{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:00:30Z","timestamp":1743008430192,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031785375"},{"type":"electronic","value":"9783031785382"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78538-2_24","type":"book-chapter","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T07:30:38Z","timestamp":1737703838000},"page":"274-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Provenance for\u00a0Longitudinal Analysis in\u00a0Large Scale Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1838-7856","authenticated-orcid":false,"given":"Andrei","family":"Stoica","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-3455","authenticated-orcid":false,"given":"Mirela","family":"Riveni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,1,25]]},"reference":[{"issue":"3","key":"24_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4793","volume":"31","author":"MJ Baeth","year":"2019","unstructured":"Baeth, M.J., Aktas, M.S.: Detecting misinformation in social networks using provenance data. Concurrency Comput. Pract. Exper. 31(3), e4793 (2019). https:\/\/doi.org\/10.1002\/cpe.4793","journal-title":"Concurrency Comput. Pract. Exper."},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Barga, R.S., Digiampietri, L.A.: Automatic generation of workflow provenance. In: Proceedings of the International Provenance and Annotation Workshop (IPAW), pp.\u00a01\u20139 (2006)","DOI":"10.1007\/11890850_1"},{"key":"24_CR3","doi-asserted-by":"publisher","unstructured":"Buneman, P., Khanna, S., Tan, W.C.: Data provenance: Some basic issues. In: FST TCS 2000: Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science, pp. 87\u201393. Springer-Verlag, London (2000). https:\/\/doi.org\/10.1007\/3-540-44450-5_6","DOI":"10.1007\/3-540-44450-5_6"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44503-X_20","volume-title":"Database Theory \u2014 ICDT 2001","author":"P Buneman","year":"2001","unstructured":"Buneman, P., Khanna, S., Wang-Chiew, T.: Why and where: a characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316\u2013330. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44503-X_20"},{"key":"24_CR5","doi-asserted-by":"publisher","unstructured":"DeVerna, M.R., et al.: Covaxxy: A collection of english-language twitter posts about covid-19 vaccines. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 15(1), pp. 992\u2013999 (2021). https:\/\/doi.org\/10.1609\/icwsm.v15i1.18122","DOI":"10.1609\/icwsm.v15i1.18122"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"DeVerna, M.R., et al.: Covaxxy: a collection of english-language twitter posts about covid-19 vaccines. In: Proceedings of the International AAAI Conference on Web and Social Media, vol.\u00a015, pp. 992\u2013999 (2021)","DOI":"10.1609\/icwsm.v15i1.18122"},{"key":"24_CR7","unstructured":"Hartig, O.: Provenance information in the web of data (2009)"},{"key":"24_CR8","doi-asserted-by":"publisher","unstructured":"Huynh, T.D., Ebden, M., Venanzi, M., Ramchurn, S.D., Roberts, S.J., Moreau, L.: Interpretation of crowdsourced activities using provenance network analysis. In: Hartman, B., Horvitz, E. (eds.) Proceedings of the First AAAI Conference on Human Computation and Crowdsourcing, HCOMP 2013, 7-9 November 2013, Palm Springs, CA, USA, pp. 78\u201385. AAAI (2013). https:\/\/doi.org\/10.1609\/hcomp.v1i1.13067","DOI":"10.1609\/hcomp.v1i1.13067"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-40593-3_6","volume-title":"Provenance and Annotation of Data and Processes","author":"T Kohwalter","year":"2016","unstructured":"Kohwalter, T., Oliveira, T., Freire, J., Clua, E., Murta, L.: Prov viewer: a graph-based visualization tool for interactive exploration of provenance data. In: Mattoso, M., Glavic, B. (eds.) IPAW 2016. LNCS, vol. 9672, pp. 71\u201382. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40593-3_6"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Migliorini, S., Gambini, M., Quintarelli, E., Belussi, A.: Tracking social provenance in chains of retweets. Knowl. Inform. Syst., 1\u201328 (2023)","DOI":"10.1007\/s10115-023-01878-7"},{"key":"24_CR11","unstructured":"Moreau, L.: ProvToolbox. https:\/\/lucmoreau.github.io\/ProvToolbox\/, Accessed 10 June 2023"},{"key":"24_CR12","unstructured":"Moreau, L.: ProvToolbox GitHub Repository. https:\/\/github.com\/lucmoreau\/ProvToolbox, Accessed 10 June 2023"},{"key":"24_CR13","doi-asserted-by":"publisher","unstructured":"Riveni, M., Nguyen, T., Aktas, M.S., Dustdar, S.: Application of provenance in social computing: a case study. Concurr. Comput. Pract. Exp. 31(3) (2019). https:\/\/doi.org\/10.1002\/cpe.4894","DOI":"10.1002\/cpe.4894"},{"issue":"3","key":"24_CR14","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"YL Simmhan","year":"2005","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Record 34(3), 31\u201336 (2005). https:\/\/doi.org\/10.1145\/1084805.1084812","journal-title":"SIGMOD Record"},{"issue":"1","key":"24_CR15","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1002\/ASI.21662","volume":"63","author":"M Thelwall","year":"2012","unstructured":"Thelwall, M., Buckley, K., Paltoglou, G.: Sentiment strength detection for the social web. J. Assoc. Inf. Sci. Technol. 63(1), 163\u2013173 (2012). https:\/\/doi.org\/10.1002\/ASI.21662","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"12","key":"24_CR16","doi-asserted-by":"publisher","first-page":"2198","DOI":"10.1109\/TVCG.2013.164","volume":"19","author":"W Willett","year":"2013","unstructured":"Willett, W., Ginosar, S., Steinitz, A., Hartmann, B., Agrawala, M.: Identifying redundancy and exposing provenance in crowdsourced data analysis. IEEE Trans. Visual Comput. Graph. 19(12), 2198\u20132206 (2013). https:\/\/doi.org\/10.1109\/TVCG.2013.164","journal-title":"IEEE Trans. Visual Comput. Graph."},{"key":"24_CR17","unstructured":"World Wide Web Consortium: PROV-DM Specification. https:\/\/www.w3.org\/TR\/2013\/REC-prov-dm-20130430\/ (2013), Accessed 10 June 2023"},{"key":"24_CR18","unstructured":"World Wide Web Consortium: PROV-O Specification. https:\/\/www.w3.org\/TR\/2013\/REC-prov-o-20130430\/ (2013), Accessed 26 May 2023"},{"key":"24_CR19","doi-asserted-by":"publisher","unstructured":"Yazici, I.M., Aktas, M.S.: A novel visualization approach for data provenance. Concurr. Comput. Pract. Exp. 34(9) (2022) https:\/\/doi.org\/10.1002\/CPE.6523, https:\/\/doi.org\/10.1002\/cpe.6523","DOI":"10.1002\/CPE.6523 10.1002\/cpe.6523"},{"key":"24_CR20","doi-asserted-by":"publisher","unstructured":"Zerbato, F., Burattin, A., V\u00f6lzer, H., Becker, P.N., Boscaini, E., Weber, B.: Supporting provenance and data awareness in exploratory process mining. In: International Conference on Advanced Information Systems Engineering. pp. 454\u2013470. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-34560-9_27","DOI":"10.1007\/978-3-031-34560-9_27"}],"container-title":["Lecture Notes in Computer Science","Social Networks Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78538-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T07:30:46Z","timestamp":1737703846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78538-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031785375","9783031785382"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78538-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASONAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Social Networks Analysis and Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rende","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asonam-12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asonam.cpsc.ucalgary.ca\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}