{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T08:07:10Z","timestamp":1758960430023,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,20]],"date-time":"2015-10-20T00:00:00Z","timestamp":1445299200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10799-015-0250-4","type":"journal-article","created":{"date-parts":[[2015,10,20]],"date-time":"2015-10-20T08:36:14Z","timestamp":1445330174000},"page":"95-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Efficient decision support for detecting content polluters on social networks: an approach based on automatic knowledge acquisition from behavioral patterns"],"prefix":"10.1007","volume":"17","author":[{"given":"Byung Joon","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1218-6888","authenticated-orcid":false,"given":"Jin Seop","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,20]]},"reference":[{"key":"250_CR1","unstructured":"Lee K, Eoff BD, Caverlee J (2011) Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings of international AAAI conference on weblogs and social media (ICWSM), pp 185\u2013192"},{"key":"250_CR2","unstructured":"Wang AH (2010) Don\u2019t follow me: spam detection in twitter. In: Proceedings of security and cryptography (SECRYPT), pp 1\u201310"},{"key":"250_CR3","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: Proceedings of the annual collaboration, electronic messaging, anti-abuse and spam conference (CEAS), vol 6, pp 12\u201320"},{"key":"250_CR4","doi-asserted-by":"crossref","unstructured":"Markines B, Cattuto C, Menczer F (2009) Social spam detection. In: Proceedings of AIRWeb, pp 41\u201348","DOI":"10.1145\/1531914.1531924"},{"issue":"2","key":"250_CR5","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s10799-012-0135-8","volume":"14","author":"N Dogan","year":"2013","unstructured":"Dogan N, Tanrikulu Z (2013) A comparative analysis of classification algorithms in data mining for accuracy, speed and robustness. Inf Technol Manag 14(2):105\u2013124","journal-title":"Inf Technol Manag"},{"issue":"2\u20133","key":"250_CR6","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10799-009-0059-0","volume":"10","author":"A Abbasi","year":"2009","unstructured":"Abbasi A, Chen H (2009) A comparison of fraud cues and classification methods for fake escrow website detection. Inf Technol Manag 10(2\u20133):83\u2013101","journal-title":"Inf Technol Manag"},{"issue":"1","key":"250_CR7","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s10799-013-0173-x","volume":"15","author":"A Omidvar","year":"2014","unstructured":"Omidvar A, Garakani M, Safarpour HR (2014) Context based user ranking in forums for expert finding using WordNet dictionary and social network analysis. Inf Technol Manag 15(1):51\u201363","journal-title":"Inf Technol Manag"},{"issue":"3","key":"250_CR8","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10799-013-0160-2","volume":"14","author":"L Fan","year":"2013","unstructured":"Fan L, Zhang Y, Dang Y, Chen H (2013) Analyzing sentiments in Web 2.0 social media data in Chinese: experiments on business and marketing related Chinese Web forums. Inf Technol Manag 14(3):231\u2013242","journal-title":"Inf Technol Manag"},{"key":"250_CR9","unstructured":"Algur SP, Pendari NT (2012) Hybrid spamicity score approach to web spam detection. Pattern Recognition, Informatics and Medical Engineering (PRIME), pp 36\u201340"},{"key":"250_CR10","unstructured":"Jia Z, Li W, Gao W, Xia Y (2012) Research on web spam detection base on support vector machine. Communication Systems and Network Technologies (CSNT), pp 517\u2013520"},{"key":"250_CR11","first-page":"688","volume":"42","author":"F Benevenuto","year":"2012","unstructured":"Benevenuto F, Rodrigues T, Veloso A, Almeida J, Goncalves M, Almeida V (2012) Practical detection of spammers and content promoters in online video sharing systems. Cybernetics 42:688\u2013701","journal-title":"Cybernetics"},{"key":"250_CR12","doi-asserted-by":"crossref","unstructured":"Bosma M, Meij E, Weerkamp W (2012) A framework for unsupervised spam detection in social networking sites. Advances in Information Retrieval, Lecture Notes in Computer Science, vol 7224, pp 364\u2013375","DOI":"10.1007\/978-3-642-28997-2_31"},{"key":"250_CR13","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MC.2011.222","volume":"44","author":"S Abu-Nimeh","year":"2011","unstructured":"Abu-Nimeh S, Chen TM, Alzubi O (2011) Malicious and spam posts in online social networks. IEEE Comput Soc 44:23\u201328","journal-title":"IEEE Comput Soc"},{"key":"250_CR14","doi-asserted-by":"crossref","unstructured":"Beck K (2011) Analyzing tweets to identify malicious messages. In: Proceedings of electro\/information technology (EIT) ieee international conference, pp 1\u20135","DOI":"10.1109\/EIT.2011.5978594"},{"key":"250_CR15","doi-asserted-by":"crossref","unstructured":"Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of annual computer security applications conference (ACSAC), pp 1\u20139","DOI":"10.1145\/1920261.1920263"},{"key":"250_CR16","unstructured":"Gao H, Chen Y, Lee K, Palsetia D, Choudhary A (2012) Towards online spam filtering in social networks. In: 19th network distributed system security (NDSS) symposium. http:\/\/www.internetsociety.org\/sites\/default\/files\/02_3.pdf"},{"key":"250_CR17","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume":"6961","author":"C Yang","year":"2011","unstructured":"Yang C, Harkreader RC, Gu G (2011) Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. Recent Advances in Intrusion Detection (RAID) 6961:318\u2013337","journal-title":"Recent Advances in Intrusion Detection (RAID)"},{"key":"250_CR18","doi-asserted-by":"crossref","unstructured":"Song J, Lee S, Kim J (2011) Spam filtering in twitter using sender-receiver relationship. Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol 6961, pp 301\u2013317","DOI":"10.1007\/978-3-642-23644-0_16"},{"key":"250_CR19","doi-asserted-by":"crossref","unstructured":"Han JS, Park BJ (2013) Efficient detection of content polluters in social networks. IT Convergence and Security 2012, Lecture Notes in Electrical Engineering, vol 215, pp 991\u2013996","DOI":"10.1007\/978-94-007-5860-5_119"},{"issue":"7","key":"250_CR20","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1161\/CIRCULATIONAHA.106.672402","volume":"115","author":"NR Cook","year":"2007","unstructured":"Cook NR (2007) Use and misuse of the receiver operating characteristic curve in risk prediction. Circulation 115(7):928\u2013935","journal-title":"Circulation"},{"key":"250_CR21","unstructured":"Frank E (2012). http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/downloading.html"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0250-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-015-0250-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0250-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:39:20Z","timestamp":1559248760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-015-0250-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,20]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["250"],"URL":"https:\/\/doi.org\/10.1007\/s10799-015-0250-4","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"type":"print","value":"1385-951X"},{"type":"electronic","value":"1573-7667"}],"subject":[],"published":{"date-parts":[[2015,10,20]]}}}