Global Security and Intelligence Studies Volume 5, Number 1, Spring / Summer 2020 | Page 66

Global Security and Intelligence Studies https://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html. Howard, Phillip, Samuel Woolley, and Ryan Calo. 2018. “Algorithms, Bots, and Political Communication in the US 2016 Election: The Challenge of Automated Political Communication for Election Law and Administration.” Journal of Information Technology & Politics 15 (2): 81–93. Insikt Group. 2019. “Beyond Hybrid War: How China Exploits Social Media to Sway American Opinion.” Last modified March 6, 2019. https://www.recordedfu ture.com/china-social-media-operations/. Iqbal, Mansoor. 2019. “Twitch Revenue and Usage Statistics (2019).” Last modified February 27, 2019. https://www.businessofapps.com/data/twitch-statistics/ Kinyondo, Abel. 2019. “Is China Recolonizing Africa? Some Views from Tanzania.” World Affairs 182 (2): 128–64. Lee, Kyumin, James Caverlee, and Steve Webb. 2010. “Uncovering Social Spammers: Social Honeypots + Machine Learning.” SIGIR 10: 435–42. Loyola-Gonzalez, O., Monroy, R., Rodriguez, J., Lopez-Cuevas, A., & Mata-Sanchez, J. I. (2019). Contrast Pattern-Based Classification for Bot Detection on Twitter. IEEE Access, 7, 45800-45817. doi:10.1109/access.2019.2904220 Manheim, Karl and Lyric Kaplan. 2019. “Artificial Intelligence: Risks to Privacy and Democracy.” The Yale Journal of Law and Technology 21 (106): 106–88. National Telecommunications and Information Administration. 2018. “Digital National Data Explorer.” Last modified June 6, 2018. https://www.ntia.doc.gov/ data/digital-nation-data-explorer#sel=homeInternetUser&demo=&pc=prop& disp=chart. Pew Research Center. 2018. “Social Media Use in 2018.” Last modified March 1, 2018. https://www.pewresearch.org/internet/2018/03/01/social-media-use-in- 2018/. ———. 2019. “Social Media Fact Sheet.” Last modified June 12, 2019. https://www. pewresearch.org/internet/fact-sheet/social-media/. Prier. “Commanding the Trend: Social Media as Information Warfare.” Strategic Studies Quarterly 11 (4): 51–85. 52