{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T04:32:42Z","timestamp":1749184362122},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T00:00:00Z","timestamp":1674518400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T00:00:00Z","timestamp":1674518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s10115-023-01833-6","type":"journal-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T16:46:07Z","timestamp":1674578767000},"page":"2251-2280","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An action\u2013reaction influence model relying on OSN user-generated content"],"prefix":"10.1007","volume":"65","author":[{"given":"Aniello","family":"De\u00a0Santo","sequence":"first","affiliation":[]},{"given":"Antonino","family":"Ferraro","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Moscato","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Sperl\u00ed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,24]]},"reference":[{"key":"1833_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.102083","volume":"71","author":"AS Al-Adwan","year":"2022","unstructured":"Al-Adwan AS, Al-Debei MM, Dwivedi YK (2022) E-commerce in high uncertainty avoidance cultures: the driving forces of repurchase and word-of-mouth intentions. Technol Soc 71:102083. https:\/\/doi.org\/10.1016\/j.techsoc.2022.102083","journal-title":"Technol Soc"},{"key":"1833_CR2","doi-asserted-by":"publisher","unstructured":"Ali J, Babaei M, Chakraborty A, Mirzasoleiman B, Gummadi KP, Singla A (2022) On the fairness of time-critical influence maximization in social networks (extended abstract). In: 2022 IEEE 38th international conference on data engineering (ICDE), pp 1541\u20131542. https:\/\/doi.org\/10.1109\/ICDE53745.2022.00147","DOI":"10.1109\/ICDE53745.2022.00147"},{"key":"1833_CR3","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ins.2020.03.060","volume":"527","author":"M Alshahrani","year":"2020","unstructured":"Alshahrani M, Fuxi Z, Sameh A, Mekouar S, Huang S (2020) Efficient algorithms based on centrality measures for identification of top-k influential users in social networks. Inf Sci 527:88\u2013107. https:\/\/doi.org\/10.1016\/j.ins.2020.03.060","journal-title":"Inf Sci"},{"key":"1833_CR4","doi-asserted-by":"publisher","first-page":"69707","DOI":"10.1109\/ACCESS.2019.2917123","volume":"7","author":"M Alshahrani","year":"2019","unstructured":"Alshahrani M, Fuxi Z, Sameh A, Mekouar S, Liu S (2019) Influence maximization based global structural properties: a multi-armed bandit approach. IEEE Access 7:69707\u201369747. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917123","journal-title":"IEEE Access"},{"issue":"14","key":"1833_CR5","doi-asserted-by":"publisher","first-page":"17803","DOI":"10.1007\/s11042-017-5556-2","volume":"77","author":"F Amato","year":"2018","unstructured":"Amato F, Castiglione A, Moscato V, Picariello A, Sperl\u00ec G (2018) Multimedia summarization using social media content. Multimed Tools Appl 77(14):17803\u201317827. https:\/\/doi.org\/10.1007\/s11042-017-5556-2","journal-title":"Multimed Tools Appl"},{"key":"1833_CR6","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1016\/j.future.2017.04.028","volume":"93","author":"F Amato","year":"2019","unstructured":"Amato F, Moscato V, Picariello A, Piccialli F (2019) Sos: a multimedia recommender system for online social networks. Future Gener Comput Syst 93:914\u2013923. https:\/\/doi.org\/10.1016\/j.future.2017.04.028","journal-title":"Future Gener Comput Syst"},{"key":"1833_CR7","doi-asserted-by":"publisher","unstructured":"Amato F, Moscato V, Picariello A, Sperl\u00ed G (2017) Diffusion algorithms in multimedia social networks: a preliminary model. In: Proceedings of the 2017 IEEE\/ACM international conference on advances in social networks analysis and mining 2017, ASONAM \u201917. Association for Computing Machinery, New York, NY, USA, pp 844\u2013851. https:\/\/doi.org\/10.1145\/3110025.3116207","DOI":"10.1145\/3110025.3116207"},{"key":"1833_CR8","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.future.2018.11.035","volume":"94","author":"F Amato","year":"2019","unstructured":"Amato F, Moscato V, Picariello A, Sperli\u2019\u00ec G (2019) Extreme events management using multimedia social networks. Future Gener Comput Syst 94:444\u2013452. https:\/\/doi.org\/10.1016\/j.future.2018.11.035","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"1833_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer P, Cesa-Bianchi N, Freund Y, Schapire RE (2002) The nonstochastic multiarmed bandit problem. SIAM J Comput 32(1):48\u201377. https:\/\/doi.org\/10.1137\/S0097539701398375","journal-title":"SIAM J Comput"},{"issue":"9","key":"1833_CR10","doi-asserted-by":"publisher","first-page":"3417","DOI":"10.1007\/s10115-020-01461-4","volume":"62","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2020) A survey on influence maximization in a social network. Knowl Inf Syst 62(9):3417\u20133455. https:\/\/doi.org\/10.1007\/s10115-020-01461-4","journal-title":"Knowl Inf Syst"},{"key":"1833_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116342","volume":"192","author":"TK Biswas","year":"2022","unstructured":"Biswas TK, Abbasi A, Chakrabortty RK (2022) A two-stage vikor assisted multi-operator differential evolution approach for influence maximization in social networks. Expert Syst Appl 192:116342. https:\/\/doi.org\/10.1016\/j.eswa.2021.116342","journal-title":"Expert Syst Appl"},{"key":"1833_CR12","doi-asserted-by":"crossref","unstructured":"Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the twenty-fifth annual ACM-SIAM symposium on discrete algorithms, SODA \u201914. Society for Industrial and Applied Mathematics, USA, pp 946\u2013957","DOI":"10.1137\/1.9781611973402.70"},{"issue":"12","key":"1833_CR13","doi-asserted-by":"publisher","first-page":"2421","DOI":"10.1109\/TKDE.2018.2820010","volume":"30","author":"A Cali\u00f2","year":"2018","unstructured":"Cali\u00f2 A, Interdonato R, Pulice C, Tagarelli A (2018) Topology-driven diversity for targeted influence maximization with application to user engagement in social networks. IEEE Trans Knowl Data Eng 30(12):2421\u20132434. https:\/\/doi.org\/10.1109\/TKDE.2018.2820010","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"1833_CR14","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1007\/s10115-021-01556-6","volume":"63","author":"Q Cao","year":"2021","unstructured":"Cao Q, Shen H, Gao J, Cheng X (2021) Learning diffusion model-free and efficient influence function for influence maximization from information cascades. Knowl Inf Syst 63(5):1173\u20131196. https:\/\/doi.org\/10.1007\/s10115-021-01556-6","journal-title":"Knowl Inf Syst"},{"key":"1833_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101385","volume":"50","author":"Y Chawla","year":"2020","unstructured":"Chawla Y, Kowalska-Pyzalska A, Silveira PD (2020) Marketing and communications channels for diffusion of electricity smart meters in Portugal. Telemat Inform 50:101385. https:\/\/doi.org\/10.1016\/j.tele.2020.101385","journal-title":"Telemat Inform"},{"issue":"5","key":"1833_CR16","doi-asserted-by":"publisher","first-page":"3467","DOI":"10.1109\/TNSE.2022.3185047","volume":"9","author":"S Chen","year":"2022","unstructured":"Chen S, Zhang Y, Yang W, Yang R (2022) Information spread maximization with multi-boosting stages. IEEE Trans Netw Sci Eng 9(5):3467\u20133477. https:\/\/doi.org\/10.1109\/TNSE.2022.3185047","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"4","key":"1833_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00527ED1V01Y201308DTM037","volume":"5","author":"W Chen","year":"2013","unstructured":"Chen W, Lakshmanan LV, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1\u2013177. https:\/\/doi.org\/10.2200\/S00527ED1V01Y201308DTM037","journal-title":"Synth Lect Data Manag"},{"key":"1833_CR18","unstructured":"Chen W, Wang Y, Yuan Y (2013) Combinatorial multi-armed bandit: general framework and applications. In: Dasgupta S, McAllester D (eds) Proceedings of the 30th international conference on machine learning, proceedings of machine learning research, vol\u00a028. PMLR, Atlanta, Georgia, USA, pp 151\u2013159"},{"issue":"1","key":"1833_CR19","first-page":"1746","volume":"17","author":"W Chen","year":"2016","unstructured":"Chen W, Wang Y, Yuan Y, Wang Q (2016) Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. J Mach Learn Res 17(1):1746\u20131778","journal-title":"J Mach Learn Res"},{"key":"1833_CR20","doi-asserted-by":"publisher","unstructured":"Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: 2010 IEEE 10th international conference on data mining (ICDM). IEEE, pp 88\u201397. https:\/\/doi.org\/10.1109\/ICDM.2010.118","DOI":"10.1109\/ICDM.2010.118"},{"key":"1833_CR21","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.ins.2019.10.075","volume":"513","author":"Y Chen","year":"2020","unstructured":"Chen Y, Qu Q, Ying Y, Li H, Shen J (2020) Semantics-aware influence maximization in social networks. Inf Sci 513:442\u2013464. https:\/\/doi.org\/10.1016\/j.ins.2019.10.075","journal-title":"Inf Sci"},{"issue":"5","key":"1833_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102613","volume":"58","author":"LC Cheng","year":"2021","unstructured":"Cheng LC, Chen K, Lee MC, Li KM (2021) User-defined SWOT analysis\u2014a change mining perspective on user-generated content. Inf Process Manag 58(5):102613. https:\/\/doi.org\/10.1016\/j.ipm.2021.102613","journal-title":"Inf Process Manag"},{"key":"1833_CR23","volume-title":"Influence: Science and practice","author":"RB Cialdini","year":"2009","unstructured":"Cialdini RB (2009) Influence: Science and practice, vol 4. Pearson education, Boston"},{"key":"1833_CR24","volume-title":"Pre-suasion: a revolutionary way to influence and persuade","author":"RB Cialdini","year":"2016","unstructured":"Cialdini RB (2016) Pre-suasion: a revolutionary way to influence and persuade. Simon & Schuster, New York"},{"issue":"8","key":"1833_CR25","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1287\/mnsc.23.8.789","volume":"23","author":"G Cornuejols","year":"1977","unstructured":"Cornuejols G, Fisher ML, Nemhauser GL (1977) Exceptional paper-location of bank accounts to optimize float: an analytic study of exact and approximate algorithms. Manag Sci 23(8):789\u2013810. https:\/\/doi.org\/10.1287\/mnsc.23.8.789","journal-title":"Manag Sci"},{"issue":"2","key":"1833_CR26","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1109\/TNSE.2019.2920371","volume":"7","author":"X Deng","year":"2020","unstructured":"Deng X, Long F, Li B, Cao D, Pan Y (2020) An influence model based on heterogeneous online social network for influence maximization. IEEE Trans Netw Sci Eng 7(2):737\u2013749. https:\/\/doi.org\/10.1109\/TNSE.2019.2920371","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1833_CR27","doi-asserted-by":"publisher","unstructured":"Deng X, Pan Y, Wu Y, Gui J (2015) Credit distribution and influence maximization in online social networks using node features. In: 2015 12th international conference on fuzzy systems and knowledge discovery (FSKD). IEEE, pp 2093\u20132100. https:\/\/doi.org\/10.1109\/FSKD.2015.7382274","DOI":"10.1109\/FSKD.2015.7382274"},{"key":"1833_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.122921","volume":"546","author":"Q Ding","year":"2020","unstructured":"Ding Q, Li W, Hu X, Zheng Z, Tang S (2020) The sis diffusion process in complex networks with independent spreaders. Phys A Stat Mech Appl 546:122921. https:\/\/doi.org\/10.1016\/j.physa.2019.122921","journal-title":"Phys A Stat Mech Appl"},{"key":"1833_CR29","doi-asserted-by":"publisher","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 57\u201366. https:\/\/doi.org\/10.1145\/502512.502525","DOI":"10.1145\/502512.502525"},{"issue":"3","key":"1833_CR30","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSC.2014.2310216","volume":"7","author":"M Doo","year":"2014","unstructured":"Doo M, Liu L (2014) Probabilistic diffusion of social influence with incentives. IEEE Trans Serv Comput 7(3):387\u2013400. https:\/\/doi.org\/10.1109\/TSC.2014.2310216","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"1833_CR31","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/15534510802254087","volume":"4","author":"PW Eastwick","year":"2009","unstructured":"Eastwick PW, Gardner WL (2009) Is it a game? Evidence for social influence in the virtual world. Soc Influ 4(1):18\u201332","journal-title":"Soc Influ"},{"key":"1833_CR32","doi-asserted-by":"publisher","first-page":"034301","DOI":"10.1103\/PhysRevE.106.034301","volume":"106","author":"S Erkol","year":"2022","unstructured":"Erkol S, Mazzilli D, Radicchi F (2022) Effective submodularity of influence maximization on temporal networks. Phys Rev E 106:034301. https:\/\/doi.org\/10.1103\/PhysRevE.106.034301","journal-title":"Phys Rev E"},{"issue":"1","key":"1833_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-022-00870-3","volume":"12","author":"M Freire","year":"2022","unstructured":"Freire M, Antunes F, Costa JP (2022) Getting decision support from context-specific online social networks: a case study. Soc Netw Anal Min 12(1):1\u201323. https:\/\/doi.org\/10.1007\/s13278-022-00870-3","journal-title":"Soc Netw Anal Min"},{"key":"1833_CR34","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.chb.2019.01.026","volume":"96","author":"M G\u00f3mez","year":"2019","unstructured":"G\u00f3mez M, Lopez C, Molina A (2019) An integrated model of social media brand engagement. Comput Hum Behav 96:196\u2013206. https:\/\/doi.org\/10.1016\/j.chb.2019.01.026","journal-title":"Comput Hum Behav"},{"issue":"3","key":"1833_CR35","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Market Lett 12(3):211\u2013223. https:\/\/doi.org\/10.1023\/A:1011122126881","journal-title":"Market Lett"},{"issue":"2","key":"1833_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2824253","volume":"34","author":"M Gomez-Rodriguez","year":"2016","unstructured":"Gomez-Rodriguez M, Song L, Du N, Zha H, Sch\u00f6lkopf B (2016) Influence estimation and maximization in continuous-time diffusion networks. ACM Trans Inf Syst (TOIS) 34(2):1\u201333","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"1833_CR37","doi-asserted-by":"publisher","DOI":"10.1086\/226707","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Soc. https:\/\/doi.org\/10.1086\/226707","journal-title":"Am J Soc"},{"key":"1833_CR38","unstructured":"Guadagno RE, Cialdini RB (2005) Online persuasion and compliance: social influence on the internet and beyond. The social net: the social psychology of the internet, pp 91\u2013113"},{"issue":"3","key":"1833_CR39","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/TKDE.2016.2621038","volume":"29","author":"L Guo","year":"2017","unstructured":"Guo L, Zhang D, Cong G, Wu W, Tan KL (2017) Influence maximization in trajectory databases. IEEE Trans Knowl Data Eng 29(3):627\u2013641. https:\/\/doi.org\/10.1109\/TKDE.2016.2621038","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1833_CR40","doi-asserted-by":"publisher","DOI":"10.1145\/3533817","author":"Q Guo","year":"2022","unstructured":"Guo Q, Wang S, Wei Z, Lin W, Tang J (2022) Influence maximization revisited: efficient sampling with bound tightened. ACM Trans Database Syst. https:\/\/doi.org\/10.1145\/3533817","journal-title":"ACM Trans Database Syst"},{"issue":"2","key":"1833_CR41","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/JSYST.2019.2922373","volume":"14","author":"Q He","year":"2020","unstructured":"He Q, Wang X, Yi B, Mao F, Cai Y, Huang M (2020) Opinion maximization through unknown influence power in social networks under weighted voter model. IEEE Syst J 14(2):1874\u20131885. https:\/\/doi.org\/10.1109\/JSYST.2019.2922373","journal-title":"IEEE Syst J"},{"key":"1833_CR42","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.eswa.2018.07.064","volume":"119","author":"M Hosseini-Pozveh","year":"2019","unstructured":"Hosseini-Pozveh M, Zamanifar K, Naghsh-Nilchi AR (2019) Assessing information diffusion models for influence maximization in signed social networks. Expert Syst Appl 119:476\u2013490. https:\/\/doi.org\/10.1016\/j.eswa.2018.07.064","journal-title":"Expert Syst Appl"},{"issue":"2","key":"1833_CR43","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.im.2018.09.003","volume":"56","author":"T Hu","year":"2019","unstructured":"Hu T, Dai H, Salam A (2019) Integrative qualities and dimensions of social commerce: toward a unified view. Inf Manag 56(2):249\u2013270. https:\/\/doi.org\/10.1016\/j.im.2018.09.003. (Social Commerce and Social Media: Behaviors in the New Service Economy)","journal-title":"Inf Manag"},{"key":"1833_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3216587","author":"M Jaouadi","year":"2022","unstructured":"Jaouadi M, Romdhane LB (2022) A graph sampling-based model for influence maximization in large-scale social networks. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2022.3216587","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"3","key":"1833_CR45","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1007\/s10115-019-01375-w","volume":"62","author":"S Jendoubi","year":"2020","unstructured":"Jendoubi S, Martin A (2020) Evidential positive opinion influence measures for viral marketing. Knowl Inf Syst 62(3):1037\u20131062. https:\/\/doi.org\/10.1007\/s10115-019-01375-w","journal-title":"Knowl Inf Syst"},{"key":"1833_CR46","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.knosys.2017.01.014","volume":"121","author":"S Jendoubi","year":"2017","unstructured":"Jendoubi S, Martin A, Li\u00e9tard L, Hadji HB, Yaghlane BB (2017) Two evidential data based models for influence maximization in twitter. Knowl Based Syst 121:58\u201370. https:\/\/doi.org\/10.1016\/j.knosys.2017.01.014","journal-title":"Knowl Based Syst"},{"key":"1833_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2335-1","author":"X Ji","year":"2014","unstructured":"Ji X, Wang Q, Chen BW, Rho S, Kuo CJ, Dai Q (2014) Online distribution and interaction of video data in social multimedia network. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-014-2335-1","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"1833_CR48","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TNSE.2018.2860988","volume":"7","author":"H Kang","year":"2020","unstructured":"Kang H, Sun M, Yu Y, Fu X, Bao B (2020) Spreading dynamics of an SEIR model with delay on scale-free networks. IEEE Trans Netw Sci Eng 7(1):489\u2013496. https:\/\/doi.org\/10.1109\/TNSE.2018.2860988","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1833_CR49","doi-asserted-by":"publisher","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201903. Association for Computing Machinery, New York, NY, USA, pp 137\u2013146. https:\/\/doi.org\/10.1145\/956750.956769","DOI":"10.1145\/956750.956769"},{"key":"1833_CR50","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.tele.2019.02.003","volume":"38","author":"M Kim","year":"2019","unstructured":"Kim M, Kim S, Kim J (2019) Can mobile and biometric payments replace cards in the Korean offline payments market? consumer preference analysis for payment systems using a discrete choice model. Telemat Inform 38:46\u201358. https:\/\/doi.org\/10.1016\/j.tele.2019.02.003","journal-title":"Telemat Inform"},{"key":"1833_CR51","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1016\/j.ins.2022.06.075","volume":"607","author":"S Kumar","year":"2022","unstructured":"Kumar S, Mallik A, Khetarpal A, Panda B (2022) Influence maximization in social networks using graph embedding and graph neural network. Inf Sci 607:1617\u20131636. https:\/\/doi.org\/10.1016\/j.ins.2022.06.075","journal-title":"Inf Sci"},{"issue":"1","key":"1833_CR52","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/0196-8858(85)90002-8","volume":"6","author":"TL Lai","year":"1985","unstructured":"Lai TL, Robbins H (1985) Asymptotically efficient adaptive allocation rules. Adv Appl Math 6(1):4\u201322. https:\/\/doi.org\/10.1016\/0196-8858(85)90002-8","journal-title":"Adv Appl Math"},{"key":"1833_CR53","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3164667","author":"H Li","year":"2022","unstructured":"Li H, Xu M, Bhowmick SS, Rayhan JS, Sun C, Cui J (2022) Piano: influence maximization meets deep reinforcement learning. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2022.3164667","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"10","key":"1833_CR54","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1109\/TKDE.2018.2867774","volume":"31","author":"W Li","year":"2018","unstructured":"Li W, Bai Q, Zhang M, Nguyen TD (2018) Automated influence maintenance in social networks: an agent-based approach. IEEE Trans Knowl Data Eng 31(10):1884\u20131897. https:\/\/doi.org\/10.1109\/TKDE.2018.2867774","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"1833_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102818","volume":"59","author":"W Li","year":"2022","unstructured":"Li W, Li Y, Liu W, Wang C (2022) An influence maximization method based on crowd emotion under an emotion-based attribute social network. Inf Process Manag 59(2):102818. https:\/\/doi.org\/10.1016\/j.ipm.2021.102818","journal-title":"Inf Process Manag"},{"issue":"2","key":"1833_CR56","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/15427951.2013.862884","volume":"11","author":"Y Li","year":"2015","unstructured":"Li Y, Chen W, Wang Y, Zhang ZL (2015) Voter model on signed social networks. Internet Math 11(2):93\u2013133. https:\/\/doi.org\/10.1080\/15427951.2013.862884","journal-title":"Internet Math"},{"issue":"10","key":"1833_CR57","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li Y, Fan J, Wang Y, Tan KL (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30(10):1852\u20131872. https:\/\/doi.org\/10.1109\/TKDE.2018.2807843","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"10","key":"1833_CR58","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li Y, Fan J, Wang Y, Tan KL (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30(10):1852\u20131872. https:\/\/doi.org\/10.1109\/TKDE.2018.2807843","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"10","key":"1833_CR59","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.14778\/2794367.2794376","volume":"8","author":"Y Li","year":"2015","unstructured":"Li Y, Zhang D, Tan KL (2015) Real-time targeted influence maximization for online advertisements. Proc VLDB Endow 8(10):1070","journal-title":"Proc VLDB Endow"},{"issue":"5","key":"1833_CR60","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.im.2016.12.006","volume":"54","author":"YM Li","year":"2017","unstructured":"Li YM, Lai CY, Lin LF (2017) A diffusion planning mechanism for social marketing. Inf Manag 54(5):638\u2013650. https:\/\/doi.org\/10.1016\/j.im.2016.12.006","journal-title":"Inf Manag"},{"key":"1833_CR61","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.jbusres.2022.03.093","volume":"146","author":"WM Lim","year":"2022","unstructured":"Lim WM, Ahmed PK, Ali MY (2022) Giving electronic word of mouth (eWOM) as a prepurchase behavior: the case of online group buying. J Bus Res 146:582\u2013604. https:\/\/doi.org\/10.1016\/j.jbusres.2022.03.093","journal-title":"J Bus Res"},{"key":"1833_CR62","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.ins.2020.07.040","volume":"544","author":"LF Lin","year":"2021","unstructured":"Lin LF, Li YM (2021) An efficient approach to identify social disseminators for timely information diffusion. Inf Sci 544:78\u201396. https:\/\/doi.org\/10.1016\/j.ins.2020.07.040","journal-title":"Inf Sci"},{"key":"1833_CR63","doi-asserted-by":"publisher","DOI":"10.1145\/3372785","author":"E Marin","year":"2020","unstructured":"Marin E, Guo R, Shakarian P (2020) Measuring time-constrained influence to predict adoption in online social networks. Trans Soc Comput. https:\/\/doi.org\/10.1145\/3372785","journal-title":"Trans Soc Comput"},{"key":"1833_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.07.002","volume":"87","author":"Z Masood","year":"2019","unstructured":"Masood Z, Samar R, Raja MAZ (2019) Design of a mathematical model for the stuxnet virus in a network of critical control infrastructure. Comput Secur 87:101565. https:\/\/doi.org\/10.1016\/j.cose.2019.07.002","journal-title":"Comput Secur"},{"key":"1833_CR65","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.bdr.2018.03.001","volume":"14","author":"KK Mishra","year":"2018","unstructured":"Mishra KK, Bisht H, Singh T, Chang V (2018) A direction aware particle swarm optimization with sensitive swarm leader. Big Data Res 14:57\u201367. https:\/\/doi.org\/10.1016\/j.bdr.2018.03.001","journal-title":"Big Data Res"},{"key":"1833_CR66","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113580","volume":"160","author":"S Molaei","year":"2020","unstructured":"Molaei S, Farahbakhsh R, Salehi M, Crespi N (2020) Identifying influential nodes in heterogeneous networks. Expert Syst Appl 160:113580. https:\/\/doi.org\/10.1016\/j.eswa.2020.113580","journal-title":"Expert Syst Appl"},{"key":"1833_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105153","volume":"189","author":"S Molaei","year":"2020","unstructured":"Molaei S, Zare H, Veisi H (2020) Deep learning approach on information diffusion in heterogeneous networks. Knowl Based Syst 189:105153. https:\/\/doi.org\/10.1016\/j.knosys.2019.105153","journal-title":"Knowl Based Syst"},{"issue":"2","key":"1833_CR68","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.aci.2017.11.001","volume":"15","author":"JS More","year":"2019","unstructured":"More JS, Lingam C (2019) A SI model for social media influencer maximization. Appl Comput Inform 15(2):102\u2013108. https:\/\/doi.org\/10.1016\/j.aci.2017.11.001","journal-title":"Appl Comput Inform"},{"key":"1833_CR69","doi-asserted-by":"publisher","unstructured":"Moscato V, Picariello A, Subrahmanian V (2015) Multimedia social networks for cultural heritage applications: the givas project. In: Data management in pervasive systems. Springer, pp 169\u2013182. https:\/\/doi.org\/10.1007\/978-3-319-20062-0_8","DOI":"10.1007\/978-3-319-20062-0_8"},{"key":"1833_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2015.08.017","volume":"88","author":"G Nan","year":"2015","unstructured":"Nan G, Zang C, Dou R, Li M (2015) Pricing and resource allocation for multimedia social network in cloud environments. Knowl Based Syst 88:1\u201311. https:\/\/doi.org\/10.1016\/j.knosys.2015.08.017","journal-title":"Knowl Based Syst"},{"issue":"1","key":"1833_CR71","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser GL, Wolsey LA, Fisher ML (1978) An analysis of approximations for maximizing submodular set functions-I. Math Program 14(1):265\u2013294. https:\/\/doi.org\/10.1007\/BF01588971","journal-title":"Math Program"},{"key":"1833_CR72","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1016\/j.asoc.2016.04.025","volume":"56","author":"Y Ni","year":"2017","unstructured":"Ni Y (2017) Sequential seeding to optimize influence diffusion in a social network. Appl Soft Comput 56:730\u2013737. https:\/\/doi.org\/10.1016\/j.asoc.2016.04.025","journal-title":"Appl Soft Comput"},{"key":"1833_CR73","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.physa.2016.09.010","volume":"467","author":"FM Ruziska","year":"2017","unstructured":"Ruziska FM, Tom\u00e9 T, de Oliveira MJ (2017) Susceptible-infected-recovered model with recurrent infection. Phys A Stat Mech Appl 467:21\u201329. https:\/\/doi.org\/10.1016\/j.physa.2016.09.010","journal-title":"Phys A Stat Mech Appl"},{"key":"1833_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102331","volume":"60","author":"JR Saura","year":"2021","unstructured":"Saura JR, Ribeiro-Soriano D, Palacios-Marqu\u00e9s D (2021) From user-generated data to data-driven innovation: a research agenda to understand user privacy in digital markets. Int J Inf Manag 60:102331. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2021.102331","journal-title":"Int J Inf Manag"},{"key":"1833_CR75","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.07.004","volume":"187","author":"J Tang","year":"2020","unstructured":"Tang J, Zhang R, Wang P, Zhao Z, Fan L, Liu X (2020) A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowl Based Syst 187:104833. https:\/\/doi.org\/10.1016\/j.knosys.2019.07.004","journal-title":"Knowl Based Syst"},{"key":"1833_CR76","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.knosys.2018.06.013","volume":"160","author":"J Tang","year":"2018","unstructured":"Tang J, Zhang R, Yao Y, Zhao Z, Wang P, Li H, Yuan J (2018) Maximizing the spread of influence via the collective intelligence of discrete bat algorithm. Knowl Based Syst 160:88\u2013103. https:\/\/doi.org\/10.1016\/j.knosys.2018.06.013","journal-title":"Knowl Based Syst"},{"key":"1833_CR77","doi-asserted-by":"publisher","unstructured":"Tang J, Zhu Y, Tang X, Han K (2022) Distributed influence maximization for large-scale online social networks. In: 2022 IEEE 38th international conference on data engineering (ICDE), pp 81\u201395. https:\/\/doi.org\/10.1109\/ICDE53745.2022.00011","DOI":"10.1109\/ICDE53745.2022.00011"},{"key":"1833_CR78","doi-asserted-by":"publisher","unstructured":"Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: a martingale approach. In: Proceedings of the 2015 ACM SIGMOD international conference on management of data, SIGMOD \u201915. Association for Computing Machinery, New York, NY, USA, pp 1539\u20131554. https:\/\/doi.org\/10.1145\/2723372.2723734","DOI":"10.1145\/2723372.2723734"},{"key":"1833_CR79","doi-asserted-by":"publisher","unstructured":"Tang Y, Xiao X, Shi Y (2014) Influence maximization: Near-optimal time complexity meets practical efficiency. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data, SIGMOD \u201914. Association for Computing Machinery, New York, NY, USA, pp 75\u201386. https:\/\/doi.org\/10.1145\/2588555.2593670","DOI":"10.1145\/2588555.2593670"},{"issue":"2","key":"1833_CR80","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/2812802","volume":"59","author":"B Thomee","year":"2016","unstructured":"Thomee B, Shamma DA, Friedland G, Elizalde B, Ni K, Poland D, Borth D, Li LJ (2016) Yfcc100m: the new data in multimedia research. Commun ACM 59(2):64\u201373","journal-title":"Commun ACM"},{"key":"1833_CR81","unstructured":"Vaswani S, Lakshmanan L, Schmidt M et\u00a0al (2015) Influence maximization with bandits. arXiv:1503.00024"},{"key":"1833_CR82","volume-title":"Approximation algorithms","author":"VV Vazirani","year":"2013","unstructured":"Vazirani VV (2013) Approximation algorithms. Springer, Berlin"},{"key":"1833_CR83","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106354","volume":"109","author":"Z Wang","year":"2020","unstructured":"Wang Z, Liu H, Liu W, Wang S (2020) Understanding the power of opinion leaders\u2019 influence on the diffusion process of popular mobile games: travel frog on sina weibo. Comput Hum Behav 109:106354. https:\/\/doi.org\/10.1016\/j.chb.2020.106354","journal-title":"Comput Hum Behav"},{"key":"1833_CR84","volume-title":"The influentials: people who influence people","author":"G Weimann","year":"1994","unstructured":"Weimann G (1994) The influentials: people who influence people. SUNY Press, Albany"},{"key":"1833_CR85","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813658","volume-title":"Probability with martingales","author":"D Williams","year":"1991","unstructured":"Williams D (1991) Probability with martingales. Cambridge University Press, Cambridge"},{"key":"1833_CR86","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115899","volume":"187","author":"Z Xu","year":"2022","unstructured":"Xu Z, Dang Y, Wang Q (2022) Potential buyer identification and purchase likelihood quantification by mining user-generated content on social media. Expert Syst Appl 187:115899. https:\/\/doi.org\/10.1016\/j.eswa.2021.115899","journal-title":"Expert Syst Appl"},{"issue":"2","key":"1833_CR87","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/s10115-018-1290-y","volume":"61","author":"J Yang","year":"2019","unstructured":"Yang J, Zhang Y, Zhang W, Lin X (2019) Cost optimization based on influence and user preference. Knowl Inf Syst 61(2):695\u2013732. https:\/\/doi.org\/10.1007\/s10115-018-1290-y","journal-title":"Knowl Inf Syst"},{"key":"1833_CR88","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.04.021","volume":"108","author":"CH Yu","year":"2020","unstructured":"Yu CH, Tsai CC, Wang Y, Lai KK, Tajvidi M (2020) Towards building a value co-creation circle in social commerce. Comput Hum Behav 108:105476. https:\/\/doi.org\/10.1016\/j.chb.2018.04.021","journal-title":"Comput Hum Behav"},{"issue":"3","key":"1833_CR89","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103200","volume":"57","author":"H Zhang","year":"2020","unstructured":"Zhang H, Gupta S, Sun W, Zou Y (2020) How social-media-enabled co-creation between customers and the firm drives business value? The perspective of organizational learning and social capital. Inf Manag 57(3):103200. https:\/\/doi.org\/10.1016\/j.im.2019.103200","journal-title":"Inf Manag"},{"issue":"1","key":"1833_CR90","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102762","volume":"59","author":"H Zhang","year":"2022","unstructured":"Zhang H, Zang Z, Zhu H, Uddin MI, Amin MA (2022) Big data-assisted social media analytics for business model for business decision making system competitive analysis. Inf Process Manag 59(1):102762. https:\/\/doi.org\/10.1016\/j.ipm.2021.102762","journal-title":"Inf Process Manag"},{"key":"1833_CR91","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2020.100145","volume":"21","author":"J Zhang","year":"2020","unstructured":"Zhang J, Wang W, Xia F, Lin YR, Tong H (2020) Data-driven computational social science: a survey. Big Data Res 21:100145. https:\/\/doi.org\/10.1016\/j.bdr.2020.100145","journal-title":"Big Data Res"},{"issue":"11","key":"1833_CR92","doi-asserted-by":"publisher","first-page":"2762","DOI":"10.1109\/TMM.2019.2912124","volume":"21","author":"J Zhang","year":"2019","unstructured":"Zhang J, Yang Y, Zhuo L, Tian Q, Liang X (2019) Personalized recommendation of social images by constructing a user interest tree with deep features and tag trees. IEEE Trans Multimed 21(11):2762\u20132775. https:\/\/doi.org\/10.1109\/TMM.2019.2912124","journal-title":"IEEE Trans Multimed"},{"issue":"4","key":"1833_CR93","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/TBDATA.2017.2657623","volume":"5","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Sun R, Wang X, Zhao C (2019) A situational analytic method for user behavior pattern in multimedia social networks. IEEE Trans Big Data 5(4):520\u2013528. https:\/\/doi.org\/10.1109\/TBDATA.2017.2657623","journal-title":"IEEE Trans Big Data"},{"key":"1833_CR94","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.ins.2019.04.009","volume":"491","author":"W Zheng","year":"2019","unstructured":"Zheng W, Pan H, Sun C (2019) A friendship-based altruistic incentive knowledge diffusion model in social networks. Inf Sci 491:138\u2013150. https:\/\/doi.org\/10.1016\/j.ins.2019.04.009","journal-title":"Inf Sci"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01833-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-023-01833-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01833-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T10:18:28Z","timestamp":1680689908000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-023-01833-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,24]]},"references-count":94,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["1833"],"URL":"https:\/\/doi.org\/10.1007\/s10115-023-01833-6","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,24]]},"assertion":[{"value":"14 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}