{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:32:26Z","timestamp":1760236346363,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["20-011-00371 \u0410"],"award-info":[{"award-number":["20-011-00371 \u0410"]}],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["18-71-10094-P"],"award-info":[{"award-number":["18-71-10094-P"]}],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This paper examines the problem of social media special operations and especially induced support in social media during political election campaigns. The theoretical background of the paper is based on the study fake activity in social networks during pre-election processes and the existing models and methods of detection of such activity. The article proposes a methodology for identifying and diagnosing induced support for a political project. The methodology includes a model of induced activity, an algorithm for segmenting the audience of a political project, and a technique for detecting and diagnosing induced support. The proposed methodology provides identification of network combatants, participants of social media special operations, influencing public opinion in the interests of a political project. The methodology can be used to raise awareness of the electorate, the public, and civil society in general about the presence of artificial activity on the page of a political project.<\/jats:p>","DOI":"10.3390\/fi13110297","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T02:55:17Z","timestamp":1637636117000},"page":"297","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detection of Induced Activity in Social Networks: Model and Methodology"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6536-9277","authenticated-orcid":false,"given":"Dmitrii","family":"Gavra","sequence":"first","affiliation":[{"name":"Department of Public Relations in Business, St. Petersburg State University,   7-9 Universitetskaya Embankment, 199034 St. Petersburg,  Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6819-8709","authenticated-orcid":false,"given":"Ksenia","family":"Namyatova","sequence":"additional","affiliation":[{"name":"Department of Public Relations in Business, St. Petersburg State University,   7-9 Universitetskaya Embankment, 199034 St. Petersburg,  Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4945-6151","authenticated-orcid":false,"given":"Lidia","family":"Vitkova","sequence":"additional","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), 39, 14th Line V.O., 199178 St. Petersburg,   Russia"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"ref_1","unstructured":"Shu, K., Wang, S., Lee, D., and Liu, H. (2020). Bots, Elections, and Social Media: A Brief Overview, Springer."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1080\/10584609.2018.1526238","article-title":"Social Bots in Election Campaigns: Theoretical, Empirical, and Methodological Implications","volume":"36","author":"Keller","year":"2018","journal-title":"Political Commun."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Borge-Holthoefer, J., Rivero, A., Garc\u00eda, I., Cauh\u00e9, E., Ferrer, A., Ferrer, D., Francos, D., I\u00f1iguez, D., P\u00e9rez, M.P., and Ruiz, G. (2011). Structural and Dynamical Patterns on Online Social Networks: The Spanish May 15th Movement as a Case Study. PLoS ONE, 6.","DOI":"10.1371\/journal.pone.0023883"},{"key":"ref_4","unstructured":"Ruediger, M.A. (2021, November 17). Bots, Social Networks and Politics in Brazil: A Study on Illegitimate Interferences with the Public Debate on the Web, Risks to the Democracy and the 2018 Elections. Available online: http:\/\/dapp.fgv.br\/en\/robots-social-networks-politics-fgv-dapp-study-points-illegitimate-interference-public-debate-web\/."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Cheng, J., Adamic, L., Dow, P.A., Kleinberg, J.M., and Leskovec, J. (2014, January 7\u201311). Can cascades be predicted?. Proceedings of the 23rd International Conference on World Wide Web, Seoul, Korea.","DOI":"10.1145\/2566486.2567997"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kumari, A., and Singh, S.N. (2017, January 12\u201313). Online influence maximization using rapid continuous time independent cascade model. Proceedings of the 2017 7th International Conference on Cloud Computing, Data Science & Engineering\u2014Confluence, Noida, India.","DOI":"10.1109\/CONFLUENCE.2017.7943175"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1287\/mnsc.1040.0264","article-title":"A New Product Growth for Model Consumer Durables","volume":"50","author":"Bass","year":"2004","journal-title":"Manag. Sci."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1287\/isre.1100.0339","article-title":"Social Networks and the Diffusion of User-Generated Content: Evidence from YouTube","volume":"23","author":"Susarla","year":"2012","journal-title":"Inf. Syst. Res."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Forelle, M., Howard, P.N., Monroy-Hern\u00e1ndez, A., and Savage, S. (2015). Political bots and the manipulation of public opinion in Venezuela. arXiv.","DOI":"10.2139\/ssrn.2635800"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.3103\/S014768821504005X","article-title":"Network technologies for information warfare and manipulation of public opinion","volume":"42","author":"Syuntyurenko","year":"2015","journal-title":"Sci. Tech. Inf. Process."},{"key":"ref_11","unstructured":"Spulak, R. (2007). A Theory of Special Operations, JSOU Press Report."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1111\/j.1540-5907.2010.00440.x","article-title":"Civic Engagements: Resolute Partisanship or Reflective Deliberation","volume":"54","author":"MacKuen","year":"2010","journal-title":"Am. J. Political Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s13347-015-0196-9","article-title":"The Cyber Combatant: A New Status for a New Warrior","volume":"28","year":"2015","journal-title":"Philos. Technol."},{"key":"ref_14","first-page":"71","article-title":"Information Warfare in Terms of the Principle of Distinction between Combatants and Civilians in the Armed Conflicts","volume":"17","author":"Eghbali","year":"2018","journal-title":"J. Leg. Res."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2053951716674236","DOI":"10.1177\/2053951716674236","article-title":"Profile characteristics of fake Twitter accounts","volume":"3","author":"Gurajala","year":"2016","journal-title":"Big Data Soc."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Khaled, S., El-Tazi, N., and Mokhtar, H.M.O. (2018, January 10\u201313). Detecting Fake Accounts on Social Media. Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8621913"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Romanov, A., Semenov, A., Mazhelis, O., and Veijalainen, J. (2017, January 25\u201327). Detection of Fake Profiles in Social Media-Literature Review. Proceedings of the 13th International Conference on Web Information Systems and Technologies, Porto, Portugal.","DOI":"10.5220\/0006362103630369"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Boshmaf, Y., Ripeanu, M., Beznosov, K., and Santos-Neto, E. (2015, January 16). Thwarting Fake OSN Accounts by Predicting their Victims. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, Denver, CO, USA.","DOI":"10.1145\/2808769.2808772"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.ins.2015.10.039","article-title":"Account classification in online social networks with LBCA and wavelets","volume":"332","author":"Igawa","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1080\/17405904.2018.1450276","article-title":"Platformed antagonism: Racist discourses on fake Muslim Facebook pages","volume":"15","author":"Farkas","year":"2018","journal-title":"Crit. Discourse Stud."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1123\/jlas.2016-0020","article-title":"Follow Me, What\u2019s the Harm? Considerations of Catfishing and Utilizing Fake Online Personas on Social Media","volume":"27","author":"Smith","year":"2017","journal-title":"J. Leg. Asp. Sport"},{"key":"ref_22","unstructured":"(2021, November 08). Amazon Mechanical Turk. Available online: https:\/\/www.mturk.com\/."},{"key":"ref_23","unstructured":"(2021, November 08). Exchange of Comments and Social Promotion. Available online: https:\/\/qcomment.ru\/."},{"key":"ref_24","unstructured":"(2021, November 08). The Freelancing and Crowdsourcing Marketplace. Available online: https:\/\/www.freelancer.com\/."},{"key":"ref_25","unstructured":"(2021, November 08). The Freelancing and Crowdsourcing Marketplace. Available online: https:\/\/www.zbj.com\/."},{"key":"ref_26","unstructured":"(2021, November 08). Account Store. Available online: https:\/\/buyaccs.com\/."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., and Shafiq, M.Z. (2014, January 5\u20137). Paying for Likes?. Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver BC, Canada.","DOI":"10.1145\/2663716.2663729"},{"key":"ref_28","unstructured":"Thomas, K., McCoy, D., Grier, C., Kolcz, A., and Paxson, V. (2013, January 14\u201316). Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse. Proceedings of the 22nd USENIX Security Symposium, Washington, DC, USA."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Wang, T., Wang, G., Li, X., Zheng, H., and Zhao, B.Y. (2013, January 12\u201316). Characterizing and detecting malicious crowdsourcing. Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, Hong Kong, China.","DOI":"10.1145\/2486001.2491719"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/s11280-019-00727-4","article-title":"Co-Detection of crowdturfing microblogs and spammers in online social networks","volume":"23","author":"Liu","year":"2019","journal-title":"World Wide Web"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2156","DOI":"10.1109\/TNSM.2020.3031573","article-title":"Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election","volume":"17","author":"Zago","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Forest, J.J. (2009). Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas, Praeger Security International.","DOI":"10.5040\/9798400670046"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1111\/j.1460-2466.1974.tb00367.x","article-title":"The Spiral of Silence a Theory of Public Opinion","volume":"24","year":"1974","journal-title":"J. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3917","DOI":"10.1177\/1461444818763384","article-title":"Spiral of silence on social media and the moderating role of disagreement and publicness in the network: Analyzing expressive and withdrawal behaviors","volume":"20","author":"Chen","year":"2018","journal-title":"New Media Soc."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1177\/009365090017003006","article-title":"Self-Serving Biases in Perceiving the Opinions of Others","volume":"17","author":"Kennamer","year":"1990","journal-title":"Commun. Res."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"124163","DOI":"10.1016\/j.physa.2020.124163","article-title":"Dynamic mechanism of social bots interfering with public opinion in network","volume":"551","author":"Cheng","year":"2020","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3934\/mine.2022003","article-title":"Modeling the propagation of riots, collective behaviors and epidemics","volume":"4","author":"Berestycki","year":"2022","journal-title":"Math. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"083127","DOI":"10.1063\/5.0011658","article-title":"A generalized linear threshold model for an improved description of the spreading dynamics","volume":"30","author":"Ran","year":"2020","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"key":"ref_39","first-page":"141","article-title":"Bot detection by friends graph in social networks","volume":"12","author":"Kolomeets","year":"2021","journal-title":"JoWUA"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Breuer, A., Eilat, R., and Weinsberg, U. (2020, January 20\u201324). Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks. Proceedings of the Web Conference 2020, New York, NY, USA.","DOI":"10.1145\/3366423.3380204"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Vitkova, L., and Kolomeets, M. (2019). Approach to Identification and Analysis of Information Sources in Social Networks, Springer.","DOI":"10.1007\/978-3-030-32258-8_34"},{"key":"ref_42","unstructured":"Vitkova, L., Chechulin, A., and Kotenko, I. (October, January 30). Feature Selection for Intelligent Detection of Targeted Influence on Public Opinion in Social Networks. Proceedings of the Fifth International Scientific Conference \u201cIntelligent Information Technologies for Industry\u201d (IITI\u201921), Sirius, Russia."},{"key":"ref_43","unstructured":"(2021, November 08). Dataset \u201cSegmentation_of_the_Audience\u201d. Available online: https:\/\/www.kaggle.com\/lidiaiskin\/segmentation-of-the-audience."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1177\/009365095022001002","article-title":"Information Cues and Indicators of the Climate of Opinion","volume":"22","author":"Shamir","year":"1995","journal-title":"Commun. Res."},{"key":"ref_45","first-page":"421","article-title":"Thinking of Others","volume":"92","author":"Zerback","year":"2015","journal-title":"J. Mass Commun. Q."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/11\/297\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:33:54Z","timestamp":1760168034000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/11\/297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,22]]},"references-count":45,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["fi13110297"],"URL":"https:\/\/doi.org\/10.3390\/fi13110297","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2021,11,22]]}}}