{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:18:39Z","timestamp":1755926319576,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3316742","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"1026-1032","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Misinfosec"],"prefix":"10.1145","author":[{"given":"Christopher","family":"R. Walker","sequence":"first","affiliation":[{"name":"Marvelous AI San Francisco, CA, USA"}]},{"given":"Sara-Jayne","family":"Terp","sequence":"additional","affiliation":[{"name":"SOFWERX Tampa, FL, USA"}]},{"given":"Pablo","family":"C. Breuer","sequence":"additional","affiliation":[{"name":"U.S. Special Operations Command Tampa, FL, USA"}]},{"given":"Courtney","family":"L. Crooks, PhD","sequence":"additional","affiliation":[{"name":"Georgia Tech Research Institute (GTRI) Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190923624.001.0001"},{"volume-title":"How a partying Macedonian teen earns thousands publishing lies,\" NBC News","year":"2016","key":"e_1_3_2_1_2_1","unstructured":"Smith and Banic, \"Fake News : How a partying Macedonian teen earns thousands publishing lies,\" NBC News , 2016 . Smith and Banic, \"Fake News: How a partying Macedonian teen earns thousands publishing lies,\" NBC News, 2016."},{"key":"e_1_3_2_1_3_1","volume-title":"ARE WE READY FOR IT?,\" Wired","author":"DiResta R.","year":"2018","unstructured":"R. DiResta , \" THE INFORMATION WAR IS ON. ARE WE READY FOR IT?,\" Wired , 2018 . R. DiResta, \"THE INFORMATION WAR IS ON. ARE WE READY FOR IT?,\" Wired, 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"A. Petrov \"Modeling Position Selection by Individuals during Information Warfare in Society \" Mathematical Models and Computer Simulations pp. 401-408 2016.  A. Petrov \"Modeling Position Selection by Individuals during Information Warfare in Society \" Mathematical Models and Computer Simulations pp. 401-8 2016.","DOI":"10.1134\/S2070048216040141"},{"key":"e_1_3_2_1_5_1","volume-title":"Using Media Model Theory to Understand How Russia Spreads Disinformation in the United States,\" in American Political Science Association 2018 Annual Meeting","author":"Oates S.","year":"2018","unstructured":"S. Oates , \"When Media Worlds Collide : Using Media Model Theory to Understand How Russia Spreads Disinformation in the United States,\" in American Political Science Association 2018 Annual Meeting , Boston, MA , 2018 . S. Oates, \"When Media Worlds Collide: Using Media Model Theory to Understand How Russia Spreads Disinformation in the United States,\" in American Political Science Association 2018 Annual Meeting, Boston, MA, 2018."},{"key":"e_1_3_2_1_6_1","volume-title":"From Network to Narrative: Understanding the Nature and Trajectory of Russian Disinformation in the U.S. News.,\" in International Journal of Press\/Politics Conference","author":"Oates S.","year":"2018","unstructured":"S. Oates , J. B. Barrow and B. Foster , \" From Network to Narrative: Understanding the Nature and Trajectory of Russian Disinformation in the U.S. News.,\" in International Journal of Press\/Politics Conference , Oxford, UK , 2018 . S. Oates, J. B. Barrow and B. Foster, \"From Network to Narrative: Understanding the Nature and Trajectory of Russian Disinformation in the U.S. News.,\" in International Journal of Press\/Politics Conference, Oxford, UK, 2018."},{"key":"e_1_3_2_1_7_1","author":"Field A.","year":"2018","unstructured":"A. Field , D. Kliger , S. Wintner , J. Pan , D. Jurafsky and Y. Tsvetkov , \"Framing and Agenda-setting in Russian News: a Computational Analysis of Intricate Political Strategies.,\" EMNLP , 2018 . A. Field, D. Kliger, S. Wintner, J. Pan, D. Jurafsky and Y. Tsvetkov, \"Framing and Agenda-setting in Russian News: a Computational Analysis of Intricate Political Strategies.,\" EMNLP, 2018.","journal-title":"\"Framing and Agenda-setting in Russian News: a Computational Analysis of Intricate Political Strategies.,\" EMNLP"},{"key":"e_1_3_2_1_8_1","unstructured":"T. Boucher \"Adversarial social media tactics \" Medium 2018.  T. Boucher \"Adversarial social media tactics \" Medium 2018."},{"key":"e_1_3_2_1_9_1","unstructured":"S.-J. Terp \"Security frameworks for misinformation \" 2018.  S.-J. Terp \"Security frameworks for misinformation \" 2018."},{"key":"e_1_3_2_1_10_1","unstructured":"S.-J. Terp \"Practical influence operations \" 2018.  S.-J. Terp \"Practical influence operations \" 2018."},{"key":"e_1_3_2_1_11_1","unstructured":"S.-J. Terp \"Social engineering at scale \" 2018.  S.-J. Terp \"Social engineering at scale \" 2018."},{"volume-title":"persistent, global,\" Reuters","year":"2018","key":"e_1_3_2_1_12_1","unstructured":"Stubbs, \"Exclusive Iran based political influence operation - bigger , persistent, global,\" Reuters , 2018 . Stubbs, \"Exclusive Iran based political influence operation - bigger, persistent, global,\" Reuters, 2018."},{"key":"e_1_3_2_1_13_1","unstructured":"F. Mortola \"Disinformation through fabricated news site \" 2018.  F. Mortola \"Disinformation through fabricated news site \" 2018."},{"key":"e_1_3_2_1_14_1","volume-title":"Midterms: What are we seeing? What are we not?","author":"S.","year":"2018","unstructured":"Foster, \"Influence Operations Targeting the 2018 U. S. Midterms: What are we seeing? What are we not? ,\" 2018 . Foster, \"Influence Operations Targeting the 2018 U.S. Midterms: What are we seeing? What are we not?,\" 2018."},{"volume-title":"Identifying Information Operations Infrastructure","year":"2018","key":"e_1_3_2_1_15_1","unstructured":"Ehmke, \"Influencer Vaccine : Identifying Information Operations Infrastructure ,\" 2018 . Ehmke, \"Influencer Vaccine: Identifying Information Operations Infrastructure,\" 2018."},{"key":"e_1_3_2_1_16_1","unstructured":"Kuhr \"Leveraging threat intel disinformation campaigns to defeat attribution \" 27 February 2017. {Online}. Available: https:\/\/www.synack.com\/2017\/02\/27\/shmoocon-2017-recap-election-hackers-vs-threat-intel-attribution\/.  Kuhr \"Leveraging threat intel disinformation campaigns to defeat attribution \" 27 February 2017. {Online}. Available: https:\/\/www.synack.com\/2017\/02\/27\/shmoocon-2017-recap-election-hackers-vs-threat-intel-attribution\/."},{"volume-title":"time for a new definition","year":"2018","key":"e_1_3_2_1_17_1","unstructured":"Landau, \"Cybersecurity : time for a new definition ,\" 2018 . Landau, \"Cybersecurity: time for a new definition,\" 2018."},{"key":"e_1_3_2_1_18_1","unstructured":"Rogers \"Fake news as an information security problem \" May.  Rogers \"Fake news as an information security problem \" May."},{"volume-title":"Fake news as an information security problem. {Film}","year":"2018","key":"e_1_3_2_1_19_1","unstructured":"Rogers, Director , Fake news as an information security problem. {Film} . 2018 . Rogers, Director, Fake news as an information security problem. {Film}. 2018."},{"key":"e_1_3_2_1_20_1","volume-title":"A NEW STRATEGY FOR STOPPING INFORMATION OPERATIONS","author":"Gordon D.","year":"2018","unstructured":"D. Gordon , \"DEFEN DING THE INDEFENSIBLE : A NEW STRATEGY FOR STOPPING INFORMATION OPERATIONS ,\" 2018 . D. Gordon, \"DEFENDING THE INDEFENSIBLE: A NEW STRATEGY FOR STOPPING INFORMATION OPERATIONS,\" 2018."},{"volume-title":"Influence Operations","year":"2018","key":"e_1_3_2_1_21_1","unstructured":"Grugq., \"Lessons in Cyber : Influence Operations ,\" 2018 . Grugq., \"Lessons in Cyber: Influence Operations,\" 2018."},{"key":"e_1_3_2_1_22_1","volume-title":"Developing Solutions,\"","author":"Zegart A.","year":"2017","unstructured":"A. Zegart , H. Lin , T. Fingar , N. Persily and L. Ross , \" Cyber-Enabled Information and Influence Warfare and Manipulation: Understanding Problems , Developing Solutions,\" 2017 . A. Zegart, H. Lin, T. Fingar, N. Persily and L. Ross, \"Cyber-Enabled Information and Influence Warfare and Manipulation: Understanding Problems, Developing Solutions,\" 2017."},{"key":"e_1_3_2_1_23_1","volume-title":"On Cyber-Enabled Information\/Influence Warfare and Manipulation","author":"Lin H.","year":"2017","unstructured":"H. Lin and J. Kerr , \" On Cyber-Enabled Information\/Influence Warfare and Manipulation ,\" 2017 . H. Lin and J. Kerr, \"On Cyber-Enabled Information\/Influence Warfare and Manipulation,\" 2017."},{"key":"e_1_3_2_1_24_1","unstructured":"H. Lin \"Developing Responses to Cyber-Enabled Information Warfare and Influence Operations \" 2018.  H. Lin \"Developing Responses to Cyber-Enabled Information Warfare and Influence Operations \" 2018."},{"key":"e_1_3_2_1_25_1","unstructured":"FreedomHouse. \"Manipulating Social Media to Undermine Democracy \" 2018.  FreedomHouse. \"Manipulating Social Media to Undermine Democracy \" 2018."},{"key":"e_1_3_2_1_26_1","volume-title":"Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls","author":"Zannettou S.","year":"2018","unstructured":"S. Zannettou , T. Caulfield , W. Setzer , M. Sirivianos , G. Stringhini and J. Blackburn , \" Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls ,\" 2018 . S. Zannettou, T. Caulfield, W. Setzer, M. Sirivianos, G. Stringhini and J. Blackburn, \"Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls,\" 2018."},{"key":"e_1_3_2_1_27_1","unstructured":"D. D. Kirkpatrick \"Signs of Russian Meddling in Brexit Referendum \" 2017.  D. D. Kirkpatrick \"Signs of Russian Meddling in Brexit Referendum \" 2017."},{"key":"e_1_3_2_1_28_1","volume-title":"Exclusive: Fake black activist accounts linked to Russian government","author":"O'Sullivan D.","year":"2017","unstructured":"D. O'Sullivan and D. Byers , \" Exclusive: Fake black activist accounts linked to Russian government ,\" 2017 . D. O'Sullivan and D. Byers, \"Exclusive: Fake black activist accounts linked to Russian government,\" 2017."},{"key":"e_1_3_2_1_29_1","volume-title":"Mapping and quantifying political information warfare Part 1 : Propaganda, domination & attacks on online media","author":"Joler V.","year":"2016","unstructured":"V. Joler , M. Jovanovi\u0107 and A. Petrovski , \" Mapping and quantifying political information warfare Part 1 : Propaganda, domination & attacks on online media ,\" 2016 . V. Joler, M. Jovanovi\u0107 and A. Petrovski, \"Mapping and quantifying political information warfare Part 1 : Propaganda, domination & attacks on online media,\" 2016."},{"key":"e_1_3_2_1_30_1","volume-title":"How Trump Consultants Exploited the Facebook Data of Millions","author":"Rosenberg M.","year":"2018","unstructured":"M. Rosenberg , N. Confessore and C. Cadwalladr , \" How Trump Consultants Exploited the Facebook Data of Millions ,\" 2018 . M. Rosenberg, N. Confessore and C. Cadwalladr, \"How Trump Consultants Exploited the Facebook Data of Millions,\" 2018."},{"key":"e_1_3_2_1_31_1","volume-title":"Hackers Came, but the French Were Prepared","author":"Nossiter A.","year":"2017","unstructured":"A. Nossiter , D. E. Sanger and N. Perlroth , \" Hackers Came, but the French Were Prepared ,\" 2017 . A. Nossiter, D. E. Sanger and N. Perlroth, \"Hackers Came, but the French Were Prepared,\" 2017."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400826537"},{"volume-title":"February 13, 2006,\"","year":"2006","key":"e_1_3_2_1_33_1","unstructured":"DoD, \"Joint Publication 3-13 : Information Operations , February 13, 2006,\" 2006 . DoD, \"Joint Publication 3-13: Information Operations, February 13, 2006,\" 2006."},{"key":"e_1_3_2_1_34_1","unstructured":"Cyberpedia \"HOW TO BREAK THE CYBER ATTACK LIFECYCLE \" 2019.  Cyberpedia \"HOW TO BREAK THE CYBER ATTACK LIFECYCLE \" 2019."},{"key":"e_1_3_2_1_35_1","volume-title":"Distort, Distract, Dismay,\"","author":"Ninmo B.","year":"2017","unstructured":"B. Ninmo , \"The 4 Ds of Propaganda : Dismiss , Distort, Distract, Dismay,\" 2017 . B. Ninmo, \"The 4 Ds of Propaganda: Dismiss, Distort, Distract, Dismay,\" 2017."},{"key":"e_1_3_2_1_36_1","unstructured":"MITRE \"Att&ck matrix for enterprise \" 2019. {Online}. Available: https:\/\/attack.mitre.org\/.  MITRE \"Att&ck matrix for enterprise \" 2019. {Online}. Available: https:\/\/attack.mitre.org\/."},{"key":"e_1_3_2_1_37_1","unstructured":"\"Post-Exploit Threat Modeling with ATT&CK \" 2016.  \"Post-Exploit Threat Modeling with ATT&CK \" 2016."},{"key":"e_1_3_2_1_38_1","volume-title":"Can't, and Do Know","author":"Jamieson K. H.","year":"2018","unstructured":"K. H. Jamieson , Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't , Can't, and Do Know , Oxford. UK : Oxford University Press , 2018 . K. H. Jamieson, Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't, and Do Know, Oxford. UK: Oxford University Press, 2018."},{"key":"e_1_3_2_1_39_1","volume-title":"The Malicious Use of Artificial Intelligence:,\" Archiv","author":"Brundage M.","year":"2018","unstructured":"M. Brundage , A. Shahar , J. Clark , H. Toner , P. Eckersley , B. Garfinkel , A. Dafoe , P. Scharre , T. Zeitzoff , B. Filar , H. Anderson , H. Roff , G. C. Allen , J. Steinhardt and C. Flynn , \" The Malicious Use of Artificial Intelligence:,\" Archiv , 2018 . M. Brundage, A. Shahar, J. Clark, H. Toner, P. Eckersley, B. Garfinkel, A. Dafoe, P. Scharre, T. Zeitzoff, B. Filar, H. Anderson, H. Roff, G. C. Allen, J. Steinhardt and C. Flynn, \"The Malicious Use of Artificial Intelligence:,\" Archiv, 2018."},{"key":"e_1_3_2_1_40_1","unstructured":"M. Brockman \"Data-Driven Propaganda as a Subset of Adversarial Examples \" 2018.  M. Brockman \"Data-Driven Propaganda as a Subset of Adversarial Examples \" 2018."},{"key":"e_1_3_2_1_41_1","volume-title":"Terrorists, Russians, and Fake News","author":"Watts C.","year":"2018","unstructured":"C. Watts , Messing with the Enemy: Surviving in a Social Media World of Hackers , Terrorists, Russians, and Fake News , New York, NY : Harper Collins , 2018 . C. Watts, Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News, New York, NY: Harper Collins, 2018."}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3316742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:24Z","timestamp":1750204404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":41,"alternative-id":["10.1145\/3308560.3316742","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3316742","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}