{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T11:19:17Z","timestamp":1763551157158,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031486418"},{"type":"electronic","value":"9783031486425"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48642-5_31","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T09:02:16Z","timestamp":1700902936000},"page":"304-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Understanding the\u00a0Role of\u00a0the\u00a0User in\u00a0Information Propagation on\u00a0Online Social Networks: A Literature Review and\u00a0Proposed User Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0937-0529","authenticated-orcid":false,"given":"Eleana","family":"Jerez-Villota","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7559-8236","authenticated-orcid":false,"given":"Francisco","family":"Jurado","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2918-5259","authenticated-orcid":false,"given":"Jaime","family":"Moreno-Llorena","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"31_CR1","unstructured":"Social media terms. https:\/\/www.socialpilot.co\/social-media-terms"},{"issue":"2","key":"31_CR2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.2.023041","volume":"2","author":"HZ Brooks","year":"2020","unstructured":"Brooks, H.Z., Porter, M.A.: A model for the influence of media on the ideology of content in online social networks. Phys. Rev. Res. 2(2), 023041 (2020)","journal-title":"Phys. Rev. Res."},{"key":"31_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2020.125063","volume":"559","author":"S Chen","year":"2020","unstructured":"Chen, S., et al.: Rumor propagation model with consideration of scientific knowledge level and social reinforcement in heterogeneous network. Phys. A 559, 125063 (2020)","journal-title":"Phys. A"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.eswa.2016.03.050","volume":"57","author":"Q Dang","year":"2016","unstructured":"Dang, Q., Gao, F., Zhou, Y.: Early detection method for emerging topics based on dynamic Bayesian networks in micro-blogging networks. Expert Syst. Appl. 57, 285\u2013295 (2016)","journal-title":"Expert Syst. Appl."},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"50095","DOI":"10.1109\/ACCESS.2019.2910238","volume":"7","author":"X Deng","year":"2019","unstructured":"Deng, X., Chang, L., Tao, J., Pan, J.: Reducing the overhead of multicast using social features in mobile opportunistic networks. IEEE Access 7, 50095\u201350108 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"31_CR6","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/a13020032","volume":"13","author":"M Di Ianni","year":"2020","unstructured":"Di Ianni, M., Varricchio, G.: Latency-bounded target set selection in signed networks. Algorithms 13(2), 32 (2020)","journal-title":"Algorithms"},{"issue":"3","key":"31_CR7","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSC.2014.2310216","volume":"7","author":"M Doo","year":"2014","unstructured":"Doo, M., Liu, L.: Probabilistic diffusion of social influence with incentives. IEEE Trans. Serv. Comput. 7(3), 387\u2013400 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"6267","DOI":"10.1007\/s00500-018-3283-x","volume":"23","author":"K Gu","year":"2019","unstructured":"Gu, K., Wang, L., Yin, B.: Social community detection and message propagation scheme based on personal willingness in social network. Soft. Comput. 23, 6267\u20136285 (2019)","journal-title":"Soft. Comput."},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1016\/j.ins.2019.10.063","volume":"512","author":"AIE Hosni","year":"2020","unstructured":"Hosni, A.I.E., Li, K., Ahmad, S.: Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors. Inf. Sci. 512, 1458\u20131480 (2020)","journal-title":"Inf. Sci."},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"36050","DOI":"10.1109\/ACCESS.2018.2849397","volume":"6","author":"Y Jing","year":"2018","unstructured":"Jing, Y., Wei, Z., Xiao-Mei, Z., Qing-Chao, Z.: Tip over community: backbone nodes detection based on community structure. IEEE Access 6, 36050\u201336063 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"31_CR11","doi-asserted-by":"publisher","first-page":"731","DOI":"10.3390\/sym13040731","volume":"13","author":"A Karczmarczyk","year":"2021","unstructured":"Karczmarczyk, A., Jankowski, J., W\u0105trobski, J.: Multi-criteria seed selection for targeting multi-attribute nodes in complex networks. Symmetry 13(4), 731 (2021)","journal-title":"Symmetry"},{"key":"31_CR12","unstructured":"Keele, S., et\u00a0al.: Guidelines for performing systematic literature reviews in software engineering (2007)"},{"key":"31_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112905","volume":"140","author":"MM Keikha","year":"2020","unstructured":"Keikha, M.M., Rahgozar, M., Asadpour, M., Abdollahi, M.F.: Influence maximization across heterogeneous interconnected networks based on deep learning. Expert Syst. Appl. 140, 112905 (2020)","journal-title":"Expert Syst. Appl."},{"key":"31_CR14","unstructured":"Kemp, S.: Digital 2023 april global statshot report. https:\/\/datareportal.com\/reports\/digital-2023-april-global-statshot"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Kong, J.H., Han, M.M.: Malware containment using weight based on incremental pagerank in dynamic social networks. KSII Trans. Internet Inform. Syst. 9(1), 421 (2015)","DOI":"10.3837\/tiis.2015.01.026"},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.osnem.2018.01.001","volume":"5","author":"C Lagnier","year":"2018","unstructured":"Lagnier, C., Gaussier, E., Kawala, F.: User-centered probabilistic models for content diffusion in the blogosphere. Online Soc. Netw. Media 5, 61\u201375 (2018)","journal-title":"Online Soc. Netw. Media"},{"issue":"3","key":"31_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2700466","volume":"6","author":"K Lee","year":"2015","unstructured":"Lee, K., Mahmud, J., Chen, J., Zhou, M., Nichols, J.: Who will retweet this? Detecting strangers from twitter to retweet information. ACM Trans. Intell. Syst. Technol. (TIST) 6(3), 1\u201325 (2015)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"issue":"2","key":"31_CR18","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TCSS.2019.2900299","volume":"6","author":"Q Li","year":"2019","unstructured":"Li, Q., Liu, L., Xu, M., Wu, B., Xiao, Y.: GDTM: a gaussian dynamic topic model for forwarding prediction under complex mechanisms. IEEE Trans. Comput. Soc. Syst. 6(2), 338\u2013349 (2019)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"31_CR19","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.physa.2018.09.032","volume":"513","author":"X Liu","year":"2019","unstructured":"Liu, X., He, D., Yang, L., Liu, C.: A novel negative feedback information dissemination model based on online social network. Phys. A 513, 371\u2013389 (2019)","journal-title":"Phys. A"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"18023","DOI":"10.1007\/s00521-018-03967-z","volume":"32","author":"D Mulders","year":"2020","unstructured":"Mulders, D., de Bodt, C., Bjelland, J., Pentland, A., Verleysen, M., de Montjoye, Y.A.: Inference of node attributes from social network assortativity. Neural Comput. Appl. 32, 18023\u201318043 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"10","key":"31_CR21","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1016\/j.comnet.2013.04.002","volume":"57","author":"NP Nguyen","year":"2013","unstructured":"Nguyen, N.P., Yan, G., Thai, M.T.: Analysis of misinformation containment in online social networks. Comput. Netw. 57(10), 2133\u20132146 (2013)","journal-title":"Comput. Netw."},{"issue":"4","key":"31_CR22","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MNET.2016.7513861","volume":"30","author":"J Niu","year":"2016","unstructured":"Niu, J., Wang, D., Stojmenovic, M.: How does information diffuse in large recommendation social networks? IEEE Network 30(4), 28\u201333 (2016)","journal-title":"IEEE Network"},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.ins.2020.11.042","volume":"551","author":"YW Niu","year":"2021","unstructured":"Niu, Y.W., Qu, C.Q., Wang, G.H., Wu, J.L., Yan, G.Y.: Information spreading with relative attributes on signed networks. Inf. Sci. 551, 54\u201366 (2021)","journal-title":"Inf. Sci."},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"78879","DOI":"10.1109\/ACCESS.2020.2989140","volume":"8","author":"DV Pham","year":"2020","unstructured":"Pham, D.V., Nguyen, G.L., Nguyen, T.N., Pham, C.V., Nguyen, A.V.: Multi-topic misinformation blocking with budget constraint on online social networks. IEEE Access 8, 78879\u201378889 (2020)","journal-title":"IEEE Access"},{"key":"31_CR25","doi-asserted-by":"publisher","first-page":"12430","DOI":"10.1109\/ACCESS.2022.3145323","volume":"10","author":"R Ren","year":"2022","unstructured":"Ren, R., Zapata, M., Castro, J.W., Dieste, O., Acu\u00f1a, S.T.: Experimentation for chatbot usability evaluation: a secondary study. IEEE Access 10, 12430\u201312464 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"31_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-019-0556-z","volume":"9","author":"S Sarkar","year":"2019","unstructured":"Sarkar, S., Guo, R., Shakarian, P.: Using network motifs to characterize temporal network evolution leading to diffusion inhibition. Soc. Netw. Anal. Min. 9(1), 1\u201324 (2019). https:\/\/doi.org\/10.1007\/s13278-019-0556-z","journal-title":"Soc. Netw. Anal. Min."},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Scott, J.: What is social network analysis? Bloomsbury Academic (2012)","DOI":"10.5040\/9781849668187"},{"key":"31_CR28","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s00607-020-00858-x","volume":"103","author":"J Shang","year":"2021","unstructured":"Shang, J., et al.: RNe2Vec: information diffusion popularity prediction based on repost network embedding. Computing 103, 271\u2013289 (2021)","journal-title":"Computing"},{"issue":"1","key":"31_CR29","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.7643","volume":"20","author":"J Shi","year":"2018","unstructured":"Shi, J., Salmon, C.T.: Identifying opinion leaders to promote organ donation on social media: network study. J. Med. Internet Res. 20(1), e7 (2018)","journal-title":"J. Med. Internet Res."},{"issue":"1","key":"31_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40649-015-0025-4","volume":"2","author":"E Stai","year":"2015","unstructured":"Stai, E., Karyotis, V., Papavassiliou, S.: Analysis and control of information diffusion dictated by user interest in generalized networks. Comput. Soc. Netw. 2(1), 1\u201331 (2015). https:\/\/doi.org\/10.1186\/s40649-015-0025-4","journal-title":"Comput. Soc. Netw."},{"key":"31_CR31","doi-asserted-by":"publisher","first-page":"6105","DOI":"10.1109\/ACCESS.2016.2612298","volume":"4","author":"Z Tan","year":"2016","unstructured":"Tan, Z., Ning, J., Liu, Y., Wang, X., Yang, G., Yang, W.: ECRModel: an elastic collision-based rumor-propagation model in online social networks. IEEE Access 4, 6105\u20136120 (2016)","journal-title":"IEEE Access"},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"Wang, C., Tang, J., Sun, J., Han, J.: Dynamic social influence analysis through time-dependent factor graphs. In: 2011 International Conference on Advances in Social Networks Analysis and Mining, pp. 239\u2013246. IEEE (2011)","DOI":"10.1109\/ASONAM.2011.116"},{"issue":"4","key":"31_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3068332","volume":"11","author":"G Wang","year":"2017","unstructured":"Wang, G., Zhang, X., Tang, S., Wilson, C., Zheng, H., Zhao, B.Y.: Clickstream user behavior models. ACM Trans. Web (TWEB) 11(4), 1\u201337 (2017)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"31_CR34","doi-asserted-by":"publisher","first-page":"3907","DOI":"10.1109\/ACCESS.2016.2600526","volume":"4","author":"J Wang","year":"2016","unstructured":"Wang, J., Jiang, C., Quek, T.Q., Wang, X., Ren, Y.: The value strength aided information diffusion in socially-aware mobile networks. IEEE Access 4, 3907\u20133919 (2016)","journal-title":"IEEE Access"},{"key":"31_CR35","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.ins.2020.05.027","volume":"536","author":"L Wang","year":"2020","unstructured":"Wang, L., Li, L., Chen, G., Ye, Q.: Edge instability: a critical parameter for the propagation and robustness analysis of large networks. Inf. Sci. 536, 358\u2013371 (2020)","journal-title":"Inf. Sci."},{"key":"31_CR36","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.neucom.2017.04.064","volume":"260","author":"Z Wang","year":"2017","unstructured":"Wang, Z., Du, C., Fan, J., Xing, Y.: Ranking influential nodes in social networks based on node position and neighborhood. Neurocomputing 260, 466\u2013477 (2017)","journal-title":"Neurocomputing"},{"key":"31_CR37","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/s00766-005-0021-6","volume":"11","author":"R Wieringa","year":"2006","unstructured":"Wieringa, R., Maiden, N., Mead, N., Rolland, C.: Requirements engineering paper classification and evaluation criteria: a proposal and a discussion. Requirements Eng. 11, 102\u2013107 (2006)","journal-title":"Requirements Eng."},{"key":"31_CR38","doi-asserted-by":"publisher","first-page":"62612","DOI":"10.1109\/ACCESS.2018.2876394","volume":"6","author":"Y Wu","year":"2018","unstructured":"Wu, Y., Huang, H., Zhao, J., Wang, C., Wang, T.: Using mobile nodes to control rumors in big data based on a new rumor propagation model in vehicular social networks. IEEE Access 6, 62612\u201362621 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"31_CR39","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TCSS.2019.2922431","volume":"6","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Yu, H., Li, Q., Liu, L., Xu, M., Xiao, H.: MPURank: a social hotspot tracking scheme based on tripartite graph and multi messages iterative driven. IEEE Trans. Comput. Soc. Syst. 6(4), 715\u2013725 (2019)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"31_CR40","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00779-019-01308-y","volume":"24","author":"X Xu","year":"2020","unstructured":"Xu, X.: Cultural communication in double-layer coupling social network based on association rules in big data. Pers. Ubiquit. Comput. 24(1), 57\u201374 (2020)","journal-title":"Pers. Ubiquit. Comput."},{"key":"31_CR41","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s00500-016-2335-3","volume":"22","author":"L Yang","year":"2018","unstructured":"Yang, L., Qiao, Y., Liu, Z., Ma, J., Li, X.: Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm. Soft Comput. 22, 453\u2013464 (2018)","journal-title":"Soft Comput."},{"key":"31_CR42","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s11280-020-00850-7","volume":"24","author":"H Yin","year":"2021","unstructured":"Yin, H., Yang, S., Song, X., Liu, W., Li, J.: Deep fusion of multimodal features for social media retweet time prediction. World Wide Web 24, 1027\u20131044 (2021)","journal-title":"World Wide Web"},{"key":"31_CR43","doi-asserted-by":"publisher","first-page":"151252","DOI":"10.1109\/ACCESS.2019.2946391","volume":"7","author":"Q Zhan","year":"2019","unstructured":"Zhan, Q., Zhuo, W., Liu, Y.: Social influence maximization for public health campaigns. IEEE Access 7, 151252\u2013151260 (2019)","journal-title":"IEEE Access"},{"issue":"22","key":"31_CR44","doi-asserted-by":"publisher","first-page":"8160","DOI":"10.3390\/app10228160","volume":"10","author":"C Zhao","year":"2020","unstructured":"Zhao, C., Xin, Y., Li, X., Zhu, H., Yang, Y., Chen, Y.: An attention-based graph neural network for spam bot detection in social networks. Appl. Sci. 10(22), 8160 (2020)","journal-title":"Appl. Sci."},{"key":"31_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105502","volume":"193","author":"Y Zhao","year":"2020","unstructured":"Zhao, Y., Yang, N., Lin, T., Philip, S.Y.: Deep collaborative embedding for information cascade prediction. Knowl. Based Syst. 193, 105502 (2020)","journal-title":"Knowl. Based Syst."},{"key":"31_CR46","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhao, X., Zhang, X., Ye, X., Dai, Q., et\u00a0al.: Mining the hidden link structure from distribution flows for a spatial social network. Complexity 2019 (2019)","DOI":"10.1155\/2019\/6902027"},{"issue":"10","key":"31_CR47","doi-asserted-by":"publisher","first-page":"e0140556","DOI":"10.1371\/journal.pone.0140556","volume":"10","author":"C Zhou","year":"2015","unstructured":"Zhou, C., Zhao, Q., Lu, W.: Impact of repeated exposures on information spreading in social networks. PLoS ONE 10(10), e0140556 (2015)","journal-title":"PLoS ONE"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 15th International Conference on Ubiquitous Computing &amp; Ambient Intelligence (UCAmI 2023)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48642-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T09:15:56Z","timestamp":1700903756000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48642-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031486418","9783031486425"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48642-5_31","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UCAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Computing and Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Riviera Maya","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexico","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ucami2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ucami.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}