{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T11:59:18Z","timestamp":1772798358311,"version":"3.50.1"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030495695","type":"print"},{"value":"9783030495701","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49570-1_28","type":"book-chapter","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T00:25:10Z","timestamp":1594340710000},"page":"407-418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Misinformation in the Chinese Weibo"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5420-1578","authenticated-orcid":false,"given":"Lu","family":"Xiao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7410-8901","authenticated-orcid":false,"given":"Sijing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"issue":"2","key":"28_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1177\/0266382117711328","volume":"34","author":"M Cohen","year":"2017","unstructured":"Cohen, M.: Fake news and manipulated data, the new GDPR, and the future of information. Bus. Inform. Rev. 34(2), 81\u201385 (2017)","journal-title":"Bus. Inform. Rev."},{"issue":"2","key":"28_CR2","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1080\/1369118X.2018.1499793","volume":"23","author":"L Guo","year":"2020","unstructured":"Guo, L., Rohde, J.A., Wu, H.D.: Who is responsible for Twitter\u2019s echo chamber problem? Evidence from 2016 US election networks. Inf. Commun. Soc. 23(2), 234\u2013251 (2020)","journal-title":"Inf. Commun. Soc."},{"issue":"3","key":"28_CR3","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1080\/1369118X.2018.1505934","volume":"23","author":"M Carlson","year":"2020","unstructured":"Carlson, M.: Fake news as an informational moral panic: the symbolic deviancy of social media during the 2016 US presidential election. Inf. Commun. Soc. 23(3), 374\u2013388 (2020)","journal-title":"Inf. Commun. Soc."},{"issue":"13","key":"28_CR4","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1080\/1369118X.2018.1474241","volume":"22","author":"E Humprecht","year":"2019","unstructured":"Humprecht, E.: Where \u2018fake news\u2019 flourishes: a comparison across four Western democracies. Inf. Commun. Soc. 22(13), 1973\u20131988 (2019)","journal-title":"Inf. Commun. Soc."},{"issue":"11","key":"28_CR5","doi-asserted-by":"publisher","first-page":"4255","DOI":"10.1177\/1461444818769689","volume":"20","author":"A Chadwick","year":"2018","unstructured":"Chadwick, A., Vaccari, C., O\u2019Loughlin, B.: Do tabloids poison the well of social media? Explaining democratically dysfunctional news sharing. New Media Soc. 20(11), 4255\u20134274 (2018)","journal-title":"New Media Soc."},{"issue":"6","key":"28_CR6","doi-asserted-by":"publisher","first-page":"e0128193","DOI":"10.1371\/journal.pone.0128193","volume":"10","author":"GL Ciampaglia","year":"2015","unstructured":"Ciampaglia, G.L., Shiralkar, P., Rocha, L.M., Bollen, J., Menczer, F., Flammini, A.: Computational fact checking from knowledge networks. PLoS ONE 10(6), e0128193 (2015)","journal-title":"PLoS ONE"},{"issue":"1","key":"28_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: A data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22\u201336 (2017)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Vlachos, A., Riedel, S.: Fact checking: Task definition and dataset construction. In Proceedings of the ACL 2014 Workshop on Language Technologies and Computational Social Science, pp. 18\u201322 (2014)","DOI":"10.3115\/v1\/W14-2508"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-030-15742-5_45","volume-title":"Information in Contemporary Society","author":"YM Kow","year":"2019","unstructured":"Kow, Y.M., Kou, Y., Zhu, X., Sy, W.H.: Just my intuition: Awareness of versus acting on political news misinformation. In: Taylor, N.G., Christian-Lamb, C., Martin, M.H., Nardi, B. (eds.) iConference 2019. LNCS, vol. 11420, pp. 469\u2013480. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15742-5_45"},{"issue":"3","key":"28_CR10","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1177\/0196859912458700","volume":"36","author":"R Marchi","year":"2012","unstructured":"Marchi, R.: With Facebook, blogs, and fake news, teens reject journalistic \u201cobjectivity\u201d. J. Commun. Inq. 36(3), 246\u2013262 (2012)","journal-title":"J. Commun. Inq."},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/3161603","volume":"51","author":"A Zubiaga","year":"2018","unstructured":"Zubiaga, A., Aker, A., Bontcheva, K., Liaka-ta, M., Procter, R.: Detection and resolution of rumours in social media: A survey. ACM Comput. Surv. (CSUR) 51(2), 32 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Thorne, J., Vlachos, A., Christodoulopoulos, C., Mittal, A.: FEVER: a large-scale dataset for Fact Extraction and VERification, 2018 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL-HLT) (2018). https:\/\/aclweb.org\/anthology\/N18-1074","DOI":"10.18653\/v1\/N18-1074"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Wang, W.Y.: Liar, Liar Pants on Fire: A new benchmark dataset for fake news detection. In: 55th Annual Meeting of the Association for Computational Linguistics (ACL), pp. 422\u2013426 (2017). https:\/\/www.aclweb.org\/anthology\/P17-2067","DOI":"10.18653\/v1\/P17-2067"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Ferreira, W., Vlachos, A.: Emergent: a novel data-set for stance classification. In: 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1163\u20131168 (2016)","DOI":"10.18653\/v1\/N16-1138"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Yang, F., Liu, Y., Yu, X., Yang, M.: Automatic detection of rumor on Sina Weibo. In: The ACM SIGKDD Workshop on Mining Data Semantics (2012)","DOI":"10.1145\/2350190.2350203"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Chen, T., Li, X., Yin, H., Zhang, J.: Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 40\u201352, June 2018","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Ma, J., Gao, W., Wei, Z., Lu, Y., Wong, K.F.: Detect rumors using time series of social context information on microblogging websites. In: 24th ACM International on Conference on Information and Knowledge Management, pp. 1751\u20131754 (2015)","DOI":"10.1145\/2806416.2806607"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Sun, S., Liu, H., He, J., Du, X.: Detecting event rumors on Sina Weibo automatically. In: Asia-Pacific Web Conference, pp. 120\u2013131 (2013)","DOI":"10.1007\/978-3-642-37401-2_14"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Wu, K., Yang, S., Zhu, K.Q.: False rumors detection on sina weibo by propagation structures. In: 2015 IEEE 31st International Conference on Data Engineering, pp. 651\u2013662 (2015)","DOI":"10.1109\/ICDE.2015.7113322"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wu, Y.F.B.: Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, K., Shu, C., Li, B., Lau, J.H.: Early rumour detection. In: Proceedings of NAACL-HLT 2019, pp. 1614\u20131623 (2019)","DOI":"10.18653\/v1\/N19-1163"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Yuan, Q., Gao, Q.: The analysis of online news information credibility assessment on Weibo based on analyzing content. In: International Conference on Engineering Psychology and Cognitive Ergonomics, pp. 125\u2013135 (2016)","DOI":"10.1007\/978-3-319-40030-3_14"},{"key":"28_CR23","unstructured":"Dang, Z.R.: An analysis of China\u2019s rumor spreading process via Sina Weibo, Master\u2019s Thesis, Bangkok University (2016). http:\/\/dspace.bu.ac.th\/jspui\/handle\/123456789\/2027"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Liu, R., Grunert, K.G.: Satisfaction with food-related life and beliefs about food health, safety, freshness and taste among the elderly in China: A segmentation analysis. Food Qual. Prefer., p. 103775 (2019)","DOI":"10.1016\/j.foodqual.2019.103775"},{"key":"28_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.yclnex.2018.01.001","volume":"18","author":"Q Wu","year":"2018","unstructured":"Wu, Q., Liang, X.: Food therapy and medical diet therapy of traditional Chinese medicine. Clin. Nutr. Experimental 18, 1\u20135 (2018)","journal-title":"Clin. Nutr. Experimental"},{"key":"28_CR26","unstructured":"BCG (Boston Consulting Group): Capturing a share of China\u2019s consumer health market from insight to action (2014). https:\/\/www.bcg.com\/publications\/2014\/center-consumer-customer-insight-globalization-insight-action-capturing-share-chinas-consumer-health-market.aspx. Accessed 5 May 2018"},{"issue":"106","key":"28_CR27","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1080\/10670564.2017.1274827","volume":"26","author":"X Wu","year":"2017","unstructured":"Wu, X., Yang, D.L., Chen, L.: The politics of quality-of-life issues: food safety and political trust in China. J. Contemp. China 26(106), 601\u2013615 (2017)","journal-title":"J. Contemp. China"},{"issue":"1","key":"28_CR28","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s12117-012-9167-z","volume":"16","author":"A Shen","year":"2013","unstructured":"Shen, A., Antonopoulos, G.A., Papanicolaou, G.: China\u2019s stolen children: internal child trafficking in the People\u2019s Republic of China. Trends Organized Crime 16(1), 31\u201348 (2013)","journal-title":"Trends Organized Crime"},{"issue":"2","key":"28_CR29","doi-asserted-by":"crossref","first-page":"e817","DOI":"10.18063\/ijps.v4i2.817","volume":"4","author":"Y Xin","year":"2018","unstructured":"Xin, Y., Cai, T.: Child trafficking in China: evidence from sentencing documents. Int. J. Popul. Stud. 4(2), e817\u2013e817 (2018)","journal-title":"Int. J. Popul. Stud."},{"key":"28_CR30","first-page":"153","volume-title":"Social Psychophysiology: A Sourcebook","author":"RW Rogers","year":"1983","unstructured":"Rogers, R.W.: Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In: Cacioppo, J.T., Petty, R.E. (eds.) Social Psychophysiology: A Sourcebook, pp. 153\u2013176. Guilford Press, New York (1983)"},{"key":"28_CR31","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1037\/0022-3514.32.2.222","volume":"32","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W., Deckner, C.W.: Effects of fear appeals and physiological arousal upon emotion, attitudes, and cigarette smoking. J. Pers. Soc. Psychol. 32, 222\u2013230 (1975)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"6","key":"28_CR32","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1080\/08870440108405863","volume":"16","author":"RA Ruiter","year":"2001","unstructured":"Ruiter, R.A., Abraham, C., Kok, G.: Scary warnings and rational precautions: A review of the psychology of fear appeals. Psychol. Health 16(6), 613\u2013630 (2001)","journal-title":"Psychol. Health"},{"issue":"6","key":"28_CR33","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1037\/a0039729","volume":"141","author":"MB Tannenbaum","year":"2015","unstructured":"Tannenbaum, M.B., et al.: Appealing to fear: a meta-analysis of fear appeal effectiveness and theories. Psychol. Bull. 141(6), 1178\u20131204 (2015)","journal-title":"Psychol. Bull."},{"key":"28_CR34","volume-title":"Persuasion: Theory and Practice","author":"DJ O\u2019Keefe","year":"1990","unstructured":"O\u2019Keefe, D.J.: Persuasion: Theory and Practice. Sage, Newbury Park (1990)"},{"issue":"1","key":"28_CR35","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1140\/epjds\/s13688-017-0121-9","volume":"6","author":"AJ Reagan","year":"2017","unstructured":"Reagan, A.J., Danforth, C.M., Tivnan, B., Williams, J.R., Dodds, P.S.: Sentiment analysis methods for understanding large-scale texts: a case for using continuum-scored words and word shift graphs. EPJ Data Sci. 6(1), 28 (2017)","journal-title":"EPJ Data Sci."},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Gao, R., Hao, B., Li, H., Gao, Y., Zhu, T.: Developing simplified Chinese psychological linguistic analysis dictionary for microblog. In: International Conference on Brain and Health Informatics, pp. 359\u2013368 (2013)","DOI":"10.1007\/978-3-319-02753-1_36"},{"issue":"3","key":"28_CR37","doi-asserted-by":"publisher","first-page":"393","DOI":"10.5465\/amr.1998.926617","volume":"23","author":"DM Rousseau","year":"1998","unstructured":"Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: A cross-discipline view of trust. Acad. Manage. Rev. 23(3), 393\u2013404 (1998)","journal-title":"Acad. Manage. Rev."},{"issue":"3","key":"28_CR38","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manage. Rev. 20(3), 709\u2013734 (1995)","journal-title":"Acad. Manage. Rev."},{"issue":"2","key":"28_CR39","first-page":"12","volume":"2","author":"DH Mcknight","year":"2011","unstructured":"Mcknight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: An investigation of its components and measures. ACM Trans. Manage. Inf. Syst. (TMIS) 2(2), 12 (2011)","journal-title":"ACM Trans. Manage. Inf. Syst. (TMIS)"},{"issue":"4","key":"28_CR40","doi-asserted-by":"publisher","first-page":"967","DOI":"10.2307\/2578601","volume":"63","author":"JD Lewis","year":"1985","unstructured":"Lewis, J.D., Weigert, A.: Trust as a social reality. Soc. Forces 63(4), 967\u2013985 (1985)","journal-title":"Soc. Forces"},{"key":"28_CR41","doi-asserted-by":"crossref","unstructured":"Xiao, L., Khazaei, T.: Changing others\u2019 beliefs online: online comments\u2019 persuasiveness. In: Proceedings of the 10th International Conference on Social Media and Society, pp. 92\u2013101 (2019)","DOI":"10.1145\/3328529.3328549"}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49570-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T19:35:59Z","timestamp":1723232159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49570-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030495695","9783030495701"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49570-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}