{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:15:24Z","timestamp":1760044524062,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T00:00:00Z","timestamp":1498694400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10799-017-0278-8","type":"journal-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T01:11:09Z","timestamp":1498698669000},"page":"121-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Factors dominating individual information disseminating behavior on social networking sites"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8554-2383","authenticated-orcid":false,"given":"Juan","family":"Shi","sequence":"first","affiliation":[]},{"given":"Kin Keung","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,29]]},"reference":[{"issue":"4","key":"278_CR1","doi-asserted-by":"crossref","first-page":"398","DOI":"10.2501\/S0021849907070419","volume":"47","author":"DT Allsop","year":"2007","unstructured":"Allsop DT, Bassett BR, Hoskins JA (2007) Word-of-mouth research: principles and applications. J Adv Res 47(4):398\u2013411","journal-title":"J Adv Res"},{"key":"278_CR2","doi-asserted-by":"crossref","unstructured":"Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone\u2019s an influencer: quantifying influence on twitter. In: Gesundheitceedings of the fourth ACM international conference on Web search Bakshy and data mining. ACM, pp 65\u201374","DOI":"10.1145\/1935826.1935845"},{"issue":"2","key":"278_CR3","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1509\/jmr.10.0353","volume":"49","author":"J Berger","year":"2012","unstructured":"Berger J, Milkman KL (2012) What makes online content viral? J Mark Res 49(2):192\u2013205","journal-title":"J Mark Res"},{"issue":"1","key":"278_CR4","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.dss.2012.06.008","volume":"54","author":"CMK Cheung","year":"2012","unstructured":"Cheung CMK, Thadani DR (2012) The impact of electronic word-of-mouth communication: a literature analysis and integrative model. Decis Support Syst 54(1):461\u2013470","journal-title":"Decis Support Syst"},{"key":"278_CR5","doi-asserted-by":"crossref","DOI":"10.4324\/9780203771587","volume-title":"Statistical power analysis for the behavioral sciences","author":"J Cohen","year":"2013","unstructured":"Cohen J (2013) Statistical power analysis for the behavioral sciences. Academic Press, New York"},{"issue":"3","key":"278_CR6","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319\u2013340","journal-title":"MIS Q"},{"issue":"6","key":"278_CR7","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"SC Deerwester","year":"1990","unstructured":"Deerwester SC, Dumais ST, Landauer TK, Furnas GW, Harshman RA (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):391\u2013407","journal-title":"J Am Soc Inf Sci"},{"issue":"3","key":"278_CR8","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1037\/h0046408","volume":"51","author":"M Deutsch","year":"1955","unstructured":"Deutsch M, Gerard HB (1955) A study of normative and informational social influences upon individual judgment. J Abnorm Soc Psychol 51(3):629","journal-title":"J Abnorm Soc Psychol"},{"key":"278_CR9","volume-title":"Straightforward statistics for the behavioral sciences","author":"JD Evans","year":"1996","unstructured":"Evans JD (1996) Straightforward statistics for the behavioral sciences. Brooks\/Cole, Pacific Grove"},{"key":"278_CR10","doi-asserted-by":"crossref","unstructured":"Feng W, Wang J (2013) Retweet or not? Personalized tweet re-ranking. In: Proceedings of the sixth ACM international conference on web search and data mining. ACM, pp 577\u2013586","DOI":"10.1145\/2433396.2433470"},{"issue":"4","key":"278_CR11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.5840\/intstudphil1997294108","volume":"29","author":"JT Flint","year":"1997","unstructured":"Flint JT (1997) Toward transformation of social knowledge. Int Stud Philos 29(4):115\u2013116","journal-title":"Int Stud Philos"},{"key":"278_CR12","doi-asserted-by":"crossref","unstructured":"Goldhaber MH (2006) The value of openness in an attention economy. First Mon 11(6). http:\/\/firstmonday.org\/issues\/issue11_6\/goldhaber\/index.html","DOI":"10.5210\/fm.v11i6.1334"},{"issue":"9","key":"278_CR13","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1016\/j.jbusres.2009.01.015","volume":"63","author":"P Gupta","year":"2010","unstructured":"Gupta P, Harris J (2010) How e-WOM recommendations influence product consideration and quality of choice: a motivation to process information perspective. J Bus Res 63(9):1041\u20131049","journal-title":"J Bus Res"},{"key":"278_CR14","doi-asserted-by":"crossref","unstructured":"Hong L, Davison BD (2010) Empirical study of topic modeling in twitter. In: Proceedings of the first workshop on social media analytics. ACM, pp 80\u201388","DOI":"10.1145\/1964858.1964870"},{"key":"278_CR15","doi-asserted-by":"crossref","unstructured":"Hong L, Dan O, Davison BD (2011) Predicting popular messages in twitter. In: Proceedings of the 20th international conference companion on world wide web. ACM, pp 57\u201358","DOI":"10.1145\/1963192.1963222"},{"key":"278_CR16","first-page":"527","volume":"5","author":"AG Ivakhnenko","year":"1995","unstructured":"Ivakhnenko AG, Ivakhnenko GA (1995) The review of problems solvable by algorithms of the group method of data handling (GMDH). Pattern Recogn Image Anal C\/C Raspozn Obrazov I Analiz Izobrazhenii 5:527\u2013535","journal-title":"Pattern Recogn Image Anal C\/C Raspozn Obrazov I Analiz Izobrazhenii"},{"key":"278_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-7138-7","volume-title":"An introduction to statistical learning","author":"G James","year":"2013","unstructured":"James G, Witten D, Hastie T, Tibshirani R (2013) An introduction to statistical learning. Springer, New York"},{"key":"278_CR18","doi-asserted-by":"crossref","unstructured":"Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on world wide web. ACM, pp 591\u2013600","DOI":"10.1145\/1772690.1772751"},{"key":"278_CR19","unstructured":"Patalano C (2008) Punk marketing: get off your ass and join the revolution. JAME 13(1):87"},{"issue":"2","key":"278_CR20","first-page":"1","volume":"4","author":"A Leavitt","year":"2009","unstructured":"Leavitt A, Burchard E, Fisher D, Gilbert S (2009) The influentials: new approaches for analyzing influence on twitter. Web Ecol Proj 4(2):1\u201318","journal-title":"Web Ecol Proj"},{"issue":"3","key":"278_CR21","doi-asserted-by":"crossref","first-page":"119","DOI":"10.2753\/JEC1086-4415160305","volume":"16","author":"Y-M Li","year":"2012","unstructured":"Li Y-M, Lee Y-L, Lien N-J (2012) Online social advertising via influential endorsers. Int J Electron Commer 16(3):119\u2013154","journal-title":"Int J Electron Commer"},{"issue":"4","key":"278_CR22","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1108\/10662241211250980","volume":"22","author":"Z Liu","year":"2012","unstructured":"Liu Z, Liu L, Li H (2012) Determinants of information retweeting in microblogging. Internet Res 22(4):443\u2013466","journal-title":"Internet Res"},{"key":"278_CR23","unstructured":"Macskassy SA, Michelson M (2011) Why do people retweet? Anti-homophily wins the day! In: ICWSM. Citeseer"},{"key":"278_CR24","unstructured":"Petrovic S, Osborne M, Lavrenko V (2011) Rt to win! predicting message propagation in twitter. In: ICWSM"},{"key":"278_CR25","volume-title":"The elaboration likelihood model of persuasion","author":"RE Petty","year":"1986","unstructured":"Petty RE, Cacioppo JT (1986) The elaboration likelihood model of persuasion. Springer, New York"},{"key":"278_CR26","volume-title":"Attitudes and persuasion: classic and contemporary approaches","author":"RE Petty","year":"1996","unstructured":"Petty RE, Cacioppo JT (1996) Attitudes and persuasion: classic and contemporary approaches. Westview Press, Boulder"},{"key":"278_CR27","doi-asserted-by":"crossref","unstructured":"Pezzoni F, An J, Passarella A, Crowcroft J, Conti M (2013) Why do i retweet it? An information propagation model for microblogs. In: Jatowt A, Lim E-P, Ding Y, Miura A, Tetzuka T, Dias G, Tanaka K, Flanagin A, Dai BT (eds) 5th international conference on social informatics (SocInfo 2013), vol 13, Kyoto, Japan, 25\u201327 November 2013. Springer, pp 360\u2013369","DOI":"10.1007\/978-3-319-03260-3_31"},{"key":"278_CR28","doi-asserted-by":"crossref","unstructured":"Romero DM, Meeder B, Kleinberg J (2011) Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. In: Proceedings of the 20th international conference on world wide web. ACM, pp 695\u2013704","DOI":"10.1145\/1963405.1963503"},{"issue":"1","key":"278_CR29","doi-asserted-by":"crossref","first-page":"137","DOI":"10.2224\/sbp.2009.37.1.137","volume":"37","author":"PJ Sher","year":"2009","unstructured":"Sher PJ, Lee S-H (2009) Consumer skepticism and online reviews: an elaboration likelihood model perspective. Soc Behav Pers Int J 37(1):137\u2013143","journal-title":"Soc Behav Pers Int J"},{"issue":"4","key":"278_CR30","doi-asserted-by":"crossref","first-page":"217","DOI":"10.2753\/MIS0742-1222290408","volume":"29","author":"S Stieglitz","year":"2013","unstructured":"Stieglitz S, Dang-Xuan L (2013) Emotions and information diffusion in social mediasentiment of microblogs and sharing behavior. J Manag Inf Syst 29(4):217\u2013248","journal-title":"J Manag Inf Syst"},{"issue":"4","key":"278_CR31","doi-asserted-by":"crossref","first-page":"710","DOI":"10.5465\/amj.2005.17843947","volume":"48","author":"FF Suarez","year":"2005","unstructured":"Suarez FF (2005) Network effects revisited: the role of strong ties in technology selection. Acad Manag J 48(4):710\u2013720","journal-title":"Acad Manag J"},{"key":"278_CR32","doi-asserted-by":"crossref","unstructured":"Suh B, Hong L, Pirolli P, Chi EH (2010) Want to be retweeted? Large scale analytics on factors impacting retweet in twitter network. In: 2010 IEEE second international conference on social computing (socialcom). IEEE, pp 177\u2013184","DOI":"10.1109\/SocialCom.2010.33"},{"key":"278_CR33","doi-asserted-by":"crossref","unstructured":"Sun E, Rosenn I, Marlow C, Lento TM (2009) Gesundheit! modeling contagion through facebook news feed. In: ICWSM","DOI":"10.1609\/icwsm.v3i1.13947"},{"key":"278_CR34","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1016\/j.knosys.2015.09.008","volume":"89","author":"X Tang","year":"2015","unstructured":"Tang X, Miao Q, Quan Y, Tang J, Deng K (2015) Predicting individual retweet behavior by user similarity: a multi-task learning approach. Knowl Based Syst 89:681\u2013688","journal-title":"Knowl Based Syst"},{"issue":"4","key":"278_CR35","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1086\/518527","volume":"34","author":"DJ Watts","year":"2007","unstructured":"Watts DJ, Dodds PS (2007) Influentials, networks, and public opinion formation. J Consum Res 34(4):441\u2013458","journal-title":"J Consum Res"},{"key":"278_CR36","doi-asserted-by":"crossref","unstructured":"Weng J, Lim E-P, Jiang J, He Q (2010) Twitterrank: finding topic-sensitive influential twitterers. In: Proceedings of the third ACM international conference on web search and data mining. ACM, pp 261\u2013270","DOI":"10.1145\/1718487.1718520"},{"key":"278_CR37","doi-asserted-by":"crossref","unstructured":"Wu S, Hofman JM, Mason WA, Watts DJ (2011) Who says what to whom on twitter. In: Proceedings of the 20th international conference on world wide web. ACM, pp 705\u2013714","DOI":"10.1145\/1963405.1963504"},{"key":"278_CR38","unstructured":"Xu Z, Yang Q (2012) Analyzing user retweet behavior on twitter. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012). IEEE Computer Society, pp 46\u201350"},{"key":"278_CR39","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139088510","volume-title":"Social media mining: an introduction","author":"R Zafarani","year":"2014","unstructured":"Zafarani R, Abbasi MA, Liu H (2014) Social media mining: an introduction. Cambridge University Press, Cambridge"},{"issue":"3","key":"278_CR40","first-page":"25","volume":"9","author":"J Zhang","year":"2014","unstructured":"Zhang J, Tang J, Li J, Liu Y, Xing C (2014) Who influenced you? Predicting retweet via social influence locality. ACM Trans Knowl Discov Data TKDD 9(3):25","journal-title":"ACM Trans Knowl Discov Data TKDD"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-017-0278-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-017-0278-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-017-0278-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T06:06:08Z","timestamp":1692857168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-017-0278-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,29]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["278"],"URL":"https:\/\/doi.org\/10.1007\/s10799-017-0278-8","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"type":"print","value":"1385-951X"},{"type":"electronic","value":"1573-7667"}],"subject":[],"published":{"date-parts":[[2017,6,29]]}}}