{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:41:57Z","timestamp":1774399317241,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030335816","type":"print"},{"value":"9783030335823","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33582-3_7","type":"book-chapter","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T07:46:34Z","timestamp":1572594394000},"page":"66-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Study on the Impact of Crowd-Sourced Rating on Tweets for the Credibility of Information Spreading"],"prefix":"10.1007","author":[{"given":"Nur Liyana","family":"Mohd Ramlan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nor Athiyah","family":"Abdullah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kamal","family":"Karkonasasi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seyed Aliakbar","family":"Mousavi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"issue":"1","key":"7_CR1","first-page":"20","volume":"24","author":"NA Abdullah","year":"2016","unstructured":"Abdullah, N.A., Nishioka, D., Murayama, Y.: Questionnaire testing: identifying Twitter user\u2019s information sharing behaviour during disaster. J. Inf. Process. 24(1), 20\u201328 (2016)","journal-title":"J. Inf. Process."},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1504\/IJWBC.2011.041206","volume":"7","author":"A Acar","year":"2011","unstructured":"Acar, A., Muraki, Y.: Twitter for crisis communication: lesson learn from Japan\u2019s tsunami disaster. Int. J. Web Based Communities 7(3), 392\u2013402 (2011)","journal-title":"Int. J. Web Based Communities"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Boyd, D., Golder, S., Lotan, G.: Tweet, tweet, retweet: conversational aspects of retweeting on Twitter, pp. 1\u201310 (2010)","DOI":"10.1109\/HICSS.2010.412"},{"issue":"3","key":"7_CR4","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1177\/1473095209104824","volume":"8","author":"DC Brabham","year":"2009","unstructured":"Brabham, D.C.: Crowdsourcing the public participation process for planning projects. Plann. Theory 8(3), 242\u2013262 (2009)","journal-title":"Plann. Theory"},{"key":"7_CR5","unstructured":"Chakraborty, R., Agrawal, M., Rao, H.R.: An exploratory study of information processing under stress: the case of Mumbai Police Control and first responders during terrorist attacks of November 26, 2008. In: Pre-ICIS ISGSEC Workshop on Information Security and Privacy, St. Louis, Missouri, 12 December 2010 (2010)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1037\/11503-000","volume-title":"Rumor Psychology Social and Organizational Approaches","author":"N DiFonzo","year":"2007","unstructured":"DiFonzo, N., Bordia, P.: Rumor Psychology Social and Organizational Approaches, pp. 13\u201334. American Psychological Association, Washington, D.C. (2007)"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.17645\/mac.v1i1.70","volume":"1","author":"JV Dijkc","year":"2013","unstructured":"Dijkc, J.V., Poell, T.: Understanding social media logic. Media Commun. 1, 2\u201314 (2013)","journal-title":"Media Commun."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.5152\/jaem.2014.19971","volume":"13","author":"A Ek\u015fil","year":"2014","unstructured":"Ek\u015fil, A., Celikli, S., Kiyan, G.S.: The effects of social networking on disaster communication used by the emergency medical and rescue staff. J. Acad. Emerg. Med. 13, 58\u201361 (2014)","journal-title":"J. Acad. Emerg. Med."},{"issue":"2","key":"7_CR9","first-page":"165","volume":"18","author":"RH Ennis","year":"1996","unstructured":"Ennis, R.H.: Critical thinking dispositions: their nature and assessability. Informal Log. 18(2), 165\u2013182 (1996)","journal-title":"Informal Log."},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.jrurstud.2013.02.006","volume":"31","author":"R Fisher","year":"2013","unstructured":"Fisher, R.: A gentleman\u2019s handshake: the role of social capital and trust in transforming information into usable knowledge. J. Rural Stud. 31, 13\u201322 (2013)","journal-title":"J. Rural Stud."},{"issue":"10\u201311","key":"7_CR11","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1016\/j.telpol.2007.07.008","volume":"31","author":"P Jaeger","year":"2007","unstructured":"Jaeger, P., Shneiderman, B., Fleischmann, K., Preece, J., Qu, Y., Fei, W.: Community response grids: e-government, social networks, and effective emergency management. Telecommun. Policy 31(10\u201311), 592\u2013604 (2007)","journal-title":"Telecommun. Policy"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","volume":"53","author":"AM Kaplan","year":"2010","unstructured":"Kaplan, A.M., Haenlein, M.: Users of the world, unite! The challenges and opportunities of social media. Bus. Horiz. 53(1), 59\u201368 (2010)","journal-title":"Bus. Horiz."},{"key":"7_CR13","unstructured":"Kelllingley, N.: Information overloads, why it matters and how to combat it. \n                    https:\/\/design.org\/literature\/article\/information-overloadwhy-it-matters-and-how-to-combat-it\n                    \n                  . Accessed 28 Sept 2016"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Li, H., Sakamato, Y.: Computing the veracity of information through crowds: a method for reducing the spread of false messages on social media, pp. 2003\u20132011 (2015)","DOI":"10.2139\/ssrn.2564247"},{"key":"7_CR15","unstructured":"Lister, M.: 40 Essential Social Media Marketing Statistics for 2017, 20 January 2017. \n                    http:\/\/www.wordstream.com\/blog\/ws\/2017\/01\/05\/social-media-marketing-statistics\n                    \n                  . Accessed 24 Apr 2017"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT?, pp. 71\u201379 (2010)","DOI":"10.1145\/1964858.1964869"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Murayama, Y., Saito, Y., Nishioka, D.: Trust issues in disaster communications. In: Proceeding of the 46th Hawaii International Conference on System Science, pp. 335\u2013342 (2013)","DOI":"10.1109\/HICSS.2013.576"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"407","DOI":"10.25300\/MISQ\/2013\/37.2.05","volume":"37","author":"O Oh","year":"2013","unstructured":"Oh, O., Agrawal, M., Rao, H.R.: Community intelligence and social media services: a rumor theoretic analysis of tweets during social crisis. MIS Q. 37(2), 407\u2013426 (2013)","journal-title":"MIS Q."},{"key":"7_CR19","unstructured":"Perrin, A.: Social media usage: 2005\u20132015, 8 October 2015. \n                    http:\/\/www.pewinternet.org\/2015\/10\/08\/social-networking-usage-2005-2015\/\n                    \n                  . Accessed 13 Nov 2016"},{"key":"7_CR20","unstructured":"S. V. President: Asia Pacific: daily social media usage 2015 | statistic (2016). \n                    https:\/\/www.statista.com\/statistics\/412462\/apac-daily-socialmedia-usage\/\n                    \n                  . Accessed 15 Oct 2016"},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1080\/01463373.2015.1012219","volume":"63","author":"PR Spence","year":"2015","unstructured":"Spence, P.R., Lachlan, K.A., Lin, X., Greco, M.D.: Variability in Twitter content across the stages of a natural disaster: implications for crisis communication. Commun. Q. 63(2), 171\u2013186 (2015)","journal-title":"Commun. Q."},{"key":"7_CR22","volume-title":"Design Solutions for Improving Website Quality and Effectiveness","year":"2016","unstructured":"Sreedhar, G. (ed.): Design Solutions for Improving Website Quality and Effectiveness. IGI Global, Hershey (2016)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Tanaka, Y., Sakamato, Y., Matsuka, T.: Toward a social-technological system that inactivates false rumors through the critical thinking of crowds, pp. 649\u2013658 (2013)","DOI":"10.2139\/ssrn.2150299"},{"key":"7_CR24","unstructured":"Thomson, R., Ito, N., Suda, H., Lin, F., Liu, Y., Hayasaka, R., Isochi, R., Wang, Z.: Trusting tweet: the Fukushima disaster and information source credibility on Twitter, pp. 1\u201310 (2010)"},{"issue":"1","key":"7_CR25","first-page":"29","volume":"38","author":"E Uslaner","year":"1999","unstructured":"Uslaner, E.: Trust but verify: social capital and moral behavior. Soc. Sci. Inf. (Information sur les Sciences Sociales) 38(1), 29\u201355 (1999)","journal-title":"Soc. Sci. Inf. (Information sur les Sciences Sociales)"}],"container-title":["Advances in Intelligent Systems and Computing","Emerging Trends in Intelligent Computing and Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33582-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T22:14:58Z","timestamp":1572646498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33582-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"ISBN":["9783030335816","9783030335823"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33582-3_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IRICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Reliable Information and Communication Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"irict2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/irict.co\/irict2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}