Global Security and Intelligence Studies Volume 5, Number 1, Spring / Summer 2020 | Page 66
Global Security and Intelligence Studies
https://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html.
Howard, Phillip, Samuel Woolley, and Ryan Calo. 2018. “Algorithms, Bots, and
Political Communication in the US 2016 Election: The Challenge of Automated
Political Communication for Election Law and Administration.” Journal of Information
Technology & Politics 15 (2): 81–93.
Insikt Group. 2019. “Beyond Hybrid War: How China Exploits Social Media to
Sway American Opinion.” Last modified March 6, 2019. https://www.recordedfu
ture.com/china-social-media-operations/.
Iqbal, Mansoor. 2019. “Twitch Revenue and Usage Statistics (2019).” Last modified
February 27, 2019. https://www.businessofapps.com/data/twitch-statistics/
Kinyondo, Abel. 2019. “Is China Recolonizing Africa? Some Views from Tanzania.”
World Affairs 182 (2): 128–64.
Lee, Kyumin, James Caverlee, and Steve Webb. 2010. “Uncovering Social Spammers:
Social Honeypots + Machine Learning.” SIGIR 10: 435–42.
Loyola-Gonzalez, O., Monroy, R., Rodriguez, J., Lopez-Cuevas, A., & Mata-Sanchez,
J. I. (2019). Contrast Pattern-Based Classification for Bot Detection on Twitter.
IEEE Access, 7, 45800-45817. doi:10.1109/access.2019.2904220
Manheim, Karl and Lyric Kaplan. 2019. “Artificial Intelligence: Risks to Privacy
and Democracy.” The Yale Journal of Law and Technology 21 (106): 106–88.
National Telecommunications and Information Administration. 2018. “Digital
National Data Explorer.” Last modified June 6, 2018. https://www.ntia.doc.gov/
data/digital-nation-data-explorer#sel=homeInternetUser&demo=&pc=prop&
disp=chart.
Pew Research Center. 2018. “Social Media Use in 2018.” Last modified March 1,
2018. https://www.pewresearch.org/internet/2018/03/01/social-media-use-in-
2018/.
———. 2019. “Social Media Fact Sheet.” Last modified June 12, 2019. https://www.
pewresearch.org/internet/fact-sheet/social-media/.
Prier. “Commanding the Trend: Social Media as Information Warfare.” Strategic
Studies Quarterly 11 (4): 51–85.
52