{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:21Z","timestamp":1772164101872,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["2167"],"award-info":[{"award-number":["2167"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445109","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T01:37:51Z","timestamp":1620437871000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Disagree? You Must be a Bot! How Beliefs Shape Twitter Profile Perceptions"],"prefix":"10.1145","author":[{"given":"Magdalena","family":"Wischnewski","sequence":"first","affiliation":[{"name":"Research Training Group 'User-Centred Social Media' University of Duisburg-Essen, Germany"}]},{"given":"Rebecca","family":"Bernemann","sequence":"additional","affiliation":[{"name":"Research Training Group 'User-Centred Social Media' University of Duisburg-Essen, Germany"}]},{"given":"Thao","family":"Ngo","sequence":"additional","affiliation":[{"name":"Research Training Group 'User-Centred Social Media' University of Duisburg-Essen, Germany"}]},{"given":"Nicole","family":"Kr\u00e4mer","sequence":"additional","affiliation":[{"name":"Social Psychology: Media and Communication University of Duisburg-Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.2196\/publichealth.8641"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2018.8605995"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439317734157"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i11.7090"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1086\/681591"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2018.304567"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004887"},{"key":"e_1_3_2_2_9_1","volume-title":"The Psychology of action: Linking cognition and motivation to behavior, P.\u00a0M. Gollwitzer and J.\u00a0A","author":"Chaiken Shelly","unstructured":"Shelly Chaiken , Roger Giner-Sorolla , and Serena Chen . 1996. Beyond accuracy: Defense and impression motives in heuristic and systematic information processing . In The Psychology of action: Linking cognition and motivation to behavior, P.\u00a0M. Gollwitzer and J.\u00a0A . Bargh (Eds.). Guilford Press , New York, NY , 553\u2013578. Shelly Chaiken, Roger Giner-Sorolla, and Serena Chen. 1996. Beyond accuracy: Defense and impression motives in heuristic and systematic information processing. In The Psychology of action: Linking cognition and motivation to behavior, P.\u00a0M. Gollwitzer and J.\u00a0A. Bargh (Eds.). Guilford Press, New York, NY, 553\u2013578."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781351215947"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12494"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.08.013"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851813"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v22i8.8005"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1089\/big.2017.0044"},{"key":"e_1_3_2_2_20_1","volume-title":"Introduction to mediation, moderation, and conditional process analysis: A regression-based approach","author":"Hayes F","unstructured":"Andrew\u00a0 F Hayes . 2017. Introduction to mediation, moderation, and conditional process analysis: A regression-based approach . Guilford publications. Andrew\u00a0F Hayes. 2017. Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. Guilford publications."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12166515"},{"key":"e_1_3_2_2_22_1","volume-title":"Howard and Bence Kollanyi","author":"N.","year":"2016","unstructured":"Philip\u00a0 N. Howard and Bence Kollanyi . 2016 . Bots, #StrongerIn, and #Brexit: Computational propaganda during the UK-EU referendum: Research note 2016.1. Oxford : Computational Propagand Project , 2016 (2016). Philip\u00a0N. Howard and Bence Kollanyi. 2016. Bots, #StrongerIn, and #Brexit: Computational propaganda during the UK-EU referendum: Research note 2016.1. Oxford: Computational Propagand Project, 2016 (2016)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055414000604"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300469"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20319-5_4"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2798311"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.g5133"},{"key":"e_1_3_2_2_28_1","volume-title":"Proc. Int. Security and Cryptology Conferencme Turkeyi","author":"Karata\u015f Arzum","year":"2017","unstructured":"Arzum Karata\u015f and Serap \u015eahin . 2017 . A review on social bot detection techniques and research directions . Proc. Int. Security and Cryptology Conferencme Turkeyi (2017), 156\u2013161. Arzum Karata\u015f and Serap \u015eahin. 2017. A review on social bot detection techniques and research directions. Proc. Int. Security and Cryptology Conferencme Turkeyi (2017), 156\u2013161."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2019.1661888"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.06.035"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.108.3.480"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1353\/pla.2016.0030"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759909376464"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.313"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315696935"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2010.01488.x"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892311"},{"key":"e_1_3_2_2_38_1","first-page":"1","article-title":"Reuters Institute Digital News Report 2019","volume":"2019","author":"Newman Nic","year":"2019","unstructured":"Nic Newman , Antonis Fletcher , Richard, Kalogeropoulos, and Rasmus\u00a0Kleis Nielsen . 2019 . Reuters Institute Digital News Report 2019 . Reuters Institute for the Study of Journalism 2019 (2019), 1 \u2013 156 . arxiv:arXiv:1011.1669v3 Nic Newman, Antonis Fletcher, Richard, Kalogeropoulos, and Rasmus\u00a0Kleis Nielsen. 2019. Reuters Institute Digital News Report 2019. Reuters Institute for the Study of Journalism 2019 (2019), 1\u2013 156. arxiv:arXiv:1011.1669v3","journal-title":"Reuters Institute for the Study of Journalism"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.2.2.175"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2018.06.011"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3565233"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2508.00161"},{"key":"e_1_3_2_2_43_1","volume-title":"The media equation: How people treat computers, television, and new media like real people and places","author":"Reeves Byron","unstructured":"Byron Reeves and Clifford\u00a0 I. Nass . 1996. The media equation: How people treat computers, television, and new media like real people and places . Cambridge University Press , New York . Byron Reeves and Clifford\u00a0I. Nass. 1996. The media equation: How people treat computers, television, and new media like real people and places. Cambridge University Press, New York."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1089\/big.2017.0049"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1805871115"},{"key":"e_1_3_2_2_46_1","volume-title":"Social media bots draw public\u2019s attention and concern","author":"Stocking Galen","year":"2018","unstructured":"Galen Stocking and Nami Sumida . 2018. Social media bots draw public\u2019s attention and concern . Pew Research CenterOctober ( 2018 ). Galen Stocking and Nami Sumida. 2018. Social media bots draw public\u2019s attention and concern. Pew Research CenterOctober (2018)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5907.2006.00214.x"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12321"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000974"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2012.09.012"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2018.01.004"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191610"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12241"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1037\/tmb0000029"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.115"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445109","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:28:30Z","timestamp":1750181310000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":56,"alternative-id":["10.1145\/3411764.3445109","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445109","relation":{"has-preprint":[{"id-type":"doi","id":"10.31234\/osf.io\/8vyxr","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}