2022
DOI: 10.1016/j.osnem.2022.100224
|View full text |Cite
|
Sign up to set email alerts
|

Ready-to-(ab)use: From fake account trafficking to coordinated inauthentic behavior on Twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…Automated accounts mimicking real users have increasingly become the focus of detection efforts, particularly on social media platforms (Gleicher, 2018;Santia et al, 2019). Malicious actors' strategies are not limited to using completely fake accounts; they may also use real user accounts while concealing their identities or intentions to propagate their ideas (Mazza et al, 2022).…”
Section: Computational Detection Of Problematic Actorsmentioning
confidence: 99%
“…Automated accounts mimicking real users have increasingly become the focus of detection efforts, particularly on social media platforms (Gleicher, 2018;Santia et al, 2019). Malicious actors' strategies are not limited to using completely fake accounts; they may also use real user accounts while concealing their identities or intentions to propagate their ideas (Mazza et al, 2022).…”
Section: Computational Detection Of Problematic Actorsmentioning
confidence: 99%
“…In this context, the broad definition of “fake” and “news” (Caplan et al, 2018 ; HLEG EU Commission, 2018 ) encouraged the development of alternative terminologies to narrow the issue (Wardle and Derakhshan, 2017 ). For example, terms such as “fake news commercially motivated” (Silverman, 2017 ) have described CIB as aiming at economic fraud (Mazza et al, 2022 ). Other authors have expanded the meaning of the term “fake,” including problematic information (Jack, 2017 ), while others have looked at contact points among similar occurrences.…”
Section: Cib Operations and Expansionmentioning
confidence: 99%
“…In the last years, interdisciplinary studies have used sophisticated mixed methods (Amaturo and Punziano, 2021 ) to identify online communication issues, including artificial intelligence (Murero, 2020 ) to differentiate between authentic and inauthentic (manipulating) coordination of online campaigns (Vo et al, 2017 ; Jiang et al, 2021 ; Mazza et al, 2022 ).…”
Section: Challenges In Cib Identification (And Removal)mentioning
confidence: 99%
See 1 more Smart Citation
“…We may refer to online political astroturfing, that was defined as hidden information campaigns in which a political actor mimics genuine citizen behavior by incentivizing agents to spread information online (Schoch et al, 2022). An other relevant concept is trolling, the malicious behavior of trolls, fake accounts operated manually, behavior intended to disrupt interactions, annoy interaction partners, and draw them into a pointless arguments (Coles & West, 2016;Coles & West, 2016, as cited in Pamment et al, 2018Mazza, Cola & Tesconi, 2022). We have to mention, also, the activity of bots, computerized "actors" in the digital environment that, at least in part, mimic human behavior (Pamment et al, 2018).…”
Section: Introductionmentioning
confidence: 99%