Skip to main content

Showing 1–34 of 34 results for author: Savage, S

  1. arXiv:2405.09757  [pdf, other

    cs.CR

    Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates

    Authors: Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn

    Abstract: Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they mak… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Under review

  2. arXiv:2405.02528  [pdf, other

    cs.HC

    GigSense: An LLM-Infused Tool forWorkers' Collective Intelligence

    Authors: Kashif Imteyaz, Claudia Flores-Saviaga, Saiph Savage

    Abstract: Collective intelligence among gig workers yields considerable advantages, including improved information exchange, deeper social bonds, and stronger advocacy for better labor conditions. Especially as it enables workers to collaboratively pinpoint shared challenges and devise optimal strategies for addressing these issues. However, enabling collective intelligence remains challenging, as existing… ▽ More

    Submitted 20 May, 2024; v1 submitted 3 May, 2024; originally announced May 2024.

  3. arXiv:2403.09986  [pdf, other

    cs.CY cs.HC cs.SI

    Designing Sousveillance Tools for Gig Workers

    Authors: Maya De Los Santos, Kimberly Do, Michael Muller, Saiph Savage

    Abstract: As independently-contracted employees, gig workers disproportionately suffer the consequences of workplace surveillance, which include increased pressures to work, breaches of privacy, and decreased digital autonomy. Despite the negative impacts of workplace surveillance, gig workers lack the tools, strategies, and workplace social support to protect themselves against these harms. Meanwhile, some… ▽ More

    Submitted 23 March, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: Published as a conference paper at the ACM Conference on Human Factors in Computing Systems, CHI 2024, 3 figures, 30 pages

  4. arXiv:2403.02768  [pdf, other

    cs.CY

    An Empirical Analysis on the Use and Reporting of National Security Letters

    Authors: Alex Bellon, Miro Haller, Andrey Labunets, Enze Liu, Stefan Savage

    Abstract: National Security Letters (NSLs) are similar to administrative subpoenas and can be issued directly by elements of the executive branch without requiring prior approval from a court or grand jury. Importantly, NSLs authorize the imposition of nondisclosure orders (aka "gag orders") on the receiving party. Controversy about potential abuses of this authority has driven a range of legal and policy d… ▽ More

    Submitted 10 April, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted as short presentation at CSLAW 2024 (not in proceeding): https://computersciencelaw.org/2024/accepted-papers/

  5. arXiv:2402.12667  [pdf, other

    cs.CY

    Remote Possibilities: Where there is a WIL, is there a Way? AI Education for Remote Learners in a New Era of Work-Integrated-Learning

    Authors: Derek Jacoby, Saiph Savage, Yvonne Coady

    Abstract: Increasing diversity in educational settings is challenging in part due to the lack of access to resources for non-traditional learners in remote communities. Post-pandemic platforms designed specifically for remote and hybrid learning -- supporting team-based collaboration online -- are positioned to bridge this gap. Our work combines the use of these new platforms with co-creation and collaborat… ▽ More

    Submitted 11 April, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  6. arXiv:2312.00580  [pdf, other

    cs.CR cs.NI

    Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild

    Authors: Katherine Izhikevich, Geoff Voelker, Stefan Savage, Liz Izhikevich

    Abstract: In this work, we analyze to what extent actors target poorly-secured cloud storage buckets for attack. We deployed hundreds of AWS S3 honeybuckets with different names and content to lure and measure different scanning strategies. Actors exhibited clear preferences for scanning buckets that appeared to belong to organizations, especially commercial entities in the technology sector with a vulnerab… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

  7. Inclusive Portraits: Race-Aware Human-in-the-Loop Technology

    Authors: Claudia Flores-Saviaga, Christopher Curtis, Saiph Savage

    Abstract: AI has revolutionized the processing of various services, including the automatic facial verification of people. Automated approaches have demonstrated their speed and efficiency in verifying a large volume of faces, but they can face challenges when processing content from certain communities, including communities of people of color. This challenge has prompted the adoption of "human-in-the-loop… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Journal ref: Equity and Access in Algorithms, Mechanisms, and Optimization (EAAMO 2023)

  8. arXiv:2302.07287  [pdf, other

    cs.CR

    Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

    Authors: Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage

    Abstract: The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding -- used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such em… ▽ More

    Submitted 19 April, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: The paper appeared at the 8th IEEE European Symposium on Security and Privacy

    Journal ref: The 8th IEEE European Symposium on Security and Privacy, 2023

  9. The Global Care Ecosystems of 3D Printed Assistive Devices

    Authors: Saiph Savage, Claudia Flores-Saviaga, Rachel Rodney, Liliana Savage, Jon Schull, Jennifer Mankoff

    Abstract: The popularity of 3D printed assistive technology has led to the emergence of new ecosystems of care, where multiple stakeholders (makers, clinicians, and recipients with disabilities) work toward creating new upper limb prosthetic devices. However, despite the increasing growth, we currently know little about the differences between these care ecosystems. Medical regulations and the prevailing cu… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Journal ref: ACM Transactions on Accessible Computing, Vol. 15, No. 4, Article 31. October 2022

  10. arXiv:2210.13594  [pdf, other

    cs.SI cs.AI cs.HC

    Datavoidant: An AI System for Addressing Political Data Voids on Social Media

    Authors: Claudia Flores-Saviaga, Shangbin Feng, Saiph Savage

    Abstract: The limited information (data voids) on political topics relevant to underrepresented communities has facilitated the spread of disinformation. Independent journalists who combat disinformation in underrepresented communities have reported feeling overwhelmed because they lack the tools necessary to make sense of the information they monitor and address the data voids. In this paper, we present a… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Journal ref: CSCW 2022: The 25th ACM Conference On Computer Supported Cooperative Work And Social Computing

  11. arXiv:2203.10188  [pdf, other

    cs.CR

    Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild

    Authors: Audrey Randall, Peter Snyder, Alisha Ukani, Alex Snoeren, Geoff Voelker, Stefan Savage, Aaron Schulman

    Abstract: This work presents a systematic study of navigational tracking, the latest development in the cat-and-mouse game between browsers and online trackers. Navigational tracking allows trackers to 'aggregate users' activities and behaviors across sites by modifying their navigation requests. This technique is particularly important because it circumvents the increasing efforts by browsers to partition… ▽ More

    Submitted 12 July, 2022; v1 submitted 18 March, 2022; originally announced March 2022.

  12. Quantifying the Invisible Labor in Crowd Work

    Authors: Carlos Toxtli, Siddharth Suri, Saiph Savage

    Abstract: Crowdsourcing markets provide workers with a centralized place to find paid work. What may not be obvious at first glance is that, in addition to the work they do for pay, crowd workers also have to shoulder a variety of unpaid invisible labor in these markets, which ultimately reduces workers' hourly wages. Invisible labor includes finding good tasks, messaging requesters, or managing payments. H… ▽ More

    Submitted 30 September, 2021; originally announced October 2021.

    Comments: 26 pages, 6 figures, CSCW 2021

    ACM Class: J.4; K.4.2

  13. arXiv:2105.13442  [pdf, other

    cs.CR

    Hopper: Modeling and Detecting Lateral Movement (Extended Report)

    Authors: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopper constructs a graph of login activity among internal machines and then identifies suspicious seque… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Usenix Security Symposium 2021

  14. arXiv:2012.15211  [pdf, other

    cs.HC

    The Challenges of Crowd Workers in Rural and Urban America

    Authors: Claudia Flores-Saviaga, Yuwen Li, Benjamin V. Hanrahan, Jeffrey Bigham, Saiph Savage

    Abstract: Crowd work has the potential of helping the financial recovery of regions traditionally plagued by a lack of economic opportunities, e.g., rural areas. However, we currently have limited information about the challenges facing crowd work-ers from rural and super rural areas as they struggle to make a living through crowd work sites. This paper examines the challenges and advantages of rural and su… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

    Journal ref: Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 2020

  15. arXiv:2012.00215  [pdf, other

    cs.SI cs.HC

    Audience and Streamer Participation at Scale on Twitch

    Authors: Claudia Flores-Saviaga, Jessica Hammer, Juan Pablo Flores, Joseph Seering, Stuart Reeves, Saiph Savage

    Abstract: Large-scale streaming platforms such as Twitch are becoming increasingly popular, but detailed audience-streamer interaction dynamics remain unexplored at scale. In this paper, we perform a mixed-methods study on a dataset with over 12 million audience chat messages and 45 hours of streaming video to understand audience participation and streamer performance on Twitch. We uncover five types of str… ▽ More

    Submitted 30 November, 2020; originally announced December 2020.

  16. Fighting Disaster Misinformation in Latin America: The #19S Mexican Earthquake Case Study

    Authors: Claudia Flores-Saviaga, Saiph Savage

    Abstract: Social media platforms have been extensively used during natural disasters. However, most prior work has lacked focus on studying their usage during disasters in the Global South, where Internet access and social media utilization differs from developing countries. In this paper, we study how social media was used in the aftermath of the 7.1-magnitude earthquake that hit Mexico on September 19 of… ▽ More

    Submitted 11 July, 2020; originally announced July 2020.

    Journal ref: Springer - Personal and Ubiquitous Computing 2020

  17. arXiv:2005.06022  [pdf, other

    cs.HC cs.AI cs.LG

    Reputation Agent: Prompting Fair Reviews in Gig Markets

    Authors: Carlos Toxtli, Angela Richmond-Fuller, Saiph Savage

    Abstract: Our study presents a new tool, Reputation Agent, to promote fairer reviews from requesters (employers or customers) on gig markets. Unfair reviews, created when requesters consider factors outside of a worker's control, are known to plague gig workers and can result in lost job opportunities and even termination from the marketplace. Our tool leverages machine learning to implement an intelligent… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: 12 pages, 5 figures, The Web Conference 2020, ACM WWW 2020

    ACM Class: I.2.7

  18. Becoming the Super Turker: Increasing Wages via a Strategy from High Earning Workers

    Authors: Saiph Savage, Chun-Wei Chiang, Susumu Saito, Carlos Toxtli, Jeffrey Bigham

    Abstract: Crowd markets have traditionally limited workers by not providing transparency information concerning which tasks pay fairly or which requesters are unreliable. Researchers believe that a key reason why crowd workers earn low wages is due to this lack of transparency. As a result, tools have been developed to provide more transparency within crowd markets to help workers. However, while most worke… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: 12.pages, 8 figures, The Web Conference 202, ACM WWW 2020

    ACM Class: I.2.7

  19. arXiv:1910.00790  [pdf, other

    cs.CR cs.SI

    Detecting and Characterizing Lateral Phishing at Scale

    Authors: Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefitting from both the implicit trust and the information in the hijacked user's account. We develop a cl… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Extended report of conference paper presented at the 26th USENIX Security Symposium (USENIX Security 19). USENIX Association, 2019

  20. arXiv:1906.10736  [pdf

    cs.SI

    Anti-Latinx Computational Propaganda in the United States

    Authors: Claudia Flores-Saviaga, Saiph Savage

    Abstract: Given that the Latino community is the second largest ethnic group in the US, an understanding of how Latinos are discussed and targeted on social media during US elections is crucial. This paper explores these questions through a data analysis on Reddit, one of the most prominent and popular social media platforms for political discussion. We collected Reddit posts mentioning Latinos and the US m… ▽ More

    Submitted 27 June, 2019; v1 submitted 25 June, 2019; originally announced June 2019.

    Journal ref: Institute of the Future Report 2019

  21. arXiv:1905.12407  [pdf, other

    stat.ML cs.LG

    Non-linear Multitask Learning with Deep Gaussian Processes

    Authors: Ayman Boustati, Theodoros Damoulas, Richard S. Savage

    Abstract: We present a multi-task learning formulation for Deep Gaussian processes (DGPs), through non-linear mixtures of latent processes. The latent space is composed of private processes that capture within-task information and shared processes that capture across-task dependencies. We propose two different methods for segmenting the latent space: through hard coding shared and task-specific processes or… ▽ More

    Submitted 23 February, 2020; v1 submitted 29 May, 2019; originally announced May 2019.

  22. TurkScanner: Predicting the Hourly Wage of Microtasks

    Authors: Susumu Saito, Chun-Wei Chiang, Saiph Savage, Teppei Nakano, Tetsunori Kobayashi, Jeffrey Bigham

    Abstract: Workers in crowd markets struggle to earn a living. One reason for this is that it is difficult for workers to accurately gauge the hourly wages of microtasks, and they consequently end up performing labor with little pay. In general, workers are provided with little information about tasks, and are left to rely on noisy signals, such as textual description of the task or rating of the requester.… ▽ More

    Submitted 17 March, 2019; originally announced March 2019.

    Comments: Proceedings of the 28th International Conference on World Wide Web (WWW '19), San Francisco, CA, USA, May 13-17, 2019

  23. arXiv:1902.05361  [pdf, ps, other

    cs.HC

    Crowd Work on a CV? Understanding How AMT Fits into Turkers' Career Goals and Professional Profiles

    Authors: Anna Kasunic, Chun-Wei Chiang, Geoff Kaufman, Saiph Savage

    Abstract: In 2013, scholars laid out a framework for a sustainable, ethical future of crowd work, recommending career ladders so that crowd work can lead to career advancement and more economic mobility. Five years later, we consider this vision in the context of Amazon Mechanical Turk (AMT). To understand how workers currently view their experiences on AMT, and how they publicly present and share these exp… ▽ More

    Submitted 13 February, 2019; originally announced February 2019.

    Comments: 4 pages

  24. Crowd Coach: Peer Coaching for Crowd Workers' Skill Growth

    Authors: Chun-Wei Chiang, Anna Kasunic, Saiph Savage

    Abstract: Traditional employment usually provides mechanisms for workers to improve their skills to access better opportunities. However, crowd work platforms like Amazon Mechanical Turk (AMT) generally do not support skill development (i.e., becoming faster and better at work). While researchers have started to tackle this problem, most solutions are dependent on experts or requesters willing to help. Howe… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

    Comments: 17 pages, 4 figures

    Journal ref: Chun-Wei Chiang, Anna Kasunic, and Saiph Savage. 2018. Crowd Coach: Peer Coaching for Crowd Workers' Skill Growth. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 37 (November 2018), 17 pages. DOI: https://doi.org/10.1145/3274306

  25. arXiv:1806.00429  [pdf, other

    cs.SI

    Mobilizing the Trump Train: Understanding Collective Action in a Political Trolling Community

    Authors: Claudia Flores-Saviaga, Brian C. Keegan, Saiph Savage

    Abstract: Political trolls initiate online discord not only for the lulz (laughs) but also for ideological reasons, such as promoting their desired political candidates. Political troll groups recently gained spotlight because they were considered central in helping Donald Trump win the 2016 US presidential election, which involved difficult mass mobilizations. Political trolls face unique challenges as the… ▽ More

    Submitted 1 June, 2018; originally announced June 2018.

    Journal ref: International 12th AAAI Conference on Web and Social Media (ICWSM 2018)

  26. Blockchain for Trustful Collaborations between Immigrants and Governments

    Authors: Chun-Wei Chiang, Eber Betanzos, Saiph Savage

    Abstract: Immigrants usually are pro-social towards their hometowns and try to improve them. However, the lack of trust in their government can drive immigrants to work individually. As a result, their pro-social activities are usually limited in impact and scope. This paper studies the interface factors that ease collaborations between immigrants and their home governments. We specifically focus on Mexican… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.

    Comments: 6 pages, 6 figures

    Journal ref: Proceeding CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems Paper No. LBW531

  27. Understanding Interface Design and Mobile Money Perceptions in Latin America

    Authors: Chun-Wei Chiang, Caroline Anderson, Claudia Flores-Saviaga, Eduardo Jr Arenas, Felipe Colin, Mario Romero, Cuauhtemoc Rivera-Loaiza, Norma Elva Chavez, Saiph Savage

    Abstract: Mobile money can facilitate financial inclusion in developing countries, which usually have high mobile phone use and steady remittance activity. Many countries in Latin America meet the minimum technological requirements to use mobile money, however, the adoption in this region is relatively low. This paper investigates the different factors that lead people in Latin America to distrust and there… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: 8 pages, 5 figures, CLIHC'17

    ACM Class: H.5.2

    Journal ref: 2017. In Proceedings of the 8th Latin American Conference on Human-Computer Interaction (CLIHC '17). ACM, New York, NY, USA, Article 5, 8 pages

  28. arXiv:1712.05796  [pdf

    cs.CY cs.HC

    A Data-Driven Analysis of Workers' Earnings on Amazon Mechanical Turk

    Authors: Kotaro Hara, Abi Adams, Kristy Milland, Saiph Savage, Chris Callison-Burch, Jeffrey Bigham

    Abstract: A growing number of people are working as part of on-line crowd work, which has been characterized by its low wages; yet, we know little about wage distribution and causes of low/high earnings. We recorded 2,676 workers performing 3.8 million tasks on Amazon Mechanical Turk. Our task-level analysis revealed that workers earned a median hourly wage of only ~\$2/h, and only 4% earned more than \$7.2… ▽ More

    Submitted 28 December, 2017; v1 submitted 14 December, 2017; originally announced December 2017.

    Comments: Conditionally accepted for inclusion in the 2018 ACM Conference on Human Factors in Computing Systems (CHI'18) Papers program

  29. arXiv:1710.03330  [pdf, other

    cs.SI

    Redes sociales, participación ciudadana y la hipótesis del slacktivismo: lecciones del caso de "El Bronco" / Social Media, Civic Engagement, and the Slacktivism Hypothesis: Lessons from Mexico's "El Bronco"

    Authors: Philip N. Howard, Saiph Savage, Claudia Flores-Saviaga, Carlos Toxtli, Andres Monroy-Hernández

    Abstract: El uso de las redes sociales tiene consecuencias positivas o negativas en la participación ciudadana? La gran parte de los intentos por responder a esta pregunta incluyen datos de la opinión pública de los Estados Unidos, por lo que nosotros ofrecemos un estudio sobre un caso significativo de México, donde un candidato independiente utilizó las redes sociales para comunicarse con el público y rehu… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

  30. Automated Assistants to Identify and Prompt Action on Visual News Bias

    Authors: Vishwajeet Narwal, Mohamed Hashim Salih, Jose Angel Lopez, Angel Ortega, John O'Donovan, Tobias Höllerer, Saiph Savage

    Abstract: Bias is a common problem in today's media, appearing frequently in text and in visual imagery. Users on social media websites such as Twitter need better methods for identifying bias. Additionally, activists --those who are motivated to effect change related to some topic, need better methods to identify and counteract bias that is contrary to their mission. With both of these use cases in mind, i… ▽ More

    Submitted 10 March, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Comments: 6 pages, 6 figures, (Accepted) CHI 17 Extended Abstracts, May 06-11, 2017, Denver, CO, USA

    ACM Class: K.4.2

  31. Botivist: Calling Volunteers to Action Using Online Bots

    Authors: Saiph Savage, Andres Monroy-Hernandez, Tobias Hollerer

    Abstract: To help activists call new volunteers to action, we present Botivist: a platform that uses Twitter bots to find potential volunteers and request contributions. By leveraging different Twitter accounts, Botivist employs different strategies to encourage participation. We explore how people respond to bots calling them to action using a test case about corruption in Latin America. Our results show t… ▽ More

    Submitted 20 September, 2015; originally announced September 2015.

    Comments: 9 pages, 3 figures, CSCW'16

    ACM Class: H.5.2

  32. arXiv:1509.01095  [pdf, other

    cs.SI cs.CY

    Tag Me Maybe: Perceptions of Public Targeted Sharing on Facebook

    Authors: Saiph Savage, Andres Monroy-Hernandez, Kasturi Bhattacharjee, Tobias Hollerer

    Abstract: Social network sites allow users to publicly tag people in their posts. These tagged posts allow users to share to both the general public and a targeted audience, dynamically assembled via notifications that alert the people mentioned. We investigate people's perceptions of this mixed sharing mode through a qualitative study with 120 participants. We found that individuals like this sharing modal… ▽ More

    Submitted 3 September, 2015; originally announced September 2015.

    Comments: 5 pages, one figure, Hypertext 2016

    ACM Class: H.5.3

  33. arXiv:1507.07109  [pdf

    cs.SI cs.CY physics.soc-ph

    Political Bots and the Manipulation of Public Opinion in Venezuela

    Authors: Michelle Forelle, Phil Howard, Andrés Monroy-Hernández, Saiph Savage

    Abstract: Social and political bots have a small but strategic role in Venezuelan political conversations. These automated scripts generate content through social media platforms and then interact with people. In this preliminary study on the use of political bots in Venezuela, we analyze the tweeting, following and retweeting patterns for the accounts of prominent Venezuelan politicians and prominent Venez… ▽ More

    Submitted 25 July, 2015; originally announced July 2015.

    Comments: 8 pages, 3 figures

    ACM Class: H.5.3

  34. Participatory Militias: An Analysis of an Armed Movement's Online Audience

    Authors: Saiph Savage, Andrés Monroy-Hernández

    Abstract: Armed groups of civilians known as "self-defense forces" have ousted the powerful Knights Templar drug cartel from several towns in Michoacan. This militia uprising has unfolded on social media, particularly in the "VXM" ("Valor por Michoacan," Spanish for "Courage for Michoacan") Facebook page, gathering more than 170,000 fans. Previous work on the Drug War has documented the use of social media… ▽ More

    Submitted 6 February, 2015; originally announced February 2015.

    Comments: Participatory Militias: An Analysis of an Armed Movement's Online Audience. Saiph Savage, Andres Monroy-Hernandez. CSCW: ACM Conference on Computer-Supported Cooperative Work 2015

    ACM Class: H.5.3