{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:21:39Z","timestamp":1773325299391,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819570713","type":"print"},{"value":"9789819570720","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-7072-0_21","type":"book-chapter","created":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:10:13Z","timestamp":1773274213000},"page":"297-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tunnel Vision in\u00a0Online Discourse: Formalization and\u00a0Entropy-Based Quantification with\u00a0LLM-Simulated Agents"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2159-2339","authenticated-orcid":false,"given":"Xiaodan","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4724-8065","authenticated-orcid":false,"given":"Yanbin","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9215-4979","authenticated-orcid":false,"given":"Weihua","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1214-6317","authenticated-orcid":false,"given":"Quan","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Al\u00a0Atiqi, M., Chang, S., Hiroshi, D.: Agent-based approach to echo chamber reduction strategy in social media. In: 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), pp. 1301\u20131306. IEEE (2018)","DOI":"10.1109\/SCIS-ISIS.2018.00204"},{"issue":"6239","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1126\/science.aaa1160","volume":"348","author":"E Bakshy","year":"2015","unstructured":"Bakshy, E., Messing, S., Adamic, L.A.: Exposure to ideologically diverse news and opinion on facebook. Science 348(6239), 1130\u20131132 (2015)","journal-title":"Science"},{"key":"21_CR3","unstructured":"Barber\u00e1, P.: How social media reduces mass political polarization. Evidence from Germany, Spain, and the US. Job Market Paper, New York University 46, 1\u201346 (2014)"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10676-013-9321-6","volume":"15","author":"E Bozdag","year":"2013","unstructured":"Bozdag, E.: Bias in algorithmic filtering and personalization. Ethics Inf. Technol. 15, 209\u2013227 (2013)","journal-title":"Ethics Inf. Technol."},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Conover, M., Ratkiewicz, J., Francisco, M., Gon\u00e7alves, B., Menczer, F., Flammini, A.: Political polarization on twitter. In: Proceedings of the International AAAI Conference on Web and Social Media. vol.\u00a05, pp. 89\u201396 (2011)","DOI":"10.1609\/icwsm.v5i1.14126"},{"issue":"2","key":"21_CR6","doi-asserted-by":"publisher","first-page":"215824402210950","DOI":"10.1177\/21582440221095022","volume":"12","author":"E Elaad","year":"2022","unstructured":"Elaad, E.: Tunnel vision and confirmation bias among police investigators and laypeople in hypothetical criminal contexts. SAGE Open 12(2), 21582440221095024 (2022)","journal-title":"SAGE Open"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Findley, K.A.: Tunnel vision. In: Cutler, B.L. (ed.) Conviction of the Innocent: Lessons from Psychological Research, pp. 303\u2013323. American Psychological Association (2012)","DOI":"10.1037\/13085-014"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Garimella, K., De\u00a0Francisci\u00a0Morales, G., Gionis, A., Mathioudakis, M.: Political discourse on social media: echo chambers, gatekeepers, and the price of bipartisanship. In: Proceedings of the 2018 World Wide Web Conference, pp. 913\u2013922 (2018)","DOI":"10.1145\/3178876.3186139"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Hu, Y., Wu, S., Jiang, C., Li, W., Bai, Q., Roehrer, E.: AI facilitated isolations? the impact of recommendation-based influence diffusion in human society. In: Proceedings of the 31st International Joint Conference on Artificial Intelligence, pp. 5080\u20135086 (2022)","DOI":"10.24963\/ijcai.2022\/705"},{"issue":"1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1111\/j.1460-2466.2000.tb02833.x","volume":"50","author":"A Lang","year":"2000","unstructured":"Lang, A.: The limited capacity model of mediated message processing. J. Commun. 50(1), 46\u201370 (2000)","journal-title":"J. Commun."},{"issue":"3","key":"21_CR11","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1093\/comjnl\/bxy078","volume":"62","author":"W Li","year":"2019","unstructured":"Li, W., Bai, Q., Zhang, M.: A multi-agent system for modelling preference-based complex influence diffusion in social networks. Comput. J. 62(3), 430\u2013447 (2019)","journal-title":"Comput. J."},{"key":"21_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110062","volume":"136","author":"W Li","year":"2023","unstructured":"Li, W., Hu, Y., Jiang, C., Wu, S., Bai, Q., Lai, E.: Abem: an adaptive agent-based evolutionary approach for influence maximization in dynamic social networks. Appl. Soft Comput. 136, 110062 (2023)","journal-title":"Appl. Soft Comput."},{"key":"21_CR13","unstructured":"Liu, R., et\u00a0al.: Best practices and lessons learned on synthetic data. arXiv preprint arXiv:2404.07503 (2024)"},{"issue":"3","key":"21_CR14","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TCSS.2021.3091168","volume":"9","author":"R Luo","year":"2021","unstructured":"Luo, R., Nettasinghe, B., Krishnamurthy, V.: Echo chambers and segregation in social networks: markov bridge models and estimation. IEEE Trans. Comput. Soc. Syst. 9(3), 891\u2013901 (2021)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"21_CR15","doi-asserted-by":"publisher","unstructured":"Mackworth, N.H.: Visual noise causes tunnel vision. Psychonomic Sci., 67\u201368 (1965). https:\/\/doi.org\/10.3758\/BF03343023","DOI":"10.3758\/BF03343023"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Minici, M., Cinus, F., Monti, C., Bonchi, F., Manco, G.: Cascade-based echo chamber detection. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, pp. 1511\u20131520 (2022)","DOI":"10.1145\/3511808.3557253"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Pariser, E.: The filter bubble: what the internet is hiding from you. Penguin UK (2011)","DOI":"10.3139\/9783446431164"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.H., Ottoni, R., West, R., Almeida, V.A., Meira\u00a0Jr, W.: Auditing radicalization pathways on Youtube. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, pp. 131\u2013141 (2020)","DOI":"10.1145\/3351095.3372879"},{"key":"21_CR19","unstructured":"Sunstein, C.R.: Echo chambers: Bush v. Gore, impeachment, and beyond. Princeton University Press Princeton, NJ (2001)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Tsurushima, A.: Simulation analysis of tunnel vision effect in crowd evacuation. In: International Conference on Artificial Intelligence and Soft Computing, pp. 506\u2013518. Springer (2021)","DOI":"10.1007\/978-3-030-87986-0_45"},{"key":"21_CR21","unstructured":"Wang, M., et al.: Nudging towards responsible recommendations: a graph-based approach to mitigate belief filter bubbles. IEEE Trans. Artifi. Intell., 1\u201315 (2024)"},{"issue":"6","key":"21_CR22","first-page":"1","volume":"18","author":"J Yang","year":"2024","unstructured":"Yang, J., et al.: Harnessing the power of LLMs in practice: a survey on Chatgpt and beyond. ACM Trans. Knowl. Discov. Data 18(6), 1\u201332 (2024)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"1","key":"21_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.3390\/systems13010029","volume":"13","author":"L Zhang","year":"2025","unstructured":"Zhang, L., Hu, Y., Li, W., Bai, Q., Nand, P.: LLM-AIDSIM: LLM-enhanced agent-based influence diffusion simulation in social networks. Systems 13(1), 29 (2025)","journal-title":"Systems"}],"container-title":["Lecture Notes in Computer Science","PRICAI 2025: Trends in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-7072-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:10:16Z","timestamp":1773274216000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-7072-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819570713","9789819570720"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-7072-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific Rim International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wellington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pricai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.pricai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}