{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T16:40:02Z","timestamp":1750869602068,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319670768"},{"type":"electronic","value":"9783319670775"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67077-5_40","type":"book-chapter","created":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T01:42:47Z","timestamp":1504662167000},"page":"417-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Entropy-Based Model for Estimating Veracity of Topics from Tweets"],"prefix":"10.1007","author":[{"given":"Jyotsna","family":"Paryani","sequence":"first","affiliation":[]},{"given":"Ashwin Kumar","family":"T.K.","sequence":"additional","affiliation":[]},{"given":"K. M.","family":"George","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,7]]},"reference":[{"issue":"1","key":"40_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951715589417","volume":"2","author":"A Quan-Haase","year":"2015","unstructured":"Quan-Haase, A., Martin, K., McCay-Peet, L.: Networks of digital humanities scholars: the informational and social uses and gratifications of Twitter. Big Data Soc. 2(1), 1\u201312 (2015)","journal-title":"Big Data Soc."},{"issue":"1","key":"40_CR2","doi-asserted-by":"publisher","first-page":"205395171664582","DOI":"10.1177\/2053951716645828","volume":"3","author":"M Felt","year":"2016","unstructured":"Felt, M.: Social media and the social sciences: how researchers employ Big Data analytics. Big Data Soc. 3(1), 2053951716645828 (2016)","journal-title":"Big Data Soc."},{"unstructured":"Gantz, J., Reinsel, D.: The digital universe in 2020: Big Data, bigger digital shadows, and biggest growth in the far east. In: IDC iView: IDC Analyze the Future 2007, pp. 1\u201316 (2012)","key":"40_CR3"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-319-06811-4_13","volume-title":"Workshop on Secure Data Management","author":"Y Demchenko","year":"2014","unstructured":"Demchenko, Y., Ngo, C., de Laat, C., Membrey, P., Gordijenko, D.: Big Security for Big Data: addressing security challenges for the Big Data infrastructure. In: Jonker, W., Petkovi\u0107, M. (eds.) Workshop on Secure Data Management. LNCS, vol. 8425, pp. 76\u201394. Springer, Cham (2014). doi:10.1007\/978-3-319-06811-4_13"},{"unstructured":"The Four V\u2019s of Big Data, IBM Big Data and Analytics Hub. http:\/\/www.ibmbigdatahub.com\/infographic\/four-vsbig-data. Accessed 11 June 2017","key":"40_CR5"},{"key":"40_CR6","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.procs.2015.12.154","volume":"72","author":"NBC Eembi","year":"2015","unstructured":"Eembi, N.B.C., Ishak, I.B., Sidi, F., Affendey, L.S., Mamat, A.: A systematic review on the profiling of digital news portal for Big Data veracity. Procedia Comput. Sci. 72, 390\u2013397 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"40_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/JPROC.2015.2388958","volume":"103","author":"S Yin","year":"2015","unstructured":"Yin, S., Kaynak, O.: Big Data for modern industry: challenges and trends [point of view]. Proc. IEEE 103(2), 143\u2013146 (2015)","journal-title":"Proc. IEEE"},{"unstructured":"TextBlob. https:\/\/pypi.python.org\/pypi\/textblob. Accessed 04 May 2017","key":"40_CR8"},{"key":"40_CR9","doi-asserted-by":"publisher","first-page":"4","DOI":"10.7152\/acro.v24i1.14671","volume":"24","author":"T Lukoianova","year":"2014","unstructured":"Lukoianova, T., Rubin, V.L.: Veracity roadmap: is Big Data objective, truthful and credible? Adv. Classif. Res. Online 24, 4\u201315 (2014)","journal-title":"Adv. Classif. Res. Online"},{"doi-asserted-by":"crossref","unstructured":"Ashwin, K.T., Kammarpally, P., George, K.M.: Veracity of information in twitter data: a case study. In: International Conference on Big Data and Smart Computing BigComp, pp. 129\u2013136. IEEE (2016)","key":"40_CR10","DOI":"10.1109\/BIGCOMP.2016.7425811"},{"doi-asserted-by":"crossref","unstructured":"S\u00e4nger, J., Richthammer, C., Hassan, S., Pernul, G.: Trust and Big Data: a roadmap for research. In: 25th International Workshop on Database and Expert Systems Applications DEXA, pp. 278\u2013282. IEEE (2014)","key":"40_CR11","DOI":"10.1109\/DEXA.2014.63"},{"unstructured":"Reed, C.: Latent Dirichlet allocation: towards a deeper understanding. http:\/\/obphio.us\/pdfs\/lda_tutorial.pdf. Accessed 04 May 2017","key":"40_CR12"},{"issue":"2\u20133","key":"40_CR13","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1080\/01638539809545028","volume":"25","author":"TK Landauer","year":"1998","unstructured":"Landauer, T.K., Foltz, P.W., Laham, D.: An introduction to latent semantic analysis. Discourse Process. 25(2\u20133), 259\u2013284 (1998)","journal-title":"Discourse Process."},{"unstructured":"Chuois, S.: Probabilistic latent semantic analysis. http:\/\/mlg.postech.ac.kr\/~seungjin\/courses\/ml\/handouts\/handout06.pdf. Accessed 04 May 2017","key":"40_CR14"},{"doi-asserted-by":"crossref","unstructured":"Hofmann, T.: Probabilistic latent semantic indexing. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 50\u201357. ACM, New York (1999)","key":"40_CR15","DOI":"10.1145\/312624.312649"},{"issue":"1","key":"40_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mob. Comput Commun. Rev. 5(1), 3\u201355 (2001)","journal-title":"ACM SIGMOBILE Mob. Comput Commun. Rev."},{"unstructured":"Tapia, A.H., Moore, K.A., Johnson, N.J.: Beyond the trustworthy tweet: a deeper understanding of microblogged data use by disaster response and humanitarian relief organizations. In: Proceedings of the 10th International ISCRAM Conference, Baden-Baden, pp. 770\u2013779 (2013)","key":"40_CR17"},{"key":"40_CR18","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195081091.001.0001","volume-title":"Philosophy After Objectivity: Making Sense in Perspective","author":"PK Moser","year":"1993","unstructured":"Moser, P.K.: Philosophy After Objectivity: Making Sense in Perspective. Oxford University Press on Demand, New York (1993)"},{"unstructured":"A-Z Index for Foodborne Illness: CDC (2016). https:\/\/www.cdc.gov\/foodsafety\/diseases\/index.html. Accessed 04 May 2017","key":"40_CR19"},{"issue":"3","key":"40_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1468-2885.1996.tb00127.x","volume":"6","author":"DB Buller","year":"1996","unstructured":"Buller, D.B., Burgoon, J.K.: Interpersonal deception theory. Commun. Theory 6(3), 203\u2013242 (1996)","journal-title":"Commun. Theory"},{"issue":"1","key":"40_CR21","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","volume":"13","author":"L Zhou","year":"2004","unstructured":"Zhou, L., Burgoon, J.K., Nunamaker, J.F., Twitchell, D.: Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decis. Negot. 13(1), 81\u2013106 (2004)","journal-title":"Group Decis. Negot."},{"unstructured":"Davies, M.: The Corpus of Contemporary American English (COCA): 400+ million words, 1990\u20132012. http:\/\/www.americancorpus.org. Accessed 04 May 2017","key":"40_CR22"},{"unstructured":"OnTheIssues Home page. http:\/\/www.ontheissues.org\/default.htm. Accessed 04 May 2017","key":"40_CR23"},{"unstructured":"CDC: Influenza Flu. https:\/\/www.cdc.gov\/flu\/index.htm. Accessed 04 May 2017","key":"40_CR24"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67077-5_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T15:58:56Z","timestamp":1750867136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67077-5_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319670768","9783319670775"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67077-5_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"7 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}