{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:43:04Z","timestamp":1743068584280,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030015534"},{"type":"electronic","value":"9783030015541"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01554-1_15","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T15:47:56Z","timestamp":1537890476000},"page":"265-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism"],"prefix":"10.1007","author":[{"given":"Jundong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Md Shafaeat","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Matthias R.","family":"Brust","sequence":"additional","affiliation":[]},{"given":"Naomi","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in Twitter: the million follower fallacy, In: ICWSM (2010)","key":"15_CR1","DOI":"10.1609\/icwsm.v4i1.14033"},{"doi-asserted-by":"crossref","unstructured":"Hutto, C., Yardi, S., Gilbert, E.: A longitudinal study of follow predictors on Twitter. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 821\u2013830. ACM, New York (2013)","key":"15_CR2","DOI":"10.1145\/2470654.2470771"},{"issue":"C","key":"15_CR3","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.neucom.2015.11.124","volume":"210","author":"L Liu","year":"2016","unstructured":"Liu, L., Song, D., Tang, J., Liao, L., Li, X., Du, J.: FriendBurst: ranking people who get friends fast in a short time. Neurocomputing 210(C), 116\u2013129 (2016)","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Mueller, J., Stumme, G.: Predicting rising follower counts on Twitter using profile information. In: Proceedings of the 2017 ACM on Web Science Conference, WebSci 2017, pp. 121\u2013130. ACM (2017)","key":"15_CR4","DOI":"10.1145\/3091478.3091490"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"S Jajodia","year":"2012","unstructured":"Jajodia, S., Wang, H., Gianvecchio, S., Chu, Z.: Detecting automation of Twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secur. Comput. 9, 811\u2013824 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"doi-asserted-by":"crossref","unstructured":"Messias, J., Schmidt, L., Oliveira, R., Benevenuto, F.: You followed my bot! Transforming robots into influential users in Twitter. First Monday 18 (2013)","key":"15_CR6","DOI":"10.5210\/fm.v18i7.4217"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.comcom.2014.05.001","volume":"49","author":"J Chen","year":"2014","unstructured":"Chen, J., Kiremire, A.R., Brust, M.R., Phoha, V.V.: Modeling online social network users\u2019 profile attribute disclosure behavior from a game theoretic perspective. Comput. Commun. 49, 18\u201332 (2014)","journal-title":"Comput. Commun."},{"issue":"1\u20135","key":"15_CR8","doi-asserted-by":"publisher","first-page":"e4","DOI":"10.4108\/cc.1.1.e4","volume":"1","author":"J Chen","year":"2014","unstructured":"Chen, J., Kiremire, A.R., Brust, M.R., Phoha, V.V.: A game theoretic approach for modeling privacy settings of an online social network. EAI Endorsed Trans. Collab. Comput. 1(1\u20135), e4 (2014)","journal-title":"EAI Endorsed Trans. Collab. Comput."},{"unstructured":"Surhone, L., Timpledon, M., Marseken, S.: Prisoner\u2019s Dilemma: Game Theory, Merrill M. Albert W. Tucker, Framing Device, Experimental Economics. Betascript Publishing (2010)","key":"15_CR9"},{"unstructured":"Moses, J.: The follower\u2019s dilemma, how game theory explains Twitter\u2019s most important feature. https:\/\/www.linkedin.com\/pulse\/followers-dilemma-how-game-theory-explains-twitters-most-moses. Accessed 1 Feb 2016","key":"15_CR10"},{"unstructured":"Deshpande, D.: Twitter user classification with gensim and scikit-learn. In: The Python Conference, France (2016)","key":"15_CR11"},{"key":"15_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139088510","volume-title":"Social Media Mining: An Introduction","author":"R Zafarani","year":"2014","unstructured":"Zafarani, R., Abbasi, M.A., Liu, H.: Social Media Mining: An Introduction. Cambridge University Press, Cambridge (2014)"},{"unstructured":"Kay, M.: Generating a network graph of Twitter followers using python and networkx. http:\/\/mark-kay.net\/2014\/08\/15\/network-graph-of-twitter-followers\/. Accessed 15 Aug 2014","key":"15_CR13"},{"doi-asserted-by":"crossref","unstructured":"Chen, J., Li, H., Wu, Z., Hossain, M.S.: Sentiment analysis of the correlation between regular tweets and retweets. In: Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, pp. 1\u20135 (2017)","key":"15_CR14","DOI":"10.1109\/NCA.2017.8171354"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01554-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:54:12Z","timestamp":1709823252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01554-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030015534","9783030015541"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01554-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Three of the full papers and two of the short papers were submitted to a special track on Adversarial AI.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}