Abstract | ||
---|---|---|
The Russia-based Internet Research Agency (IRA) carried out a broad information campaign in the U.S. before and after the 2016 presidential election. The organization created an expansive set of internet properties: web domains, Facebook pages, and Twitter bots, which received traffic via purchased Facebook ads, tweets, and search engines indexing their domains. In this paper, we focus on IRA activities that received exposure through search engines, by joining data from Facebook and Twitter with logs from the Internet Explorer 11 and Edge browsers and the Bing.com search engine.
We find that a substantial volume of Russian content was apolitical and emotionally-neutral in nature. Our observations demonstrate that such content gave IRA web-properties considerable exposure through search-engines and brought readers to websites hosting inflammatory content and engagement hooks. Our findings show that, like social media, web search also directed traffic to IRA generated web content, and the resultant traffic patterns are distinct from those of social media.
|
Year | DOI | Venue |
---|---|---|
2020 | 10.1145/3366423.3380290 | WWW '20: The Web Conference 2020
Taipei
Taiwan
April, 2020 |
DocType | ISBN | Citations |
Conference | 978-1-4503-7023-3 | 0 |
PageRank | References | Authors |
0.34 | 0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Alexander Spangher | 1 | 2 | 0.71 |
Gireeja Ranade | 2 | 88 | 14.45 |
Besmira Nushi | 3 | 120 | 10.98 |
Adam Fourney | 4 | 64 | 8.18 |
Eric Horvitz | 5 | 9402 | 1058.25 |