{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:21Z","timestamp":1740123801170,"version":"3.37.3"},"reference-count":91,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T00:00:00Z","timestamp":1507680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["DTRA Grant HDTRA1-11-1-0016"],"award-info":[{"award-number":["DTRA Grant HDTRA1-11-1-0016"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"crossref","award":["DTRA CNIMS Contract HDTRA1-11-D-0016-0001"],"award-info":[{"award-number":["DTRA CNIMS Contract HDTRA1-11-D-0016-0001"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000005","name":"Department of Defense","doi-asserted-by":"crossref","award":["Minerva"],"award-info":[{"award-number":["Minerva"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Science Foundation","award":["NSF DIBBS Grant ACI-1443054","NSF BIG DATA Grant IIS-1633028"],"award-info":[{"award-number":["NSF DIBBS Grant ACI-1443054","NSF BIG DATA Grant IIS-1633028"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11280-017-0500-y","type":"journal-article","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T10:48:11Z","timestamp":1507718891000},"page":"1187-1221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Spreading of social contagions without key players"],"prefix":"10.1007","volume":"21","author":[{"given":"Gizem","family":"Korkmaz","sequence":"first","affiliation":[]},{"given":"Chris J.","family":"Kuhlman","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Vega-Redondo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,11]]},"reference":[{"key":"500_CR1","unstructured":"Abdelhamid, S., Kuhlman, C.J., Marathe, M.V., Ravi, S.S., Reid, K.: Agent-Based Modeling and Simulation of Depression and Its Impact on Students? Success and Academic Retention. In: American Society for Engineering Education (ASEE) (2016)"},{"key":"500_CR2","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.physa.2016.11.002","volume":"468","author":"MA Al-garadi","year":"2017","unstructured":"Al-garadi, M.A., Varathan, K.D., Ravana, S.D.: Identification of influential spreaders in online social networks using interaction weighted k-core decomposition method. Physica A: Statistical Mechanics and its Applications 468, 278\u2013288 (2017)","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"500_CR3","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barabasi, A.: Error and attack tolerance of complex networks. Nature 406, 378\u2013381 (2000)","journal-title":"Nature"},{"key":"500_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dam.2003.09.004","volume":"145","author":"G Alexe","year":"2004","unstructured":"Alexe, G., Alexe, S., Crama, Y., Foldes, S., Hammer, P.L., Simeone, B.: Consensus algorithms for the generation of all maximal bicliques. Discret. Appl. Math. (DAM) 145, 11\u201321 (2004)","journal-title":"Discret. Appl. Math. (DAM)"},{"key":"500_CR5","doi-asserted-by":"crossref","unstructured":"Arnaboldi, V., Passarella, A., Tesconi, M., Gazz\u00e8, D.: Towards a characterization of Ego- centric networks in online social networks. In: Proceedings of the 2011th Confederated International Conference on the Move to Meaningful Internet Systems, pp 524\u2013533 (2011)","DOI":"10.1007\/978-3-642-25126-9_64"},{"key":"500_CR6","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Boldi, P., Rosa, M., Ugander, J., Vigna, S.: Four degrees of separation. In: Proceedings of the 4th Annual ACM Web Science Conference (WebSci), pp 33\u201342 (2012)","DOI":"10.1145\/2380718.2380723"},{"key":"500_CR7","doi-asserted-by":"crossref","unstructured":"Bader, D.A., Kintali, S., Madduri, K., Mihail, M.: Approximating betweenness centrality. In: WAW, pp 124\u2013137 (2007)","DOI":"10.1007\/978-3-540-77004-6_10"},{"key":"500_CR8","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1126\/science.aaa1160","volume":"348","author":"E Bakshy","year":"2013","unstructured":"Bakshy, E., Messing, S., Adamic, L.A.: Exposure to ideologically diverse news and opinion on Facebook. Science 348, 1130\u20131132 (2013)","journal-title":"Science"},{"key":"500_CR9","doi-asserted-by":"crossref","unstructured":"Bakshy, E., Rosenn, I., Marlow, C., Adamic, L.: The role of social networks in information diffusion. In: Proceedings of the 21st International Conference on World Wide Web, pp 519\u2013528 (2012)","DOI":"10.1145\/2187836.2187907"},{"key":"500_CR10","first-page":"509","volume":"286","author":"A Barabasi","year":"1999","unstructured":"Barabasi, A., Albert, R.: Emergence of scaling in random networks. Nature 286, 509\u2013512 (1999)","journal-title":"Nature"},{"key":"500_CR11","doi-asserted-by":"crossref","unstructured":"Barash, V., Cameron, C., Macy, M.: Critical phenomena in complex contagions. Soc. Networks 34 (2012)","DOI":"10.1016\/j.socnet.2012.02.003"},{"key":"500_CR12","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/0022250X.1972.9989806","volume":"2","author":"P Bonacich","year":"1972","unstructured":"Bonacich, P.: Factoring and weighting approaches to status scores and clique indentification. J. Math. Sociol. 2, 113\u2013120 (1972)","journal-title":"J. Math. Sociol."},{"key":"500_CR13","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"SP Borgatti","year":"2006","unstructured":"Borgatti, S.P.: Identifying sets of key players in a social network. Comput Math Organiz Theor 12, 21\u201334 (2006)","journal-title":"Comput Math Organiz Theor"},{"key":"500_CR14","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., Abbadi, A.E.: Limiting the spread of misinformation in social Net- works. In: Proceedings of the 20th International Conference of World Wide Web Conference (WWW) (2011)","DOI":"10.1145\/1963405.1963499"},{"issue":"3","key":"500_CR15","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1086\/521848","volume":"113","author":"D Centola","year":"2007","unstructured":"Centola, D., Macy, M.: Complex contagions and the weakness of long ties. Am. J. Soc. 113(3), 702\u2013734 (2007)","journal-title":"Am. J. Soc."},{"key":"500_CR16","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: ACM International Conference on Data Mining and Knowledge Discovery (KDD), pp 1029\u20131038 (2010a)","DOI":"10.1145\/1835804.1835934"},{"key":"500_CR17","doi-asserted-by":"crossref","unstructured":"Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of the 2010 IEEE International Conference on Data Mining (ICDM). ISBN 978-0-7695-4256-0, pp 88\u201397 (2010b)","DOI":"10.1109\/ICDM.2010.118"},{"key":"500_CR18","doi-asserted-by":"crossref","unstructured":"Cheng, J., Adamic, L.A., Dow, P.A., Kleinberg, J., Leskovec, J.: Can cascades be predicted?. In: Proceedings of the 23rd International Conference on World Wide Web (WWW) (2014)","DOI":"10.1145\/2566486.2567997"},{"issue":"1","key":"500_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1177\/104346398010001002","volume":"10","author":"MS-Y Chwe","year":"1998","unstructured":"Chwe, M.S.-Y.: Culture, circles, and commercials publicity, common knowledge, and social coordination. Ration. Soc. 10(1), 47\u201375 (1998)","journal-title":"Ration. Soc."},{"key":"500_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1086\/210269","volume":"105","author":"MS-Y Chwe","year":"1999","unstructured":"Chwe, M. S. -Y.: Structure and strategy in collective action. Am. J. Sociol. (AJS) 105, 128\u2013156 (1999)","journal-title":"Am. J. Sociol. (AJS)"},{"key":"500_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/1467-937X.00118","volume":"67","author":"MS-Y Chwe","year":"2000","unstructured":"Chwe, M. S. -Y.: Communication and coordination in social networks. Rev. Econ. Stud. 67, 1\u201316 (2000)","journal-title":"Rev. Econ. Stud."},{"key":"500_CR22","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1093\/biomet\/60.3.581","volume":"60","author":"P Clifford","year":"1973","unstructured":"Clifford, P, Sudbury, A: A model for spatial conflict. Biometrika 60, 581\u2013588 (1973)","journal-title":"Biometrika"},{"key":"500_CR23","doi-asserted-by":"publisher","unstructured":"de Arruda, GF, Barbieri, AL, Rodriguez, PM, Rodrigues, FA, Moreno, Y, Costa, L. F.: Role of centrality for the identification of influential spreaders in complex networks, vol. 90, p 032812 (2014), https:\/\/doi.org\/10.1103\/PhysRevE.90.032812 . http:\/\/link.aps.org\/doi\/10.1103\/PhysRevE.90.032812","DOI":"10.1103\/PhysRevE.90.032812"},{"key":"500_CR24","doi-asserted-by":"crossref","unstructured":"Devineni, P., Koutra, D., Faloutsos, M., Faloutsos, C.: If walls could talk: patterns and anomalies in facebook wallposts. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 367\u2013374 (2015)","DOI":"10.1145\/2808797.2808880"},{"issue":"4","key":"500_CR25","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.jtbi.2004.09.006","volume":"232","author":"PS Dodds","year":"2005","unstructured":"Dodds, P.S., Watts, D.J.: A generalized model of social and biological contagion. J. Theor. Biol. 232(4), 587\u2013604 (2005)","journal-title":"J. Theor. Biol."},{"key":"500_CR26","doi-asserted-by":"crossref","unstructured":"Dow, P.A., Adamic, L.A., Friggeri, A.: The anatomy of large facebook cascades. In: International AAAI Conference on Weblogs and Social Media (ICWSM), pp 145\u2013154 (2013)","DOI":"10.1609\/icwsm.v7i1.14431"},{"key":"500_CR27","unstructured":"Fowler, J., Mocanu, D., Steinert-Threlkeld, Z., Vespignani, A.: Common Knowledge and Protest (2014)"},{"key":"500_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1976","unstructured":"Freeman, LC: A set of measures of centrality based on betweenness. Sociometry 40, 35\u201341 (1976)","journal-title":"Sociometry"},{"key":"500_CR29","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman, LC: Centrality in social networks: conceptual clarification. Soc. Networks 1, 215\u2013239 (1978)","journal-title":"Soc. Networks"},{"key":"500_CR30","doi-asserted-by":"crossref","unstructured":"Friggeri, A, Adamic, LA, Eckles, D, Cheng, J: Rumor cascades. In: International AAAI Conference on Weblogs and Social Media (ICWSM) (2014)","DOI":"10.1609\/icwsm.v8i1.14559"},{"key":"500_CR31","doi-asserted-by":"crossref","unstructured":"Gjoka, M, Kurant, M, Butts, CT, Mkaropoulou, A: Walking in facebook: a case study of unbiased sampling of OSNs. In: Proceedings of the 29th Conference on Information Communications (INFOCOM), pp 2498\u20132506 (2010)","DOI":"10.1109\/INFCOM.2010.5462078"},{"key":"500_CR32","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12, 211\u2013223 (2001)","journal-title":"Mark. Lett."},{"key":"500_CR33","doi-asserted-by":"crossref","unstructured":"Gonzalez-Bailon, S., Borge-Holthoefer, J., Rivero, A., Moreno, Y.: The dynamics of protest recruitment through an online network. Sci. Rep. 1\u20137 (2011)","DOI":"10.1038\/srep00197"},{"key":"500_CR34","unstructured":"Gosling, S.D., Gaddis, S., Vazire, S.: Personality impressions based on facebook profiles. In: International AAAI Conference on Weblogs and Social Media (ICWSM) (2007)"},{"key":"500_CR35","doi-asserted-by":"publisher","first-page":"182","DOI":"10.2307\/2095965","volume":"58","author":"R Gould","year":"1993","unstructured":"Gould, R: Collective action and network structure. Am. Sociol. Rev. 58, 182\u2013196 (1993)","journal-title":"Am. Sociol. Rev."},{"issue":"6","key":"500_CR36","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M: Threshold models of collective behavior. Am. J. Sociol. 83(6), 1420\u20131443 (1978)","journal-title":"Am. J. Sociol."},{"key":"500_CR37","doi-asserted-by":"crossref","unstructured":"Gunasekara, R.C., Mehrotra, K., Mohan, C.K.: Multi-objective optimization to identify key players in social networks. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 443\u2013450 (2014)","DOI":"10.1109\/ASONAM.2014.6921623"},{"issue":"1","key":"500_CR38","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s13278-015-0260-6","volume":"5","author":"RC Gunasekara","year":"2015","unstructured":"Gunasekara, R.C., Mehrotra, K., Mohan, C.K.: Multi-objective optimization to identify key players in large social networks. Soc. Netw. Anal. Min. 5(1), 21 (2015)","journal-title":"Soc. Netw. Anal. Min."},{"key":"500_CR39","doi-asserted-by":"crossref","unstructured":"Gupta, S., Yan, X., Lerman, K.: Structural properties of ego networks. In: SBP, pp 55\u201364 (2015)","DOI":"10.1007\/978-3-319-16268-3_6"},{"issue":"4","key":"500_CR40","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"H Hethcote","year":"2000","unstructured":"Hethcote, H: The mathematics of infectious diseases. SIAM Rev. 42(4), 599\u2013653 (2000)","journal-title":"SIAM Rev."},{"key":"500_CR41","doi-asserted-by":"crossref","unstructured":"Hodas, NO, Lerman, K: The simple rules of social contagion. Sci. Rep. 4 (2014)","DOI":"10.1038\/srep04343"},{"key":"500_CR42","doi-asserted-by":"crossref","unstructured":"Huang, T. -K., Rahman, MS, Madhyastha, HV, Faloutsos, M, Ribeiro, B: An analysis of socware cascades in online social networks. In: Proceedings of the 22nd International Conference on World Wide Web, pp 619\u2013630 (2013)","DOI":"10.1145\/2488388.2488443"},{"key":"500_CR43","doi-asserted-by":"crossref","unstructured":"Huynh, H.N., Legara, E.F., Monterola, C.: A dynamical model of twitter activity profiles. In: Hypertext, pp 49\u201357 (2015)","DOI":"10.1145\/2700171.2791029"},{"issue":"3","key":"500_CR44","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.mathsocsci.2013.05.005","volume":"66","author":"RHP Janssen","year":"2013","unstructured":"Janssen, RHP, Monsuur, H: Identifying stable network structures and sets of key players using a w-covering perspective. Math. Soc. Sci. 66(3), 245\u2013253 (2013)","journal-title":"Math. Soc. Sci."},{"key":"500_CR45","doi-asserted-by":"crossref","unstructured":"Jin, F., Khandpur, R.P., Self, N., Dougherty, E., Guo, S., Chen, F., Prakash, B.A., Ra- makrishnan, N.: Modeling mass protest adoption in social network communities using geometric brownian motion. In: Proceedings of ACM International Conference on Data Mining and Knowledge Discovery (KDD) (2014)","DOI":"10.1145\/2623330.2623376"},{"key":"500_CR46","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jtbi.2007.11.024","volume":"253","author":"K Kawachi","year":"2008","unstructured":"Kawachi, K., Seki, M., Yoshida, H., Otake, Y., Warashina, K., Ueda, H.: A rumor transmission model with various contact interactions. J. Theor. Biol. 253, 55\u201360 (2008)","journal-title":"J. Theor. Biol."},{"key":"500_CR47","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of ACM International Conference on Data Mining and Knowledge Discovery (KDD), pp 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"500_CR48","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E., Makse, H.A.: Identification of influential spreaders in complex networks. Nat. Phys. 6, 888\u2013893 (2010)","journal-title":"Nat. Phys."},{"key":"500_CR49","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM 46, 604\u2013632 (1999)","journal-title":"J. ACM"},{"key":"500_CR50","doi-asserted-by":"crossref","unstructured":"Korkmaz, G., Kuhlman, C.J., Vega-Redondo, F.: Can Social Contagion Spread Without Key Players?. In: The 3rd International Conference on Behavioral, Economic, and SocioCultural Computing (BESC), pp 1\u20136 (2016)","DOI":"10.1109\/BESC.2016.7804473"},{"key":"500_CR51","unstructured":"Korkmaz, G., Kuhlman, C.J., Marathe, A., Marathe, M.V., Vega-Redondo, F.: Collective action through common knowledge using a facebook model. In: Thirteen International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (2014)"},{"issue":"15","key":"500_CR52","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. (PNAS) 110 (15), 5802\u20135805 (2013)","journal-title":"Proc. Natl. Acad. Sci. (PNAS)"},{"issue":"24","key":"500_CR53","doi-asserted-by":"publisher","first-page":"8788","DOI":"10.1073\/pnas.1320040111","volume":"111","author":"ADI Kramer","year":"2014","unstructured":"Kramer, A.DI., Guillory, J.E., Hancock, J.T.: Experimental evidence of massive-scale emotional contagion through social networks. Proc. Natl. Acad. Sci. (PNAS) 111(24), 8788\u20138790 (2014)","journal-title":"Proc. Natl. Acad. Sci. (PNAS)"},{"key":"500_CR54","doi-asserted-by":"publisher","first-page":"2121","DOI":"10.1016\/j.comnet.2012.11.025","volume":"57","author":"CJ Kuhlman","year":"2013","unstructured":"Kuhlman, C.J., Kumar, V.SA., Ravi, S.S.: Controlling opinion propagation in online networks. J. Comput. Networks 57, 2121\u20132132 (2013)","journal-title":"J. Comput. Networks"},{"key":"500_CR55","doi-asserted-by":"crossref","unstructured":"Kuhlman, CJ, Kumar, V.S.A., Marathe, M.V., Ravi, S.S., Rosenkrantz, D.J.: Inhibiting diffusion of complex contagions in social networks: Theoretical and experimental results. Journal of Data Mining and Knowledge Discovery (DMKD) (2015)","DOI":"10.1007\/s10618-014-0351-4"},{"key":"500_CR56","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1037\/a0037037","volume":"107","author":"TA Kyle","year":"2014","unstructured":"Kyle, TA, DeScioli, P, Haque, OS, Pinker, S: The psychology of coordination and common knowledge. J. Pers. Soc. Psychol. 107, 657\u2013676 (2014)","journal-title":"J. Pers. Soc. Psychol."},{"key":"500_CR57","doi-asserted-by":"crossref","unstructured":"Leskovec, J: SNAP Datasets, http:\/\/snap.stanford.edu\/data (2016)","DOI":"10.1145\/2898361"},{"key":"500_CR58","unstructured":"Lewis, R: Convention: a philosophical study. Harvard U. Press (1969)"},{"key":"500_CR59","doi-asserted-by":"crossref","unstructured":"Lloyd-Smith, JO, George, D, Pepin4, KM, Pitzer, VE, Pulliam, JRC, Dobson, AP, Hudson, PJ, Grenfell, BT: Epidemic dynamics at the human-animal interface. Science 26, 1362\u20131367 (2009)","DOI":"10.1126\/science.1177345"},{"key":"500_CR60","doi-asserted-by":"crossref","unstructured":"Lum, K., Swarup, S., Eubank, S., Hawdon, J.: The contagious nature of imprisonment: an agent-based model to explain racial disparities in incarceration rates. J. R. Soc. Interface. 11(98) (2014)","DOI":"10.1098\/rsif.2014.0409"},{"issue":"6","key":"500_CR61","doi-asserted-by":"publisher","first-page":"730","DOI":"10.2307\/2096252","volume":"56","author":"M Macy","year":"1991","unstructured":"Macy, M: Chains of cooperation: Threshold effects in collective action. Am. Sociol. Rev. 56(6), 730\u2013747 (1991)","journal-title":"Am. Sociol. Rev."},{"key":"500_CR62","first-page":"64","volume":"92","author":"D McAdam","year":"1986","unstructured":"McAdam, D: Recruitment to high-risk activism\u2013the case of freedom summer. Am. J. Sports Med. 92, 64\u201390 (1986)","journal-title":"Am. J. Sports Med."},{"issue":"2","key":"500_CR63","doi-asserted-by":"publisher","first-page":"028701","DOI":"10.1103\/PhysRevLett.91.028701","volume":"91","author":"M Mobilia","year":"2003","unstructured":"Mobilia, M: Does a single zealot affect an infinite group of voters? Phys. Rev. Lett. 91(2), 028701\u201310287014 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"500_CR64","doi-asserted-by":"crossref","unstructured":"Mobilia, M, Petersen, A, Redner, S: On the role of zealotry in the voter model. J. Statistical Mechanics: Theory and Experiment P08029, 1\u201317 (2007a)","DOI":"10.1088\/1742-5468\/2007\/08\/P08029"},{"key":"500_CR65","doi-asserted-by":"crossref","unstructured":"Mobilia, M, Petersen, A, Redner, S: On the role of zealotry in the voter model, vol. 2007 (2007b)","DOI":"10.1088\/1742-5468\/2007\/08\/P08029"},{"key":"500_CR66","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1038\/nature14604","volume":"524","author":"F Morone","year":"2015","unstructured":"Morone, F, Makse, HA: Influence maximization in complex networks through optimal percolation. Nature 524, 65\u201368 (2015)","journal-title":"Nature"},{"key":"500_CR67","doi-asserted-by":"crossref","unstructured":"Myers, S.A., Leskovec, J.: Clash of the contagions: cooperation and competition in information diffusion. In: IEEE 12th International Conference on Data Mining (ICDM), pp 539\u2013548 (2012)","DOI":"10.1109\/ICDM.2012.159"},{"key":"500_CR68","doi-asserted-by":"publisher","first-page":"e45414","DOI":"10.1371\/journal.pone.0045414","volume":"7","author":"EO Nsoesie","year":"2012","unstructured":"Nsoesie, EO, Beckman, RJ, Marathe, MV: Sensitivity analysis of an individual-based model for simulation of influenza epidemics. PLos ONE 7, e45414-1\u2013e45414-16 (2012)","journal-title":"PLos ONE"},{"issue":"1","key":"500_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2095728","volume":"53","author":"P Oliver","year":"1988","unstructured":"Oliver, P, Marwell, G: The paradox of group size in collective action: a theory of the critical mass. ii. Am. Sociol. Rev. 53(1), 1\u20138 (1988)","journal-title":"Am. Sociol. Rev."},{"issue":"3","key":"500_CR70","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1086\/228313","volume":"91","author":"P Oliver","year":"1985","unstructured":"Oliver, P, Marwell, G, Teixeira, R: A theory of the critical mass. i. interdependence, group heterogeneity, and the production of collective action. Am. J. Sociol. 91(3), 522\u2013556 (1985)","journal-title":"Am. J. Sociol."},{"key":"500_CR71","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web., Technical Report 1999-66, Stanford InfoLab. Previous number = SIDL-WP-1999-0120 (1999). http:\/\/ilpubs.stanford.edu:8090\/422\/"},{"key":"500_CR72","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.socscimed.2014.01.056","volume":"125","author":"AV Papachristos","year":"2015","unstructured":"Papachristos, AV, Wildeman, C, Roberto, E: Tragic, but not random: the social contagion of nonfatal gunshot injuries. Soc. Sci. Med. 125, 139\u2013150 (2015)","journal-title":"Soc. Sci. Med."},{"key":"500_CR73","doi-asserted-by":"crossref","unstructured":"Prakash, B.A., Chakrabarti, D., Faloutsos, M., Valler, N., Faloutsos, C.: Threshold conditions for arbitrary cascade models on arbitrary graphs. In: Proceedings of the 11th IEEE Conference on Data Mining (ICDM), pp 537\u2013546 (2011a)","DOI":"10.1109\/ICDM.2011.145"},{"key":"500_CR74","doi-asserted-by":"crossref","unstructured":"Prakash, B.A., Chakrabarti, D., Faloutsos, M., Valler, N., Faloutsos, C.: Threshold conditions for arbitrary cascade models on arbitrary networks. In: Proceedings of the 2011 IEEE 11th International Conference on Data Mining, pp 537\u2013546 (2011b)","DOI":"10.1109\/ICDM.2011.145"},{"key":"500_CR75","doi-asserted-by":"crossref","unstructured":"Prakash, B.A., Beutel, A., Rosenfeld, R., Faloutsos, C.: Winner takes all: competing viruses or ideas on fair-play networks. In: Proceedings of the 21st International World Wide Web Conference (WWW) (2012)","DOI":"10.1145\/2187836.2187975"},{"key":"500_CR76","doi-asserted-by":"crossref","unstructured":"Romero, D., Meeder, B., Kleinberg, J.: Differences in the Mechanics of Information Diffusion. In: Proceedings of the 20th International Conference on World Wide Web (2011)","DOI":"10.1145\/1963405.1963503"},{"key":"500_CR77","doi-asserted-by":"crossref","unstructured":"Saha, S., Adiga, A., Prakash, B.A., Vullikanti, A.KS.: Approximation algorithms for reducing the spectral radius to control epidemic spread. In: Proceedings of the 2015 SIAM International Conference on Data Mining, pp. 568\u2013576. Vancouver (2015)","DOI":"10.1137\/1.9781611974010.64"},{"key":"500_CR78","unstructured":"Schelling, T: Micromotives and macrobehavior. W. W. Norton and company (1978)"},{"key":"500_CR79","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.socscimed.2013.12.034","volume":"125","author":"JA Schneider","year":"2015","unstructured":"Schneider, JA, Zhou, AN, Laumann, EO: A new HIV prevention network approach: sociometric peer change agent selection. Soc. Sci. Med. 125, 192\u2013202 (2015)","journal-title":"Soc. Sci. Med."},{"key":"500_CR80","doi-asserted-by":"crossref","unstructured":"Schoenebeck, G.: Potential networks, contagious communities, and understanding social network structure. In: Proceedings of the 22nd International Conference on World Wide Web, pp 367\u2013374 (2013)","DOI":"10.1145\/2488388.2488486"},{"key":"500_CR81","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0378-8733(83)90028-X","volume":"5","author":"SB Seidman","year":"1983","unstructured":"Seidman, S.B.: Network Structure and Minimum Degree. Soc. Networks 5, 269\u2013287 (1983)","journal-title":"Soc. Networks"},{"key":"500_CR82","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1111\/j.1540-5907.2008.00361.x","volume":"53","author":"D Siegel","year":"2009","unstructured":"Siegel, D.: Social networks and collective action. Am. J. Pol. Sc. 53, 122\u2013138 (2009)","journal-title":"Am. J. Pol. Sc."},{"key":"500_CR83","doi-asserted-by":"crossref","unstructured":"Sun, E., Rosenn, I.,Marlow, C.A., Lento, T.M.: Gesundheit! modeling contagion through facebook news feed. In: International AAAI Conference on Weblogs and Social Media (ICWSM) (2009)","DOI":"10.1609\/icwsm.v3i1.13947"},{"key":"500_CR84","doi-asserted-by":"publisher","first-page":"e68629","DOI":"10.1371\/journal.pone.0068629","volume":"8","author":"T Takaguchi","year":"2013","unstructured":"Takaguchi, T., Masuda, N., Holme, P.: Bursty communication patterns facilitate spreading in a threshold-based epidemic dynamics. Plos One 8, e68629-1\u2013e68629-5 (2013)","journal-title":"Plos One"},{"key":"500_CR85","unstructured":"Ugander, J., Karrer, B., Backstrom, L., Marlow, C.: The anatomy of the facebook social graph. In: Computing Research Repository (CoRR) (2011)"},{"key":"500_CR86","doi-asserted-by":"crossref","unstructured":"Viswanath, B., Mislove, A., Cha, M., Gummadi, K.P.: On the evolution of user interaction in facebook. In: Proceedings of the 2nd ACM Workshop on Online Social Networks (WOSN), pp 37\u201342 (2009)","DOI":"10.1145\/1592665.1592675"},{"issue":"3","key":"500_CR87","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s11280-014-0277-1","volume":"18","author":"S Wang","year":"2015","unstructured":"Wang, S.,Wang, F., Chen, Y., Liu, C., Li, Z., Zhang, X.: Exploiting social circle broadness for influential spreaders identification in social networks. World Wide Web 18(3), 681\u2013705 (2015)","journal-title":"World Wide Web"},{"key":"500_CR88","doi-asserted-by":"publisher","first-page":"e0164393","DOI":"10.1371\/journal.pone.0164393","volume":"11","author":"X Wang","year":"2016","unstructured":"Wang, X., Zhang, X., Zhao, C., Yi, D.: Maximizing the spread of influence via generalized degree discount. PLos ONE 11, e0164393-1\u2013e0164393\u201316 (2016)","journal-title":"PLos ONE"},{"key":"500_CR89","unstructured":"Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: an eigenvalue viewpoint. In: Proceedings of the 22nd International Symposium on Reliable Distributed Systems (SRDS), pp 25\u201334 (2003)"},{"issue":"9","key":"500_CR90","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1073\/pnas.082090499","volume":"99","author":"D Watts","year":"2002","unstructured":"Watts, D: A simple model of global cascades on random networks. PNAS 99(9), 5766\u20135771 (2002)","journal-title":"PNAS"},{"key":"500_CR91","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.physleta.2007.01.094","volume":"368","author":"J Zhou","year":"2007","unstructured":"Zhou, J., Liu, Z., Li, B.: Influence of network structure on rumor propagation. Phys. Lett. A 368, 458\u2013463 (2007)","journal-title":"Phys. Lett. A"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-017-0500-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-017-0500-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-017-0500-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T23:36:32Z","timestamp":1693092992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-017-0500-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,11]]},"references-count":91,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["500"],"URL":"https:\/\/doi.org\/10.1007\/s11280-017-0500-y","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2017,10,11]]},"assertion":[{"value":"2 February 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}