{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:04:54Z","timestamp":1771236294496,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,8]],"date-time":"2017-02-08T00:00:00Z","timestamp":1486512000000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141410095"],"award-info":[{"award-number":["N000141410095"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2,8]]},"DOI":"10.1145\/2835776.2835807","type":"proceedings-article","created":{"date-parts":[[2016,2,4]],"date-time":"2016-02-04T11:26:02Z","timestamp":1454585162000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Understanding and Identifying Advocates for Political Campaigns on Social Media"],"prefix":"10.1145","author":[{"given":"Suhas","family":"Ranganath","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Xia","family":"Hu","sequence":"additional","affiliation":[{"name":"330B H.R. Bright Building, College Station, TX, USA"}]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[{"name":"Yahoo Labs, Sunnyvale, CA, USA"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,2,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A scalable optimization approach for fitting canonical tensor decompositions. J.Chemo","author":"Acar E.","year":"2011","unstructured":"E. Acar, D. M. Dunlavy, and T. G. Kolda. A scalable optimization approach for fitting canonical tensor decompositions. J.Chemo, 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14524"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1215842"},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/goo.gl\/JKdmlP","author":"Baruah A.","year":"2014","unstructured":"A. Baruah. Namo Brigade. http:\/\/goo.gl\/JKdmlP, 2014. {Online; accessed 7-May-2015}."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531636"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2009.05.002"},{"key":"e_1_3_2_1_8_1","volume-title":"Field and laboratory methods for general ecology","author":"Brower J. E.","year":"1998","unstructured":"J. E. Brower, J. H. Zar, and C. N. Von Ende. Field and laboratory methods for general ecology. 1998."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492637"},{"key":"e_1_3_2_1_10_1","volume-title":"Influence: The psychology of persuasion","author":"Cialdini R. B.","year":"1993","unstructured":"R. B. Cialdini. Influence: The psychology of persuasion. Quill New York, NY, 1993."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921632.1921636"},{"key":"e_1_3_2_1_12_1","volume-title":"Political parties as campaign organizations","author":"Farrell D. M.","year":"2006","unstructured":"D. M. Farrell and P. Webb. Political parties as campaign organizations. 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"DTIC Document","author":"Gilbert I.","year":"2010","unstructured":"I. Gilbert and T. Henry. Persuasion detection in conversation. Technical report, DTIC Document, 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"Broadcasters and hidden influentials in online protest diffusion. American Behavioral Scientist, page 0002764213479371","author":"Gonz\u00e1lez-Bail\u00f3n S.","year":"2013","unstructured":"S. Gonz\u00e1lez-Bail\u00f3n, J. Borge-Holthoefer, and Y. Moreno. Broadcasters and hidden influentials in online protest diffusion. American Behavioral Scientist, page 0002764213479371, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487713"},{"key":"e_1_3_2_1_16_1","volume-title":"NVS","author":"Guo C.","year":"2013","unstructured":"C. Guo and G. D. Saxton. Tweeting social change: How social media are changing nonprofit advocacy. NVS, 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2540128.2540508"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/3343268"},{"key":"e_1_3_2_1_19_1","unstructured":"A. Khullar and A. Haridasan. Politicians slug it out in India's first social media election. http:\/\/goo.gl\/ZXZm3W 2014. {Online; accessed 9-November-2014}."},{"key":"e_1_3_2_1_20_1","volume-title":"CHI Workshop on Microblogging","author":"Kim D.","year":"2010","unstructured":"D. Kim, Y. Jo, I.-C. Moon, and A. Oh. Analysis of twitter lists as a potential source for discovering latent characteristics of users. In CHI Workshop on Microblogging, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542182.2542191"},{"key":"e_1_3_2_1_23_1","volume-title":"ICWSM","author":"Lee K.","year":"2013","unstructured":"K. Lee, P. Tamilarasan, and J. Caverlee. Crowdturfers, campaigns, and social media: Tracking and revealing crowdsourced manipulation of social media. In ICWSM, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.59"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993077.1993081"},{"key":"e_1_3_2_1_26_1","unstructured":"A. Lulla. Achtung! It's the NaMo Brigade! http:\/\/goo.gl\/XeHEzf 2014. {Online; accessed 14-December-2015}."},{"key":"e_1_3_2_1_27_1","volume-title":"ICWSM","author":"Lumezanu C.","year":"2012","unstructured":"C. Lumezanu, N. Feamster, and H. Klein. # bias: Measuring the tweeting behavior of propagandists. In ICWSM, 2012."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1086\/226464"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.2.2012.0001"},{"key":"e_1_3_2_1_30_1","unstructured":"A. Palmer. NRA campaign in high gear. http:\/\/goo.gl\/PYBXDq 2014. {Online; accessed 9-November-2014}."},{"key":"e_1_3_2_1_31_1","volume-title":"Linguistic inquiry and word count: Liwc","author":"Pennebaker J. W.","year":"2001","unstructured":"J. W. Pennebaker, M. E. Francis, and R. J. Booth. Linguistic inquiry and word count: Liwc 2001. Mahway: Lawrence Erlbaum Associates, 2001."},{"key":"e_1_3_2_1_32_1","first-page":"6","article-title":"A theory of speech codes","author":"Philipsen G.","year":"1997","unstructured":"G. Philipsen, G. Philipsen, and T. Albrecht. A theory of speech codes. Dev.CommTheo, 6, 1997.","journal-title":"Dev.CommTheo"},{"key":"e_1_3_2_1_33_1","volume-title":"ICWSM","author":"Ratkiewicz J.","year":"2011","unstructured":"J. Ratkiewicz, M. Conover, M. Meiss, B. Gon\u00e7alves, A. Flammini, and F. Menczer. Detecting and tracking political abuse in social media. In ICWSM, 2011."},{"key":"e_1_3_2_1_34_1","unstructured":"RiteTag. Twitter hashtags. http:\/\/goo.gl\/X88aY7 2014. {Online; accessed 7-August-2014}."},{"key":"e_1_3_2_1_35_1","volume-title":"http:\/\/goo.gl\/OyDDGR","author":"Robinson M.","year":"2014","unstructured":"M. Robinson. NRA, PRO-GUN, GUN OWNER. http:\/\/goo.gl\/OyDDGR, 2014. {Online; accessed 7-August-2014}."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557109"},{"key":"e_1_3_2_1_37_1","volume-title":"http:\/\/goo.gl\/NvxAw6","author":"Today I.","year":"2014","unstructured":"I. Today. Rise of the Cyber Hindu. http:\/\/goo.gl\/NvxAw6, 2014. {Online; accessed 7-May-2015}."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531633"},{"key":"e_1_3_2_1_39_1","volume-title":"ICWSM","author":"Wong F. M. F.","year":"2013","unstructured":"F. M. F. Wong, C. W. Tan, S. Sen, and M. Chiang. Quantifying political leaning from tweets and retweets. In ICWSM, 2013."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.07.002"}],"event":{"name":"WSDM 2016: Ninth ACM International Conference on Web Search and Data Mining","location":"San Francisco California USA","acronym":"WSDM 2016","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Ninth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835776.2835807","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2835776.2835807","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2835776.2835807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:41:19Z","timestamp":1763458879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835776.2835807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,8]]},"references-count":40,"alternative-id":["10.1145\/2835776.2835807","10.1145\/2835776"],"URL":"https:\/\/doi.org\/10.1145\/2835776.2835807","relation":{},"subject":[],"published":{"date-parts":[[2016,2,8]]},"assertion":[{"value":"2016-02-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}