{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:28:14Z","timestamp":1776115694635,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2019,11,7]]},"abstract":"<jats:p>Arabic Twitter space is crawling with bots that fuel political feuds, spread misinformation, and proliferate sectarian rhetoric. While efforts have long existed to analyze and detect English bots, Arabic bot detection and characterization remains largely understudied. In this work, we contribute new insights into the role of bots in spreading religious hatred on Arabic Twitter and introduce a novel regression model that can accurately identify Arabic language bots. Our assessment shows that existing tools that are highly accurate in detecting English bots don't perform as well on Arabic bots. We identify the possible reasons for this poor performance, perform a thorough analysis of linguistic, content, behavioral and network features, and report on the most informative features that distinguish Arabic bots from humans as well as the differences between Arabic and English bots. Our results mark an important step toward understanding the behavior of malicious bots on Arabic Twitter and pave the way for a more effective Arabic bot detection tools.<\/jats:p>","DOI":"10.1145\/3359163","type":"journal-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:21Z","timestamp":1573220421000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Hateful People or Hateful Bots?"],"prefix":"10.1145","volume":"3","author":[{"given":"Nuha","family":"Albadi","sequence":"first","affiliation":[{"name":"Taibah University and University of Colorado Boulder, Medina, Saudi Arabia"}]},{"given":"Maram","family":"Kurdi","sequence":"additional","affiliation":[{"name":"Taif University and University of Colorado Boulder, Taif, Saudi Arabia"}]},{"given":"Shivakant","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675208"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"13","author":"Addawood Aseel","year":"2019","unstructured":"Aseel Addawood , Adam Badawy , Kristina Lerman , and Emilio Ferrara . 2019 . Linguistic Cues to Deception: Identifying Political Trolls on Social Media . In Proceedings of the International AAAI Conference on Web and Social Media , Vol. 13 . AAAI, 15--25. https:\/\/www.aaai.org\/ojs\/index.php\/ICWSM\/article\/view\/3205 Aseel Addawood, Adam Badawy, Kristina Lerman, and Emilio Ferrara. 2019. Linguistic Cues to Deception: Identifying Political Trolls on Social Media. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 13. AAAI, 15--25. https:\/\/www.aaai.org\/ojs\/index.php\/ICWSM\/article\/view\/3205"},{"key":"e_1_2_1_3_1","volume-title":"Analysis and Detection of Religious Hate Speech in the Arabic Twittersphere. In 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 69--76","author":"Albadi Nuha","year":"2018","unstructured":"Nuha Albadi , Maram Kurdi , and Shivakant Mishra . 2018 . Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic Twittersphere. In 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 69--76 . https:\/\/doi.org\/10.1109\/ASONAM.2018.8508247 Nuha Albadi, Maram Kurdi, and Shivakant Mishra. 2018. Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic Twittersphere. In 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 69--76. https:\/\/doi.org\/10.1109\/ASONAM.2018.8508247"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0587-5"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054223"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181405"},{"key":"e_1_2_1_7_1","first-page":"4","article-title":"The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter","volume":"3","author":"Berger Jonathon M","year":"2015","unstructured":"Jonathon M Berger and Jonathon Morgan . 2015 . The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter . The Brookings Project on US Relations with the Islamic World , Vol. 3 , 20 (2015), 4 -- 1 . https:\/\/www.brookings.edu\/wp-content\/uploads\/2016\/06\/isis_twitter_census_berger_morgan.pdf Jonathon M Berger and Jonathon Morgan. 2015. The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World, Vol. 3, 20 (2015), 4--1. https:\/\/www.brookings.edu\/wp-content\/uploads\/2016\/06\/isis_twitter_census_berger_morgan.pdf","journal-title":"The Brookings Project on US Relations with the Islamic World"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508322"},{"key":"e_1_2_1_9_1","volume-title":"First Monday","volume":"21","author":"Bessi Alessandro","year":"2016","unstructured":"Alessandro Bessi and Emilio Ferrara . 2016 . Social bots distort the 2016 US Presidential election online discussion . First Monday , Vol. 21 , 11 (2016). https:\/\/doi.org\/10.5210\/fm.v21i11.7090 Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. First Monday, Vol. 21, 11 (2016). https:\/\/doi.org\/10.5210\/fm.v21i11.7090"},{"key":"e_1_2_1_10_1","volume-title":"Natural language processing with Python: analyzing text with the natural language toolkit .\" O'Reilly Media","author":"Bird Steven","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural language processing with Python: analyzing text with the natural language toolkit .\" O'Reilly Media , Inc .\". https:\/\/doi.org\/10.1007\/s10579-010--9124-x Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural language processing with Python: analyzing text with the natural language toolkit .\" O'Reilly Media, Inc.\". https:\/\/doi.org\/10.1007\/s10579-010--9124-x"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675163"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174240"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134666"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054733"},{"key":"e_1_2_1_15_1","volume-title":"Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. Psychological bulletin","author":"Cohen Jacob","year":"1968","unstructured":"Jacob Cohen . 1968. Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. Psychological bulletin , Vol. 70 , 4 ( 1968 ), 213. https:\/\/doi.org\/10.1037\/h0026256 Jacob Cohen. 1968. Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. Psychological bulletin, Vol. 70, 4 (1968), 213. https:\/\/doi.org\/10.1037\/h0026256"},{"key":"e_1_2_1_16_1","first-page":"293","article-title":"Conformity and Prejudice .John Wiley & Sons, Ltd","volume":"18","author":"Crandall Christian S.","year":"2008","unstructured":"Christian S. Crandall and Charles Stangor . 2008 . Conformity and Prejudice .John Wiley & Sons, Ltd , Chapter 18 , 293 -- 309 . https:\/\/doi.org\/10.1002\/9780470773963.ch18 Christian S. Crandall and Charles Stangor. 2008. Conformity and Prejudice .John Wiley & Sons, Ltd, Chapter 18, 293--309. https:\/\/doi.org\/10.1002\/9780470773963.ch18","journal-title":"Chapter"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398658"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998220"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3115\/1613984.1614022"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742760"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2016.7470791"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134678"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644879.1644881"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_2_1_26_1","volume-title":"Twitter is (still) failing. https:\/\/medium.com\/@geoffgolberg\/ when-it-comes-to-dealing-with-fake-bot-accounts-twitter-is-still-failing-a79d9ece5b5d Retrieved","author":"Golberg Geoff","year":"2019","unstructured":"Geoff Golberg . 2018. When it comes to dealing with fake\/bot accounts , Twitter is (still) failing. https:\/\/medium.com\/@geoffgolberg\/ when-it-comes-to-dealing-with-fake-bot-accounts-twitter-is-still-failing-a79d9ece5b5d Retrieved March 04, 2019 from Geoff Golberg. 2018. When it comes to dealing with fake\/bot accounts, Twitter is (still) failing. https:\/\/medium.com\/@geoffgolberg\/ when-it-comes-to-dealing-with-fake-bot-accounts-twitter-is-still-failing-a79d9ece5b5d Retrieved March 04, 2019 from"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274333"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/30.1-2.81"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025830"},{"key":"e_1_2_1_30_1","volume-title":"botcheck.me: detect & track Twitter bots. https:\/\/botcheck.me Retrieved","author":"Labs RoBhat","year":"2019","unstructured":"RoBhat Labs . 2017. botcheck.me: detect & track Twitter bots. https:\/\/botcheck.me Retrieved March 05, 2019 from RoBhat Labs. 2017. botcheck.me: detect & track Twitter bots. https:\/\/botcheck.me Retrieved March 05, 2019 from"},{"key":"e_1_2_1_31_1","volume-title":"The measurement of observer agreement for categorical data. biometrics","author":"Richard Landis J","year":"1977","unstructured":"J Richard Landis and Gary G Koch . 1977. The measurement of observer agreement for categorical data. biometrics ( 1977 ), 159--174. https:\/\/doi.org\/10.2307\/2529310 J Richard Landis and Gary G Koch. 1977. The measurement of observer agreement for categorical data. biometrics (1977), 159--174. https:\/\/doi.org\/10.2307\/2529310"},{"key":"e_1_2_1_32_1","volume-title":"Fifth International AAAI Conference on Weblogs and Social Media. AAAI, 185--192","author":"Lee Kyumin","year":"2011","unstructured":"Kyumin Lee , Brian David Eoff , and James Caverlee . 2011 . Seven months with the devils: A long-term study of content polluters on twitter . In Fifth International AAAI Conference on Weblogs and Social Media. AAAI, 185--192 . https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM11\/paper\/viewPaper\/2780 Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven months with the devils: A long-term study of content polluters on twitter. In Fifth International AAAI Conference on Weblogs and Social Media. AAAI, 185--192. https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM11\/paper\/viewPaper\/2780"},{"key":"e_1_2_1_33_1","volume-title":"Decision trees and random forests. https:\/\/towardsdatascience.com\/decision-trees-and-random-forests-df0c3123f991 Retrieved","author":"Liberman Neil","year":"2019","unstructured":"Neil Liberman . 2017. Decision trees and random forests. https:\/\/towardsdatascience.com\/decision-trees-and-random-forests-df0c3123f991 Retrieved March 31, 2019 from Neil Liberman. 2017. Decision trees and random forests. https:\/\/towardsdatascience.com\/decision-trees-and-random-forests-df0c3123f991 Retrieved March 31, 2019 from"},{"key":"e_1_2_1_34_1","volume-title":"textblob Documentation. https:\/\/media.readthedocs.org\/pdf\/textblob\/latest\/textblob.pdf Retrieved","author":"Loria Steven","year":"2019","unstructured":"Steven Loria . 2018. textblob Documentation. https:\/\/media.readthedocs.org\/pdf\/textblob\/latest\/textblob.pdf Retrieved March 16, 2019 from Steven Loria. 2018. textblob Documentation. https:\/\/media.readthedocs.org\/pdf\/textblob\/latest\/textblob.pdf Retrieved March 16, 2019 from"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908131.2908150"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078723"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192525"},{"key":"e_1_2_1_38_1","volume-title":"Prejudice reduction: What works? A review and assessment of research and practice. Annual review of psychology","author":"Paluck Elizabeth Levy","year":"2009","unstructured":"Elizabeth Levy Paluck and Donald P Green . 2009. Prejudice reduction: What works? A review and assessment of research and practice. Annual review of psychology , Vol. 60 ( 2009 ), 339--367. https:\/\/doi.org\/10.1146\/annurev.psych.60.110707.163607 Elizabeth Levy Paluck and Donald P Green. 2009. Prejudice reduction: What works? A review and assessment of research and practice. Annual review of psychology, Vol. 60 (2009), 339--367. https:\/\/doi.org\/10.1146\/annurev.psych.60.110707.163607"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274406"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_1_41_1","unstructured":"Pew Research Center Washington D.C. 2018. 5 things to know about bots on Twitter. http:\/\/www.pewresearch.org\/fact-tank\/2018\/04\/09\/5-things-to-know-about-bots-on-twitter\/ Retrieved March 07 2019 from  Pew Research Center Washington D.C. 2018. 5 things to know about bots on Twitter. http:\/\/www.pewresearch.org\/fact-tank\/2018\/04\/09\/5-things-to-know-about-bots-on-twitter\/ Retrieved March 07 2019 from"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the CoNLL 2018 Shared Task: Multilingual Parsing from Raw Text to Universal Dependencies. Association for Computational Linguistics","author":"Qi Peng","year":"2018","unstructured":"Peng Qi , Timothy Dozat , Yuhao Zhang , and Christopher D. Manning . 2018. Universal Dependency Parsing from Scratch . In Proceedings of the CoNLL 2018 Shared Task: Multilingual Parsing from Raw Text to Universal Dependencies. Association for Computational Linguistics , Brussels, Belgium, 160--170. https:\/\/nlp.stanford.edu\/pubs\/qi 2018 universal.pdf Peng Qi, Timothy Dozat, Yuhao Zhang, and Christopher D. Manning. 2018. Universal Dependency Parsing from Scratch. In Proceedings of the CoNLL 2018 Shared Task: Multilingual Parsing from Raw Text to Universal Dependencies. Association for Computational Linguistics, Brussels, Belgium, 160--170. https:\/\/nlp.stanford.edu\/pubs\/qi2018universal.pdf"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45--50","author":"Rehruvrek Radim","year":"2010","unstructured":"Radim v Rehruvrek and Petr Sojka . 2010 . Software Framework for Topic Modelling with Large Corpora . In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45--50 . http:\/\/is.muni.cz\/publication\/884893\/en. Radim v Rehruvrek and Petr Sojka. 2010. Software Framework for Topic Modelling with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45--50. http:\/\/is.muni.cz\/publication\/884893\/en."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"2","author":"Rim Rho Eugenia Ha","year":"2018","unstructured":"Eugenia Ha Rim Rho , Gloria Mark , and Melissa Mazmanian . 2018 . Fostering Civil Discourse Online: Linguistic Behavior in Comments of# MeToo Articles across Political Perspectives . Proceedings of the ACM on Human-Computer Interaction , Vol. 2 , CSCW (2018), 147. https:\/\/doi.org\/10.1145\/3274416 Eugenia Ha Rim Rho, Gloria Mark, and Melissa Mazmanian. 2018. Fostering Civil Discourse Online: Linguistic Behavior in Comments of# MeToo Articles across Political Perspectives. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 147. https:\/\/doi.org\/10.1145\/3274416"},{"key":"e_1_2_1_46_1","unstructured":"Ando Saabas. 2014. Selecting good features - part III: random forests. http:\/\/blog.datadive.net\/selecting-good-features-part-iii-random-forests\/ Retrieved March 20 2019 from  Ando Saabas. 2014. Selecting good features - part III: random forests. http:\/\/blog.datadive.net\/selecting-good-features-part-iii-random-forests\/ Retrieved March 20 2019 from"},{"key":"e_1_2_1_47_1","unstructured":"Ando Saabas. 2015. Random forest interpretation with scikit-learn. http:\/\/blog.datadive.net\/random-forest-interpretation-with-scikit-learn\/ Retrieved March 14 2019 from  Ando Saabas. 2015. Random forest interpretation with scikit-learn. http:\/\/blog.datadive.net\/random-forest-interpretation-with-scikit-learn\/ Retrieved March 14 2019 from"},{"key":"e_1_2_1_48_1","volume-title":"Saiph Savage, and Jessica Hammer.","author":"Seering Joseph","year":"2018","unstructured":"Joseph Seering , Juan Pablo Flores , Saiph Savage, and Jessica Hammer. 2018 . The Social Roles of Bots: Evaluating Impact of Bots on Discussions in Online Communities. Proceedings of the ACM on Human-Computer Interaction, Vol. 2 , CSCW ( 2018), 157. https:\/\/doi.org\/10.1145\/3274426 Joseph Seering, Juan Pablo Flores, Saiph Savage, and Jessica Hammer. 2018. The Social Roles of Bots: Evaluating Impact of Bots on Discussions in Online Communities. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 157. https:\/\/doi.org\/10.1145\/3274426"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM '16)","author":"Silva Leandro Ara\u00fajo","year":"2016","unstructured":"Leandro Ara\u00fajo Silva , Mainack Mondal , Denzil Correa , Fabr'icio Benevenuto , and Ingmar Weber . 2016 . Analyzing the Targets of Hate in Online Social Media .. In Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM '16) . AAAI, 687--690. https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM16\/paper\/viewPaper\/13147 Leandro Ara\u00fajo Silva, Mainack Mondal, Denzil Correa, Fabr'icio Benevenuto, and Ingmar Weber. 2016. Analyzing the Targets of Hate in Online Social Media.. In Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM '16). AAAI, 687--690. https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM16\/paper\/viewPaper\/13147"},{"key":"e_1_2_1_50_1","volume-title":"Hear No Evil: Audio-Visual-Textual Cyberbullying Detection. Proceedings of the ACM on Human-Computer Interaction","volume":"2","author":"Soni Devin","year":"2018","unstructured":"Devin Soni and Vivek K Singh . 2018 . See No Evil , Hear No Evil: Audio-Visual-Textual Cyberbullying Detection. Proceedings of the ACM on Human-Computer Interaction , Vol. 2 , CSCW (2018), 164. https:\/\/doi.org\/10.1145\/3274433 Devin Soni and Vivek K Singh. 2018. See No Evil, Hear No Evil: Audio-Visual-Textual Cyberbullying Detection. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 164. https:\/\/doi.org\/10.1145\/3274433"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/1412159"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167201274009"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58559-8_30"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_2_1_55_1","volume-title":"How Twitter is fighting spam and malicious automation. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/how-twitter-is-fighting-spam-and-malicious-automation.html Retrieved","year":"2019","unstructured":"Twitter. 2018a. How Twitter is fighting spam and malicious automation. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/how-twitter-is-fighting-spam-and-malicious-automation.html Retrieved March 03, 2019 from Twitter. 2018a. How Twitter is fighting spam and malicious automation. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/how-twitter-is-fighting-spam-and-malicious-automation.html Retrieved March 03, 2019 from"},{"key":"e_1_2_1_56_1","volume-title":"Update on Twitter's review of the 2016 US election. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/2016-election-update.html Retrieved","year":"2019","unstructured":"Twitter. 2018b. Update on Twitter's review of the 2016 US election. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/2016-election-update.html Retrieved March 03, 2019 from Twitter. 2018b. Update on Twitter's review of the 2016 US election. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/2016-election-update.html Retrieved March 03, 2019 from"},{"key":"e_1_2_1_57_1","volume-title":"Number of monthly active Twitter users worldwide from 1st quarter 2010 to 4th quarter 2018 (in millions). https:\/\/www.statista.com\/statistics\/282087\/number-of-monthly-active-twitter-users\/ Retrieved","year":"2019","unstructured":"Twitter. 2019. Number of monthly active Twitter users worldwide from 1st quarter 2010 to 4th quarter 2018 (in millions). https:\/\/www.statista.com\/statistics\/282087\/number-of-monthly-active-twitter-users\/ Retrieved March 03, 2019 from Twitter. 2019. Number of monthly active Twitter users worldwide from 1st quarter 2010 to 4th quarter 2018 (in millions). https:\/\/www.statista.com\/statistics\/282087\/number-of-monthly-active-twitter-users\/ Retrieved March 03, 2019 from"},{"key":"e_1_2_1_58_1","volume-title":"Eleventh international AAAI conference on web and social media. AAAI, 280--289","author":"Varol Onur","year":"2017","unstructured":"Onur Varol , Emilio Ferrara , Clayton A Davis , Filippo Menczer , and Alessandro Flammini . 2017 . Online human-bot interactions: Detection, estimation, and characterization . In Eleventh international AAAI conference on web and social media. AAAI, 280--289 . https:\/\/aaai.org\/ocs\/index.php\/ICWSM\/ICWSM17\/paper\/view\/15587 Onur Varol, Emilio Ferrara, Clayton A Davis, Filippo Menczer, and Alessandro Flammini. 2017. Online human-bot interactions: Detection, estimation, and characterization. In Eleventh international AAAI conference on web and social media. AAAI, 280--289. https:\/\/aaai.org\/ocs\/index.php\/ICWSM\/ICWSM17\/paper\/view\/15587"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS). The Internet Society, 1--16","author":"Wang Gang","year":"2012","unstructured":"Gang Wang , Manish Mohanlal , Christo Wilson , Xiao Wang , Miriam Metzger , Haitao Zheng , and Ben Y Zhao . 2012 . Social Turing Tests: Crowdsourcing Sybil Detection . In Proceedings of the Network and Distributed System Security Symposium (NDSS). The Internet Society, 1--16 . https:\/\/www.ndss-symposium.org\/ndss2013\/ndss-2013-programme\/social-turing-tests-crowdsourcing-sybil-detection\/ Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, and Ben Y Zhao. 2012. Social Turing Tests: Crowdsourcing Sybil Detection. In Proceedings of the Network and Distributed System Security Symposium (NDSS). The Internet Society, 1--16. https:\/\/www.ndss-symposium.org\/ndss2013\/ndss-2013-programme\/social-turing-tests-crowdsourcing-sybil-detection\/"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359163","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:53Z","timestamp":1750201973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359163"}},"subtitle":["Detection and Characterization of Bots Spreading Religious Hatred in Arabic Social Media"],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"references-count":60,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2019,11,7]]}},"alternative-id":["10.1145\/3359163"],"URL":"https:\/\/doi.org\/10.1145\/3359163","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"2019-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}