{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:51:10Z","timestamp":1742950270293,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811027376"},{"type":"electronic","value":"9789811027383"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2738-3_16","type":"book-chapter","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T22:40:57Z","timestamp":1473979257000},"page":"188-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Credibility Assessment of Public Pages over Facebook"],"prefix":"10.1007","author":[{"given":"Himanshi","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Rishabh","family":"Kaushal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"issue":"4","key":"16_CR1","first-page":"18","volume":"9","author":"J Wang","year":"2015","unstructured":"Wang, J., Yu, C.T., Yu, P.S., Liu, B., Meng, W.: Diversionary comments under blog posts. ACM Trans. Web (TWEB) 9(4), 18 (2015)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Dewan, P., Kumaraguru, P.: Towards automatic real time identification of malicious posts on Facebook. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 85\u201392. IEEE, 21 July 2015","DOI":"10.1109\/PST.2015.7232958"},{"issue":"9","key":"16_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MC.2011.222","volume":"12","author":"S Abu-Nimeh","year":"2011","unstructured":"Abu-Nimeh, S., Chen, T.M., Alzubi, O.: Malicious and spam posts in online social networks. Computer 12(9), 23\u201328 (2011)","journal-title":"Computer"},{"issue":"27","key":"16_CR4","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1207\/s15567419cy2701_10","volume":"20","author":"MJ Metzger","year":"2003","unstructured":"Metzger, M.J., Flanagin, A.J., Eyal, K., Lemus, D.R., McCann, R.M.: Credibility for the 21st century: integrating perspectives on source, message, and media credibility in the contemporary media environment. Commun. Yearb. 20(27), 293\u2013336 (2003)","journal-title":"Commun. Yearb."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Nguyen, N.P., Thai, M.T.: Sources of misinformation in Online Social Networks: who to suspect? In: 2012-MILCOM Military Communications Conference, pp. 1\u20136. IEEE, 29 October 2012","DOI":"10.1109\/MILCOM.2012.6415780"},{"issue":"12","key":"16_CR6","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1049\/iet-com.2011.0202","volume":"6","author":"C Lin","year":"2012","unstructured":"Lin, C., Huang, Z., Yang, F., Zou, Q.: Identify content quality in online social networks. IET Commun. 6(12), 1618\u20131624 (2012)","journal-title":"IET Commun."},{"key":"16_CR7","unstructured":"Ismail, S., Latif, R.A.: Authenticity issues of social media: credibility, quality and reality. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 74, p. 265. World Academy of Science, Engineering and Technology (WASET), 1 February 2013"},{"issue":"1","key":"16_CR8","first-page":"53","volume":"4","author":"AA AlMansour","year":"2014","unstructured":"AlMansour, A.A., Brankovic, L., Iliopoulos, C.S.: A model for recalibrating credibility in different contexts and languages-a twitter case study. Int. J. Digit. Inf. Wirel. Commun. (IJDIWC) 4(1), 53\u201362 (2014)","journal-title":"Int. J. Digit. Inf. Wirel. Commun. (IJDIWC)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-37210-0_48","volume-title":"Social Computing, Behavioral-Cultural Modeling and Prediction","author":"M-A Abbasi","year":"2013","unstructured":"Abbasi, M.-A., Liu, H.: Measuring user credibility in social media. In: Greenberg, A.M., Kennedy, W.G., Bos, N.D. (eds.) SBP 2013. LNCS, vol. 7812, pp. 441\u2013448. Springer, Heidelberg (2013)"},{"key":"16_CR10","unstructured":"Kang, M.: Measuring social media credibility: a study on a measure of blog credibility. Inst. Public Relat. 59\u201368 (2010)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference. ACM (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Stein, T., Chen, E., Mangla, K.: Facebook Immune System in European Conference on Computer System (EuroSys) (2011)","DOI":"10.1145\/1989656.1989664"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Robertson, M., Pan, Y., Yuan, B.: A social approach to security: using social networks to help detect malicious web content. In: 2010 International Conference on Intelligent Systems and Knowledge Engineering (ISKE). IEEE (2010)","DOI":"10.1109\/ISKE.2010.5680839"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Cvijikj, I.P., Michahelles, F.: Monitoring trends on facebook. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE (2011)","DOI":"10.1109\/DASC.2011.150"},{"issue":"5","key":"16_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2010.113","volume":"8","author":"S Abu-Nimeh","year":"2010","unstructured":"Abu-Nimeh, S., Chen, T.M.: Proliferation and detection of blog spam. IEEE Secur. Priv. 8(5), 42\u201347 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Agrawal, H., Kaushal, R.: Analysis of text mining techniques over public pages of Facebook. In: 2016 IEEE International Advance Computing Conference(IACC). IEEE (2016)","DOI":"10.1109\/IACC.2016.12"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2738-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T08:32:40Z","timestamp":1558513960000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2738-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027376","9789811027383"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2738-3_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"17 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}