{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:29:31Z","timestamp":1725550171420},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642124358"},{"type":"electronic","value":"9783642124365"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12436-5_13","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:24:29Z","timestamp":1268400269000},"page":"170-182","source":"Crossref","is-referenced-by-count":6,"title":["Web Spam, Social Propaganda and the Evolution of Search Engine Rankings"],"prefix":"10.1007","author":[{"given":"Panagiotis Takis","family":"Metaxas","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Bencz\u00far, A., Csalog\u00e1ny, K., Sarl\u00f3s, T., Uher, M.: Spam Rank \u2013 Fully automatic link spam detection. In: Proceedings of the AIRWeb Workshop (2005)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/ICDM.2001.989500","volume-title":"Proceedings of the 2001 IEEE International Conference on Data Mining","author":"K. Bharat","year":"2001","unstructured":"Bharat, K., Chang, B.-W., Henzinger, M.R., Ruhl, M.: Who links to whom: Mining linkage between web sites. In: Proceedings of the 2001 IEEE International Conference on Data Mining, pp. 51\u201358. IEEE Computer Society, Los Alamitos (2001)"},{"key":"13_CR3","unstructured":"Bianchini, M., Gori, M., Scarselli, F.: PageRank and web communities. In: Web Intelligence Conference 2003 (2003)"},{"issue":"1-7","key":"13_CR4","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S. Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems\u00a030(1-7), 107\u2013117 (1998)","journal-title":"Computer Networks and ISDN Systems"},{"issue":"2","key":"13_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/792550.792552","volume":"36","author":"A. Broder","year":"2002","unstructured":"Broder, A.: A taxonomy of web search. SIGIR Forum\u00a036(2), 3\u201310 (2002)","journal-title":"SIGIR Forum"},{"issue":"1-6","key":"13_CR6","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/S1389-1286(00)00083-9","volume":"33","author":"A. Broder","year":"2000","unstructured":"Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., Wiener, J.: Graph structure in the web. Comput. Networks\u00a033(1-6), 309\u2013320 (2000)","journal-title":"Comput. Networks"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Cho, J., Roy, S.: Impact of search engines on page popularity. In: WWW 2004 (2004)","DOI":"10.1145\/988672.988676"},{"key":"13_CR8","unstructured":"CNETNews, Engine sells results, draws fire (1996), \n                    \n                      http:\/\/news.cnet.com\/2100-1023-215491.html"},{"key":"13_CR9","unstructured":"Corey, T.S.: Catching on-line traders in a web of lies: The perils of internet stock fraud. Ford Marrin Esposito, Witmeyer & Glesser, LLP (2001), \n                    \n                      http:\/\/www.fmew.com\/archive\/lies\/"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Fetterly, D., Manasse, M., Najork, M.: Spam, damn spam, and statistics. In: WebDB 2004 (2004)","DOI":"10.1145\/1017074.1017077"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1145\/775152.775246","volume-title":"Proceedings of the twelfth international conference on World Wide Web","author":"D. Fetterly","year":"2003","unstructured":"Fetterly, D., Manasse, M., Najork, M., Wiener, J.: A large-scale study of the evolution of web pages. In: Proceedings of the twelfth international conference on World Wide Web, pp. 669\u2013678. ACM Press, New York (2003)"},{"issue":"3","key":"13_CR12","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/2.989932","volume":"35","author":"G.W. Flake","year":"2002","unstructured":"Flake, G.W., Lawrence, S., Giles, C.L., Coetzee, F.: Self-organization of the web and identification of communities. IEEE Computer\u00a035(3), 66\u201371 (2002)","journal-title":"IEEE Computer"},{"issue":"5","key":"13_CR13","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/769800.769804","volume":"46","author":"L. Graham","year":"2003","unstructured":"Graham, L., Metaxas, P.T.: Of course it\u2019s true; I saw it on the internet!: Critical thinking in the internet era. Commun. ACM\u00a046(5), 70\u201375 (2003)","journal-title":"Commun. ACM"},{"key":"13_CR14","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Proceedings of the AIRWeb Workshop (2005)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with TrustRank. In: VLDB 2004 (2004)","DOI":"10.1016\/B978-012088469-8.50052-8"},{"key":"13_CR16","unstructured":"Hansell, S.: Google keeps tweaking its search engine. New York Times (2007)"},{"issue":"1","key":"13_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/4236.895141","volume":"5","author":"M.R. Henzinger","year":"2001","unstructured":"Henzinger, M.R.: Hyperlink analysis for the web. IEEE Internet Computing\u00a05(1), 45\u201350 (2001)","journal-title":"IEEE Internet Computing"},{"issue":"2","key":"13_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/792550.792553","volume":"36","author":"M.R. Henzinger","year":"2002","unstructured":"Henzinger, M.R., Motwani, R., Silverstein, C.: Challenges in web search engines. SIGIR Forum\u00a036(2), 11\u201322 (2002)","journal-title":"SIGIR Forum"},{"key":"13_CR19","unstructured":"Hindman, M., Tsioutsiouliklis, K., Johnson, J.: Googlearchy: How a few heavily-linked sites dominate politics on the web. Annual Meeting of the Midwest Political Science Association (2003)"},{"issue":"1","key":"13_CR20","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/2.816269","volume":"33","author":"L. Introna","year":"2000","unstructured":"Introna, L., Nissenbaum, H.: Defining the web: The politics of search engines. Computer\u00a033(1), 54\u201362 (2000)","journal-title":"Computer"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1145\/335305.335325","volume-title":"STOC 2000: Proceedings of the thirty-second annual ACM symposium on Theory of computing","author":"J. Kleinberg","year":"2000","unstructured":"Kleinberg, J.: The small-world phenomenon: an algorithm perspective. In: STOC 2000: Proceedings of the thirty-second annual ACM symposium on Theory of computing, pp. 163\u2013170. ACM Press, New York (2000)"},{"issue":"5","key":"13_CR22","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"J.M. Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. Journal of the ACM\u00a046(5), 604\u2013632 (1999)","journal-title":"Journal of the ACM"},{"issue":"11-16","key":"13_CR23","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1016\/S1389-1286(99)00040-7","volume":"31","author":"R. Kumar","year":"1999","unstructured":"Kumar, R., Raghavan, P., Rajagopalan, S., Tomkins, A.: Trawling the Web for emerging cyber-communities. Computer Networks\u00a031(11-16), 1481\u20131493 (1999)","journal-title":"Computer Networks"},{"issue":"11","key":"13_CR24","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MC.2002.1046971","volume":"35","author":"R. Kumar","year":"2002","unstructured":"Kumar, R., Raghavan, P., Rajagopalan, S., Tomkins, A.: The web and social networks. IEEE Computer\u00a035(11), 32\u201336 (2002)","journal-title":"IEEE Computer"},{"key":"13_CR25","unstructured":"Lee, A.M., Lee, E.B. (eds.): The Fine Art of Propaganda. The Institute for Propaganda Analysis. Harcourt, Brace and Co. (1939)"},{"issue":"1","key":"13_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1002\/1532-2890(2000)52:1<12::AID-ASI1062>3.0.CO;2-V","volume":"52","author":"C.A. Lynch","year":"2001","unstructured":"Lynch, C.A.: When documents deceive: trust and provenance as new factors for information retrieval in a tangled web. J. Am. Soc. Inf. Sci. Technol.\u00a052(1), 12\u201317 (2001)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"8-13","key":"13_CR27","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1016\/S0169-7552(97)00036-6","volume":"29","author":"M. Marchiori","year":"1997","unstructured":"Marchiori, M.: The quest for correct information on the web: hyper search engines. Comput. Netw. ISDN Syst.\u00a029(8-13), 1225\u20131235 (1997)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Maulding, M.L.: Lycos: Design choices in an internet search service. IEEE Expert\u00a0(12), 8\u201311 (1997)","DOI":"10.1109\/64.577466"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Metaxas, P.T.: Using Propagation of Distrust to find Untrustworthy Web Neighborhoods. In: Proceedings of the fourth international conference on internet and Web Applications and Services, Venice, Italy, May 24-28 (2009)","DOI":"10.1109\/ICIW.2009.83"},{"key":"13_CR30","first-page":"369","volume-title":"Proceedings of the seventh international conference on World Wide Web 7","author":"G. Pringle","year":"1998","unstructured":"Pringle, G., Allison, L., Dowe, D.L.: What is a tall poppy among web pages? In: Proceedings of the seventh international conference on World Wide Web 7, pp. 369\u2013377. Elsevier Science Publishers B. V., Amsterdam (1998)"},{"issue":"1","key":"13_CR31","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/4236.989007","volume":"6","author":"P. Raghavan","year":"2002","unstructured":"Raghavan, P.: Social networks: From the web to the enterprise. IEEE Internet Computing\u00a06(1), 91\u201394 (2002)","journal-title":"IEEE Internet Computing"},{"issue":"7","key":"13_CR32","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1145\/361454.361509","volume":"15","author":"G. Salton","year":"1972","unstructured":"Salton, G.: Dynamic document processing. Commun. ACM\u00a015(7), 658\u2013668 (1972)","journal-title":"Commun. ACM"},{"issue":"1","key":"13_CR33","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/331403.331405","volume":"33","author":"C. Silverstein","year":"1999","unstructured":"Silverstein, C., Marais, H., Henzinger, M., Moricz, M.: Analysis of a very large web search engine query log. SIGIR Forum\u00a033(1), 6\u201312 (1999)","journal-title":"SIGIR Forum"},{"key":"13_CR34","unstructured":"Totty, M., Mangalindan, M.: As google becomes web\u2019s gatekeeper, sites fight to get in. Wall Street Journal CCXLI\u00a0(39) (2003)"},{"key":"13_CR35","series-title":"Series Current Legal Issues","first-page":"441","volume-title":"Law and Medicine","author":"A. Vedder","year":"2000","unstructured":"Vedder, A.: Medical data, new information technologies and the need for normative principles other than privacy rules. In: Freeman, M., Lewis, A. (eds.) Law and Medicine. Series Current Legal Issues, pp. 441\u2013459. Oxford University Press, Oxford (2000)"},{"key":"13_CR36","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)"},{"issue":"8","key":"13_CR37","first-page":"24","volume":"49","author":"D. Welch","year":"1999","unstructured":"Welch, D.: Power of persuasion - propaganda. History Today\u00a049(8), 24\u201326 (1999)","journal-title":"History Today"},{"key":"13_CR38","volume-title":"Proceedings of the fourteenth international conference on World Wide Web","author":"B. Wu","year":"2005","unstructured":"Wu, B., Davison, B.: Identifying link farm spam pages. In: Proceedings of the fourteenth international conference on World Wide Web. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Business Information Processing","Web Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12436-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:39:32Z","timestamp":1558391972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12436-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642124358","9783642124365"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12436-5_13","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2010]]}}}