Abstract is missing.
- Malicious and Low Credibility URLs on Twitter During the AstraZeneca COVID-19 Vaccine DevelopmentSameera Horawalavithana, Ravindu De Silva, Mohamed Nabeel, Charitha Elvitigala, Primal Wijesekera, Adriana Iamnitchi. 3-12 [doi]
- How Political is the Spread of COVID-19 in the United States? - An Analysis Using Transportation and Weather DataKaran Vombatkere, Hanjia Lyu, Jiebo Luo. 13-22 [doi]
- Applying an Epidemiological Model to Evaluate the Propagation of Misinformation and Legitimate COVID-19-Related Information on TwitterMaryam Maleki, Mohammad Arani, Erik Buchholz, Esther Mead, Nitin Agarwal. 23-34 [doi]
- Optimization of Mitigation Strategies During Epidemics Using Offline Reinforcement LearningAlina Vereshchaka, Nitin Kulkarni. 35-45 [doi]
- Mining Online Social Media to Drive Psychologically Valid Agent Models of Regional Covid-19 Mask WearingPeter Pirolli, Kathleen M. Carley, Adam Dalton 0001, Bonnie J. Dorr, Christian Lebiere, Michael K. Martin, Brodie Mather, Konstantinos Mitsopoulos, Mark Orr, Tomek Strzalkowski. 46-56 [doi]
- Fine-Grained Analysis of the Use of Neutral and Controversial Terms for COVID-19 on Social MediaLong Chen, Hanjia Lyu, Tongyu Yang, Yu Wang 0041, Jiebo Luo. 57-67 [doi]
- Assessing Bias in YouTube's Video Recommendation Algorithm in a Cross-lingual and Cross-topical ContextBaris Kirdemir, Joseph Kready, Esther Mead, Muhammad Nihal Hussain, Nitin Agarwal, Donald Adjeroh. 71-80 [doi]
- Formal Methods for an Iterated Volunteer's DilemmaJacob Dineen, A. S. M. Ahsan-Ul-Haque, Matthew Bielskas. 81-90 [doi]
- Privacy Preserving Text Representation Learning Using BERTWalaa Alnasser, Ghazaleh Beigi, Huan Liu 0001. 91-100 [doi]
- GPU Accelerated PMCMC Algorithm with System Dynamics ModellingLujie Duan, Nathaniel Osgood. 101-110 [doi]
- An Analysis of Global News Coverage of Refugees Using a Big Data ApproachVeysel Yesilbas, Jose J. Padilla, Erika Frydenlund. 111-120 [doi]
- An Identity-Based Framework for Generalizable Hate Speech DetectionJoshua Uyheng, Kathleen M. Carley. 121-130 [doi]
- Using Diffusion of Innovations Theory to Study Connective Action CampaignsBilly Spann, Maryam Maleki, Esther Mead, Erik Buchholz, Nitin Agarwal, Therese L. Williams. 131-140 [doi]
- Reinforcement Learning for Data Poisoning on Graph Neural NetworksJacob Dineen, A. S. M. Ahsan-Ul-Haque, Matthew Bielskas. 141-150 [doi]
- Simulating Social-Cyber Maneuvers to Deter Disinformation CampaignsJanice T. Blane, J. D. Moffitt, Kathleen M. Carley. 153-163 [doi]
- Studying the Role of Social Bots During Cyber Flash MobsSamer Al-khateeb, Madelyn Anderson, Nitin Agarwal. 164-173 [doi]
- The Integrated Game Transformation Framework and Cyberwar: What 2×2 Games Tell Us About CyberattacksAlexander L. Fretz, Jose J. Padilla, Erika F. Frydenlund. 174-183 [doi]
- Bot-Based Emotion Behavior Differences in Images During Kashmir Black Day EventLynnette Hui Xian Ng, Kathleen M. Carley. 184-194 [doi]
- Using Social Network Analysis to Analyze Development Priorities of Moroccan InstitutionsImane Khaouja, Ibtissam Makdoun, Ghita Mezzour. 195-203 [doi]
- Influence Dynamics Among Narratives - A Case Study of the Venezuelan Presidential CrisisAkshay Aravamudan, Xi Zhang, Jihye Song, Stephen M. Fiore, Georgios C. Anagnostopoulos. 204-213 [doi]
- Network Structures and Humanitarian NeedMackenzie Clark, Erika Frydenlund, Jose J. Padilla. 214-223 [doi]
- Identifying Shifts in Collective Attention to Topics on Social MediaYuzi He, Ashwin Rao, Keith Burghardt, Kristina Lerman. 224-234 [doi]
- wapr.tugon.ph: A Secure Helpline for Detecting Psychosocial Aid from Reports of Unlawful Killings in the PhilippinesMaria Regina Justina E. Estuar, John Noel C. Victorino, Christian E. Pulmano, Zachary Pangan, Meredith Jaslyn B. Alanano, Jerome Victor C. Celeres, John Loyd B. de Troz, Marlene M. De Leon, Yvonne McDermott Rees, Riza Batista-Navarro, Lucita Lazo. 235-244 [doi]
- Social-Judgment-Based Modeling of Opinion Polarization in Chinese Live Streaming PlatformsYutao Chen. 247-256 [doi]
- Having a Bad Day? Detecting the Impact of Atypical Events Using Wearable SensorsKeith Burghardt, Nazgol Tavabi, Emilio Ferrara, Shrikanth Narayanan, Kristina Lerman. 257-267 [doi]
- Trusty Ally or Faithless Snake: Modeling the Role of Human Memory and Expectations in Social ExchangeJonathan H. Morgan, Christian Lebiere, James Moody, Mark G. Orr. 268-278 [doi]
- Examining the Effects of Race on Human-AI CooperationAkil A. Atkins, Matthew S. Brown, Christopher L. Dancy. 279-288 [doi]
- Tweeting While Pregnant: Is Online Health Communication About Physical Symptoms and Emotions About the Tweeter?Julia M. Hormes, Laurie Beth Feldman, Eliza Barach, Vidhushini Srinivasan, Samira Shaikh. 289-298 [doi]
- On the Effect of Social Norms on Performance in Teams with Distributed Decision MakersRavshanbek Khodzhimatov, Stephan Leitner, Friederike Wall. 299-309 [doi]
- What Makes a Turing Award Winner?Zihe Zheng, Zhongkai Shangguan, Jiebo Luo. 310-320 [doi]
- Kinetic Action and Radicalization: A Case Study of PakistanBrandon Shapiro, Andrew Crooks. 321-330 [doi]
- Multi-agent Naïve Utility Calculus: Intent Recognition in the Stag-Hunt GameLux Miranda, Özlem Özmen Garibay. 331-340 [doi]