{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:13:58Z","timestamp":1725794038312},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319075686"},{"type":"electronic","value":"9783319075693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07569-3_17","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:15:55Z","timestamp":1400595355000},"page":"202-213","source":"Crossref","is-referenced-by-count":0,"title":["Framework for Opinion Spammers Detection"],"prefix":"10.1007","author":[{"given":"Andrzej","family":"Opalinski","sequence":"first","affiliation":[]},{"given":"Grzegorz","family":"Dobrowolski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-25952-7_13","volume-title":"Intelligence and Security Informatics","author":"H.-C. Chen","year":"2004","unstructured":"Chen, H.-C., Goldberg, M., Magdon-Ismail, M.: Identifying multi-ID users in open forums. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 176\u2013186. Springer, Heidelberg (2004)"},{"key":"17_CR2","unstructured":"Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: Detection of hidden paid posters. arXiv preprint:1111.4297 (2011)"},{"issue":"6","key":"17_CR3","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.1016\/j.chb.2006.09.001","volume":"23","author":"K.M. Christopherson","year":"2007","unstructured":"Christopherson, K.M.: The positive and negative implications of anonymity in Internet social interactions: On the Internet, nobody knows you\u2019re a dog. Computers in Human Behavior\u00a023(6), 3038\u20133056 (2007)","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"17_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O. Vel De","year":"2001","unstructured":"De Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining e-mail content for author identification forensics. ACM Sigmod Record\u00a030(4), 55\u201364 (2001)","journal-title":"ACM Sigmod Record"},{"key":"17_CR5","unstructured":"Harris, C.G.: Detecting Deceptive Opinion Spam Using Human Computation. In: Workshops at the Twenty-Sixth AAAI Conference on Artificial Intelligence (2012)"},{"key":"17_CR6","unstructured":"International Telecommunication Union: Measuring the Information Society 2012, Place des Nations, CH-1211 Geneva Switzerland (2012) ISBN 978-92-61-14071-7"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Analyzing and Detecting Review Spam. In: Data Mining, ICDM 2007, October 28-31, pp. 547\u2013552 (2007)","DOI":"10.1109\/ICDM.2007.68"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the International Conference on Web Search and Web Data Mining, pp. 219\u2013230 (2008)","DOI":"10.1145\/1341531.1341560"},{"issue":"3","key":"17_CR9","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1561\/1500000005","volume":"1","author":"P. Juola","year":"2007","unstructured":"Juola, P.: Authorship attribution. Foundations and Trends in Information Retrieval\u00a01(3), 233\u2013334 (2007)","journal-title":"Foundations and Trends in Information Retrieval"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Kim, S.M., Pantel, P., Chklovski, T., Pennacchiotti, M.: Automatically assessing review helpfulness. In: Proc. of the 2006 Conference on Empirical Methods in Natural Language Processing, pp. 423\u2013430 (2006)","DOI":"10.3115\/1610075.1610135"},{"key":"17_CR11","unstructured":"Le, J., Edmonds, A., Hester, V., Biewald, L.: Ensuring quality in crowdsourced search relevance evaluation: The effects of training question distribution. In: SIGIR 2010 Workshop on Crowdsourcing for Search Evaluation, pp. 21\u201326 (2010)"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10796-010-9270-0","volume":"13","author":"J. Li","year":"2010","unstructured":"Li, J., Wang, G.A., Chen, H.: Identity matching using personal and social identity features. Information Systems Frontiers\u00a013(1), 101\u2013113 (2010)","journal-title":"Information Systems Frontiers"},{"key":"17_CR13","unstructured":"Maciolek, P., Dobrowolski, G.: CLUO: Web-Scale Text Mining System for Open Source Intelligence Purposes. Computer Science\u00a014(1), 45 (2013), doi:10.7494"},{"key":"17_CR14","unstructured":"Miniwatts Marketing Group: World internet usage and population statistics (June 30, 2012), \n                  \n                    http:\/\/www.internetworldstats.com"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance, N.: Spotting Fake reviewer groups in consumer reviews. In: Proc. of the 21st Int. Conf. on WWW, pp. 191\u2013200. ACM (2012)","DOI":"10.1145\/2187836.2187863"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Musial, K., Kazienko, P.: Social networks on the internet. World Wide Web, 1\u201342 (2012)","DOI":"10.1007\/s11280-011-0155-z"},{"key":"17_CR17","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. arXiv preprint:1107.4557 (2011)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Pillay, S.R., Solorio, T.: Authorship attribution of web forum posts. In: eCrime Researchers Summit (eCrime), pp. 1\u20137. IEEE (2010)","DOI":"10.1109\/ecrime.2010.5706693"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Stamatatos, E.: Author identification using imbalanced and limited training texts. In: 18th International Workshop on DEXA 2007, pp. 237\u2013241. IEEE (2007)","DOI":"10.1109\/DEXA.2007.5"},{"issue":"3","key":"17_CR20","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E. Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. Journal of the American Society for information Science and Technology\u00a060(3), 538\u2013556 (2009)","journal-title":"Journal of the American Society for information Science and Technology"},{"key":"17_CR21","unstructured":"Stamatatos, E.: Intrinsic plagiarism detection using character n-gram profiles. In: 3rd PAN Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse, vol.\u00a02, p. 38 (2009)"},{"key":"17_CR22","unstructured":"Thomas, D., Loader, B.: Cybercrime: Security and surveillance in the information age. Routledge (2000)"},{"key":"17_CR23","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-21512-4_22","volume-title":"Multimedia Communications, Services and Security","author":"W. Turek","year":"2011","unstructured":"Turek, W., Opalinski, A., Kisiel-Dorohinicki, M.: Extensible web crawler \u2013 towards multimedia material analysis. In: Dziech, A., Czy\u017cewski, A. (eds.) MCSS 2011. CCIS, vol.\u00a0149, pp. 183\u2013190. Springer, Heidelberg (2011)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/11427995_30","volume-title":"Intelligence and Security Informatics","author":"A.G. Wang","year":"2005","unstructured":"Wang, A.G., Atabakhsh, H., Petersen, T., Chen, H.: Discovering identity problems: A case study. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol.\u00a03495, pp. 368\u2013373. Springer, Heidelberg (2005)"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Wang, D., Irani, D., Pu, C.: A social-spam detection framework. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 46\u201354 (2011)","DOI":"10.1145\/2030376.2030382"},{"key":"17_CR26","unstructured":"Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., Zhao, B.: Social Turing Tests: Crowdsourcing Sybil Detection. arXiv preprint:1205.3856 (2012)"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Weimer, M., Gurevych, I., M\u00fchlh\u00e4user, M.: Automatically assessing the post quality in online discussions on software. In: Proceedings of the 45th Annual Meeting of the ACL, pp. 125\u2013128 (2007)","DOI":"10.3115\/1557769.1557806"},{"key":"17_CR28","unstructured":"van Kokswijk, J.: Granting Personality to a Virtual Identity. International Journal of Human and Social Sciences\u00a02(4) (2010)"},{"key":"17_CR29","unstructured":"Vrij, A.: Detecting lies and deceit: Pitfalls and opportunities. Wiley Interscience (2008)"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.S.: Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD, pp. 823\u2013831 (2012)","DOI":"10.1145\/2339530.2339662"},{"issue":"10","key":"17_CR31","doi-asserted-by":"crossref","first-page":"525","DOI":"10.17705\/1jais.00141","volume":"8","author":"J. Xu","year":"2007","unstructured":"Xu, J., Chau, M., Wang, G.A., Li, J.: Complex problem solving: identity matching based on social contextual information. Journal of the Association for Information Systems\u00a08(10), 525\u2013545 (2007)","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"17_CR32","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.dss.2009.11.005","volume":"48","author":"Y.C. Yang","year":"2010","unstructured":"Yang, Y.C., Padmanabhan, B.: Toward user patterns for online security: Observation time and user identification. Decision Support Systems\u00a048(4), 548\u2013558 (2010)","journal-title":"Decision Support Systems"},{"key":"17_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-44853-5_5","volume-title":"Intelligence and Security Informatics","author":"R. Zheng","year":"2003","unstructured":"Zheng, R., Qin, Y., Huang, Z., Chen, H.: Authorship analysis in cybercrime investigation. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 59\u201373. Springer, Heidelberg (2003)"},{"issue":"3","key":"17_CR34","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R. Zheng","year":"2005","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology\u00a057(3), 378\u2013393 (2005)","journal-title":"Journal of the American Society for Information Science and Technology"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07569-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:48:26Z","timestamp":1558907306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07569-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319075686","9783319075693"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07569-3_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}