{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:17:58Z","timestamp":1765268278976,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319143781"},{"type":"electronic","value":"9783319143798"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14379-8_4","type":"book-chapter","created":{"date-parts":[[2015,2,12]],"date-time":"2015-02-12T11:30:22Z","timestamp":1423740622000},"page":"59-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Social Network Derived Credibility"],"prefix":"10.1007","author":[{"given":"Erica J.","family":"Briscoe","sequence":"first","affiliation":[]},{"given":"Darren Scott","family":"Appling","sequence":"additional","affiliation":[]},{"given":"Heather","family":"Hayes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,13]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"201","DOI":"10.2307\/202051","volume":"1","author":"M Granovetter","year":"1983","unstructured":"Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theory 1:201\u2013233","journal-title":"Sociol Theory"},{"key":"4_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, crowds, and markets: reasoning about a highly connected world","author":"D Easley","year":"2010","unstructured":"Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Gilbert E, Karahalios K (2009) Predicting tie strength with social media. In: Proceedings of the SIGCHI conference on human factors in computing systems, ACM","DOI":"10.1145\/1518701.1518736"},{"key":"4_CR4","unstructured":"Antin J, Churchill EF (2011) Badges in social media: a social psychological perspective. In: CHI 2011, Vancouver, 7\u201312 May 2011"},{"key":"4_CR5","unstructured":"Rubin VL, Liddy ED (2006) Assessing credibility of weblogs. In: AAAI symposium on computational approaches to analysing weblogs (AAAI-CAAW), ACM, 2006"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Berger-Wolf TY, Saia J (2006) A framework for analysis of dynamic social networks. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, ACM","DOI":"10.1145\/1150402.1150462"},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1111\/j.1083-6101.2009.01448.x","volume":"14","author":"CL Armstrong","year":"2009","unstructured":"Armstrong CL, McAdams MJ (2009) Blogs of information: how gender cues and individual motivations influence perceptions of credibility. J Comput Mediat Commun 14(3):435\u2013456","journal-title":"J Comput Mediat Commun"},{"issue":"2","key":"4_CR8","doi-asserted-by":"crossref","first-page":"5183","DOI":"10.1111\/j.1467-8640.2009.00334.x","volume":"25","author":"M Lesani","year":"2009","unstructured":"Lesani M, Montazeri N (2009) Fuzzy trust aggregation and personalized trust inference in virtual social networks. Comput Intell 25(2):5183","journal-title":"Comput Intell"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1016\/j.knosys.2011.06.009","volume":"2","author":"Y Kim","year":"2011","unstructured":"Kim Y, Song H (2011) Strategies for predicting local trust based on trust propagation in social networks. Knowl-Based Syst 2:1360\u20131371","journal-title":"Knowl-Based Syst"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Guha R, Kumar R, Raghavan R, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on world wide web, New York","DOI":"10.1145\/988672.988727"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Brashears ME (2013) Humans use compression heuristics to improve the recall of social networks. Scientific reports, vol 3. doi:10.1038\/srep01513","DOI":"10.1038\/srep01513"},{"key":"4_CR12","volume-title":"How many friends does one person need?: Dunbar\u2019s number and other evolutionary quirks","author":"R Dunbar","year":"2010","unstructured":"Dunbar R (2010) How many friends does one person need?: Dunbar\u2019s number and other evolutionary quirks. Faber and Faber, London"},{"key":"4_CR13","unstructured":"Page L, Brin S, Motwani R, Winograd T (1998) The PageRank citation ranking: bringing order to the web, Stanford Digital Library Technologies Project, Technical report, CA"},{"key":"4_CR14","unstructured":"Golbeck JA (2005) Computing and applying trust in web-based social networks. Ph.D. Dissertation, Department of Computer Science, University of Maryland, College Park"},{"key":"4_CR15","unstructured":"Golbeck JA, Hendler J (2006) FilmTrust: movie recommendations using trust in web-based social networks. In: Proceedings of the IEEE consumer communications and networking conference. Las Vegas"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web, ACM","DOI":"10.1145\/1963405.1963500"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Hutto CJ, Gilbert E, Yardi S (2013) A longitudinal study of follow predictors on twitter. In: Proceedings of the 2013 ACM annual conference on human factors in computing systems (CHI), Paris","DOI":"10.1145\/2470654.2470771"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Romero DM, Galuba W, Asur S, Huberman BA (2011) Influence and passivity in social media. In: Machine learning and knowledge discovery in databases, Springer, Berlin, pp 18\u201333","DOI":"10.1007\/978-3-642-23808-6_2"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1037\/0022-3514.88.2.348","volume":"88","author":"GA Janicik","year":"2005","unstructured":"Janicik GA, Larrick RP (2005) Social network schemas and the learning of incomplete networks. J Personal Soc Psychol 88:348\u2013364","journal-title":"J Personal Soc Psychol"},{"key":"4_CR20","unstructured":"Luhmann N (2000) Familiarity, confidence, trust: problems and alternatives. In: Gambetta D (ed) Trust: making and breaking cooperative relations, electronic edition. Department of Sociology, University of Oxford, vol 6. pp 94\u2013107 (Chapter 6, Trust: making and breaking cooperative relations)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Costa PT, McCrae RR (1985) The NEO personality inventory: manual, form S and form R. Psychological Assessment Resources, 1985","DOI":"10.1037\/t07564-000"},{"key":"4_CR22","volume-title":"Review of personality and social psychology","author":"L Goldberg","year":"1981","unstructured":"Goldberg L (1981) Language and individual differences: the search for universals in personality lexicons. In: Wheeler L (ed) Review of personality and social psychology. Sage, Beverly Hills"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1037\/0003-066X.52.5.509","volume":"52","author":"R McCrae","year":"1997","unstructured":"McCrae R, Costa P (1997) Personality trait structure as a human universal. Am Psychol 52:509\u2013516","journal-title":"Am Psychol"},{"issue":"4","key":"4_CR24","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1002\/j.1556-6676.1991.tb01524.x","volume":"69","author":"R McCrae","year":"1991","unstructured":"McCrae R, Costa P (1991) The NEO personality inventory: using the five-factor model in counseling. J Couns Dev 69(4):367\u2013372","journal-title":"J Couns Dev"},{"issue":"2","key":"4_CR25","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1111\/j.1467-6494.1992.tb00970.x","volume":"60","author":"RR McCrae","year":"1992","unstructured":"McCrae RR, John OP (1992) An introduction to the fivefactor model and its applications. J Personal 60(2):175\u2013215","journal-title":"J Personal"},{"issue":"5","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1016\/j.chb.2007.09.001","volume":"24","author":"RE Guadagno","year":"2008","unstructured":"Guadagno RE, Okdie BM, Eno C (2008) Who blogs? Personality predictors of blogging. Comput Hum Behav 24(5):1993\u20132004","journal-title":"Comput Hum Behav"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1744-6570.1991.tb00688.x","volume":"44","author":"MR Barrick","year":"1991","unstructured":"Barrick MR, Mount MK (1991) The big five personality dimensions and job performance: a metaanalysis. Person Psychol 44(1):1\u201326","journal-title":"Person Psychol"},{"issue":"2","key":"4_CR28","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.chb.2009.09.003","volume":"26","author":"T Correa","year":"2010","unstructured":"Correa T, Hinsley A, De Zuniga H (2010) Who interacts on the Web?: the intersection of users personality and social media use. Comput Hum Behav 26(2):247\u2013253","journal-title":"Comput Hum Behav"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1207\/S15327957PSPR0401_6","volume":"4","author":"KY McKenna","year":"2000","unstructured":"McKenna KY, Bargh JA (2000) Plan 9 from cyberspace: the implications of the internet for personality and social psychology. Personal Soc Psychol Rev 4(1):57\u201375","journal-title":"Personal Soc Psychol Rev"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Bachrach Y, Kosinski M, Graepel T, Kohli P, Stillwell D (2012) Personality and patterns of facebook usage. In: Proceedings of the 3rd annual ACM web science conference","DOI":"10.1145\/2380718.2380722"},{"key":"4_CR31","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1037\/0022-3514.88.2.348","volume":"88","author":"G Janicik","year":"2005","unstructured":"Janicik G, Larrick T (2005) Social network schemas and the learning of incomplete networks. J Personal Soc Psychol 88:348\u2013364","journal-title":"J Personal Soc Psychol"},{"key":"4_CR32","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TKDE.2007.190745","volume":"20","author":"X Yin","year":"2008","unstructured":"Yin X, Han J, Yu PS (2008) Truth discovery with multiple conflicting information providers on the web. IEEE Trans Knowl Data Eng 20:796\u2013808","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1016\/j.knosys.2011.06.009","volume":"2","author":"Y Kim","year":"2011","unstructured":"Kim Y, Song H (2011) Strategies for predicting local trust based on trust propagation in social networks. Knowl-Based Syst 2:1360\u20131371","journal-title":"Knowl-Based Syst"},{"key":"4_CR34","unstructured":"Appling DS, Briscoe EJ, Hayes H, Mappus RL (2013) Towards automated personality identification using speech Acts. In: Workshop on computational personality recognition. International AAAI conference on weblogs and social media (ICWSM)"},{"issue":"1","key":"4_CR35","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1037\/0033-2909.129.1.74","volume":"129","author":"BM DePaulo","year":"2003","unstructured":"DePaulo BM, Lindsay JJ, Malone BE, Muhlenbruck L, Charlton K, Cooper H (2003) Cues to deception. Psychol bull 129(1):74","journal-title":"Psychol bull"},{"issue":"1","key":"4_CR36","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","volume":"13","author":"L Zhou","year":"2004","unstructured":"Zhou L, Burgoon JK, Nunamaker JF, Twitchell D (2004) Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decis Negot 13(1):81\u2013106","journal-title":"Group Decis Negot"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Weiss L, Briscoe E, Hayes H, Kemenova O, Harbert S, Li L, Lebanon G, Stewart C, Miller D, Foy D (2013) A comparative study of social media and traditional polling in the Egyptian uprising of 2011. In: Social computing. Behavioral-cultural modeling and prediction lecture notes in computer science, Springer, Berlin, pp 303\u2013310","DOI":"10.1007\/978-3-642-37210-0_33"}],"container-title":["Lecture Notes in Social Networks","Recommendation and Search in Social Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14379-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T14:45:19Z","timestamp":1675262719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14379-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319143781","9783319143798"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14379-8_4","relation":{},"ISSN":["2190-5428","2190-5436"],"issn-type":[{"type":"print","value":"2190-5428"},{"type":"electronic","value":"2190-5436"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 February 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}