{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:09Z","timestamp":1740098949837,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319676357"},{"type":"electronic","value":"9783319676364"}],"license":[{"start":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T00:00:00Z","timestamp":1509062400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67636-4_14","type":"book-chapter","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T10:13:20Z","timestamp":1509012800000},"page":"119-130","source":"Crossref","is-referenced-by-count":1,"title":["An Analysis of Social Data Credibility for Services Systems in Smart Cities \u2013 Credibility Assessment and Classification of Tweets"],"prefix":"10.1007","author":[{"given":"Iman","family":"Abu Hashish","sequence":"first","affiliation":[]},{"given":"Gianmario","family":"Motta","sequence":"additional","affiliation":[]},{"given":"Tianyi","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Kaixu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,27]]},"reference":[{"key":"14_CR1","unstructured":"Motta, G.: Towards the Smart Citizen, New and smart Information Communication Science and Technology to support Sustainable Development (NICST) (2013)"},{"key":"14_CR2","unstructured":"Twitter Statistics. \nhttps:\/\/about.twitter.com\/company"},{"key":"14_CR3","volume-title":"Mining the Social Web","author":"MA Russel","year":"2014","unstructured":"Russel, M.A.: Mining the Social Web, 2nd edn. O\u2019Reilly, Beijing (2014)","edition":"2"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Motta, G., Sacco, D., Ma, T., You, L., Liu, K.: Personal mobility service system in urban areas: the IRMA project. In: 2015 IEEE Symposium on Service-Oriented System Engineering (2015)","DOI":"10.1109\/SOSE.2015.15"},{"key":"14_CR5","unstructured":"Okoli, C., Schabram, K.: A guide to conducting a systematic literature review of information systems research. SSRN Electron. J."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, M., Zhao, P., Han, J.: Evaluating event credibility on Twitter. In: Proceedings of the 2012 SIAM International Conference on Data Mining, pp. 153\u2013164 (2012)","DOI":"10.1137\/1.9781611972825.14"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-319-13734-6_16","volume-title":"Social Informatics","author":"A Gupta","year":"2014","unstructured":"Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: TweetCred: real-time credibility assessment of content on Twitter. In: Aiello, L.M., McFarland, D. (eds.) SocInfo 2014. LNCS, vol. 8851, pp. 228\u2013243. Springer, Cham (2014). doi:\n10.1007\/978-3-319-13734-6_16"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Sikdar, S., Kang, B., Odonovan, J., Hollerer, T., Adah, S.: Understanding information credibility on Twitter. In: 2013 International Conference on Social Computing (2013)","DOI":"10.1109\/SocialCom.2013.9"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Namihira, Y., Segawa, N., Ikegami, Y., Kawai, K., Kawabe, T., Tsuruta, S.: High precision credibility analysis of information on Twitter. In: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (2013)","DOI":"10.1109\/SITIS.2013.148"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Batool, R., Khattak, A.M., Maqbool, J., Lee, S.: Precise tweet classification and sentiment analysis. In: 2013 IEEE\/ACIS 12th International Conference on Computer and Information Science (ICIS) (2013)","DOI":"10.1109\/ICIS.2013.6607883"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proceedings of the 20th International Conference on World Wide Web (WWW 2011) (2011)","DOI":"10.1145\/1963405.1963500"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Sahana, V.P., Pias, A.R., Shastri, R., Mandloi, S.: Automatic detection of rumored tweets and finding its origin. In: 2015 International Conference on Computing and Network Communications (CoCoNet) (2015)","DOI":"10.1109\/CoCoNet.2015.7411251"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-25207-0_10","volume-title":"Natural Language Processing and Chinese Computing","author":"Q Zhang","year":"2015","unstructured":"Zhang, Q., Zhang, S., Dong, J., Xiong, J., Cheng, X.: Automatic detection of rumor on social network. In: Li, J., Ji, H., Zhao, D., Feng, Y. (eds.) NLPCC 2015. LNCS, vol. 9362, pp. 113\u2013122. Springer, Cham (2015). doi:\n10.1007\/978-3-319-25207-0_10"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Al-Dayil, R.A., Dahshan, M.H.: Detecting social media mobile botnets using user activity correlation and artificial immune system. In: 7th International Conference on Information and Communication Systems (ICICS) (2016)","DOI":"10.1109\/IACS.2016.7476095"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Sivanesh, S., Kavin, K., Hassan, A.A.: Frustrate Twitter from automation: how far a user can be trusted? In: International Conference on Human Computer Interactions (ICHCI) (2013)","DOI":"10.1109\/ICHCI-IEEE.2013.6887787"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Gupta, A., Kaushal, R.: Improving spam detection in online social networks. In: International Conference on Cognitive Computing and Information Processing (CCIP) (2015)","DOI":"10.1109\/CCIP.2015.7100738"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Wang, S., Terano, T.: Detecting rumor patterns in streaming social media. In: IEEE International Conference on Big Data (Big Data) (2015)","DOI":"10.1109\/BigData.2015.7364071"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Morris, M.R., Counts, S., Roseway, A., Hoff, A., Schwarz, J.: Tweeting is believing? In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW 2012) (2012)","DOI":"10.1145\/2145204.2145274"},{"key":"14_CR19","unstructured":"Twitter API Documentation. \nhttps:\/\/dev.twitter.com\/overview\/documentation"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Kang, B., O\u2019donovan, J., H\u00f6llerer, T.: Modeling topic specific credibility on Twitter. In: Proceedings of the 2012 ACM International Conference on Intelligent User Interfaces (IUI 2012) (2012)","DOI":"10.1145\/2166966.2166998"},{"key":"14_CR21","unstructured":"Twitter Support: Using Hashtags in Twitter. \nhttps:\/\/support.twitter.com\/articles\/49309"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Infrastructures, Services, and IoT Systems for Smart Cities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67636-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T10:19:51Z","timestamp":1509013191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67636-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,27]]},"ISBN":["9783319676357","9783319676364"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67636-4_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017,10,27]]}}}