{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:04:28Z","timestamp":1776114268825,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,6]],"date-time":"2019-04-06T00:00:00Z","timestamp":1554508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,6]]},"DOI":"10.1145\/3325917.3325938","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"171-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Online Misinformation Spread"],"prefix":"10.1145","author":[{"given":"Malik","family":"Almaliki","sequence":"first","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Yanbu, KSA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,6]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/meet.14505001102","article-title":"Misinformation? What of it? 'Motivations and individual differences in misinformation sharing on social media","volume":"50","author":"Chen X.","year":"2013","unstructured":"Chen , X. and Sin , S.C.J. , 2013 . ' Misinformation? What of it? 'Motivations and individual differences in misinformation sharing on social media . Proceedings of the Association for Information Science and Technology , 50 ( 1 ), pp. 1 -- 4 . Chen, X. and Sin, S.C.J., 2013. 'Misinformation? What of it? 'Motivations and individual differences in misinformation sharing on social media. Proceedings of the Association for Information Science and Technology, 50(1), pp.1--4.","journal-title":"Proceedings of the Association for Information Science and Technology"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.05"},{"key":"e_1_3_2_1_3_1","volume-title":"Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. iConference 2014 Proceedings","author":"Starbird K.","year":"2014","unstructured":"Starbird , K. , Maddock , J. , Orand , M. , Achterman , P. , & Mason , R. M. ( 2014 ). Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. iConference 2014 Proceedings . Starbird, K., Maddock, J., Orand, M., Achterman, P., & Mason, R. M. (2014). Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. iConference 2014 Proceedings."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551509346785"},{"key":"e_1_3_2_1_5_1","volume-title":"A social diffusion model of misinformation and disinformation for understanding human information behaviour. Information Research, 18 (1).","author":"Karlova N. A.","year":"2013","unstructured":"Karlova , N. A. , & Fisher , K. E. ( 2013 ). A social diffusion model of misinformation and disinformation for understanding human information behaviour. Information Research, 18 (1). Retrieved from http:\/\/informationr.net\/ir\/18-1\/paper573.html Karlova, N. A., & Fisher, K. E. (2013). A social diffusion model of misinformation and disinformation for understanding human information behaviour. Information Research, 18 (1). Retrieved from http:\/\/informationr.net\/ir\/18-1\/paper573.html"},{"key":"e_1_3_2_1_6_1","volume-title":"Top 10 trends of 2014: 10. The rapid spread of misinformation online. from http:\/\/bit.ly\/1edZQQF","author":"World Economic Forum","year":"2014","unstructured":"World Economic Forum . ( 2014 ). Top 10 trends of 2014: 10. The rapid spread of misinformation online. from http:\/\/bit.ly\/1edZQQF World Economic Forum. (2014). Top 10 trends of 2014: 10. The rapid spread of misinformation online. from http:\/\/bit.ly\/1edZQQF"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_3_2_1_8_1","volume-title":"Detecting and tracking the spread of astroturf memes in microblog streams","author":"Ratkiewicz J.","year":"2011","unstructured":"Ratkiewicz , J. , Conover , M. , Meiss , M. , Gon\u00e7alves , B. , Patil , S. , Flammini , A. , & Menczer , F. ( 2011 ). Detecting and tracking the spread of astroturf memes in microblog streams . Ratkiewicz, J., Conover, M., Meiss, M., Gon\u00e7alves, B., Patil, S., Flammini, A., & Menczer, F. (2011). Detecting and tracking the spread of astroturf memes in microblog streams."},{"key":"e_1_3_2_1_9_1","volume-title":"Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. iConference 2014 Proceedings","author":"Starbird K.","year":"2014","unstructured":"Starbird , K. , Maddock , J. , Orand , M. , Achterman , P. , & Mason , R. M. ( 2014 ). Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. iConference 2014 Proceedings . Starbird, K., Maddock, J., Orand, M., Achterman, P., & Mason, R. M. (2014). Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. iConference 2014 Proceedings."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.9776\/16145"},{"key":"e_1_3_2_1_11_1","first-page":"9","volume-title":"From game design elements to gamefulness: defining gamification,\" in Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments","author":"Deterding D.","year":"2011","unstructured":"S. Deterding , D. Dixon , R. Khaled , and L. Nacke , \" From game design elements to gamefulness: defining gamification,\" in Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments , 2011 , pp. 9 -- 15 . S. Deterding, D. Dixon, R. Khaled, and L. Nacke, \"From game design elements to gamefulness: defining gamification,\" in Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, 2011, pp. 9--15."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA-ECSA.212.33"},{"key":"e_1_3_2_1_13_1","first-page":"223","volume-title":"A user-centered theoretical framework for meaningful gamification. Games+ Learning+ Society, 8(1)","author":"Nicholson S.","unstructured":"Nicholson , S. , 2012. A user-centered theoretical framework for meaningful gamification. Games+ Learning+ Society, 8(1) , pp. 223 -- 230 . Nicholson, S., 2012. A user-centered theoretical framework for meaningful gamification. Games+ Learning+ Society, 8(1), pp.223--230."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2016.10.002"},{"key":"e_1_3_2_1_15_1","volume-title":"European Conference on Games Based Learning (Vol. 2015-Janua","author":"Pl\u00f8hn T.","year":"2015","unstructured":"Pl\u00f8hn , T. , & Aalberg , T. ( 2015 ). Using Gamification to Motivate Smoking Cessation . In European Conference on Games Based Learning (Vol. 2015-Janua , p. 431). Retrieved from https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.084955100411&partnerID=40&md5=576d6e9b7d4e44ddeb625dc9b082bb9f Pl\u00f8hn, T., & Aalberg, T. (2015). Using Gamification to Motivate Smoking Cessation. In European Conference on Games Based Learning (Vol. 2015-Janua, p. 431). Retrieved from https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.084955100411&partnerID=40&md5=576d6e9b7d4e44ddeb625dc9b082bb9f"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513456.2513469"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.06.007"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.08.002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.063"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"InterAksyon","year":"2012","unstructured":"InterAksyon . ( 2012 ). In stress-filled BPO world, \"gamification\" could offer relief | Infotek News: InterAksyon.com . Retrieved May 29, 2015, from http:\/\/www.interaksyon.com\/infotech\/in-stressfilled-bpo-world-gamification-could-offer-relief InterAksyon. (2012). In stress-filled BPO world, \"gamification\" could offer relief | Infotek News: InterAksyon.com. Retrieved May 29, 2015, from http:\/\/www.interaksyon.com\/infotech\/in-stressfilled-bpo-world-gamification-could-offer-relief"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Dalpiaz F. Snijders R. Brinkkemper S. Hosseini M. Shahri A. and Ali R. 2017. Engaging the crowd of stakeholders in requirements engineering via gamification. In Gamification (pp. 123--135). Springer International Publishing.  Dalpiaz F. Snijders R. Brinkkemper S. Hosseini M. Shahri A. and Ali R. 2017. Engaging the crowd of stakeholders in requirements engineering via gamification. In Gamification (pp. 123--135). Springer International Publishing.","DOI":"10.1007\/978-3-319-45557-0_9"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering, 68--77","author":"Petersen K.","unstructured":"Petersen , K. , Feldt , R. , Mujtaba , S. and Mattsson , M . 2008. Systematic mapping studies in software engineering . In Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering, 68--77 . Petersen, K., Feldt, R., Mujtaba, S. and Mattsson, M. 2008. Systematic mapping studies in software engineering. In Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering, 68--77."},{"key":"e_1_3_2_1_23_1","volume-title":"Online harassment","author":"Duggan M.","year":"2014","unstructured":"Duggan M. Online harassment ; 2014 . Washington, DC : Pew Research Center . Available: http:\/\/www.pewinternet.org\/2014\/10\/22\/online-harassment\/. Accessed 1 January 2019. Duggan M. Online harassment; 2014. Washington, DC: Pew Research Center. Available: http:\/\/www.pewinternet.org\/2014\/10\/22\/online-harassment\/. Accessed 1 January 2019."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Miriam Fernandez and Harith Alani. 2018. Online Misinformation: Challenges and Future Directions. In Companion Proceedings of the The Web Conference 2018 (WWW '18). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva Switzerland 595--602.  Miriam Fernandez and Harith Alani. 2018. Online Misinformation: Challenges and Future Directions. In Companion Proceedings of the The Web Conference 2018 (WWW '18). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva Switzerland 595--602.","DOI":"10.1145\/3184558.3188730"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0021-6"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 20th international conference on World wide web (pp. 665--674)","author":"Budak C.","unstructured":"Budak , C. , Agrawal , D. and El Abbadi, A., 2011, March. Limiting the spread of misinformation in social networks . In Proceedings of the 20th international conference on World wide web (pp. 665--674) . ACM. Budak, C., Agrawal, D. and El Abbadi, A., 2011, March. Limiting the spread of misinformation in social networks. In Proceedings of the 20th international conference on World wide web (pp. 665--674). ACM."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 1589--1599)","author":"Qazvinian V.","unstructured":"Qazvinian , V. , Rosengren , E. , Radev , D.R. and Mei , Q ., 2011, July. Rumor has it: Identifying misinformation in microblogs . In Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 1589--1599) . Association for Computational Linguistics. Qazvinian, V., Rosengren, E., Radev, D.R. and Mei, Q., 2011, July. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 1589--1599). Association for Computational Linguistics."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 4th Annual ACM Web Science Conference (pp. 213--222)","author":"Nguyen N.P.","unstructured":"Nguyen , N.P. , Yan , G. , Thai , M.T. and Eidenbenz , S ., 2012, June. Containment of misinformation spread in online social networks . In Proceedings of the 4th Annual ACM Web Science Conference (pp. 213--222) . ACM. Nguyen, N.P., Yan, G., Thai, M.T. and Eidenbenz, S., 2012, June. Containment of misinformation spread in online social networks. In Proceedings of the 4th Annual ACM Web Science Conference (pp. 213--222). ACM."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188722"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079452.3079483"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134715"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079452.3079505"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 18th Annual International Conference on Digital Government Research (pp. 213--222)","author":"Chatfield A.T.","unstructured":"Chatfield , A.T. , Reddick , C.G. and Choi , K.P ., 2017, June. Online Media Use of False News to Frame the 2016 Trump Presidential Campaign . In Proceedings of the 18th Annual International Conference on Digital Government Research (pp. 213--222) . ACM. Chatfield, A.T., Reddick, C.G. and Choi, K.P., 2017, June. Online Media Use of False News to Frame the 2016 Trump Presidential Campaign. In Proceedings of the 18th Annual International Conference on Digital Government Research (pp. 213--222). ACM."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161603"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 2013 conference on Computer supported cooperative work (pp. 1047--1058)","author":"Garrett R.K.","unstructured":"Garrett , R.K. and Weeks , B.E ., 2013, February. The promise and peril of real-time corrections to political misperceptions . In Proceedings of the 2013 conference on Computer supported cooperative work (pp. 1047--1058) . ACM. Garrett, R.K. and Weeks, B.E., 2013, February. The promise and peril of real-time corrections to political misperceptions. In Proceedings of the 2013 conference on Computer supported cooperative work (pp. 1047--1058). ACM."},{"key":"e_1_3_2_1_37_1","volume-title":"Engineering & MIS (ICEMIS), 2017 International Conference on (pp. 1--8). IEEE.","author":"Pourghomi P.","unstructured":"Pourghomi , P. , Safieddine , F. , Masri , W. and Dordevic , M ., 2017, May. How to stop spread of misinformation on social media: Facebook plans vs. right-click authenticate approach . In Engineering & MIS (ICEMIS), 2017 International Conference on (pp. 1--8). IEEE. Pourghomi, P., Safieddine, F., Masri, W. and Dordevic, M., 2017, May. How to stop spread of misinformation on social media: Facebook plans vs. right-click authenticate approach. In Engineering & MIS (ICEMIS), 2017 International Conference on (pp. 1--8). IEEE."},{"key":"e_1_3_2_1_38_1","volume-title":"Information Forensics and Security (WIFS), 2017 IEEE Workshop on (pp. 1--6). IEEE.","author":"Conti M.","unstructured":"Conti , M. , Lain , D. , Lazzeretti , R. , Lovisotto , G. and Quattrociocchi , W ., 2017, December. It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features . In Information Forensics and Security (WIFS), 2017 IEEE Workshop on (pp. 1--6). IEEE. Conti, M., Lain, D., Lazzeretti, R., Lovisotto, G. and Quattrociocchi, W., 2017, December. It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features. In Information Forensics and Security (WIFS), 2017 IEEE Workshop on (pp. 1--6). IEEE."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188728"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188722"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 541--548)","author":"Zhang H.","unstructured":"Zhang , H. , Kuhnle , A. , Zhang , H. and Thai , M.T ., 2016, August. Detecting misinformation in online social networks before it is too late . In Proceedings of the 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 541--548) . IEEE Press. Zhang, H., Kuhnle, A., Zhang, H. and Thai, M.T., 2016, August. Detecting misinformation in online social networks before it is too late. In Proceedings of the 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 541--548). IEEE Press."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2885494"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188723"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2013.34"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097297"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.06.058"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/3017447.3017524"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2661487.2661488"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community (p. 95)","author":"Chen X.","unstructured":"Chen , X. , Sin , S.C.J. , Theng , Y.L. and Lee , C.S ., 2015, November. Deterring the spread of misinformation on social network sites: a social cognitive theory-guided intervention . In Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community (p. 95) . American Society for Information Science. Chen, X., Sin, S.C.J., Theng, Y.L. and Lee, C.S., 2015, November. Deterring the spread of misinformation on social network sites: a social cognitive theory-guided intervention. In Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community (p. 95). American Society for Information Science."},{"key":"e_1_3_2_1_50_1","volume-title":"April. Silent Chatbot Agent Amplifies Continued-Influence Effect on Misinformation. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. SRC24)","author":"Yu S.","unstructured":"Yu , S. and Han , K.H ., 2018 , April. Silent Chatbot Agent Amplifies Continued-Influence Effect on Misinformation. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. SRC24) . ACM. Yu, S. and Han, K.H., 2018, April. Silent Chatbot Agent Amplifies Continued-Influence Effect on Misinformation. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. SRC24). ACM."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 126--145)","author":"Mitra T.","unstructured":"Mitra , T. , Wright , G.P. and Gilbert , E ., 2017, February. A parsimonious language model of social media credibility across disparate events . In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 126--145) . ACM. Mitra, T., Wright, G.P. and Gilbert, E., 2017, February. A parsimonious language model of social media credibility across disparate events. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 126--145). ACM."}],"event":{"name":"ICISDM 2019: 2019 The 3rd International Conference on Information System and Data Mining","location":"Houston TX USA","acronym":"ICISDM 2019","sponsor":["University of Houston"]},"container-title":["Proceedings of the 2019 3rd International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325917.3325938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:08Z","timestamp":1750204388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325938"}},"subtitle":["A Systematic Literature Map"],"short-title":[],"issued":{"date-parts":[[2019,4,6]]},"references-count":50,"alternative-id":["10.1145\/3325917.3325938","10.1145\/3325917"],"URL":"https:\/\/doi.org\/10.1145\/3325917.3325938","relation":{},"subject":[],"published":{"date-parts":[[2019,4,6]]},"assertion":[{"value":"2019-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}