{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:07:32Z","timestamp":1743152852259,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319618326"},{"type":"electronic","value":"9783319618333"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61833-3_44","type":"book-chapter","created":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T02:23:37Z","timestamp":1498184617000},"page":"412-420","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Deceptive Review Comments with Rumor and Lie Theories"],"prefix":"10.1007","author":[{"given":"Chia Hsun","family":"Lin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping Yu","family":"Hsu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ming Shien","family":"Cheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hong Tsuen","family":"Lei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ming Chia","family":"Hsu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,6,24]]},"reference":[{"key":"44_CR1","unstructured":"Allport, G.W., Postman, L.: The psychology of rumor (1947)"},{"issue":"3","key":"44_CR2","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1016\/j.dss.2010.08.012","volume":"50","author":"N Hu","year":"2011","unstructured":"Hu, N., Liu, L., Sambamurthy, V.: Fraud detection in online consumer reviews. Decis. Support Syst. 50(3), 614\u2013626 (2011)","journal-title":"Decis. Support Syst."},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"44_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/9781118029145","volume-title":"Data Mining: Concepts, Models, Methods, and Algorithms","author":"M Kantardzic","year":"2011","unstructured":"Kantardzic, M.: Data Mining: Concepts, Models, Methods, and Algorithms. Wiley, New York (2011)"},{"key":"44_CR5","unstructured":"Kapferer, J.N.: Rumors: Uses, Interpretations, and Images. Transaction Publishers (2013)"},{"key":"44_CR6","volume-title":"Rumor in the Marketplace","author":"F Koenig","year":"1985","unstructured":"Koenig, F.: Rumor in the Marketplace. Dover, Auburn House (1985)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Mihalcea, R., Strapparava, C.: The lie detector: explorations in the automatic recognition of deceptive language. In: Proceedings of the ACL-IJCNLP 2009 Conference Short Papers, pp. 309\u2013312. Association for Computational Linguistics (2009)","DOI":"10.3115\/1667583.1667679"},{"key":"44_CR8","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 309\u2013319. Association for Computational Linguistics (2011)"},{"key":"44_CR9","unstructured":"Shibutani, T.: Improvised News: A Sociological Study of Rumor. Ardent Media (1966)"},{"key":"44_CR10","unstructured":"Techcrunch: Amazon Files Suit Against Individuals Offering Fake Product Reviews on Fiverr.com (2015).http:\/\/techcrunch.com\/2015\/10\/16\/amazon-files-suit-against-individuals-offering-fake-product-reviews-on-fiverr-com\/"},{"key":"44_CR11","unstructured":"TEDxTaipei (2015). http:\/\/tedxtaipei.com\/articles\/the_language_of_lying\/"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Zhou, L., Sung, Y.W.: Cues to deception in online Chinese groups. In: Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, p. 146. IEEE (2008)","DOI":"10.1109\/HICSS.2008.109"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61833-3_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:30:20Z","timestamp":1710264620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61833-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319618326","9783319618333"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61833-3_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"24 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Swarm Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fukuoka","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swarm2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-si.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}