{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:41:50Z","timestamp":1726036910617},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030219017"},{"type":"electronic","value":"9783030219024"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-21902-4_22","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:04:01Z","timestamp":1562713441000},"page":"311-323","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Detection of Bots and Cyborgs in Twitter: A Study on the Chilean Presidential Election in 2017"],"prefix":"10.1007","author":[{"given":"Samara","family":"Castillo","sequence":"first","affiliation":[]},{"given":"H\u00e9ctor","family":"Allende-Cid","sequence":"additional","affiliation":[]},{"given":"Wenceslao","family":"Palma","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Alfaro","sequence":"additional","affiliation":[]},{"given":"Heitor S.","family":"Ramos","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Elortegui","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Santander","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, L., Deplano, M., Schifanella, R., Ruffo, G.: People are strange when you\u2019re a stranger: impact and influence of bots on social networks. In: Proceedings 6th International AAAI Conference on Weblogs & Social Media (ICWSM) (2012)","DOI":"10.1609\/icwsm.v6i1.14236"},{"issue":"2","key":"22_CR2","first-page":"39","volume":"4","author":"PA Aparaschivei","year":"2011","unstructured":"Aparaschivei, P.A.: The use of new media in electoral campaigns: analysis on the use of blogs, Facebook, Twitter and YouTube in the 2009 Romanian presidential campaign. J. Media Res. 4(2), 39\u201360 (2011)","journal-title":"J. Media Res."},{"key":"22_CR3","unstructured":"Botometer: Dataset: varol-2017. https:\/\/botometer.iuni.iu.edu\/bot-repository\/datasets.html"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1177\/1461444813480466","volume":"16","author":"A Ceron","year":"2014","unstructured":"Ceron, A., Curini, L., Iacus, S.M., Porro, G.: Every Tweet counts? How sentiment analysis of social media can improve our knowledge of citizens\u2019 political preferences with an application to Italy and France\u2019. New Media Soc. 16(2), 340\u201358 (2014). http:\/\/journals.sagepub.com\/doi\/10.1177\/1461444813480466","journal-title":"New Media Soc."},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9, 811\u2013824 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"22_CR6","unstructured":"CNN Chile. http:\/\/www.cnnchile.com\/noticia\/2017\/09\/15\/. Accessed 27 Nov 2018"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Escolar, L.D., Claes, F., Osteso L\u00f3pez, J.M.: Audiencias Televisivas y L\u00edderes de Opini\u00f3n En Twitter. Caso de Estudio: El Barco. Estudios Sobre El Mensaje Period\u00edstico 19(1) (2013). http:\/\/revistas.ucm.es\/index.php\/ESMP\/article\/view\/42526","DOI":"10.5209\/rev_ESMP.2013.v19.n1.42526"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1109\/TIFS.2014.2316975","volume":"9","author":"NZ Gong","year":"2014","unstructured":"Gong, N.Z., Frank, M., Mittal, P.: Sybilbelief: a semisupervised learning approach for structure-based sybil detection. IEEE Trans. Inf. Forensics Secur. 9, 976\u2013987 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"22_CR10","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016)","journal-title":"Commun. ACM"},{"key":"22_CR11","unstructured":"Gao, P., Gong, N.Z., Kulkarni, S., Thomas, K., Mittal, P.: Sybilframe: a defense-in-depth framework for structurebased sybil detection. arXiv preprint arXiv:1503.02985 (2015)"},{"key":"22_CR12","volume-title":"Analyzing Social Media Networks with NodeXL: Insights from a Connected World","author":"DL Hansen","year":"2010","unstructured":"Hansen, D.L., Shneiderman, B., Smith, M.A.: Analyzing Social Media Networks with NodeXL: Insights from a Connected World. Morgan Kaufmann, Los Altos (2010)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Jaidka, K., Ahmed, S., Skoric, M., Hilbert, M.: Predicting elections from Social Media: a three-country, three-method comparative study. Asian J. Commun. 1\u201321 (2018). https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01292986.2018.1453849","DOI":"10.1080\/01292986.2018.1453849"},{"key":"22_CR14","unstructured":"Karata\u015f, A., \u015eahin, S.: A review on social bot detection techniques and research directions. In: ISCTurkey 10th International Information Security and Cryptology Conference, At Ankara, Turkey (2017)"},{"issue":"8","key":"22_CR15","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1177\/1461444814562445","volume":"18","author":"D Kreiss","year":"2016","unstructured":"Kreiss, D.: Seizing the moment: the presidential campaigns\u2019 use of twitter during the 2012 electoral cycle. New Media Soc. 18(8), 1473\u201390 (2016)","journal-title":"New Media Soc."},{"key":"22_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-33630-5_13","volume-title":"ICT Systems Security and Privacy Protection","author":"D Mulamba","year":"2016","unstructured":"Mulamba, D., Ray, I., Ray, I.: SybilRadar: a graph-structure based framework for sybil detection in on-line social networks. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 179\u2013193. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33630-5_13"},{"key":"22_CR17","unstructured":"Parsons, J.: Facebook\u2019s war continues against fake profiles and bots, 2015 September 12. http:\/\/www.huffingtonpost.com\/james-parsons\/facebookswar-continues-against-fake-profiles-andbots_b_6914282.html. Accessed 31 Jan 2019"},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.7764\/cdi.41.1218","volume":"41","author":"P Santander","year":"2017","unstructured":"Santander, P., El\u00f3rtegui, C., Gonz\u00e1lez, C., Allende-Cid, H., Palma, W.: Redes sociales, inteligencia computacional y predicci\u00f3n electoral: el caso de las primarias presidenciales de Chile 2017. Cuadernos. Info 41, 41\u201356 (2017)","journal-title":"Cuadernos. Info"},{"key":"22_CR19","unstructured":"Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on Twitter. In: ICWSM (2011)"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Ratkiewicz, J., Conover, M., Meiss, M., Goncalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: 5th International Conference on Weblogs & Social Media, pp. 297\u2013304 (2011)","DOI":"10.1609\/icwsm.v5i1.14127"},{"key":"22_CR21","unstructured":"TweetDeck. https:\/\/tweetdeck.twitter.com\/. Accessed 27 Nov 2018"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Varol, O., et al.: Online human-bot interactions: detection, estimation, and characterization. arXiv preprint arXiv:1703.03107 (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"22_CR23","unstructured":"Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., et al.: Social turing tests: crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012)"}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media. Design, Human Behavior and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-21902-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T20:09:23Z","timestamp":1721506163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-21902-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030219017","9783030219024"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-21902-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}