{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:09:15Z","timestamp":1744207755616},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T00:00:00Z","timestamp":1520553600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10796-018-9837-8","type":"journal-article","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T16:06:48Z","timestamp":1520611608000},"page":"961-979","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Analysis and Early Detection of Rumors in a Post Disaster Scenario"],"prefix":"10.1007","volume":"20","author":[{"given":"Tamal","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Prithviraj","family":"Pramanik","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Naiwrita","family":"Boral","sequence":"additional","affiliation":[]},{"given":"Saptarshi","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,9]]},"reference":[{"key":"9837_CR1","doi-asserted-by":"crossref","unstructured":"Asur, Sitaram, and Bernardo A. Huberman. \"Predicting the future with social media.\" In Proceedings of IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent technology (WI-IAT), 2010, vol. 1, pp. 492-499. IEEE, 2010.","DOI":"10.1109\/WI-IAT.2010.63"},{"key":"9837_CR2","doi-asserted-by":"crossref","unstructured":"Bao, Y., Yi, C., Xue, Y., Dong, Y. (2013). A new rumor propagation model and control strategy on social networks. In Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1472-1473. ACM.","DOI":"10.1145\/2492517.2492599"},{"issue":"1","key":"9837_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1177\/019027250406700105","volume":"67","author":"P Bordia","year":"2004","unstructured":"Bordia, P., & DiFonzo, N. (2004). Problem solving in social interactions on the internet: Rumor as social cognition. Social Psychology Quarterly, 67(1), 33\u201349.","journal-title":"Social Psychology Quarterly"},{"issue":"1","key":"9837_CR4","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1086\/267297","volume":"29","author":"HT Buckner","year":"1965","unstructured":"Buckner, H. T. (1965). A theory of rumor transmission. Public Opinion Quarterly, 29(1), 54\u201370.","journal-title":"Public Opinion Quarterly"},{"issue":"5","key":"9837_CR5","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s10796-017-9741-7","volume":"19","author":"Y Choi","year":"2017","unstructured":"Choi, Y., & Lee, H. (2017). Data properties and the performance of sentiment classification for electronic commerce applications. Information Systems Frontiers, 19(5), 993\u20131012.","journal-title":"Information Systems Frontiers"},{"key":"9837_CR6","unstructured":"Corvey, W.J., Vieweg, S., Rood, T., Palmer, M. (2010). Twitter in mass emergency: what NLP techniques can contribute. In Proceedings of the NAACL HLT 2010 Workshop on Computational Linguistics in a World of Social Media, 23\u201324. Association for Computational Linguistics."},{"key":"9837_CR7","doi-asserted-by":"crossref","unstructured":"Dayani, R., Chhabra, N., Kadian, T., Kaushal, R. (2015). Rumor detection in twitter: An analysis in retrospect. In Proceedings of IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 1-3. IEEE.","DOI":"10.1109\/ANTS.2015.7413660"},{"key":"9837_CR8","unstructured":"Dayani, R., Chhabra, N., Kadian, T., Kaushal, R. (n.d.). Rumor: Detecting Misinformation in Twitter, 3rd Security and Privacy Symposium, 2015. IIIT Delhi, Poster Session"},{"key":"9837_CR9","doi-asserted-by":"crossref","unstructured":"Denecke, K. (2008). Using sentiwordnet for multilingual sentiment analysis. Data engineering workshop, 2008 with IEEE ICDEW.","DOI":"10.1109\/ICDEW.2008.4498370"},{"key":"9837_CR10","unstructured":"Dhanjal, C., Blanchemanche, S., Clemen\u00e7on, S., Rona-Tas, A., Rossi, F. (2011). Information diffusion within social networks."},{"issue":"6","key":"9837_CR11","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/2184319.2184338","volume":"55","author":"B Doerr","year":"2012","unstructured":"Doerr, B., Fouz, M., & Friedrich, T. (2012). Why rumors spread so quickly in social networks. Communications of the ACM, 55(6), 70\u201375.","journal-title":"Communications of the ACM"},{"key":"9837_CR12","unstructured":"Esuli, Andrea, and Fabrizio Sebastiani. \"Sentiwordnet: A publicly available lexical resource for opinion mining.\" In Proceedings of LREC, vol. 6, pp. 417\u2013422. 2006."},{"key":"9837_CR13","doi-asserted-by":"crossref","unstructured":"Friggeri, A., Adamic, L.A., Eckles, D., Cheng, J. (2014). Rumor Cascades. In Proceedings of AAAI ICWSM.","DOI":"10.1609\/icwsm.v8i1.14559"},{"key":"9837_CR14","doi-asserted-by":"crossref","unstructured":"Kimmel, A.J. (2013). Rumors and rumor control: A manager's guide to understanding and combatting rumors. Routledge.","DOI":"10.4324\/9781410609502"},{"key":"9837_CR15","doi-asserted-by":"crossref","unstructured":"Kwon, S., Cha, M., Jung, K., Chen, W., Wang, Y. (2013a). Prominent features of rumor propagation in online social media. In proceedings of IEEE international conference on data mining (ICDM), 1103-1108. IEEE.","DOI":"10.1109\/ICDM.2013.61"},{"key":"9837_CR16","doi-asserted-by":"crossref","unstructured":"Kwon, S., et al. (2013b). Aspects of rumor spreading on a microblog network. In Proceedings of International Conference on Social Informatics. Springer International Publishing.","DOI":"10.1007\/978-3-319-03260-3_26"},{"key":"9837_CR17","doi-asserted-by":"publisher","unstructured":"Laniado, D., Volkovich, Y., Scellato, S., Mascolo, C., & Kaltenbrunner, A. (2017). The impact of geographic distance on online social interactions. Information Systems Frontiers, 1\u201316. https:\/\/doi.org\/10.1007\/s10796-017-9784-9 .","DOI":"10.1007\/s10796-017-9784-9"},{"issue":"3","key":"9837_CR18","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TCSS.2016.2517458","volume":"2","author":"G Liang","year":"2015","unstructured":"Liang, G., He, W., Xu, C., Chen, L., & Zeng, J. (2015). Rumor identification in microblogging systems based on users\u2019 behavior. IEEE Transactions on Computational Social Systems, 2(3), 99\u2013108.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"9837_CR19","unstructured":"Liu, F., Burton-Jones, A., Xu, D. (2014). Rumors on social media in disasters: Extending transmission to retransmission. In PACIS, 49."},{"key":"9837_CR20","doi-asserted-by":"crossref","unstructured":"Ma, J., Gao, W., Wei, Z., Lu Y., Wong, K-F. (2015). Detect rumors using time series of social context information on microblogging websites. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 1751-1754. ACM.","DOI":"10.1145\/2806416.2806607"},{"key":"9837_CR21","unstructured":"Ma, J., Gao, W., Mitra, P., Kwon S., Jansen B.J., Wong, K.-F., Cha, M. (2016). Detecting rumors from microblogs with recurrent neural networks. In Proceedings of IJCAI."},{"key":"9837_CR22","doi-asserted-by":"crossref","unstructured":"Mendoza, M., Poblete, B., Castillo, C. (2010). Twitter under crisis: Can we trust what we RT?. In Proceedings of the first workshop on social media analytics (SOMA '10). ACM, 71\u201379.","DOI":"10.1145\/1964858.1964869"},{"key":"9837_CR23","unstructured":"Myers, L., and Sirois, M.J. (2006). Spearman correlation coefficients, differences between. Wiley StatsRef: Statistics Reference Online."},{"issue":"1","key":"9837_CR24","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.physa.2006.07.017","volume":"374","author":"M Nekovee","year":"2007","unstructured":"Nekovee, M., Moreno, Y., Bianconi, G., & Marsili, M. (2007). Theory of rumour spreading in complex social networks. Physica A: Statistical Mechanics and its Applications, 374(1), 457\u2013470.","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"9837_CR25","unstructured":"Niwattanakul, S., et al. (2013). Using of Jaccard coefficient for keywords similarity. Proceedings of the international multi conference of engineers and computer scientists. Vol. 1."},{"key":"9837_CR26","unstructured":"Oh, O., Hazel, K.K., Rao, H.R. (2010). An exploration of social Media in Extreme Events: Rumor theory and twitter during the Haiti earthquake. In Proceedings of ICIS 2010. 231."},{"issue":"2","key":"9837_CR27","doi-asserted-by":"publisher","first-page":"407","DOI":"10.25300\/MISQ\/2013\/37.2.05","volume":"37","author":"O Oh","year":"2013","unstructured":"Oh, O., Agrawal, M., & Rao, H. R. (2013). Community intelligence and social media services: A rumor theoretic analysis of tweets during social crises. Research Article MIS Quarterly, 37(2), 407\u2013426.","journal-title":"Research Article MIS Quarterly"},{"key":"9837_CR28","doi-asserted-by":"crossref","unstructured":"Popescu, A-M., and Pennacchiotti, M. (2010). Detecting controversial events from twitter. Proceedings of the 19th ACM international conference on information and knowledge management. ACM.","DOI":"10.1145\/1871437.1871751"},{"key":"9837_CR29","unstructured":"Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q. (2011). Rumor has it: Identifying misinformation in microblogs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP '11). Association for Computational Linguistics, 1589\u20131599."},{"issue":"5","key":"9837_CR30","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1037\/0003-066X.46.5.484","volume":"46","author":"RL Rosnow","year":"1991","unstructured":"Rosnow, R. L. (1991). Inside rumor: A personal journey. American Psychology, 46(5), 484\u2013496.","journal-title":"American Psychology"},{"key":"9837_CR31","doi-asserted-by":"crossref","unstructured":"Rudra, K., Ghosh, S., Ganguly, N., Goyal, P., Ghosh, S. (2015). Extracting situational information from microblogs during disaster events: A classification-summarization approach. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 583-592. ACM.","DOI":"10.1145\/2806416.2806485"},{"key":"9837_CR32","doi-asserted-by":"crossref","unstructured":"Sen, A., Rudra, K., Ghosh, S. (2015). Extracting situational awareness from microblogs during disaster events. In Proceedings of Social Networking Workshop, with IEEE International Conference on Communication Systems and Networks (COMSNETS).","DOI":"10.1109\/COMSNETS.2015.7098720"},{"key":"9837_CR33","doi-asserted-by":"crossref","unstructured":"Tripathy, R. M., Bagchi, A., Mehta, S. (2010). A study of rumor control strategies on social networks. In Proceedings of the 19th ACM international conference on information and knowledge management, pp. 1817-1820. ACM.","DOI":"10.1145\/1871437.1871737"},{"key":"9837_CR34","unstructured":"Vosoughi, S. (2015). Automatic detection and verification of rumors on twitter. PhD dissertation, Massachusetts Institute of Technology."},{"key":"9837_CR35","doi-asserted-by":"crossref","unstructured":"Yang, F., Liu, Y., Yu, X., and Yang, M. (2012). Automatic detection of rumor on Sina Weibo. In proceedings of the ACM SIGKDD workshop on mining data semantics (MDS '12), article 13, 7 pages.","DOI":"10.1145\/2350190.2350203"},{"key":"9837_CR36","doi-asserted-by":"crossref","unstructured":"Yang, Z., et al. (2015) Emerging rumor identification for social media with hot topic detection. In Proceedings of Web Information System and Application Conference (WISA). IEEE.","DOI":"10.1109\/WISA.2015.19"},{"key":"9837_CR37","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Resnick, P. Mei, Q. (2015). Enquiring minds: Early detection of rumors in social media from enquiry posts. In Proceedings of the 24th International Conference on World Wide Web, 1395\u20131405.","DOI":"10.1145\/2736277.2741637"},{"issue":"5","key":"9837_CR38","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1007\/s10796-017-9743-5","volume":"19","author":"W Zhao","year":"2017","unstructured":"Zhao, W., Zeng, Q., Zheng, G., & Yang, L. (2017). The resource allocation model for multi-process instances based on particle swarm optimization. Information Systems Frontiers, 19(5), 1057\u20131066.","journal-title":"Information Systems Frontiers"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-018-9837-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-018-9837-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-018-9837-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T14:47:16Z","timestamp":1693579636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-018-9837-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,9]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["9837"],"URL":"https:\/\/doi.org\/10.1007\/s10796-018-9837-8","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,9]]},"assertion":[{"value":"9 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}