<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i5e26933</article-id>
      <article-id pub-id-type="pmid">33882014</article-id>
      <article-id pub-id-type="doi">10.2196/26933</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Bots and Misinformation Spread on Social Media: Implications for COVID-19</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Kukafka</surname>
            <given-names>Rita</given-names>
          </name>
        </contrib>
        <contrib contrib-type="editor">
          <name>
            <surname>Basch</surname>
            <given-names>Corey</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Agarwal</surname>
            <given-names>Anish</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Yeung</surname>
            <given-names>Douglas</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Martinez-Martin</surname>
            <given-names>Nicole</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Himelein-Wachowiak</surname>
            <given-names>McKenzie</given-names>
          </name>
          <degrees>BA</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3291-343X</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Giorgi</surname>
            <given-names>Salvatore</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7381-6295</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Devoto</surname>
            <given-names>Amanda</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3605-5997</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Rahman</surname>
            <given-names>Muhammad</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3963-5949</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Ungar</surname>
            <given-names>Lyle</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2047-1443</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Schwartz</surname>
            <given-names>H Andrew</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6383-3339</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author">
          <name name-style="western">
            <surname>Epstein</surname>
            <given-names>David H</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8147-0386</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author">
          <name name-style="western">
            <surname>Leggio</surname>
            <given-names>Lorenzo</given-names>
          </name>
          <degrees>MD, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7284-8754</ext-link>
        </contrib>
        <contrib id="contrib9" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Curtis</surname>
            <given-names>Brenda</given-names>
          </name>
          <degrees>MSPH, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Intramural Research Program</institution>
            <institution>National Institute on Drug Abuse</institution>
            <addr-line>251 Bayview Blvd</addr-line>
            <addr-line>Suite 200</addr-line>
            <addr-line>Baltimore, MD, 21224</addr-line>
            <country>United States</country>
            <phone>1 443 740 2126</phone>
            <email>brenda.curtis@nih.gov</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2511-3322</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Intramural Research Program</institution>
        <institution>National Institute on Drug Abuse</institution>
        <addr-line>Baltimore, MD</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Computer and Information Science</institution>
        <institution>University of Pennsylvania</institution>
        <addr-line>Philadelphia, PA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Computer Science</institution>
        <institution>Stony Brook Unversity</institution>
        <addr-line>Stony Brook, NY</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Brenda Curtis <email>brenda.curtis@nih.gov</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>5</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>5</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>5</issue>
      <elocation-id>e26933</elocation-id>
      <history>
        <date date-type="received">
          <day>4</day>
          <month>1</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>16</day>
          <month>2</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>4</day>
          <month>3</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>16</day>
          <month>4</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©McKenzie Himelein-Wachowiak, Salvatore Giorgi, Amanda Devoto, Muhammad Rahman, Lyle Ungar, H Andrew Schwartz, David H Epstein, Lorenzo Leggio, Brenda Curtis. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 20.05.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/5/e26933" xlink:type="simple"/>
      <abstract>
        <p>As of March 2021, the SARS-CoV-2 virus has been responsible for over 115 million cases of COVID-19 worldwide, resulting in over 2.5 million deaths. As the virus spread exponentially, so did its media coverage, resulting in a proliferation of conflicting information on social media platforms—a so-called “infodemic.” In this viewpoint, we survey past literature investigating the role of automated accounts, or “bots,” in spreading such misinformation, drawing connections to the COVID-19 pandemic. We also review strategies used by bots to spread (mis)information and examine the potential origins of bots. We conclude by conducting and presenting a secondary analysis of data sets of known bots in which we find that up to 66% of bots are discussing COVID-19. The proliferation of COVID-19 (mis)information by bots, coupled with human susceptibility to believing and sharing misinformation, may well impact the course of the pandemic.</p>
      </abstract>
      <kwd-group>
        <kwd>COVID-19</kwd>
        <kwd>coronavirus</kwd>
        <kwd>social media</kwd>
        <kwd>bots</kwd>
        <kwd>infodemiology</kwd>
        <kwd>infoveillance</kwd>
        <kwd>social listening</kwd>
        <kwd>infodemic</kwd>
        <kwd>spambots</kwd>
        <kwd>misinformation</kwd>
        <kwd>disinformation</kwd>
        <kwd>fake news</kwd>
        <kwd>online communities</kwd>
        <kwd>Twitter</kwd>
        <kwd>public health</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Globally, 2020 has been characterized by COVID-19, the disease caused by the SARS-CoV-2 virus. As of March 2021, the COVID-19 pandemic has been responsible for over 115 million documented cases, resulting in over 2.5 million deaths. The United States accounts for 24.9% of the world’s COVID-19 cases, more than any other country [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
      <p>As the virus spread across the United States, media coverage and information from online sources grew along with it [<xref ref-type="bibr" rid="ref2">2</xref>]. Among Americans, 72% report using an online news source for COVID-19 information in the last week, with 47% reporting that the source was social media [<xref ref-type="bibr" rid="ref3">3</xref>]. The number of research articles focusing on COVID-19 has also grown exponentially; more research articles about the disease were published in the first 4 months of the COVID-19 pandemic than throughout the entirety of the severe acute respiratory syndrome (SARS) and Middle East respiratory syndrome (MERS) pandemics combined [<xref ref-type="bibr" rid="ref4">4</xref>]. Unfortunately, this breadth, and the speed with which information can travel, sets the stage for the rapid transmission of misinformation, conspiracy theories, and “fake news” about the pandemic [<xref ref-type="bibr" rid="ref5">5</xref>]. One study found that 33% of people in the United States report having seen “a lot” or “a great deal” of false or misleading information about the virus on social media [<xref ref-type="bibr" rid="ref3">3</xref>]. Dr Tedros Adhanom Ghebreyesus, the Director-General of the World Health Organization, referred to this accelerated flow of information about COVID-19, much of it inaccurate, as an “infodemic” [<xref ref-type="bibr" rid="ref6">6</xref>].</p>
      <p>Though the pandemic is ongoing, evidence is emerging regarding COVID-19 misinformation on social media. Rumors have spread about the origin of the virus, potential treatments or protections, and the severity and prevalence of the disease. In one sample of tweets related to COVID-19, 24.8% of tweets included misinformation and 17.4% included unverifiable information [<xref ref-type="bibr" rid="ref7">7</xref>]. The authors found no difference in engagement patterns with misinformation and verified information, suggesting that myths about the virus reach as many people on Twitter as truths. A similar study demonstrated that fully false claims about the virus propagated more rapidly and were more frequently liked than partially false claims. Tweets containing false claims also had less tentative language than valid claims [<xref ref-type="bibr" rid="ref8">8</xref>].</p>
      <p>This trend of misinformation emerging during times of humanitarian crises and propagating via social media platforms is not new. Previous research has documented the spread of misinformation, rumors, and conspiracies on social media in the aftermath of the 2010 Haiti earthquake [<xref ref-type="bibr" rid="ref9">9</xref>], the 2012 Sandy Hook Elementary School shooting [<xref ref-type="bibr" rid="ref10">10</xref>], Hurricane Sandy in 2012 [<xref ref-type="bibr" rid="ref11">11</xref>], the 2013 Boston Marathon bombings [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>], and the 2013 Ebola outbreak [<xref ref-type="bibr" rid="ref14">14</xref>].</p>
      <p>Misinformation can be spread directly by humans, as well as by automated online accounts, colloquially called “bots.” Social bots, which pose as real (human) users on platforms such as Twitter, use behaviors like excessive posting, early and frequent retweeting of emerging news, and tagging or mentioning influential figures in the hope they will spread the content to their thousands of followers [<xref ref-type="bibr" rid="ref15">15</xref>]. Bots have been found to disproportionately contribute to Twitter conversations on controversial political and public health matters, although there is less evidence they are biased toward one “side” of these issues [<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref18">18</xref>].</p>
      <p>This paper combines a scoping review with an unpublished secondary analysis, similar in style to Leggio et al [<xref ref-type="bibr" rid="ref19">19</xref>] and Zhu et al [<xref ref-type="bibr" rid="ref20">20</xref>]. We begin with a high-level survey of the current bot literature: how bots are defined, what technical features distinguish bots, and the detection of bots using machine learning methods. We also examine how bots spread information, including misinformation, and explore the potential consequences with respect to the COVID-19 pandemic. Finally, we analyze and present the extent to which known bots are publishing COVID-19–related content.</p>
    </sec>
    <sec>
      <title>What Are Bots?</title>
      <p>Before addressing issues surrounding the spread of misinformation, we provide a definition of bots, describe their typical features, and explain how detection algorithms identify bots.</p>
      <sec>
        <title>Definition and Identification</title>
        <p>Bots, shorthand for “software robots,” come in a large variety of forms. Bots are typically automated in some fashion, either fully automated or human-in-the-loop. There is a common conception that all bots spam or spread malware, but this is not the case. Some bots are benign, like the Twitter account @big_ben_clock, which impersonates the real Big Ben clock by tweeting the time every hour [<xref ref-type="bibr" rid="ref21">21</xref>]. Others have even been used for social good, such as Botivist, which is a Twitter bot platform used for recruiting volunteers and donations [<xref ref-type="bibr" rid="ref22">22</xref>]. Groups of bots can function in coordination with each other, forming what are called botnets [<xref ref-type="bibr" rid="ref23">23</xref>]. One botnet of roughly 13,000 bot accounts was observed tweeting about Brexit, with most of these bot accounts disappearing from Twitter shortly after the vote [<xref ref-type="bibr" rid="ref24">24</xref>]. Bots of all types are ubiquitous on social media and have been studied on Reddit [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>], Facebook [<xref ref-type="bibr" rid="ref27">27</xref>], YouTube [<xref ref-type="bibr" rid="ref28">28</xref>], and Twitter [<xref ref-type="bibr" rid="ref29">29</xref>], among other platforms.</p>
        <p>Given their large variety, bots are often organized into subclasses, a selection of which we discuss here. Content polluters are one subclass; these are “accounts that disseminate malware and unsolicited content.” Traditional spambots, another subclass, are “designed to be recognizable as bots” [<xref ref-type="bibr" rid="ref30">30</xref>]. Social bots—a newer, more advanced type of bot [<xref ref-type="bibr" rid="ref31">31</xref>-<xref ref-type="bibr" rid="ref33">33</xref>]—use “a computer algorithm that automatically produces content and interacts with humans on social media, trying to emulate and possibly alter their behavior.” There are also hybrid human-bot accounts (often called cyborgs) [<xref ref-type="bibr" rid="ref34">34</xref>], which “exhibit human-like behavior and messages through loosely structured, generic, automated messages and from borrowed content copied from other sources” [<xref ref-type="bibr" rid="ref35">35</xref>]. It is not always clear which category a bot may fall into (eg, if a given social bot is also a cyborg).</p>
        <p>Various methods have been used to identify bots “in the wild,” so as to build the data sets of known bots used to train bot-detection algorithms. One method, the “social honeypot” [<xref ref-type="bibr" rid="ref36">36</xref>], mimics methods traditionally used by researchers to monitor hacker activity [<xref ref-type="bibr" rid="ref37">37</xref>] and email harvesting [<xref ref-type="bibr" rid="ref38">38</xref>]. Specifically, social honeypots are fake social media profiles set up with characteristics desirable to spammers, such as certain demographics, relationship statuses, and profile pictures [<xref ref-type="bibr" rid="ref39">39</xref>]. When bots attempt to spam the honeypots (by linking malware-infested content or pushing product websites), researchers can easily identify them.</p>
      </sec>
      <sec>
        <title>Technical Features of Bots</title>
        <sec>
          <title>Overview</title>
          <p>Features that distinguish bots from humans roughly fall into three categories: (1) network properties, such as hashtags and friend/follower connections, (2) account activity and temporal patterns, and (3) profile and tweet content. These feature categories have the advantage of being applicable across different social media platforms [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
        </sec>
        <sec>
          <title>Network Properties</title>
          <p>Networks based on friend/follower connections, hashtag use, retweets, and mentions have been used in a number of studies that seek to identify social bots [<xref ref-type="bibr" rid="ref40">40</xref>-<xref ref-type="bibr" rid="ref43">43</xref>], exploiting network homophily (ie, humans tend to follow other humans and bots tend to follow other bots). As bots become more sophisticated, network properties become less indicative of them; studies have found groups of bots that were able to build social networks that mimic those of humans [<xref ref-type="bibr" rid="ref44">44</xref>].</p>
        </sec>
        <sec>
          <title>Account Activity and Temporal Patterns</title>
          <p>Patterns of content generation can be good markers of bots. Bots compose fewer original tweets than humans, but retweet others’ tweets much more frequently, and have a shorter time interval between tweets [<xref ref-type="bibr" rid="ref40">40</xref>]. Ferrara et al [<xref ref-type="bibr" rid="ref31">31</xref>] found that humans are retweeted by others more than are bots, suggesting that bots may struggle to compose convincing or interesting tweets. However, many others have found this not to be the case [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. Finally, humans typically modify their behavior during each online session; as the session progresses, the density of new tweets decreases. Bots do not engage in these “sessions” of social media usage, and accordingly do not modify their behavior [<xref ref-type="bibr" rid="ref45">45</xref>].</p>
        </sec>
        <sec>
          <title>Profile and Tweet Content</title>
          <p>Profile metadata such as account age and username can be used to identify social bots. Ferrara et al [<xref ref-type="bibr" rid="ref31">31</xref>] showed that bots have shorter account age (ie, the accounts were created more recently), as well as longer usernames. Automatic sentiment analysis of tweet content has also been studied as a means of distinguishing bots from humans. One study found humans expressed stronger positive sentiment than bots, and that humans more frequently “flip-flopped” in their sentiment [<xref ref-type="bibr" rid="ref42">42</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Detection of Bots</title>
        <p>Over the past decade, several teams have sought to develop algorithms that successfully identify bots online. Social media platforms use similar algorithms internally to remove accounts likely to be bots. These algorithms originated in early attempts to identify spam emails [<xref ref-type="bibr" rid="ref46">46</xref>], social phishing [<xref ref-type="bibr" rid="ref47">47</xref>], and other types of cybercrimes [<xref ref-type="bibr" rid="ref37">37</xref>]. With the advent of online communities, cybercriminals turned their attention to these sites, eventually creating fake, automated accounts at scale [<xref ref-type="bibr" rid="ref48">48</xref>]. <xref ref-type="table" rid="table1">Table 1</xref> provides a summary of several prominent papers on bot identification. We note that the details of specific machine learning algorithms are beyond the scope of this paper and therefore are not included in this manuscript.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Review of state-of-the-art detection of bots on Facebook and Twitter.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="20"/>
            <col width="190"/>
            <col width="100"/>
            <col width="150"/>
            <col width="40"/>
            <col width="40"/>
            <col width="40"/>
            <col width="0"/>
            <col width="160"/>
            <col width="0"/>
            <col width="110"/>
            <col width="0"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Type and reference</td>
                <td>Platform</td>
                <td>Number of accounts</td>
                <td colspan="4">Features</td>
                <td colspan="2">Model</td>
                <td colspan="2">Metric</td>
                <td>Predictive accuracy</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>N<sup>a</sup></td>
                <td>T<sup>b</sup></td>
                <td>C<sup>c</sup></td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="13">
                  <bold>Human judgment (manual annotation)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cresci et al (2017) [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Twitter</td>
                <td>928</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td colspan="2">Manual annotation</td>
                <td colspan="2">F1-score</td>
                <td colspan="2">0.57</td>
              </tr>
              <tr valign="top">
                <td colspan="13">
                  <bold>Automatic methods</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Ahmed and Abulaish (2013) [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>Facebook and Twitter</td>
                <td>320 (Facebook), 305 (Twitter)</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td colspan="2">Naïve Bayes, decision trees, rule learners</td>
                <td colspan="2">Detection rate</td>
                <td colspan="2">0.96 (Facebook), 0.99 (Twitter)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Dickerson et al (2014) [<xref ref-type="bibr" rid="ref42">42</xref>]</td>
                <td>Twitter</td>
                <td>897</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td colspan="2">Gradient boosting</td>
                <td colspan="2">Area under the curve</td>
                <td colspan="2">0.73</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cresci et al (2017) [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Twitter</td>
                <td>928</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td colspan="2">Digital DNA sequences</td>
                <td colspan="2">F1-score</td>
                <td colspan="2">0.92</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Varol et al (2017) [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
                <td>Twitter</td>
                <td>21,000</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td colspan="2">Random forests</td>
                <td colspan="2">Area under the curve</td>
                <td colspan="2">0.95</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kudugunta and Ferrara (2018) [<xref ref-type="bibr" rid="ref49">49</xref>]</td>
                <td>Twitter</td>
                <td>8386</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td colspan="2">AdaBoost</td>
                <td colspan="2">Area under the curve</td>
                <td colspan="2">&#62;0.99</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Mazza et al (2019) [<xref ref-type="bibr" rid="ref50">50</xref>]</td>
                <td>Twitter</td>
                <td>1000</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td colspan="2">Long short-term memory networks</td>
                <td colspan="2">F1-score</td>
                <td colspan="2">0.87</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Santia et al (2019) [<xref ref-type="bibr" rid="ref51">51</xref>]</td>
                <td>Facebook</td>
                <td>1000</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td colspan="2">Support vector machines, decision trees, Naïve Bayes</td>
                <td colspan="2">F1-score</td>
                <td colspan="2">0.72</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yang et al (2020) [<xref ref-type="bibr" rid="ref52">52</xref>]</td>
                <td>Twitter</td>
                <td>137,520</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td colspan="2">Random forests</td>
                <td colspan="2">Area under the curve</td>
                <td colspan="2">0.60-0.99</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>N: network properties.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>T: account activity and temporal patterns.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>C: profile and tweet content.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>The first reference in <xref ref-type="table" rid="table1">Table 1</xref> involved a manual annotation task in which raters were asked to label a Twitter account as human or bot. The fourth study listed in the table is the same as the first study; in this study, the same data set was evaluated by both human annotators and machine learning methods [<xref ref-type="bibr" rid="ref33">33</xref>]. There was a large discrepancy in predictive accuracy (F1-score) between the two methods: 0.57 for the human annotators versus 0.92 for the automated method. Stated another way, human participants correctly identified social bots less than 25% of the time, though they were quite good at identifying genuine (human) accounts (92%) and traditional spambots (91%). These results suggest that social bots have a very different online presence from traditional spambots, or “content polluters”—and that this presence is convincingly human. Even if the human annotators are compared to the lowest scoring automated method (which we note is in a different domain and, thus, not directly comparable), the machine learning algorithm still provides a considerable boost in F1-score (0.57 versus 0.72).</p>
        <p>There is no good way to compare all automated methods directly, as data sets are typically built in a single domain (ie, a single social media platform) and rapid advances in machine learning techniques prevent comparisons between models published even a few years apart. Furthermore, results suggest that models trained on highly curated bot data sets (eg, groups of accounts promoting certain hashtags or spamming a particular honeypot) may not perform well at detecting bots in other contexts. Yang et al [<xref ref-type="bibr" rid="ref52">52</xref>] used a large number of publicly available bot data sets, training machine learning models on each set and testing them on those remaining. The result was a wide range of predictive accuracies across different bot data sets.</p>
      </sec>
    </sec>
    <sec>
      <title>How Do Bots Amplify and Spread Misinformation?</title>
      <p>We adopt the definition of misinformation used by Treen and colleagues: “misleading [or false] information that is created and spread, regardless of intent to deceive” [<xref ref-type="bibr" rid="ref53">53</xref>]. For the purposes of this paper, we include fake news and false conspiracy theories under this umbrella term.</p>
      <p>Many features of bots likely enable them to be “super-spreaders” of misinformation. Bots have been shown to retweet articles within seconds of their first being posted, contributing to the articles going viral [<xref ref-type="bibr" rid="ref15">15</xref>]. Moreover, the authors of this study found that 33% of the top sharers of content from low-credibility sources were likely to be bots, significantly higher than the proportion of bots among top sharers of fact-checked content. Similarly, in a study of bots and “anti-vaxxer” tweets, Yuan et al [<xref ref-type="bibr" rid="ref18">18</xref>] found that bots were “hyper-social,” disproportionately contributing to content distribution. Bots also employ the strategy of mentioning influential users, such as @realDonaldTrump, in tweets linking to false or misleading articles, and are more likely to do so than their human counterparts [<xref ref-type="bibr" rid="ref15">15</xref>]. The hope is that these users will share the article with their many followers, contributing to its spread and boosting its credibility. “Verified” (blue check) Twitter users, often celebrities, have been shown to both author and propagate COVID-19–related misinformation [<xref ref-type="bibr" rid="ref54">54</xref>]. Interestingly, the frequency of false claims about the 2020 election dropped dramatically in the week after former president Donald Trump was removed from the platform [<xref ref-type="bibr" rid="ref55">55</xref>].</p>
      <p>In light of findings that humans are largely unable to distinguish social bots from genuine (human) accounts [<xref ref-type="bibr" rid="ref33">33</xref>], it is likely that humans unknowingly contribute to the spread of misinformation as well. Accordingly, one study found that in regard to low-credibility content, humans retweet bots and other humans at the same rate [<xref ref-type="bibr" rid="ref15">15</xref>]. Similarly, Vosoughi et al [<xref ref-type="bibr" rid="ref56">56</xref>] found that “fake news” articles spread faster on Twitter than true news articles because humans, not bots, were more likely to retweet fake articles. Given human susceptibility to both automated accounts and “fake news,” some have warned that intelligent social bots could be leveraged for mass deception or even “political overthrow” [<xref ref-type="bibr" rid="ref57">57</xref>].</p>
      <p>There is reason to believe that bots have already infiltrated political conversations online. Leading up to the 2016 presidential election in the United States, 20% of all political tweets originated from accounts that were likely to be bots [<xref ref-type="bibr" rid="ref16">16</xref>]. While it did not specifically implicate bots, one study found that a majority of “fake” or extremely biased news articles relating to the 2016 election were shared by unverified accounts—that is, accounts that were not confirmed to be human [<xref ref-type="bibr" rid="ref58">58</xref>]. There is also evidence that bots spread misinformation in the 2017 French presidential election, though ultimately the bot campaign was unsuccessful, in part because the human users who engaged with the bots were mostly foreigners with no say in the election outcome [<xref ref-type="bibr" rid="ref59">59</xref>]. Bot strategies specifically relevant to political campaigns include “hashtag hijacking,” in which bots adopt an opponent’s hashtags in order to spam or otherwise undermine them, as well as flagging their opponent’s legitimate content in the hopes it gets removed from the platform [<xref ref-type="bibr" rid="ref60">60</xref>].</p>
    </sec>
    <sec>
      <title>Where Do Bots Come From?</title>
      <p>The origin of social bots is a challenging question to answer. Given the aforementioned concerns of political disruption by social bots, one may assume that foreign actors create social bots to interfere with political processes. Indeed, the Mueller report found evidence of Russian interference in the 2016 US election via social media platforms [<xref ref-type="bibr" rid="ref61">61</xref>], and Twitter reports removing over 50,000 automated accounts with connections to Russia [<xref ref-type="bibr" rid="ref62">62</xref>]. However, locating the origin of a social media account is difficult, as tweets from these accounts are rarely geotagged. Rheault and Musulan [<xref ref-type="bibr" rid="ref63">63</xref>] proposed a methodology to identify clusters of foreign bots used during the 2019 Canadian election using uniform manifold approximation and projection combined with user-level document embeddings. Simply put, the authors constructed communities of users via linguistic similarities, and identified members significantly outside these communities as foreign bots.</p>
      <p>Of note, studies have shown that a majority of social bots focusing on election-related content originate domestically [<xref ref-type="bibr" rid="ref63">63</xref>]. Reasons for a candidate or their supporters to employ social bots may be relatively benign, such as boosting follower counts or sharing news stories, or they may involve smear campaigns [<xref ref-type="bibr" rid="ref64">64</xref>].</p>
      <p>While the ability to investigate the origin and motive of social bots is difficult, the means to create a social bot are fairly easy to access. Social bots are available for purchase on the dark web, and there are tens of thousands of codes for building social bots on free repositories like GitHub [<xref ref-type="bibr" rid="ref65">65</xref>]. Of note, the top contributors of bot-development tools for mainstream social media sites are the United States, the United Kingdom, and Japan. The authors of this paper also note the intelligence and capabilities of these freely available bots may be overstated.</p>
    </sec>
    <sec>
      <title>Are Bots Tweeting About COVID-19?</title>
      <p>In light of the COVID-19 “infodemic” and findings that social bots have contributed to misinformation spread in critical times, we sought to assess the number of known Twitter bots producing COVID-19–related content. To this end, we gathered a number of publicly available bot data sets from the Bot Repository [<xref ref-type="bibr" rid="ref66">66</xref>]. These data sets include both traditional spambots and social bots that were first identified through a number of different methods (see the original papers for more details).</p>
      <p>Using the open-source Python package TwitterMySQL [<xref ref-type="bibr" rid="ref67">67</xref>], which interfaces with the Twitter application programming interface (API), we were able to pull all tweets from 2020 for each bot in the combined data set. Of note, Twitter’s API limits access to tweets and account information available at the time of collection. Tweets and accounts that have been deleted or made private since originally appearing in one of the above papers are not made available, meaning we had less data than what was reported in the original papers. Our final data set consisted of 3.03 million tweets from 3953 bots, with an average of 768.9 (SD 1145.4) tweets per bot, spanning January 1, 2020, to August 21, 2020.</p>
      <p>From these data, we pulled tweets using a set of 15 COVID-19–related keywords, which have previously been used to identify COVID-19 tweets in a study tracking mental health and psychiatric symptoms over time [<xref ref-type="bibr" rid="ref68">68</xref>]. Sample keywords include #coronavirus, #covid19, and #socialdistancing. We then counted the number of accounts that mentioned these keywords in tweets since January 2020. <xref ref-type="table" rid="table2">Table 2</xref> shows the percentage of bot accounts in each data set currently tweeting about COVID-19. Original sample size refers to the number of bots identified in this data set, while current sample size is the number of currently active bots (ie, tweeting in 2020). Between 53% (96/182) and 66% (515/780) of these bots are actively tweeting about COVID-19.</p>
      <table-wrap position="float" id="table2">
        <label>Table 2</label>
        <caption>
          <p>Open-source data sets of bots discussing COVID-19<sup>a</sup>.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="180"/>
          <col width="90"/>
          <col width="190"/>
          <col width="190"/>
          <col width="350"/>
          <thead>
            <tr valign="top">
              <td>Reference</td>
              <td>Year</td>
              <td>Original sample size, n</td>
              <td>Current sample size, n</td>
              <td>Bots discussing COVID-19, n (%)</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>Lee et al [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
              <td>2011</td>
              <td>22,223</td>
              <td>2623</td>
              <td>1427 (54)</td>
            </tr>
            <tr valign="top">
              <td>Varol et al [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
              <td>2017</td>
              <td>826</td>
              <td>292</td>
              <td>164 (56)</td>
            </tr>
            <tr valign="top">
              <td>Gilani et al [<xref ref-type="bibr" rid="ref69">69</xref>]</td>
              <td>2017</td>
              <td>1130</td>
              <td>780</td>
              <td>515 (66)</td>
            </tr>
            <tr valign="top">
              <td>Cresci et al [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
              <td>2017</td>
              <td>4912</td>
              <td>77</td>
              <td>48 (62)</td>
            </tr>
            <tr valign="top">
              <td>Mazza et al [<xref ref-type="bibr" rid="ref50">50</xref>]</td>
              <td>2019</td>
              <td>391</td>
              <td>182</td>
              <td>96 (53)</td>
            </tr>
          </tbody>
        </table>
        <table-wrap-foot>
          <fn id="table2fn1">
            <p><sup>a</sup>Original sample size is the number of bot IDs publicly released on the Bot Repository, while current sample size is the number of active accounts tweeting in 2020. Percentage discussing COVID-19 is the percentage of bots with at least one tweet containing a COVID-19 keyword out of those active in 2020.</p>
          </fn>
        </table-wrap-foot>
      </table-wrap>
    </sec>
    <sec>
      <title>Implications for the COVID-19 Pandemic</title>
      <p>Here we have shown that a majority of known bots are tweeting about COVID-19, a finding that corroborates similar studies [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. Early in the pandemic, one study found that 45% of COVID-19–related tweets originate from bots [<xref ref-type="bibr" rid="ref71">71</xref>], although Twitter has pushed back on this claim, citing false-positive detection algorithms [<xref ref-type="bibr" rid="ref72">72</xref>]. Another study showed that COVID-19 misinformation on Twitter was more likely to come from unverified accounts—that is, accounts not confirmed to be human [<xref ref-type="bibr" rid="ref7">7</xref>]. In an analysis of 43 million COVID-19–related tweets, bots were found to be pushing a number of conspiracy theories, such as QAnon, in addition to retweeting links from partisan news sites [<xref ref-type="bibr" rid="ref73">73</xref>]. Headlines from these links often suggested that the virus was made in Wuhan laboratories or was a biological weapon.</p>
      <p>One limitation of our study is that we did not investigate the validity of COVID-19–related claims endorsed by bots in our analyses. It may be that bots are largely retweeting mainstream news sources, as was the case in a recent study of bots using #COVID19 or #COVID-19 hashtags [<xref ref-type="bibr" rid="ref68">68</xref>]. However, previous research has connected bots to the spread of misinformation in other public health domains, such as vaccines [<xref ref-type="bibr" rid="ref30">30</xref>] and e-cigarettes [<xref ref-type="bibr" rid="ref74">74</xref>], and unsubstantiated medical claims surrounding the use of marijuana [<xref ref-type="bibr" rid="ref75">75</xref>].</p>
      <p>Such misinformation can have detrimental consequences for the course of the COVID-19 pandemic. Examples of these real-world consequences include shortages of hydroxychloroquine (a drug that is crucial for treating lupus and malaria) due to increased demand from people who believe it will protect them from COVID-19 [<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. This drug has been promoted as a preventative against COVID-19 on social media, even though several randomized controlled trials have found it ineffective, [<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref79">79</xref>], and the National Institutes of Health recently halted its own trial due to lack of effectiveness [<xref ref-type="bibr" rid="ref80">80</xref>]. Moreover, belief in conspiracy theories about COVID-19 is associated with a decreased likelihood of engaging in protective measures such as frequent handwashing and social distancing, suggesting that misinformation may even contribute to the severity of the pandemic [<xref ref-type="bibr" rid="ref81">81</xref>]. In addition, exposure to misinformation has been negatively correlated with intention to take a COVID-19 vaccine [<xref ref-type="bibr" rid="ref82">82</xref>].</p>
      <p>We are certainly not the first to express concern with viral misinformation; in May 2020, Twitter began labeling fake or misleading news related to COVID-19 in an effort to ensure the integrity of information shared on the platform [<xref ref-type="bibr" rid="ref83">83</xref>]. Facebook introduced even more controls, such as organizing the most vetted articles at the top of the news feed, banning antimask groups, and sending antimisinformation messages to users who have shared fake news [<xref ref-type="bibr" rid="ref84">84</xref>]. However, these measures are designed to target humans. In light of the numerous viral rumors relating to COVID-19 and the US response to the pandemic, we believe that bots likely contributed to their spread.</p>
      <p>Major social media platforms like Twitter and Facebook do have methods to curtail suspected bots. In 2018, Twitter banned close to 70 million suspicious accounts in a matter of months [<xref ref-type="bibr" rid="ref85">85</xref>]. Facebook banned 1.3 billion suspicious accounts in the third quarter of 2020. The platform estimates these accounts represent 5% of its worldwide monthly active users. The vast majority of suspicious accounts were identified using automated detection methods, but 0.7% were first flagged by human users, suggesting that everyday Facebook users concerned about malicious activity on the platform can contribute to efforts to ban these accounts [<xref ref-type="bibr" rid="ref86">86</xref>].</p>
      <p>Mitigation of the harmful effects of social bots can also occur at the policy level. In 2018, California became the first and only state to pass a law requiring social bots to identify themselves as such [<xref ref-type="bibr" rid="ref87">87</xref>]. In 2019, Senator Dianne Feinstein proposed a similar bill federally; the bill would allow the Federal Trade Commission to enforce bot transparency and would prohibit political candidates from incorporating social bots in their campaign strategy [<xref ref-type="bibr" rid="ref88">88</xref>]. The United States Congress has brought top executives from Facebook, Twitter, and Google to testify before Congress about Russian influence on their platforms in advance of the 2016 election [<xref ref-type="bibr" rid="ref89">89</xref>]. Scholars have interpreted these actions as a sign that the government wishes to maintain the right to regulate content on social media—a prospect that brings concerns of its own [<xref ref-type="bibr" rid="ref90">90</xref>]. Presently, content problems on social media platforms are almost exclusively dealt with by the owners of those platforms, usually in response to user complaints, but in the coming years we may see an increase in government oversight on these platforms, fueling concerns about state-sponsored censorship [<xref ref-type="bibr" rid="ref91">91</xref>,<xref ref-type="bibr" rid="ref92">92</xref>]. More fundamentally, some have argued that, before any actionable policy or automatic interventions can be enabled, ambiguities in both bot definitions and jurisdiction and authority need to be addressed [<xref ref-type="bibr" rid="ref90">90</xref>].</p>
      <p>Even as citizens, social media platforms, and policy makers converge on the notion that bots and misinformation are urgent problems, the methods used to address the issue have had mixed results. When social media platforms crack down on bots and misinformation, either through automated techniques or manual content moderation, they run the risk of censoring online speech and further disenfranchising minority populations. Content promotion and moderation can lead to arbitrary policy decisions that may be inconsistent across or even within platforms [<xref ref-type="bibr" rid="ref93">93</xref>]. In one example, Facebook ignited a controversy when their moderators flagged a breastfeeding photo as obscene, leading to a large number of protests on both sides of the debate [<xref ref-type="bibr" rid="ref94">94</xref>]. Automated methods suffer from similar drawbacks, with multiple studies showing that biases in machine learning models can have unintended downstream consequences [<xref ref-type="bibr" rid="ref95">95</xref>]. For example, algorithms designed to detect hate speech were more likely to label a post as “toxic” when it showed markers of African American English [<xref ref-type="bibr" rid="ref96">96</xref>].</p>
      <p>Finally, there is a continued arms race between bot-detection algorithms and bot creators [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. As bots inevitably become more intelligent and convincingly human, the means for identifying them will have to become more precise. We observed that the majority of known bots in a sample of publicly available data sets are now tweeting about COVID-19. These bots, identified between 2011 and 2019, were discovered before the pandemic and were originally designed for non–COVID-19 purposes: promoting product hashtags, retweeting political candidates, and spreading links to malicious content. The COVID-19 pandemic will eventually end, but we have reason to believe social bots, perhaps even the same accounts, will latch on to future global issues. Additionally, we can expect bot generation techniques to advance, especially as deep learning methods continue to improve on tasks such as text or image generation [<xref ref-type="bibr" rid="ref97">97</xref>,<xref ref-type="bibr" rid="ref98">98</xref>]. Bot creators will continue to deploy such techniques, possibly fooling detection algorithms and humans alike. In the end, we should not expect current detection techniques, self-policing of social media platforms, or public officials alone to fully recognize, or adequately address, the current landscape of bots and misinformation.</p>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">API</term>
          <def>
            <p>application programming interface</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported in part by the Intramural Research Program of the National Institutes of Health, National Institute on Drug Abuse. MHW wrote the manuscript, with help from SG and AD. SG conceptualized the paper, with input from BC, HAS, and LU. SG performed the analyses on Twitter bots and created <xref ref-type="table" rid="table1">Tables 1</xref> and <xref ref-type="table" rid="table2">2</xref>. MHW, SG, AD, and MR all contributed to the literature review. LL and DHE provided crucial edits. All authors reviewed and approved the final version of the manuscript.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Coronavirus Resource Center</collab>
          </person-group>
          <source>COVID-19 Dashboard by the Center for Systems Science and Engineering (CSSE) at Johns Hopkins University (JHU)</source>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://coronavirus.jhu.edu/map.html">https://coronavirus.jhu.edu/map.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gozzi</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Tizzani</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Starnini</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ciulla</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Paolotti</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Panisson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Perra</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Collective Response to Media Coverage of the COVID-19 Pandemic on Reddit and Wikipedia: Mixed-Methods Analysis</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>10</month>
          <day>12</day>
          <volume>22</volume>
          <issue>10</issue>
          <fpage>e21597</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/10/e21597/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/21597</pub-id>
          <pub-id pub-id-type="medline">32960775</pub-id>
          <pub-id pub-id-type="pii">v22i10e21597</pub-id>
          <pub-id pub-id-type="pmcid">PMC7553788</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nielsen</surname>
              <given-names>RK</given-names>
            </name>
            <name name-style="western">
              <surname>Fletcher</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Newman</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Brennen</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Howard</surname>
              <given-names>PN</given-names>
            </name>
          </person-group>
          <source>Navigating the 'infodemic': How people in six countries access and rate news and information about coronavirus</source>
          <year>2020</year>
          <month>04</month>
          <access-date>2021-05-09</access-date>
          <publisher-name>Reuters Institute</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.fundacionindex.com/fi/wp-content/uploads/2020/04/Navigating-the-Coronavirus-Infodemic-FINAL.pdf">http://www.fundacionindex.com/fi/wp-content/uploads/2020/04/Navigating-the-Coronavirus-Infodemic-FINAL.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Valika</surname>
              <given-names>TS</given-names>
            </name>
            <name name-style="western">
              <surname>Maurrasse</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Reichert</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A Second Pandemic? Perspective on Information Overload in the COVID-19 Era</article-title>
          <source>Otolaryngol Head Neck Surg</source>
          <year>2020</year>
          <month>11</month>
          <volume>163</volume>
          <issue>5</issue>
          <fpage>931</fpage>
          <lpage>933</lpage>
          <pub-id pub-id-type="doi">10.1177/0194599820935850</pub-id>
          <pub-id pub-id-type="medline">32513072</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ball</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Maxmen</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The Epic Battle Against Coronavirus Misinformation and Conspiracy Theories</article-title>
          <source>Nature</source>
          <year>2020</year>
          <month>05</month>
          <volume>581</volume>
          <issue>7809</issue>
          <fpage>371</fpage>
          <lpage>374</lpage>
          <pub-id pub-id-type="doi">10.1038/d41586-020-01452-z</pub-id>
          <pub-id pub-id-type="medline">32461658</pub-id>
          <pub-id pub-id-type="pii">10.1038/d41586-020-01452-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tangcharoensathien</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Calleja</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Purnat</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>D'Agostino</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Garcia Saiso</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Landry</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rashidian</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hamilton</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>AbdAllah</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ghiga</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Hill</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hougendobler</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Van Andel</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nunn</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Brooks</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Sacco</surname>
              <given-names>PL</given-names>
            </name>
            <name name-style="western">
              <surname>De Domenico</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mai</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gruzd</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Alaphilippe</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Briand</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Framework for Managing the COVID-19 Infodemic: Methods and Results of an Online, Crowdsourced WHO Technical Consultation</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>06</month>
          <day>26</day>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>e19659</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.2196/19659"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/19659</pub-id>
          <pub-id pub-id-type="medline">32558655</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kouzy</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Abi Jaoude</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kraitem</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>El Alam</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Karam</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Adib</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zarka</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Traboulsi</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EW</given-names>
            </name>
            <name name-style="western">
              <surname>Baddour</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Coronavirus Goes Viral: Quantifying the COVID-19 Misinformation Epidemic on Twitter</article-title>
          <source>Cureus</source>
          <year>2020</year>
          <month>03</month>
          <day>13</day>
          <volume>12</volume>
          <issue>3</issue>
          <fpage>e7255</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32292669"/>
          </comment>
          <pub-id pub-id-type="doi">10.7759/cureus.7255</pub-id>
          <pub-id pub-id-type="medline">32292669</pub-id>
          <pub-id pub-id-type="pmcid">PMC7152572</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shahi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Dirkson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Majchrzak</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>An exploratory study of COVID-19 misinformation on Twitter</article-title>
          <source>Online Soc Netw Media</source>
          <year>2021</year>
          <month>03</month>
          <volume>22</volume>
          <fpage>100104</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33623836"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.osnem.2020.100104</pub-id>
          <pub-id pub-id-type="medline">33623836</pub-id>
          <pub-id pub-id-type="pii">S2468-6964(20)30045-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7893249</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oh</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Kwon</surname>
              <given-names>KH</given-names>
            </name>
            <name name-style="western">
              <surname>Rao</surname>
              <given-names>HR</given-names>
            </name>
          </person-group>
          <article-title>An exploration of social media in extreme events: Rumor theory and Twitter during the Haiti earthquake 2010</article-title>
          <year>2010</year>
          <conf-name>International Conference on Information Systems 2020</conf-name>
          <conf-date>2010</conf-date>
          <conf-loc>St. Louis, MO</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aisel.aisnet.org/icis2010_submissions/231"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williamson</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>How Alex Jones and Infowars helped a Florida man torment Sandy Hook families</article-title>
          <source>The New York Times</source>
          <year>2019</year>
          <month>03</month>
          <day>29</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2019/03/29/us/politics/alex-jones-infowars-sandy-hook.html">https://www.nytimes.com/2019/03/29/us/politics/alex-jones-infowars-sandy-hook.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Zhuang</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters</article-title>
          <source>Nat Hazards</source>
          <year>2018</year>
          <month>5</month>
          <day>11</day>
          <volume>93</volume>
          <issue>3</issue>
          <fpage>1145</fpage>
          <lpage>1162</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/s11069-018-3344-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11069-018-3344-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lamba</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kumaraguru</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter</article-title>
          <year>2013</year>
          <conf-name>2013 APWG eCrime Researchers Summit</conf-name>
          <conf-date>September 17-18, 2013</conf-date>
          <conf-loc>San Francisco, CA</conf-loc>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/eCRS.2013.6805772"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/ecrs.2013.6805772</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Starbird</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Maddock</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Orand</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Achterman</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mason</surname>
              <given-names>RM</given-names>
            </name>
          </person-group>
          <article-title>Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing</article-title>
          <source>iConference 2014 Proceedings</source>
          <year>2014</year>
          <conf-name>iConference 2014</conf-name>
          <conf-date>March 4-7, 2014</conf-date>
          <conf-loc>Berlin, Germany</conf-loc>
          <fpage>654</fpage>
          <lpage>662</lpage>
          <pub-id pub-id-type="doi">10.9776/14308</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Dougherty</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ramakrishnan</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Misinformation Propagation in the Age of Twitter</article-title>
          <source>IEEE Annals of the History of Computing</source>
          <year>2014</year>
          <month>12</month>
          <volume>47</volume>
          <issue>12</issue>
          <fpage>90</fpage>
          <lpage>94</lpage>
          <pub-id pub-id-type="doi">10.1109/MC.2014.361</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shao</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ciampaglia</surname>
              <given-names>GL</given-names>
            </name>
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Flammini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The spread of low-credibility content by social bots</article-title>
          <source>Nat Commun</source>
          <year>2018</year>
          <month>11</month>
          <day>20</day>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>4787</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41467-018-06930-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41467-018-06930-7</pub-id>
          <pub-id pub-id-type="medline">30459415</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41467-018-06930-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC6246561</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bessi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Social bots distort the 2016 U.S. Presidential election online discussion</article-title>
          <source>First Monday</source>
          <year>2016</year>
          <month>11</month>
          <day>03</day>
          <volume>21</volume>
          <issue>11</issue>
          <fpage>1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://firstmonday.org/ojs/index.php/fm/article/download/7090/5653"/>
          </comment>
          <pub-id pub-id-type="doi">10.5210/fm.v21i11.7090</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Badawy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lerman</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Analyzing the digital traces of political manipulation: The 2016 Russian interference Twitter campaign</article-title>
          <year>2018</year>
          <conf-name>IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</conf-name>
          <conf-date>August 28-31, 2018</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <fpage>258</fpage>
          <lpage>265</lpage>
          <pub-id pub-id-type="doi">10.1109/asonam.2018.8508646</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Schuchard</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Crooks</surname>
              <given-names>AT</given-names>
            </name>
          </person-group>
          <article-title>Examining Emergent Communities and Social Bots Within the Polarized Online Vaccination Debate in Twitter</article-title>
          <source>Social Media + Society</source>
          <year>2019</year>
          <month>09</month>
          <day>04</day>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>205630511986546</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1177%2F2056305119865465"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2056305119865465</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leggio</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Garbutt</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Addolorato</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Effectiveness and safety of baclofen in the treatment of alcohol dependent patients</article-title>
          <source>CNS Neurol Disord Drug Targets</source>
          <year>2010</year>
          <month>03</month>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>33</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.2174/187152710790966614</pub-id>
          <pub-id pub-id-type="medline">20201813</pub-id>
          <pub-id pub-id-type="pii">BSP/CDTCNSND/E-Pub/00010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Guntuku</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Ghinea</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Redi</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>Measuring Individual Video QoE: A survey, and proposal for future directions using social media</article-title>
          <source>ACM Trans Multimedia Comput Commun Appl</source>
          <year>2018</year>
          <month>05</month>
          <day>22</day>
          <volume>14</volume>
          <issue>2s</issue>
          <fpage>1</fpage>
          <lpage>24</lpage>
          <pub-id pub-id-type="doi">10.1145/3183512</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>KC</given-names>
            </name>
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Flammini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Arming the public with artificial intelligence to counter social bots</article-title>
          <source>Hum Behav &#38; Emerg Tech</source>
          <year>2019</year>
          <month>02</month>
          <day>06</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>48</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1002/hbe2.115</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Savage</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Monroy-Hernandez</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hollerer</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Botivist: Calling volunteers to action using online bots</article-title>
          <year>2016</year>
          <conf-name>16th ACM Conference on Computer-Supported Cooperative Work &#38; Social Computing</conf-name>
          <conf-date>February 27-March 2, 2016</conf-date>
          <conf-loc>San Francisco, CA</conf-loc>
          <fpage>813</fpage>
          <lpage>822</lpage>
          <pub-id pub-id-type="doi">10.1145/2818048.2819985</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abokhodair</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Yoo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>McDonald</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>Dissecting a Social Botnet: Growth, Content and Influence in Twitter</article-title>
          <year>2015</year>
          <conf-name>18th ACM Conference on Computer-Supported Cooperative Work &#38; Social Computing</conf-name>
          <conf-date>March 14-18, 2015</conf-date>
          <conf-loc>Vancouver, Canada</conf-loc>
          <fpage>839</fpage>
          <lpage>851</lpage>
          <pub-id pub-id-type="doi">10.1145/2675133.2675208</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bastos</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Mercea</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The Brexit Botnet and User-Generated Hyperpartisan News</article-title>
          <source>Social Science Computer Review</source>
          <year>2017</year>
          <month>10</month>
          <day>10</day>
          <volume>37</volume>
          <issue>1</issue>
          <fpage>38</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1177/0894439317734157</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jhaver</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bruckman</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gilbert</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Does Transparency in Moderation Really Matter?: User Behavior After Content Removal Explanations on Reddit</article-title>
          <source>Proceedings of the ACM on Human-Computer Interaction</source>
          <year>2019</year>
          <volume>3</volume>
          <issue>CSCW</issue>
          <fpage>1</fpage>
          <lpage>27</lpage>
          <pub-id pub-id-type="doi">10.1145/3359252</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Lalor</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>An Empirical Analysis of Human-Bot Interaction on Reddit</article-title>
          <year>2020</year>
          <conf-name>Sixth Workshop on Noisy User-generated Text (W-NUT 2020)</conf-name>
          <conf-date>November 2020</conf-date>
          <conf-loc>Virtual</conf-loc>
          <publisher-name>Association for Computational Linguistics</publisher-name>
          <fpage>101</fpage>
          <lpage>106</lpage>
          <pub-id pub-id-type="doi">10.18653/v1/2020.wnut-1.14</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Abulaish</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A generic statistical approach for spam detection in Online Social Networks</article-title>
          <source>Computer Communications</source>
          <year>2013</year>
          <month>6</month>
          <volume>36</volume>
          <issue>10-11</issue>
          <fpage>1120</fpage>
          <lpage>1129</lpage>
          <pub-id pub-id-type="doi">10.1016/j.comcom.2013.04.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hussain</surname>
              <given-names>MN</given-names>
            </name>
            <name name-style="western">
              <surname>Tokdemir</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Khateeb</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Analyzing disinformation and crowd manipulation tactics on YouTube</article-title>
          <year>2018</year>
          <conf-name>IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</conf-name>
          <conf-date>August 28-31, 2018</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>1092</fpage>
          <lpage>1095</lpage>
          <pub-id pub-id-type="doi">10.1109/asonam.2018.8508766</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Subrahmanian</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Azaria</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Durst</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kagan</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Galstyan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lerman</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Flammini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The DARPA Twitter Bot Challenge</article-title>
          <source>Computer</source>
          <year>2016</year>
          <month>6</month>
          <volume>49</volume>
          <issue>6</issue>
          <fpage>38</fpage>
          <lpage>46</lpage>
          <pub-id pub-id-type="doi">10.1109/MC.2016.183</pub-id>
          <pub-id pub-id-type="medline">27295638</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Broniatowski</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Jamison</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Qi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>AlKulaib</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Benton</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Quinn</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Dredze</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate</article-title>
          <source>Am J Public Health</source>
          <year>2018</year>
          <month>10</month>
          <volume>108</volume>
          <issue>10</issue>
          <fpage>1378</fpage>
          <lpage>1384</lpage>
          <pub-id pub-id-type="doi">10.2105/AJPH.2018.304567</pub-id>
          <pub-id pub-id-type="medline">30138075</pub-id>
          <pub-id pub-id-type="pmcid">PMC6137759</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Flammini</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The rise of social bots</article-title>
          <source>Commun ACM</source>
          <year>2016</year>
          <month>06</month>
          <day>24</day>
          <volume>59</volume>
          <issue>7</issue>
          <fpage>96</fpage>
          <lpage>104</lpage>
          <pub-id pub-id-type="doi">10.1145/2818717</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>The Rise of Social Botnets: Attacks and Countermeasures</article-title>
          <source>IEEE Trans Dependable and Secure Comput</source>
          <year>2018</year>
          <month>11</month>
          <day>1</day>
          <volume>15</volume>
          <issue>6</issue>
          <fpage>1068</fpage>
          <lpage>1082</lpage>
          <pub-id pub-id-type="doi">10.1109/tdsc.2016.2641441</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cresci</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Di Pietro</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Petrocchi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Spognardi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tesconi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race</article-title>
          <year>2017</year>
          <conf-name>The 26th International Conference on World Wide Web Companion</conf-name>
          <conf-date>April 3-7, 2017</conf-date>
          <conf-loc>Perth, Australia</conf-loc>
          <fpage>963</fpage>
          <lpage>972</lpage>
          <pub-id pub-id-type="doi">10.1145/3041021.3055135</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Gianvecchio</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Jajodia</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?</article-title>
          <source>IEEE Trans Dependable and Secure Comput</source>
          <year>2012</year>
          <month>11</month>
          <volume>9</volume>
          <issue>6</issue>
          <fpage>811</fpage>
          <lpage>824</lpage>
          <pub-id pub-id-type="doi">10.1109/Tdsc.2012.75</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Clark</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Galbraith</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Danforth</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Dodds</surname>
              <given-names>PS</given-names>
            </name>
          </person-group>
          <article-title>Sifting robotic from organic text: A natural language approach for detecting automation on Twitter</article-title>
          <source>Journal of Computational Science</source>
          <year>2016</year>
          <month>09</month>
          <volume>16</volume>
          <fpage>1</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.jocs.2015.11.002"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jocs.2015.11.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Eoff</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Caverlee</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Seven months with the devils: A long-term study of content polluters on Twitter</article-title>
          <year>2011</year>
          <conf-name>Fifth International AAAI Conference on Weblogs and Social Media (ICWSM)</conf-name>
          <conf-date>July 17-21, 2011</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/viewFile/2780/3296"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Spitzner</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>The Honeynet Project: Trapping the hackers</article-title>
          <source>IEEE Secur Privacy</source>
          <year>2003</year>
          <month>3</month>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>15</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1109/msecp.2003.1193207</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Prince</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Dahl</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Holloway</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Keller</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Langheinrich</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Understanding how spammers steal your email address: An analysis of the first six months of data from Project Honey Pot</article-title>
          <year>2005</year>
          <conf-name>Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS)</conf-name>
          <conf-date>July 21-22, 2005</conf-date>
          <conf-loc>Stanford, CA</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cse.scu.edu/~tschwarz/coen252_07/Resources/spammer.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Webb</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Caverlee</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Pu</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Social honeypots: Making friends with a spammer near you</article-title>
          <year>2008</year>
          <conf-name>Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS)</conf-name>
          <conf-date>August 21-22, 2008</conf-date>
          <conf-loc>Mountain View, CA</conf-loc>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://people.engr.tamu.edu/caverlee/pubs/webb08socialhoneypots.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Flammini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Botornot: A system to evaluate social bots</article-title>
          <year>2016</year>
          <conf-name>25th International Conference Companion on World Wide Web</conf-name>
          <conf-date>April 11-15, 2016</conf-date>
          <conf-loc>Montreal, Canada</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2872518.2889302</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Flammini</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Online human-bot interactions: Detection, estimation, and characterization</article-title>
          <year>2017</year>
          <conf-name>International AAAI Conference on Web and Social Media</conf-name>
          <conf-date>May 15-18, 2017</conf-date>
          <conf-loc>Montreal, Canada</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1703.03107"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dickerson</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Kagan</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Subrahmanian</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Using sentiment to detect bots on twitter: Are humans more opinionated than bots?</article-title>
          <year>2014</year>
          <conf-name>IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</conf-name>
          <conf-date>Aug 17-20, 2014</conf-date>
          <conf-loc>Beijing, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/asonam.2014.6921650</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stephens</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Poorthuis</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Follow thy neighbor: Connecting the social and the spatial networks on Twitter</article-title>
          <source>Computers, Environment and Urban Systems</source>
          <year>2015</year>
          <month>09</month>
          <volume>53</volume>
          <fpage>87</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compenvurbsys.2014.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>BY</given-names>
            </name>
            <name name-style="western">
              <surname>Dai</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Uncovering social network Sybils in the wild</article-title>
          <source>ACM Trans Knowl Discov Data</source>
          <year>2014</year>
          <month>02</month>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1145/2556609</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pozzana</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Measuring Bot and Human Behavioral Dynamics</article-title>
          <source>Front Phys</source>
          <year>2020</year>
          <month>4</month>
          <day>22</day>
          <volume>8</volume>
          <fpage>125</fpage>
          <pub-id pub-id-type="doi">10.3389/fphy.2020.00125</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sahami</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dumais</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Heckerman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Horvitz</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>A Bayesian approach to filtering junk email</article-title>
          <source>Learning for Text Categorization: Papers from the AAAI workshop</source>
          <year>1998</year>
          <access-date>2021-05-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.aaai.org/Papers/Workshops/1998/WS-98-05/WS98-05-009.pdf">https://www.aaai.org/Papers/Workshops/1998/WS-98-05/WS98-05-009.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jagatic</surname>
              <given-names>TN</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Jakobsson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Social phishing</article-title>
          <source>Commun ACM</source>
          <year>2007</year>
          <month>10</month>
          <volume>50</volume>
          <issue>10</issue>
          <fpage>94</fpage>
          <lpage>100</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/1290958.1290968"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1290958.1290968</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stringhini</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kruegel</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vigna</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Detecting spammers on social networks</article-title>
          <year>2010</year>
          <conf-name>Annual Computer Security Applications Conference</conf-name>
          <conf-date>December 6-10, 2010</conf-date>
          <conf-loc>Austin, TX</conf-loc>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1145/1920261.1920263</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kudugunta</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Deep neural networks for bot detection</article-title>
          <source>Information Sciences</source>
          <year>2018</year>
          <month>10</month>
          <volume>467</volume>
          <fpage>312</fpage>
          <lpage>322</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ins.2018.08.019</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mazza</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cresci</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Avvenuti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Quattrociocchi</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Tesconi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>RTbust: Exploiting temporal patterns for botnet detection on Twitter</article-title>
          <year>2019</year>
          <conf-name>ACM Conference on Web Science</conf-name>
          <conf-date>June 30, 2019</conf-date>
          <conf-loc>Boston, MA, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3292522.3326015</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Santia</surname>
              <given-names>GC</given-names>
            </name>
            <name name-style="western">
              <surname>Mujib</surname>
              <given-names>MI</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>JR</given-names>
            </name>
          </person-group>
          <article-title>Detecting Social Bots on Facebook in an Information Veracity Context</article-title>
          <year>2019</year>
          <conf-name>International AAAI Conference on Web and Social Media</conf-name>
          <conf-date>June 11, 2019</conf-date>
          <conf-loc>Munich, Germany</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ojs.aaai.org//index.php/ICWSM/article/view/3244"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>KC</given-names>
            </name>
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Hui</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Scalable and Generalizable Social Bot Detection through Data Selection</article-title>
          <year>2020</year>
          <conf-name>AAAI Conference on Artificial Intelligence</conf-name>
          <conf-date>February 7-12, 2020</conf-date>
          <conf-loc>New York, NY</conf-loc>
          <fpage>1096</fpage>
          <lpage>1103</lpage>
          <pub-id pub-id-type="doi">10.1609/aaai.v34i01.5460</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Treen</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>HT</given-names>
            </name>
            <name name-style="western">
              <surname>O'Neill</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Online misinformation about climate change</article-title>
          <source>WIREs Clim Change</source>
          <year>2020</year>
          <month>06</month>
          <day>18</day>
          <volume>11</volume>
          <issue>5</issue>
          <fpage>e665</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/wcc.665"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/wcc.665</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shahi</surname>
              <given-names>GK</given-names>
            </name>
            <name name-style="western">
              <surname>Dirkson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Majchrzak</surname>
              <given-names>TA</given-names>
            </name>
          </person-group>
          <article-title>An exploratory study of COVID-19 misinformation on Twitter</article-title>
          <source>Online Soc Netw Media</source>
          <year>2021</year>
          <month>03</month>
          <volume>22</volume>
          <fpage>100104</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33623836"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.osnem.2020.100104</pub-id>
          <pub-id pub-id-type="medline">33623836</pub-id>
          <pub-id pub-id-type="pii">S2468-6964(20)30045-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7893249</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dwoskin</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Timberg</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Misinformation dropped dramatically the week after Twitter banned Trump and some allies</article-title>
          <source>The Washington Post</source>
          <year>2021</year>
          <month>01</month>
          <day>16</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.washingtonpost.com/technology/2021/01/16/misinformation-trump-twitter/">https://www.washingtonpost.com/technology/2021/01/16/misinformation-trump-twitter/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vosoughi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Roy</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Aral</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The spread of true and false news online</article-title>
          <source>Science</source>
          <year>2018</year>
          <month>03</month>
          <day>09</day>
          <volume>359</volume>
          <issue>6380</issue>
          <fpage>1146</fpage>
          <lpage>1151</lpage>
          <pub-id pub-id-type="doi">10.1126/science.aap9559</pub-id>
          <pub-id pub-id-type="medline">29590045</pub-id>
          <pub-id pub-id-type="pii">359/6380/1146</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Angarita</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Renna</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Is this the era of misinformation yet: combining social bots and fake news to deceive the masses</article-title>
          <year>2018</year>
          <conf-name>Companion Proceedings of The Web Conference 2018</conf-name>
          <conf-date>April 23-27, 2018</conf-date>
          <conf-loc>Lyon, France</conf-loc>
          <fpage>1557</fpage>
          <lpage>1561</lpage>
          <pub-id pub-id-type="doi">10.1145/3184558.3191610</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bovet</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Makse</surname>
              <given-names>HA</given-names>
            </name>
          </person-group>
          <article-title>Influence of fake news in Twitter during the 2016 US presidential election</article-title>
          <source>Nat Commun</source>
          <year>2019</year>
          <month>1</month>
          <day>2</day>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <pub-id pub-id-type="doi">10.1038/s41467-018-07761-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Disinformation and social bot operations in the run up to the 2017 French presidential election</article-title>
          <source>First Monday</source>
          <year>2017</year>
          <month>07</month>
          <day>31</day>
          <volume>22</volume>
          <issue>8</issue>
          <fpage>1</fpage>
          <pub-id pub-id-type="doi">10.5210/fm.v22i8.8005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Howard</surname>
              <given-names>PN</given-names>
            </name>
          </person-group>
          <article-title>How Political Campaigns Weaponize Social Media Bots</article-title>
          <source>IEEE Spectrum</source>
          <year>2018</year>
          <access-date>2021-05-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://spectrum.ieee.org/computing/software/how-political-campaigns-weaponize-social-media-bots">https://spectrum.ieee.org/computing/software/how-political-campaigns-weaponize-social-media-bots</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mueller</surname>
              <given-names>RS</given-names>
            </name>
          </person-group>
          <article-title>Report on the investigation into Russian interference in the 2016 presidential election</article-title>
          <source>US Department of Justice</source>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.justice.gov/storage/report.pdf">https://www.justice.gov/storage/report.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Twitter</collab>
          </person-group>
          <article-title>Update on Twitter's review of the 2016 US election</article-title>
          <source>Twitter Blog</source>
          <year>2018</year>
          <month>01</month>
          <day>19</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blog.twitter.com/en_us/topics/company/2018/2016-election-update.html">https://blog.twitter.com/en_us/topics/company/2018/2016-election-update.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rheault</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Musulan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Efficient detection of online communities and social bot activity during electoral campaigns</article-title>
          <source>Journal of Information Technology &#38; Politics</source>
          <year>2021</year>
          <month>02</month>
          <day>02</day>
          <fpage>1</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1080/19331681.2021.1879705</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Howard</surname>
              <given-names>PN</given-names>
            </name>
            <name name-style="western">
              <surname>Woolley</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Calo</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Algorithms, bots, and political communication in the US 2016 election: The challenge of automated political communication for election law and administration</article-title>
          <source>Journal of Information Technology &#38; Politics</source>
          <year>2018</year>
          <month>04</month>
          <day>11</day>
          <volume>15</volume>
          <issue>2</issue>
          <fpage>81</fpage>
          <lpage>93</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1080/19331681.2018.1448735"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/19331681.2018.1448735</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Assenmacher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Clever</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Frischlich</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Quandt</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Trautmann</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Grimme</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Demystifying Social Bots: On the Intelligence of Automated Social Media Actors</article-title>
          <source>Social Media + Society</source>
          <year>2020</year>
          <month>09</month>
          <day>01</day>
          <volume>6</volume>
          <issue>3</issue>
          <fpage>205630512093926</fpage>
          <pub-id pub-id-type="doi">10.1177/2056305120939264</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Varol</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <source>Bot Repository</source>
          <access-date>2020-11-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://botometer.osome.iu.edu/bot-repository/index.html">https://botometer.osome.iu.edu/bot-repository/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Giorgi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sap</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>TwitterMySQL</source>
          <access-date>2020-11-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/dlatk/TwitterMySQL">https://github.com/dlatk/TwitterMySQL</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Al-Rawi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Shukla</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Bots as Active News Promoters: A Digital Analysis of COVID-19 Tweets</article-title>
          <source>Information</source>
          <year>2020</year>
          <month>09</month>
          <day>27</day>
          <volume>11</volume>
          <issue>10</issue>
          <fpage>461</fpage>
          <pub-id pub-id-type="doi">10.3390/info11100461</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gilani</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Farahbakhsh</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Tyson</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Crowcroft</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Of bots and humans (on Twitter)</article-title>
          <year>2017</year>
          <conf-name>IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</conf-name>
          <conf-date>July 31, 2017</conf-date>
          <conf-loc>Sydney, Australia</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3110025.3110090</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Su</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Social Bots' Sentiment Engagement in Health Emergencies: A Topic-Based Analysis of the COVID-19 Pandemic Discussions on Twitter</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2020</year>
          <month>11</month>
          <day>23</day>
          <volume>17</volume>
          <issue>22</issue>
          <fpage>8701</fpage>
          <pub-id pub-id-type="doi">10.3390/ijerph17228701</pub-id>
          <pub-id pub-id-type="medline">33238567</pub-id>
          <pub-id pub-id-type="pii">ijerph17228701</pub-id>
          <pub-id pub-id-type="pmcid">PMC7709024</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Allyn</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Researchers: Nearly half of accounts tweeting about coronavirus are likely bots</article-title>
          <source>NPR</source>
          <year>2020</year>
          <month>05</month>
          <day>20</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.npr.org/sections/coronavirus-live-updates/2020/05/20/859814085/researchers-nearly-half-of-accounts-tweeting-about-coronavirus-are-likely-bots">https://www.npr.org/sections/coronavirus-live-updates/2020/05/20/859814085/researchers-nearly-half-of-accounts-tweeting-about-coronavirus-are-likely-bots</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roth</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Pickles</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Bot or not? The facts about platform manipulation on Twitter</article-title>
          <source>Twitter Blog</source>
          <year>2020</year>
          <month>05</month>
          <day>18</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blog.twitter.com/en_us/topics/company/2020/bot-or-not.html">https://blog.twitter.com/en_us/topics/company/2020/bot-or-not.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>What types of COVID-19 conspiracies are populated by Twitter bots?</article-title>
          <source>First Monday</source>
          <year>2020</year>
          <month>05</month>
          <day>19</day>
          <volume>25</volume>
          <issue>6</issue>
          <fpage>1</fpage>
          <pub-id pub-id-type="doi">10.5210/fm.v25i6.10633</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Allem</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Uppu</surname>
              <given-names>SP</given-names>
            </name>
            <name name-style="western">
              <surname>Cruz</surname>
              <given-names>TB</given-names>
            </name>
            <name name-style="western">
              <surname>Unger</surname>
              <given-names>JB</given-names>
            </name>
          </person-group>
          <article-title>E-Cigarette Surveillance With Social Media Data: Social Bots, Emerging Topics, and Trends</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2017</year>
          <month>12</month>
          <day>20</day>
          <volume>3</volume>
          <issue>4</issue>
          <fpage>e98</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2017/4/e98/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/publichealth.8641</pub-id>
          <pub-id pub-id-type="medline">29263018</pub-id>
          <pub-id pub-id-type="pii">v3i4e98</pub-id>
          <pub-id pub-id-type="pmcid">PMC5752967</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Allem</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Escobedo</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Dharmapuri</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Cannabis Surveillance With Twitter Data: Emerging Topics and Social Bots</article-title>
          <source>Am J Public Health</source>
          <year>2020</year>
          <month>03</month>
          <volume>110</volume>
          <issue>3</issue>
          <fpage>357</fpage>
          <lpage>362</lpage>
          <pub-id pub-id-type="doi">10.2105/AJPH.2019.305461</pub-id>
          <pub-id pub-id-type="medline">31855475</pub-id>
          <pub-id pub-id-type="pmcid">PMC7002948</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mehta</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Salmon</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ibrahim</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Potential Shortages of Hydroxychloroquine for Patients with Lupus During the Coronavirus Disease 2019 Pandemic</article-title>
          <source>JAMA Health Forum</source>
          <year>2020</year>
          <month>04</month>
          <day>10</day>
          <volume>1</volume>
          <issue>4</issue>
          <fpage>e200438</fpage>
          <pub-id pub-id-type="doi">10.1001/jamahealthforum.2020.0438</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Lupus Research Alliance</collab>
          </person-group>
          <source>COVID-19 Caused Hydroxychloroquine Issues for Third of Lupus Patients, New LRA Survey Finds</source>
          <year>2020</year>
          <month>05</month>
          <day>28</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.lupusresearch.org/covid-19-caused-hydroxychloroquine-issues-for-third-of-lupus-patients-new-lra-survey-finds/">https://www.lupusresearch.org/covid-19-caused-hydroxychloroquine-issues-for-third-of-lupus-patients-new-lra-survey-finds/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Skipper</surname>
              <given-names>CP</given-names>
            </name>
            <name name-style="western">
              <surname>Pastick</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Engen</surname>
              <given-names>NW</given-names>
            </name>
            <name name-style="western">
              <surname>Bangdiwala</surname>
              <given-names>AS</given-names>
            </name>
            <name name-style="western">
              <surname>Abassi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lofgren</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Okafor</surname>
              <given-names>EC</given-names>
            </name>
            <name name-style="western">
              <surname>Pullen</surname>
              <given-names>MF</given-names>
            </name>
            <name name-style="western">
              <surname>Nicol</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Nascene</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Hullsiek</surname>
              <given-names>KH</given-names>
            </name>
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>MP</given-names>
            </name>
            <name name-style="western">
              <surname>Luke</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lother</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>MacKenzie</surname>
              <given-names>LJ</given-names>
            </name>
            <name name-style="western">
              <surname>Drobot</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>LE</given-names>
            </name>
            <name name-style="western">
              <surname>Schwartz</surname>
              <given-names>IS</given-names>
            </name>
            <name name-style="western">
              <surname>Zarychanski</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>McDonald</surname>
              <given-names>EG</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Rajasingham</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Boulware</surname>
              <given-names>DR</given-names>
            </name>
          </person-group>
          <article-title>Hydroxychloroquine in Nonhospitalized Adults With Early COVID-19: A Randomized Trial</article-title>
          <source>Ann Intern Med</source>
          <year>2020</year>
          <month>10</month>
          <day>20</day>
          <volume>173</volume>
          <issue>8</issue>
          <fpage>623</fpage>
          <lpage>631</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.acpjournals.org/doi/abs/10.7326/M20-4207?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.7326/M20-4207</pub-id>
          <pub-id pub-id-type="medline">32673060</pub-id>
          <pub-id pub-id-type="pmcid">PMC7384270</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mitjà</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Corbacho-Monné</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ubals</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Tebe</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Peñafiel</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tobias</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ballana</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Alemany</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Riera-Martí</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Pérez</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Suñer</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Laporte</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Admella</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mitjà</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Clua</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bertran</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sarquella</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gavilán</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ara</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Argimon</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Casabona</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cuatrecasas</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Cañadas</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Elizalde-Torrent</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fabregat</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Farré</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Forcada</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Flores-Mateo</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Muntada</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Nadal</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Narejos</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gil-Ortega</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Prat</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Puig</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Quiñones</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Reyes-Ureña</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ramírez-Viaplana</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Ruiz</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Riveira-Muñoz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Sierra</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Velasco</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vivanco-Hidalgo</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Sentís</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>G-Beiras</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Clotet</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Vall-Mayans</surname>
              <given-names>M</given-names>
            </name>
            <collab>BCN PEP-CoV-2 RESEARCH GROUP</collab>
          </person-group>
          <article-title>Hydroxychloroquine for Early Treatment of Adults with Mild Covid-19: A Randomized-Controlled Trial</article-title>
          <source>Clin Infect Dis</source>
          <year>2020</year>
          <month>07</month>
          <day>16</day>
          <fpage>1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32674126"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/cid/ciaa1009</pub-id>
          <pub-id pub-id-type="medline">32674126</pub-id>
          <pub-id pub-id-type="pii">5872589</pub-id>
          <pub-id pub-id-type="pmcid">PMC7454406</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>National Institutes of Health</collab>
          </person-group>
          <article-title>NIH halts clinical trial of hydroxychloroquine</article-title>
          <source>National Institutes of Health News Releases</source>
          <year>2020</year>
          <month>06</month>
          <day>20</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nih.gov/news-events/news-releases/nih-halts-clinical-trial-hydroxychloroquine">https://www.nih.gov/news-events/news-releases/nih-halts-clinical-trial-hydroxychloroquine</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Allington</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Duffy</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Wessely</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dhavan</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Rubin</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Health-protective behaviour, social media usage and conspiracy belief during the COVID-19 public health emergency</article-title>
          <source>Psychol Med</source>
          <year>2020</year>
          <month>06</month>
          <day>09</day>
          <fpage>1</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32513320"/>
          </comment>
          <pub-id pub-id-type="doi">10.1017/S003329172000224X</pub-id>
          <pub-id pub-id-type="medline">32513320</pub-id>
          <pub-id pub-id-type="pii">S003329172000224X</pub-id>
          <pub-id pub-id-type="pmcid">PMC7298098</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Loomba</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>de Figueiredo</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Piatek</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>de Graaf</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Larson</surname>
              <given-names>HJ</given-names>
            </name>
          </person-group>
          <article-title>Measuring the impact of COVID-19 vaccine misinformation on vaccination intent in the UK and USA</article-title>
          <source>Nat Hum Behav</source>
          <year>2021</year>
          <month>03</month>
          <day>05</day>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>337</fpage>
          <lpage>348</lpage>
          <pub-id pub-id-type="doi">10.1038/s41562-021-01056-1</pub-id>
          <pub-id pub-id-type="medline">33547453</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41562-021-01056-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roth</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Pickles</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Updating our approach to misleading information</article-title>
          <source>Twitter Blog</source>
          <year>2020</year>
          <month>05</month>
          <day>11</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blog.twitter.com/en_us/topics/product/2020/updating-our-approach-to-misleading-information.html">https://blog.twitter.com/en_us/topics/product/2020/updating-our-approach-to-misleading-information.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Statt</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Facebook will now show a warning before you share articles about COVID-19</article-title>
          <source>The Verge</source>
          <year>2020</year>
          <month>08</month>
          <day>12</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.theverge.com/2020/8/12/21365305/facebook-covid-19-warning-notification-post-misinformation">https://www.theverge.com/2020/8/12/21365305/facebook-covid-19-warning-notification-post-misinformation</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Timberg</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Dwoskin</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Twitter is sweeping out fake accounts like never before, putting user growth at risk</article-title>
          <source>The Washington Post</source>
          <year>2018</year>
          <month>07</month>
          <day>09</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.washingtonpost.com/technology/2018/07/06/twitter-is-sweeping-out-fake-accounts-like-never-before-putting-user-growth-risk/">https://www.washingtonpost.com/technology/2018/07/06/twitter-is-sweeping-out-fake-accounts-like-never-before-putting-user-growth-risk/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Facebook</collab>
          </person-group>
          <article-title>Community Standards Enforcement Report</article-title>
          <source>Facebook Transparency</source>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://transparency.facebook.com/community-standards-enforcement">https://transparency.facebook.com/community-standards-enforcement</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kamal</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>California's BOT Disclosure Law, SB 1001, now in effect</article-title>
          <source>The National Law Review</source>
          <year>2019</year>
          <month>07</month>
          <day>15</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.natlawreview.com/article/california-s-bot-disclosure-law-sb-1001-now-effect">https://www.natlawreview.com/article/california-s-bot-disclosure-law-sb-1001-now-effect</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Frazin</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Feinstein introduces bill to prohibit campaigns from using social media bots</article-title>
          <source>The Hill</source>
          <year>2019</year>
          <month>07</month>
          <day>16</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://thehill.com/policy/cybersecurity/453336-dem-senator-introduces-bill-to-prohibit-campaigns-from-using-bots">https://thehill.com/policy/cybersecurity/453336-dem-senator-introduces-bill-to-prohibit-campaigns-from-using-bots</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Fandos</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Issac</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Tech executives are contrite about election meddling, but make few promises on Capitol Hill</article-title>
          <source>The New York Times</source>
          <year>2017</year>
          <month>10</month>
          <day>31</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2017/10/31/us/politics/facebook-twitter-google-hearings-congress.html">https://www.nytimes.com/2017/10/31/us/politics/facebook-twitter-google-hearings-congress.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gorwa</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Guilbeault</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Unpacking the Social Media Bot: A Typology to Guide Research and Policy</article-title>
          <source>Policy &#38; Internet</source>
          <year>2018</year>
          <month>08</month>
          <day>10</day>
          <volume>12</volume>
          <issue>2</issue>
          <fpage>225</fpage>
          <lpage>248</lpage>
          <pub-id pub-id-type="doi">10.1002/poi3.184</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Samples</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Why the government should not regulate content moderation of social media</article-title>
          <source>Cato Institute</source>
          <year>2019</year>
          <month>04</month>
          <day>09</day>
          <access-date>2021-05-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cato.org/publications/policy-analysis/why-government-should-not-regulate-content-moderation-social-media">https://www.cato.org/publications/policy-analysis/why-government-should-not-regulate-content-moderation-social-media</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Crews Jr</surname>
              <given-names>CW</given-names>
            </name>
          </person-group>
          <article-title>The Case against Social Media Content Regulation: Reaffirming Congress’ Duty to Protect Online Bias, 'Harmful Content,' and Dissident Speech from the Administrative State</article-title>
          <source>SSRN</source>
          <year>2020</year>
          <month>06</month>
          <day>28</day>
          <volume>Competitive Enterprise Institute, Issue Analysis</volume>
          <fpage>1</fpage>
          <lpage>34</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ssrn.com/abstract=3637613"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gillespie</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <source>Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media</source>
          <year>2018</year>
          <publisher-loc>New Haven, CT</publisher-loc>
          <publisher-name>Yale University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ibrahim</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The breastfeeding controversy and Facebook: Politicization of image, privacy and protest</article-title>
          <source>International Journal of E-Politics (IJEP)</source>
          <year>2010</year>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>16</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.4018/jep.2010040102</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dixon</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sorensen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Thain</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Vasserman</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Measuring and mitigating unintended bias in text classification</article-title>
          <year>2018</year>
          <conf-name>AAAI/ACM Conference on AI, Ethics, and Society</conf-name>
          <conf-date>2018</conf-date>
          <conf-loc>New Orleans, LA</conf-loc>
          <fpage>67</fpage>
          <lpage>73</lpage>
          <pub-id pub-id-type="doi">10.1145/3278721.3278729</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sap</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Card</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gabriel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The risk of racial bias in hate speech detection</article-title>
          <year>2019</year>
          <conf-name>Annual Meeting of the Association for Computational Linguistics</conf-name>
          <conf-date>July 2019</conf-date>
          <conf-loc>Florence, Italy</conf-loc>
          <fpage>1668</fpage>
          <lpage>1678</lpage>
          <pub-id pub-id-type="doi">10.18653/v1/p19-1163</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jayashree</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Dual-agent GANs for photorealistic and identity preserving profile face synthesis</article-title>
          <year>2017</year>
          <conf-name>Advances in Neural Information Processing Systems</conf-name>
          <conf-date>December 4, 2017</conf-date>
          <conf-loc>Long Beach, CA, USA</conf-loc>
          <fpage>66</fpage>
          <lpage>76</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://papers.neurips.cc/paper/6612-dual-agent-gans-for-photorealistic-and-identity-preserving-profile-face-synthesis.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>TB</given-names>
            </name>
            <name name-style="western">
              <surname>Mann</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ryder</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Subbiah</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kaplan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Dhariwal</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Language models are few-shot learners</article-title>
          <year>2020</year>
          <conf-name>Advances in Neural Information Processing Systems</conf-name>
          <conf-date>December 6, 2020</conf-date>
          <conf-loc>Virtual</conf-loc>
          <fpage>1877</fpage>
          <lpage>1901</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2005.14165"/>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
