{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T20:40:30Z","timestamp":1722026430402},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T00:00:00Z","timestamp":1585267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T00:00:00Z","timestamp":1585267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s10588-020-09309-6","type":"journal-article","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T18:03:06Z","timestamp":1585332186000},"page":"195-230","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Extent prediction of the information and influence propagation in online social networks"],"prefix":"10.1007","volume":"27","author":[{"given":"Ra\u00fal M.","family":"Ortiz-Gaona","sequence":"first","affiliation":[]},{"given":"Marcos","family":"Postigo-Boix","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 L.","family":"Mel\u00fas-Moreno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,27]]},"reference":[{"key":"9309_CR1","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/s10588-013-9156-z","volume":"19","author":"SMA Abbas","year":"2013","unstructured":"Abbas SMA (2013) An agent-based model of the development of friendship links within Facebook. Comput Math Org Theory 19:232\u2013252. https:\/\/doi.org\/10.1007\/s10588-013-9156-z","journal-title":"Comput Math Org Theory"},{"key":"9309_CR2","first-page":"26","volume":"5","author":"A Afrasiabi Rad","year":"2012","unstructured":"Afrasiabi Rad A, Benyoucef M (2012) Measuring propagation in online social networks: the case of youtube. J Inf Syst Appl Res 5:26","journal-title":"J Inf Syst Appl Res"},{"key":"9309_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5120\/ijca2017915407","volume":"174","author":"S Ahmed","year":"2017","unstructured":"Ahmed S, Kabir A, Sharmin S, Jafrin S (2017) Cyber-crimes against womenfolk on social networks: Bangladesh context. IJCA 174:9\u201315. https:\/\/doi.org\/10.5120\/ijca2017915407","journal-title":"IJCA"},{"key":"9309_CR4","volume-title":"Fundamentals of electric circuits","author":"CK Alexander","year":"2017","unstructured":"Alexander CK, Sadiku MNO (2017) Fundamentals of electric circuits, 6th edn. McGraw-hill Education, New York","edition":"6"},{"key":"9309_CR5","first-page":"1","volume-title":"Social networks and surveillance for society","author":"M Apte","year":"2019","unstructured":"Apte M, Palshikar GK, Baskaran S (2019) Frauds in online social networks: a review. In: \u00d6zyer T, Bakshi S, Alhajj R (eds) Social networks and surveillance for society. Springer, Cham, pp 1\u201318"},{"key":"9309_CR6","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/s10588-015-9181-1","volume":"21","author":"DL Arendt","year":"2015","unstructured":"Arendt DL, Blaha LM (2015) Opinions, influence, and zealotry: a computational study on stubbornness. Comput Math Organ Theory 21:184\u2013209. https:\/\/doi.org\/10.1007\/s10588-015-9181-1","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR7","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/s10588-018-09286-x","volume":"25","author":"M Babcock","year":"2019","unstructured":"Babcock M, Cox RAV, Kumar S (2019) Diffusion of pro- and anti-false information tweets: the Black Panther movie case. Comput Math Organ Theory 25:72\u201384. https:\/\/doi.org\/10.1007\/s10588-018-09286-x","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09288-9","author":"KK Bandeli","year":"2018","unstructured":"Bandeli KK, Agarwal N (2018a) Analyzing the role of media orchestration in conducting disinformation campaigns on blogs. Comput Math Org Theory. https:\/\/doi.org\/10.1007\/s10588-018-09288-9","journal-title":"Comput Math Org Theory"},{"key":"9309_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09288-9","author":"KK Bandeli","year":"2018","unstructured":"Bandeli KK, Agarwal N (2018b) Analyzing the role of media orchestration in conducting disinformation campaigns on blogs. Comput Math Organ Theory. https:\/\/doi.org\/10.1007\/s10588-018-09288-9","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.11114\/ijsss.v3i3.729","volume":"3","author":"A Bekiari","year":"2015","unstructured":"Bekiari A, Hassanagas N (2015) Verbal aggressiveness exploration through complete social network analysis: using physical education students\u2019 class as an illustration. Int J Soc Sci Stud 3:30","journal-title":"Int J Soc Sci Stud"},{"key":"9309_CR11","doi-asserted-by":"crossref","unstructured":"Benevenuto F, Rodrigues T, Almeida V, et al (2008) Identifying video spammers in online social networks. In: Proceedings of the 4th international workshop on Adversarial information retrieval on the web - AIRWeb\u201908. ACM Press, Beijing, p 45","DOI":"10.1145\/1451983.1451996"},{"key":"9309_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1017\/asb.2013.11","volume":"43","author":"E Bolthausen","year":"2013","unstructured":"Bolthausen E, W\u00fcthrich MV (2013) Bernoulli\u2019s law of large numbers. ASTIN Bull J IAA 43:73\u201379","journal-title":"ASTIN Bull J IAA"},{"key":"9309_CR13","doi-asserted-by":"crossref","unstructured":"Brandes U, Fleischer D (2005) Centrality measures based on current flow. In: Annual symposium on theoretical aspects of computer science. Springer, Berlin, pp 533\u2013544","DOI":"10.1007\/978-3-540-31856-9_44"},{"key":"9309_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-019-09297-2","author":"DA Broniatowski","year":"2019","unstructured":"Broniatowski DA, Reyna VF (2019) To illuminate and motivate: a fuzzy-trace model of the spread of information online. Comput Math Organ Theory. https:\/\/doi.org\/10.1007\/s10588-019-09297-2","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR15","doi-asserted-by":"crossref","unstructured":"Bulumulla C, Chan J, Padgham L (2018) Enhancing diffusion models by embedding cognitive reasoning. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 744\u2013749","DOI":"10.1109\/ASONAM.2018.8508548"},{"key":"9309_CR16","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-319-93372-6_42","volume-title":"Social, cultural, and behavioral modeling","author":"KM Carley","year":"2018","unstructured":"Carley KM, Cervone G, Agarwal N, Liu H (2018) Social cyber-security. In: Thomson R, Dancy C, Hyder A, Bisgin H (eds) Social, cultural, and behavioral modeling. Springer, Berlin, pp 389\u2013394"},{"key":"9309_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00527ED1V01Y201308DTM037","volume":"5","author":"W Chen","year":"2013","unstructured":"Chen W, Lakshmanan LVS, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5:1\u2013177. https:\/\/doi.org\/10.2200\/S00527ED1V01Y201308DTM037","journal-title":"Synth Lect Data Manag"},{"key":"9309_CR18","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.jnca.2017.12.003","volume":"103","author":"L Cui","year":"2018","unstructured":"Cui L, Hu H, Yu S et al (2018) DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. J Netw Comput Appl 103:119\u2013130","journal-title":"J Netw Comput Appl"},{"key":"9309_CR19","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-319-95162-1_7","volume-title":"Computational science and its applications: ICCSA 2018","author":"AR da Silva","year":"2018","unstructured":"da Silva AR, Rodrigues RF, da Fonseca Vieira V, Xavier CR (2018) Influence maximization in network by genetic algorithm on linear threshold model. In: Gervasi O, Murgante B, Misra S, et al. (eds) Computational science and its applications: ICCSA 2018. Springer, Berlin, pp 96\u2013109"},{"key":"9309_CR20","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.knosys.2012.01.007","volume":"30","author":"P De Meo","year":"2012","unstructured":"De Meo P, Ferrara E, Fiumara G, Ricciardello A (2012) A novel measure of edge centrality in social networks. Knowl-Based Syst 30:136\u2013150","journal-title":"Knowl-Based Syst"},{"key":"9309_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0025-5564(02)00122-0","volume":"180","author":"K Dietz","year":"2002","unstructured":"Dietz K, Heesterbeek JAP (2002) Daniel Bernoulli\u2019s epidemiological model revisited. Math Biosci 180:1\u201321","journal-title":"Math Biosci"},{"key":"9309_CR22","unstructured":"Duong-Ba TH (2014) Resource allocation optimization in large scale distributed systems. Dissertation, Oregon State University"},{"key":"9309_CR23","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.physa.2010.09.034","volume":"390","author":"W Fan","year":"2011","unstructured":"Fan W, Yeung KH (2011) Online social networks: paradise of computer viruses. Phys A 390:189\u2013197. https:\/\/doi.org\/10.1016\/j.physa.2010.09.034","journal-title":"Phys A"},{"key":"9309_CR24","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10107-018-1288-y","volume":"170","author":"M Fischetti","year":"2018","unstructured":"Fischetti M, Kahr M, Leitner M et al (2018) Least cost influence propagation in (social) networks. Math Program 170:293\u2013325","journal-title":"Math Program"},{"key":"9309_CR25","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10588-017-9253-5","volume":"24","author":"A Fonseca","year":"2018","unstructured":"Fonseca A, Lou\u00e7\u00e3 J (2018) Explaining the emergence of online popularity through a model of information diffusion. Comput Math Organ Theory 24:169\u2013187. https:\/\/doi.org\/10.1007\/s10588-017-9253-5","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR26","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s10588-016-9229-x","volume":"23","author":"TL Frantz","year":"2017","unstructured":"Frantz TL, Carley KM (2017) Reporting a network\u2019s most-central actor with a confidence level. Comput Math Organ Theory 23:301\u2013312. https:\/\/doi.org\/10.1007\/s10588-016-9229-x","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR27","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan M, Newman MEJ (2002) Community structure in social and biological networks. PNAS 99:7821\u20137826. https:\/\/doi.org\/10.1073\/pnas.122653799","journal-title":"PNAS"},{"key":"9309_CR28","unstructured":"Golbeck J (2013) Analyzing the Social Web. Newnes"},{"key":"9309_CR29","unstructured":"Gonz\u00e1lez T, Santiago (2018) Running scrapper. In: Gist. https:\/\/gist.github.com\/santteegt\/2e70fe88b67ce52842ec451bd53ac4d2. Accessed 20 Mar 2019"},{"key":"9309_CR30","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter MS (1973) The strength of weak ties. Am J Sociol 78:1360\u20131380","journal-title":"Am J Sociol"},{"key":"9309_CR31","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/2503792.2503797","volume":"42","author":"A Guille","year":"2013","unstructured":"Guille A, Hacid H, Favre C, Zighed DA (2013) Information diffusion in online social networks: a survey. ACM Sigmod Record 42:17\u201328","journal-title":"ACM Sigmod Record"},{"key":"9309_CR32","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s11576-006-0058-2","volume":"48","author":"O Hein","year":"2006","unstructured":"Hein O, Schwind M, K\u00f6nig W (2006) Scale-free networks. Wirtschaftsinformatik 48:267\u2013275","journal-title":"Wirtschaftsinformatik"},{"key":"9309_CR33","unstructured":"Ishengoma FR (2013) Online social networks and terrorism 2.0 in developing countries. 12"},{"key":"9309_CR34","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/s10588-018-9268-6","volume":"24","author":"S Ito","year":"2018","unstructured":"Ito S, Vym\u011btal D, \u0160perka R, Hala\u0161ka M (2018) Process mining of a multi-agent business simulator. Comput Math Organ Theory 24:500\u2013531. https:\/\/doi.org\/10.1007\/s10588-018-9268-6","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR35","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin L, Chen Y, Wang T et al (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51:144\u2013150","journal-title":"IEEE Commun Mag"},{"key":"9309_CR36","doi-asserted-by":"crossref","unstructured":"Kao H-T, Yan S, Huang D, et al (2019) Understanding cyberbullying on Instagram and Ask.Fm via social role detection. In: Companion proceedings of the 2019 World Wide Web Conference. ACM, New York, pp 183\u2013188","DOI":"10.1145\/3308560.3316505"},{"key":"9309_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.osnem.2017.09.001","volume":"3\u20134","author":"I Kayes","year":"2017","unstructured":"Kayes I, Iamnitchi A (2017) Privacy and security in online social networks: a survey. Online Social Netw Media 3\u20134:1\u201321. https:\/\/doi.org\/10.1016\/j.osnem.2017.09.001","journal-title":"Online Social Netw Media"},{"key":"9309_CR38","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"9309_CR39","unstructured":"Kosorukoff A, Passmore DL (2011) Social network analysis: theory and applications"},{"key":"9309_CR40","doi-asserted-by":"crossref","unstructured":"Lee C, Sung C, Ma H, Huang J (2019) IDR: positive influence maximization and negative influence minimization under competitive linear threshold model. In: 2019 20th IEEE international conference on mobile data management (MDM), pp 501\u2013506","DOI":"10.1109\/MDM.2019.00013"},{"key":"9309_CR41","first-page":"431","volume":"2","author":"L Li","year":"2005","unstructured":"Li L, Alderson D, Doyle JC, Willinger W (2005) Towards a theory of scale-free graphs: definition, properties, and implications. Int Math 2:431\u2013523","journal-title":"Int Math"},{"key":"9309_CR42","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s41109-019-0134-3","volume":"4","author":"L Luceri","year":"2019","unstructured":"Luceri L, Braun T, Giordano S (2019) Analyzing and inferring human real-life behavior through online social networks with social influence deep learning. Appl Netw Sci 4:34. https:\/\/doi.org\/10.1007\/s41109-019-0134-3","journal-title":"Appl Netw Sci"},{"key":"9309_CR43","doi-asserted-by":"publisher","first-page":"4228","DOI":"10.1109\/TSP.2016.2558168","volume":"64","author":"W Luo","year":"2016","unstructured":"Luo W, Tay WP, Leng M (2016) Infection spreading and source identification: a hide and seek game. IEEE Trans Signal Process 64:4228\u20134243. https:\/\/doi.org\/10.1109\/TSP.2016.2558168","journal-title":"IEEE Trans Signal Process"},{"key":"9309_CR44","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-981-13-1742-2_24","volume-title":"Information and communication technology for intelligent systems","author":"P Mareswara Rao","year":"2019","unstructured":"Mareswara Rao P, Rajashekara Rao K (2019) Extended security model over data communication in online social networks. In: Satapathy SC, Joshi A (eds) Information and communication technology for intelligent systems. Springer, Singapore, pp 239\u2013249"},{"key":"9309_CR45","unstructured":"Masayuki Y, Penn JD, Konidaris G, Patera AT (2013) Math, numerics, & programming (for mechanical engineers)\u2014Buscar con Google. https:\/\/ocw.mit.edu\/ans7870\/2\/2.086\/S13\/MIT2_086S13_Textbook.pdf. Accessed 20 Mar 2019"},{"key":"9309_CR46","doi-asserted-by":"crossref","unstructured":"Mathew B, Dutt R, Goyal P, Mukherjee A (2019) Spread of hate speech in online social media. In: Proceedings of the 10th ACM conference on web science\u2014WebSci \u201919. ACM Press, Boston, pp 173\u2013182","DOI":"10.1145\/3292522.3326034"},{"key":"9309_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-9267-7","author":"F Maturo","year":"2018","unstructured":"Maturo F, Migliori S, Paolone F (2018) Measuring and monitoring diversity in organizations through functional instruments with an application to ethnic workforce diversity of the U.S. Federal Agencies. Comput Math Organ Theory. https:\/\/doi.org\/10.1007\/s10588-018-9267-7","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR48","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: homophily in social networks. Annu Rev Sociol 27:415\u2013444. https:\/\/doi.org\/10.1146\/annurev.soc.27.1.415","journal-title":"Annu Rev Sociol"},{"key":"9309_CR49","doi-asserted-by":"crossref","unstructured":"Michalski R (2015) Linear threshold model in temporal networks: seed selection for social influence. In: 2015 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 922\u2013923","DOI":"10.1145\/2808797.2809346"},{"key":"9309_CR50","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/s10588-017-9260-6","volume":"24","author":"H Mondani","year":"2018","unstructured":"Mondani H (2018) The underlying geometry of organizational dynamics: similarity-based social space and labor flow network communities. Comput Math Organ Theory 24:378\u2013400. https:\/\/doi.org\/10.1007\/s10588-017-9260-6","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR51","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s10588-011-9085-7","volume":"17","author":"D Mungovan","year":"2011","unstructured":"Mungovan D, Howley E, Duggan J (2011) The influence of random interactions and decision heuristics on norm evolution in social networks. Comput Math Organ Theory 17:152\u2013178. https:\/\/doi.org\/10.1007\/s10588-011-9085-7","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR53","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s10588-013-9159-9","volume":"20","author":"N Nan","year":"2014","unstructured":"Nan N, Zmud R, Yetgin E (2014) A complex adaptive systems perspective of innovation diffusion: an integrated theory and validated virtual laboratory. Comput Math Organ Theory 20:52\u201388. https:\/\/doi.org\/10.1007\/s10588-013-9159-9","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR54","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: an introduction","author":"M Newman","year":"2010","unstructured":"Newman M (2010) Networks: an introduction. Oxford University Press, Oxford"},{"key":"9309_CR55","doi-asserted-by":"crossref","unstructured":"Nova FF, Rifat MDR, Saha P, et al (2019) Online sexual harassment over anonymous social media in Bangladesh. In: Proceedings of the tenth international conference on information and communication technologies and development\u2014ICTDX \u201919. ACM Press, Ahmedabad, pp 1\u201312","DOI":"10.1145\/3287098.3287107"},{"key":"9309_CR56","doi-asserted-by":"publisher","first-page":"5164","DOI":"10.3390\/su11195164","volume":"11","author":"J Paniagua","year":"2019","unstructured":"Paniagua J, Rivelles R, Sapena J (2019) Social determinants of success: social media. Corp Gover Revenue Sustain 11:5164. https:\/\/doi.org\/10.3390\/su11195164","journal-title":"Corp Gover Revenue Sustain"},{"key":"9309_CR57","unstructured":"Petr\u00f3czi A, Bazs\u00f3 F, Nepusz T (2006) Measuring tie-strength in virtual social networks"},{"key":"9309_CR58","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1002\/bltj.21575","volume":"17","author":"C Phadke","year":"2013","unstructured":"Phadke C, Uzunalioglu H, Mendiratta VB et al (2013) Prediction of subscriber churn using social network analysis. Bell Labs Tech J 17:63\u201376","journal-title":"Bell Labs Tech J"},{"key":"9309_CR59","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.amc.2009.03.023","volume":"213","author":"JRC Piqueira","year":"2009","unstructured":"Piqueira JRC, Araujo VO (2009) A modified epidemiological model for computer viruses. Appl Math Comput 213:355\u2013360. https:\/\/doi.org\/10.1016\/j.amc.2009.03.023","journal-title":"Appl Math Comput"},{"key":"9309_CR60","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.physa.2017.12.121","volume":"496","author":"M Postigo-Boix","year":"2018","unstructured":"Postigo-Boix M, Mel\u00fas-Moreno JL (2018) A social model based on customers\u2019 profiles for analyzing the churning process in the mobile market of data plans. Phys A 496:571\u2013592","journal-title":"Phys A"},{"key":"9309_CR61","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1111\/j.1475-6811.2010.01310.x","volume":"18","author":"SG Roberts","year":"2011","unstructured":"Roberts SG, Dunbar RI (2011) Communication in social networks: effects of kinship, network size, and emotional closeness. Pers Relat 18:439\u2013452","journal-title":"Pers Relat"},{"key":"9309_CR62","volume-title":"The political outcomes of unfriending: social network curation, network agreeability, and political participation","author":"C Robertson","year":"2019","unstructured":"Robertson C, Fernandez L, Shillair R (2019) The political outcomes of unfriending: social network curation, network agreeability, and political participation. Social Science Research Network, Rochester"},{"key":"9309_CR63","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ijpe.2014.09.003","volume":"159","author":"K Rong","year":"2015","unstructured":"Rong K, Hu G, Lin Y et al (2015) Understanding business ecosystem using a 6C framework in internet-of-things-based sectors. Int J Prod Econ 159:41\u201355","journal-title":"Int J Prod Econ"},{"key":"9309_CR65","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.omega.2015.06.014","volume":"59","author":"M Samadi","year":"2016","unstructured":"Samadi M, Nikolaev A, Nagi R (2016) A subjective evidence model for influence maximization in social networks. Omega 59:263\u2013278. https:\/\/doi.org\/10.1016\/j.omega.2015.06.014","journal-title":"Omega"},{"key":"9309_CR64","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.omega.2017.06.002","volume":"77","author":"M Samadi","year":"2018","unstructured":"Samadi M, Nagi R, Semenov A, Nikolaev A (2018) Seed activation scheduling for influence maximization in social networks. Omega 77:96\u2013114. https:\/\/doi.org\/10.1016\/j.omega.2017.06.002","journal-title":"Omega"},{"key":"9309_CR66","doi-asserted-by":"publisher","DOI":"10.4135\/9781529716597","volume-title":"Social network analysis","author":"J Scott","year":"2017","unstructured":"Scott J (2017) Social network analysis, 4th edn. SAGE Publications Ltd, Thousand Oaks","edition":"4"},{"key":"9309_CR81","unstructured":"Snap.py - SNAP for Python. https:\/\/snap.stanford.edu\/snappy\/. Accessed 20 Mar 2019"},{"key":"9309_CR82","unstructured":"SNAP: network datasets: Youtube social network. https:\/\/snap.stanford.edu\/data\/com-Youtube.html. Accessed 20 Mar 2019"},{"key":"9309_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds\/s13688-015-0056-y","volume":"4","author":"ZC Steinert-Threlkeld","year":"2015","unstructured":"Steinert-Threlkeld ZC, Mocanu D, Vespignani A, Fowler J (2015) Online social networks and offline protest. EPJ Data Sci 4:1\u20139. https:\/\/doi.org\/10.1140\/epjds\/s13688-015-0056-y","journal-title":"EPJ Data Sci"},{"key":"9309_CR52","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.future.2018.07.015","volume":"89","author":"N Sumith","year":"2018","unstructured":"Sumith N, Annappa B, Bhattacharya S (2018) Influence maximization in large social networks: heuristics, models and parameters. Fut Gener Comput Syst 89:777\u2013790. https:\/\/doi.org\/10.1016\/j.future.2018.07.015","journal-title":"Fut Gener Comput Syst"},{"key":"9309_CR68","unstructured":"Swaminathan A (2014) An algorithm for influence maximization and target set selection for the deterministic linear threshold model. Virginia Polytechnic Institute and State University"},{"key":"9309_CR69","doi-asserted-by":"crossref","unstructured":"Talukder A, Alam MGR, Tran NH, Hong CS (2018) A cost optimized reverse influence maximization in social networks. In: NOMS 2018: 2018 IEEE\/IFIP network operations and management symposium, pp 1\u20139","DOI":"10.1109\/NOMS.2018.8406245"},{"key":"9309_CR70","unstructured":"Teixeira AS, Monteiro PT, Carri\u00e7o JA, et al (2013) Spanning edge betweenness. In: Workshop on mining and learning with graphs, pp 27\u201331"},{"key":"9309_CR71","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s10588-014-9176-3","volume":"21","author":"S Uddin","year":"2015","unstructured":"Uddin S, Khan A, Hossain L et al (2015) A topological framework to explore longitudinal social networks. Comput Math Organ Theory 21:48\u201368. https:\/\/doi.org\/10.1007\/s10588-014-9176-3","journal-title":"Comput Math Organ Theory"},{"key":"9309_CR72","doi-asserted-by":"publisher","first-page":"5962","DOI":"10.1073\/pnas.1116502109","volume":"109","author":"J Ugander","year":"2012","unstructured":"Ugander J, Backstrom L, Marlow C, Kleinberg J (2012) Structural diversity in social contagion. Proc Natl Acad Sci 109:5962\u20135966. https:\/\/doi.org\/10.1073\/pnas.1116502109","journal-title":"Proc Natl Acad Sci"},{"key":"9309_CR73","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.cogsys.2019.07.004","volume":"58","author":"DK Vishwakarma","year":"2019","unstructured":"Vishwakarma DK, Varshney D, Yadav A (2019) Detection and veracity analysis of fake news via scrapping and authenticating the web search. Cogn Syst Res 58:217\u2013229. https:\/\/doi.org\/10.1016\/j.cogsys.2019.07.004","journal-title":"Cogn Syst Res"},{"key":"9309_CR74","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1016\/j.future.2017.05.050","volume":"86","author":"F Wang","year":"2018","unstructured":"Wang F, Jiang W, Li X, Wang G (2018) Maximizing positive influence spread in online social networks via fluid dynamics. Future Generation Computer Systems 86:1491\u20131502. https:\/\/doi.org\/10.1016\/j.future.2017.05.050","journal-title":"Future Generation Computer Systems"},{"key":"9309_CR75","doi-asserted-by":"crossref","unstructured":"Weng X, Liu Z, Li Z (2016) An efficient influence maximization algorithm considering both positive and negative relationships. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp 1931\u20131936","DOI":"10.1109\/TrustCom.2016.0295"},{"key":"9309_CR76","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1162\/NETN_a_00022","volume":"1","author":"JC Worrell","year":"2017","unstructured":"Worrell JC, Rumschlag J, Betzel RF et al (2017) Optimized connectome architecture for sensory-motor integration. Netw Neurosci 1:415\u2013430","journal-title":"Netw Neurosci"},{"key":"9309_CR77","volume-title":"Social network analysis: methods and examples","author":"S Yang","year":"2016","unstructured":"Yang S, Keller FB, Zheng L (2016) Social network analysis: methods and examples. SAGE Publications, Los Angeles"},{"key":"9309_CR78","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/s10588-015-9189-6","volume":"21","author":"Q Yun","year":"2015","unstructured":"Yun Q, Gloor PA (2015) The web mirrors value in the real world: comparing a firm\u2019s valuation with its web network position. Comput Math Org Theory 21:356\u2013379. https:\/\/doi.org\/10.1007\/s10588-015-9189-6","journal-title":"Comput Math Org Theory"},{"key":"9309_CR79","doi-asserted-by":"crossref","unstructured":"Zainudin NM, Merabti M, Llewellyn-Jones D (2011) Online social networks as supporting evidence: a digital forensic investigation model and its application design. In: 2011 international conference on research and innovation in information systems, pp 1\u20136","DOI":"10.1109\/ICRIIS.2011.6125728"},{"key":"9309_CR80","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.comcom.2015.07.013","volume":"73","author":"X Zuo","year":"2016","unstructured":"Zuo X, Blackburn J, Kourtellis N et al (2016) The power of indirect ties. Comput Commun 73:188\u2013199","journal-title":"Comput Commun"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-020-09309-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10588-020-09309-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-020-09309-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T07:31:01Z","timestamp":1623742261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10588-020-09309-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,27]]},"references-count":82,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["9309"],"URL":"https:\/\/doi.org\/10.1007\/s10588-020-09309-6","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,27]]},"assertion":[{"value":"27 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}