{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T04:11:16Z","timestamp":1769832676313,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T00:00:00Z","timestamp":1434067200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10796-015-9568-z","type":"journal-article","created":{"date-parts":[[2015,6,11]],"date-time":"2015-06-11T12:47:51Z","timestamp":1434026871000},"page":"997-1005","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013"],"prefix":"10.1007","volume":"17","author":[{"given":"Jaeung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Manish","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"H. R.","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,12]]},"reference":[{"key":"9568_CR1","unstructured":"Ada, S., Rao, H. R., & Sharman, R. (2010). Online Social Networking Site (SNS) Use at the Campus Emergencies. Paper presented at the ICIS."},{"key":"9568_CR2","unstructured":"Allport, G. W., & Postman, L. (1947). The psychology of rumor. New York: Holt, Rinehart, & Wilson."},{"key":"9568_CR3","doi-asserted-by":"crossref","unstructured":"Cha, M., Mislove, A., & Gummadi, K. P. (2009). A measurement-driven analysis of information propagation in the flickr social network. Paper presented at the Proceedings of the 18th international conference on World wide web.","DOI":"10.1145\/1526709.1526806"},{"key":"9568_CR4","doi-asserted-by":"crossref","unstructured":"Chen, R., Rao, H. R., Sharman, R., Upadhyaya, S. J., & Kim, J. (2010). An empirical examination of it-enabled emergency response: the cases of hurricane Katrina and hurricane Rita. Communications of the Association for Information Systems, 26(8), 141\u2013156.","DOI":"10.17705\/1CAIS.02608"},{"key":"9568_CR5","unstructured":"DHS. (2014). Unclassified summary of information handling and sharing prior to the April 15, 2013 Boston Marathon Bombings."},{"issue":"6","key":"9568_CR6","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/2184319.2184338","volume":"55","author":"B Doerr","year":"2012","unstructured":"Doerr, B., Fouz, M., & Friedrich, T. (2012). Why rumors spread so quickly in social networks. Communications of the ACM, 55(6), 70\u201375.","journal-title":"Communications of the ACM"},{"key":"9568_CR7","unstructured":"Hansen, L. K., Arvidsson, A., Nielsen, F. \u00c5., Colleoni, E., & Etter, M. (2011). Good friends, bad news-affect and virality in twitter Future information technology (pp. 34\u201343): Berlin Heidelberg: Springer."},{"issue":"6","key":"9568_CR8","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1002\/cb.383","volume":"10","author":"CG Harvey","year":"2011","unstructured":"Harvey, C. G., Stewart, D. B., & Ewing, M. T. (2011). Forward or delete: What drives peer\u2010to\u2010peer message propagation across social networks? Journal of Consumer Behaviour, 10(6), 365\u2013372.","journal-title":"Journal of Consumer Behaviour"},{"key":"9568_CR9","doi-asserted-by":"crossref","unstructured":"Hausman, J. (1978). Specification tests in econometrics. Econometrica, 46(6), 1251\u20131271.","DOI":"10.2307\/1913827"},{"key":"9568_CR10","unstructured":"Hovav, A., Patnayakuni, R., & Schuff, D. (2001). Internet technology diffusion: Adoption of IPV6. Paper presented at the ECIS."},{"key":"9568_CR11","doi-asserted-by":"crossref","unstructured":"Jabr, W., & Zheng, E. (2014). Know yourself and know your enemy: An analysis of firm recommendations and consumer reviews in a competitive environment. Mis Quarterly, 38(3), 635\u2013654.","DOI":"10.25300\/MISQ\/2014\/38.3.01"},{"issue":"4","key":"9568_CR12","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1108\/00197850110395245","volume":"33","author":"D Johnson","year":"2001","unstructured":"Johnson, D. (2001). What is innovation and entrepreneurship? Lessons for larger organisations. Industrial and Commercial Training, 33(4), 135\u2013140.","journal-title":"Industrial and Commercial Training"},{"key":"9568_CR13","unstructured":"Kulakowski, K. (2013, April 20). Debunking rumors surrounding boston bombing, Infinity News Network. Retrieved from http:\/\/infinitynewsnetwork.com\/2013\/04\/20\/debunking-rumors-surrounding-boston-bombing\/ ."},{"issue":"4","key":"9568_CR14","doi-asserted-by":"crossref","first-page":"212","DOI":"10.17705\/1thci.00047","volume":"4","author":"KH Kwon","year":"2012","unstructured":"Kwon, K. H., Oh, O., Agrawal, M., & Rao, H. R. (2012). Audience gatekeeping in the twitter service: an investigation of tweets about the 2009 gaza conflict. AIS Transactions on Human-Computer Interaction, 4(4), 212\u2013229.","journal-title":"AIS Transactions on Human-Computer Interaction"},{"issue":"4","key":"9568_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2010.tb00300.x","volume":"42","author":"J Li","year":"2010","unstructured":"Li, J., & Rao, H. (2010). Twitter as a rapid response news service: an exploration in the context of the 2008 China earthquake. The Electronic Journal of Information Systems in Developing Countries, 42(4), 1\u201322.","journal-title":"The Electronic Journal of Information Systems in Developing Countries"},{"issue":"1","key":"9568_CR16","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/2500881","volume":"57","author":"J Li","year":"2014","unstructured":"Li, J., Vishwanath, A., & Rao, H. R. (2014). Retweeting the Fukushima nuclear radiation disaster. Communications of the ACM, 57(1), 78\u201385.","journal-title":"Communications of the ACM"},{"key":"9568_CR17","unstructured":"Merriam-Webster.com. (2015). Rumor. Retrieved January 27, 2015, from http:\/\/www.merriam-webster.com\/dictionary\/rumor ."},{"issue":"2","key":"9568_CR18","doi-asserted-by":"crossref","first-page":"407","DOI":"10.25300\/MISQ\/2013\/37.2.05","volume":"37","author":"O Oh","year":"2013","unstructured":"Oh, O., Agrawal, M., & Rao, H. R. (2013). Community intelligence and social media services: a rumor theoretic analysis of tweets during social crises. MIS Quarterly, 37(2), 407\u2013426.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9568_CR19","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1023\/A:1007521427059","volume":"16","author":"DW Osgood","year":"2000","unstructured":"Osgood, D. W. (2000). Poisson-based regression analysis of aggregate crime rates. Journal of Quantitative Criminology, 16(1), 21\u201343.","journal-title":"Journal of Quantitative Criminology"},{"key":"9568_CR20","unstructured":"oxforddictionaries.com. (2015). Rumor. Retrieved January 27, 2015, from http:\/\/www.oxforddictionaries.com\/us\/definition\/american_english\/rumor?searchDictCode=all ."},{"issue":"1","key":"9568_CR21","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1111\/j.1745-9125.1997.tb00870.x","volume":"35","author":"R Paternoster","year":"1997","unstructured":"Paternoster, R., & Brame, R. (1997). Multiple routes to delinquency? A test of developmental and general theories of crime. Criminology, 35(1), 49\u201384.","journal-title":"Criminology"},{"key":"9568_CR22","unstructured":"Petrovic, S., Osborne, M., & Lavrenko, V. (2011). RT to Win! Predicting message propagation in twitter. Paper presented at the ICWSM."},{"key":"9568_CR23","unstructured":"Piddock, C. (2014). Anatomy of a terrorist attack:The boston marathon bombing. Homeland security surverillance, detection, prevention & protection, 24\u201333."},{"key":"9568_CR24","volume-title":"Diffusion of innovations","author":"E Rogers","year":"1962","unstructured":"Rogers, E. (1962). Diffusion of innovations (1st ed.). New York: Free Press.","edition":"1"},{"key":"9568_CR25","doi-asserted-by":"crossref","unstructured":"Romero, D. M., Meeder, B., & Kleinberg, J. (2011). Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. Paper presented at the Proceedings of the 20th international conference on World wide web.","DOI":"10.1145\/1963405.1963503"},{"key":"9568_CR26","unstructured":"Starbird, K., Maddock, J., Orand, M., & Mason, R. M. (2014). Rumors, false flags, and digital vigilantes: misinformation on twitter after the 2013 Boston Marathon bombing. iConference."},{"key":"9568_CR27","doi-asserted-by":"crossref","unstructured":"Suh, B., Hong, L., Pirolli, P., & Chi, E. H. (2010). Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. Paper presented at the Social computing (socialcom), 2010 ieee second international conference on.","DOI":"10.1109\/SocialCom.2010.33"},{"issue":"1","key":"9568_CR28","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1177\/875647939000600106","volume":"6","author":"R Taylor","year":"1990","unstructured":"Taylor, R. (1990). Interpretation of the correlation coefficient: a basic review. Journal of Diagnostic Medical Sonography, 6(1), 35\u201339.","journal-title":"Journal of Diagnostic Medical Sonography"},{"key":"9568_CR29","unstructured":"Twitter. (2013). Using hashtags on Twitter. Retrieved January 28, 2015, from https:\/\/support.twitter.com\/ ."},{"key":"9568_CR30","doi-asserted-by":"crossref","unstructured":"Yang, L., Sun, T., Zhang, M., & Mei, Q. (2012). We know what@ you# tag: does the dual role affect hashtag adoption? Paper presented at the Proceedings of the 21st international conference on World Wide Web.","DOI":"10.1145\/2187836.2187872"},{"key":"9568_CR31","unstructured":"Ye, S., & Wu, S. F. (2010). Measuring message propagation and social influence on Twitter. com: Springer."},{"key":"9568_CR32","unstructured":"Zaman, T. R., Herbrich, R., Van Gael, J., & Stern, D. (2010). Predicting information spreading in twitter. Paper presented at the Workshop on computational social science and the wisdom of crowds, nips."},{"key":"9568_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Bandari, R., Kong, J., Qian, H., & Roychowdhury, V. (2010). Information resonance on twitter: watching iran. Paper presented at the Proceedings of the First Workshop on Social Media Analytics.","DOI":"10.1145\/1964858.1964875"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-015-9568-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-015-9568-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-015-9568-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T18:04:43Z","timestamp":1566842683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-015-9568-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,12]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["9568"],"URL":"https:\/\/doi.org\/10.1007\/s10796-015-9568-z","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,12]]}}}