MindWare: A Sociotechnical Cognitive Middleware for Countering Coordinated Inauthentic Behavior Article Swipe
The proliferation of Coordinated Inauthentic Behavior (CIB)—specifically the deployment of malicious bot-farms and bot-herds—presents a unique challenge to modern information ecosys- tems. These entities do not merely spread falsehoods; they exploit the cognitive heuristics of human users to manufacture consensus. Traditional defenses against CIB have historically relied on an algorithm-centered paradigm, prioritizing automated detection systems that operate as "black boxes" to classify actors as authentic/ inauthentic. However, this technological determinism faces an inherent "arms race" dilemma: as detection algorithms improve, adversarial actors evolve more sophisticated meth- ods to evade them, creating a perpetual cycle of concealment and detection that often leaves the human user—the ultimate target of influence operations—vulnerable and disempowered. This report proposes "MindWare," a cognitive middleware designed to interrupt the social heuristics exploited by bot networks. MindWare leverages Seamful Design to strategically re- veal the "seams"—the rough edges, inconsistencies, and infrastructural gaps—of digital inter- actions. It operationalizes Social Transparency through a "4W Framework" (Who, What, When, Why) to render the invisible provenance of information visible. By transforming the implicit so- cial signals of CIB (e.g., temporal coordination, network clustering) into explicit visual cues, MindWare acts as a cognitive middleware layer. It disrupts the cognitive heuristics — specifi- cally bandwagon, authority, similarity, and social presence effects—that bot networks exploit to bypass critical thinking. This report details the theoretical underpinnings, system architecture, and evaluation tenets of MindWare, offering a comprehensive blueprint for a resilience-based approach to information integrity.
Related Topics
- Type
- other
- Landing Page
- https://doi.org/10.5281/zenodo.17677083
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W7106222691
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7106222691Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.17677083Digital Object Identifier
- Title
-
MindWare: A Sociotechnical Cognitive Middleware for Countering Coordinated Inauthentic BehaviorWork title
- Type
-
otherOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-12-21Full publication date if available
- Authors
-
Vasireddy, PrithviList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.17677083Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.17677083Direct OA link when available
- Concepts
-
Exploit, Sociotechnical system, Computer science, Heuristics, Software deployment, Computer security, Interoperability, Adversarial system, Cognition, Middleware (distributed applications), Transparency (behavior), Cognitive model, Blueprint, Human–computer interaction, Personalization, Cognitive architecture, Knowledge management, Workflow, Information system, Interrupt, Cognitive load, Social network (sociolinguistics), Social engineering (security), Plan (archaeology)Top concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7106222691 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.17677083 |
| ids.openalex | https://openalex.org/W7106222691 |
| fwci | 0.0 |
| type | other |
| title | MindWare: A Sociotechnical Cognitive Middleware for Countering Coordinated Inauthentic Behavior |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T14394 |
| topics[0].field.id | https://openalex.org/fields/28 |
| topics[0].field.display_name | Neuroscience |
| topics[0].score | 0.06382898986339569 |
| topics[0].domain.id | https://openalex.org/domains/1 |
| topics[0].domain.display_name | Life Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2805 |
| topics[0].subfield.display_name | Cognitive Neuroscience |
| topics[0].display_name | Cognitive Science and Education Research |
| topics[1].id | https://openalex.org/T11147 |
| topics[1].field.id | https://openalex.org/fields/33 |
| topics[1].field.display_name | Social Sciences |
| topics[1].score | 0.04862846061587334 |
| topics[1].domain.id | https://openalex.org/domains/2 |
| topics[1].domain.display_name | Social Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/3312 |
| topics[1].subfield.display_name | Sociology and Political Science |
| topics[1].display_name | Misinformation and Its Impacts |
| topics[2].id | https://openalex.org/T10883 |
| topics[2].field.id | https://openalex.org/fields/33 |
| topics[2].field.display_name | Social Sciences |
| topics[2].score | 0.035001255571842194 |
| topics[2].domain.id | https://openalex.org/domains/2 |
| topics[2].domain.display_name | Social Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/3311 |
| topics[2].subfield.display_name | Safety Research |
| topics[2].display_name | Ethics and Social Impacts of AI |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C165696696 |
| concepts[0].level | 2 |
| concepts[0].score | 0.841251015663147 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q11287 |
| concepts[0].display_name | Exploit |
| concepts[1].id | https://openalex.org/C127627568 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7067301869392395 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1639361 |
| concepts[1].display_name | Sociotechnical system |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6592768430709839 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C127705205 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6310389637947083 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q5748245 |
| concepts[3].display_name | Heuristics |
| concepts[4].id | https://openalex.org/C105339364 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5021167993545532 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2297740 |
| concepts[4].display_name | Software deployment |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.46508243680000305 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C20136886 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4148506224155426 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q749647 |
| concepts[6].display_name | Interoperability |
| concepts[7].id | https://openalex.org/C37736160 |
| concepts[7].level | 2 |
| concepts[7].score | 0.40182870626449585 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1801315 |
| concepts[7].display_name | Adversarial system |
| concepts[8].id | https://openalex.org/C169900460 |
| concepts[8].level | 2 |
| concepts[8].score | 0.3963635265827179 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q2200417 |
| concepts[8].display_name | Cognition |
| concepts[9].id | https://openalex.org/C169468491 |
| concepts[9].level | 2 |
| concepts[9].score | 0.3832939863204956 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q146923 |
| concepts[9].display_name | Middleware (distributed applications) |
| concepts[10].id | https://openalex.org/C2780233690 |
| concepts[10].level | 2 |
| concepts[10].score | 0.33708998560905457 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q535347 |
| concepts[10].display_name | Transparency (behavior) |
| concepts[11].id | https://openalex.org/C161407221 |
| concepts[11].level | 3 |
| concepts[11].score | 0.3171958029270172 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q4382939 |
| concepts[11].display_name | Cognitive model |
| concepts[12].id | https://openalex.org/C155911762 |
| concepts[12].level | 2 |
| concepts[12].score | 0.3104895353317261 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q422321 |
| concepts[12].display_name | Blueprint |
| concepts[13].id | https://openalex.org/C107457646 |
| concepts[13].level | 1 |
| concepts[13].score | 0.2883501350879669 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q207434 |
| concepts[13].display_name | Human–computer interaction |
| concepts[14].id | https://openalex.org/C183003079 |
| concepts[14].level | 2 |
| concepts[14].score | 0.2862032353878021 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q1000371 |
| concepts[14].display_name | Personalization |
| concepts[15].id | https://openalex.org/C20854674 |
| concepts[15].level | 3 |
| concepts[15].score | 0.28485217690467834 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q4386060 |
| concepts[15].display_name | Cognitive architecture |
| concepts[16].id | https://openalex.org/C56739046 |
| concepts[16].level | 1 |
| concepts[16].score | 0.2791023552417755 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q192060 |
| concepts[16].display_name | Knowledge management |
| concepts[17].id | https://openalex.org/C177212765 |
| concepts[17].level | 2 |
| concepts[17].score | 0.27691489458084106 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q627335 |
| concepts[17].display_name | Workflow |
| concepts[18].id | https://openalex.org/C180198813 |
| concepts[18].level | 2 |
| concepts[18].score | 0.27312329411506653 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q121182 |
| concepts[18].display_name | Information system |
| concepts[19].id | https://openalex.org/C41661131 |
| concepts[19].level | 3 |
| concepts[19].score | 0.272839218378067 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q220764 |
| concepts[19].display_name | Interrupt |
| concepts[20].id | https://openalex.org/C61641136 |
| concepts[20].level | 3 |
| concepts[20].score | 0.2711074650287628 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q1107019 |
| concepts[20].display_name | Cognitive load |
| concepts[21].id | https://openalex.org/C4727928 |
| concepts[21].level | 3 |
| concepts[21].score | 0.2673497796058655 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q17164759 |
| concepts[21].display_name | Social network (sociolinguistics) |
| concepts[22].id | https://openalex.org/C70118762 |
| concepts[22].level | 2 |
| concepts[22].score | 0.26614150404930115 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q376934 |
| concepts[22].display_name | Social engineering (security) |
| concepts[23].id | https://openalex.org/C2776505523 |
| concepts[23].level | 2 |
| concepts[23].score | 0.25970813632011414 |
| concepts[23].wikidata | https://www.wikidata.org/wiki/Q4785468 |
| concepts[23].display_name | Plan (archaeology) |
| keywords[0].id | https://openalex.org/keywords/exploit |
| keywords[0].score | 0.841251015663147 |
| keywords[0].display_name | Exploit |
| keywords[1].id | https://openalex.org/keywords/sociotechnical-system |
| keywords[1].score | 0.7067301869392395 |
| keywords[1].display_name | Sociotechnical system |
| keywords[2].id | https://openalex.org/keywords/heuristics |
| keywords[2].score | 0.6310389637947083 |
| keywords[2].display_name | Heuristics |
| keywords[3].id | https://openalex.org/keywords/software-deployment |
| keywords[3].score | 0.5021167993545532 |
| keywords[3].display_name | Software deployment |
| keywords[4].id | https://openalex.org/keywords/interoperability |
| keywords[4].score | 0.4148506224155426 |
| keywords[4].display_name | Interoperability |
| keywords[5].id | https://openalex.org/keywords/adversarial-system |
| keywords[5].score | 0.40182870626449585 |
| keywords[5].display_name | Adversarial system |
| keywords[6].id | https://openalex.org/keywords/cognition |
| keywords[6].score | 0.3963635265827179 |
| keywords[6].display_name | Cognition |
| keywords[7].id | https://openalex.org/keywords/middleware |
| keywords[7].score | 0.3832939863204956 |
| keywords[7].display_name | Middleware (distributed applications) |
| language | |
| locations[0].id | pmh:oai:zenodo.org:17677083 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | submittedVersion |
| locations[0].raw_type | info:eu-repo/semantics/other |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.17677083 |
| authorships[0].author.id | |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Vasireddy, Prithvi |
| authorships[0].countries | MX |
| authorships[0].institutions[0].id | https://openalex.org/I87182695 |
| authorships[0].institutions[0].ror | https://ror.org/https://ror.org/02ahky613 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I87182695 |
| authorships[0].institutions[0].country_code | MX |
| authorships[0].institutions[0].display_name | Universidad del Noreste |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Vasireddy, Prithvi |
| authorships[0].is_corresponding | True |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.17677083 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-11-23T00:00:00 |
| display_name | MindWare: A Sociotechnical Cognitive Middleware for Countering Coordinated Inauthentic Behavior |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-25T14:47:58.456640 |
| primary_topic.id | https://openalex.org/T14394 |
| primary_topic.field.id | https://openalex.org/fields/28 |
| primary_topic.field.display_name | Neuroscience |
| primary_topic.score | 0.06382898986339569 |
| primary_topic.domain.id | https://openalex.org/domains/1 |
| primary_topic.domain.display_name | Life Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2805 |
| primary_topic.subfield.display_name | Cognitive Neuroscience |
| primary_topic.display_name | Cognitive Science and Education Research |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | pmh:oai:zenodo.org:17677083 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | info:eu-repo/semantics/other |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.17677083 |
| primary_location.id | pmh:oai:zenodo.org:17677083 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | submittedVersion |
| primary_location.raw_type | info:eu-repo/semantics/other |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.17677083 |
| publication_date | 2025-12-21 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 17, 94, 118, 155, 191, 231, 235 |
| abstract_inverted_index.By | 170 |
| abstract_inverted_index.It | 150, 195 |
| abstract_inverted_index.an | 51, 74 |
| abstract_inverted_index.as | 60, 66, 79, 190 |
| abstract_inverted_index.by | 128 |
| abstract_inverted_index.do | 27 |
| abstract_inverted_index.of | 5, 12, 37, 97, 109, 167, 177, 228 |
| abstract_inverted_index.on | 50 |
| abstract_inverted_index.to | 20, 40, 63, 90, 122, 135, 162, 213, 238 |
| abstract_inverted_index."4W | 156 |
| abstract_inverted_index.CIB | 46, 178 |
| abstract_inverted_index.and | 15, 99, 112, 144, 206, 225 |
| abstract_inverted_index.bot | 129, 210 |
| abstract_inverted_index.for | 234 |
| abstract_inverted_index.not | 28 |
| abstract_inverted_index.ods | 89 |
| abstract_inverted_index.re- | 137 |
| abstract_inverted_index.so- | 174 |
| abstract_inverted_index.the | 10, 34, 104, 124, 139, 164, 172, 197, 220 |
| abstract_inverted_index.This | 217 |
| abstract_inverted_index.Why) | 161 |
| abstract_inverted_index.acts | 189 |
| abstract_inverted_index.cial | 175 |
| abstract_inverted_index.have | 47 |
| abstract_inverted_index.into | 184 |
| abstract_inverted_index.more | 86 |
| abstract_inverted_index.that | 58, 101 |
| abstract_inverted_index.they | 32 |
| abstract_inverted_index.this | 70 |
| abstract_inverted_index.veal | 138 |
| abstract_inverted_index."arms | 76 |
| abstract_inverted_index.(Who, | 158 |
| abstract_inverted_index.These | 25 |
| abstract_inverted_index.What, | 159 |
| abstract_inverted_index.When, | 160 |
| abstract_inverted_index.cally | 202 |
| abstract_inverted_index.cues, | 187 |
| abstract_inverted_index.cycle | 96 |
| abstract_inverted_index.evade | 91 |
| abstract_inverted_index.faces | 73 |
| abstract_inverted_index.human | 38, 105 |
| abstract_inverted_index.meth- | 88 |
| abstract_inverted_index.often | 102 |
| abstract_inverted_index.race" | 77 |
| abstract_inverted_index.rough | 141 |
| abstract_inverted_index.tems. | 24 |
| abstract_inverted_index.them, | 92 |
| abstract_inverted_index.users | 39 |
| abstract_inverted_index."black | 61 |
| abstract_inverted_index.(e.g., | 179 |
| abstract_inverted_index.Design | 134 |
| abstract_inverted_index.Social | 152 |
| abstract_inverted_index.actors | 65, 84 |
| abstract_inverted_index.boxes" | 62 |
| abstract_inverted_index.bypass | 214 |
| abstract_inverted_index.edges, | 142 |
| abstract_inverted_index.evolve | 85 |
| abstract_inverted_index.inter- | 148 |
| abstract_inverted_index.layer. | 194 |
| abstract_inverted_index.leaves | 103 |
| abstract_inverted_index.merely | 29 |
| abstract_inverted_index.modern | 21 |
| abstract_inverted_index.relied | 49 |
| abstract_inverted_index.render | 163 |
| abstract_inverted_index.report | 115, 218 |
| abstract_inverted_index.social | 125, 207 |
| abstract_inverted_index.spread | 30 |
| abstract_inverted_index.system | 223 |
| abstract_inverted_index.target | 108 |
| abstract_inverted_index.tenets | 227 |
| abstract_inverted_index.unique | 18 |
| abstract_inverted_index.visual | 186 |
| abstract_inverted_index.— | 200 |
| abstract_inverted_index.Seamful | 133 |
| abstract_inverted_index.against | 45 |
| abstract_inverted_index.details | 219 |
| abstract_inverted_index.digital | 147 |
| abstract_inverted_index.ecosys- | 23 |
| abstract_inverted_index.exploit | 33, 212 |
| abstract_inverted_index.network | 182 |
| abstract_inverted_index.operate | 59 |
| abstract_inverted_index.signals | 176 |
| abstract_inverted_index.systems | 57 |
| abstract_inverted_index.through | 154 |
| abstract_inverted_index.Behavior | 8 |
| abstract_inverted_index.However, | 69 |
| abstract_inverted_index.MindWare | 131, 188 |
| abstract_inverted_index.actions. | 149 |
| abstract_inverted_index.approach | 237 |
| abstract_inverted_index.classify | 64 |
| abstract_inverted_index.creating | 93 |
| abstract_inverted_index.critical | 215 |
| abstract_inverted_index.defenses | 44 |
| abstract_inverted_index.designed | 121 |
| abstract_inverted_index.dilemma: | 78 |
| abstract_inverted_index.disrupts | 196 |
| abstract_inverted_index.entities | 26 |
| abstract_inverted_index.explicit | 185 |
| abstract_inverted_index.implicit | 173 |
| abstract_inverted_index.improve, | 82 |
| abstract_inverted_index.inherent | 75 |
| abstract_inverted_index.networks | 211 |
| abstract_inverted_index.offering | 230 |
| abstract_inverted_index.presence | 208 |
| abstract_inverted_index.proposes | 116 |
| abstract_inverted_index.specifi- | 201 |
| abstract_inverted_index.temporal | 180 |
| abstract_inverted_index.ultimate | 107 |
| abstract_inverted_index.visible. | 169 |
| abstract_inverted_index.MindWare, | 229 |
| abstract_inverted_index.automated | 55 |
| abstract_inverted_index.blueprint | 233 |
| abstract_inverted_index.bot-farms | 14 |
| abstract_inverted_index.challenge | 19 |
| abstract_inverted_index.cognitive | 35, 119, 192, 198 |
| abstract_inverted_index.detection | 56, 80, 100 |
| abstract_inverted_index.exploited | 127 |
| abstract_inverted_index.influence | 110 |
| abstract_inverted_index.interrupt | 123 |
| abstract_inverted_index.invisible | 165 |
| abstract_inverted_index.leverages | 132 |
| abstract_inverted_index.malicious | 13 |
| abstract_inverted_index.networks. | 130 |
| abstract_inverted_index.paradigm, | 53 |
| abstract_inverted_index.perpetual | 95 |
| abstract_inverted_index.thinking. | 216 |
| abstract_inverted_index.Framework" | 157 |
| abstract_inverted_index.algorithms | 81 |
| abstract_inverted_index.authentic/ | 67 |
| abstract_inverted_index.authority, | 204 |
| abstract_inverted_index.bandwagon, | 203 |
| abstract_inverted_index.deployment | 11 |
| abstract_inverted_index.evaluation | 226 |
| abstract_inverted_index.heuristics | 36, 126, 199 |
| abstract_inverted_index.middleware | 120, 193 |
| abstract_inverted_index.provenance | 166 |
| abstract_inverted_index."MindWare," | 117 |
| abstract_inverted_index.<div> | 0, 1, 2 |
| abstract_inverted_index.Coordinated | 6 |
| abstract_inverted_index.Inauthentic | 7 |
| abstract_inverted_index.adversarial | 83 |
| abstract_inverted_index.clustering) | 183 |
| abstract_inverted_index.concealment | 98 |
| abstract_inverted_index.determinism | 72 |
| abstract_inverted_index.falsehoods; | 31 |
| abstract_inverted_index.information | 22, 168, 239 |
| abstract_inverted_index.manufacture | 41 |
| abstract_inverted_index.similarity, | 205 |
| abstract_inverted_index.theoretical | 221 |
| abstract_inverted_index.</div> | 241, 242, 243 |
| abstract_inverted_index.<p>The | 3 |
| abstract_inverted_index.Transparency | 153 |
| abstract_inverted_index.historically | 48 |
| abstract_inverted_index.inauthentic. | 68 |
| abstract_inverted_index.prioritizing | 54 |
| abstract_inverted_index.transforming | 171 |
| abstract_inverted_index.<p>This | 114 |
| abstract_inverted_index.architecture, | 224 |
| abstract_inverted_index.comprehensive | 232 |
| abstract_inverted_index.coordination, | 181 |
| abstract_inverted_index.gaps—of | 146 |
| abstract_inverted_index.proliferation | 4 |
| abstract_inverted_index.sophisticated | 87 |
| abstract_inverted_index.strategically | 136 |
| abstract_inverted_index.technological | 71 |
| abstract_inverted_index.underpinnings, | 222 |
| abstract_inverted_index.user—the | 106 |
| abstract_inverted_index.infrastructural | 145 |
| abstract_inverted_index.operationalizes | 151 |
| abstract_inverted_index.inconsistencies, | 143 |
| abstract_inverted_index.resilience-based | 236 |
| abstract_inverted_index."seams"—the | 140 |
| abstract_inverted_index.algorithm-centered | 52 |
| abstract_inverted_index.effects—that | 209 |
| abstract_inverted_index.<p>Traditional | 43 |
| abstract_inverted_index.consensus.</p> | 42 |
| abstract_inverted_index.integrity.</p> | 240 |
| abstract_inverted_index.disempowered.</p> | 113 |
| abstract_inverted_index.(CIB)—specifically | 9 |
| abstract_inverted_index.bot-herds—presents | 16 |
| abstract_inverted_index.operations—vulnerable | 111 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile |