_CR71","doi-asserted-by":"crossref","DOI":"10.1037\/0022-3514.63.5.781","volume":"63","author":"ME Turner","year":"1992","unstructured":"Turner ME, Pratkanis AR, Probasco P, Leve C (1992) Threat, cohesion, and group effectiveness. J Pers Soc Psychol 63(5):781","journal-title":"J Pers Soc Psychol"},{"issue":"30","key":"314_CR72","doi-asserted-by":"crossref","DOI":"10.1126\/sciadv.abb5824","volume":"6","author":"M Alizadeh","year":"2020","unstructured":"Alizadeh M, Shapiro JN, Buntain C, Tucker JA (2020) Content-based features predict social media influence operations. Sci Adv 6(30):5824","journal-title":"Sci Adv"},{"key":"314_CR73","first-page":"455","volume-title":"Proceedings of the fifteenth international AAAI conference on web and social media","author":"D Pacheco","year":"2021","unstructured":"Pacheco D, Hui P-M, Torres-Lugo C, Truong BT, Flammini A, Menczer F (2021) Uncovering coordinated networks on social media: methods and case studies. In: Proceedings of the fifteenth international AAAI conference on web and social media, vol\u00a015, pp\u00a0455\u2013466"},{"key":"314_CR74","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1145\/3366424.3385775","volume-title":"Companion proceedings of the web conference 2020","author":"D Pacheco","year":"2020","unstructured":"Pacheco D, Flammini A, Menczer F (2020) Unveiling coordinated groups behind white helmets disinformation. In: Companion proceedings of the web conference 2020, pp\u00a0611\u2013616"},{"key":"314_CR75","first-page":"273","volume-title":"Proceedings of the 25th international conference companion on world wide web","author":"CA Davis","year":"2016","unstructured":"Davis CA, Varol O, Ferrara E, Flammini A, Menczer F (2016) Botornot: a system to evaluate social bots. In: Proceedings of the 25th international conference companion on world wide web, pp\u00a0273\u2013274"},{"key":"314_CR76","volume-title":"Proceedings of the international AAAI conference on web and social media","author":"O Varol","year":"2017","unstructured":"Varol O, Ferrara E, Davis C, Menczer F, Flammini A (2017) Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the international AAAI conference on web and social media, vol\u00a011"},{"issue":"42","key":"314_CR77","volume":"4","author":"P-M Hui","year":"2019","unstructured":"Hui P-M, Yang K-C, Torres-Lugo C, Monroe Z, McCarty M, Serrette BD, Pentchev V, Menczer F (2019) Botslayer: real-time detection of bot amplification on Twitter. J Open Sour Softw 4(42):1706","journal-title":"J Open Sour Softw"}],"updated-by":[{"DOI":"10.1140\/epjds\/s13688-023-00393-7","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T00:00:00Z","timestamp":1691625600000}}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-021-00314-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-021-00314-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-021-00314-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T12:04:53Z","timestamp":1693224293000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-021-00314-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,24]]},"references-count":77,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["314"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-021-00314-6","relation":{"correction":[{"id-type":"doi","id":"10.1140\/epjds\/s13688-023-00393-7","asserted-by":"object"}]},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,24]]},"assertion":[{"value":"26 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: the authors reported that they used 23 \u201croot accounts\u201d, but actually used 22. And that they had erroneously reported in the manuscript that they used \u223c180k trees containing \u223c1.2M tweets. However, they actually used \u223c130k trees containing \u223c1.1M tweets.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2023","order":7,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":8,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":9,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1140\/epjds\/s13688-023-00393-7","URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-023-00393-7","order":10,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"3"}}