{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:10Z","timestamp":1740099190431,"version":"3.37.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030011284"},{"type":"electronic","value":"9783030011291"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01129-1_4","type":"book-chapter","created":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T03:26:43Z","timestamp":1537327603000},"page":"54-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Communication Based on Unilateral Preference on Twitter: Internet Luring in Japan"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3595-8940","authenticated-orcid":false,"given":"Kimitaka","family":"Asatani","sequence":"first","affiliation":[]},{"given":"Yasuko","family":"Kawahata","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3866-4956","authenticated-orcid":false,"given":"Fujio","family":"Toriumi","sequence":"additional","affiliation":[]},{"given":"Ichiro","family":"Sakata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,20]]},"reference":[{"issue":"8","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1177\/0002764209356244","volume":"53","author":"KN Hampton","year":"2010","unstructured":"Hampton, K.N.: Internet use and the concentration of disadvantage: glocalization and the urban underclass. Am. Behav. Sci. 53(8), 1111\u20131132 (2010)","journal-title":"Am. Behav. Sci."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591\u2013600. ACM (2010)","DOI":"10.1145\/1772690.1772751"},{"issue":"4","key":"4_CR3","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1542\/peds.2011-0054","volume":"127","author":"GS O\u2019Keeffe","year":"2011","unstructured":"O\u2019Keeffe, G.S., Clarke-Pearson, K.: The impact of social media on children, adolescents, and families. Pediatrics 127(4), 800\u2013804 (2011)","journal-title":"Pediatrics"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, J., Danescu-Niculescu-Mizil, C., Leskovec, J.: Antisocial behavior in online discussion communities. In: ICWSM, pp. 61\u201370 (2015)","DOI":"10.1609\/icwsm.v9i1.14583"},{"key":"4_CR5","unstructured":"Griffiths, C.K.J.: Japanese man arrested after body parts found in cooler. CNN (2017)"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barab\u00e1si, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1103\/RevModPhys.87.925","volume":"87","author":"R Pastor-Satorras","year":"2015","unstructured":"Pastor-Satorras, R., Castellano, C., Van Mieghem, P., Vespignani, A.: Epidemic processes in complex networks. Rev. Mod. Phys. 87(3), 925 (2015)","journal-title":"Rev. Mod. Phys."},{"issue":"2","key":"4_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/2503792.2503797","volume":"42","author":"A Guille","year":"2013","unstructured":"Guille, A., Hacid, H., Favre, C., Zighed, D.A.: Information diffusion in online social networks: a survey. ACM SIGMOD Rec. 42(2), 17\u201328 (2013)","journal-title":"ACM SIGMOD Rec."},{"issue":"1","key":"4_CR9","first-page":"1","volume":"58","author":"P Wang","year":"2015","unstructured":"Wang, P., Xu, B., Wu, Y., Zhou, X.: Link prediction in social networks: the state-of-the-art. Sci. China Inf. Sci. 58(1), 1\u201338 (2015)","journal-title":"Sci. China Inf. Sci."},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/2501654.2501657","volume":"45","author":"J Xie","year":"2013","unstructured":"Xie, J., Kelley, S., Szymanski, B.K.: Overlapping community detection in networks: the state-of-the-art and comparative study. ACM Comput. Surv. (CSUR) 45(4), 43 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"9602","DOI":"10.1038\/srep09602","volume":"5","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Tang, M., Zhou, T., Do, Y.: Core-like groups result in invalidation of identifying super-spreader by k-shell decomposition. Sci. Rep. 5, 9602 (2015)","journal-title":"Sci. Rep."},{"issue":"20","key":"4_CR13","doi-asserted-by":"publisher","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","volume":"89","author":"ME Newman","year":"2002","unstructured":"Newman, M.E.: Assortative mixing in networks. Phys. Rev. Lett. 89(20), 208701 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1002\/jae.2480","volume":"31","author":"S Lee","year":"2016","unstructured":"Lee, S.: Effect of online dating on assortative mating: evidence from south korea. J. Appl. Econ. 31(6), 1120\u20131139 (2016)","journal-title":"J. Appl. Econ."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Myers, S.A., Sharma, A., Gupta, P., Lin, J.: Information network or social network?: the structure of the twitter follow graph. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 493\u2013498. ACM (2014)","DOI":"10.1145\/2567948.2576939"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Doughty, M., Rowland, D., Lawson, S.: Who is on your sofa?: TV audience communities and second screening social networks. In: Proceedings of the 10th European Conference on Interactive TV and Video, pp. 79\u201386. ACM (2012)","DOI":"10.1145\/2325616.2325635"},{"issue":"101","key":"4_CR17","doi-asserted-by":"publisher","first-page":"20140940","DOI":"10.1098\/rsif.2014.0940","volume":"11","author":"M Beguerisse-D\u00edaz","year":"2014","unstructured":"Beguerisse-D\u00edaz, M., Garduno-Hern\u00e1ndez, G., Vangelov, B., Yaliraki, S.N., Barahona, M.: Interest communities and flow roles in directed networks: the Twitter network of the UK riots. J. Royal Soc. Interface 11(101), 20140940 (2014)","journal-title":"J. Royal Soc. Interface"},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1257\/aer.100.1.130","volume":"100","author":"GJ Hitsch","year":"2010","unstructured":"Hitsch, G.J., Horta\u00e7su, A., Ariely, D.: Matching and sorting in online dating. Am. Econ. Rev. 100(1), 130\u201363 (2010)","journal-title":"Am. Econ. Rev."},{"issue":"4","key":"4_CR19","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1177\/0003122415591268","volume":"80","author":"CV Curington","year":"2015","unstructured":"Curington, C.V., Lin, K.H., Lundquist, J.H.: Positioning multiraciality in cyberspace: treatment of multiracial daters in an online dating website. Am. Sociol. Rev. 80(4), 764\u2013788 (2015)","journal-title":"Am. Sociol. Rev."},{"key":"4_CR20","volume-title":"Net Children Go Mobile: Risks and Opportunities","author":"G Mascheroni","year":"2014","unstructured":"Mascheroni, G., \u00d3lafsson, K.: Net Children Go Mobile: Risks and Opportunities. Educatt, Milano (2014)"},{"key":"4_CR21","unstructured":"Livingstone, S., Haddon, L., G\u00f6rzig, A., \u00d3lafsson, K.: Risks and safety on the internet: the perspective of European children: full findings and policy implications from the EU kids online survey of 9\u201316 year olds and their parents in 25 countries. EU Kids Online (2011)"},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1080\/13552600.2016.1241309","volume":"23","author":"D DeHart","year":"2017","unstructured":"DeHart, D., et al.: Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. J. Sex. Aggression 23(1), 77\u201389 (2017)","journal-title":"J. Sex. Aggression"},{"issue":"2","key":"4_CR23","first-page":"319","volume":"29","author":"EG Ortega","year":"2013","unstructured":"Ortega, E.G., Baz, B.O.: Minors\u2019 exposure to online pornography: prevalence, motivations, contents and effects. (la exposici\u00f3n de los menores a la pornograf\u00eda en internet: prevalencia, motivaciones, contenidos y efectos). Anales de Psicolog\u00eda\/Annals of Psychol. 29(2), 319\u2013327 (2013)","journal-title":"Anales de Psicolog\u00eda\/Annals of Psychol."},{"issue":"3","key":"4_CR24","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1080\/10926771.2015.1009602","volume":"24","author":"D Tener","year":"2015","unstructured":"Tener, D., Wolak, J., Finkelhor, D.: A typology of offenders who use online communications to commit sex crimes against minors. J. Aggression Maltreatment Trauma 24(3), 319\u2013337 (2015)","journal-title":"J. Aggression Maltreatment Trauma"},{"issue":"1","key":"4_CR25","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10508-014-0270-x","volume":"44","author":"KM Babchishin","year":"2015","unstructured":"Babchishin, K.M., Hanson, R.K., VanZuylen, H.: Online child pornography offenders are different: a meta-analysis of the characteristics of online and offline sex offenders against children. Arch. Sex. Behav. 44(1), 45\u201366 (2015)","journal-title":"Arch. Sex. Behav."},{"issue":"2","key":"4_CR26","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1177\/0306624X12465271","volume":"58","author":"PR Magaletta","year":"2014","unstructured":"Magaletta, P.R., Faust, E., Bickart, W., McLearen, A.M.: Exploring clinical and personality characteristics of adult male internet-only child pornography offenders. Int. J. Offender Therapy Comp. Criminol. 58(2), 137\u2013153 (2014)","journal-title":"Int. J. Offender Therapy Comp. Criminol."},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.chiabu.2014.12.009","volume":"44","author":"CM Steel","year":"2015","unstructured":"Steel, C.M.: Web-based child pornography: the global impact of deterrence efforts and its consumption on mobile platforms. Child Abuse Negl. 44, 150\u2013158 (2015)","journal-title":"Child Abuse Negl."},{"issue":"3","key":"4_CR28","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0378-8733(83)90028-X","volume":"5","author":"SB Seidman","year":"1983","unstructured":"Seidman, S.B.: Network structure and minimum degree. Soc. Netw. 5(3), 269\u2013287 (1983)","journal-title":"Soc. Netw."}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01129-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T06:30:10Z","timestamp":1693895410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01129-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030011284","9783030011291"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01129-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SocInfo","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socinfo2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/socinfo2018.hse.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"110","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2,54","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}