{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:06:07Z","timestamp":1767139567167,"version":"build-2238731810"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811513763","type":"print"},{"value":"9789811513770","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1377-0_17","type":"book-chapter","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T02:03:36Z","timestamp":1573610616000},"page":"227-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RETRACTED CHAPTER: A New Information Exposure Situation Awareness Model Based on Cubic Exponential Smoothing and Its Prediction Method"],"prefix":"10.1007","author":[{"given":"Weijin","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yirong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jiahui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuhui","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"17_CR1","unstructured":"Craig, S.: By the numbers: 200+ amazing face book user statistics, June 2015. \nhttp:\/\/expandedramblings.com\/index.php\/by-the-numbers-17-amazing-facebook-stats\/\n\n. Accessed 29 June 2015, 19 July 2015"},{"key":"17_CR2","unstructured":"Statista: Leading social networks worldwide as of March 2015, ranked by number of active users (in millions) [OL], 15 April 2015. \nhttp:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/\n\n. Accessed 19 July 2015"},{"key":"17_CR3","unstructured":"Statista: Number of monthly active WeChat users from 2nd quarter 2010 to 1st quarter 2015 (in millions) [0L], 30 April 2015. \nhttp:\/\/www.statista.com\/statistics\/255778\/number-of-active-wechat-messenger-accounts\/\n\n. Accessed 19 July 2015"},{"key":"17_CR4","unstructured":"Craig, S.: By the Numbers: 40 Amazing Weibo Statistics [OL], 18 April 2015. \nhttp:\/\/expandedramblings.com\/index.php\/weibo-user-statistics\/\n\n. Accessed 19 July 2015"},{"key":"17_CR5","unstructured":"Luchina, F.: Ellen\u2019s Oscar Selfie Most Retweeted Tweet Ever [0L], 02 March 2014. \nhttp:\/\/abcnews.go.com\/blogs\/entertainment\/2014\/03\/ellens-Oscar-selfie-most-retweeted-tweet-ever\/\n\n. Accessed 19 July 2015"},{"key":"17_CR6","unstructured":"Wikipedia: Socialnetwork [0L], 29 July 2015. \nhttp:\/\/en.wikipedia.org\/wild\/Social\n\n. Accessed 29 July 2015"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Lumbreras, A., Gavalda, R.: Applying trust metrics based on user interactions to recommendation in social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012, pp. 1159\u20131164 (2012)","DOI":"10.1109\/ASONAM.2012.200"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Marin, A., Wellman, B.: Social network analysis: an introduction. In: The SAGE Handbook of Social Network Analysis, pp. 11\u201325 (2017)","DOI":"10.4135\/9781446294413.n2"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., et al.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591\u2013600. ACM (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"17_CR10","first-page":"004","volume":"13","author":"X Ren","year":"2014","unstructured":"Ren, X., Lu, L.: Overview of sorting methods for important nodes in networks. Chin. Sci. Bull. 13, 004 (2014)","journal-title":"Chin. Sci. Bull."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Abdullah, S., Wu, X.: An epidemic model for news spreading on Twitter. In: 2011 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI), pp. 163\u2013169 (2017)","DOI":"10.1109\/ICTAI.2011.33"},{"issue":"30","key":"17_CR12","first-page":"2103","volume":"376","author":"F Xiong","year":"2016","unstructured":"Xiong, F., Liu, Y., Zhang, Z., et al.: An information diffusion model based on retweeting mechanism for online social media. Phys. Lett. A 376(30), 2103\u20132108 (2016)","journal-title":"Phys. Lett. A"},{"key":"17_CR13","unstructured":"Lilt, D., Chen, X.: Rumor propagation in online social networks like Twitter\u2014A simulation study. In: 2011 Third International Conference on Multimedia Information Networking and Security (MINES), pp. 278\u2013282 (2016)"},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1214\/14-AOAS741","volume":"8","author":"T Zaman","year":"2014","unstructured":"Zaman, T., Fox, E.B., Bradlow, E.T.: A Bayesian approach for predicting the popularity of tweets. Ann. Appl. Stat. 8(3), 1583\u20131611 (2014)","journal-title":"Ann. Appl. Stat."},{"key":"17_CR15","unstructured":"Suh, B., Hong, L., Pirolli, P., et al.: Want to be retweeted? Large scale analytics on factors impacting retweet in Twitter network. In: 2016 IEEE Second International Conference on Social Computing (SocialCom), pp. 177\u2013184 (2016)"},{"key":"17_CR16","unstructured":"Peng, H.K., Zhu, J., Piao, D., et al.: Retweet modeling using conditional random fields. In: 2015 IEEE 11th International Conference on Data Mining Workshops (ICDMW), pp. 336\u2013343 (2015)"},{"key":"17_CR17","unstructured":"Hong, L., Dan, O., Damson, B.D.: Predicting popular messages in Twitter. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 57\u201358. ACM (2016)"},{"key":"17_CR18","series-title":"Lecture Notes in Social Networks","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-19003-7_5","volume-title":"Applications of Social Media and Social Network Analysis","author":"Y Bao","year":"2015","unstructured":"Bao, Y., Yi, C., Xue, Y., Dong, Y.: Precise modeling rumor propagation and control strategy on social networks. In: Kazienko, P., Chawla, N. (eds.) Applications of Social Media and Social Network Analysis. LNSN, pp. 77\u2013102. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-19003-7_5"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.physa.2013.08.031","volume":"393","author":"J Wang","year":"2014","unstructured":"Wang, J., Jiang, C., Qian, J.: Robustness of interdependent networks with different link patterns against cascading failures. Phys. A: Stat. Mech. Appl. 393, 535\u2013541 (2014)","journal-title":"Phys. A: Stat. Mech. Appl."},{"issue":"9","key":"17_CR20","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1016\/j.physa.2013.01.013","volume":"392","author":"J Wang","year":"2013","unstructured":"Wang, J.: Mitigation strategies on scale-free networks against cascading failures. Phys. A 392(9), 2257\u20132264 (2013)","journal-title":"Phys. A"},{"issue":"11","key":"17_CR21","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1016\/j.physa.2010.02.002","volume":"389","author":"BL Dou","year":"2016","unstructured":"Dou, B.L., Wang, X.G., Zhang, S.Y.: Robustness of networks against cascading failures. Phys. A: Stat. Mech. Appl. 389(11), 2310\u20132317 (2016)","journal-title":"Phys. A: Stat. Mech. Appl."},{"issue":"12","key":"17_CR22","first-page":"2403","volume":"34","author":"X Qiao","year":"2011","unstructured":"Qiao, X., Yang, C., Li, X., et al.: A user context based trust degree calculation method in social network services. J. Comput. Sci. 34(12), 2403\u20132413 (2011)","journal-title":"J. Comput. Sci."},{"key":"17_CR23","unstructured":"Jiang, J., Yi, C., Bao, Y., et al.: Online community perceiving method on social network. In: 1st International Workshop on Cloud Computing and Information Security. Atlantis Press (2013)"},{"issue":"3","key":"17_CR24","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1922649.1922651","volume":"43","author":"P Beatty","year":"2011","unstructured":"Beatty, P., Reap, I., Dick, S., et al.: Consumer trust in e-commerce web sites: a meta-study. ACM Comput. Surv. (CSUR) 43(3), 14 (2011)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"4","key":"17_CR25","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. (CSUR) 45(4), 47 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"17_CR26","unstructured":"Jure, L.: Stanford Large Network Dataset Collection [0L]. \nhttp:\/\/snap.Stanford.edu\/data\/\n\n. Accessed 26 August 2015"},{"issue":"5","key":"17_CR27","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.3724\/SP.J.1016.2013.01115","volume":"36","author":"W Jiang","year":"2013","unstructured":"Jiang, W., Zhong, L., Zhang, L., Shi, D.: Multi-agent dynamic collaboration model based on active logical sequence of complex systems. Chin. J. Comput. 36(5), 1115\u20131124 (2013)","journal-title":"Chin. J. Comput."},{"issue":"9","key":"17_CR28","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1360\/N112013-00202","volume":"44","author":"W Jiang","year":"2014","unstructured":"Jiang, W., Xu, Y., Gu, H., Zhang, L.: Dynamic trust calculation model and credit management mechanism of online trading. Sci. Sin. Inform. 44(9), 1084\u20131101 (2014)","journal-title":"Sci. Sin. Inform."}],"updated-by":[{"DOI":"10.1007\/978-981-15-1377-0_61","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T00:00:00Z","timestamp":1594771200000},"record-id":"40989"},{"DOI":"10.1007\/978-981-15-1377-0_61","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T00:00:00Z","timestamp":1594771200000}}],"container-title":["Communications in Computer and Information Science","Computer Supported Cooperative Work and Social Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1377-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T11:11:57Z","timestamp":1594725117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-1377-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811513763","9789811513770"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1377-0_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"15 July 2020","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have retracted this article [1] because of overlap with doctoral dissertation [2]. Figures 5, 6 and 7 were taken from the dissertation without permission or attribution. Part 2.3 of the article \u201cEvaluation of information Outburst prediction model\u201d quotes the data from this doctoral dissertation and makes some erroneous changes. All authors agree to this retraction.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChineseCSCW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Computer Supported Cooperative Work  and Social Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinesecscw2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.scholat.com\/confweb\/CCSCW2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}