{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:55Z","timestamp":1750220335214,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:00:00Z","timestamp":1654128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,2]]},"DOI":"10.1145\/3510606.3551895","type":"proceedings-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T17:24:18Z","timestamp":1673976258000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Toward Detecting Conspiracy Language in Misinformation Documents"],"prefix":"10.1145","author":[{"given":"Alana","family":"Platt","sequence":"first","affiliation":[{"name":"University of Wisconsin-Whitewater"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jonathan","family":"Brown","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Whitewater"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amanda","family":"Venske","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Whitewater"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.171"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439318795849"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0134641"},{"key":"e_1_3_2_1_4_1","volume-title":"To illuminate and motivate: A fuzzy-trace model of the spread of information online","author":"Broniatowski D. A.","year":"2019","unstructured":"Broniatowski , D. A. , & Reyna , V. F. ( 2019 ). To illuminate and motivate: A fuzzy-trace model of the spread of information online . Computational and Mathematical Organization Theory , 1--34. Broniatowski, D. A., & Reyna, V. F. (2019). To illuminate and motivate: A fuzzy-trace model of the spread of information online. Computational and Mathematical Organization Theory, 1--34."},{"key":"e_1_3_2_1_5_1","volume-title":"The anatomy of a scientific rumor. Scientific reports, 3(1), 1--9","author":"De Domenico M.","year":"2013","unstructured":"De Domenico , M. , Lima , A. , Mougel , P. , & Musolesi , M. ( 2013 ). The anatomy of a scientific rumor. Scientific reports, 3(1), 1--9 . De Domenico, M., Lima, A., Mougel, P., & Musolesi, M. (2013). The anatomy of a scientific rumor. Scientific reports, 3(1), 1--9."},{"key":"e_1_3_2_1_6_1","volume-title":"Thought I'd Share First\" and Other Conspiracy Theory Tweets from the COVID-19 Infodemic: Exploratory Study. JMIR public health and surveillance, 7(4), e26527","author":"Gerts D.","year":"2021","unstructured":"Gerts , D. , Shelley , C. D. , Parikh , N. , Pitts , T. , Ross , C. W. , Fairchild , G. , ... & Daughton , A. R. ( 2021 ). \" Thought I'd Share First\" and Other Conspiracy Theory Tweets from the COVID-19 Infodemic: Exploratory Study. JMIR public health and surveillance, 7(4), e26527 . Gerts, D., Shelley, C. D., Parikh, N., Pitts, T., Ross, C. W., Fairchild, G., ... & Daughton, A. R. (2021). \"Thought I'd Share First\" and Other Conspiracy Theory Tweets from the COVID-19 Infodemic: Exploratory Study. JMIR public health and surveillance, 7(4), e26527."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1--23","author":"Jiang S.","year":"2018","unstructured":"Jiang , S. , & Wilson , C. ( 2018 ). Linguistic signals under misinformation and fact-checking: Evidence from user comments on social media . Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1--23 . Jiang, S., & Wilson, C. (2018). Linguistic signals under misinformation and fact-checking: Evidence from user comments on social media. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1--23."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 27th international conference on computational linguistics (pp. 1546--1557)","author":"Karimi H.","year":"2018","unstructured":"Karimi , H. , Roy , P. , Saba-Sadiya , S. , & Tang , J. ( 2018 , August). Multi-source multi-class fake news detection . In Proceedings of the 27th international conference on computational linguistics (pp. 1546--1557) . Karimi, H., Roy, P., Saba-Sadiya, S., & Tang, J. (2018, August). Multi-source multi-class fake news detection. In Proceedings of the 27th international conference on computational linguistics (pp. 1546--1557)."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction, 4(CSCW2), 1--27","author":"Kirchner J.","year":"2020","unstructured":"Kirchner , J. , & Reuter , C. ( 2020 ). Countering Fake News: A Comparison of Possible Solutions Regarding User Acceptance and Effectiveness . Proceedings of the ACM on Human-Computer Interaction, 4(CSCW2), 1--27 . Kirchner, J., & Reuter, C. (2020). Countering Fake News: A Comparison of Possible Solutions Regarding User Acceptance and Effectiveness. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW2), 1--27."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458026.3462159"},{"key":"e_1_3_2_1_12_1","volume-title":"Is It the Message or the Messenger?\": Conspiracy Endorsement and Media Sources. Social Science Computer Review, 0894439320965107","author":"Mancosu M.","year":"2020","unstructured":"Mancosu , M. , & Vegetti , F. ( 2020 ). \" Is It the Message or the Messenger?\": Conspiracy Endorsement and Media Sources. Social Science Computer Review, 0894439320965107 . Mancosu, M., & Vegetti, F. (2020). \"Is It the Message or the Messenger?\": Conspiracy Endorsement and Media Sources. Social Science Computer Review, 0894439320965107."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction, 1(CSCW), 1--17","author":"Mitra T.","year":"2017","unstructured":"Mitra , T. , Wright , G. , & Gilbert , E. ( 2017 ). Credibility and the dynamics of collective attention . Proceedings of the ACM on Human-Computer Interaction, 1(CSCW), 1--17 . Mitra, T., Wright, G., & Gilbert, E. (2017). Credibility and the dynamics of collective attention. Proceedings of the ACM on Human-Computer Interaction, 1(CSCW), 1--17."},{"key":"e_1_3_2_1_14_1","unstructured":"Nina Berman https:\/\/www.cjr.org\/special_report\/fake-news-pizzagate-seth-rich-newtown-sandy-hook.php  Nina Berman https:\/\/www.cjr.org\/special_report\/fake-news-pizzagate-seth-rich-newtown-sandy-hook.php"},{"issue":"4","key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1111\/ajps.12084","article-title":"Conspiracy theories and the paranoid style(s) of mass opinion","volume":"58","author":"Oliver J. E.","year":"2014","unstructured":"Oliver , J. E. , & Wood , T. J. ( 2014 ). Conspiracy theories and the paranoid style(s) of mass opinion . American Journal of Political Science , 58 ( 4 ), 952 -- 966 . Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s) of mass opinion. American Journal of Political Science, 58(4), 952--966.","journal-title":"American Journal of Political Science"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction, 4(CSCW3), 1--30","author":"Phadke S.","year":"2021","unstructured":"Phadke , S. , Samory , M. , & Mitra , T. ( 2021 ). What Makes People Join Conspiracy Communities? Role of Social Factors in Conspiracy Engagement . Proceedings of the ACM on Human-Computer Interaction, 4(CSCW3), 1--30 . Phadke, S., Samory, M., & Mitra, T. (2021). What Makes People Join Conspiracy Communities? Role of Social Factors in Conspiracy Engagement. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW3), 1--30."},{"key":"e_1_3_2_1_17_1","volume-title":"ABC News Network","author":"Rubin","year":"2021","unstructured":"Rubin , Olivia, \" QAnon Emerges as Recurring Theme of Criminal Cases Tied to US Capitol Siege.\" ABC News , ABC News Network , 19 Jan. 2021 , https:\/\/abcnews.go.com\/US\/qanon-emerges-recurring-theme-criminal-cases-tied-us\/story?id=75347445. Rubin, Olivia, et al. \"QAnon Emerges as Recurring Theme of Criminal Cases Tied to US Capitol Siege.\" ABC News, ABC News Network, 19 Jan. 2021, https:\/\/abcnews.go.com\/US\/qanon-emerges-recurring-theme-criminal-cases-tied-us\/story?id=75347445."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1--24","author":"Samory M.","year":"2018","unstructured":"Samory , M. , & Mitra , T. ( 2018 ). ' The Government Spies Using Our Webcams' The Language of Conspiracy Theories in Online Discussions . Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1--24 Samory, M., & Mitra, T. (2018). 'The Government Spies Using Our Webcams' The Language of Conspiracy Theories in Online Discussions. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1--24"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 25th international conference companion on world wide web (pp. 745--750)","author":"Shao C.","year":"2016","unstructured":"Shao , C. , Ciampaglia , G. L. , Flammini , A. , & Menczer , F. ( 2016 , April). Hoaxy: A platform for tracking online misinformation . In Proceedings of the 25th international conference companion on world wide web (pp. 745--750) . Shao, C., Ciampaglia, G. L., Flammini, A., & Menczer, F. (2016, April). Hoaxy: A platform for tracking online misinformation. In Proceedings of the 25th international conference companion on world wide web (pp. 745--750)."},{"key":"e_1_3_2_1_20_1","volume-title":"Fake news detection on social media: A data mining perspective. ACM SIGKDD explorations newsletter, 19(1), 22--36","author":"Shu K.","year":"2017","unstructured":"Shu , K. , Sliva , A. , Wang , S. , Tang , J. , & Liu , H. ( 2017 ). Fake news detection on social media: A data mining perspective. ACM SIGKDD explorations newsletter, 19(1), 22--36 . Shu, K., Sliva, A., Wang, S., Tang, J., & Liu, H. (2017). Fake news detection on social media: A data mining perspective. ACM SIGKDD explorations newsletter, 19(1), 22--36."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vacune.2021.01.009"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1065912915621621"}],"event":{"name":"SIGMIS-CPR '22: 2022 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Atlanta Georgia","acronym":"SIGMIS-CPR '22"},"container-title":["Proceedings of the Conference on Computers and People Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510606.3551895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510606.3551895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:20Z","timestamp":1750191140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510606.3551895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,2]]},"references-count":22,"alternative-id":["10.1145\/3510606.3551895","10.1145\/3510606"],"URL":"https:\/\/doi.org\/10.1145\/3510606.3551895","relation":{},"subject":[],"published":{"date-parts":[[2022,6,2]]},"assertion":[{"value":"2023-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}