{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:40:56Z","timestamp":1772764856239,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17465-5","type":"journal-article","created":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T02:01:48Z","timestamp":1700013708000},"page":"51835-51851","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of contextual features\u2019 granularity for fake news detection"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9094-9118","authenticated-orcid":false,"given":"Isha","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"Dipti","family":"Rana","sequence":"additional","affiliation":[]},{"given":"Kalp","family":"Panwala","sequence":"additional","affiliation":[]},{"given":"Raj","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Viren","family":"Kathiriya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"17465_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1020945620934","volume":"20","author":"J Liu","year":"2003","unstructured":"Liu J, Zhong N, Yao Y (2003) The Wisdom web: new challenges for web intelligence (WI). J Intell Inform Syst 20:5\u20139. https:\/\/doi.org\/10.1023\/A:1020945620934","journal-title":"J Intell Inform Syst"},{"issue":"10225","key":"17465_CR2","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/S0140-6736(20)30461-X","volume":"395","author":"J Zarocostas","year":"2020","unstructured":"Zarocostas J (2020) How to fight an infodemic. Lancet 395(10225):676","journal-title":"Lancet"},{"key":"17465_CR3","doi-asserted-by":"crossref","unstructured":"Kerschberg L (2014) The role of context in social semantic search and decision making. Intern J Artific Intell Tools 23(06):1460022.","DOI":"10.1142\/S0218213014600227"},{"key":"17465_CR4","unstructured":"Albulescu C (2020) Coronavirus and oil price crash: a note. arXiv preprint arXiv:2003.06184. http:\/\/arxiv.org\/abs\/2003.06184. Accessed May 2021"},{"issue":"4","key":"17465_CR5","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1093\/rapstu\/raaa013","volume":"10","author":"NJ Gormsen","year":"2020","unstructured":"Gormsen NJ, Koijen RS (2020) Coronavirus: impact on stock prices and growth expectations. Rev Asset Pricing Studies 10(4):574\u2013597","journal-title":"Rev Asset Pricing Studies"},{"issue":"2","key":"17465_CR6","doi-asserted-by":"publisher","first-page":"96","DOI":"10.18488\/journal.2.2020.102.96.104","volume":"10","author":"M Mhalla","year":"2020","unstructured":"Mhalla M (2020) The impact of novel coronavirus (COVID-19) on the global oil and aviation markets. J Asian Sci Res 10(2):96. https:\/\/doi.org\/10.18488\/journal.2.2020.102.96.104","journal-title":"J Asian Sci Res"},{"issue":"1","key":"17465_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2478\/joim-2020-0029","volume":"12","author":"L Sulkowski","year":"2020","unstructured":"Sulkowski L (2020) Covid-19 pandemic; recession, virtual revolution leading to de-globalization? J Intercultural Manage 12(1):1\u201311","journal-title":"J Intercultural Manage"},{"issue":"1","key":"17465_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-73510-5","volume":"10","author":"M Cinelli","year":"2020","unstructured":"Cinelli M, Quattrociocchi W, Galeazzi A, Valensise CM, Brugnoli E, Schmidt AL, Zola P, Zollo F, Scala A (2020) The COVID-19 social media infodemic. Sci Rep 10(1):1\u201310","journal-title":"Sci Rep"},{"issue":"2","key":"17465_CR9","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08934210802381862","volume":"21","author":"M Ali","year":"2008","unstructured":"Ali M, Levine T (2008) The language of truthful and deceptive denials and confessions. Communication Rep 21(2):82\u201391","journal-title":"Communication Rep"},{"key":"17465_CR10","unstructured":"Sonntag D (2004) Assessing the quality of natural language text data. Informatik 2004\u2013Informatik verbindet\u2013Band 1, Beitr\u00e4ge 34"},{"issue":"1","key":"17465_CR11","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s10844-021-00678-1","volume":"59","author":"D Zhang","year":"2022","unstructured":"Zhang D, Xu J, Zadorozhny V, Grant J (2022) Fake news detection based on statement conflict. J Intell Inform Syst 59(1):173\u2013192","journal-title":"J Intell Inform Syst"},{"issue":"1","key":"17465_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10844-021-00646-9","volume":"59","author":"A Galli","year":"2022","unstructured":"Galli A, Masciari E, Moscato V, Sperl\u00ed G (2022) A comprehensive Benchmark for fake news detection. J Intell Inform Syst 59(1):237\u2013261","journal-title":"J Intell Inform Syst"},{"key":"17465_CR13","doi-asserted-by":"crossref","unstructured":"Undeutsch U (1984) Courtroom evaluation of eyewitness testimony. Intern Rev Appl Psychol","DOI":"10.1111\/j.1464-0597.1984.tb01416.x"},{"key":"17465_CR14","first-page":"77","volume":"17","author":"LN Driscoll","year":"1994","unstructured":"Driscoll LN (1994) A validity assessment of written statements from suspects in criminal investigations using the SCAN technique. Police Stud: Int\u2019l Rev Police Dev 17:77","journal-title":"Police Stud: Int\u2019l Rev Police Dev"},{"issue":"3","key":"17465_CR15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0150989","volume":"11","author":"A Zubiaga","year":"2016","unstructured":"Zubiaga A, Liakata M, Procter R, Wong Sak Hoi G, Tolmie P (2016) Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS ONE, 11(3), e0150989.","journal-title":"PLoS ONE"},{"issue":"4","key":"17465_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3070644","volume":"11","author":"S Vosoughi","year":"2017","unstructured":"Vosoughi S, Mohsenvand MN, Roy D (2017) Rumor gauge: predicting the veracity of rumors on Twitter. ACM Trans Knowl Discov Data (TKDD) 11(4):1\u201336","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"issue":"3","key":"17465_CR17","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/j.dss.2008.11.001","volume":"46","author":"CM Fuller","year":"2009","unstructured":"Fuller CM, Biros DP, Wilson RL (2009) Decision support for determining veracity via linguistic-based cues. Decis Support Syst 46(3):695\u2013703","journal-title":"Decis Support Syst"},{"key":"17465_CR18","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","volume":"13","author":"L Zhou","year":"2004","unstructured":"Zhou L, Burgoon JK, Nunamaker JF, Twitchell D (2004) Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decis Negot 13:81\u2013106","journal-title":"Group Decis Negot"},{"key":"17465_CR19","first-page":"71","volume-title":"Linguistic inquiry and word count: LIWC 2001","author":"JW Pennebaker","year":"2001","unstructured":"Pennebaker JW, Francis ME, Booth RJ (2001) Linguistic inquiry and word count: LIWC 2001. Lawrence Erlbaum Associates, Mahway, p 71"},{"key":"17465_CR20","doi-asserted-by":"crossref","unstructured":"Fast E, Chen B, Bernstein MS (2016) Empath: Understanding topic signals in large-scale text. In Proceedings of the 2016 CHI conference on human factors in computing systems, 4647\u20134657","DOI":"10.1145\/2858036.2858535"},{"key":"17465_CR21","doi-asserted-by":"crossref","unstructured":"Allahyari M, Pouriyeh S, Assefi M, Safaei S, Trippe ED, Gutierrez JB, Kochut K (2017) Text summarization techniques: a brief survey:1707.02268","DOI":"10.14569\/IJACSA.2017.081052"},{"key":"17465_CR22","unstructured":"Le Q, Mikolov T (2014) Distributed representations of sentences and documents. In International conference on machine learning. PMLR, pp 1188\u20131196"},{"key":"17465_CR23","doi-asserted-by":"crossref","unstructured":"Anjali B, Reshma R, Lekshmy VG (2019) Detection of counterfeit news using machine learning. In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies ICICICT vol. 1. IEEE, pp 1382\u20131386","DOI":"10.1109\/ICICICT46008.2019.8993330"},{"key":"17465_CR24","doi-asserted-by":"crossref","unstructured":"Ruchansky N, Seo S, Liu Y (2017) CSI: a hybrid deep model for fake news detection. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 797\u2013806","DOI":"10.1145\/3132847.3132877"},{"key":"17465_CR25","doi-asserted-by":"crossref","unstructured":"Nasir J, Khan S & Varlamis I (2021) Fake news detection: a hybrid CNN-RNN based deep learning approach. Intern J Inf Manag Data Insights 1(1):100007","DOI":"10.1016\/j.jjimei.2020.100007"},{"key":"17465_CR26","unstructured":"Allport GW, Postman L (1947) The psychology of rumor. Holt, Rinehart and Winston, New York"},{"key":"17465_CR27","doi-asserted-by":"crossref","unstructured":"Kwon S, Cha M, Jung K, Chen W, Wang Y (2013) Prominent features of rumor propagation in online social media. In 2013 IEEE 13th international conference on data mining IEEE, 1103\u20131108","DOI":"10.1109\/ICDM.2013.61"},{"key":"17465_CR28","doi-asserted-by":"crossref","unstructured":"Tian L, Zhang X, Wang Y, Liu H (2020) Early detection of rumours on twitter via stance transfer learning. In Advances in Information Retrieval: 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14\u201317, 2020, Proceedings, Part I 42 575\u2013588. Springer International Publishing","DOI":"10.1007\/978-3-030-45439-5_38"},{"issue":"1","key":"17465_CR29","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu K, Sliva A, Wang S, Tang J, Liu H (2017) Fake news detection on social media: a data mining perspective. ACM SIGKDD Explorations Newsl 19(1):22\u201336","journal-title":"ACM SIGKDD Explorations Newsl"},{"issue":"2","key":"17465_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2897350.2897352","volume":"17","author":"Y Li","year":"2016","unstructured":"Li Y, Gao J, Meng C, Li Q, Su L, Zhao B, Fan W, Han J (2016) A survey on truth discovery. ACM SIGKDD Explorations Newsl 17(2):1\u201316","journal-title":"ACM SIGKDD Explorations Newsl"},{"key":"17465_CR31","doi-asserted-by":"crossref","unstructured":"Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In Proc of the Int\u2019l ACM Conference on World Wide Web (WWW), pp. 675\u2013684","DOI":"10.1145\/1963405.1963500"},{"key":"17465_CR32","unstructured":"Chen Y, Rubin VL (2017) Perceptions of clickbait: a q-methodology approach. In Proceedings of the 45th Annual Conference of The Canadian Association for Information Science\/L\u2019Association canadienne des sciences de l\u2019information (CAIS\/ACSI2017), Ryerson University, Toronto, May 31-June 2"},{"key":"17465_CR33","doi-asserted-by":"crossref","unstructured":"Chen Y, Conroy NJ, Rubin VL (2015) Misleading online content: recognizing clickbait as false news. In Proc. of the ACM on Workshop on Multimodal Deception Detection (WMDD), pp 15\u201319","DOI":"10.1145\/2823465.2823467"},{"issue":"1","key":"17465_CR34","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao C, Ciampaglia GL, Varol O, Yang KC, Flammini A, Menczer F (2018) The spread of low-credibility content by social bots. Nat Commun 9(1):4787","journal-title":"Nat Commun"},{"key":"17465_CR35","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In Proc. of the Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), pp 12\u201321"},{"key":"17465_CR36","doi-asserted-by":"crossref","unstructured":"Batchelor O (2017) Getting out the truth: the role of libraries in the fight against fake news. Reference services review 45(2):143\u2013148","DOI":"10.1108\/RSR-03-2017-0006"},{"issue":"1","key":"17465_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.9","volume":"1","author":"H Ahmed","year":"2018","unstructured":"Ahmed H, Traore I, Saad S (2018) Detecting opinion spams and fake news using text classification. Secur Priv 1(1):9","journal-title":"Secur Priv"},{"key":"17465_CR38","doi-asserted-by":"publisher","unstructured":"Agarwal I, Rana D (n.d.) COVID19FN, Data M V3, https:\/\/doi.org\/10.17632\/b96v5hmfv6.3","DOI":"10.17632\/b96v5hmfv6.3"},{"key":"17465_CR39","doi-asserted-by":"crossref","unstructured":"Garg S, Sharma DK (2020) New Politifact: a dataset for counterfeit news. In 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) (pp. 17\u201322). IEEE","DOI":"10.1109\/SMART50582.2020.9337152"},{"key":"17465_CR40","doi-asserted-by":"publisher","unstructured":"Wang WY (2017) Liar, liar pants on fire: a new benchmark dataset for fake news detection. \nhttps:\/\/doi.org\/10.48550\/arXiv.1705.00648","DOI":"10.48550\/arXiv.1705.00648"},{"key":"17465_CR41","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.neucom.2016.10.080","volume":"254","author":"L Li","year":"2017","unstructured":"Li L, Qin B, Ren W, Liu T (2017) Document representation and feature combination for deceptive spam review detection. Neurocomputing 254:33\u201341","journal-title":"Neurocomputing"},{"key":"17465_CR42","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.ins.2017.01.015","volume":"385","author":"Y Ren","year":"2017","unstructured":"Ren Y, Ji D (2017) Neural networks for deceptive opinion spam detection: an empirical study. Inf Sci 385:213\u2013224","journal-title":"Inf Sci"},{"issue":"7","key":"17465_CR43","doi-asserted-by":"publisher","first-page":"1738","DOI":"10.5373\/JARDCS\/V12SP7\/20202283","volume":"12","author":"I Agarwal","year":"2020","unstructured":"Agarwal I, Rana D (2020) Credibility of misinformation and the Science of sentiments. J Adv Res Dyn Control Syst 12(7):1738\u20131745. https:\/\/doi.org\/10.5373\/JARDCS\/V12SP7\/20202283","journal-title":"J Adv Res Dyn Control Syst"},{"key":"17465_CR44","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.eswa.2018.07.005","volume":"114","author":"LY Dong","year":"2018","unstructured":"Dong LY, Ji SJ, Zhang CJ, Zhang Q, Chiu DW, Qiu LQ, Li D (2018) An unsupervised topic-sentiment joint probabilistic model for detecting deceptive reviews. Expert Syst Appl 114:210\u2013223","journal-title":"Expert Syst Appl"},{"key":"17465_CR45","doi-asserted-by":"crossref","unstructured":"Wu D, Yu F (2020) Data for better health (Guest editorial). Library Hi Tech 38(4):701\u2013703","DOI":"10.1108\/LHT-11-2020-280"},{"issue":"1","key":"17465_CR46","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10796-006-9019-y","volume":"9","author":"PC Hung","year":"2007","unstructured":"Hung PC, Chiu DK, Fung WW, Cheung WK, Wong R, Choi SP, Cheng VS (2007) End-to-end privacy control in service outsourcing of human intensive processes: a multi-layered web service integration approach. Inform Syst Front 9(1):85\u2013101","journal-title":"Inform Syst Front"},{"issue":"1","key":"17465_CR47","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1080\/02533839.2018.1537807","volume":"42","author":"TY Wu","year":"2019","unstructured":"Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20\u201328","journal-title":"J Chin Inst Eng"},{"key":"17465_CR48","doi-asserted-by":"publisher","first-page":"42052","DOI":"10.1109\/ACCESS.2019.2894155","volume":"7","author":"L Qiu","year":"2019","unstructured":"Qiu L, Yu J, Fan X, Jia W, Gao W (2019) Analysis of influence maximization in temporal social networks. IEEE Access 7:42052\u201342062","journal-title":"IEEE Access"},{"issue":"4","key":"17465_CR49","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s10796-007-9039-2","volume":"9","author":"D Hong","year":"2007","unstructured":"Hong D, Chiu DK, Shen VY, Cheung SC, Kafeza E (2007) Ubiquitous enterprise service adaptations based on contextual user behavior. Inform Syst Front 9(4):343\u2013358","journal-title":"Inform Syst Front"},{"issue":"2","key":"17465_CR50","doi-asserted-by":"publisher","first-page":"3293","DOI":"10.1016\/j.eswa.2008.01.055","volume":"36","author":"DW Chiu","year":"2009","unstructured":"Chiu DW, Leung HF, Lam KM (2009) On the making of service recommendations: an action theory based on utility, reputation, and risk attitude. Expert Syst Appl 36(2):3293\u20133301","journal-title":"Expert Syst Appl"},{"key":"17465_CR51","doi-asserted-by":"publisher","DOI":"10.1108\/LHT-01-2019-0028","author":"YS Su","year":"2020","unstructured":"Su YS, Lin CL, Chen SY, Lai CF (2020) Bibliometric study of social network analysis literature. Library Hi Tech. https:\/\/doi.org\/10.1108\/LHT-01-2019-0028. (ahead of print)","journal-title":"Library Hi Tech"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17465-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17465-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17465-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T03:45:30Z","timestamp":1715744730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17465-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":51,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17465"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17465-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1676328\/v1","asserted-by":"object"}]},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"28 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}