{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:23Z","timestamp":1767340043425,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["Grant No. 18\/CRT\/6223"],"award-info":[{"award-number":["Grant No. 18\/CRT\/6223"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3651254","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"1174-1177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Online Disinformation and Generative Language Models: Motivations, Challenges, and Mitigations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3732-5409","authenticated-orcid":false,"given":"Ziyi","family":"Guo","sequence":"first","affiliation":[{"name":"School of Computer Science and Statistics, ADAPT Centre &amp; Trinity College Dublin, Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"e_1_3_2_2_2_1","unstructured":"Goldstein J. (2021). Foreign influence operations in the cyber age [PhD thesis]. University of Oxford. https:\/\/ethos.bl.uk\/OrderDetails.do?uin=uk.bl.ethos.840171."},{"key":"e_1_3_2_2_3_1","volume-title":"The breakout scale: Measuring the impact of influence operations.\u00a0Brookings Foreign Policy. https:\/\/www.brookings.edu\/articles\/the-break-out-scale-measuring-the-impact-of-influence-operations\/","author":"Nimmo B.","year":"2020","unstructured":"Nimmo, B. (2020). The breakout scale: Measuring the impact of influence operations.\u00a0Brookings Foreign Policy. https:\/\/www.brookings.edu\/articles\/the-break-out-scale-measuring-the-impact-of-influence-operations\/."},{"key":"e_1_3_2_2_4_1","volume-title":"Fake news and the public [Article]","author":"Edward M.","year":"1925","unstructured":"Edward, M. (1925, October 1). Fake news and the public [Article]. Harper's Magazine. https:\/\/harpers.org\/archive\/1925\/10\/fake-news-and-the-public\/"},{"key":"e_1_3_2_2_5_1","volume-title":"Global Risks 2012 Seventh Edition. https:\/\/www.we forum.org\/publications\/global-risks-2012-seventh-edition\/","author":"World Economic Forum","year":"2012","unstructured":"World Economic Forum (2012). Global Risks 2012 Seventh Edition. https:\/\/www.we forum.org\/publications\/global-risks-2012-seventh-edition\/."},{"key":"e_1_3_2_2_6_1","volume-title":"A comprehensive survey of ai-generated content (aigc): A history of generative ai from gan to chatgpt.\u00a0arXiv preprint arXiv:2303.04226","author":"Cao Y.","year":"2023","unstructured":"Cao, Y., Li, S., Liu, Y., Yan, Z., Dai, Y., Yu, P. S., & Sun, L. (2023). A comprehensive survey of ai-generated content (aigc): A history of generative ai from gan to chatgpt.\u00a0arXiv preprint arXiv:2303.04226. http:\/\/arxiv.org\/abs\/2303.04226\/."},{"key":"e_1_3_2_2_7_1","volume-title":"One small step for generative ai, one giant leap for agi: A complete survey on chatgpt in aigc era.\u00a0arXiv preprint:2304.06488","author":"Zhang C.","year":"2023","unstructured":"Zhang, C., Zhang, C., Li, C., Qiao, Y., Zheng, S., Dam, S. K., ... & Hong, C. S. (2023). One small step for generative ai, one giant leap for agi: A complete survey on chatgpt in aigc era.\u00a0arXiv preprint:2304.06488. http:\/\/arxiv.org\/abs\/2304.06488\/."},{"key":"e_1_3_2_2_8_1","volume-title":"A survey of large language models.\u00a0arXiv preprint arXiv:2303.18223","author":"Zhao W. X.","year":"2023","unstructured":"Zhao, W. X., Zhou, K., Li, J., Tang, T., Wang, X., Hou, Y., ... & Wen, J. R. (2023). A survey of large language models.\u00a0arXiv preprint arXiv:2303.18223. http:\/\/arxiv.org\/abs\/2303.18223\/."},{"key":"e_1_3_2_2_9_1","volume-title":"Exploring ai ethics of chatgpt: A diagnostic analysis.\u00a0arXiv preprint arXiv:2301.12867","author":"Zhuo T. Y.","year":"2023","unstructured":"Zhuo, T. Y., Huang, Y., Chen, C., & Xing, Z. (2023). Exploring ai ethics of chatgpt: A diagnostic analysis.\u00a0arXiv preprint arXiv:2301.12867. http:\/\/arxiv.org\/abs\/ 2301.12867\/."},{"key":"e_1_3_2_2_10_1","volume-title":"AI model GPT-3 (dis) informs us better than humans.\u00a0arXiv:2301.11924","author":"Spitale G.","year":"2023","unstructured":"Spitale, G., Biller-Andorno, N., & Germani, F. (2023). AI model GPT-3 (dis) informs us better than humans.\u00a0arXiv:2301.11924. http:\/\/arxiv.org\/abs\/2301.11924\/."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.51593\/2021CA003\/"},{"key":"e_1_3_2_2_12_1","volume-title":"Actors, behaviors, content: A disinformation ABC. Algori-thms. https:\/\/cdn.annenbergpublicpolicycenter.org\/wp-content\/uploads\/2020\/05\/ABC _Framework _TWG_Francois_Sept_2019.pdf\/","author":"Fran\u00e7ois C.","year":"2020","unstructured":"Fran\u00e7ois, C. (2020). Actors, behaviors, content: A disinformation ABC. Algori-thms. https:\/\/cdn.annenbergpublicpolicycenter.org\/wp-content\/uploads\/2020\/05\/ABC _Framework _TWG_Francois_Sept_2019.pdf\/."},{"key":"e_1_3_2_2_13_1","unstructured":"DiResta R. Goldstein J. A. & Grossman S. (2021). Middle East Influence Operations: Observations Across Social Media Takedowns.\u00a0Digital Activism and Authoritarian Adaptation in the Middle East 91. https:\/\/pomeps.org\/middle-east-influ-ence-operations-observations-across-social-mediatakedowns\/."},{"key":"e_1_3_2_2_14_1","volume-title":"Atlantic. https:\/\/www.theatlantic.com\/ideas\/archive\/2021\/01\/bigger-threat-wa s-always-domestic\/617618\/.","author":"Emerson T. B.","year":"2020","unstructured":"Emerson T. B., ?Jacob, S. (2020). Americans Were Worried About the Wrong Threat, Atlantic. https:\/\/www.theatlantic.com\/ideas\/archive\/2021\/01\/bigger-threat-wa s-always-domestic\/617618\/."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"King G. Pan J. & Roberts M. E. (2017). How the Chinese government fabri-cates social media posts for strategic distraction not engaged argument.\u00a0American political science review \u00a0111(3) 484--501. https:\/\/doi.org\/10. 1017\/S00030554170001 44\/.","DOI":"10.1017\/S0003055417000144"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1906420116\/"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aau2706\/"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Park H. S. Levine T. R. Kingsley Westerman C. Y. Orfgen T. & Foregger S. (2007). The effects of argument quality and involvement type on attitude formation and attitude change: A test of dual-process and social judgment predictions.\u00a0Human Communication Research \u00a033(1) 81--102. https:\/\/doi.org\/10.1111 \/J.1468-2958.2007.00290.X\/.","DOI":"10.1111\/j.1468-2958.2007.00290.x"},{"key":"e_1_3_2_2_19_1","volume-title":"China's fake twitter accounts are tweet-ing into the void.\u00a0Foreign Policy. https:\/\/foreignpolicy.com\/2021\/12\/15\/china-twitt-er-trolls-ccp-influence-operations-astroturfing\/","author":"DiResta R.","year":"2021","unstructured":"DiResta, R., & Goldstein, J. A. (2021). China's fake twitter accounts are tweet-ing into the void.\u00a0Foreign Policy. https:\/\/foreignpolicy.com\/2021\/12\/15\/china-twitt-er-trolls-ccp-influence-operations-astroturfing\/."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.7249\/RR2714"},{"key":"e_1_3_2_2_21_1","volume-title":"Deep fakes: A looming challenge for privacy, democracy, and national security.\u00a0Calif. L. Rev.,\u00a0107, 1753. https:\/\/doi.org\/10.15779\/ Z38RV0D15J\/","author":"Chesney B.","year":"2019","unstructured":"Chesney, B., & Citron, D. (2019). Deep fakes: A looming challenge for privacy, democracy, and national security.\u00a0Calif. L. Rev.,\u00a0107, 1753. https:\/\/doi.org\/10.15779\/ Z38RV0D15J\/."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2303.08774\/"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2307.09288\/"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2401.04088\/"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11733-y\/"},{"key":"e_1_3_2_2_26_1","volume-title":"Lessons from the GPT-4Chan Controversy.\u00a0The Gradient. https:\/\/thegradient.pub\/gpt4chan-lessons\/","author":"Kurenkov A.","year":"2022","unstructured":"Kurenkov, A. (2022). Lessons from the GPT-4Chan Controversy.\u00a0The Gradient. https:\/\/thegradient.pub\/gpt4chan-lessons\/."},{"key":"e_1_3_2_2_27_1","volume-title":"AI-Powered Text From This Program Could Fool the Government. Wired. https:\/\/www.wired.com\/story\/ai-powered-text-program-could-fool-government\/","author":"Will K.","year":"2021","unstructured":"Will, K. (2021). AI-Powered Text From This Program Could Fool the Government. Wired. https:\/\/www.wired.com\/story\/ai-powered-text-program-could-fool-government\/."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.51593\/2021CA011"},{"volume-title":"vol 2. (2020). Russian Active Measures Campaigns and Interference in the 2016 U.S. Election https:\/\/www.intelligence.senate.gov\/sites\/default\/files\/documents\/Report_","author":"Senate Report No 0","key":"e_1_3_2_2_29_1","unstructured":"Senate Report No 116--290, vol 2. (2020). Russian Active Measures Campaigns and Interference in the 2016 U.S. Election https:\/\/www.intelligence.senate.gov\/sites\/default\/files\/documents\/Report_ Volume2.pdf."},{"key":"e_1_3_2_2_30_1","first-page":"500","article-title":"Public comments to the federal communications commission about net neutrality contain many inaccuracies and duplicates. https:\/\/policycommons.net\/artifacts\/617566\/public-comments-to-the-feder al-communications-commission-about-net-neutrality-contain-many-inaccuracies-and-duplicates\/1598 389\/on 05 Feb 2024","volume":"20","author":"Hitlin P.","year":"2017","unstructured":"Hitlin, P., Olmstead, K., & Toor, S. (2017). Public comments to the federal communications commission about net neutrality contain many inaccuracies and duplicates. https:\/\/policycommons.net\/artifacts\/617566\/public-comments-to-the-feder al-communications-commission-about-net-neutrality-contain-many-inaccuracies-and-duplicates\/1598 389\/on 05 Feb 2024. CID: 20.500.12592\/5490k9.","journal-title":"CID"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.51593\/2022CA002\/"},{"key":"e_1_3_2_2_32_1","volume-title":"Information delivered by a chatbot has a positive impact on COVID-19 vaccines attitudes and intentions.\u00a0Journal of Experimental Psychology: Applied,\u00a029(1), 52. https:\/\/doi.org\/1 0.1037\/xap0000400\/","author":"Altay S.","year":"2023","unstructured":"Altay, S., Hacquin, A. S., Chevallier, C., & Mercier, H. (2023). Information delivered by a chatbot has a positive impact on COVID-19 vaccines attitudes and intentions.\u00a0Journal of Experimental Psychology: Applied,\u00a029(1), 52. https:\/\/doi.org\/1 0.1037\/xap0000400\/."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581318"},{"key":"e_1_3_2_2_34_1","volume-title":"Can AI Write Persuasive Propaganda?.https:\/\/osf.io\/fp87b\/download","author":"Goldstein J. A.","year":"2023","unstructured":"Goldstein, J. A., Chao, J., Grossman, S., Stamos, A., & Tomz, M. (2023). Can AI Write Persuasive Propaganda?.https:\/\/osf.io\/fp87b\/download"},{"key":"e_1_3_2_2_35_1","volume-title":"Can LLM-Generated Misinformation Be Detected? (arXiv:2309.13788). arXiv","author":"Chen C.","year":"2023","unstructured":"Chen, C., & Shu, K. (2023). Can LLM-Generated Misinformation Be Detected? (arXiv:2309.13788). arXiv. http:\/\/arxiv.org\/abs\/2309.13788\/."},{"key":"e_1_3_2_2_36_1","unstructured":"Knoke D. & Yang S. (2019).\u00a0Social network analysis. SAGE publications. https:\/\/books.google.ie\/books?hl=en&lr=&id=9jDEDwAAQBAJ&oi=fnd&pg=PP12&dq=network+analysis&ots=HnQ4JQbn-e&sig=wn4mSp9CMOAa-gYmhyE0yNCf Iec&redir_esc=y#v=onepage&q=network%20analysis&f=false\/."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3651254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:28:40Z","timestamp":1755822520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":36,"alternative-id":["10.1145\/3589335.3651254","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3651254","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}