{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:17:58Z","timestamp":1749010678222,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319420882"},{"type":"electronic","value":"9783319420899"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42089-9_37","type":"book-chapter","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T10:36:30Z","timestamp":1467282990000},"page":"530-542","source":"Crossref","is-referenced-by-count":2,"title":["Trusted Social Node: Evaluating the Effect of Trust and Trust Variance to Maximize Social Influence in a Multilevel Social Node Influential Diffusion Model"],"prefix":"10.1007","author":[{"given":"Hock-Yeow","family":"Yap","sequence":"first","affiliation":[]},{"given":"Tong-Ming","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A Josang","year":"2007","unstructured":"Josang, A., Ismail, R., Byod, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618\u2013644 (2007). Amsterdam","journal-title":"Decis. Support Syst."},{"issue":"1","key":"37_CR2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.ins.2009.06.027","volume":"180","author":"J Caverlee","year":"2010","unstructured":"Caverlee, J., Liu, L., Webb, S.: The SocialTrust framework for trusted social information management: Architecture and algorithms. J. Inf. Sci. 180(1), 95\u2013112 (2010)","journal-title":"J. Inf. Sci."},{"issue":"1","key":"37_CR3","first-page":"468","volume":"4","author":"E Hargittai","year":"2010","unstructured":"Hargittai, E., Fullerton, L., Menchen-Trevino, E., Thomas, K.: Trust online: young adults\u2019 evaluation of web content. Int. J. Commun. 4(1), 468\u2013494 (2010)","journal-title":"Int. J. Commun."},{"issue":"2","key":"37_CR4","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume":"11","author":"P Resnick","year":"2002","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of ebay\u2019s reputation system. Adv. Appl. Microeconomics 11(2), 127\u2013157 (2002)","journal-title":"Adv. Appl. Microeconomics"},{"key":"37_CR5","unstructured":"Hock-Yeow, Y., Tong-Ming, L.: An evaluation and enhancement of the sentiment oriented opinion mining technique using opinion scoring. In: 2015 International Conference on Innovation and Sustainability, Chiang Mai, vol. 1, pp. 42\u201352 (2015)"},{"key":"37_CR6","unstructured":"Hock-Yeow, Y., Tong-Ming, L.: An analysis of opinion variation of social text in the trusted social node identification. In: American Scientific Publishers Advance Science Letters, Sabah, Malaysia (2016)"},{"key":"37_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1007\/11523468_91","volume-title":"Automata, Languages and Programming","author":"D Kempe","year":"2005","unstructured":"Kempe, D., Kleinberg, J.M., Tardos, \u00c9.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127\u20131138. Springer, Heidelberg (2005)"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Lahiri, M., Cebrian, M.: The genetic algorithm as a general diffusion model for social networks. In: AAAI 2010 Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, United States, pp. 494\u2013499 (2010)","DOI":"10.1609\/aaai.v24i1.7677"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"issue":"1","key":"37_CR10","doi-asserted-by":"crossref","first-page":"20","DOI":"10.2307\/1252308","volume":"58","author":"R Morgan","year":"1994","unstructured":"Morgan, R., Hunt, S.: The commitment-trust theory of relationship marketing. J. Mark. 58(1), 20\u201338 (1994)","journal-title":"J. Mark."},{"issue":"1","key":"37_CR11","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.: Trust and TAM in online shopping: An integrated model. MIS Q. 27(1), 51\u201390 (2003)","journal-title":"MIS Q."},{"issue":"4","key":"37_CR12","doi-asserted-by":"crossref","first-page":"360","DOI":"10.7763\/JOEBM.2013.V1.78","volume":"1","author":"E Yildirim","year":"2013","unstructured":"Yildirim, E.: The effects of user comments on e-Trust: an application on consumer electronics. J. Econ. Bus. Manage. 1(4), 360\u2013364 (2013)","journal-title":"J. Econ. Bus. Manage."},{"issue":"1","key":"37_CR13","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1108\/10662241111104893","volume":"21","author":"J Weiseberg","year":"2011","unstructured":"Weiseberg, J., Te\u2019eni, D., Arman, L.: Past purchase and intention to purchase in e-commerce: the mediation of social presence and trust. Internet Res. 21(1), 82\u201396 (2011)","journal-title":"Internet Res."},{"key":"37_CR14","volume-title":"Consumer Trust in E-commerce","author":"M Gustavsson","year":"2006","unstructured":"Gustavsson, M., Johansson, A.-M.: Consumer Trust in E-commerce. Kristianstad University, Sweden (2006)"},{"key":"37_CR15","volume-title":"Can We Trust Trust","author":"D Gambetta","year":"1988","unstructured":"Gambetta, D.: Can We Trust Trust. Basil Blackwell, Oxford (1988)"},{"key":"37_CR16","volume-title":"Trust and Deception in Virtual Societies","author":"R Falcone","year":"2001","unstructured":"Falcone, R., Castelfranchi, C.: Social Trust: A Cognitive Approach. In: Castelfranchi, C., Tan, Y.-H. (eds.) Trust and Deception in Virtual Societies. Springer, Netherlands (2001)"},{"key":"37_CR17","unstructured":"Massa, P., Avesani, M.: Controversial users demand local trust metrics: An experimental study on epinions.com community. In: AAAI 2005 Proceedings of the 20th National Conference on Artificial Intelligence, United States, vol. 1, pp. 121\u2013126 (2005)"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Minaxi, G., Paul, J., Mostafar, A.: A reputation system for peer-to-peer networks. In: International Workshop on Network and Operating Systems Support for Digital Audio and Video, New York, pp. 144\u2013152 (2003)","DOI":"10.1145\/776322.776346"},{"key":"37_CR19","volume-title":"The Pagerank Citation Ranking: Bringing Order to the Web","author":"L Page","year":"1999","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The Pagerank Citation Ranking: Bringing Order to the Web. Stanford Digital Library Technologies, United States (1999)"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Sibona, C., Walczak, S.: Unfriending on Facebook: Friend request and online\/offline behavior analysis. In: Proceedings of the 44th Hawaii International Conference on System Sciences, Hawaii (2011)","DOI":"10.1109\/HICSS.2011.467"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications -- ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42089-9_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T23:21:37Z","timestamp":1748992897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42089-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420882","9783319420899"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42089-9_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}