Abstract | ||
---|---|---|
The Russia-based Internet Research Agency (IRA) carried out a broad information campaign in the U.S. before and after the 2016 presidential election. The organization created an expansive set of internet properties: web domains, Facebook pages, and Twitter bots, which received traffic via purchased Facebook ads, tweets, and search engines indexing their domains. We investigate the scope of IRA activities in 2017, joining data from Facebook and Twitter with logs from the Internet Explorer 11 and Edge browsers and the Bing.com search engine. The studies demonstrate both the ease with which malicious actors can harness social media and search engines for propaganda campaigns, and the ability to track and understand such activities by fusing content and activity resources from multiple internet services. We show how cross-platform analyses can provide an unprecedented lens on attempts to manipulate opinions and elections in democracies. |
Year | Venue | Field |
---|---|---|
2018 | arXiv: Social and Information Networks | World Wide Web,Social media,Presidential election,Computer science,Search engine indexing,Artificial intelligence,Expansive,Internet research,Machine learning,The Internet |
DocType | Volume | Citations |
Journal | abs/1810.10033 | 2 |
PageRank | References | Authors |
0.37 | 4 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Alexander Spangher | 1 | 2 | 0.71 |
Gireeja Ranade | 2 | 88 | 14.45 |
Besmira Nushi | 3 | 120 | 10.98 |
Adam Fourney | 4 | 91 | 10.08 |
Eric Horvitz | 5 | 9402 | 1058.25 |