{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:12:36Z","timestamp":1758809556796,"version":"3.41.0"},"reference-count":66,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T00:00:00Z","timestamp":1434067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002555","name":"Seoul Women's University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100002555","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2015,6,20]]},"abstract":"<jats:p>Online social media allow users to interact with one another by sharing opinions, and these opinions have a critical impact on the way readers think and behave. Accordingly, an increasing number of &lt;i&gt;manipulators&lt;\/i&gt; deliberately spread messages to influence the public, often in an organized manner. In particular, political manipulation\u2014manipulation of opponents to win political advantage\u2014can result in serious consequences: antigovernment riots can break out, leading to candidates\u2019 defeat in an election. A few approaches have been proposed to detect such manipulation based on the level of social interaction (i.e., manipulators actively post opinions but infrequently befriend and reply to other users). However, several studies have shown that the interactions can be forged at a low cost and thus may not be effective measures of manipulation.<\/jats:p>\n          <jats:p>To go one step further, we collect a dataset for real, large-scale political manipulation, which consists of opinions found on Internet forums. These opinions are divided into manipulators and nonmanipulators. Using this collection, we demonstrate that manipulators inevitably work hard, in teams, to quickly influence a large audience. With this in mind, it could be said that a high level of collaborative efforts strongly indicates manipulation. For example, a group of manipulators may jointly post numerous opinions with a consistent theme and selectively recommend the same, well-organized opinion to promote its rank. We show that the effort measures, when combined with a supervised learning algorithm, successfully identify greater than 95% of the manipulators. We believe that the proposed method will help system administrators to accurately detect manipulators in disguise, significantly decreasing the intensity of manipulation.<\/jats:p>","DOI":"10.1145\/2767134","type":"journal-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T18:26:28Z","timestamp":1434133588000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Detection of Political Manipulation in Online Communities through Measures of Effort and Collaboration"],"prefix":"10.1145","volume":"9","author":[{"given":"Sihyung","family":"Lee","sequence":"first","affiliation":[{"name":"Seoul Women's University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,6,12]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Grouped: How Small Groups of Friends Are the Key to Influence on the Social Web (Voices That Matter). New Riders","author":"Adams Paul","year":"2011","unstructured":"Paul Adams . 2011 . Grouped: How Small Groups of Friends Are the Key to Influence on the Social Web (Voices That Matter). New Riders , Berkeley, CA . Paul Adams. 2011. Grouped: How Small Groups of Friends Are the Key to Influence on the Social Web (Voices That Matter). New Riders, Berkeley, CA."},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.5555\/645920.672836"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 22nd USENIX Conference on Security. 257--272","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne Porter Felt . 2013 . Alice in Warningland: A large-scale field study of browser security warning effectiveness . In Proceedings of the 22nd USENIX Conference on Security. 257--272 . Available at https:&sol;&sol;www.usenix.org&sol;conference&sol;usenixsecurity13&sol;technical-sessions&sol;presentation&sol;akhawe. Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in Warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the 22nd USENIX Conference on Security. 257--272. Available at https:&sol;&sol;www.usenix.org&sol;conference&sol;usenixsecurity13&sol;technical-sessions&sol;presentation&sol;akhawe."},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1109\/SP.2013.33"},{"key":"e_1_2_1_5_1","volume-title":"Retrieved","author":"News Technology BBC","year":"2011","unstructured":"BBC News Technology . 2011 . Russian Twitter Political Protests \u2018Swamped by Spam .\u2019 Retrieved February 18, 2014, from http:&sol;&sol;www.bbc.co.uk&sol;news&sol;technology-16108876. BBC News Technology. 2011. Russian Twitter Political Protests \u2018Swamped by Spam.\u2019 Retrieved February 18, 2014, from http:&sol;&sol;www.bbc.co.uk&sol;news&sol;technology-16108876."},{"key":"e_1_2_1_6_1","volume-title":"The Handbook of Political Manipulation. Retrieved","author":"Becker Kyle","year":"2014","unstructured":"Kyle Becker . 2012. The Handbook of Political Manipulation. Retrieved July 1, 2014 , from http:&sol;&sol;www.conservativedailynews.com&sol;2012&sol;05&sol;the-handbook-of-political-manipulation-a-e-2&sol;. Kyle Becker. 2012. The Handbook of Political Manipulation. Retrieved July 1, 2014, from http:&sol;&sol;www.conservativedailynews.com&sol;2012&sol;05&sol;the-handbook-of-political-manipulation-a-e-2&sol;."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference.","author":"Benevenuto Fabricio","year":"2010","unstructured":"Fabricio Benevenuto , Gabriel Magno , Tiago Rodrigues , and Virgilio Almeida . 2010 . Detecting spammers on Twitter . In Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference. Available at http:&sol;&sol;ceas.cc&sol;2010&sol;papers&sol;Paper&percnt;2021.pdf. Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. 2010. Detecting spammers on Twitter. In Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference. Available at http:&sol;&sol;ceas.cc&sol;2010&sol;papers&sol;Paper&percnt;2021.pdf."},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1145\/1571941.1572047"},{"key":"e_1_2_1_9_1","volume-title":"Fowler","author":"Bond Robert M.","year":"2012","unstructured":"Robert M. Bond , Christopher J. Fariss , Jason J. Jones , Adam D. I. Kramer , Cameron Marlow , Jaime E. Settle , and James H . Fowler . 2012 . A 61-million-person experiment in social influence and political mobilization. Nature 489,7415, 295--298. DOI:http:&sol;&sol;dx.doi.org&sol;10.1038&sol;nature11421 Robert M. Bond, Christopher J. Fariss, Jason J. Jones, Adam D. I. Kramer, Cameron Marlow, Jaime E. Settle, and James H. Fowler. 2012. A 61-million-person experiment in social influence and political mobilization. Nature 489,7415, 295--298. DOI:http:&sol;&sol;dx.doi.org&sol;10.1038&sol;nature11421"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_2_1_11_1","volume-title":"Social Media Outranks TV as UK's Favourite Pastime. Retrieved","author":"Burns Rebecca","year":"2014","unstructured":"Rebecca Burns . 2012. Social Media Outranks TV as UK's Favourite Pastime. Retrieved July 1, 2014 , from http:&sol;&sol;www.fourthsource.com&sol;news&sol;social-media-outranks-tv-as-uks-favourite-pastime-6218. Rebecca Burns. 2012. Social Media Outranks TV as UK's Favourite Pastime. Retrieved July 1, 2014, from http:&sol;&sol;www.fourthsource.com&sol;news&sol;social-media-outranks-tv-as-uks-favourite-pastime-6218."},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.3115\/974147.974169"},{"doi-asserted-by":"crossref","unstructured":"Damon Centola. 2010. The spread of behavior in an online social network experiment. Science 329 5996 1194--1197. DOI:http:&sol;&sol;dx.doi.org&sol;10.1126&sol;science.1185231  Damon Centola. 2010. The spread of behavior in an online social network experiment. Science 329 5996 1194--1197. DOI:http:&sol;&sol;dx.doi.org&sol;10.1126&sol;science.1185231","key":"e_1_2_1_13_1","DOI":"10.1126\/science.1185231"},{"key":"e_1_2_1_14_1","volume-title":"Retrieved","author":"Chang Chih-Chung","year":"2013","unstructured":"Chih-Chung Chang and Chih-Jen Lin . 2013 . LIBSVM\u2014A Library for Support Vector Machines (LIBSVM) . Retrieved January 27, 2014 from http:&sol;&sol;www.csie.ntu.edu.tw&sol;&sim;cjlin&sol;libsvm&sol;. Chih-Chung Chang and Chih-Jen Lin. 2013. LIBSVM\u2014A Library for Support Vector Machines (LIBSVM). Retrieved January 27, 2014 from http:&sol;&sol;www.csie.ntu.edu.tw&sol;&sim;cjlin&sol;libsvm&sol;."},{"key":"e_1_2_1_15_1","volume-title":"Prosecutors Detail Attempt to Sway South Korean Election. Retrieved","author":"Choe Sang-Hun","year":"2014","unstructured":"Sang-Hun Choe . 2013. Prosecutors Detail Attempt to Sway South Korean Election. Retrieved July 1, 2014 , from http:&sol;&sol;www.nytimes.com&sol;2013&sol;11&sol;22&sol;world&sol;asia&sol;prosecutors-detail-bid-to-sway-south-korean-election.html?&lowbar;r&equals;0. Sang-Hun Choe. 2013. Prosecutors Detail Attempt to Sway South Korean Election. Retrieved July 1, 2014, from http:&sol;&sol;www.nytimes.com&sol;2013&sol;11&sol;22&sol;world&sol;asia&sol;prosecutors-detail-bid-to-sway-south-korean-election.html?&lowbar;r&equals;0."},{"key":"e_1_2_1_16_1","volume-title":"Retrieved","author":"Clayton Mark","year":"2013","unstructured":"Mark Clayton . 2013 . In Cyber Arms Race, North Korea Emerging as a Power, Not a Pushover . Retrieved February 18, 2014, from http:&sol;&sol;www.csmonitor.com&sol;World&sol;Security-Watch&sol;2013&sol;1019&sol;In-cyberarms-race-North-Korea-emerging-as-a-power-not-a-pushover. Mark Clayton. 2013. In Cyber Arms Race, North Korea Emerging as a Power, Not a Pushover. Retrieved February 18, 2014, from http:&sol;&sol;www.csmonitor.com&sol;World&sol;Security-Watch&sol;2013&sol;1019&sol;In-cyberarms-race-North-Korea-emerging-as-a-power-not-a-pushover."},{"volume-title":"Clean Center Policies. Retrieved","year":"2014","unstructured":"Daum. 2014. Clean Center Policies. Retrieved July 1, 2014 , from http:&sol;&sol;cs.daum.net&sol;faq&sol;site&sol;85.html. Daum. 2014. Clean Center Policies. Retrieved July 1, 2014, from http:&sol;&sol;cs.daum.net&sol;faq&sol;site&sol;85.html.","key":"e_1_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1016\/S0377-2217(00)00244-7"},{"key":"e_1_2_1_19_1","volume-title":"Retrieved","author":"Fawcett Harry","year":"2013","unstructured":"Harry Fawcett . 2013 . South Korea's Political Cyber War . Retrieved February 18, 2014, from http:&sol;&sol;blogs.aljazeera.com&sol;blog&sol;asia&sol;south-koreas-political-cyber-war. Harry Fawcett. 2013. South Korea's Political Cyber War. Retrieved February 18, 2014, from http:&sol;&sol;blogs.aljazeera.com&sol;blog&sol;asia&sol;south-koreas-political-cyber-war."},{"volume-title":"Proceedings of the International Joint Conferences on Artificial Intelligence. 1022--1027","author":"Usama","unstructured":"Usama M. Fayyad and Keki B. Irani. 1993. Multi-interval discretization of continuous-valued attributes for classification learning . In Proceedings of the International Joint Conferences on Artificial Intelligence. 1022--1027 . Available at http:&sol;&sol;ijcai.org&sol;Past&percnt;20Proceedings&sol;IJCAI-93-VOL2&sol;PDF&sol;022.pdf. Usama M. Fayyad and Keki B. Irani. 1993. Multi-interval discretization of continuous-valued attributes for classification learning. In Proceedings of the International Joint Conferences on Artificial Intelligence. 1022--1027. Available at http:&sol;&sol;ijcai.org&sol;Past&percnt;20Proceedings&sol;IJCAI-93-VOL2&sol;PDF&sol;022.pdf.","key":"e_1_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1037\/h0031619"},{"volume-title":"Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World","author":"Fraser Matthew","unstructured":"Matthew Fraser and Soumitra Dutta . 2008. Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World . Wiley , Chichester, West Sussex, UK. Matthew Fraser and Soumitra Dutta. 2008. Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World. Wiley, Chichester, West Sussex, UK.","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","first-page":"1","article-title":"A short introduction to boosting","volume":"14","author":"Freund Yoav","year":"1999","unstructured":"Yoav Freund and Robert E. Schapire . 1999 . A short introduction to boosting . Journal of Japanese Society for Artificial Intelligence 14 , 5, 1 -- 14 . Yoav Freund and Robert E. Schapire. 1999. A short introduction to boosting. Journal of Japanese Society for Artificial Intelligence 14, 5, 1--14.","journal-title":"Journal of Japanese Society for Artificial Intelligence"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1145\/1879141.1879147"},{"doi-asserted-by":"publisher","key":"e_1_2_1_25_1","DOI":"10.1145\/2441776.2441895"},{"key":"e_1_2_1_26_1","volume-title":"90&percnt","author":"Gesenhues Amy","year":"2014","unstructured":"Amy Gesenhues . 2013. Survey : 90&percnt ; of Customers Say Buying Decisions Are Influenced by Online Reviews. Retrieved July 1, 2014 , from http:&sol;&sol;marketingland.com&sol;survey-customers-more-frustrated-by-how-long-it-takes-to-resolve-a-customer-service-issue-than-the-resolution-38756. Amy Gesenhues. 2013. Survey: 90&percnt; of Customers Say Buying Decisions Are Influenced by Online Reviews. Retrieved July 1, 2014, from http:&sol;&sol;marketingland.com&sol;survey-customers-more-frustrated-by-how-long-it-takes-to-resolve-a-customer-service-issue-than-the-resolution-38756."},{"key":"e_1_2_1_27_1","volume-title":"Twitter. In Proceedings of the KDD Workshop on Social Network Analysis. ACM","author":"Ghosh Rumi","year":"2011","unstructured":"Rumi Ghosh , Tawan Surachawala , and Kristina Lerman . 2011 . Entropy-based classification of \u2018Retweeting\u2019 activity on Twitter. In Proceedings of the KDD Workshop on Social Network Analysis. ACM , New York. NY. Rumi Ghosh, Tawan Surachawala, and Kristina Lerman. 2011. Entropy-based classification of \u2018Retweeting\u2019 activity on Twitter. In Proceedings of the KDD Workshop on Social Network Analysis. ACM, New York. NY."},{"key":"e_1_2_1_28_1","volume-title":"Global Risks 2013","author":"Howell Lee","unstructured":"Lee Howell . 2013. Digital wildfires in a hyperconnected world . In Global Risks 2013 ( 8 th ed.). World Economic Forum . Available at http:&sol;&sol;reports.weforum.org&sol;global-risks-2013&sol;title-page&sol;. Lee Howell. 2013. Digital wildfires in a hyperconnected world. In Global Risks 2013 (8th ed.). World Economic Forum. Available at http:&sol;&sol;reports.weforum.org&sol;global-risks-2013&sol;title-page&sol;.","edition":"8"},{"volume-title":"A Close Match between Nate and Duam in Weekly Visits. Retrieved","year":"2014","unstructured":"iNews. 2009. A Close Match between Nate and Duam in Weekly Visits. Retrieved July 1, 2014 , from http:&sol;&sol;news.inews24.com&sol;php&sol;news&lowbar;view.php?g&lowbar;menu&equals;020300&g&lowbar;&lowbar;serial&equals;453619. iNews. 2009. A Close Match between Nate and Duam in Weekly Visits. Retrieved July 1, 2014, from http:&sol;&sol;news.inews24.com&sol;php&sol;news&lowbar;view.php?g&lowbar;menu&equals;020300&g&lowbar;&lowbar;serial&equals;453619.","key":"e_1_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1177\/0037549712462621"},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_2_1_32_1","volume-title":"Infographic: How South Korean Intelligence Interfered in Election. Retrieved","author":"Joy Anna","year":"2013","unstructured":"Anna Joy . 2013 . Infographic: How South Korean Intelligence Interfered in Election. Retrieved July 1, 2014, from http:&sol;&sol;www.koreabang.com&sol;2013&sol;features&sol;infographic-how-south-korean-intelligence-manipulated-election.html. Anna Joy. 2013. Infographic: How South Korean Intelligence Interfered in Election. Retrieved July 1, 2014, from http:&sol;&sol;www.koreabang.com&sol;2013&sol;features&sol;infographic-how-south-korean-intelligence-manipulated-election.html."},{"key":"e_1_2_1_33_1","volume-title":"Evidence of Manipulating Recommendation Counts. Retrieved","author":"Jung Arthur","year":"2014","unstructured":"Arthur Jung . 2012. Evidence of Manipulating Recommendation Counts. Retrieved July 1, 2014 , from http:&sol;&sol;arthurjung.tistory.com&sol;120. Arthur Jung. 2012. Evidence of Manipulating Recommendation Counts. Retrieved July 1, 2014, from http:&sol;&sol;arthurjung.tistory.com&sol;120."},{"key":"e_1_2_1_34_1","volume-title":"Police Suspected of Destroying Evidence Involving NIS Probe. Retrieved","author":"Kang Hyun-Kyung","year":"2014","unstructured":"Hyun-Kyung Kang . 2013. Police Suspected of Destroying Evidence Involving NIS Probe. Retrieved November 4, 2014 , from www.koreatimes.co.kr&sol;www&sol;news&sol;nation&sol;2013&sol;08&sol;116&lowbar;136430.html. Hyun-Kyung Kang. 2013. Police Suspected of Destroying Evidence Involving NIS Probe. Retrieved November 4, 2014, from www.koreatimes.co.kr&sol;www&sol;news&sol;nation&sol;2013&sol;08&sol;116&lowbar;136430.html."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 5th International Conference on Future Computational Technologies and Applications. 56--61","author":"Klassen Myungsook","year":"2013","unstructured":"Myungsook Klassen . 2013 . Twitter data preprocessing for spam detection . In Proceedings of the 5th International Conference on Future Computational Technologies and Applications. 56--61 . Myungsook Klassen. 2013. Twitter data preprocessing for spam detection. In Proceedings of the 5th International Conference on Future Computational Technologies and Applications. 56--61."},{"key":"e_1_2_1_36_1","volume-title":"Retrieved","author":"Koo Ken","year":"2013","unstructured":"Ken Koo . 2013 . Korean Spy Agency Accused of Influencing Presidential Election . Retrieved February 18, 2014, from http:&sol;&sol;www.koreabang.com&sol;2013&sol;stories&sol;korean-spy-agency-accused-of-influencing-presidential-election.html. Ken Koo. 2013. Korean Spy Agency Accused of Influencing Presidential Election. Retrieved February 18, 2014, from http:&sol;&sol;www.koreabang.com&sol;2013&sol;stories&sol;korean-spy-agency-accused-of-influencing-presidential-election.html."},{"doi-asserted-by":"publisher","key":"e_1_2_1_37_1","DOI":"10.1109\/ICDM.2013.61"},{"doi-asserted-by":"publisher","key":"e_1_2_1_38_1","DOI":"10.2307\/2529310"},{"key":"e_1_2_1_39_1","volume-title":"Manipulation of Recommendation Counts Spotted by Netizen. Retrieved","author":"Lee Gyeduk","year":"2014","unstructured":"Gyeduk Lee . 2013. Manipulation of Recommendation Counts Spotted by Netizen. Retrieved November 4, 2014 , from http:&sol;&sol;www.pressbyple.com&sol;news&sol;articleView.html?idxno&equals;11841. Gyeduk Lee. 2013. Manipulation of Recommendation Counts Spotted by Netizen. Retrieved November 4, 2014, from http:&sol;&sol;www.pressbyple.com&sol;news&sol;articleView.html?idxno&equals;11841."},{"key":"e_1_2_1_40_1","volume-title":"Retrieved","author":"Lee Sihyung","year":"2014","unstructured":"Sihyung Lee . 2014 . Popular List of Political-Campaign Words . Retrieved June 30, 2014, from https:&sol;&sol;sites.google.com&sol;site&sol;sihyungleeweb&sol;research&sol;political&lowbar;manipulation&sol;popular-list-of-political-campaign-words. Sihyung Lee. 2014. Popular List of Political-Campaign Words. Retrieved June 30, 2014, from https:&sol;&sol;sites.google.com&sol;site&sol;sihyungleeweb&sol;research&sol;political&lowbar;manipulation&sol;popular-list-of-political-campaign-words."},{"volume-title":"Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data","author":"Liu Bing","unstructured":"Bing Liu . 2011. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data . Springer , New York, NY . Bing Liu. 2011. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. Springer, New York, NY.","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","volume-title":"Manipulation of Recommendation Counts by the Military and Government Agencies. Retrieved","author":"Today Media","year":"2014","unstructured":"Media Today . 2013. Manipulation of Recommendation Counts by the Military and Government Agencies. Retrieved July 1, 2014 , from http:&sol;&sol;www.mediatoday.co.kr&sol;news&sol;articleView.html?idxno&equals;112725. Media Today. 2013. Manipulation of Recommendation Counts by the Military and Government Agencies. Retrieved July 1, 2014, from http:&sol;&sol;www.mediatoday.co.kr&sol;news&sol;articleView.html?idxno&equals;112725."},{"key":"e_1_2_1_43_1","volume-title":"Collective Attention in the Age of Misinformation. Retrieved","author":"Mocanu Delia","year":"2014","unstructured":"Delia Mocanu , Luca Rossi , Qian Zhang , Marton Karsai , and Walter Quattrociocchi . 2014. Collective Attention in the Age of Misinformation. Retrieved July 1, 2014 , from http:&sol;&sol;arxiv.org&sol;abs&sol;1403.3344. Delia Mocanu, Luca Rossi, Qian Zhang, Marton Karsai, and Walter Quattrociocchi. 2014. Collective Attention in the Age of Misinformation. Retrieved July 1, 2014, from http:&sol;&sol;arxiv.org&sol;abs&sol;1403.3344."},{"volume-title":"Proceedings of the 20th USENIX Conference on Security.","author":"Motoyama Marti","unstructured":"Marti Motoyama , Damon McCoy , Kirill Levchenko , Stefan Savage , and Geoffrey M. Voelker . 2011. Dirty jobs: The role of freelance labor in Web service abuse . In Proceedings of the 20th USENIX Conference on Security. Available at https:&sol;&sol;www.usenix.org&sol;legacy&sol;events&sol;sec11&sol;tech&sol;full&lowbar;papers&sol;Motoyama.pdf. Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. 2011. Dirty jobs: The role of freelance labor in Web service abuse. In Proceedings of the 20th USENIX Conference on Security. Available at https:&sol;&sol;www.usenix.org&sol;legacy&sol;events&sol;sec11&sol;tech&sol;full&lowbar;papers&sol;Motoyama.pdf.","key":"e_1_2_1_44_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1145\/2187836.2187863"},{"volume-title":"Responsibility of Users for Their Postings. Retrieved","year":"2014","unstructured":"Nate. 2014. Responsibility of Users for Their Postings. Retrieved July 1, 2014 , from http:&sol;&sol;www.nate.com&sol;policy&sol;legal.html. Nate. 2014. Responsibility of Users for Their Postings. Retrieved July 1, 2014, from http:&sol;&sol;www.nate.com&sol;policy&sol;legal.html.","key":"e_1_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1109\/ICPR.2008.4761278"},{"key":"e_1_2_1_48_1","volume-title":"Retrieved","author":"Olsen Harald","year":"2012","unstructured":"Harald Olsen . 2012 . North Korea Weighs in on South Korean Presidential Election . Retrieved February 18, 2014, from http:&sol;&sol;www.koreabang.com&sol;2012&sol;stories&sol;north-korea-weighs-in-on-south-korean-presidential-election.html. Harald Olsen. 2012. North Korea Weighs in on South Korean Presidential Election. Retrieved February 18, 2014, from http:&sol;&sol;www.koreabang.com&sol;2012&sol;stories&sol;north-korea-weighs-in-on-south-korean-presidential-election.html."},{"volume-title":"Opinion Mining and Sentiment Analysis","author":"Pang Bo","unstructured":"Bo Pang and Lillian Lee . 2008. Opinion Mining and Sentiment Analysis . Now Publishers , Delft, Netherlands . Bo Pang and Lillian Lee. 2008. Opinion Mining and Sentiment Analysis. Now Publishers, Delft, Netherlands.","key":"e_1_2_1_49_1"},{"volume-title":"Mad as Hell: How the Tea Party Movement Is Fundamentally Remaking Our Two-Party System","author":"Rasmussen Scott","unstructured":"Scott Rasmussen and Doug Schoen . 2010. Mad as Hell: How the Tea Party Movement Is Fundamentally Remaking Our Two-Party System . HarperCollins . New York, NY. Scott Rasmussen and Doug Schoen. 2010. Mad as Hell: How the Tea Party Movement Is Fundamentally Remaking Our Two-Party System. HarperCollins. New York, NY.","key":"e_1_2_1_50_1"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 5th International Conference on Weblogs and Social Media. 297--304","author":"Ratkiewicz Jacob","year":"2011","unstructured":"Jacob Ratkiewicz , Michael Conover , Mark Meiss , Bruno Goncalves , Alessandro Flammini , and Filippo Menczer . 2011 . Detecting and tracking political abuse in social media . In Proceedings of the 5th International Conference on Weblogs and Social Media. 297--304 . Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Goncalves, Alessandro Flammini, and Filippo Menczer. 2011. Detecting and tracking political abuse in social media. In Proceedings of the 5th International Conference on Weblogs and Social Media. 297--304."},{"volume-title":"The Art of Political Manipulation","author":"Riker William H.","unstructured":"William H. Riker . 1986. The Art of Political Manipulation . Yale University Press , New Haven, CT . William H. Riker. 1986. The Art of Political Manipulation. Yale University Press, New Haven, CT.","key":"e_1_2_1_52_1"},{"volume-title":"Medici Media","author":"Kyungmin Shin. 2013. NIS (National Intelligence Service).","unstructured":"Kyungmin Shin. 2013. NIS (National Intelligence Service). Medici Media , Seoul . Kyungmin Shin. 2013. NIS (National Intelligence Service). Medici Media, Seoul.","key":"e_1_2_1_53_1"},{"key":"e_1_2_1_54_1","volume-title":"Denton Jr","author":"Trent Judith S.","year":"2011","unstructured":"Judith S. Trent , Robert V. Friedenberg , and Robert E . Denton Jr . 2011 . Political Campaign Communication: Principles and Practices (7th ed.). Rowman &amp; Littlefield, Lanham, MD. Judith S. Trent, Robert V. Friedenberg, and Robert E. Denton Jr. 2011. Political Campaign Communication: Principles and Practices (7th ed.). Rowman &amp; Littlefield, Lanham, MD."},{"doi-asserted-by":"publisher","key":"e_1_2_1_55_1","DOI":"10.1073\/pnas.1116502109"},{"doi-asserted-by":"publisher","key":"e_1_2_1_56_1","DOI":"10.5555\/211359"},{"volume-title":"Proceedings of the 22nd USENIX Conference on Security. 241--256","author":"Wang Gang","unstructured":"Gang Wang , Tristan Konolige , Christo Wilson , Xiao Wang , Haitao Zheng , and Ben Y. Zhao . 2013. You are how you click: Clickstream analysis for sybil detection . In Proceedings of the 22nd USENIX Conference on Security. 241--256 . Available at https:&sol;&sol;www.usenix.org&sol;conference&sol;usenixsecurity13&sol;technical-sessions&sol;presentation&sol;wang. Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben Y. Zhao. 2013. You are how you click: Clickstream analysis for sybil detection. In Proceedings of the 22nd USENIX Conference on Security. 241--256. Available at https:&sol;&sol;www.usenix.org&sol;conference&sol;usenixsecurity13&sol;technical-sessions&sol;presentation&sol;wang.","key":"e_1_2_1_57_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_58_1","DOI":"10.1145\/2187836.2187928"},{"volume-title":"Weka 3: Data Mining Software in Java. Retrieved","year":"2014","unstructured":"Weka. 2014. Weka 3: Data Mining Software in Java. Retrieved July 1, 2014 , from http:&sol;&sol;www.cs.waikato.ac.nz&sol;ml&sol;weka&sol;index.html. Weka. 2014. Weka 3: Data Mining Software in Java. Retrieved July 1, 2014, from http:&sol;&sol;www.cs.waikato.ac.nz&sol;ml&sol;weka&sol;index.html.","key":"e_1_2_1_59_1"},{"volume-title":"The 2004 Presidential Campaign: A Communication Perspective","author":"Wiese Danielle R.","unstructured":"Danielle R. Wiese . 2005. Campaign 2004: Developments in cyberpolitics . In The 2004 Presidential Campaign: A Communication Perspective , R. E. Denton (Ed.). Rowman &amp; Littlefield, Lanham, MD , 217--240. Danielle R. Wiese. 2005. Campaign 2004: Developments in cyberpolitics. In The 2004 Presidential Campaign: A Communication Perspective, R. E. Denton (Ed.). Rowman &amp; Littlefield, Lanham, MD, 217--240.","key":"e_1_2_1_60_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_61_1","DOI":"10.1145\/2505515.2505700"},{"doi-asserted-by":"publisher","key":"e_1_2_1_62_1","DOI":"10.1023\/A:1009982220290"},{"volume-title":"Proceedings of the 14th International Conference on Machine Learning. 412--420","author":"Yang Yiming","unstructured":"Yiming Yang and Jan O. Pedersen . 1997. A comparative study on feature selection in text categorization . In Proceedings of the 14th International Conference on Machine Learning. 412--420 . Yiming Yang and Jan O. Pedersen. 1997. A comparative study on feature selection in text categorization. In Proceedings of the 14th International Conference on Machine Learning. 412--420.","key":"e_1_2_1_63_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_64_1","DOI":"10.1145\/2556609"},{"doi-asserted-by":"publisher","key":"e_1_2_1_65_1","DOI":"10.1109\/TNET.2009.2034047"},{"doi-asserted-by":"publisher","key":"e_1_2_1_66_1","DOI":"10.1109\/TNET.2008.923723"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2767134","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2767134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:02Z","timestamp":1750225382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2767134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,12]]},"references-count":66,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6,20]]}},"alternative-id":["10.1145\/2767134"],"URL":"https:\/\/doi.org\/10.1145\/2767134","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2015,6,12]]},"assertion":[{"value":"2014-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}