{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:02:29Z","timestamp":1773842549817,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":137,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3644998","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1784-1800","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6480-0555","authenticated-orcid":false,"given":"Mohammad Majid","family":"Akhtar","sequence":"first","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5935-0062","authenticated-orcid":false,"given":"Rahat","family":"Masood","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2113-3390","authenticated-orcid":false,"given":"Muhammad","family":"Ikram","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1835-3475","authenticated-orcid":false,"given":"Salil S","family":"Kanhere","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313420"},{"key":"e_1_3_2_2_2_1","volume-title":"A report to government on the adequacy of digital platforms' disinformation and news quality measures. https:\/\/tinyurl.com\/acma-adequacy-platforms. (June","author":"ACMA.","year":"2021","unstructured":"ACMA. June 2021. A report to government on the adequacy of digital platforms' disinformation and news quality measures. https:\/\/tinyurl.com\/acma-adequacy-platforms. (June 2021)."},{"key":"e_1_3_2_2_3_1","volume-title":"Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News. arXiv preprint arXiv:2209.03162","author":"Akhtar Mohammad Majid","year":"2022","unstructured":"Mohammad Majid Akhtar, Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, and Salil S Kanhere. 2022. Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News. arXiv preprint arXiv:2209.03162 (2022)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abf4393"},{"key":"e_1_3_2_2_5_1","volume-title":"Characterizing Malicious URL Campaigns. arXiv preprint arXiv:2108.12726","author":"Almashor Mahathir","year":"2021","unstructured":"Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, and Surya Nepal. 2021. Characterizing Malicious URL Campaigns. arXiv preprint arXiv:2108.12726 (2021)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342101"},{"key":"e_1_3_2_2_7_1","volume-title":"Leo Graiden Stewart, and Kate Starbird","author":"Arif Ahmer","year":"2018","unstructured":"Ahmer Arif, Leo Graiden Stewart, and Kate Starbird. 2018. Acting the part: Examining information operations within# BlackLivesMatter discourse. ACM HCI 2, CSCW (2018), 1--27."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"e_1_3_2_2_9_1","volume-title":"The impact of social media campaigns on the success of new product introductions. Journal of Retailing and Consumer Services","author":"Baum Daniela","year":"2019","unstructured":"Daniela Baum, Martin Spann, Johann F\u00fcller, and Carina Th\u00fcrridl. 2019. The impact of social media campaigns on the success of new product introductions. Journal of Retailing and Consumer Services (2019)."},{"key":"e_1_3_2_2_10_1","unstructured":"Dek A. Fredheim R. Haiduchyk T. Stolze M. Bay S. 2023. Social Media Manipulation 2022\/2023: Assessing the Ability of Social Media Companies to Combat Platform Manipulation. http:\/\/tinyurl.com\/nato-social-media-manipulation. (2023)."},{"key":"e_1_3_2_2_11_1","volume-title":"Its all in a name: detecting and labeling bots by their name. Computational and mathematical organization theory 25","author":"Beskow David M","year":"2019","unstructured":"David M Beskow and Kathleen M Carley. 2019. Its all in a name: detecting and labeling bots by their name. Computational and mathematical organization theory 25 (2019), 24--35."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2745939"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2019.8711365"},{"key":"e_1_3_2_2_14_1","first-page":"26","article-title":"Not the bots you are looking for: Patterns and effects of orchestrated interventions in the US and German elections","volume":"15","author":"Boichak Olga","year":"2021","unstructured":"Olga Boichak, Jeff Hemsley, Sam Jackson, Rebekah Tromble, and Sikana Tanupabrungsun. 2021. Not the bots you are looking for: Patterns and effects of orchestrated interventions in the US and German elections. International Journal of Communication 15 (2021), 26.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_2_15_1","volume-title":"Influence of fake news in Twitter during the 2016 US presidential election. Nature communications 10, 1","author":"Bovet Alexandre","year":"2019","unstructured":"Alexandre Bovet and Hern\u00e1n A Makse. 2019. Influence of fake news in Twitter during the 2016 US presidential election. Nature communications 10, 1 (2019), 7."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0239666"},{"key":"e_1_3_2_2_17_1","volume-title":"Social cybersecurity: an emerging science. Computational and mathematical organization theory 26, 4","author":"Carley Kathleen M","year":"2020","unstructured":"Kathleen M Carley. 2020. Social cybersecurity: an emerging science. Computational and mathematical organization theory 26, 4 (2020), 365--381."},{"key":"e_1_3_2_2_18_1","volume-title":"What is the Critical Infrastructure Centre?","author":"Centre Critical Infrastructure","year":"2017","unstructured":"Critical Infrastructure Centre. 2017. What is the Critical Infrastructure Centre? (2017). https:\/\/www.homeaffairs.gov.au\/nat-security\/files\/cic-factsheet-what-is-critical-infrastructure-centre.pdf"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-022-00173-9"},{"key":"e_1_3_2_2_20_1","unstructured":"Alex Cheng. 2010. Six Degrees of Separation Twitter Style. http:\/\/faculty.cbpp.uaa.alaska.edu\/afef\/six_degrees_of_separation.htm. (2010). [Online; accessed 19-May-2023]."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467321"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1464884917722453"},{"key":"e_1_3_2_2_23_1","first-page":"811","article-title":"Detecting automation of twitter accounts: Are you a human, bot, or cyborg","volume":"9","author":"Chu Zi","year":"2012","unstructured":"Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. 2012. Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE TDSC 9, 6 (2012), 811--824.","journal-title":"IEEE TDSC"},{"key":"e_1_3_2_2_24_1","volume-title":"MISDOOM 2019","author":"Cresci Stefano","year":"2020","unstructured":"Stefano Cresci. 2020. Detecting malicious social bots: story of a never-ending clash. In MISDOOM 2019, Hamburg, Germany, February 27--March 1, 2019, Revised Selected Papers 1. Springer, 77--88."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.29"},{"key":"e_1_3_2_2_26_1","volume-title":"Angelo Spognardi, Maurizio Tesconi, and Marinella Petrocchi.","author":"Cresci Stefano","year":"2023","unstructured":"Stefano Cresci, Roberto Di Pietro, Angelo Spognardi, Maurizio Tesconi, and Marinella Petrocchi. 2023. Demystifying Misconceptions in Social Bots Research. arXiv preprint arXiv:2303.17251 (2023)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326030"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2017.2681672"},{"key":"e_1_3_2_2_29_1","volume-title":"Disinformation and manipulation in digital media: Information pathologies","author":"Culloty Eileen","unstructured":"Eileen Culloty and Jane Suiter. 2021. Disinformation and manipulation in digital media: Information pathologies. Routledge."},{"key":"e_1_3_2_2_30_1","unstructured":"DataReportal. 2023. GLOBAL SOCIAL MEDIA STATISTICS. https:\/\/datareportal.com\/social-media-users. (2023)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_2_32_1","volume-title":"Echo chambers: Emotional contagion and group polarization on facebook. Scientific reports 6, 1","author":"Vicario Michela Del","year":"2016","unstructured":"Michela Del Vicario, Gianna Vivaldo, Alessandro Bessi, Fabiana Zollo, Antonio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2016. Echo chambers: Emotional contagion and group polarization on facebook. Scientific reports 6, 1 (2016), 37825."},{"key":"e_1_3_2_2_33_1","volume-title":"ICSP in Digital Economy","author":"Deng Xiaolong","unstructured":"Xiaolong Deng, Zhengge Dai, Mingdong Sun, and Tiejun Lv. 2020. Variational Autoencoder Based Enhanced Behavior Characteristics Classification for Social Robot Detection. In ICSP in Digital Economy. Springer, 232--248."},{"key":"e_1_3_2_2_34_1","volume-title":"CALEB: A Conditional Adversarial Learning Framework to Enhance Bot Detection. arXiv preprint arXiv:2205.15707","author":"Dialektakis George","year":"2022","unstructured":"George Dialektakis, Ilias Dimitriadis, and Athena Vakali. 2022. CALEB: A Conditional Adversarial Learning Framework to Enhance Bot Detection. arXiv preprint arXiv:2205.15707 (2022)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11219857"},{"key":"e_1_3_2_2_36_1","unstructured":"Yingtong Dou Kai Shu Congying Xia Philip S. Yu and Lichao Sun. 2021. User Preference-Aware Fake News Detection. In SIGIR."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274738"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Tobias T Eismann Timm F Wagner Christian V Baccarella and Kai-Ingo Voigt. 2018. This Is How We Do It: Untangling Patterns of Super Successful Social Media Activities. In ICSCM.","DOI":"10.2139\/ssrn.3219713"},{"key":"e_1_3_2_2_39_1","unstructured":"Zachary A Estela. 2023. Are you fake news. https:\/\/github.com\/N2ITN\/are-you-fake-news. (2023)."},{"key":"e_1_3_2_2_40_1","unstructured":"Shangbin Feng Zhaoxuan Tan Herun Wan Ningnan Wang Zilong Chen Binchi Zhang Qinghua Zheng Wenqian Zhang Zhenyu Lei Shujie Yang et al. 2022. TwiBot-22: Towards Graph-based Twitter bot detection. arXiv:2206.04564 (2022)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v22i8.8005"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v28i6.13185"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_2_44_1","volume-title":"behaviors, content: A disinformation ABC. Algorithms","author":"Fran\u00e7ois Camille","year":"2020","unstructured":"Camille Fran\u00e7ois. 2020. Actors, behaviors, content: A disinformation ABC. Algorithms (2020)."},{"key":"e_1_3_2_2_45_1","volume-title":"Social media: A critical introduction","author":"Fuchs Christian","unstructured":"Christian Fuchs. 2021. Social media: A critical introduction. Sage."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101960"},{"key":"e_1_3_2_2_47_1","unstructured":"Anastasia Giachanou Esteban A. R\u00edssola Bilal Ghanem Fabio Crestani and Paolo Rosso. 2020. The Role of Personality and Linguistic Patterns in Discriminating Between Fake News Spreaders and Fact Checkers. In NLPIS Elisabeth M\u00e9tais Farid Meziane Helmut Horacek and Philipp Cimiano (Eds.)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110090"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2881071"},{"key":"e_1_3_2_2_50_1","unstructured":"Alden Golab. 2023. Fake News Detection. https:\/\/github.com\/aldengolab\/fake-news-detection. (2023)."},{"key":"e_1_3_2_2_51_1","unstructured":"Timothy Graham Axel Bruns Guangnan Zhu and Rod Campbell. 2020. Like a virus: The coordinated spread of coronavirus disinformation. (2020)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91521-0_32"},{"key":"e_1_3_2_2_53_1","volume-title":"The Future of False Information Detection on Social Media: New Perspectives and Trends. ACM Comput. Surv. 53, 4","author":"Guo Bin","year":"2020","unstructured":"Bin Guo, Yasan Ding, Lina Yao, Yunji Liang, and Zhiwen Yu. 2020. The Future of False Information Detection on Social Media: New Perspectives and Trends. ACM Comput. Surv. 53, 4 (2020)."},{"key":"e_1_3_2_2_54_1","volume-title":"Mashal venskaya and Bhairav Mehta","author":"Smedt Guy De Pauw Tom De","year":"2023","unstructured":"Tom De Smedt Guy De Pauw, Mashal venskaya and Bhairav Mehta. 2023. Source Checker, News Audit. https:\/\/github.com\/clips\/news-audit. (2023)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.008"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.2196\/26933"},{"key":"e_1_3_2_2_58_1","volume-title":"computational propaganda during the UK-EU referendum. arXiv preprint arXiv:1606.06356","author":"Howard Philip N","year":"2016","unstructured":"Philip N Howard and Bence Kollanyi. 2016. Bots,# StrongerIn, and# Brexit: computational propaganda during the UK-EU referendum. arXiv preprint arXiv:1606.06356 (2016)."},{"key":"e_1_3_2_2_59_1","volume-title":"Efros","author":"Huh Minyoung","year":"2018","unstructured":"Minyoung Huh, Andrew Liu, Andrew Owens, and Alexei A. Efros. 2018. Fighting Fake News: Image Splice Detection via Learned Self-Consistency. In ECCV."},{"key":"e_1_3_2_2_60_1","unstructured":"Cherilyn Ireton and Julie Posetti. 2018. Journalism fake news & disinformation: handbook for journalism education and training. UP."},{"key":"e_1_3_2_2_61_1","volume-title":"Evaluating the effectiveness of publishers' features in fake news detection on social media. Multimedia Tools and Applications","author":"Jarrahi Ali","year":"2022","unstructured":"Ali Jarrahi and Leila Safari. 2022. Evaluating the effectiveness of publishers' features in fake news detection on social media. Multimedia Tools and Applications (2022), 1--27."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2017.1360143"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","unstructured":"Eleanna Kafeza Christos Makris and Gerasimos Rompolas. 2017. Exploiting Time Series Analysis in Twitter to Measure a Campaign Process Performance. In 2017 IEEE (SCC). 68--75. 10.1109\/SCC.2017.17","DOI":"10.1109\/SCC.2017.17"},{"key":"e_1_3_2_2_64_1","volume-title":"https:\/\/djjr-courses.wdfiles.com\/local-files\/soc180%3Akarinthy-chain-links\/Karinthy-Chain-Links_1929.pdf. (1929). [Online","author":"Karinthy Frigyes","year":"2023","unstructured":"Frigyes Karinthy. 1929. CHAIN-LINKS. https:\/\/djjr-courses.wdfiles.com\/local-files\/soc180%3Akarinthy-chain-links\/Karinthy-Chain-Links_1929.pdf. (1929). [Online; accessed 18-May-2023]."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2020.100106"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2018.1526238"},{"key":"e_1_3_2_2_67_1","unstructured":"Keval Khara and Ruoxi Qin Naidu. 2023. Fake Buster. https:\/\/github.com\/FakeNewsDetection\/FakeBuster. (2023)."},{"key":"e_1_3_2_2_68_1","volume-title":"Manish Gupta, and Vasudeva Varma.","author":"Khattar Dhruv","year":"2019","unstructured":"Dhruv Khattar, Jaipal Singh Goud, Manish Gupta, and Vasudeva Varma. 2019. MVAE: Multimodal Variational Autoencoder for Fake News Detection. In WWW."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3103515"},{"key":"e_1_3_2_2_70_1","unstructured":"Manideep Kolla. 2023. Triple Branch BERT Siamese Network for fake news classification on LIAR-PLUS dataset. https:\/\/github.com\/manideep2510\/siamese-BERT-fake-news-detection-LIAR. (2023)."},{"key":"e_1_3_2_2_71_1","unstructured":"Srijan Kumar and Neil Shah. 2018. False Information on Web and Social Media: A Survey. (2018)."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i1.14106"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211033566"},{"key":"e_1_3_2_2_74_1","unstructured":"Vlad Barash Matthew Hindman. 2018. Disinformation 'Fake News' and Influence Campaigns on Twitter. https:\/\/knightfoundation.org\/features\/misinfo\/. (2018)."},{"key":"e_1_3_2_2_75_1","volume-title":"Proceedings of the international AAAI conference on web and social media. 258--267","author":"Mitra Tanushree","year":"2015","unstructured":"Tanushree Mitra and Eric Gilbert. 2015. Credbank: A large-scale social media corpus with associated credibility annotations. In Proceedings of the international AAAI conference on web and social media. 258--267."},{"key":"e_1_3_2_2_76_1","unstructured":"Kai Nakamura Sharon Levy and William Yang Wang. 2019. r\/Fakeddit: A New Multimodal Benchmark Dataset for Fine-grained Fake News Detection. (2019)."},{"key":"e_1_3_2_2_77_1","unstructured":"Christina Nemr and William Gangware. 2019. Weapons of mass distraction: Foreign state-sponsored disinformation in the digital age. Park Advisors."},{"key":"e_1_3_2_2_78_1","volume-title":"Confirmation bias: A ubiquitous phenomenon in many guises. Review of general psychology 2, 2","author":"Nickerson Raymond S","year":"1998","unstructured":"Raymond S Nickerson. 1998. Confirmation bias: A ubiquitous phenomenon in many guises. Review of general psychology 2, 2 (1998)."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026307"},{"key":"e_1_3_2_2_80_1","first-page":"1","article-title":"Anatomy of an info-war: how Russia's propaganda machine works, and how to counter it","volume":"15","author":"Nimmo Ben","year":"2015","unstructured":"Ben Nimmo. 2015. Anatomy of an info-war: how Russia's propaganda machine works, and how to counter it. Central European Policy Institute 15 (2015), 1--16.","journal-title":"Central European Policy Institute"},{"key":"e_1_3_2_2_81_1","volume-title":"SoK: The Dual Nature of Technology in Sexual Abuse","author":"Obada-Obieh Borke","unstructured":"Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, and Konstantin Beznosov. 2022. SoK: The Dual Nature of Technology in Sexual Abuse. In IEEE S&P."},{"key":"e_1_3_2_2_82_1","volume-title":"The misinformation age: How false beliefs spread","author":"O'Connor Cailin","unstructured":"Cailin O'Connor and James Owen Weatherall. 2019. The misinformation age: How false beliefs spread. Yale University Press."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102250"},{"key":"e_1_3_2_2_84_1","volume-title":"False social media posts are hindering earthquake relief efforts in Turkey. You can help stop that. https:\/\/tinyurl.com\/yc4dkppn. (2023). [Online","author":"Panjwani Abbas","year":"2023","unstructured":"Abbas Panjwani. 2023. False social media posts are hindering earthquake relief efforts in Turkey. You can help stop that. https:\/\/tinyurl.com\/yc4dkppn. (2023). [Online; accessed 20-May-2023]."},{"key":"e_1_3_2_2_85_1","unstructured":"Nishit Patel. 2023. Fake News Detection. https:\/\/github.com\/nishitpatel01\/Fake_News_Detection. (2023)."},{"key":"e_1_3_2_2_86_1","volume-title":"Update on Twitter's review of the 2016 US election. https:\/\/blog.twitter.com\/en_us\/topics\/company\/2018\/2016-election-update. (2022). [Online","author":"Policy Twitter Public","year":"2023","unstructured":"Twitter Public Policy. 2022. Update on Twitter's review of the 2016 US election. https:\/\/blog.twitter.com\/en_us\/topics\/company\/2018\/2016-election-update. (2022). [Online; accessed 05-May-2023]."},{"key":"e_1_3_2_2_87_1","unstructured":"PolitiFact. 2023. PolitiFact. https:\/\/www.politifact.com\/. (2023)."},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.187"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1111\/soin.12339"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578503.3583619"},{"key":"e_1_3_2_2_91_1","volume-title":"The false positive problem of automatic bot detection in social science research. PloS one 15, 10","author":"Rauchfleisch Adrian","year":"2020","unstructured":"Adrian Rauchfleisch and Jonas Kaiser. 2020. The false positive problem of automatic bot detection in social science research. PloS one 15, 10 (2020)."},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s13278-022-01019-y","article-title":"Early multi-class ensemble-based fake news detection using content features","volume":"13","author":"Rezaei Sajjad","year":"2022","unstructured":"Sajjad Rezaei, Mohsen Kahani, Behshid Behkamal, and Abdulrahman Jalayer. 2022. Early multi-class ensemble-based fake news detection using content features. Social Network Analysis and Mining 13, 1 (2022), 16.","journal-title":"Social Network Analysis and Mining"},{"key":"e_1_3_2_2_93_1","unstructured":"Marian-Andrei Rizoiu Swapnil Mishra Quyu Kong Mark Carman and Lexing Xie. 2018. SIR-Hawkes: Linking epidemic models and Hawkes processes to model diffusions in finite populations. In WWW."},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"crossref","unstructured":"Daniel Rofr\u00edo Anacaren Ruiz Erin Sosebee Qasim Raza Adnan Bashir Jed Crandall and Ramiro Sandoval. 2019. Presidential elections in ecuador: bot presence in twitter. In ICEDEG.","DOI":"10.1109\/ICEDEG.2019.8734426"},{"key":"e_1_3_2_2_95_1","unstructured":"Lee Ross Andrew Ward et al. 1996. Naive realism in everyday life: Implications for social conflict and misunderstanding. Values and knowledge (1996) 103--135."},{"key":"e_1_3_2_2_96_1","volume-title":"The misinformation machine. Science 363, 6425","author":"Ruths Derek","year":"2019","unstructured":"Derek Ruths. 2019. The misinformation machine. Science 363, 6425 (2019), 348--348."},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557279"},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412698"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1177\/107769900508200304"},{"key":"e_1_3_2_2_100_1","volume-title":"US Security and Exchange Commission Twitter Report. https:\/\/www.sec.gov\/Archives\/edgar\/data\/1418091\/000156459014003474\/twtr-10q_20140630.htm?_ga=1.106844928.2072504916.1401902059. (2014). [Online","author":"US Security and Exchange Commission Twitter Report. 2014.","year":"2023","unstructured":"US Security and Exchange Commission Twitter Report. 2014. US Security and Exchange Commission Twitter Report. https:\/\/www.sec.gov\/Archives\/edgar\/data\/1418091\/000156459014003474\/twtr-10q_20140630.htm?_ga=1.106844928.2072504916.1401902059. (2014). [Online; accessed 23-March-2023]."},{"key":"e_1_3_2_2_101_1","volume-title":"Onur Varol, Kai-Cheng Yang, Alessandro Flammini, and Filippo Menczer.","author":"Shao Chengcheng","year":"2018","unstructured":"Chengcheng Shao, Giovanni Luca Ciampaglia, Onur Varol, Kai-Cheng Yang, Alessandro Flammini, and Filippo Menczer. 2018. The spread of low-credibility content by social bots. Nature communications 9, 1 (2018), 1--9."},{"key":"e_1_3_2_2_102_1","volume-title":"2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, 1--11","author":"Shao Huajie","year":"2020","unstructured":"Huajie Shao, Shuochao Yao, Andong Jing, Shengzhong Liu, Dongxin Liu, Tianshi Wang, Jinyang Li, Chaoqi Yang, Ruijie Wang, and Tarek Abdelzaher. 2020. Misinformation detection and adversarial attack cost analysis in directional social networks. In 2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, 1--11."},{"key":"e_1_3_2_2_103_1","volume-title":"Proceedings of the 10th ACM Conference on Web Science. 287--288","author":"Shen Tracy Jia","year":"2019","unstructured":"Tracy Jia Shen, Robert Cowell, Aditi Gupta, Thai Le, Amulya Yadav, and Dongwon Lee. 2019. How gullible are you? Predicting susceptibility to fake news. In Proceedings of the 10th ACM Conference on Web Science. 287--288."},{"key":"e_1_3_2_2_104_1","volume-title":"Fakenewsnet: A data repository with news content, social context, and spatiotemporal information for studying fake news on social media. Big data","author":"Shu Kai","year":"2020","unstructured":"Kai Shu, Deepak Mahudeswaran, Suhang Wang, Dongwon Lee, and Huan Liu. 2020. Fakenewsnet: A data repository with news content, social context, and spatiotemporal information for studying fake news on social media. Big data (2020)."},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"crossref","unstructured":"Kai Shu Amy Sliva Suhang Wang Jiliang Tang and Huan Liu. 2017. Fake News Detection on Social Media: A Data Mining Perspective. SIGKDD Explor. Newsl. (2017).","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_3_2_2_106_1","doi-asserted-by":"crossref","unstructured":"Kai Shu Suhang Wang and Huan Liu. 2018. Understanding User Profiles on Social Media for Fake News Detection. In 2018 IEEE (MIPR).","DOI":"10.1109\/MIPR.2018.00092"},{"key":"e_1_3_2_2_107_1","doi-asserted-by":"crossref","unstructured":"Kai Shu Suhang Wang and Huan Liu. 2019. Beyond News Contents: The Role of Social Context for Fake News Detection (WSDM).","DOI":"10.1145\/3289600.3290994"},{"key":"e_1_3_2_2_108_1","unstructured":"David Smith. 2016. The Hillary Clinton email controversy explained: what we know so far. https:\/\/www.theguardian.com\/us-news\/2016\/oct\/31\/hillary-clinton-latest-emails-explained. (2016)."},{"key":"e_1_3_2_2_109_1","unstructured":"Snopes. 2023. Snopes.com | The definitive fact-checking site and reference source for urban legends folklore myths rumors and misinformation. https:\/\/www.snopes.com\/. (2023)."},{"key":"e_1_3_2_2_110_1","volume-title":"Protection from 'Fake News': The Need for Descriptive Factual Labeling for Online Content. Future Internet (05","author":"Spradling Matthew","year":"2021","unstructured":"Matthew Spradling, Jeremy Straub, and Jay Strong. 2021. Protection from 'Fake News': The Need for Descriptive Factual Labeling for Online Content. Future Internet (05 2021), 142."},{"key":"e_1_3_2_2_111_1","volume-title":"Disinformation's spread: bots, trolls and all of us. Nature 571, 7766","author":"Starbird Kate","year":"2019","unstructured":"Kate Starbird. 2019. Disinformation's spread: bots, trolls and all of us. Nature 571, 7766 (2019), 449--450."},{"key":"e_1_3_2_2_112_1","volume-title":"CSCW","author":"Starbird Kate","year":"2019","unstructured":"Kate Starbird, Ahmer Arif, and Tom Wilson. 2019. Disinformation as collaborative work: Surfacing the participatory nature of strategic information operations. ACM on HCI 3, CSCW (2019), 1--26."},{"key":"e_1_3_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15009"},{"key":"e_1_3_2_2_114_1","volume-title":"IConference 2014 proceedings","author":"Starbird Kate","year":"2014","unstructured":"Kate Starbird, Jim Maddock, Mania Orand, Peg Achterman, and Robert M Mason. 2014. Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 boston marathon bombing. IConference 2014 proceedings (2014)."},{"key":"e_1_3_2_2_115_1","volume-title":"Daily time spent on social networking by internet users worldwide from 2012 to","year":"2022","unstructured":"Statista. 2022. Daily time spent on social networking by internet users worldwide from 2012 to 2022. https:\/\/www.statista.com\/statistics\/433871\/daily-social-media-usage-worldwide\/. (2022)."},{"key":"e_1_3_2_2_116_1","volume-title":"Media usage in an internet minute as of","year":"2022","unstructured":"Statista. 2023. Media usage in an internet minute as of April 2022. https:\/\/tinyurl.com\/usermincontent. (2023)."},{"key":"e_1_3_2_2_117_1","volume-title":"Realtime user ratings as a strategy for combatting misinformation: an experimental study. Scientific reports 13, 1","author":"Stein Jonas","year":"2023","unstructured":"Jonas Stein, Vincenz Frey, and Arnout van de Rijt. 2023. Realtime user ratings as a strategy for combatting misinformation: an experimental study. Scientific reports 13, 1 (2023), 1626."},{"key":"e_1_3_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_3_2_2_119_1","volume-title":"Social networks","author":"Travers Jeffrey","unstructured":"Jeffrey Travers and Stanley Milgram. 1977. An experimental study of the small world problem. In Social networks. Elsevier, 179--197."},{"key":"e_1_3_2_2_120_1","unstructured":"Nguyen Manh Duc Tuan and Pham Quang Nhat Minh. 2020. FakeNews Detection Using Pre-trained Language Models and Graph Convolutional Networks.. In MediaEval."},{"key":"e_1_3_2_2_121_1","volume-title":"Comment, Share. IJELCS 4","author":"Usmani Sania","year":"2019","unstructured":"Sania Usmani, Syed Ali, Kiran Imtiaz, and Hamza Khan. 2019. The Experimental Study On the Effectiveness of Social Media Ad Campaign: Like, Comment, Share. IJELCS 4 (2019)."},{"key":"e_1_3_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796018"},{"key":"e_1_3_2_2_123_1","doi-asserted-by":"crossref","unstructured":"Luis Vargas Patrick Emami and Patrick Traynor. 2020. On the detection of disinformation campaign activity with network analysis. In ACM SIGSAC.","DOI":"10.1145\/3411495.3421363"},{"key":"e_1_3_2_2_124_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"e_1_3_2_2_125_1","unstructured":"Nguyen Vo and Rushikesh Naidu. 2023. Fake News Detection. https:\/\/github.com\/nguyenvo09\/fake_news_detection_deep_learning. (2023)."},{"key":"e_1_3_2_2_126_1","volume-title":"The spread of true and false news online. Science 359, 6380","author":"Vosoughi Soroush","year":"2018","unstructured":"Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. Science 359, 6380 (2018)."},{"key":"e_1_3_2_2_127_1","doi-asserted-by":"publisher","unstructured":"Patrick Wang Rafael Angarita and Ilaria Renna. 2018. Is This the Era of Misinformation yet: Combining Social Bots and Fake News to Deceive the Masses. WWW. 10.1145\/3184558.3191610","DOI":"10.1145\/3184558.3191610"},{"key":"e_1_3_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219903"},{"key":"e_1_3_2_2_129_1","doi-asserted-by":"crossref","unstructured":"Yaqing Wang Weifeng Yang Fenglong Ma Jin Xu Bin Zhong Qiang Deng and Jing Gao. 2020. Weak Supervision for Fake News Detection via Reinforcement Learning. In AAAI.","DOI":"10.1609\/aaai.v34i01.5389"},{"key":"e_1_3_2_2_130_1","volume-title":"Understanding Information disorder. https:\/\/firstdraftnews.org\/long-form-article\/understanding-information-disorder\/. (2020). [Online","author":"Wardle Claire","year":"2023","unstructured":"Claire Wardle. 2020. Understanding Information disorder. https:\/\/firstdraftnews.org\/long-form-article\/understanding-information-disorder\/. (2020). [Online; accessed 10-May-2023]."},{"key":"e_1_3_2_2_131_1","first-page":"5594","article-title":"Detecting malicious social robots with generative adversarial networks","volume":"13","author":"Wu Bin","year":"2019","unstructured":"Bin Wu, Le Liu, Zhengge Dai, Xiujuan Wang, and Kangfeng Zheng. 2019. Detecting malicious social robots with generative adversarial networks. KSII Transactions on Internet and Information Systems (TIIS) 13, 11 (2019), 5594--5615.","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"e_1_3_2_2_132_1","volume-title":"SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Wu Yuxi","year":"2022","unstructured":"Yuxi Wu, W Keith Edwards, and Sauvik Das. 2022. SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1863--1879."},{"key":"e_1_3_2_2_133_1","doi-asserted-by":"crossref","unstructured":"Zheng Xie Guannan Liu Junjie Wu Lihong Wang and Chunyang Liu. 2016. Wisdom of fusion: Prediction of 2016 Taiwan election with heterogeneous big data. In ICSSSM.","DOI":"10.1109\/ICSSSM.2016.7538625"},{"key":"e_1_3_2_2_134_1","volume-title":"Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel","author":"Xu Teng","year":"2021","unstructured":"Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, and Paul Pearce. 2021. Deep entity classification: Abusive account detection for online social networks. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_2_2_135_1","doi-asserted-by":"crossref","unstructured":"Savvas Zannettou Tristan Caulfield William Setzer Michael Sirivianos Gianluca Stringhini and Jeremy Blackburn. 2019. Who let the trolls out? towards understanding state-sponsored trolls. In ACM ICSW. 353--362.","DOI":"10.1145\/3292522.3326016"},{"key":"e_1_3_2_2_136_1","volume-title":"The Rise of Social Botnets: Attacks and Countermeasures","author":"Zhang Jinxue","year":"2018","unstructured":"Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan. 2018. The Rise of Social Botnets: Attacks and Countermeasures. IEEE TDSC 15, 6 (2018)."},{"key":"e_1_3_2_2_137_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2023.102626"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3644998","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:06Z","timestamp":1750290246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3644998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":137,"alternative-id":["10.1145\/3634737.3644998","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3644998","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}