{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:18:37Z","timestamp":1776104317930,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3527188.3561928","type":"proceedings-article","created":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T22:28:59Z","timestamp":1669847339000},"page":"32-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["\u201cI Have No Idea What a Social Bot Is\u201d: On Users\u2019 Perceptions of Social Bots and Ability to Detect Them"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7661-2220","authenticated-orcid":false,"given":"Daniel","family":"Kats","sequence":"first","affiliation":[{"name":"NortonLifeLock Research Group, NortonLifeLock, United States"}]},{"given":"Mahmood","family":"Sharif","sequence":"additional","affiliation":[{"name":"School of Computer Science, Tel Aviv University, Israel"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Norah Abokhodair Daisy Yoo and David\u00a0W McDonald. 2015. Dissecting a social botnet: Growth content and influence in Twitter. In CSCW. Norah Abokhodair Daisy Yoo and David\u00a0W McDonald. 2015. Dissecting a social botnet: Growth content and influence in Twitter. In CSCW.","DOI":"10.1145\/2675133.2675208"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Abdulrahman Alarifi Mansour Alsaleh and AbdulMalik Al-Salman. 2016. Twitter turing test: Identifying social machines. Information Sciences 372(2016). Abdulrahman Alarifi Mansour Alsaleh and AbdulMalik Al-Salman. 2016. Twitter turing test: Identifying social machines. Information Sciences 372(2016).","DOI":"10.1016\/j.ins.2016.08.036"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Seyed Ali\u00a0Alhosseini Raad Bin\u00a0Tareaf Pejman Najafi and Christoph Meinel. 2019. Detect me if you can: Spam bot detection using inductive representation learning. In WWW Companion. Seyed Ali\u00a0Alhosseini Raad Bin\u00a0Tareaf Pejman Najafi and Christoph Meinel. 2019. Detect me if you can: Spam bot detection using inductive representation learning. In WWW Companion.","DOI":"10.1145\/3308560.3316504"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Eiman Alothali Nazar Zaki Elfadil\u00a0A Mohamed and Hany Alashwal. 2018. Detecting social bots on Twitter: A literature review. In IIT. Eiman Alothali Nazar Zaki Elfadil\u00a0A Mohamed and Hany Alashwal. 2018. Detecting social bots on Twitter: A literature review. In IIT.","DOI":"10.1109\/INNOVATIONS.2018.8605995"},{"key":"e_1_3_2_2_5_1","unstructured":"Darren\u00a0Scott Appling and Erica\u00a0J Briscoe. 2017. The perception of social bots by human and machine. In IFC. Darren\u00a0Scott Appling and Erica\u00a0J Briscoe. 2017. The perception of social bots by human and machine. In IFC."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Adam Badawy Kristina Lerman and Emilio Ferrara. 2019. Who falls for online political manipulation?. In WWW Companion. Adam Badawy Kristina Lerman and Emilio Ferrara. 2019. Who falls for online political manipulation?. In WWW Companion.","DOI":"10.1145\/3308560.3316494"},{"key":"e_1_3_2_2_7_1","unstructured":"BBC. 2020. Twitter tags Trump tweet with fact-checking warning. https:\/\/bbc.in\/34Weicy. Last accessed on 06-19-2022. BBC. 2020. Twitter tags Trump tweet with fact-checking warning. https:\/\/bbc.in\/34Weicy. Last accessed on 06-19-2022."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.08.016"},{"key":"e_1_3_2_2_9_1","unstructured":"BuzzFeed. 2020. Whistleblower says Facebook ignored global political manipulation. https:\/\/bit.ly\/33zB0GB. Last accessed on 06-19-2022. BuzzFeed. 2020. Whistleblower says Facebook ignored global political manipulation. https:\/\/bit.ly\/33zB0GB. Last accessed on 06-19-2022."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Ana\u00a0Paula Chaves and Marco\u00a0Aurelio Gerosa. 2021. How should my chatbot interact? A survey on human-chatbot interaction design. In HCI. Ana\u00a0Paula Chaves and Marco\u00a0Aurelio Gerosa. 2021. How should my chatbot interact? A survey on human-chatbot interaction design. In HCI.","DOI":"10.1080\/10447318.2020.1841438"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Nikan Chavoshi Hossein Hamooni and Abdullah Mueen. 2016. DeBot: Twitter bot detection via warped correlation.. In ICDM. Nikan Chavoshi Hossein Hamooni and Abdullah Mueen. 2016. DeBot: Twitter bot detection via warped correlation.. In ICDM.","DOI":"10.1109\/ICDM.2016.0096"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.03.078"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Stefano Cresci. 2019. Detecting malicious social bots: Story of a never-ending clash. In MISDOOM. Stefano Cresci. 2019. Detecting malicious social bots: Story of a never-ending clash. In MISDOOM.","DOI":"10.1007\/978-3-030-39627-5_7"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409116"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Stefano Cresci Roberto Di\u00a0Pietro Marinella Petrocchi Angelo Spognardi and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence theories and tools for the arms race. In WWW. Stefano Cresci Roberto Di\u00a0Pietro Marinella Petrocchi Angelo Spognardi and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence theories and tools for the arms race. In WWW.","DOI":"10.1145\/3041021.3055135"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Clayton\u00a0Allen Davis Onur Varol Emilio Ferrara Alessandro Flammini and Filippo Menczer. 2016. BotOrNot: A system to evaluate social bots. In WWW Companion. 273\u2013274. Clayton\u00a0Allen Davis Onur Varol Emilio Ferrara Alessandro Flammini and Filippo Menczer. 2016. BotOrNot: A system to evaluate social bots. In WWW Companion. 273\u2013274.","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_2_18_1","unstructured":"Raquel\u00a0Maria Dillon. 2022. A former employee accuses Twitter of big security lapses in a whistleblower complaint. https:\/\/n.pr\/3DG9Hyh. Last accessed on 09-19-2022. Raquel\u00a0Maria Dillon. 2022. A former employee accuses Twitter of big security lapses in a whistleblower complaint. https:\/\/n.pr\/3DG9Hyh. Last accessed on 09-19-2022."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274738"},{"key":"e_1_3_2_2_20_1","volume-title":"COMPA: Detecting compromised accounts on social networks.. In NDSS.","author":"Egele Manuel","year":"2013","unstructured":"Manuel Egele , Gianluca Stringhini , Christopher Kruegel , and Giovanni Vigna . 2013 . COMPA: Detecting compromised accounts on social networks.. In NDSS. Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2013. COMPA: Detecting compromised accounts on social networks.. In NDSS."},{"key":"e_1_3_2_2_21_1","volume-title":"elections, and social media: A brief overview. Disinformation, Misinformation, and Fake News in Social Media","author":"Ferrara Emilio","year":"2020","unstructured":"Emilio Ferrara . 2020. Bots , elections, and social media: A brief overview. Disinformation, Misinformation, and Fake News in Social Media ( 2020 ), 95\u2013114. Emilio Ferrara. 2020. Bots, elections, and social media: A brief overview. Disinformation, Misinformation, and Fake News in Social Media (2020), 95\u2013114."},{"key":"e_1_3_2_2_22_1","volume-title":"What types of COVID-19 conspiracies are populated by Twitter bots?First Monday","author":"Ferrara Emilio","year":"2020","unstructured":"Emilio Ferrara . 2020. What types of COVID-19 conspiracies are populated by Twitter bots?First Monday ( 2020 ). Emilio Ferrara. 2020. What types of COVID-19 conspiracies are populated by Twitter bots?First Monday (2020)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"David\u00a0Mandell Freeman. 2017. Can you spot the fakes? On the limitations of user feedback in online social networks. In WWW. David\u00a0Mandell Freeman. 2017. Can you spot the fakes? On the limitations of user feedback in online social networks. In WWW.","DOI":"10.1145\/3038912.3052706"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Christine Geeng Savanna Yee and Franziska Roesner. 2020. Fake news on Facebook and Twitter: Investigating how people (don\u2019t) investigate. In CHI. Christine Geeng Savanna Yee and Franziska Roesner. 2020. Fake news on Facebook and Twitter: Investigating how people (don\u2019t) investigate. In CHI.","DOI":"10.1145\/3313831.3376784"},{"key":"e_1_3_2_2_26_1","unstructured":"Katy\u00a0Ilonka Gero Zahra Ashktorab Casey Dugan Qian Pan James Johnson Werner Geyer Maria Ruiz Sarah Miller David\u00a0R Millen Murray Campbell 2020. Mental models of ai agents in a cooperative game setting. In CHI. Katy\u00a0Ilonka Gero Zahra Ashktorab Casey Dugan Qian Pan James Johnson Werner Geyer Maria Ruiz Sarah Miller David\u00a0R Millen Murray Campbell 2020. Mental models of ai agents in a cooperative game setting. In CHI."},{"key":"e_1_3_2_2_27_1","volume-title":"Social bots: Human-like by means of human control?Big data 5, 4","author":"Grimme Christian","year":"2017","unstructured":"Christian Grimme , Mike Preuss , Lena Adam , and Heike Trautmann . 2017. Social bots: Human-like by means of human control?Big data 5, 4 ( 2017 ), 279\u2013293. Christian Grimme, Mike Preuss, Lena Adam, and Heike Trautmann. 2017. Social bots: Human-like by means of human control?Big data 5, 4 (2017), 279\u2013293."},{"key":"e_1_3_2_2_28_1","volume-title":"How accurate are survey responses on social media and politics?Political Communication 36, 2","author":"Guess Andrew","year":"2019","unstructured":"Andrew Guess , Kevin Munger , Jonathan Nagler , and Joshua Tucker . 2019. How accurate are survey responses on social media and politics?Political Communication 36, 2 ( 2019 ), 241\u2013258. Andrew Guess, Kevin Munger, Jonathan Nagler, and Joshua Tucker. 2019. How accurate are survey responses on social media and politics?Political Communication 36, 2 (2019), 241\u2013258."},{"key":"e_1_3_2_2_29_1","unstructured":"Taylor Hatmaker. 2018. This bot unrolls Twitter threads and turns them into readable blog posts. https:\/\/tcrn.ch\/31pTsRY. Last accessed on 06-19-2022. Taylor Hatmaker. 2018. This bot unrolls Twitter threads and turns them into readable blog posts. https:\/\/tcrn.ch\/31pTsRY. Last accessed on 06-19-2022."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23456"},{"key":"e_1_3_2_2_31_1","unstructured":"Ruogu Kang Stephanie Brown Laura Dabbish and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In SOUPS. Ruogu Kang Stephanie Brown Laura Dabbish and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In SOUPS."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.019"},{"key":"e_1_3_2_2_33_1","volume-title":"False information on web and social media: A survey. arXiv preprint","author":"Kumar Srijan","year":"1804","unstructured":"Srijan Kumar and Neil Shah . 2018. False information on web and social media: A survey. arXiv preprint 1804 .08559(2018). Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. arXiv preprint 1804.08559(2018)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2015.1081822"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Kiel Long John Vines Selina Sutton Phillip Brooker Tom Feltwell Ben Kirman Julie Barnett and Shaun Lawson. 2017. \u201cCould you define that in bot terms\u201d? Requesting creating and using bots on Reddit. In CHI. Kiel Long John Vines Selina Sutton Phillip Brooker Tom Feltwell Ben Kirman Julie Barnett and Shaun Lawson. 2017. \u201cCould you define that in bot terms\u201d? Requesting creating and using bots on Reddit. In CHI.","DOI":"10.1145\/3025453.3025830"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Luca Luceri Ashok Deb Adam Badawy and Emilio Ferrara. 2019. Red bots do it better: Comparative analysis of social bot partisan behavior. In WWW Companion. Luca Luceri Ashok Deb Adam Badawy and Emilio Ferrara. 2019. Red bots do it better: Comparative analysis of social bot partisan behavior. In WWW Companion.","DOI":"10.1145\/3308560.3316735"},{"key":"e_1_3_2_2_37_1","volume-title":"Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3","author":"McHugh L","year":"2012","unstructured":"Mary\u00a0 L McHugh . 2012. Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3 ( 2012 ), 276\u2013282. Mary\u00a0L McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3 (2012), 276\u2013282."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Amanda Minnich Nikan Chavoshi Danai Koutra and Abdullah Mueen. 2017. BotWalk: Efficient adaptive exploration of Twitter bot networks. In ASONAM. Amanda Minnich Nikan Chavoshi Danai Koutra and Abdullah Mueen. 2017. BotWalk: Efficient adaptive exploration of Twitter bot networks. In ASONAM.","DOI":"10.1145\/3110025.3110163"},{"key":"e_1_3_2_2_39_1","unstructured":"NLOK. 2020. BotSight. https:\/\/bit.ly\/2RHHv8c. Last accessed on 06-19-2022. NLOK. 2020. BotSight. https:\/\/bit.ly\/2RHHv8c. Last accessed on 06-19-2022."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2017.01.006"},{"key":"e_1_3_2_2_41_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer , Joachim Vosgerau , and Alessandro Acquisti . 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 ( 2014 ), 1023\u20131031. Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023\u20131031."},{"key":"e_1_3_2_2_42_1","volume-title":"WhatsApp and Reddit","author":"PRC.","year":"2019","unstructured":"PRC. 2019. Who uses YouTube , WhatsApp and Reddit . Pew Research Center ( 2019 ). PRC. 2019. Who uses YouTube, WhatsApp and Reddit. Pew Research Center (2019)."},{"key":"e_1_3_2_2_43_1","unstructured":"Reddit. 2020. Reddit Security Report. https:\/\/bit.ly\/2SVJSBI. Last accessed on 06-19-2022. Reddit. 2020. Reddit Security Report. https:\/\/bit.ly\/2SVJSBI. Last accessed on 06-19-2022."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Elissa\u00a0M Redmiles Neha Chachra and Brian Waismeyer. 2018. Examining the demand for spam: Who clicks?. In CHI. Elissa\u00a0M Redmiles Neha Chachra and Brian Waismeyer. 2018. Examining the demand for spam: Who clicks?. In CHI.","DOI":"10.1145\/3173574.3173786"},{"key":"e_1_3_2_2_45_1","unstructured":"Johnny Salda\u00f1a. 2015. The coding manual for qualitative researchers. Johnny Salda\u00f1a. 2015. The coding manual for qualitative researchers."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Giovanni\u00a0C Santia Munif\u00a0Ishad Mujib and Jake\u00a0Ryland Williams. 2019. Detecting social bots on Facebook in an information veracity context. In ICWSM. Giovanni\u00a0C Santia Munif\u00a0Ishad Mujib and Jake\u00a0Ryland Williams. 2019. Detecting social bots on Facebook in an information veracity context. In ICWSM.","DOI":"10.1609\/icwsm.v13i01.3244"},{"key":"e_1_3_2_2_47_1","unstructured":"Howard\u00a0J Seltman. 2012. Experimental design and analysis. Howard\u00a0J Seltman. 2012. Experimental design and analysis."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Indira Sen Anupama Aggarwal Shiven Mian Siddharth Singh Ponnurangam Kumaraguru and Anwitaman Datta. 2018. Worth its weight in likes: Towards detecting fake likes on instagram. In WebSci. Indira Sen Anupama Aggarwal Shiven Mian Siddharth Singh Ponnurangam Kumaraguru and Anwitaman Datta. 2018. Worth its weight in likes: Towards detecting fake likes on instagram. In WebSci.","DOI":"10.1145\/3201064.3201105"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Mohammad Shafahi Leon Kempers and Hamideh Afsarmanesh. 2016. Phishing through social bots on Twitter. In BigData. Mohammad Shafahi Leon Kempers and Hamideh Afsarmanesh. 2016. Phishing through social bots on Twitter. In BigData.","DOI":"10.1109\/BigData.2016.7841038"},{"key":"e_1_3_2_2_50_1","unstructured":"Craig Timberg and Elizabeth Dwoskin. 2018. Twitter is sweeping out fake accounts like never before putting user growth at risk. https:\/\/wapo.st\/3lLlM8T. Last accessed on 06-19-2022. Craig Timberg and Elizabeth Dwoskin. 2018. Twitter is sweeping out fake accounts like never before putting user growth at risk. https:\/\/wapo.st\/3lLlM8T. Last accessed on 06-19-2022."},{"key":"e_1_3_2_2_51_1","volume-title":"Even good bots fight: The case of Wikipedia. PloS one 12, 2","author":"Tsvetkova Milena","year":"2017","unstructured":"Milena Tsvetkova , Ruth Garc\u00eda-Gavilanes , Luciano Floridi , and Taha Yasseri . 2017. Even good bots fight: The case of Wikipedia. PloS one 12, 2 ( 2017 ). Milena Tsvetkova, Ruth Garc\u00eda-Gavilanes, Luciano Floridi, and Taha Yasseri. 2017. Even good bots fight: The case of Wikipedia. PloS one 12, 2 (2017)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Aman Tyagi Matthew Babcock Kathleen\u00a0M Carley and Douglas\u00a0C Sicker. 2020. Polarizing tweets on climate change. In SBP-BRiMS. Aman Tyagi Matthew Babcock Kathleen\u00a0M Carley and Douglas\u00a0C Sicker. 2020. Polarizing tweets on climate change. In SBP-BRiMS.","DOI":"10.1007\/978-3-030-61255-9_11"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"Joshua Uyheng and Kathleen\u00a0M Carley. 2019. Characterizing bot networks on Twitter: An empirical analysis of contentious issues in the Asia-Pacific. In SBP-BRiMS. Joshua Uyheng and Kathleen\u00a0M Carley. 2019. Characterizing bot networks on Twitter: An empirical analysis of contentious issues in the Asia-Pacific. In SBP-BRiMS.","DOI":"10.1007\/978-3-030-21741-9_16"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Onur Varol Emilio Ferrara Clayton\u00a0A Davis Filippo Menczer and Alessandro Flammini. 2017. Online human-bot interactions: Detection estimation and characterization. In ICWSM. Onur Varol Emilio Ferrara Clayton\u00a0A Davis Filippo Menczer and Alessandro Flammini. 2017. Online human-bot interactions: Detection estimation and characterization. In ICWSM.","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"e_1_3_2_2_55_1","unstructured":"Kurt Wagner and Rani Molla. 2018. Facebook has disabled almost 1.3 billion fake accounts over the past six months. https:\/\/bit.ly\/3knOsEA. Last accessed on 06-19-2022. Kurt Wagner and Rani Molla. 2018. Facebook has disabled almost 1.3 billion fake accounts over the past six months. https:\/\/bit.ly\/3knOsEA. Last accessed on 06-19-2022."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"Mairieli Wessel Bruno\u00a0Mendes De\u00a0Souza Igor Steinmacher Igor\u00a0S Wiese Ivanilton Polato Ana\u00a0Paula Chaves and Marco\u00a0A Gerosa. 2018. The power of bots: Characterizing and understanding bots in OSS projects. In HCI. Mairieli Wessel Bruno\u00a0Mendes De\u00a0Souza Igor Steinmacher Igor\u00a0S Wiese Ivanilton Polato Ana\u00a0Paula Chaves and Marco\u00a0A Gerosa. 2018. The power of bots: Characterizing and understanding bots in OSS projects. In HCI.","DOI":"10.1145\/3274451"},{"key":"e_1_3_2_2_57_1","unstructured":"Kai-Cheng Yang Onur Varol Clayton Davis Emilio Ferrara Alessandro Flammini and Filippo Menczer. 2019. Arming the public with artificial intelligence to counter social bots. Human Behavior and Emerging Tech(2019). Kai-Cheng Yang Onur Varol Clayton Davis Emilio Ferrara Alessandro Flammini and Filippo Menczer. 2019. Arming the public with artificial intelligence to counter social bots. Human Behavior and Emerging Tech(2019)."},{"key":"e_1_3_2_2_58_1","unstructured":"Kai-Cheng Yang Onur Varol Pik-Mai Hui and Filippo Menczer. 2020. Scalable and generalizable social bot detection through data selection. In AAAI. Kai-Cheng Yang Onur Varol Pik-Mai Hui and Filippo Menczer. 2020. Scalable and generalizable social bot detection through data selection. In AAAI."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125739.3125766"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"crossref","unstructured":"Xianchao Zhang Shaoping Zhu and Wenxin Liang. 2012. Detecting spam and promoting campaigns in the Twitter social network. In ICDM. Xianchao Zhang Shaoping Zhu and Wenxin Liang. 2012. Detecting spam and promoting campaigns in the Twitter social network. In ICDM.","DOI":"10.1109\/ICDM.2012.28"}],"event":{"name":"HAI '22: International Conference on Human-Agent Interaction","location":"Christchurch New Zealand","acronym":"HAI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 10th International Conference on Human-Agent Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3527188.3561928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3527188.3561928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:01Z","timestamp":1750182661000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3527188.3561928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":60,"alternative-id":["10.1145\/3527188.3561928","10.1145\/3527188"],"URL":"https:\/\/doi.org\/10.1145\/3527188.3561928","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}