{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T01:09:10Z","timestamp":1773968950047,"version":"3.50.1"},"reference-count":210,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T00:00:00Z","timestamp":1557187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["691025"],"award-info":[{"award-number":["691025"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Data and Information Quality"],"published-print":{"date-parts":[[2019,9,30]]},"abstract":"<jats:p>A new era of Information Warfare has arrived. Various actors, including state-sponsored ones, are weaponizing information on Online Social Networks to run false-information campaigns with targeted manipulation of public opinion on specific topics. These false-information campaigns can have dire consequences to the public: mutating their opinions and actions, especially with respect to critical world events like major elections. Evidently, the problem of false information on the Web is a crucial one and needs increased public awareness as well as immediate attention from law enforcement agencies, public institutions, and in particular, the research community.<\/jats:p>\n          <jats:p>In this article, we make a step in this direction by providing a typology of the Web\u2019s false-information ecosystem, composed of various types of false-information, actors, and their motives. We report a comprehensive overview of existing research on the false-information ecosystem by identifying several lines of work: (1) how the public perceives false information; (2) understanding the propagation of false information; (3) detecting and containing false information on the Web; and (4) false information on the political stage. In this work, we pay particular attention to political false information as: (1) it can have dire consequences to the community (e.g., when election results are mutated) and (2) previous work shows that this type of false information propagates faster and further when compared to other types of false information. Finally, for each of these lines of work, we report several future research directions that can help us better understand and mitigate the emerging problem of false-information dissemination on the Web.<\/jats:p>","DOI":"10.1145\/3309699","type":"journal-article","created":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T14:11:11Z","timestamp":1557324671000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":251,"title":["The Web of False Information"],"prefix":"10.1145","volume":"11","author":[{"given":"Savvas","family":"Zannettou","sequence":"first","affiliation":[{"name":"Cyprus University of Technology, Limassol, Cyprus"}]},{"given":"Michael","family":"Sirivianos","sequence":"additional","affiliation":[{"name":"Cyprus University of Technology, Limassol, Cyprus"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, AL, USA"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2019,5,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Amazon. 2005. Amazon Mechanical Turk. Retrieved from https:\/\/www.mturk.com\/.  Amazon. 2005. Amazon Mechanical Turk. Retrieved from https:\/\/www.mturk.com\/."},{"key":"e_1_2_1_2_1","unstructured":"CrowdFlower. 2007. CrowdFlower. Retrieved from https:\/\/www.crowdflower.com\/.  CrowdFlower. 2007. CrowdFlower. Retrieved from https:\/\/www.crowdflower.com\/."},{"key":"e_1_2_1_3_1","unstructured":"Merriam-Webster. 2018. Definition of Half-truth. Retrieved from https:\/\/www.merriam-webster.com\/dictionary\/half-truth.  Merriam-Webster. 2018. Definition of Half-truth. Retrieved from https:\/\/www.merriam-webster.com\/dictionary\/half-truth."},{"key":"e_1_2_1_4_1","unstructured":"Epinions. 1999. Epinions. Retrieved from http:\/\/www.epinions.com\/.  Epinions. 1999. Epinions. Retrieved from http:\/\/www.epinions.com\/."},{"key":"e_1_2_1_5_1","unstructured":"Wikipedia. 2018. Extreme Value Theory. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Extreme_value_theory.  Wikipedia. 2018. Extreme Value Theory. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Extreme_value_theory."},{"key":"e_1_2_1_6_1","volume-title":"Facebook\u2019s Failure: Did Fake News and Polarized Politics Get Trump Elected?","author":"Guardian The","year":"2016"},{"key":"e_1_2_1_7_1","unstructured":"First Draft. 2017. Fake News. It\u2019s Complicated. Retrieved from https:\/\/firstdraftnews.com\/fake-news-complicated\/.  First Draft. 2017. Fake News. It\u2019s Complicated. Retrieved from https:\/\/firstdraftnews.com\/fake-news-complicated\/."},{"key":"e_1_2_1_8_1","unstructured":"The Guardian. 2016. False Smartphone Alert of Huge Earthquake Triggers Panic in Japan. Retrieved from https:\/\/www.theguardian.com\/world\/2016\/aug\/01\/false-alert-of-huge-earthquake-triggers-panic-in-japan.  The Guardian. 2016. False Smartphone Alert of Huge Earthquake Triggers Panic in Japan. Retrieved from https:\/\/www.theguardian.com\/world\/2016\/aug\/01\/false-alert-of-huge-earthquake-triggers-panic-in-japan."},{"key":"e_1_2_1_9_1","unstructured":"Venture Beat. 2017. French Fear Putin and Trump Followers are Using 4chan to Disrupt Presidential Election. Retrieved from https:\/\/venturebeat.com\/2017\/05\/05\/french-fear-putin-and-trump-followers-are-using-4chan-to-disrupt-presidential-election\/.  Venture Beat. 2017. French Fear Putin and Trump Followers are Using 4chan to Disrupt Presidential Election. Retrieved from https:\/\/venturebeat.com\/2017\/05\/05\/french-fear-putin-and-trump-followers-are-using-4chan-to-disrupt-presidential-election\/."},{"key":"e_1_2_1_10_1","unstructured":"Wikipedia. 2018. H-index. Retrieved from https:\/\/en.wikipedia.org\/wiki\/H-index.  Wikipedia. 2018. H-index. Retrieved from https:\/\/en.wikipedia.org\/wiki\/H-index."},{"key":"e_1_2_1_11_1","unstructured":"Wired. 2018. How ISIS and Russia Won Friends and Manufactured Crowds. Retrieved from https:\/\/www.wired.com\/story\/isis-russia-manufacture-crowds\/.  Wired. 2018. How ISIS and Russia Won Friends and Manufactured Crowds. Retrieved from https:\/\/www.wired.com\/story\/isis-russia-manufacture-crowds\/."},{"key":"e_1_2_1_12_1","unstructured":"QZ. 2018. How Russian Trolls\u2019 Support of Third Parties Could Have Cost Hillary Clinton the Election. Retrieved from https:\/\/qz.com\/1210369\/russia-donald-trump-2016-how-russian-trolls-support-of-us-third-parties-may-have-cost-hillary-clinton-the-election\/.  QZ. 2018. How Russian Trolls\u2019 Support of Third Parties Could Have Cost Hillary Clinton the Election. Retrieved from https:\/\/qz.com\/1210369\/russia-donald-trump-2016-how-russian-trolls-support-of-us-third-parties-may-have-cost-hillary-clinton-the-election\/."},{"key":"e_1_2_1_13_1","unstructured":"The New York Times. 2018. How Trump Consultants Exploited the Facebook Data of Millions. Retrieved from https:\/\/www.nytimes.com\/2018\/03\/17\/us\/politics\/cambridge-analytica-trump-campaign.html.  The New York Times. 2018. How Trump Consultants Exploited the Facebook Data of Millions. Retrieved from https:\/\/www.nytimes.com\/2018\/03\/17\/us\/politics\/cambridge-analytica-trump-campaign.html."},{"key":"e_1_2_1_14_1","unstructured":"Time. 2014. The Origins of Writerly Words. Retrieved from http:\/\/time.com\/82601\/the-origins-of-writerly-words\/  Time. 2014. The Origins of Writerly Words. Retrieved from http:\/\/time.com\/82601\/the-origins-of-writerly-words\/"},{"key":"e_1_2_1_15_1","unstructured":"QZ. 2017. People Shared Nearly as Much Fake News as Real News on Twitter During the Election. Retrieved from https:\/\/qz.com\/1090903\/people-shared-nearly-as-much-fake-news-as-real-news-on-twitter-during-the-election\/.  QZ. 2017. People Shared Nearly as Much Fake News as Real News on Twitter During the Election. Retrieved from https:\/\/qz.com\/1090903\/people-shared-nearly-as-much-fake-news-as-real-news-on-twitter-during-the-election\/."},{"key":"e_1_2_1_16_1","unstructured":"SatireWire. 2018. SatireWire. Retrieved from http:\/\/www.satirewire.com\/.  SatireWire. 2018. SatireWire. Retrieved from http:\/\/www.satirewire.com\/."},{"key":"e_1_2_1_17_1","unstructured":"Shuijunwang. 2018. Shuijunwang. Retrieved from http:\/\/www.shuijunwang.com.  Shuijunwang. 2018. Shuijunwang. Retrieved from http:\/\/www.shuijunwang.com."},{"key":"e_1_2_1_18_1","unstructured":"Sina. 2018. Sina. Retrieved from http:\/\/www.sina.com\/.  Sina. 2018. Sina. Retrieved from http:\/\/www.sina.com\/."},{"key":"e_1_2_1_19_1","unstructured":"Stanford University. 2014. SNAP Datasets. Retrieved from http:\/\/snap.stanford.edu\/data\/.  Stanford University. 2014. SNAP Datasets. Retrieved from http:\/\/snap.stanford.edu\/data\/."},{"key":"e_1_2_1_20_1","unstructured":"Snopes. 2018. Snopes. Retrieved from http:\/\/www.snopes.com\/.  Snopes. 2018. Snopes. Retrieved from http:\/\/www.snopes.com\/."},{"key":"e_1_2_1_21_1","unstructured":"Sohu. 2018. Sohu. Retrieved from http:\/\/www.sohu.com\/.  Sohu. 2018. Sohu. Retrieved from http:\/\/www.sohu.com\/."},{"key":"e_1_2_1_22_1","unstructured":"The Onion. 2018. The Onion. Retrieved from http:\/\/www.theonion.com\/.  The Onion. 2018. The Onion. Retrieved from http:\/\/www.theonion.com\/."},{"key":"e_1_2_1_23_1","unstructured":"Wikipedia. 2018. Useful Idiot Wiki. http:\/\/rationalwiki.org\/wiki\/Useful_idiot.  Wikipedia. 2018. Useful Idiot Wiki. http:\/\/rationalwiki.org\/wiki\/Useful_idiot."},{"key":"e_1_2_1_24_1","unstructured":"The Washington Post. 2016. \u201cWe Actually Elected a Meme as President\u201d: How 4chan Celebrated Trump\u2019s Victory. Retrieved from https:\/\/www.washingtonpost.com\/news\/the-intersect\/wp\/2016\/11\/09\/we-actually-elected-a-meme-as-president-how-4chan-celebrated-trumps-victory\/.  The Washington Post. 2016. \u201cWe Actually Elected a Meme as President\u201d: How 4chan Celebrated Trump\u2019s Victory. Retrieved from https:\/\/www.washingtonpost.com\/news\/the-intersect\/wp\/2016\/11\/09\/we-actually-elected-a-meme-as-president-how-4chan-celebrated-trumps-victory\/."},{"key":"e_1_2_1_25_1","unstructured":"Xinhuanet. 2018. Xinhuanet. Retrieved from http:\/\/www.xinhuanet.com\/.  Xinhuanet. 2018. Xinhuanet. Retrieved from http:\/\/www.xinhuanet.com\/."},{"key":"e_1_2_1_26_1","unstructured":"Adperfect. 2017. How fake news is creating profits. Retrieved from http:\/\/www.adperfect.com\/how-fake-news-is-creating-profits\/.  Adperfect. 2017. How fake news is creating profits. Retrieved from http:\/\/www.adperfect.com\/how-fake-news-is-creating-profits\/."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.34"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.41"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2810065"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the ICWSM.","author":"An Jisun","year":"2012"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2745939"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56608-5_46"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819986"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819964"},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Alessandro Bessi. 2016. On the statistical properties of viral misinformation in online social media. In Physica A: Statistical Mechanics and its Applications. 459--470.  Alessandro Bessi. 2016. On the statistical properties of viral misinformation in online social media. In Physica A: Statistical Mechanics and its Applications. 459--470.","DOI":"10.1016\/j.physa.2016.11.012"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118093"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Lu\u00eds M.A. Bettencourt Ariel Cintr\u00f3n-Arias David I. Kaiser and Carlos Castillo-Chavez. 2006. The power of a good idea: Quantitative modeling of the spread of ideas from epidemiological models. In Physica A: Statistical Mechanics and its Applications. 513--536.  Lu\u00eds M.A. Bettencourt Ariel Cintr\u00f3n-Arias David I. Kaiser and Carlos Castillo-Chavez. 2006. The power of a good idea: Quantitative modeling of the spread of ideas from epidemiological models. In Physica A: Statistical Mechanics and its Applications. 513--536.","DOI":"10.1016\/j.physa.2005.08.083"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the 30th AAAI Conference on Artificial Intelligence.","author":"Biyani Prakhar","year":"2016"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12166"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the MediaEval.","author":"Boididou Christina","year":"2015"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579323"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijpor\/edt015"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nfw007"},{"key":"e_1_2_1_47_1","unstructured":"Cody Buntain and Jennifer Golbeck. 2017. I want to believe: Journalists and crowdsourced accuracy assessments in Twitter. Retrieved from arXiv preprint arXiv:1705.01613.  Cody Buntain and Jennifer Golbeck. 2017. I want to believe: Journalists and crowdsourced accuracy assessments in Twitter. Retrieved from arXiv preprint arXiv:1705.01613."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/1667583.1667633"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the ISI.","author":"Burgoon Judee K."},{"key":"e_1_2_1_50_1","volume-title":"Yellow Journalism: Puncturing the Myths, Defining the Legacies","author":"Campbell W. Joseph","year":"2001"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the ICWSM.","author":"Cha Meeyoung"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192427"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492637"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2756406.2756941"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2823465.2823467"},{"key":"e_1_2_1_57_1","first-page":"441","article-title":"Email hoax-detection system using levenshtein distance method","volume":"9","author":"Chen Yoke Yie","year":"2014","journal-title":"JCP"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the ICWSM.","author":"Conover Michael","year":"2011"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the IEEE WIFS.","author":"Conti Mauro","year":"2017"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2949035.2949040"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192572"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1517441113"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184319.2184338"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772726"},{"key":"e_1_2_1_65_1","unstructured":"European Union. 2018. General Data Protection Regulation. Retrieved from https:\/\/gdpr-info.eu\/.  European Union. 2018. General Data Protection Regulation. Retrieved from https:\/\/gdpr-info.eu\/."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.34"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning. 1097--1106","author":"Farajtabar Mehrdad","year":"2017"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-010-9139-4"},{"key":"e_1_2_1_69_1","volume-title":"Conspiracy Theories: Secrecy and Power in American Culture","author":"Fenster Mark","year":"1999"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the ICWSM.","author":"Ferrara Emilio","year":"2016"},{"key":"e_1_2_1_71_1","unstructured":"Samantha Finn Panagiotis Takis Metaxas and Eni Mustafaraj. 2014. Investigating Rumor Propagation with TwitterTrails. arXiv preprint arXiv:1411.3550.  Samantha Finn Panagiotis Takis Metaxas and Eni Mustafaraj. 2014. Investigating Rumor Propagation with TwitterTrails. arXiv preprint arXiv:1411.3550."},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the ICWSM.","author":"Friggeri Adrien","year":"2014"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47880-7_12"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2013.07.004"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185354.2185356"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13734-6_16"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805772"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"key":"e_1_2_1_79_1","volume-title":"Proceedings of the NAACL-HLT.","author":"Hamidian Sardar"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733029"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.29"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the ICWSM.","author":"Hegelich Simon","year":"2016"},{"key":"e_1_2_1_84_1","unstructured":"Steven Heller. 2014. Bat Boy Hillary Clinton\u2019s alien baby and a tabloid\u2019s glorious legacy. Retrieved from https:\/\/www.theatlantic.com\/entertainment\/archive\/2014\/10\/the-ingenious-sensationalism-of-the-weekly-world-new\/381525\/.  Steven Heller. 2014. Bat Boy Hillary Clinton\u2019s alien baby and a tabloid\u2019s glorious legacy. Retrieved from https:\/\/www.theatlantic.com\/entertainment\/archive\/2014\/10\/the-ingenious-sensationalism-of-the-weekly-world-new\/381525\/."},{"key":"e_1_2_1_85_1","unstructured":"Eliot Higgins. 2016. Fake news is spiraling out of control\u2014and it is up to all of us to stop it. Retrieved from https:\/\/www.ibtimes.co.uk\/fake-news-spiralling-out-control-it-all-us-stop-it-1596911.  Eliot Higgins. 2016. Fake news is spiraling out of control\u2014and it is up to all of us to stop it. Retrieved from https:\/\/www.ibtimes.co.uk\/fake-news-spiralling-out-control-it-all-us-stop-it-1596911."},{"key":"e_1_2_1_86_1","volume-title":"Proceedings of the ICWSM.","author":"Hine Gabriel Emile","year":"2017"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds5"},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the ICWSM Workshop.","author":"Benjamin"},{"key":"e_1_2_1_89_1","volume-title":"Oxford, UK: Project on Computational Propaganda.","author":"Howard P.","year":"2016"},{"key":"e_1_2_1_90_1","doi-asserted-by":"crossref","unstructured":"Philip N. Howard and Bence Kollanyi. 2016. Bots # StrongerIn and# Brexit: Computational propaganda during the UK-EU referendum. Retrieved from arXiv preprint arXiv:1606.06356.  Philip N. Howard and Bence Kollanyi. 2016. Bots # StrongerIn and# Brexit: Computational propaganda during the UK-EU referendum. Retrieved from arXiv preprint arXiv:1606.06356.","DOI":"10.2139\/ssrn.2798311"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675202"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12185"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579324"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.361"},{"key":"e_1_2_1_96_1","unstructured":"Zhiwei Jin Juan Cao Han Guo Yongdong Zhang Yu Wang and Jiebo Luo. 2017. Rumor detection on Twitter pertaining to the 2016 US presidential election. Retrieved from arXiv preprint arXiv:1701.06250.  Zhiwei Jin Juan Cao Han Guo Yongdong Zhang Yu Wang and Jiebo Luo. 2017. Rumor detection on Twitter pertaining to the 2016 US presidential election. Retrieved from arXiv preprint arXiv:1701.06250."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.91"},{"key":"e_1_2_1_98_1","unstructured":"Zhiwei Jin Juan Cao Jiebo Luo and Yongdong Zhang. 2016. Image credibility analysis with effective domain transferred deep networks. Retrieved from arXiv preprint arXiv:1611.05328.  Zhiwei Jin Juan Cao Jiebo Luo and Yongdong Zhang. 2016. Image credibility analysis with effective domain transferred deep networks. Retrieved from arXiv preprint arXiv:1611.05328."},{"key":"e_1_2_1_99_1","volume-title":"Proceedings of the AAAI.","author":"Jin Zhiwei","year":"2016"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2617078"},{"key":"e_1_2_1_101_1","unstructured":"Garth S. Jowett and Victoria O\u2019Donnell. 2014. Propaganda 8 Persuasion. Sage.  Garth S. Jowett and Victoria O\u2019Donnell. 2014. Propaganda 8 Persuasion. Sage."},{"key":"e_1_2_1_102_1","volume-title":"Proceedings of the PACIS.","author":"Kim Jong-Hyun","year":"2011"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055417000144"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0076-5392(08)62095-0"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/1314498.1314541"},{"key":"e_1_2_1_106_1","unstructured":"Bhushan Kotnis and Joy Kuri. 2014. Cost effective rumor containment in social networks. Retrieved from arXiv preprint arXiv:1403.6315.  Bhushan Kotnis and Joy Kuri. 2014. Cost effective rumor containment in social networks. Retrieved from arXiv preprint arXiv:1403.6315."},{"key":"e_1_2_1_107_1","volume-title":"Proceedings of the HCIS.","author":"Krishna Kumar K. P."},{"key":"e_1_2_1_108_1","unstructured":"Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. Retrieved from arXiv preprint arXiv:1804.08559.  Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. Retrieved from arXiv preprint arXiv:1804.08559."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883085"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168344"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03260-3_26"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_2_1_113_1","volume-title":"Proceedings of the ICML.","author":"Le Quoc","year":"2014"},{"key":"e_1_2_1_114_1","doi-asserted-by":"crossref","unstructured":"Seow Ting Lee. 2004. Lying to tell the truth: Journalists and the social context of deception. Mass Communication 8 Society 7 1 (2004) 97--120.  Seow Ting Lee. 2004. Lying to tell the truth: Journalists and the social context of deception. Mass Communication 8 Society 7 1 (2004) 97--120.","DOI":"10.1207\/s15327825mcs0701_7"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2517458"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806651"},{"key":"e_1_2_1_117_1","volume-title":"Proceedings of the IJCAI.","author":"Ma Jing","year":"2016"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806607"},{"key":"e_1_2_1_119_1","unstructured":"Jiang Ma and Dandan Li. 2016. Rumor spreading in online-offline social networks. In PACIS. 173.  Jiang Ma and Dandan Li. 2016. Rumor spreading in online-offline social networks. In PACIS. 173."},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the MediaEval.","author":"Maigrot C\u00e9dric","year":"2016"},{"key":"e_1_2_1_121_1","doi-asserted-by":"crossref","unstructured":"Regina Marchi. 2012. With Facebook blogs and fake news teens reject journalistic \u201cobjectivity.\u201d  Regina Marchi. 2012. With Facebook blogs and fake news teens reject journalistic \u201cobjectivity.\u201d","DOI":"10.1177\/0196859912458700"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2017.1334018"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742573"},{"key":"e_1_2_1_124_1","unstructured":"Medium. 2018. Different examples of propaganda in social media. Retrieved from https:\/\/medium.com\/@VasquezNnenna\/different-examples-of-propaganda-in-social-media-758fc98d021d.  Medium. 2018. Different examples of propaganda in social media. Retrieved from https:\/\/medium.com\/@VasquezNnenna\/different-examples-of-propaganda-in-social-media-758fc98d021d."},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964869"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K15-1032"},{"key":"e_1_2_1_127_1","volume-title":"Proceedings of the NIPS.","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_2_1_128_1","volume-title":"Proceedings of the ICWSM.","author":"Mitra Tanushree","year":"2015"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240060204"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145274"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/2539150.2539184"},{"key":"e_1_2_1_132_1","unstructured":"Kingsley Napley. 2017. The impact of fake news: Politics. Retrieved from https:\/\/www.lexology.com\/library\/detail.aspx?g&equals;6c63091c-e81f-4512-8c47-521eadce65ff.  Kingsley Napley. 2017. The impact of fake news: Politics. Retrieved from https:\/\/www.lexology.com\/library\/detail.aspx?g&equals;6c63091c-e81f-4512-8c47-521eadce65ff."},{"key":"e_1_2_1_133_1","volume-title":"Proceedings of the MILCOM.","author":"Nguyen Dung T."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"e_1_2_1_135_1","volume-title":"Proceedings of the ICIS.","author":"Oh Onook"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.288"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518772"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2015.7169801"},{"key":"e_1_2_1_139_1","unstructured":"Gordon Pennycook and David G. Rand. 2017. The implied truth effect: Attaching warnings to a subset of fake news stories increases perceived accuracy of stories without warnings. Available at SSRN: https:\/\/ssrn.com\/abstract&equals;3035384  Gordon Pennycook and David G. Rand. 2017. The implied truth effect: Attaching warnings to a subset of fake news stories increases perceived accuracy of stories without warnings. Available at SSRN: https:\/\/ssrn.com\/abstract&equals;3035384"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1086\/220916"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036888"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518929"},{"key":"e_1_2_1_143_1","unstructured":"Politifact. 2017. The more outrageous the better: How clickbait ads make money for fake news sites. Retrieved from http:\/\/www.politifact.com\/punditfact\/article\/2017\/oct\/04\/more-outrageous-better-how-clickbait-ads-make-mone\/.  Politifact. 2017. The more outrageous the better: How clickbait ads make money for fake news sites. Retrieved from http:\/\/www.politifact.com\/punditfact\/article\/2017\/oct\/04\/more-outrageous-better-how-clickbait-ads-make-mone\/."},{"key":"e_1_2_1_144_1","doi-asserted-by":"crossref","unstructured":"Martin Potthast Johannes Kiesel Kevin Reinartz Janek Bevendorff and Benno Stein. 2017. A stylometric inquiry into hyperpartisan and fake news. Retrieved from arXiv preprint arXiv:1702.05638.  Martin Potthast Johannes Kiesel Kevin Reinartz Janek Bevendorff and Benno Stein. 2017. A stylometric inquiry into hyperpartisan and fake news. Retrieved from arXiv preprint arXiv:1702.05638.","DOI":"10.18653\/v1\/P18-1022"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30671-1_72"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507065.2507079"},{"key":"e_1_2_1_147_1","volume-title":"Proceedings of the EMNLP.","author":"Qazvinian Vahed","year":"2011"},{"key":"e_1_2_1_148_1","unstructured":"Yumeng Qin Dominik Wurzer Victor Lavrenko and Cunchen Tang. 2016. Spotting rumors via novelty detection. Retrieved from arXiv preprint arXiv:1611.06322.  Yumeng Qin Dominik Wurzer Victor Lavrenko and Cunchen Tang. 2016. Spotting rumors via novelty detection. Retrieved from arXiv preprint arXiv:1611.06322."},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835807"},{"key":"e_1_2_1_150_1","volume-title":"Proceedings of the ICWSM.","author":"Ratkiewicz Jacob","year":"2011"},{"key":"e_1_2_1_151_1","volume-title":"Proceedings of the Computational Journalism Conference.","author":"Resnick Paul","year":"2014"},{"key":"e_1_2_1_152_1","unstructured":"Alex Hern Robert Booth Matthew Weaver and Shaun Walker. 2017. Russia used hundreds of fake accounts to tweet about Brexit data shows. Retrieved from https:\/\/www.theguardian.com\/world\/2017\/nov\/14\/how-400-russia-run-fake-accounts-posted-bogus-brexit-tweets.  Alex Hern Robert Booth Matthew Weaver and Shaun Walker. 2017. Russia used hundreds of fake accounts to tweet about Brexit data shows. Retrieved from https:\/\/www.theguardian.com\/world\/2017\/nov\/14\/how-400-russia-run-fake-accounts-posted-bogus-brexit-tweets."},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000019"},{"key":"e_1_2_1_154_1","volume-title":"Hawaii International Conference on System Sciences.","author":"Rubin Victoria L.","year":"2015"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-0802"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631786"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.919823"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158885"},{"key":"e_1_2_1_159_1","unstructured":"Scott Shane. 2017. The fake Americans Russia created to influence the election. Retrieved from https:\/\/www.nytimes.com\/2017\/09\/07\/us\/politics\/russia-facebook-twitter-election.html.  Scott Shane. 2017. The fake Americans Russia created to influence the election. Retrieved from https:\/\/www.nytimes.com\/2017\/09\/07\/us\/politics\/russia-facebook-twitter-election.html."},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890098"},{"key":"e_1_2_1_161_1","volume-title":"New Media 8 Soc. 19, 8","author":"Shin Jieun","year":"2016"},{"key":"e_1_2_1_162_1","doi-asserted-by":"crossref","unstructured":"Hokky Situngkir. 2011. Spread of hoax in social media. In MPRA Paper 30674. Available at SSRN: https:\/\/ssrn.com\/abstract&equals;1831202  Hokky Situngkir. 2011. Spread of hoax in social media. In MPRA Paper 30674. Available at SSRN: https:\/\/ssrn.com\/abstract&equals;1831202","DOI":"10.2139\/ssrn.1831202"},{"key":"e_1_2_1_163_1","unstructured":"Snopes. 2013. Boston Marathon bombing rumors. Retrieved from https:\/\/www.snopes.com\/fact-check\/boston-marathon-bombing-rumors\/.  Snopes. 2013. Boston Marathon bombing rumors. Retrieved from https:\/\/www.snopes.com\/fact-check\/boston-marathon-bombing-rumors\/."},{"key":"e_1_2_1_164_1","unstructured":"Snopes. 2017. Adam Sandler death hoax. Retrieved from https:\/\/www.snopes.com\/fact-check\/adam-sandler-death-hoax-2\/.  Snopes. 2017. Adam Sandler death hoax. Retrieved from https:\/\/www.snopes.com\/fact-check\/adam-sandler-death-hoax-2\/."},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131385"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380754"},{"key":"e_1_2_1_167_1","volume-title":"Proceedings of the ICWSM.","author":"Starbird Kate","year":"2017"},{"key":"e_1_2_1_168_1","volume-title":"Proceedings of the iConference.","author":"Starbird Kate"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858551"},{"key":"e_1_2_1_170_1","volume-title":"Proceedings of the SoGood Workshop.","author":"Tacchini Eugenio","year":"2017"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742572"},{"key":"e_1_2_1_172_1","unstructured":"The Independent. 2017. St Petersburg \u201ctroll farm\u201d had 90 dedicated staff working to influence US election campaign. Retrieved from https:\/\/ind.pn\/2yuCQdy.  The Independent. 2017. St Petersburg \u201ctroll farm\u201d had 90 dedicated staff working to influence US election campaign. Retrieved from https:\/\/ind.pn\/2yuCQdy."},{"key":"e_1_2_1_173_1","unstructured":"The New Yorker. 2017. How the NRA manipulates gun owners and the media. Retrieved from https:\/\/www.newyorker.com\/news\/news-desk\/how-the-nra-manipulates-gun-owners-and-the-media.  The New Yorker. 2017. How the NRA manipulates gun owners and the media. Retrieved from https:\/\/www.newyorker.com\/news\/news-desk\/how-the-nra-manipulates-gun-owners-and-the-media."},{"key":"e_1_2_1_174_1","volume-title":"Proceedings of the ISCRAM.","author":"Thomson Robert","year":"2012"},{"key":"e_1_2_1_175_1","unstructured":"Graig Timberg. 2017. Spreading fake news becomes standard practice for governments across the world. Retrieved from https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2017\/07\/17\/spreading-fake-news-becomes-standard-practice-for-governments-across-the-world\/.  Graig Timberg. 2017. Spreading fake news becomes standard practice for governments across the world. Retrieved from https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2017\/07\/17\/spreading-fake-news-becomes-standard-practice-for-governments-across-the-world\/."},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056957"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871737"},{"key":"e_1_2_1_178_1","unstructured":"US House of Representatives. 2018. Exposing Russia\u2019s effort to sow discord online: The Internet Research Agency and advertisements. Retrieved from https:\/\/democrats-intelligence.house.gov\/social-media-content\/.  US House of Representatives. 2018. Exposing Russia\u2019s effort to sow discord online: The Internet Research Agency and advertisements. Retrieved from https:\/\/democrats-intelligence.house.gov\/social-media-content\/."},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2102"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.221"},{"key":"e_1_2_1_181_1","doi-asserted-by":"crossref","unstructured":"Soroush Vosoughi Deb Roy and Sinan Aral. 2018. The spread of true and false news online. Science 359 6380 (2018) 1146--1151.  Soroush Vosoughi Deb Roy and Sinan Aral. 2018. The spread of true and false news online. Science 359 6380 (2018) 1146--1151.","DOI":"10.1126\/science.aap9559"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04595-0_39"},{"key":"e_1_2_1_183_1","volume-title":"Proceedings of the AAAI.","author":"Wang Biao","year":"2016"},{"key":"e_1_2_1_184_1","volume-title":"Proceedings of the PACIS.","author":"Wang Nan","year":"2014"},{"key":"e_1_2_1_185_1","doi-asserted-by":"crossref","unstructured":"William Yang Wang. 2017. \u201cLiar liar pants on fire\u201d: A new benchmark dataset for fake news detection. Retrieved from arXiv preprint arXiv:1705.00648.  William Yang Wang. 2017. \u201cLiar liar pants on fire\u201d: A new benchmark dataset for fake news detection. Retrieved from arXiv preprint arXiv:1705.00648.","DOI":"10.18653\/v1\/P17-2067"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591993"},{"key":"e_1_2_1_187_1","unstructured":"Wikipedia. 2017. Murder of Seth Rich. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Murder_of_Seth_Rich.  Wikipedia. 2017. Murder of Seth Rich. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Murder_of_Seth_Rich."},{"key":"e_1_2_1_188_1","unstructured":"Wikipedia. 2017. Pizzagate conspiracy theory. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Pizzagate_conspiracy_theory.  Wikipedia. 2017. Pizzagate conspiracy theory. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Pizzagate_conspiracy_theory."},{"key":"e_1_2_1_189_1","unstructured":"Wikipedia. 2018. Sandy Hook Elementary School shooting conspiracy theories. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Sandy_Hook_Elementary_School_shooting_conspiracy_theories.  Wikipedia. 2018. Sandy Hook Elementary School shooting conspiracy theories. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Sandy_Hook_Elementary_School_shooting_conspiracy_theories."},{"key":"e_1_2_1_190_1","doi-asserted-by":"crossref","unstructured":"Sam Wineburg and Sarah McGrew. 2017. Lateral reading: Reading less and learning more when evaluating digital information. Available at https:\/\/ssrn.com\/abstract&equals;3048994  Sam Wineburg and Sarah McGrew. 2017. Lateral reading: Reading less and learning more when evaluating digital information. Available at https:\/\/ssrn.com\/abstract&equals;3048994","DOI":"10.2139\/ssrn.3048994"},{"key":"e_1_2_1_191_1","volume-title":"Proceedings of the ICWSM.","author":"Fai Wong Felix Ming","year":"2013"},{"key":"e_1_2_1_192_1","doi-asserted-by":"crossref","unstructured":"Samuel C. Woolley. 2016. Automating power: Social bot interference in global politics. First Mond. 21 4 (2016).  Samuel C. Woolley. 2016. Automating power: Social bot interference in global politics. First Mond. 21 4 (2016).","DOI":"10.5210\/fm.v21i4.6161"},{"key":"e_1_2_1_193_1","volume-title":"Proceedings of the ICDE.","author":"Wu Ke"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.12"},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_2_1_196_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47880-7_20"},{"key":"e_1_2_1_197_1","volume-title":"Proceedings of the ICWSM.","author":"Yang Xiaofeng","year":"2015"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.1109\/WISA.2015.19"},{"key":"e_1_2_1_199_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191531"},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131390"},{"key":"e_1_2_1_201_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316495"},{"key":"e_1_2_1_202_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00018"},{"key":"e_1_2_1_203_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188731"},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25207-0_10"},{"key":"e_1_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741637"},{"key":"e_1_2_1_206_1","volume-title":"Proceedings of the ICWSM.","author":"Zhou Daniel Xiaodan","year":"2011"},{"key":"e_1_2_1_207_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742571"},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181821"},{"key":"e_1_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0138740"},{"key":"e_1_2_1_210_1","volume-title":"Proceedings of the AAAIW.","author":"Zubiaga Arkaitz","year":"2015"},{"key":"e_1_2_1_211_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0150989"}],"container-title":["Journal of Data and Information Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:59Z","timestamp":1750208279000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309699"}},"subtitle":["Rumors, Fake News, Hoaxes, Clickbait, and Various Other Shenanigans"],"short-title":[],"issued":{"date-parts":[[2019,5,7]]},"references-count":210,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9,30]]}},"alternative-id":["10.1145\/3309699"],"URL":"https:\/\/doi.org\/10.1145\/3309699","relation":{},"ISSN":["1936-1955","1936-1963"],"issn-type":[{"value":"1936-1955","type":"print"},{"value":"1936-1963","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,7]]},"assertion":[{"value":"2018-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}