{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:05:34Z","timestamp":1775253934226,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030029210","type":"print"},{"value":"9783030029227","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02922-7_11","type":"book-chapter","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T05:42:24Z","timestamp":1539927744000},"page":"161-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Social Context-Aware Trust Prediction: Methods for Identifying Fake News"],"prefix":"10.1007","author":[{"given":"Seyed Mohssen","family":"Ghafari","sequence":"first","affiliation":[]},{"given":"Shahpar","family":"Yakhchi","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Beheshti","sequence":"additional","affiliation":[]},{"given":"Mehmet","family":"Orgun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"issue":"2","key":"11_CR1","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott, H., Gentzkow, M.: Social media and fake news in the 2016 election. J. Econ. Perspect. 31(2), 211\u2013236 (2017)","journal-title":"J. Econ. Perspect."},{"key":"11_CR2","volume-title":"Social Penetration: The Development of Interpersonal Relationships","author":"I Altman","year":"1973","unstructured":"Altman, I., Taylor, D.: Social Penetration: The Development of Interpersonal Relationships. Holt, Rinehart and Winston, New York (1973)"},{"issue":"4","key":"11_CR3","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1002\/spe.2558","volume":"48","author":"A Beheshti","year":"2018","unstructured":"Beheshti, A., Benatallah, B., Motahari-Nezhad, H.R.: ProcessAtlas: a scalable and extensible platform for business process analytics. Softw. Pract. Exp. 48(4), 842\u2013866 (2018)","journal-title":"Softw. Pract. Exp."},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-23059-2_22","volume-title":"Business Process Management","author":"S-M-R Beheshti","year":"2011","unstructured":"Beheshti, S.-M.-R., Benatallah, B., Motahari-Nezhad, H.R., Sakr, S.: A query language for analyzing business processes execution. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 281\u2013297. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23059-2_22"},{"key":"11_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25037-3","volume-title":"Process Analytics - Concepts and Techniques for Querying and Analyzing Process Data","author":"S Beheshti","year":"2016","unstructured":"Beheshti, S., et al.: Process Analytics - Concepts and Techniques for Querying and Analyzing Process Data. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-25037-3"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00607-016-0490-0","volume":"99","author":"S Beheshti","year":"2017","unstructured":"Beheshti, S., Benatallah, B., Venugopal, S., Ryu, S.H., Motahari-Nezhad, H.R., Wang, W.: A systematic review and comparative analysis of cross-document coreference resolution methods and tools. Computing 99(4), 313\u2013349 (2017)","journal-title":"Computing"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Chen, S.D., Chen, Y., Han, J., Moulin, P.: A feature-enhanced ranking-based classifier for multimodal data and heterogeneous information networks. In: IEEE 13th International Conference on Data Mining, USA, pp. 997\u20131002 (2013)","DOI":"10.1109\/ICDM.2013.71"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: SIGKDD, pp. 199\u2013208. ACM (2009)","DOI":"10.1145\/1557019.1557047"},{"key":"11_CR9","unstructured":"Gartner: Top Predictions for IT Organizations and Users in 2018 and Beyond (2017). https:\/\/www.gartner.com\/newsroom\/id\/3811367"},{"key":"11_CR10","unstructured":"Golbeck, J.: Using trust and provenance for content filtering on the semantic web. In: Proceedings of the Workshop on Models of Trust on the Web, at the 15th WWW Conference (2006)"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1594173.1594174","volume":"3","author":"J Golbeck","year":"2009","unstructured":"Golbeck, J.: Trust and nuanced profile similarity in online social networks. ACM Trans. Web 3(4), 1\u201333 (2009)","journal-title":"ACM Trans. Web"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative Information Agents VII","author":"J Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS (LNAI), vol. 2782, pp. 238\u2013249. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45217-1_18"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: 13th International Conference on World Wide Web, WWW, USA, pp. 403\u2013412 (2004)","DOI":"10.1145\/988672.988727"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kim, Y.A., Le, M., Lauw, H.W., Lim, E., Liu, H., Srivastava, J.: Building a web of trust without explicit trust ratings. In: ICDE, pp. 531\u2013536 (2008)","DOI":"10.1109\/ICDEW.2008.4498374"},{"key":"11_CR15","unstructured":"Krompaas, D., Nickel, M., Jiang, X., Tresp, V.: Nonnegative tensor factorization with RESCAL. In: Tensor Methods for Machine Learning, ECML workshop (2013)"},{"key":"11_CR16","unstructured":"Lenhart, A., Purcell, K., Smith, A., Zickuhr, K.: Social media mobile internet use among teens and young adults. In: Pew Internet American Life Project (2010)"},{"issue":"3","key":"11_CR17","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11280-017-0485-6","volume":"21","author":"Guanfeng Liu","year":"2017","unstructured":"Liu, G., et al.: Context-aware trust network extraction in large-scale trust-oriented social networks. World Wide Web 21, 713\u2013738 (2018)","journal-title":"World Wide Web"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Liu, G., Wang, Y., Orgun, M.A.: Social context-aware trust network discovery in complex contextual social networks. In: AAAI, pp. 101\u2013107 (2012)","DOI":"10.1609\/aaai.v26i1.8114"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Predicting trusts among users of online communities: an epinions case study. In: 9th ACM Conference on Electronic Commerce (EC), USA, pp. 310\u2013319 (2008)","DOI":"10.1145\/1386790.1386838"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Ma, N., Lim, E., Nguyen, V., Sun, A., Liu, H.: Trust relationship prediction using online product review data. In: CIKM-CNIKM, pp. 47\u201354 (2009)","DOI":"10.1145\/1651274.1651284"},{"key":"11_CR21","doi-asserted-by":"crossref","first-page":"241","DOI":"10.5040\/9798400626265","volume-title":"A Chronology and Glossary of Propaganda in the United States","author":"RA Nelson","year":"1996","unstructured":"Nelson, R.A.: A Chronology and Glossary of Propaganda in the United States, pp. 241\u2013243. Greenwood Publishing Group, Westport (1996)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Nepal, S., Sherchan, W., Paris, C.: Strust: a trust model for social networks. In: TrustCom, pp. 841\u2013846 (2011)","DOI":"10.1109\/TrustCom.2011.112"},{"key":"11_CR23","unstructured":"Pennebaker, J., Chung, C., Ireland, M.: Development and psychometric properties of LIWC (2007)"},{"key":"11_CR24","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Flammini, A., Menczer, F.: The spread of fake news by social bots. CoRR abs\/1707.07592 (2017)"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45, 1\u201333 (2013)","journal-title":"ACM Comput. Surv."},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"3551","DOI":"10.1109\/TSP.2017.2690524","volume":"65","author":"ND Sidiropoulos","year":"2017","unstructured":"Sidiropoulos, N.D., Lathauwer, L.D., Fu, X., Huang, K., Papalexakis, E.E., Faloutsos, C.: Tensor decomposition for signal processing and machine learning. IEEE Trans. Signal Process. 65, 3551\u20133582 (2017)","journal-title":"IEEE Trans. Signal Process."},{"key":"11_CR27","series-title":"Synthesis Lectures on Information Security, Privacy, and Trust","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02345-3","volume-title":"Trust in Social Media","author":"J Tang","year":"2015","unstructured":"Tang, J., Liu, H.: Trust in Social Media. Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers, San Rafael (2015)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Tang, J., Gao, H., Hu, X., Liu, H.: Exploiting homophily effect for trust prediction. In: International Conference on Web Search and Data Mining, WSDM, Italy, pp. 53\u201362 (2013)","DOI":"10.1145\/2433396.2433405"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Trifunovic, S., Legendre, F., Anastasiades, C.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications, pp. 1\u20136 (2010)","DOI":"10.1109\/INFCOMW.2010.5466696"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Trifunovic, S., Legendre, F., Anastasiades, C.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1\u20136 (2010)","DOI":"10.1109\/INFCOMW.2010.5466696"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Uddin, M.G., Zulkernine, M., Ahamed, S.I.: CAT: a context-aware trust model for open and dynamic systems. In: Symposium on Applied Computing, Brazil, pp. 2024\u20132029 (2008)","DOI":"10.1145\/1363686.1364176"},{"key":"11_CR32","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11280-013-0241-5","volume":"18","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Li, L., Liu, G.: Social context-aware trust inference for trust enhancement in social network based recommendations on service providers. World Wide Web 18, 159\u2013184 (2015)","journal-title":"World Wide Web"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, X., Tang, J., Zuo, W., Cai, G.: Modeling status theory in trust prediction. In: 21th AAAI Conference on Artificial Intelligence, USA, pp. 1875\u20131881 (2015)","DOI":"10.1609\/aaai.v29i1.9460"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-41230-1_15","volume-title":"Web Information Systems Engineering \u2013 WISE 2013","author":"K Wang","year":"2013","unstructured":"Wang, K., Zhang, R., Liu, X., Guo, X., Sun, H., Huai, J.: Time-aware travel attraction recommendation. In: Lin, X., Manolopoulos, Y., Srivastava, D., Huang, G. (eds.) WISE 2013. LNCS, vol. 8180, pp. 175\u2013188. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41230-1_15"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Wu, L., Liu, H.: Tracing fake-news footprints: characterizing social media messages by how they propagate. In: WSDM, pp. 637\u2013645 (2018)","DOI":"10.1145\/3159652.3159677"},{"key":"11_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/11839569_18","volume-title":"Autonomic and Trusted Computing","author":"Y Zhang","year":"2006","unstructured":"Zhang, Y., Chen, H., Wu, Z.: A social network-based trust model for the semantic web. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 183\u2013192. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11839569_18"},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-662-45391-9_45","volume-title":"Service-Oriented Computing","author":"X Zheng","year":"2014","unstructured":"Zheng, X., Wang, Y., Orgun, M.A., Liu, G., Zhang, H.: Social context-aware trust prediction in social networks. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 527\u2013534. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45391-9_45"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02922-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:47:51Z","timestamp":1775249271000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02922-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029210","9783030029227"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02922-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wise2018.connect.rs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}