{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:21:02Z","timestamp":1767666062729,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3316494","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"162-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Who Falls for Online Political Manipulation?"],"prefix":"10.1145","author":[{"given":"Adam","family":"Badawy","sequence":"first","affiliation":[{"name":"USC ISI"}]},{"given":"Kristina","family":"Lerman","sequence":"additional","affiliation":[{"name":"USC ISI"}]},{"given":"Emilio","family":"Ferrara","sequence":"additional","affiliation":[{"name":"USC ISI"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apoorv Agarwal Boyi Xie Ilia Vovsha 2011. Sentiment analysis of twitter data. In ACL. 30\u201338.  Apoorv Agarwal Boyi Xie Ilia Vovsha 2011. Sentiment analysis of twitter data. In ACL. 30\u201338."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Adam Badawy Emilio Ferrara and Kristina Lerman. 2018. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign. In ASONAM. 258\u2013265.  Adam Badawy Emilio Ferrara and Kristina Lerman. 2018. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign. In ASONAM. 258\u2013265.","DOI":"10.1109\/ASONAM.2018.8508646"},{"key":"e_1_3_2_1_3_1","volume-title":"Exposure to ideologically diverse news and opinion on Facebook. Science","author":"Bakshy Eytan","year":"2015","unstructured":"Eytan Bakshy , Solomon Messing , and Lada\u00a0 A Adamic . 2015. Exposure to ideologically diverse news and opinion on Facebook. Science ( 2015 ). Eytan Bakshy, Solomon Messing, and Lada\u00a0A Adamic. 2015. Exposure to ideologically diverse news and opinion on Facebook. Science (2015)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. First Monday 11(2016).  Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. First Monday 11(2016).","DOI":"10.5210\/fm.v21i11.7090"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"M Conover B Gon\u00e7alves J Ratkiewicz 2011. Predicting the Political Alignment of Twitter Users. In Social Computing. 192\u2013199.  M Conover B Gon\u00e7alves J Ratkiewicz 2011. Predicting the Political Alignment of Twitter Users. In Social Computing. 192\u2013199.","DOI":"10.1109\/PASSAT\/SocialCom.2011.34"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055135"},{"key":"e_1_3_2_1_7_1","unstructured":"Gabor Csardi and Tamas Nepusz. 2006. The igraph software package for complex network research. InterJournal Complex Systems(2006).  Gabor Csardi and Tamas Nepusz. 2006. The igraph software package for complex network research. InterJournal Complex Systems(2006)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Emilio Ferrara. 2017. Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday 22(2017).  Emilio Ferrara. 2017. Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday 22(2017).","DOI":"10.5210\/fm.v22i8.8005"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Emilio Ferrara Onur Varol Filippo Menczer 2016. Detection of promoted social media campaigns. In ICWSM. 563\u2013566.  Emilio Ferrara Onur Varol Filippo Menczer 2016. Detection of promoted social media campaigns. In ICWSM. 563\u2013566.","DOI":"10.1609\/icwsm.v10i1.14772"},{"key":"e_1_3_2_1_12_1","volume-title":"Does Russian propaganda work?The Washington Quarterly 39, 2","author":"Gerber P","year":"2016","unstructured":"Theodore\u00a0 P Gerber and Jane Zavisca . 2016. Does Russian propaganda work?The Washington Quarterly 39, 2 ( 2016 ), 79\u201398. Theodore\u00a0P Gerber and Jane Zavisca. 2016. Does Russian propaganda work?The Washington Quarterly 39, 2 (2016), 79\u201398."},{"key":"e_1_3_2_1_13_1","volume-title":"News Use Across Social Medial Platforms","author":"Gottfried Jeffrey","year":"2016","unstructured":"Jeffrey Gottfried and Elisa Shearer . 2016. News Use Across Social Medial Platforms 2016 . Pew Research Center . Jeffrey Gottfried and Elisa Shearer. 2016. News Use Across Social Medial Platforms 2016. Pew Research Center."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0507655102"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Philip Howard. 2006. New media campaigns and the managed citizen.  Philip Howard. 2006. New media campaigns and the managed citizen.","DOI":"10.1017\/CBO9780511615986"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Philip Howard and Bence Kollanyi. 2016. Bots # strongerin and# brexit: Computational propaganda during the uk-eu referendum. (2016).  Philip Howard and Bence Kollanyi. 2016. Bots # strongerin and# brexit: Computational propaganda during the uk-eu referendum. (2016).","DOI":"10.2139\/ssrn.2798311"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090150.2090161"},{"key":"e_1_3_2_1_18_1","volume-title":"Positivity of the English language. PloS one 7, 1","author":"Kloumann M","year":"2012","unstructured":"Isabel\u00a0 M Kloumann , Christopher\u00a0 M Danforth , Kameron\u00a0Decker Harris , 2012. Positivity of the English language. PloS one 7, 1 ( 2012 ). Isabel\u00a0M Kloumann, Christopher\u00a0M Danforth, Kameron\u00a0Decker Harris, 2012. Positivity of the English language. PloS one 7, 1 (2012)."},{"key":"e_1_3_2_1_19_1","unstructured":"Bence Kollanyi Philip Howard and Samuel Woolley. 2016. Bots and automation over Twitter during the first US Presidential debate. (2016).  Bence Kollanyi Philip Howard and Samuel Woolley. 2016. Bots and automation over Twitter during the first US Presidential debate. (2016)."},{"key":"e_1_3_2_1_20_1","volume-title":"Media manipulation and disinformation online","author":"Marwick Alice","year":"2017","unstructured":"Alice Marwick and Rebecca Lewis . 2017. Media manipulation and disinformation online . Data & Society Research Institute( 2017 ). Alice Marwick and Rebecca Lewis. 2017. Media manipulation and disinformation online. Data & Society Research Institute(2017)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1230456"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0184148"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Fred Morstatter J\u00fcrgen Pfeffer Huan Liu 2013. Is the Sample Good Enough? Comparing Data from Twitter\u2019s Streaming API with Twitter\u2019s Firehose. In ICWSM. 400\u2013408.  Fred Morstatter J\u00fcrgen Pfeffer Huan Liu 2013. Is the Sample Good Enough? Comparing Data from Twitter\u2019s Streaming API with Twitter\u2019s Firehose. In ICWSM. 400\u2013408.","DOI":"10.1609\/icwsm.v7i1.14401"},{"key":"e_1_3_2_1_24_1","unstructured":"James Pennebaker Ryan Boyd Kayla Jordan 2015. The development and psychometric properties of LIWC2015. (2015).  James Pennebaker Ryan Boyd Kayla Jordan 2015. The development and psychometric properties of LIWC2015. (2015)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Whitney Phillips. 2015. This is why we can\u2019t have nice things: Mapping the relationship between online trolling and mainstream culture.   Whitney Phillips. 2015. This is why we can\u2019t have nice things: Mapping the relationship between online trolling and mainstream culture.","DOI":"10.7551\/mitpress\/10288.001.0001"},{"key":"e_1_3_2_1_26_1","volume-title":"Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3","author":"Raghavan Usha\u00a0Nandini","year":"2007","unstructured":"Usha\u00a0Nandini Raghavan , R\u00e9ka Albert , and Soundar Kumara . 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3 ( 2007 ), 036106. Usha\u00a0Nandini Raghavan, R\u00e9ka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3 (2007), 036106."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"e_1_3_2_1_28_1","volume-title":"Detecting and tracking political abuse in social media.ICWSM","author":"Ratkiewicz Jacob","year":"2011","unstructured":"Jacob Ratkiewicz , Michael Conover , Mark\u00a0 R Meiss , 2011. Detecting and tracking political abuse in social media.ICWSM ( 2011 ). Jacob Ratkiewicz, Michael Conover, Mark\u00a0R Meiss, 2011. Detecting and tracking political abuse in social media.ICWSM (2011)."},{"key":"e_1_3_2_1_29_1","unstructured":"Samantha Shorey and Philip Howard. 2016. Automation Algorithms and Politics: A Research Review. Int. J Comm. 10(2016).  Samantha Shorey and Philip Howard. 2016. Automation Algorithms and Politics: A Research Review. Int. J Comm. 10(2016)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1803470115"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"e_1_3_2_1_32_1","volume-title":"Political Polarization, and Political Disinformation: A Review of the Scientific Literature.","author":"Tucker Joshua","year":"2018","unstructured":"Joshua Tucker , Andrew Guess , Pablo Barber\u00e1 , 2018. Social Media , Political Polarization, and Political Disinformation: A Review of the Scientific Literature. ( 2018 ). Joshua Tucker, Andrew Guess, Pablo Barber\u00e1, 2018. Social Media, Political Polarization, and Political Disinformation: A Review of the Scientific Literature. (2018)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1353\/jod.2017.0064"},{"key":"e_1_3_2_1_34_1","volume-title":"Early Detection of Promoted Campaigns on Social Media. EPJ Data Science 6, 13","author":"Varol Onur","year":"2017","unstructured":"Onur Varol , Emilio Ferrara , Filippo Menczer , 2017. Early Detection of Promoted Campaigns on Social Media. EPJ Data Science 6, 13 ( 2017 ). Onur Varol, Emilio Ferrara, Filippo Menczer, 2017. Early Detection of Promoted Campaigns on Social Media. EPJ Data Science 6, 13 (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Yu Wang Yuncheng Li and Jiebo Luo. 2016. Deciphering the 2016 US Presidential Campaign in the Twitter Sphere: A Comparison of the Trumpists and Clintonists. In ICWSM. 723\u2013726.  Yu Wang Yuncheng Li and Jiebo Luo. 2016. Deciphering the 2016 US Presidential Campaign in the Twitter Sphere: A Comparison of the Trumpists and Clintonists. In ICWSM. 723\u2013726.","DOI":"10.1609\/icwsm.v10i1.14783"},{"key":"e_1_3_2_1_36_1","volume-title":"Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior research methods 45, 4","author":"Warriner Amy\u00a0Beth","year":"2013","unstructured":"Amy\u00a0Beth Warriner , Victor Kuperman , and Marc Brysbaert . 2013. Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior research methods 45, 4 ( 2013 ), 1191\u20131207. Amy\u00a0Beth Warriner, Victor Kuperman, and Marc Brysbaert. 2013. Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior research methods 45, 4 (2013), 1191\u20131207."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220619"},{"key":"e_1_3_2_1_38_1","volume-title":"Automating power: Social bot interference in global politics. First Monday 21, 4","author":"Woolley C","year":"2016","unstructured":"Samuel\u00a0 C Woolley . 2016. Automating power: Social bot interference in global politics. First Monday 21, 4 ( 2016 ). Samuel\u00a0C Woolley. 2016. Automating power: Social bot interference in global politics. First Monday 21, 4 (2016)."},{"key":"e_1_3_2_1_39_1","volume-title":"Int. Journal of Commun. 10","author":"Woolley C","year":"2016","unstructured":"Samuel\u00a0 C Woolley and Philip Howard . 2016. Automation , Algorithms, and Politics: Introduction . Int. Journal of Commun. 10 ( 2016 ). Samuel\u00a0C Woolley and Philip Howard. 2016. Automation, Algorithms, and Politics: Introduction. Int. Journal of Commun. 10 (2016)."},{"key":"e_1_3_2_1_40_1","unstructured":"Kai-Cheng Yang Onur Varol Clayton\u00a0A Davis 2019. Arming the public with artificial intelligence to counter social bots. Human Behavior and Emerging Technologies(2019) e115.  Kai-Cheng Yang Onur Varol Clayton\u00a0A Davis 2019. Arming the public with artificial intelligence to counter social bots. Human Behavior and Emerging Technologies(2019) e115."}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3316494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:23Z","timestamp":1750204403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":40,"alternative-id":["10.1145\/3308560.3316494","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3316494","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}