<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Leveraging Temporal Analysis to Predict the Impact of Political Messages on Social Media in Spanish</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Ibai</forename><surname>Guillén-Pacho</surname></persName>
							<email>ibai.guillen@upm.es</email>
							<affiliation key="aff0">
								<orgName type="laboratory">Ontology Engineering Group</orgName>
								<orgName type="institution">Universidad Politécnica de Madrid</orgName>
								<address>
									<settlement>Madrid</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Leveraging Temporal Analysis to Predict the Impact of Political Messages on Social Media in Spanish</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">CF62E7CF91BBCA9A76954F4407084935</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:03+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>disinformation</term>
					<term>fake news impact</term>
					<term>polarization</term>
					<term>response generation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Social networks such as TikTok, Facebook, or X introduce techniques to inform users if the content they are consuming may be fake. This, together with the account banning for hate speech or disinformation spread, is leading more and more pseudo-media in Spain to use Telegram to communicate with their audience. Thus, it is difficult to warn users about the veracity of the content, leading them to accept political disinformation as true if it aligns with their beliefs, which ultimately promotes their polarization. In this work, we want to identify the political messages that will have the greatest impact on people to recommend when it is necessary to initiate a refutation strategy if it is disinformative, so that refutation begins before disinformation is taken as true by a part of society. To estimate the impact of political messages, we take into account the polarization generated by them and their virality. Our main hypothesis is that this value is proportional to the time of publication, with the greatest impact in the most politically and socially sensitive contexts. Hence, our goal is to compile a dataset of political messages disseminated on Telegram (along with the generated responses) and its temporal context, in order to develop methods and metrics to identify the expected impact and when they might have the greatest impact.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Disinformation is defined as "false information that is shared to intentionally mislead" and is one of the main information disorders <ref type="bibr" target="#b0">[1]</ref>. The different information disorders, shown in Figure <ref type="figure" target="#fig_0">1</ref>, are distinguished by the information they use (real or fake) and the intention with which the news are generated (harm, mislead, other). The main problem with misleading fake news, the ones that provoke disinformation, is that not only can they be of different types (hoax, rumor, conspiracy theory, etc.), but they can spread very quickly and have a huge impact. This can lead to major problems, in terms of health (e.g., suggesting methods of curing diseases ), as a polarizer of society (e.g., creating hoaxes about the Spanish law on transgender rights ), and as a way to promote hatred (e.g., against immigrants ), among others.</p><p>Disinformation presents a risk to political speech and democracy, the impact it has on citizens is mainly due to the way it goes viral and the polarization it induces <ref type="bibr" target="#b1">[2]</ref>. The more viral and polarizing a news story is, the greater its impact. To mitigate this risk, <ref type="bibr" target="#b1">[2]</ref> suggest that the refutation should focus on high impact disinformation while omitting low impact cases. In this paper, we present an approach to predict the impact of political messages on social networks. The goal is to 1) help human annotators focus their resources on the most harmful messages and 2) help refutation mechanisms before the message gets a big impact on social media and biases public opinion. Furthermore, this method seeks to prevent the Streisand effect by unintentionally highlighting messages that would otherwise remain insignificant.</p><p>The structure of the paper is as follows. Section 2 discusses the background and related work. Section 3 details the proposed research, including assumptions, the research problem, hypothesis, research questions, and the objectives. Section 4 explains the research methodology adopted. Lastly, Section 5 summarizes the work done, the conclusions drawn, and suggests directions for future research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background and Related Work</head><p>Due to its low moderation and group/community-centered structure, Telegram provides an environment more prone to sharing political disinformation, which in turn implies a risk of political radicalization of users <ref type="bibr" target="#b2">[3]</ref>. In Spain, Telegram is one of the social networks used by most of the main sources of disinformation. These pseudo-media, listed in <ref type="bibr" target="#b3">[4]</ref>, have their own public Telegram groups that they use to share disinformation <ref type="foot" target="#foot_0">1</ref> . In fact, some of these pseudo-media had accounts on other social networks that have been closed for spreading false information and promoting hatred towards minorities. They claim that these acts are censorship and encourage their readers to join their Telegram groups, making this social network one of the main channels for the dissemination of disinformation.</p><p>To combat this disinformation, we can differentiate three refutation strategies according to <ref type="bibr" target="#b4">[5]</ref>: prebunking, debunking, and narrative counter. Prebunking focuses on protecting individuals from disinformation and attempts to influence them. The main techniques focus on analyzing the message and detecting its language intensity, identifying the source credibility, improving individuals' ability to deal with false information, etc. <ref type="bibr" target="#b5">[6]</ref>. Debunking uses facts and reliable information to refute disinformation. Fact-checking for debunk messages can be done manually (with experts or crowd-sourcing) or with automated tools trained on reliable knowledge bases <ref type="bibr" target="#b6">[7]</ref>. Narrative counter generates an easy to understand explanation without the need for empirical evidence. This strategy is also known as counterspeech and, although it can be done manually, its complexity makes it difficult to scale; thus, generative models represent a potential improvement <ref type="bibr" target="#b7">[8]</ref>. Moreover, it is one of the most effective methods in reducing the effect of disinformation on the beliefs, intentions, and attitudes of individuals <ref type="bibr" target="#b4">[5]</ref>.</p><p>However, there are too many communities and too many messages to fight them all. Choosing the highest impact messages can maximize the effect of these refutation strategies without being resource intensive and without giving importance to irrelevant messages. As the impact of disinformation directly depends on its virality and the polarization it produces <ref type="bibr" target="#b1">[2]</ref>, it is important to predict these aspects to make the best decision.</p><p>On the one hand, virality in social networks is a phenomenon that has been widely studied in the literature. Studies have been conducted on its propagation structure, measurement and prediction. First, there are two main types of propagation structures according to <ref type="bibr" target="#b8">[9]</ref>: diffusion, when virality increases as more people adopt and share the message; and broadcast, when virality is gained by sharing a single message that reaches many individuals. Second, the main approaches for measuring virality use engagement metrics: number of reposts, number of likes, number of followers of the author, combination of several, etc. <ref type="bibr" target="#b9">[10]</ref>. Finally, for automatic prediction of virality, the content of the message and its characteristics (whether it contains media, whether the author is verified, has positive or negative sentiment, etc.) are usually used <ref type="bibr" target="#b9">[10]</ref>.</p><p>On the other hand, we refer as generated polarization to the polarization generated in the responses to the message and not in the content of the message itself. Therefore, to know this feature, it is necessary to simulate the discussion generated by the message, to later measure the polarization of the responses. This approach ties into the broader topic of dialogue systems (DS), where the generation of responses to a message is widely discussed. These systems are usually divided according to their main specific features <ref type="bibr" target="#b10">[11]</ref>: approach (architecture of the system), purpose (general type of system) and model (underlying technique used).</p><p>The first feature (approach) depends on how the different components of a DS interact. The components form the architecture of a DS, and according to <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13]</ref>, there are four main ones: natural language understanding (to identify user intents and key information), tracking of the dialogue (to monitor user belief states based on dialogue history), learning the dialogue policy (to decide the next action), and natural language generation (to produce the response of the system in the dialogue). If they are trained separately and interact with each other, the DS follows a pipeline approach (also referred to as modular approach). However, it is possible to use a single trained model playing the role of all components, in this case the DS follows an end-to-end approach. The second feature (purpose), depends on the capability of the DS to work in certain domains. If the DS is designed to be flexible and not limited to a particular task, it is open-domain. In contrast, if it is specialized in solving a specific task, it is task-oriented.</p><p>The last feature (model), constitutes the main technique used to build the DS. There are many different techniques, but for the latter purpose (task-oriented), which is in line with our work, the most promising ones are those based on reinforced learning (RL) <ref type="bibr" target="#b10">[11]</ref> and large language models (LLM) <ref type="bibr" target="#b11">[12]</ref>. We consider LLMs to be the best option for this domain because of their ability to understand and generate natural language and their ability to adapt to a context with few examples <ref type="bibr" target="#b11">[12]</ref>. Nevertheless, it is necessary to fine-tune them with domain-specific information <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13]</ref> and combine them with RL <ref type="bibr" target="#b12">[13]</ref> and quality prompts <ref type="bibr" target="#b10">[11]</ref> to improve the quality of the results.</p><p>In the literature, applications of LLM to generate responses are usually related to detecting fake news because comments provide an important social context for the task <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>. The main papers in this field provide LLMs with the content of the news item and additional information to generate comments, this additional information can be: an example comment <ref type="bibr" target="#b13">[14]</ref>, a description of a user profile to be emulated by the model <ref type="bibr" target="#b14">[15]</ref>, both <ref type="bibr" target="#b15">[16]</ref>, etc. However, in an approach that has to work with continuous data streams to detect the impact of political disinformation, extracting the content of all the news items to be analyzed is an inacceptable resource-intensive process. To optimize resources, we believe the best approach for this type of information is to use only the news headline, which limits the context that can be given to the model and makes the problem analogous to generating responses to social media messages. Within this other domain, we find several resources (fine-tuned LLMs <ref type="bibr" target="#b16">[17]</ref>, datasets <ref type="bibr" target="#b17">[18]</ref>, frameworks <ref type="bibr" target="#b18">[19]</ref>, etc.) and different methods for providing context to the LLM in generating responses, such as: specifying which sentiment to focus on <ref type="bibr" target="#b19">[20]</ref>; evidence on which to base the response <ref type="bibr" target="#b20">[21]</ref>; intention or emotion of the speaker or of the response <ref type="bibr" target="#b18">[19]</ref>; etc. In short, all these approaches try to generate responses that are as real as possible, based on a piece of text and a context.</p><p>The realism of the responses generated is crucial for measuring polarization, as this phenomenon occurs when individuals form opinion groups that interact little or no with each other (also known as cyberbalkanization) <ref type="bibr" target="#b21">[22]</ref>. It is common to find works that measure polarization manually, both at the user level, by surveying users and asking them about their position on a predefined set of issues (e.g. <ref type="bibr" target="#b22">[23]</ref>); and at text level, analyzing the content following steps defined in a framework (e.g. <ref type="bibr" target="#b23">[24]</ref>). Increasing efforts are being made to automate this measurement. For example, at the user level, there is a method that assesses the polarization of users and groups by analyzing interactions between users, the content of their discussions, and the opinion leaders or sources to which they refer <ref type="bibr" target="#b24">[25]</ref>. We also found a study that estimates content polarization through sentiment analysis. The general sentiment of all content is calculated and the sentiment of each content is taken individually; the greater the difference between these two values, the greater the polarization of the content <ref type="bibr" target="#b25">[26]</ref>.</p><p>In short, to help fight against political disinformative messages and prevent further polarization of society, sophisticated tools are needed. Tools capable of managing the different elements of the political discourse to prevent radicalization. For this, it is essential to know the impact of political messages on people, a task that requires measuring the virality of the messages and the polarization of individuals reactions to them. In this way, disinformative political messages can be refuted before having a major impact, avoiding the bias that exposure to false information creates in people's beliefs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Proposed Research</head><p>Based on the previous analysis of the background and related work, we assume that political disinformation carries multiple risks to society, such as political radicalization and normalization of hate speech toward minorities. To mitigate its effects, there are different manual and automatic refutation strategies, but, due to the large volume of messages created every day, analyzing and refuting all of them is not viable. In this work, we want to solve the research problem of identifying political messages that will have a great impact on people. For this, our research hypothesis is that the impact of a political message is greater when it is published during times of high social or political sensitivity, such as elections, social movements, national crises, etc. The different research questions (RQ) that arise as a result of the above are: RQ1: How does the virality of a political message vary according to the temporal context in which it is published? RQ2: How can LLMs emulate and predict the dynamics of the social media debate provoked by a political message? RQ3: How can the social impact of political message be measured at different points in time? RQ4: What are the periods of high social or political sensitivity during which the publication of a political message has the greatest impact?</p><p>To address the above RQs, we define several objectives (O) and sub-objectives (SO) to be satisfied. Although the first objective is to generate the necessary resources and is a requirement, the rest are related to the following RQs, O2 to RQ1, O3 to RQ2, and O4 to RQ3 and RQ4. The list of objectives is as follows: O1: Generate the resources needed. SO1-1: Build a corpus of disinformative political messages in Spanish spread on Telegram. SO1-2: Represent the social and political context when each message was published.</p><p>O2: Predict the virality of political messages. SO2-1: Train a baseline model to predict the virality of political message in the SO1-1 corpus relying only in the content of the message. SO2-2: Explore which elements of the context captured in SO1-2 improve the performance of the model. SO2-3: Build a model to predict virality with the best configuration found.</p><p>O3: Emulate the debate that could be provoked by political messages. SO3-1: Evaluate the performance of LLMs in predicting existing responses to the resource built in O1S1. SO3-2: Explore which elements of the context captured in SO1-2 improve the performance of the best LLM analysed. SO3-3: Build a DS that injects the selected context elements in SO3-2 together with the political message into the LLM to generate the responses.</p><p>O4: Create a method to automatically estimate whether or not a political message will have a great impact and when it is expected to have the greatest impact.</p><p>SO4-1: Estimate the polarisation of the emulated conversation in O3 for each message item. SO4-2: Calculate the impact of the message with the virality calculated in O2 and the polarity it generates in the responses produced in O3. SO4-3: Divide the messages into topics and analyze whether their impact follows a temporal or social pattern. SO4-4: Group the above steps together to generate a system that estimates the impact of political messages at given moments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Methodology</head><p>We organize the research in four main phases: 1) analysis and study of the domain and existing solutions, 2) defining the problem, the research and its objectives, and 3) experimentation and evaluation. In the first phase, we study the domain of knowledge representation (for O1), the evaluation of virality in social networks (for O2), the generation of responses to posts and news (for O3), and the analysis of the temporal evolution of knowledge (for O4). In addition, we also analyze the main existing solutions, such as Knowledge Graphs for knowledge representation, engagement metrics to measure virality, LLM to generate responses to comments, and concept drift to analyze the evolution of information. In the second phase, we define the problem and the research line that we will follow to solve it, establishing the hypotheses, the research questions and the objectives. Finally, in the third phase, we design the experiments to be carried out and their evaluation to meet the objectives and answer the research questions. The organization of work to meet the objectives is shown in Figure <ref type="figure" target="#fig_2">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions and Future Work</head><p>The main work done is focused on generating the necessary resources (O1). The main difficulty of this objective is to represent the social and political context of each news item. Our approach is to generate an ontology (to be published) and build a Knowledge Graph so that the social and political context at a specific moment in time can be obtained through queries. We are also working on predicting the virality of political messages on social networks. We conduct experiments to analyze which elements of the context are the most useful to improve the accuracy of the prediction (ideology of the speaker, presence of hate speech, if it is tagged as disinformative, whether it is published during the election campaign, etc.). Context has proven to be a key element in our preliminary analysis of virality prediction and we believe it will also be a key element in the generation of responses. As mentioned above, responses to political messages are essential to understand the impact they have on society, so we believe that this work can improve existing systems in the fight against political disinformation. Although the research may be ambitious, we hope to have a system capable of recommending when to refute a disinformative political message and when a message is expected to have the greatest impact.</p><p>We are now past the halfway point of the 2nd year and will continue in accordance with Figure <ref type="figure" target="#fig_2">2</ref>. The next steps will be the prediction of virality and the generation of responses to news. In both objectives, the state of the art will be further explored, and the best approach to tackle the tasks will be decided. We will explore how context affects the models used and what information is most relevant to achieve quality results.  </p><formula xml:id="formula_0">O1 SO1-1 SO1-2 O2 SO2-1 SO2-2 SO2-3 O3 SO3-1 SO3-2 SO3-3 O4 SO4-1 SO4-2 SO4-3 SO4-4</formula></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Information disorders based on [1].</figDesc><graphic coords="2,289.64,92.34,92.22,124.83" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Timeline of the research.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Have a Telegram group of their own: Contando Estrelas, Mediterráneo Digital, Mpr21, El Diestro, Alerta Nacional, and Euskalnews. No known Telegram group of their own: El correo de España and Altavoz de Successos</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work is supported by the Predoctoral Grant (PIPF-2022/COM-25947) of the Consejería de Educación, Ciencia y Universidades de la Comunidad de Madrid, Spain. First, I would like to thank my supervisors Carlos Badenes Olmedo and Óscar Corcho García. Second, I gratefully acknowledge the Universidad Politécnica de Madrid (www.upm.es) for providing computing resources on Magerit Supercomputer.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Fake news, disinformation and misinformation in social media: A review</title>
		<author>
			<persName><forename type="first">E</forename><surname>Aïmeur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Amri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Brassard</surname></persName>
		</author>
		<idno type="DOI">10.1007/s13278-023-01028-5</idno>
	</analytic>
	<monogr>
		<title level="j">Social Network Analysis and Mining</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page">30</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A typology of disinformation intentionality and impact</title>
		<author>
			<persName><forename type="first">A</forename><surname>French</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">C</forename><surname>Storey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wallace</surname></persName>
		</author>
		<idno type="DOI">10.1111/isj.12495</idno>
	</analytic>
	<monogr>
		<title level="j">Information Systems Journal n/a</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<author>
			<persName><forename type="first">J</forename><surname>Rieskamp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mirbabaie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Langer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kocur</surname></persName>
		</author>
		<ptr target="https://hdl.handle.net/10125/106687" />
	</analytic>
	<monogr>
		<title level="m">From Virality to Veracity: Examining False Information on Telegram vs</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Injecting disinformation into public space: pseudo-media and reality-altering narratives</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Sampio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Carratalá</surname></persName>
		</author>
		<idno type="DOI">10.3145/epi.2022.may.12</idno>
	</analytic>
	<monogr>
		<title level="j">Profesional de la información / Information Professional</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Refuting misinformation: Examining theoretical underpinnings of refutational interventions</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Amazeen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Krishna</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.copsyc.2023.101774</idno>
	</analytic>
	<monogr>
		<title level="j">Current Opinion in Psychology</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="page">101774</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Examining characteristics of prebunking strategies to overcome PR disinformation attacks</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Boman</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.pubrev.2021.102105</idno>
	</analytic>
	<monogr>
		<title level="j">Public Relations Review</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page">102105</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Cognitive Biases in Fact-Checking and Their Countermeasures: A Review</title>
		<author>
			<persName><forename type="first">M</forename><surname>Soprano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Roitero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>La</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Barbera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ceolin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Spina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Demartini</surname></persName>
		</author>
		<author>
			<persName><surname>Mizzaro</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ipm.2024.103672</idno>
	</analytic>
	<monogr>
		<title level="j">Information Processing &amp; Management</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="page">103672</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">Y.-L</forename><surname>Chung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Abercrombie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Enock</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rieser</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2307.04761</idno>
		<title level="m">Understanding Counterspeech for Online Harm Mitigation</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The Structural Virality of Online Diffusion</title>
		<author>
			<persName><forename type="first">S</forename><surname>Goel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Anderson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hofman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Watts</surname></persName>
		</author>
		<idno type="DOI">10.1287/mnsc.2015.2158</idno>
	</analytic>
	<monogr>
		<title level="j">Management Science</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="180" to="196" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Measuring and Detecting Virality on Social Media: The Case of Twitter&apos;s Viral Tweets Topic</title>
		<author>
			<persName><forename type="first">T</forename><surname>Elmas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Stephane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Houssiaux</surname></persName>
		</author>
		<idno type="DOI">10.1145/3543873.3587373</idno>
	</analytic>
	<monogr>
		<title level="m">Companion Proceedings of the ACM Web Conference</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">2023</biblScope>
			<biblScope unit="page" from="314" to="317" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A review of dialogue systems: Current trends and future directions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Algherairy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ahmed</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00521-023-09322-1</idno>
	</analytic>
	<monogr>
		<title level="j">Neural Computing and Applications</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="6325" to="6351" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">End-to-end Taskoriented Dialogue: A Survey of Tasks, Methods, and Future Directions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Qin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Che</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/2023.emnlp-main.363</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Bouamor</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Pino</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Bali</surname></persName>
		</editor>
		<meeting>the 2023 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics<address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="5925" to="5941" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">A Survey of the Evolution of Language Model-Based Dialogue Systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Du</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K.-F</forename><surname>Wong</surname></persName>
		</author>
		<idno type="DOI">10.48550/ARXIV.2311.16789</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Fake news detection with generated comments for news articles</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Yanagi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Orihara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Sei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tahara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ohsuga</surname></persName>
		</author>
		<idno type="DOI">10.1109/INES49302.2020.9147195</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 24th International Conference on Intelligent Engineering Systems (INES)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="85" to="90" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Let silence speak: Enhancing fake news detection with generated comments from large language models</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Nan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Sheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2405.16631</idno>
		<idno type="arXiv">arXiv:2405.16631</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">DELL: Generating Reactions and Explanations for LLM-Based Misinformation Detection</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tsvetkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Luo</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2402.10426</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">DI-ALOGPT : Large-Scale Generative Pre-training for Conversational Response Generation</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Galley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-C</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Brockett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Dolan</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/2020.acl-demos.30</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics: System Demonstrations, Association for Computational Linguistics</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Celikyilmaz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T.-H</forename><surname>Wen</surname></persName>
		</editor>
		<meeting>the 58th Annual Meeting of the Association for Computational Linguistics: System Demonstrations, Association for Computational Linguistics</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="270" to="278" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Towards persona-based empathetic conversational models</title>
		<author>
			<persName><forename type="first">P</forename><surname>Zhong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Miao</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/2020.emnlp-main.531</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), Association for Computational Linguistics</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Webber</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Cohn</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>He</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</editor>
		<meeting>the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), Association for Computational Linguistics</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="6556" to="6566" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A Response Generation Framework Based on Empathy Factors, Common Sense, and Persona</title>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Tuerxun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Fan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Diao</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2024.3365533</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="26819" to="26829" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Enhancing Empathetic Response Generation by Augmenting LLMs with Small-scale Empathetic Models</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Yufeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liao</surname></persName>
		</author>
		<idno type="DOI">10.48550/ARXIV.2402.11801</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Evidence-Driven Retrieval Augmented Response Generation for Online Misinformation</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Yue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
		<idno type="DOI">10.48550/ARXIV.2403.14952</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Studying opinion polarization on social media</title>
		<author>
			<persName><forename type="first">T</forename><surname>Jiang</surname></persName>
		</author>
		<idno type="DOI">10.25082/SWSW.2022.02.003</idno>
	</analytic>
	<monogr>
		<title level="j">Social Work and Social Welfare</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="232" to="241" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Effects of network heterogeneity on social media on opinion polarization among south koreans: Focusing on fear and political orientation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Choi</surname></persName>
		</author>
		<idno type="DOI">10.1177/1748048518820499</idno>
	</analytic>
	<monogr>
		<title level="j">International Communication Gazette</title>
		<imprint>
			<biblScope unit="volume">82</biblScope>
			<biblScope unit="page" from="119" to="139" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Measuring polarization with text analysis: Evidence from the uk house of commons</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D</forename><surname>Goet</surname></persName>
		</author>
		<idno type="DOI">10.1017/pan.2019.2</idno>
	</analytic>
	<monogr>
		<title level="j">Political Analysis</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="518" to="539" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>-2015</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A high-dimensional approach to measuring online polarization</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Phillips</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Uyheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Carley</surname></persName>
		</author>
		<idno type="DOI">10.1007/s42001-023-00227-6</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Computational Social Science</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="1147" to="1178" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Measuring Online Political Dialogue: Does Polarization Trigger More Deliberation?</title>
		<author>
			<persName><forename type="first">I.-J</forename><surname>Serrano-Contreras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>García-Marín</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ó</forename><forename type="middle">G</forename><surname>Luengo</surname></persName>
		</author>
		<idno type="DOI">10.17645/mac.v8i4.3149</idno>
	</analytic>
	<monogr>
		<title level="j">Media and Communication</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="63" to="72" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
