{"id":"https://openalex.org/W7155033465","doi":"https://doi.org/10.1016/j.compeleceng.2026.111191","title":"Evaluating the acceptance of users\u2019 reactions to prevent the escalation of information disorder","display_name":"Evaluating the acceptance of users\u2019 reactions to prevent the escalation of information disorder","publication_year":2026,"publication_date":"2026-04-21","ids":{"openalex":"https://openalex.org/W7155033465","doi":"https://doi.org/10.1016/j.compeleceng.2026.111191"},"language":"en","primary_location":{"id":"doi:10.1016/j.compeleceng.2026.111191","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.compeleceng.2026.111191","pdf_url":null,"source":{"id":"https://openalex.org/S121340289","display_name":"Computers & Electrical Engineering","issn_l":"0045-7906","issn":["0045-7906","1879-0755"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers and Electrical Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.compeleceng.2026.111191","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123383628","display_name":"Gennaro Junior Pezzullo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126337","display_name":"University of Campania \"Luigi Vanvitelli\"","ror":null,"country_code":"IT","type":null,"lineage":["https://openalex.org/I4210126337"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gennaro Junior Pezzullo","raw_affiliation_strings":["Department of Engineering, University of Campania \u201cLuigi Vanvitelli\u201d, via Roma, 29, Aversa, 81031, CE, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Engineering, University of Campania \u201cLuigi Vanvitelli\u201d, via Roma, 29, Aversa, 81031, CE, Italy","institution_ids":["https://openalex.org/I4210126337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058276133","display_name":"Salvatore Venticinque","orcid":"https://orcid.org/0000-0001-5042-3384"},"institutions":[{"id":"https://openalex.org/I4210126337","display_name":"University of Campania \"Luigi Vanvitelli\"","ror":null,"country_code":"IT","type":null,"lineage":["https://openalex.org/I4210126337"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Salvatore Venticinque","raw_affiliation_strings":["Department of Engineering, University of Campania \u201cLuigi Vanvitelli\u201d, via Roma, 29, Aversa, 81031, CE, Italy"],"raw_orcid":"https://orcid.org/0000-0001-5042-3384","affiliations":[{"raw_affiliation_string":"Department of Engineering, University of Campania \u201cLuigi Vanvitelli\u201d, via Roma, 29, Aversa, 81031, CE, Italy","institution_ids":["https://openalex.org/I4210126337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075829060","display_name":"Alba Amato","orcid":"https://orcid.org/0000-0002-5196-8148"},"institutions":[{"id":"https://openalex.org/I4210126337","display_name":"University of Campania \"Luigi Vanvitelli\"","ror":null,"country_code":"IT","type":null,"lineage":["https://openalex.org/I4210126337"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alba Amato","raw_affiliation_strings":["Department of Political Science, University of Campania \u201cLuigi Vanvitelli\u201d, Caserta, CE, Italy"],"raw_orcid":"https://orcid.org/0000-0002-5196-8148","affiliations":[{"raw_affiliation_string":"Department of Political Science, University of Campania \u201cLuigi Vanvitelli\u201d, Caserta, CE, Italy","institution_ids":["https://openalex.org/I4210126337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045457205","display_name":"Beniamino Di Martino","orcid":"https://orcid.org/0000-0001-7613-1312"},"institutions":[{"id":"https://openalex.org/I4210126337","display_name":"University of Campania \"Luigi Vanvitelli\"","ror":null,"country_code":"IT","type":null,"lineage":["https://openalex.org/I4210126337"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Beniamino Di Martino","raw_affiliation_strings":["Department of Engineering, University of Campania \u201cLuigi Vanvitelli\u201d, via Roma, 29, Aversa, 81031, CE, Italy"],"raw_orcid":"https://orcid.org/0000-0001-7613-1312","affiliations":[{"raw_affiliation_string":"Department of Engineering, University of Campania \u201cLuigi Vanvitelli\u201d, via Roma, 29, Aversa, 81031, CE, Italy","institution_ids":["https://openalex.org/I4210126337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058276133"],"corresponding_institution_ids":["https://openalex.org/I4210126337"],"apc_list":{"value":3100,"currency":"USD","value_usd":3100},"apc_paid":{"value":3100,"currency":"USD","value_usd":3100},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.92135093,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"135","issue":null,"first_page":"111191","last_page":"111191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.25600001215934753,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.25600001215934753,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.18250000476837158,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.05429999902844429,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/disinformation","display_name":"Disinformation","score":0.8033999800682068},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5925999879837036},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.43050000071525574},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.3447999954223633},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.3262999951839447},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.32589998841285706},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.3224000036716461}],"concepts":[{"id":"https://openalex.org/C2776552730","wikidata":"https://www.wikidata.org/wiki/Q189656","display_name":"Disinformation","level":3,"score":0.8033999800682068},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6144999861717224},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5925999879837036},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.43050000071525574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4032999873161316},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.3447999954223633},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3262999951839447},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3197999894618988},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3131999969482422},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30309998989105225},{"id":"https://openalex.org/C3019714060","wikidata":"https://www.wikidata.org/wiki/Q322514","display_name":"Validation test","level":4,"score":0.301800012588501},{"id":"https://openalex.org/C2777622855","wikidata":"https://www.wikidata.org/wiki/Q7901844","display_name":"User information","level":3,"score":0.2863999903202057},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.compeleceng.2026.111191","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.compeleceng.2026.111191","pdf_url":null,"source":{"id":"https://openalex.org/S121340289","display_name":"Computers & Electrical Engineering","issn_l":"0045-7906","issn":["0045-7906","1879-0755"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers and Electrical Engineering","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.compeleceng.2026.111191","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.compeleceng.2026.111191","pdf_url":null,"source":{"id":"https://openalex.org/S121340289","display_name":"Computers & Electrical Engineering","issn_l":"0045-7906","issn":["0045-7906","1879-0755"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers and Electrical Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4160555303096771}],"awards":[],"funders":[{"id":"https://openalex.org/F5497039910","display_name":"Ministero dell'Istruzione e del Merito","ror":"https://ror.org/01ehyh486"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1532258339","https://openalex.org/W1837843568","https://openalex.org/W2232384272","https://openalex.org/W2617495708","https://openalex.org/W2742330194","https://openalex.org/W2790166049","https://openalex.org/W2791544114","https://openalex.org/W2924035390","https://openalex.org/W2945928904","https://openalex.org/W3010420310","https://openalex.org/W4205276384","https://openalex.org/W4223506222","https://openalex.org/W4232209716","https://openalex.org/W4319983294","https://openalex.org/W4391262194","https://openalex.org/W4391575478","https://openalex.org/W4391751718","https://openalex.org/W4402401336"],"related_works":[],"abstract_inverted_index":{"The":[0,45,75],"spread":[1,37],"of":[2,38,48,73,77,85],"information":[3,39,172],"disorder":[4,40,173],"is":[5,80],"increasingly":[6],"being":[7],"addressed":[8],"as":[9,112,174],"a":[10,16,30,86,113],"security":[11],"threat":[12,121],"that":[13,89],"can":[14],"pose":[15],"significant":[17],"risk":[18,161],"both":[19],"to":[20,24,59,92,158],"individual":[21],"users":[22,152],"and":[23,34,51,63,97,101,104,131],"entire":[25],"communities.":[26],"This":[27],"paper":[28],"presents":[29],"methodology":[31,96],"for":[32,54,69,141],"estimating":[33],"communicating":[35],"the":[36,78,83,94],"by":[41,170],"analyzing":[42],"user":[43,125],"reactions.":[44],"sentiment":[46],"analysis":[47],"users\u2019":[49],"comments":[50],"profiling":[52],"mechanisms":[53],"community":[55,132],"detection":[56,133],"are":[57],"exploited":[58],"measure":[60],"quantitative":[61],"parameters":[62],"an":[64],"ontology":[65],"has":[66],"been":[67],"defined":[68],"describing":[70],"behavioral":[71],"patterns":[72],"disinformation.":[74],"effectiveness":[76],"approach":[79],"demonstrated":[81],"through":[82],"validation":[84],"software":[87],"prototype":[88,140],"allowed":[90],"us":[91],"test":[93],"proposed":[95],"techniques":[98],"on":[99,105,134],"open":[100],"public":[102],"data-sets":[103],"original":[106],"collected":[107],"data.":[108],"\u2022":[109,123,137,150,165],"Frames":[110],"disinformation":[111,147],"cyber-attack":[114],"vector":[115],"via":[116],"ontology,":[117],"integrable":[118],"with":[119],"STIX/TAXII":[120],"intelligence.":[122],"Profiles":[124],"reactions":[126],"using":[127],"AI-driven":[128],"stylometry,":[129],"sentiment,":[130],"social":[135],"networks.":[136],"Deploys":[138],"microservices":[139],"automated":[142],"STIX":[143],"report":[144],"generation":[145],"from":[146],"case":[148],"studies.":[149],"Clusters":[151],"(e.g.,":[153],"Analytical":[154],"Writers,":[155],"Emphatic":[156],"Reactors)":[157],"quantify":[159],"escalation":[160],"in":[162],"real":[163],"data-sets.":[164],"Enables":[166],"coordinated":[167],"cybersecurity":[168],"responses":[169],"modeling":[171],"structured":[175],"threats.":[176]},"counts_by_year":[],"updated_date":"2026-04-30T09:15:22.047038","created_date":"2026-04-22T00:00:00"}
