{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:39:02Z","timestamp":1768408742473,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319137339","type":"print"},{"value":"9783319137346","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13734-6_16","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T10:34:49Z","timestamp":1415961289000},"page":"228-243","source":"Crossref","is-referenced-by-count":218,"title":["TweetCred: Real-Time Credibility Assessment of Content on Twitter"],"prefix":"10.1007","author":[{"given":"Aditi","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Castillo","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Meier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: Phishari: Automatic realtime phishing detection on Twitter. In: 7th IEEE APWG eCrime Researchers Summit, eCRS (2012)","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"16_CR2","unstructured":"Brooke, J.: SUS: A quick and dirty usability scale. In: Jordan, P.W., Weerdmeester, B., Thomas, A., Mclelland, I.L. (eds.) Usability evaluation in industry. Taylor and Francis, London (1996)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Canini, K.R., Suh, B., Pirolli, P.L.: Finding credible information sources in social networks based on content and social structure. In: SocialCom (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.91"},{"key":"16_CR4","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proc. WWW, pp. 675\u2013684. ACM (2011), http:\/\/doi.acm.org\/10.1145\/1963405.1963500"},{"key":"16_CR5","first-page":"933","volume":"4","author":"Y. Freund","year":"2003","unstructured":"Freund, Y., Iyer, R., Schapire, R.E., Singer, Y.: An efficient boosting algorithm for combining preferences. J. Mach. Learn. Res.\u00a04, 933\u2013969 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Sharma, N., Benevenuto, F., Ganguly, N., Gummadi, K.: Cognos: crowdsourcing search for topic experts in microblogs. In: Proc. SIGIR (2012)","DOI":"10.1145\/2348283.2348361"},{"key":"16_CR7","unstructured":"Gupta, A., Kumaraguru, P.: Twitter explodes with activity in Mumbai blasts! a lifeline or an unmonitored daemon in the lurking? Tech. Rep. IIITD-TR-2011-005, IIIT, Delhi (2011)"},{"key":"16_CR8","unstructured":"Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proc. 1st Workshop on Privacy and Security in Online Social Media, PSOSM 2012, pp. 2:2\u20132:8. ACM (2012), http:\/\/doi.acm.org\/10.1145\/2185354.2185356"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, A., Lamba, H., Kumaraguru, P.: $1.00 per rt #bostonmarathon #prayforboston: Analyzing fake content on Twitter. In: Proc. Eighth IEEE APWG eCrime Research Summit (eCRS), p. 12. IEEE (2013a)","DOI":"10.1109\/eCRS.2013.6805772"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Gupta, A., Lamba, H., Kumaraguru, P., Joshi, A.: Faking sandy: characterizing and identifying fake images on Twitter during hurricane sandy. In: Proc. WWW Companion. International World Wide Web Conferences Steering Committee, pp. 729\u2013736 (2013b)","DOI":"10.1145\/2487788.2488033"},{"key":"16_CR11","unstructured":"Joachims, T.: Optimizing search engines using clickthrough data. In: Proc. KDD, pp. 133\u2013142. ACM (2002), http:\/\/doi.acm.org\/10.1145\/775047.775067"},{"key":"16_CR12","unstructured":"Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we rt? In: Proc. First Workshop on Social Media Analytics, SOMA 2010, pp. 71\u201379. ACM (2010), http:\/\/doi.acm.org\/10.1145\/1964858.1964869"},{"issue":"3","key":"16_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10791-006-9019-z","volume":"10","author":"D. Metzler","year":"2007","unstructured":"Metzler, D., Croft, W.B.: Linear feature-based models for information retrieval. Information Retrieval\u00a010(3), 257\u2013274 (2007)","journal-title":"Information Retrieval"},{"key":"16_CR14","unstructured":"Morris, M.R., Counts, S., Roseway, A., Hoff, A., Schwarz, J.: Tweeting is believing?: Understanding microblog credibility perceptions. In: Proc. CSCW. ACM (2012), http:\/\/doi.acm.org\/10.1145\/2145204.2145274"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J., Kang, B., Meyer, G., H\u0161llerer, T., Adali, S.: Credibility in context: An analysis of feature distributions in Twitter. ASE\/IEEE International Conference on Social Computing, SocialCom (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.128"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Oh, O., Agrawal, M., Rao, H.R.: Information control and terrorism: Tracking the mumbai terrorist attack through Twitter. Information Systems Frontiers (March 2011), http:\/\/dx.doi.org\/10.1007\/s10796-010-9275-8","DOI":"10.1007\/s10796-010-9275-8"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Ratkiewicz, J., Conover, M., Meiss, M., Gon\u00e7alves, B., Patil, S., Flammini, A., Menczer, F.: Truthy: mapping the spread of astroturf in microblog streams. In: Proc. WWW 2011 (2011), http:\/\/dx.doi.org\/10.1145\/1963192.1963301","DOI":"10.1145\/1963192.1963301"},{"key":"16_CR18","unstructured":"Vieweg, S., Hughes, A.L., Starbird, K., Palen, L.: Microblogging during two natural hazards events: what Twitter may contribute to situational awareness. In: Proc. SIGCHI, CHI 2010, pp. 1079\u20131088. ACM (2010), http:\/\/doi.acm.org\/10.1145\/1753326.1753486"},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-30428-6_4","volume-title":"Intelligence and Security Informatics","author":"Xin Xia","year":"2012","unstructured":"Xia, X., Yang, X., Wu, C., Li, S., Bao, L.: Information credibility on Twitter in emergency situation. In: Proc. Pacific Asia Conference on Intelligence and Security Informatics, PAISI 2012 (2012)"},{"key":"16_CR20","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/1277741.1277809","volume-title":"Proc. SIGIR","author":"J. Xu","year":"2007","unstructured":"Xu, J., Li, H.: Adarank: A boosting algorithm for information retrieval. In: Proc. SIGIR, pp. 391\u2013398. ACM, New York (2007), http:\/\/doi.acm.org\/10.1145\/1277741.1277809"},{"key":"16_CR21","unstructured":"Yang, J., Counts, S., Morris, M.R., Hoff, A.: Microblog credibility perceptions: Comparing the usa and china. In: Proc. CSCW, pp. 575\u2013586 (2013), http:\/\/doi.acm.org\/10.1145\/2441776.2441841"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Yardi, S., Romero, D., Schoenebeck, G., Boyd, D.: Detecting spam in a Twitter network. First Monday\u00a015(1) (January 2010), http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/2793","DOI":"10.5210\/fm.v15i1.2793"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13734-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T04:02:10Z","timestamp":1689652930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13734-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319137339","9783319137346"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13734-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}