Skip to main content
. 2021 Oct 31;11(1):111. doi: 10.1007/s13278-021-00815-2

Table 1.

Detecting inauthentic behaviour in the computer science literature

Automation Ferrara et al. (2016), Davis et al. (2016), Grimme et al. (2017), Cresci (2020)
Campaigns
—By content Lee et al. (2013), Assenmacher et al. (2020), Alizadeh et al. (2020), Graham et al. (2020)
—By URL Ratkiewicz et al. (2011), Cao et al. (2015), Giglietto et al. (2020b), Broniatowski (2021), Yu (2021)
—By hashtag Ratkiewicz et al. (2011), Burgess and Matamoros-Fernández (2016), Varol et al. (2017), Weber et al. (2020)
Synchronicity Chavoshi et al. (2017), Hine et al. (2017), Nasim et al. (2018), Mazza et al. (2019), Pacheco et al. (2020), Magelinski et al. (2021)
Communities Vo et al. (2017), Morstatter et al. (2018), Gupta et al. (2019)
Political bots Bessi and Ferrara (2016), Woolley (2016), Rizoiu et al. (2018), Woolley and Guilbeault (2018) (particularly embeddedness and organisation)