{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:12:57Z","timestamp":1742998377100,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030192730"},{"type":"electronic","value":"9783030192747"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19274-7_8","type":"book-chapter","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T18:09:50Z","timestamp":1556215790000},"page":"91-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Customisable Pipeline for Continuously Harvesting Socially-Minded Twitter Users"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2116-2343","authenticated-orcid":false,"given":"Flavio","family":"Primo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0978-2446","authenticated-orcid":false,"given":"Paolo","family":"Missier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4076-3331","authenticated-orcid":false,"given":"Alexander","family":"Romanovsky","sequence":"additional","affiliation":[]},{"given":"Mickael","family":"Figueredo","sequence":"additional","affiliation":[]},{"given":"Nelio","family":"Cacho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,26]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Arnaboldi, V., Conti, M., Passarella, A., Pezzoni, F.: Ego networks in twitter: an experimental analysis. In: 2013 Proceedings IEEE INFOCOM, pp. 3459\u20133464 (2013)","DOI":"10.1109\/INFCOM.2013.6567181"},{"key":"8_CR2","unstructured":"Biran, O., Rosenthal, S., Andreas, J., McKeown, K., Rambow, O.: Detecting influencers in written online conversations. In: Proceedings of the Second Workshop on Language in Social Media LSM 2012, pp. 37\u201345. Association for Computational Linguistics, Stroudsburg (2012)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.is.2017.12.004","volume":"78","author":"I Bizid","year":"2018","unstructured":"Bizid, I., Nayef, N., Boursier, P., Doucet, A.: Detecting prominent microblog users over crisis events phases. Inf. Syst. 78, 173\u2013188 (2018)","journal-title":"Inf. Syst."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bizid, I., Nayef, N., Boursier, P., Faiz, S., Morcos, J.: Prominent users detection during specific events by learning on- and off-topic features of user activities. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 ASONAM 2015, pp. 500\u2013503. ACM, New York (2015)","DOI":"10.1145\/2808797.2809411"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1080\/14742830701497277","volume":"6","author":"C Bobel","year":"2007","unstructured":"Bobel, C.: \u201ci\u2019m not an activist, though i\u2019ve done a lot of it\": doing activism, being activist and the \u201cperfect standard\" in a contemporary movement. Soc. Mov. Stud. 6(2), 147\u2013159 (2007)","journal-title":"Soc. Mov. Stud."},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0378-8733(01)00038-7","volume":"23","author":"P Bonacich","year":"2001","unstructured":"Bonacich, P., Lloyd, P.: Eigenvector-like measures of centrality for asymmetric relations. Soc. Netw. 23(3), 191\u2013201 (2001)","journal-title":"Soc. Netw."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1108\/13563281111156853","volume":"16","author":"N Booth","year":"2011","unstructured":"Booth, N., Matic, J.A.: Mapping and leveraging influencers in social media to shape corporate brand perceptions. Corp. Commun. Int. J. 16, 184\u2013191 (2011)","journal-title":"Corp. Commun. Int. J."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: the million follower fallacy. In: ICWSM (2010)","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Coscia, M., Rossetti, G., Giannotti, F., Pedreschi, D.: Demon: a local-first discovery method for overlapping communities. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD 2012, pp. 615\u2013623. ACM, New York (2012)","DOI":"10.1145\/2339530.2339630"},{"key":"8_CR10","series-title":"Lecture Notes in Social Networks","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-53420-6_1","volume-title":"Trends in Social Network Analysis","author":"DN Fisher","year":"2017","unstructured":"Fisher, D.N., Silk, M.J., Franks, D.W.: The perceived assortativity of social networks: methodological problems and solutions. In: Missaoui, R., Abdessalem, T., Latapy, M. (eds.) Trends in Social Network Analysis. LNSN, pp. 1\u201319. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-53420-6_1"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.ipm.2014.06.002","volume":"51","author":"M Kardara","year":"2015","unstructured":"Kardara, M., Papadakis, G., Papaoikonomou, A., Tserpes, K., Varvarigou, T.: Large-scale evaluation framework for local influence theories in twitter. Inf. Process. Manage. 51(1), 226\u2013252 (2015)","journal-title":"Inf. Process. Manage."},{"key":"8_CR12","first-page":"31","volume":"5","author":"G Lotan","year":"2011","unstructured":"Lotan, G., Graeff, E., Ananny, M., Gaffney, D., Pearce, I., Boyd, D.: The Arab spring| the revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int. J. Commun. 5, 31 (2011)","journal-title":"Int. J. Commun."},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-319-60131-1_30","volume-title":"Web Engineering","author":"P Missier","year":"2017","unstructured":"Missier, P., et al.: Recruiting from the network: discovering twitter users who can help combat zika epidemics. In: Cabot, J., De Virgilio, R., Torlone, R. (eds.) ICWE 2017. LNCS, vol. 10360, pp. 437\u2013445. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60131-1_30"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Nargundkar, A., Rao, Y.S.: Influencerank: a machine learning approach to measure influence of twitter users. In: 2016 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 1\u20136, April 2016","DOI":"10.1109\/ICRTIT.2016.7569535"},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1007\/s13278-013-0134-8","volume":"3","author":"LA Overbey","year":"2013","unstructured":"Overbey, L.A., Greco, B., Paribello, C., Jackson, T.: Structure and prominence in twitter networks centered on contentious politics. Soc. Netw. Anal. Min. 3(4), 1351\u20131378 (2013)","journal-title":"Soc. Netw. Anal. Min."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Pal, A., Counts, S.: Identifying topical authorities in microblogs. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining - WSDM 2011 (2011)","DOI":"10.1145\/1935826.1935843"},{"issue":"6","key":"8_CR17","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1080\/1369118X.2013.812674","volume":"17","author":"T Poell","year":"2014","unstructured":"Poell, T.: Social media and the transformation of activist communication: exploring the social media ecology of the 2010 Toronto G20 protests. Inf. Commun. Soc. 17(6), 716\u2013731 (2014)","journal-title":"Inf. Commun. Soc."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Razis, G., Anagnostopoulos, I.: Semantifying twitter: the influence tracker ontology. In: 2014 9th International Workshop on Semantic and Social Media Adaptation and Personalization, pp. 98\u2013103, November 2014","DOI":"10.1109\/SMAP.2014.23"},{"issue":"5","key":"8_CR19","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.ipm.2016.04.003","volume":"52","author":"F Riquelme","year":"2016","unstructured":"Riquelme, F., Gonzalez-Cantergiani, P.: Measuring user influence on twitter: a survey. Inf. Process. Manage. 52(5), 949\u2013975 (2016)","journal-title":"Inf. Process. Manage."},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1073\/pnas.0706851105","volume":"105","author":"M Rosvall","year":"2008","unstructured":"Rosvall, M., Bergstrom, C.T.: Maps of random walks on complex networks reveal community structure. Proc. Nat. Acad. Sci. U.S.A. 105, 1118\u20131123 (2008)","journal-title":"Proc. Nat. Acad. Sci. U.S.A."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Schenk, C.B., Sicker, D.C.: Finding event-specific influencers in dynamic social networks. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 501\u2013504 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.100"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.is.2018.02.003","volume":"75","author":"L Sousa","year":"2018","unstructured":"Sousa, L., et al.: Vazadengue: an information system for preventing and combating mosquito-borne diseases with social networks. Inf. Syst. 75, 26\u201342 (2018)","journal-title":"Inf. Syst."},{"issue":"2","key":"8_CR23","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1111\/j.1460-2466.2012.01636.x","volume":"62","author":"WL Youmans","year":"2012","unstructured":"Youmans, W.L., York, J.C.: Social media and the activist toolkit: user agreements, corporate interests, and the information infrastructure of modern social movements. J. Commun. 62(2), 315\u2013329 (2012)","journal-title":"J. Commun."},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-642-20161-5_34","volume-title":"Advances in Information Retrieval","author":"WX Zhao","year":"2011","unstructured":"Zhao, W.X., et al.: Comparing twitter and traditional media using topic models. In: Clough, P., et al. (eds.) ECIR 2011. LNCS, vol. 6611, pp. 338\u2013349. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20161-5_34"}],"container-title":["Lecture Notes in Computer Science","Web Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19274-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T00:02:25Z","timestamp":1714003345000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-19274-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030192730","9783030192747"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19274-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daejeon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icwe2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icwe2019.webengineering.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"106","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}