{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T04:41:52Z","timestamp":1720413712472},"reference-count":23,"publisher":"Emerald","issue":"7","license":[{"start":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T00:00:00Z","timestamp":1570406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["K"],"published-print":{"date-parts":[[2019,10,7]]},"abstract":"\nPurpose<\/jats:title>\nThis paper aims to present a framework to address the impact of people\u2019s behaviour in the dissemination of information through mobile social networks.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nThis approach follows the epidemical compartmental models and uses a grid to model the nodes\u2019 (people) behaviour in the dissemination process. The nodes\u2019 status is determined by binary rules that update and define the flow of information between neighbour nodes. An improved stacked-layer grid model is used to implement modulations in the application of the rules and neighbourhoods to model the impact of people\u2019s attitude, which may improve or jeopardize the efficiency of the process.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nThis proposal shows how grid architecture is a valuable tool to model different causes of malfunction of data dissemination. Combining different grids with different neighbourhoods and different local rules provides a wide range of possibilities to depict the impact of human awareness and decision on the dissemination of data.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nThis works develops a new approach for the analysis of dissemination of information which add new features to traditional methods for modelling local interactions and describing the dynamics of the communication patterns in the population.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/k-06-2019-0381","type":"journal-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T10:44:35Z","timestamp":1570790675000},"page":"1953-1967","source":"Crossref","is-referenced-by-count":1,"title":["A grid model to address the behaviour of the nodes in the dissemination of information"],"prefix":"10.1108","volume":"49","author":[{"given":"Mar\u00eda Teresa","family":"Signes-Pont","sequence":"first","affiliation":[]},{"given":"Higinio","family":"Mora","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Cort\u00e9s-Castillo","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Moll\u00e1-Sirvent","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021081912391420200_ref001","article-title":"Detecting selfish nodes and motivating cooperation in mobile ad-hoc networks","volume-title":"Proceeding of Tenth International Conference on Computer Engineering and Systems (ICCES)","year":"2015"},{"key":"key2021081912391420200_ref002","article-title":"A model of information propagation in social networks","volume-title":"8th National Conference on Information Technology Education","year":"2010"},{"issue":"7","key":"key2021081912391420200_ref003","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1109\/TMC.2013.160","article-title":"Opportunistic communication and human mobility","volume":"13","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"5","key":"key2021081912391420200_ref004","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1109\/LCOMM.2012.030912.112482","article-title":"Improving selfish node detection in MANETs using a collaborative watchdog","volume":"16","year":"2012","journal-title":"IEEE Communications Letters"},{"key":"key2021081912391420200_ref005","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.adhoc.2018.07.004","article-title":"Falcon: a new approach for the evaluation of opportunistic networks","volume":"81","year":"2018","journal-title":"Ad Hoc Networks"},{"key":"key2021081912391420200_ref006","first-page":"19","article-title":"On the strength of weak ties in mobile social networks","volume-title":"Proceeding of ACM workshop on social network systems (SNS)","year":"2009"},{"key":"key2021081912391420200_ref007","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.is.2016.11.003","article-title":"Modeling user interest in social media using news media and wikipedia","volume":"65","year":"2017","journal-title":"Information Systems"},{"issue":"2","key":"key2021081912391420200_ref008","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1109\/SURV.2011.041911.00093","article-title":"Disruption-tolerant networking: a comprehensive survey on recent developments and persisting challenges","volume":"14","year":"2012","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"6","key":"key2021081912391420200_ref009","doi-asserted-by":"crossref","first-page":"066130","DOI":"10.1103\/PhysRevE.69.066130","article-title":"Dynamics of rumor spreading in complex network","volume":"69","year":"2004","journal-title":"Physical Review E"},{"key":"key2021081912391420200_ref010","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.adhoc.2013.12.013","article-title":"Modeling message diffusion in epidemical DTN","volume":"16","year":"2014","journal-title":"Ad Hoc Networks"},{"key":"key2021081912391420200_ref011","first-page":"630","article-title":"STEP: a spatio-temporal mobility model for humans walks","volume-title":"Proceeding of IEEE MASS","year":"2010"},{"key":"key2021081912391420200_ref012","first-page":"123","article-title":"A discrete approach of the Susceptible-Infectious-Susceptible (SIS) model of disease expansion","volume":"2","year":"2017","journal-title":"International Journal of Computers"},{"key":"key2021081912391420200_ref013","article-title":"The susceptible infectious recovered (SIR) model of disease expansion: a new approach","volume-title":"Mathematical Modelling in Engineering and Human Behaviour","year":"2017"},{"issue":"1","key":"key2021081912391420200_ref014","first-page":"1","article-title":"The susceptible-infectious model of disease expansion analysed under the scope of connectivity and neighbor rules","volume":"7","year":"2017","journal-title":"Computer Science and Information Technology (CS and IT)"},{"key":"key2021081912391420200_ref015","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.cose.2018.08.004","article-title":"Modelling the malware propagation in mobile computer devices","volume":"79","year":"2018","journal-title":"Computers and Security"},{"issue":"4","key":"key2021081912391420200_ref016","doi-asserted-by":"crossref","first-page":"217","DOI":"10.2753\/MIS0742-1222290408","article-title":"Emotions and information diffusion in social media\u2014sentiment of microblogs and sharing behavior","volume":"29","year":"2013","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2021081912391420200_ref017","first-page":"1","article-title":"A distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique","volume":"2014","year":"2014","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"2","key":"key2021081912391420200_ref018","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1111\/jcc4.12041","article-title":"Social media as information source: recency of updates and credibility of information","volume":"19","year":"2014","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"5","key":"key2021081912391420200_ref019","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TCOMM.2011.020811.090163","article-title":"Performance of opportunistic epidemic routing on edge-Markovian dynamic graphs","volume":"59","year":"2011","journal-title":"IEEE Transactions on Communications"},{"issue":"6","key":"key2021081912391420200_ref020","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1007\/s11036-012-0401-3","article-title":"Information propagation through opportunistic communication in mobile social networks","volume":"17","year":"2012","journal-title":"Mobile Networks and Applications"},{"issue":"3","key":"key2021081912391420200_ref021","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1109\/TETC.2015.2414792","article-title":"Epidemic information dissemination in mobile social networks with opportunistic links","volume":"3","year":"2015","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"key2021081912391420200_ref022","first-page":"53","article-title":"Information diffusion through online social networks","volume-title":"Emergency Management and Management Sciences, ICEMMS","year":"2010"},{"key":"key2021081912391420200_ref023","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.physa.2015.12.044","article-title":"Modelling information dissemination under privacy concerns in social media","volume":"449","year":"2016","journal-title":"Physica A"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-06-2019-0381\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-06-2019-0381\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T12:42:24Z","timestamp":1629376944000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-06-2019-0381\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,7]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,10,7]]}},"alternative-id":["10.1108\/K-06-2019-0381"],"URL":"https:\/\/doi.org\/10.1108\/k-06-2019-0381","relation":{},"ISSN":["0368-492X","0368-492X"],"issn-type":[{"value":"0368-492X","type":"print"},{"value":"0368-492X","type":"print"}],"subject":[],"published":{"date-parts":[[2019,10,7]]}}}