{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:27:50Z","timestamp":1742992070021,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":31,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781493971305"},{"type":"electronic","value":"9781493971312"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4939-7131-2_247","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T18:57:40Z","timestamp":1528743460000},"page":"2270-2278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Role Identification of Social Networkers"],"prefix":"10.1007","author":[{"given":"Anna","family":"Zygmunt","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"247_CR18837","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-4471-2969-1_1","volume-title":"Behavior computing: modeling, analysis, mining, and decision","author":"N Agarwal","year":"2012","unstructured":"Agarwal N, Kumar S, Gao H, Zafarani R, Liu H (2012) Analyzing behavior of the infiuentials across social media. In: Cao L, Yu PS (eds) Behavior computing: modeling, analysis, mining, and decision. Springer, London, pp 3\u201319"},{"key":"247_CR18838","doi-asserted-by":"crossref","unstructured":"Backstrom L, Kumar R, Marlow C, Noval J, Tomkins A (2008) Preferential behavior in online groups. In: 1st ACM WSDM international conference on web search and data mining, Palo Alto, pp 117\u2013128","DOI":"10.1145\/1341531.1341549"},{"key":"247_CR18839","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1146\/annurev.so.12.080186.000435","volume":"12","author":"BJ Biddle","year":"1986","unstructured":"Biddle BJ (1986) Recent developments in role theory. Annu Rev Sociol 12:67\u201392","journal-title":"Annu Rev Sociol"},{"key":"247_CR18840","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/S0378-8733(99)00019-2","volume":"21","author":"SP Borgatti","year":"1999","unstructured":"Borgatti SP, Everett MG (1999) Models of core\/periphery structures. Soc Networks 21:375\u2013395","journal-title":"Soc Networks"},{"issue":"1","key":"247_CR18841","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s13278-011-0032-x","volume":"2","author":"J Brynielsson","year":"2012","unstructured":"Brynielsson J, Kaati J, Svenson P (2012) Social position and simulation relations. Soc Netw Anal Min 2(1):39\u201352","journal-title":"Soc Netw Anal Min"},{"key":"247_CR18842","doi-asserted-by":"crossref","unstructured":"Cha M, Haddadi H, Benevenuto F, Gummadi P (2010) Measuring user influence in Twitter: the million follower fallacy. In: 4th international AAAI conference on weblogs and social media (ICWSM), Washington, DC","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"247_CR18843","first-page":"15","volume":"47","author":"PJ Denning","year":"2004","unstructured":"Denning PJ (2004) Network laws. Commun ACM Publ 47:15\u201320","journal-title":"Commun ACM Publ"},{"issue":"3","key":"247_CR18844","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s13278-011-0017-9","volume":"1","author":"M Fazeen","year":"2011","unstructured":"Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1(3):241\u2013254","journal-title":"Soc Netw Anal Min"},{"key":"247_CR18845","doi-asserted-by":"crossref","unstructured":"Fisher D, Smith M, Welser HT (2006) You are who you talk to: detecting roles in usenet newsgroups. In: Proceedings of the 39th annual Hawaii international conference on systems sciences, HICSS\u201906, Kauai. IEEE Computer Society","DOI":"10.1109\/HICSS.2006.536"},{"key":"247_CR18846","unstructured":"Gleave E, Welser HT, Lento TM, Smith MA (2009) A conceptual and operational definition of \u2018social role\u2019 in online community. In: Proceedings of the 42nd Hawaii international conference on systems sciences, HICSS\u201909, Waikoloa, Big Island. IEEE Computer Society, pp 1\u201311"},{"issue":"2","key":"247_CR18847","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1509\/jmkg.73.2.1","volume":"73","author":"J Goldenberg","year":"2009","unstructured":"Goldenberg J, Han S, Lehmann DR, Hong JW (2009) The role of hubs in the adoption process. J Mark 73(2):1\u201313","journal-title":"J Mark"},{"key":"247_CR18848","volume-title":"Introduction to social network methods","author":"RA Hannemann","year":"2005","unstructured":"Hannemann RA, Riddle M (2005) Introduction to social network methods. University of California, Riverside"},{"key":"247_CR18849","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-15470-6_7","volume-title":"Active Media Technology","author":"Derek L. Hansen","year":"2010","unstructured":"Hansen DL, Shneiderman B, Smith MA (2010) Visualizing threaded conversation networks: mining message boards and email lists for actionable insights. In: Proceedings of the 6th international conference of active media technology (AMT\u201910), Toronto. Springer, Berlin\/Heidelberg, pp 47\u201362"},{"key":"247_CR18850","doi-asserted-by":"crossref","unstructured":"Junquero-Trabado V, Domingues-Sal D (2012) Building a role search engine for social media. In: Proceedings of the 21st international conference companion on world wide web (WWW\u201912), Lyon. ACM, New York, pp 1051\u20131060","DOI":"10.1145\/2187980.2188240"},{"key":"247_CR18851","volume-title":"The infiuentials: one American in ten tells the other nine how to vote, where to eat, and what to buy","author":"E Keller","year":"2003","unstructured":"Keller E, Barry J (2003) The infiuentials: one American in ten tells the other nine how to vote, where to eat, and what to buy. Free Press, New York"},{"key":"247_CR18852","doi-asserted-by":"crossref","unstructured":"Kumar R, Noval J, Tomkins A (2006) Structure and evolution of online social networks. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (KDD\u201906), Philadelphia. ACM, New York, pp 611\u2013617","DOI":"10.1145\/1150402.1150476"},{"key":"247_CR18853","series-title":"LNCS","first-page":"216","volume-title":"Methodological foundations","author":"J Lerner","year":"2005","unstructured":"Lerner J (2005) Role assignments. Network analysis. In: Brandes U, Erlebach T (eds) Methodological foundations, LNCS, vol 3418. Springer, Berlin\/Heidelberg, pp 216\u2013252"},{"key":"247_CR18854","doi-asserted-by":"crossref","unstructured":"Maia M, Almeida J, Almeida V (2008) Identifying user behavior in online social networks. In: SocialNets, proceedings of the 1st workshop on social network systems (SocialNets\u201908), Glasgow, Scotland. ACM, New York, pp 1\u20136","DOI":"10.1145\/1435497.1435498"},{"key":"247_CR18855","doi-asserted-by":"crossref","unstructured":"Mathioudakis M, Koudas N (2009) Efficient identification of starters and followers in social media. In: Proceedings of the 12th international conference on extending database technology: advances in database technology (EDBT\u201909), Saint-Petersburg. ACM, New York, pp 708\u2013719","DOI":"10.1145\/1516360.1516442"},{"key":"247_CR18856","volume-title":"Social theory and social structure","author":"R Merton","year":"1968","unstructured":"Merton R (1968) Social theory and social structure. Simon & Schuster, New York"},{"issue":"2","key":"247_CR18857","doi-asserted-by":"publisher","first-page":"026113","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69(2):026113","journal-title":"Phys Rev E"},{"key":"247_CR18858","unstructured":"Nolker RD, Zhou L (2005) Social computing and weighting to identify member roles in online communities. In: Web intelligence, proceedings of the IEEE\/WIC\/ACM international conference on web intelligence, Compiegne, pp 87\u201393"},{"key":"247_CR18859","doi-asserted-by":"crossref","unstructured":"Obradovic D, Baumann S (2009) A journey to the core of the blogosphere. In: Social network analysis and mining, ASONAM\u201909, international conference on advances in social networks analysis and mining, Athens. IEEE Computer Society, pp 1\u20136","DOI":"10.1109\/ASONAM.2009.29"},{"key":"247_CR18860","doi-asserted-by":"crossref","unstructured":"Pal A, Counts S (2011) Identifying topical authorities in microblogs. In: Proceedings of the 4th international conference on web search and data mining (WSDM\u201911), Hong Kong. ACM, Hong Kong, pp 45\u201354","DOI":"10.1145\/1935826.1935843"},{"issue":"4","key":"247_CR18861","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TKDE.2014.2349913","volume":"27","author":"R Rossi","year":"2015","unstructured":"Rossi R, Ahmed N (2015) Role discovery in networks. IEEE Trans Knowl Data Eng 27(4):1112\u20131131","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"247_CR18862","doi-asserted-by":"crossref","unstructured":"Sun B, Ng VTY (2012) Identifying influential users by their postings in social networks. In: Proceedings of the 3rd international workshop on modeling social media (MSM\u201912), Milwaukee, pp 1\u20138","DOI":"10.1145\/2310057.2310059"},{"key":"247_CR18863","doi-asserted-by":"crossref","unstructured":"Viegas FB, Smith MA (2004) Newsgroup crowds and author lines: visualizing the activity of individuals in conversational cyberspace. In: Proceedings of the 37th Hawai\u2019i international conference on systems sciences, Kauai. IEEE, Los Alamitos","DOI":"10.1109\/HICSS.2004.1265288"},{"key":"247_CR18864","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge\/New York"},{"key":"247_CR18865","unstructured":"Wesler HT, Gleave E, Fisher D, Smith M (2007) Visualizing the signature of social roles in online discussion groups. J Soc Struct 8(2.) http:\/\/www.cmu.edu\/joss\/content\/articles\/volume8\/Welser\/"},{"key":"247_CR18866","unstructured":"Wesler HT, Cosley D, Kossinets G, Lin A, Dokshin F, Gay G, Smith M (2011) Finding social roles in Wikipedia. In: Proceedings of the 2011 iConference, Seattle. ACM, Seattle, pp 122\u2013129"},{"issue":"4","key":"247_CR18867","first-page":"577","volume":"18","author":"A Zygmunt","year":"2012","unstructured":"Zygmunt A, Br\u00f3dka P, Kazienko P, Ko\u00fflak J (2012) Key person analysis in social communities within the blogosphere. J UCS 18(4):577\u2013597","journal-title":"J UCS"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4939-7131-2_247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T03:59:55Z","timestamp":1693713595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4939-7131-2_247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781493971305","9781493971312"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-1-4939-7131-2_247","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}