{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:11:21Z","timestamp":1767852681803,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T00:00:00Z","timestamp":1527638400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11036-018-1067-2","type":"journal-article","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T02:04:43Z","timestamp":1527645883000},"page":"1715-1726","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Discovering Homophily in Online Social Networks"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1691-7182","authenticated-orcid":false,"given":"Andrea","family":"De Salve","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Guidi","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,30]]},"reference":[{"key":"1067_CR1","doi-asserted-by":"crossref","unstructured":"Arnaboldi V, Conti M, Passarella A, Pezzoni F (2012) Analysis of ego network structure in online social networks. In: Privacy, security, risk and trust (PASSAT), 2012 international conference on and 2012 international confernece on social computing (SocialCom). IEEE, pp 31\u201340","DOI":"10.1109\/SocialCom-PASSAT.2012.41"},{"key":"1067_CR2","doi-asserted-by":"crossref","unstructured":"Arnaboldi V, Conti M, Passarella A, Pezzoni F (2013) Ego networks in twitter: an experimental analysis. In: 2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 229\u2013234","DOI":"10.1109\/INFCOMW.2013.6562913"},{"key":"1067_CR3","first-page":"422","volume-title":"Lecture Notes in Computer Science","author":"Marco Balduzzi","year":"2010","unstructured":"Balduzzi M, Platzer C, Holz T, Kirda E, Balzarotti D, Kruegel C (2010) Abusing social networks for automated user profiling. In: Recent advances in intrusion detection, pp 422\u2013441"},{"key":"1067_CR4","doi-asserted-by":"crossref","unstructured":"Bischoff K (2012) We love rock \u2018n\u2019 roll: Analyzing and predicting friendship links in last.fm. In: Proceedings of the 4th annual ACM web science conference, WebSci \u201912, pp 47\u201356","DOI":"10.1145\/2380718.2380725"},{"key":"1067_CR5","doi-asserted-by":"crossref","unstructured":"Bisgin H, Agarwal N, Xu X (2010) Investigating homophily in online social networks. In: Web intelligence and intelligent agent technology (WI-IAT), 2010, vol 1, pp 533\u2013536","DOI":"10.1109\/WI-IAT.2010.61"},{"issue":"1","key":"1067_CR6","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D Boyd","year":"2007","unstructured":"Boyd D, Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput-Mediat Commun 13(1):210\u2013230","journal-title":"J Comput-Mediat Commun"},{"issue":"6","key":"1067_CR7","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1007\/s11280-015-0333-5","volume":"18","author":"G Carullo","year":"2015","unstructured":"Carullo G, Castiglione A, De Santis A, Palmieri F (2015) A triadic closure and homophily-based recommendation system for online social networks. World Wide Web 18(6):1579\u20131601","journal-title":"World Wide Web"},{"key":"1067_CR8","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-662-45563-0_23","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences","author":"Marco Conti","year":"2014","unstructured":"Conti M, De Salve A, Guidi B, Pitto F, Ricci L (2014) Trusted dynamic storage for dunbar-based P2P online social networks. In: On the move to meaningful internet systems: OTM 2014 conferences, pp 400\u2013417"},{"key":"1067_CR9","doi-asserted-by":"crossref","unstructured":"Crandall D, Cosley D, Huttenlocher D, Kleinberg J, Suri S (2008) Feedback effects between similarity and social influence in online communities. In: International conference on knowledge discovery and data mining, KDD \u201908, pp 160\u2013168","DOI":"10.1145\/1401890.1401914"},{"key":"1067_CR10","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-1-4419-7142-5_17","volume-title":"Handbook of Social Network Technologies and Applications","author":"Anwitaman Datta","year":"2010","unstructured":"Datta A, Buchegger S, Vu LH, Strufe T, Rzadca K (2010) Decentralized online social networks. In: Handbook of social network technologies and applications, pp 349\u2013378"},{"key":"1067_CR11","doi-asserted-by":"crossref","unstructured":"De Choudhury M (2011) Tie formation on twitter: homophily and structure of egocentric networks. In: IEEE third international conference on privacy, security, risk and trust (PASSAT) and 2011 IEEE third international conference on social computing (SocialCom). IEEE, pp 465\u2013470","DOI":"10.1109\/PASSAT\/SocialCom.2011.177"},{"key":"1067_CR12","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.comcom.2015.09.001","volume":"73","author":"A De Salve","year":"2016","unstructured":"De Salve A, Dondio M, Guidi B, Ricci L (2016) The impact of user\u2019s availability on on-line ego networks: a facebook analysis. Comput Commun 73:211\u2013218","journal-title":"Comput Commun"},{"key":"1067_CR13","doi-asserted-by":"crossref","unstructured":"De Salve A, Guidi B, Ricci L (2017a) Analysis of users behaviour from a movie preferences perspective. In: 3rd EAI international conference on smart objects and technologies for social good","DOI":"10.1007\/978-3-319-76111-4_23"},{"key":"1067_CR14","doi-asserted-by":"crossref","unstructured":"De Salve A, Mori P, Ricci L (2017b) Evaluating the impact of friends in predicting user\u2019s availability in online social networks. In: International workshop on personal analytics and privacy. Springer, Berlin, pp 51\u201363","DOI":"10.1007\/978-3-319-71970-2_6"},{"issue":"10","key":"1067_CR15","first-page":"178","volume":"9","author":"R Dunbar","year":"1998","unstructured":"Dunbar R (1998) The social brain hypothesis. Brain 9(10):178\u2013190","journal-title":"Brain"},{"key":"1067_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.socnet.2015.04.005","volume":"43","author":"RI Dunbar","year":"2015","unstructured":"Dunbar RI, Arnaboldi V, Conti M, Passarella A (2015) The structure of online social networks mirrors those in the offline world. Soc Netw 43:39\u201347","journal-title":"Soc Netw"},{"issue":"1","key":"1067_CR17","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.socnet.2004.11.007","volume":"27","author":"M Everett","year":"2005","unstructured":"Everett M, Borgatti SP (2005) Ego network betweenness. Soc Netw 27(1):31\u201338","journal-title":"Soc Netw"},{"issue":"4","key":"1067_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H Gao","year":"2011","unstructured":"Gao H, Hu J, Huang T, Wang J, Chen Y (2011) Security issues in online social networks. IEEE Internet Comput 15(4):56\u201363","journal-title":"IEEE Internet Comput"},{"key":"1067_CR19","doi-asserted-by":"crossref","unstructured":"Guidi B, Conti M, Ricci L (2013) P2p architectures for distributed online social networks. In: 2013 International conference on high performance computing and simulation (HPCS). IEEE, pp 678\u2013681","DOI":"10.1109\/HPCSim.2013.6641493"},{"issue":"6","key":"1067_CR20","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1007\/s12083-015-0366-7","volume":"9","author":"Barbara Guidi","year":"2015","unstructured":"Guidi B, Amft T, De Salve A, Graffi K, Ricci L (2015) Didusonet: a p2p architecture for distributed dunbar-based social networks. Peer-to-Peer Networking and Applications, pp 1\u201318","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"1067_CR21","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s12110-003-1016-y","volume":"14","author":"RA Hill","year":"2003","unstructured":"Hill RA, Dunbar RI (2003) Social network size in humans. Hum Nat 14(1):53\u201372","journal-title":"Hum Nat"},{"key":"1067_CR22","doi-asserted-by":"crossref","unstructured":"Kontaxis G, Polakis I, Ioannidis S (2011) Markatos EP. Detecting social network profile cloning, 2011 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops), pp 295\u2013300","DOI":"10.1109\/PERCOMW.2011.5766886"},{"key":"1067_CR23","unstructured":"Lazarsfeld PF, Merton RK (1954) Friendship as a social process: a substantive and methodological analysis. In: Freedom and control in modern society, New York, pp 18\u201366"},{"key":"1067_CR24","unstructured":"MacQueen J et al (1967) Some methods for classification and analysis of multivariate observations. In: Proceedings of the fifth Berkeley symposium on mathematical statistics and probability, vol 1, pp 281\u2013297"},{"issue":"1","key":"1067_CR25","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: homophily in social networks. Annu Rev Sociol 27(1):415\u2013 444","journal-title":"Annu Rev Sociol"},{"key":"1067_CR26","doi-asserted-by":"crossref","unstructured":"Mislove A, Viswanath B, Gummadi KP, Druschel P (2010) You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM international conference on Web search and data mining, pp 251\u2013260","DOI":"10.1145\/1718487.1718519"},{"key":"1067_CR27","doi-asserted-by":"crossref","unstructured":"Ruan X, Yue C, Wang H (2013) Unveiling privacy setting breaches in online social networks. Springer International Publishing, pp 323\u2013341","DOI":"10.1007\/978-3-319-04283-1_20"},{"issue":"35","key":"1067_CR28","doi-asserted-by":"publisher","first-page":"12758","DOI":"10.1073\/pnas.0800497105","volume":"105","author":"\u00d6 \u015eim\u015fek","year":"2008","unstructured":"\u015eim\u015fek \u00d6, Jensen D (2008) Navigating networks by using homophily and degree. Proc Natl Acad Sci 105(35):12758\u2013 12762","journal-title":"Proc Natl Acad Sci"},{"key":"1067_CR29","doi-asserted-by":"crossref","unstructured":"Tang J, Gao H, Hu X, Liu H (2013) Exploiting homophily effect for trust prediction. In: Proceedings of the sixth ACM international conference on Web search and data mining. ACM, pp 53\u201362","DOI":"10.1145\/2433396.2433405"},{"key":"1067_CR30","unstructured":"Wang D, Pedreschi D, Song C, Giannotti F (2011) Barabasi AL. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 1100\u20131108"},{"issue":"4","key":"1067_CR31","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/2501654.2501657","volume":"45","author":"J Xie","year":"2013","unstructured":"Xie J, Kelley S, Szymanski BK (2013) Overlapping community detection in networks: the state-of-the-art and comparative study. ACM Comput Surv 45(4):431\u20134335","journal-title":"ACM Comput Surv"},{"issue":"3","key":"1067_CR32","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/TPC.2017.2703038","volume":"60","author":"C Zhang","year":"2017","unstructured":"Zhang C, Lu T, Chen S, Zhang C (2017) Integrating ego, homophily, and structural factors to measure user influence in online community. IEEE Trans Prof Commun 60(3):292\u2013305","journal-title":"IEEE Trans Prof Commun"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1067-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1067-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1067-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T16:16:07Z","timestamp":1571415367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1067-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,30]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1067"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1067-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,30]]},"assertion":[{"value":"30 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}