<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>ACTI at EVALITA 2023: Automatic Conspiracy Theory Identification Task Overview</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giuseppe Russo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Niklas Stoehr</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manoel Horta Ribeiro</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>EPFL</institution>
          ,
          <addr-line>Rte Cantonale, 1015 Lausanne</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>ETH Zürich</institution>
          ,
          <addr-line>Rämistrasse 101, 8092 Zürich</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>English. Automatic Conspiracy Theory Identification (ACTI) is a new shared task proposed for the first time at the EVALITA 2023 evaluation campaign. ACTI is based on a new, manually labeled dataset of comments scraped from conspiratorial Telegram channels and consists of two subtasks: (1) identifying conspiratorial content (conspiratorial content classification); and (2) classifying content into specific conspiracy theories (conspiratorial category classification). A total of 15 teams participated in the task with 81 submissions. In this task summary, we discuss the data and task, and outline the bestperforming approaches that are largely based on large language models. We conclude with a brief discussion of the application of large language models to counter the spread of misinformation on online platforms.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Conspiracy Theory</kwd>
        <kwd>Content Moderation</kwd>
        <kwd>Large Language Models</kwd>
        <kwd>Computational Social Science</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        fundamental technology: ways to identify conspiratorial
content accurately and at scale across various languages
and cultural contexts [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>In this context, we propose the Automatic Conspiracy
Theory Identification (ACTI) task. Considering a dataset
with over 25 thousand posts in Italian extracted from five
Telegram channels, the ACTI consists of two subtasks:
(i) a binary classification task where the goal is to
determine if a given text piece is conspiratorial or not; and
(ii) a multi-class classification task to recognize specific
conspiracy theories.</p>
      <p>
        From ancient tales of secret societies, [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] to speculation
on whether the moon landing happened [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], belief in
conspiracy theories has been prevalent throughout
human history [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and has inflicted harm upon individuals
and groups falsely accused of wrongdoing [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. For
example, in the middle ages, the Blood Libel conspiracy
theory falsely accused Jews of murdering Christian boys,
fostering their persecution [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        Fast-forward to the digital age, the Internet has
emerged as the prominent medium through which
individuals are exposed to conspiracy theories [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. Indeed,
mainstream and fringe platforms have served as de-facto 2. Task Description
incubators of online conspiracies [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Notably, the impact
of online conspiracy theories has been far-reaching, in- The ACTI shared task comprises two subtasks, which we
citing real-world violence and influencing public health. describe below.
      </p>
      <p>
        The QAnon conspiracy, which gained momentum during
the Trump administration, was pivotal in planning the A: Conspiratorial Content Classification. The first
2021 invasion of the US Capitol [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. At the same time, subtask is determining whether a Telegram post is
conthe conspiracy theories associated with COVID-19 fueled spiratorial. We consider conspiratorial texts as those that
anti-vaccination sentiments and skepticism towards pub- either: (i) express the belief that influential people create
lic health measures [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. major events (e.g., COVID-19) to protect their interests or
      </p>
      <p>
        Mainstream platforms limit the difusion of conspir- (ii) interpret events in a way that supports the narrative
atorial content through interventions that range from of a conspiracy theory.
banning online communities [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] to telling users that Note that this definition of “conspiratorial” is broad,
the information presented may be inaccurate [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. While as texts may be defined as conspiratorial if they
underthese interventions may help curb the proliferation of mine commonly accepted views on societal issues. For
conspiracy theories in online spaces [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], they require a example, the text “il cancro femminista sta prendendo
piene” should be classified as conspiratorial, as it subtly
supports a broader theory claiming that women’s rights
are destroying the stability of Western societies.
Normal
      </p>
      <p>Sub-task: A
B: Conspiracy Category Classification. The second
subtask is determining which conspiracy theory a post
belongs to. In particular, we consider four possible
conspiracy theories.
l
e
b
a
L
Cospiracy
• COVID-19: Text concerning vaccine production, Original
5G, and non-pharmacological interventions as a Augmented
tool of control over people. Texts denying the 100 101 102 103
pandemic was a real event or minimizing its im- Count
portance. Sub-task: B
• QAnon: Texts associated with the QAnon theory.</p>
      <p>According to QAnon, a group of Satanic canni- COVID
balist sex abusers conspired against former U.S. l QAnon
President Donald Trump during his term in ofice. eab
This theory extended far over its original scope LFlat-Earth
embodying other beliefs that support (among the Russia Original
others) the idea that women are enemies (hate 100 101 102 103
against women) and that a powerful elite (led by Count
public figures like Pope Francis, Queen Elizabeth,
and Hillary Clinton ) is trying to organize a New Figure 1: Distribution of labels for Subtask A and Subtask B.</p>
      <p>World Order.
• Flat-Earth: Texts associated with the claim that
the earth is flat and that influential organizations
hide this fact from laypeople. Usually, the
flatearth conspiracy theory is supported by pseudo- 3.1. Annotation Process
scientific evidence. The data collection process for our study on
conspirato• Pro-Russia : Texts associated with conspirato- rial content in online channels involved several steps to
rial beliefs promoting Russian interests, e.g., that ensure the accuracy and relevance of the collected data.
nazists control Ukraine’s governments and army. One of the main challenges we encountered was the
presence of non-conspiratorial content within the channels.
3. Data Collection While some comments discussed conspiratorial topics,
others contained valid points or critiques regarding
conTo gather the necessary data for the ACTI task, we em- spiratorial perspectives. Additionally, some comments
ploy a customized web crawler using the Selenium and were deemed meaningless and needed to be filtered out
BeautifulSoup libraries in Python. Our web crawler tar- to maintain the integrity of the dataset.
gets specific sources known for hosting conspiratorial To address this, we employed two human
annotacontent on the Telegram platform. tors who were responsible for labeling the comments</p>
      <p>Specifically, we focus on a selection of Telegram chan- according to three categories: “Not Relevant,”
“Nonnels that gained notoriety for promoting far-right ideolo- Conspiratorial,” and “Conspiratorial.” The “Not Relevant”
gies and disseminating conspiracy theories. The channels label was assigned to comments that did not contribute to
we collect data from include: Qlobal-Change Italia, Basta the discussion, while the “Non-Conspiratorial” label was
Dittatura, Studi Scientifici Vaccini, Terra Piatta, and Den- used for comments that did not involve conspiratorial
tro La Notizia. For example, the channel “Basta Dittatura” content. The “Conspiratorial” label indicated comments
has been actively involved in various events, including that contained or supported conspiratorial discussions.
the siege of a trade union headquarters, indicating its For the comments labeled as “Conspiratorial,” we
furstrong afiliation with conspiratorial movements. ther categorized them into four subcategories: “QAnon”,</p>
      <p>
        Our data collection process spanned from January 1, “Covid19”, “Russia”, and “Flat-Earth”. These subcategories
2020, to June 30, 2020, during which we capture and allowed us to analyze specific conspiracy theories in
retain comments written in Italian. To ensure suficient greater detail. The definitions of conspiratorial content
text for analysis, we filtered out comments with less than are based on established studies in the field [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ],
enten words. We gathered a dataset comprising 25, 612 suring consistency and clarity in our annotation process.
posts extracted from these five Telegram channels. We To assess the agreement between the annotators, we
summarize statistics about our dataset in fig. 1 calculated inter-annotator agreement rates using Cohen’s
 coeficient. The two annotators achieved high
agreement levels, with a Cohen’s  of 0.93 for the first task and
0.86 for the second task, demonstrating the reliability of
the annotation process. To maintain data integrity, we
excluded comments that did not receive the same
classiifcation from both annotators. Additionally, comments
labeled “Not Relevant” were discarded from the dataset
to focus solely on relevant conspiratorial content.
      </p>
      <p>Our data collection process yielded 2,301 comments
for the first subtask and 1,110 comments for the second
subtask. This resulted in a curated dataset that provides
a solid foundation for research on conspiratorial content
in online discussions.</p>
    </sec>
    <sec id="sec-2">
      <title>4. Evaluation Measures</title>
      <sec id="sec-2-1">
        <title>5.1. Conspiratorial Content Classification</title>
        <sec id="sec-2-1-1">
          <title>We chose diferent evaluation metrics for subtasks A and</title>
          <p>B because of the distribution of the labels provided by
the annotators. In particular</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>Baselines. We follow the same methodological ap</title>
          <p>proach to provide a baseline for both subtasks.
Specifically, the baselines for subtasks A and B are a Random
Forest trained on a bag-of-words representation of the
comments. In particular, we trained the random forest
with 500 estimators and validated it using a five-fold
cross-validation. These baselines achieve 0.63 accuracy
for the first and 0.68 for the second subtask, respectively.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>5. Results</title>
      <sec id="sec-3-1">
        <title>A total of fifteen teams submitted from seven institutions</title>
        <p>participated in the two tasks. Specifically, eight teams
submitted for the conspiracy content classification and
seven for the conspiracy category classification. In total,
we obtain 81 submissions. In Tables 1 and 2, we show
the results for both submissions.</p>
        <sec id="sec-3-1-1">
          <title>5.2. Conspiracy Category Classification</title>
          <p>Table 2 reports the results of the Conspiracy Category
Classification task, which received 41 submissions in
total. Once again, the “UPB” team from the University
Politehnica of Bucharest achieved the highest F1-score</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>However, it significantly drops in performance in subtask</title>
        <p>B, ranking fifth with a score of 0.85 F1-score.</p>
        <p>In other EVALITA tasks, ExtremITA showed
significant variability in predictive capacity. It ranked first
in eight out of twenty-five tasks, but in the remaining
subtasks, it performed poorly, ranking between fifth and
eleventh. These results confirm LLMs’ high potential
and applicability in real-world scenarios. However, the
high variability of results shows that LLMs need help
improving over models fine-tuned on specific tasks. Future
research should focus on refining prompting techniques
to improve the predictive capacity of LLMs at the
singletask level.
6.2. Augmenting Data with LLMs
(0.91). Interestingly, the data augmentation process used
for subtask A did increase the model performance.
Indeed, the participants submitted the same
transformerbased model trained with contrastive learning, excluding
the data augmentation block. The second-best
performing team from Tor Vergata University (Michael Vitali)
achieved an F1-Score of 0.89. They fine-tuned two BERT
models, one in Italian and one multilingual, and
combined them in an ensemble. Numerous teams performed
well in this task, achieving F1-scores beyond 0.80. Only
one participant obtained a result slightly inferior to the
provided baseline.</p>
        <p>The winning team of subtasks A and B (“UPB”) used
an approach based on data augmentation via Large
Language Models and the training of sentence
transformers with contrastive learning. This approach tackles the
challenge of the acquisition of conspiratorial data.
Indeed, collecting and labeling conspiratorial data requires
substantial eforts by domain specialists. This approach
tested the possibility of leveraging LLMs to generate
synthetic data and use it to train systems for automatically
detecting conspiratorial content based. However, it is
essential to note that validating the quality of data
gener6. Discussion ated by LLM is an open issue within the NLP community.
While LLMs can efectively produce synthetic content,
A comprehensive analysis of the submitted systems re- assessing its authenticity and alignment with real-world
veals that most participants opted for LLMs-based mod- conspiratorial beliefs is crucial. The lower performance
els. Within this context, we emphasize two distinct ap- of the model augmented with synthetic data suggests
proaches the participants employ: (i) prompting and (ii) that the quality of the generated data drastically impacts
data augmentation. Upon thorough analysis, we find that the overall model performance. Therefore, human
evaluwhile prompting does result in positive outcomes, the ation is mandatory to evaluate the efectiveness of these
predictive capabilities of zero-shot LLMs are still inferior approaches.
to systems that have been finetuned for a specific task.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>7. Conclusion</title>
      <sec id="sec-4-1">
        <title>6.1. Prompting Large Language Models</title>
        <sec id="sec-4-1-1">
          <title>A recent position paper [22] asks whether EVALITA has</title>
          <p>
            Prompting consists of providing information to a trained reached its end in light of the increasing use of LLMs.
model to predict output labels for a task. It is a task- However, based on the outcomes presented in this report,
agnostic approach, making it versatile and widely appli- it becomes evident that the answer remains negative. The
cable [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ]. This is achieved through concise instructions, challenges posed by EVALITA tasks persist as a crucial
asreferred to as prompts, which guide the model’s behavior. set in comprehending and advancing language resources
          </p>
          <p>The power and flexibility of prompting LLMs are well and tools specifically for the Italian language. This fact is
exemplified by team ExtremITA’s approach: adopting a exemplified by transformer-based models’ difering
rankLarge Language Model (LLM) to address all EVALITA ings, demonstrating the evaluation campaign’s diversity
tasks simultaneously. For the ACTI task, ExtremITA is and significance. However, the performance achieved by
prompted with simple questions such as “Does this text LLMs is undoubtedly pushing the limits of some tasks,
talk about a conspiracy? Answer yes or no” and “Which especially text classification tasks. In conclusion, while
conspiracy theory is discussed in this text: Covid, QAnon, LLMs have shown great potential, EVALITA remains an
Flat Earth, or Russia?” This approach ranks second in essential platform for improving language tools for the
subtask A of ACTI, achieving a score of 0.86 F1-score. Italian language.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <sec id="sec-5-1">
        <title>We thank the data annotators for their careful and valuable work. Niklas Stoehr acknowledges funding from the Swiss Data Science Center (SDSC) fellowship.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Menini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Polignano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sprugnoli</surname>
          </string-name>
          , G. Venturi,
          <year>Evalita 2023</year>
          :
          <article-title>Overview of the 8th evaluation campaign of natural language processing and speech tools for italian, in: Proceedings of the Eighth Evaluation Campaign of Natural Language Processing and Speech Tools for Italian</article-title>
          .
          <source>Final Workshop (EVALITA</source>
          <year>2023</year>
          ), CEUR.org, Parma, Italy,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Roisman</surname>
          </string-name>
          ,
          <article-title>The rhetoric of conspiracy in ancient Athens</article-title>
          , Univ of California Press,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] Macey, Richard,
          <article-title>One giant blunder for mankind: how nasa lost moon pictures</article-title>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>J.-W. Van Prooijen</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. M. Douglas</surname>
          </string-name>
          ,
          <article-title>Conspiracy theories as part of history: The role of societal crisis situations</article-title>
          ,
          <source>Memory studies 10</source>
          (
          <year>2017</year>
          )
          <fpage>323</fpage>
          -
          <lpage>333</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>K. M. Douglas</surname>
            ,
            <given-names>J. E.</given-names>
          </string-name>
          <string-name>
            <surname>Uscinski</surname>
            ,
            <given-names>R. M.</given-names>
          </string-name>
          <string-name>
            <surname>Sutton</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Cichocka</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Nefes</surname>
            ,
            <given-names>C. S.</given-names>
          </string-name>
          <string-name>
            <surname>Ang</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Deravi</surname>
          </string-name>
          , Understanding conspiracy theories,
          <source>Political psychology 40</source>
          (
          <year>2019</year>
          )
          <fpage>3</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Rose</surname>
          </string-name>
          ,
          <article-title>The Murder of William of Norwich: The Origins of the Blood Libel in Medieval Europe</article-title>
          , Oxford University Press,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Sunstein</surname>
          </string-name>
          , # Republic:
          <article-title>Divided democracy in the age of social media</article-title>
          , Princeton university press,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Goertzel</surname>
          </string-name>
          , Belief in conspiracy theories, Political psychology (
          <year>1994</year>
          )
          <fpage>731</fpage>
          -
          <lpage>742</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Anti-Defamation</surname>
            <given-names>League</given-names>
          </string-name>
          ,
          <article-title>ADL statement on Facebook's decision to finally ban QAnon content from platform</article-title>
          , https://www.adl.org/news/press
          <article-title>-release s/adl-statement-on-f acebooks-decision-to-f inally -ban-qanon-content-f rom-platf orm</article-title>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>BuzzFeed</given-names>
            <surname>News</surname>
          </string-name>
          , '
          <article-title>the rioters who took over the capitol have been planning online in the open for weeks'</article-title>
          ,
          <year>2021</year>
          . URL: https://www.buzzfeednews.com /article/janelytvynenko/trump-rioters
          <article-title>-planned-o nline</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Collins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Zadrozny</surname>
          </string-name>
          ,
          <article-title>Facebook bans qanon across its platforms</article-title>
          , https://www.nbcnews.com/tech/tec h-news
          <article-title>/facebook-bans-qanon-across-its-platf or ms-</article-title>
          n1242339,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N.</given-names>
            <surname>Puri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Coomes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Haghbayan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Gunaratne</surname>
          </string-name>
          ,
          <article-title>Social media and vaccine hesitancy: new updates for the era of covid-19 and globalized infectious diseases</article-title>
          ,
          <source>Human vaccines &amp; immunotherapeutics 16</source>
          (
          <year>2020</year>
          )
          <fpage>2586</fpage>
          -
          <lpage>2593</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Friedrichs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Stoehr</surname>
          </string-name>
          , G. Formisano,
          <article-title>Fear-anger contests: Governmental and populist politics of emotion</article-title>
          ,
          <source>Online Social Networks and Media</source>
          <volume>32</volume>
          (
          <year>2022</year>
          )
          <article-title>100240</article-title>
          . URL: https://linkinghub.elsevier.co m/retrieve/pii/S2468696422000428. doi:
          <volume>10</volume>
          .1016/ j.osnem.
          <year>2022</year>
          .
          <volume>100240</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>E.</given-names>
            <surname>Chandrasekharan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Pavalanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Srinivasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Glynn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Eisenstein</surname>
          </string-name>
          , E. Gilbert,
          <article-title>You can't stay here: The eficacy of reddit's 2015 ban examined through hate speech</article-title>
          ,
          <source>Proceedings of the ACM on Human-Computer Interaction</source>
          <volume>1</volume>
          (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Verginer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          , G. Casiraghi,
          <article-title>Spillover of antisocial behavior from fringe platforms: The unintended consequences of community banning</article-title>
          ,
          <source>in: Proceedings of the International AAAI Conference on Web and Social Media</source>
          , volume
          <volume>17</volume>
          ,
          <year>2023</year>
          , pp.
          <fpage>742</fpage>
          -
          <lpage>753</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zannettou</surname>
          </string-name>
          ,
          <article-title>" i won the election!": An empirical analysis of soft moderation interventions on twitter</article-title>
          ,
          <source>in: Proceedings of the International AAAI Conference on Web and Social Media</source>
          , volume
          <volume>15</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>865</fpage>
          -
          <lpage>876</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Horta</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Casiraghi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Verginer</surname>
          </string-name>
          ,
          <article-title>Understanding online migration decisions following the banning of radical communities</article-title>
          ,
          <source>in: Proceedings of the 15th ACM Web Science Conference</source>
          <year>2023</year>
          ,
          <year>2023</year>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>G.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gote</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Brandenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schlosser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Schweitzer</surname>
          </string-name>
          ,
          <article-title>Helping a friend or supporting a cause? disentangling active and passive cosponsorship in the U.S. congress, in: Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics</article-title>
          (Volume
          <volume>1</volume>
          :
          <string-name>
            <surname>Long</surname>
            <given-names>Papers)</given-names>
          </string-name>
          ,
          <source>Association for Computational Linguistics</source>
          , Toronto, Canada,
          <year>2023</year>
          , pp.
          <fpage>2952</fpage>
          -
          <lpage>2969</lpage>
          . URL: https: //aclanthology.org/
          <year>2023</year>
          .
          <article-title>acl-long</article-title>
          .
          <volume>166</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>C. R.</given-names>
            <surname>Sunstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vermeule</surname>
          </string-name>
          ,
          <article-title>Conspiracy theories: Causes and cures</article-title>
          ,
          <source>Journal of political philosophy 17</source>
          (
          <year>2009</year>
          )
          <fpage>202</fpage>
          -
          <lpage>227</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Swami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Coles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Stieger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pietschnig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Furnham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rehim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Voracek</surname>
          </string-name>
          ,
          <article-title>Conspiracist ideation in britain and austria: Evidence of a monological belief system and associations between individual psychological diferences and real-world and fictitious conspiracy theories</article-title>
          ,
          <source>British Journal of Psychology</source>
          <volume>102</volume>
          (
          <year>2011</year>
          )
          <fpage>443</fpage>
          -
          <lpage>463</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>C.</given-names>
            <surname>Lefebvre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Stoehr</surname>
          </string-name>
          ,
          <article-title>Rethinking the event coding pipeline with prompt entailment</article-title>
          , in: arXiv, volume
          <volume>10</volume>
          .48550,
          <year>2022</year>
          . URL: https://arxiv.org/pdf/2210.052 57.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Basile</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Is</surname>
            <given-names>EVALITA</given-names>
          </string-name>
          <article-title>done? on the impact of prompting on the italian nlp evaluation campaign</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>3287</volume>
          ,
          <string-name>
            <surname>Debora</surname>
            <given-names>Nozza</given-names>
          </string-name>
          , Lucia C. Passaro, Marco Polig-
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>