{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:50:45Z","timestamp":1754398245755,"version":"3.40.4"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007831","name":"University of Tabriz","doi-asserted-by":"publisher","award":["S\/806"],"award-info":[{"award-number":["S\/806"]}],"id":[{"id":"10.13039\/501100007831","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s12652-022-04034-1","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T13:02:37Z","timestamp":1656075757000},"page":"13787-13811","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A model to measure the spread power of rumors"],"prefix":"10.1007","volume":"14","author":[{"given":"Zoleikha","family":"Jahanbakhsh-Nagadeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8548-976X","authenticated-orcid":false,"given":"Mohammad-Reza","family":"Feizi-Derakhshi","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Ramezani","sequence":"additional","affiliation":[]},{"given":"Taymaz","family":"Akan","sequence":"additional","affiliation":[]},{"given":"Meysam","family":"Asgari-Chenaghlu","sequence":"additional","affiliation":[]},{"given":"Narjes","family":"Nikzad-Khasmakhi","sequence":"additional","affiliation":[]},{"given":"Ali-Reza","family":"Feizi-Derakhshi","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Ranjbar-Khadivi","sequence":"additional","affiliation":[]},{"given":"Elnaz","family":"Zafarani-Moattar","sequence":"additional","affiliation":[]},{"given":"Mohammad-Ali","family":"Balafar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,24]]},"reference":[{"key":"4034_CR1","doi-asserted-by":"crossref","unstructured":"Abualigah LM, Khader AT, Hanandeh ES (2018) A novel weighting scheme applied to improve the text document clustering techniques. In: Innovative computing, optimization and its applications (pp 305\u2013320). Springer","DOI":"10.1007\/978-3-319-66984-7_18"},{"key":"4034_CR2","doi-asserted-by":"publisher","first-page":"4773","DOI":"10.1007\/s11227-017-2046-2","volume":"73","author":"LM Abualigah","year":"2017","unstructured":"Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73:4773\u20134795","journal-title":"J Supercomput"},{"key":"4034_CR3","volume-title":"The psychology of rumor","author":"GW Allport","year":"1947","unstructured":"Allport GW, Postman L (1947) The psychology of rumor. Henry Holt and Company"},{"key":"4034_CR4","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.procs.2018.10.495","volume":"142","author":"SM Alzanin","year":"2018","unstructured":"Alzanin SM, Azmi AM (2018) Detecting rumors in social media: a survey. Procedia Comput Sci 142:294\u2013300 (Arabic Computational Linguistics)","journal-title":"Procedia Comput Sci"},{"key":"4034_CR5","doi-asserted-by":"crossref","unstructured":"Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on World wide web - WWW \u201911 (p 675). New York, New York, USA:ACM Press","DOI":"10.1145\/1963405.1963500"},{"key":"4034_CR6","doi-asserted-by":"publisher","DOI":"10.1037\/11503-000","volume-title":"Rumor psychology: social and organizational approaches","author":"N DiFonzo","year":"2007","unstructured":"DiFonzo N, Bordia P (2007) Rumor psychology: social and organizational approaches. American Psychological Association, Washington"},{"key":"4034_CR7","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/2184319.2184338","volume":"55","author":"B Doer","year":"2012","unstructured":"Doer B, Fouz M, Friedrich T (2012) Why rumors spread so quickly in social networks. Commun ACM 55:70","journal-title":"Commun ACM"},{"key":"4034_CR8","unstructured":"Feizi-Derakhshi A-R, Feizi-Derakhshi M-R, Ranjbar-Khadivi M, Nikzad-Khasmakhi N, Ramezani M, Rahkar Farshi T, Zafarani-Moattar E, Asgari-Chenaghlu M, Jahanbakhsh-Nagadeh Z (2020). Sepehr_RumTel01"},{"key":"4034_CR9","doi-asserted-by":"publisher","first-page":"72","DOI":"10.4018\/IJKSR.2016040105","volume":"7","author":"AYM Floos","year":"2016","unstructured":"Floos AYM (2016) Arabic rumours identification by measuring the credibility of Arabic tweet content. Int J Knowl Soc Res 7:72\u201383","journal-title":"Int J Knowl Soc Res"},{"key":"4034_CR10","doi-asserted-by":"publisher","first-page":"6676","DOI":"10.1016\/j.eswa.2014.05.009","volume":"41","author":"M Ghaemi","year":"2014","unstructured":"Ghaemi M, Feizi-Derakhshi M-R (2014) Forest optimization algorithm. Expert Syst Appl 41:6676\u20136687","journal-title":"Expert Syst Appl"},{"key":"4034_CR11","doi-asserted-by":"crossref","unstructured":"Gheisari M, Wang G, Bhuiyan M ZA (2017) A survey on deep learning in big data. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) (pp 173\u2013180). volume\u00a02","DOI":"10.1109\/CSE-EUC.2017.215"},{"key":"4034_CR12","first-page":"103","volume":"1","author":"A Golfam","year":"2014","unstructured":"Golfam A, Afrashi A, Moghadam G (2014) Conceptualization of the Persian simple verbs of motion: a cognitive approach. J Language Western Iran Dialects 1:103\u2013122","journal-title":"J Language Western Iran Dialects"},{"key":"4034_CR13","unstructured":"Hamidian S, Diab MT (2019) Rumor detection and classification for twitter data"},{"key":"4034_CR14","first-page":"84","volume":"39","author":"J Harsin","year":"2006","unstructured":"Harsin J (2006) The rumour bomb: Theorising the convergence of new and old trends in mediated us politics. Southern Rev 39:84\u2013110","journal-title":"Southern Rev"},{"key":"4034_CR15","first-page":"18","volume":"9","author":"Z Jahanbakhsh-Nagadeh","year":"2020","unstructured":"Jahanbakhsh-Nagadeh Z, Feizi-Derakhshi M-R, Sharifi A (2020) A speech act classifier for Persian texts and its application in identifying rumors. J Soft Comput Inf Technol (JSCIT) 9:18\u201327","journal-title":"J Soft Comput Inf Technol (JSCIT)"},{"key":"4034_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906151","volume":"49","author":"W Jiang","year":"2016","unstructured":"Jiang W, Wang G, Bhuiyan MZA, Wu J (2016) Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput Surv (Csur) 49:1\u201335","journal-title":"ACM Comput Surv (Csur)"},{"key":"4034_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-60240-0_2","volume-title":"Social, cultural, and behavioral modeling","author":"Z Jin","year":"2017","unstructured":"Jin Z, Cao J, Guo H, Zhang Y, Wang Y, Luo J (2017) Detection and analysis of 2016 us presidential election related rumors on twitter. In: Lee D, Lin Y-R, Osgood N, Thomson R (eds) Social, cultural, and behavioral modeling. Springer International Publishing, pp 14\u201324"},{"key":"4034_CR18","unstructured":"Kashefi O, Nasri M, Kanani K (2010) Automatic spell checking in Persian language. In: Supreme Council of Information and Communication Technology (SCICT), Tehran, Iran"},{"key":"4034_CR19","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1007\/978-0-387-30164-8_630","volume-title":"Particle swarm optimization. Encyclopedia of machine learning","author":"J Kennedy","year":"2011","unstructured":"Kennedy J (2011) Particle swarm optimization. Encyclopedia of machine learning. Springer, Boston, pp 760\u2013766"},{"key":"4034_CR20","first-page":"14","volume":"4","author":"KPK Kumar","year":"2014","unstructured":"Kumar KPK, Geethakumari G (2014) Detecting misinformation in online social networks using cognitive psychology. HCIS 4:14","journal-title":"HCIS"},{"key":"4034_CR21","doi-asserted-by":"publisher","first-page":"24083","DOI":"10.1007\/s11042-019-7398-6","volume":"78","author":"A Kumar","year":"2019","unstructured":"Kumar A, Sangwan SR, Nayyar A (2019) Rumour veracity detection on twitter using particle swarm optimized shallow classifiers. Multimed Tools Appl 78:24083\u201324101","journal-title":"Multimed Tools Appl"},{"key":"4034_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0168344","volume":"12","author":"S Kwon","year":"2017","unstructured":"Kwon S, Cha M, Jung K (2017) Rumor detection over varying time windows. PLoS One 12:1\u201319","journal-title":"PLoS One"},{"key":"4034_CR23","doi-asserted-by":"crossref","unstructured":"Kwon S, Cha M, Jung K, Chen W, Wang Y (2013a) Aspects of rumor spreading on a microblog network. In: International conference on social informatics (pp 299\u2013308). Springer, Cham","DOI":"10.1007\/978-3-319-03260-3_26"},{"key":"4034_CR24","doi-asserted-by":"crossref","unstructured":"Kwon S, Cha M, Jung K, Chen W, Wang Y (2013b) Prominent features of rumor propagation in online social media. In: 13th IEEE International Conference on Data Mining (ICDM\u20192013), Dallas, Texas, U.S.A. IEEE","DOI":"10.1109\/ICDM.2013.61"},{"key":"4034_CR25","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCSS.2016.2612980","volume":"3","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xu S (2016) Detecting rumors through modeling information propagation networks in a social media environment. IEEE Trans Comput Soc Syst 3:46\u201362","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"4034_CR26","doi-asserted-by":"crossref","unstructured":"Li Q, Zhang Q, Si L, Liu Y (2019) Rumor detection on social media: datasets, methods and opportunities","DOI":"10.18653\/v1\/D19-5008"},{"key":"4034_CR27","doi-asserted-by":"crossref","unstructured":"Mahmoodabad SD, Farzi S, Bakhtiarvand DB (2018) Persian rumor detection on twitter. In: 2018 9th International Symposium on Telecommunications (IST) (pp 597\u2013602)","DOI":"10.1109\/ISTEL.2018.8661007"},{"key":"4034_CR28","doi-asserted-by":"crossref","unstructured":"Minaee S, Kalchbrenner N, Cambria E, Nikzad N, Chenaghlu M, Gao J (2020) Deep learning based text classification: a comprehensive review","DOI":"10.1145\/3439726"},{"key":"4034_CR29","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1111\/j.1467-8640.2012.00460.x","volume":"29","author":"SM Mohammad","year":"2013","unstructured":"Mohammad SM, Turney PD (2013) Crowdsourcing a word-emotion association lexicon. Comput Intell 29:436\u2013465","journal-title":"Comput Intell"},{"key":"4034_CR30","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s40995-017-0209-x","volume":"41","author":"H Moradi","year":"2017","unstructured":"Moradi H, Ahmadi F, Feizi-Derakhshi M-R (2017) A hybrid approach for Persian named entity recognition. Iran J Sci Technol Trans A 41:215\u2013222","journal-title":"Iran J Sci Technol Trans A"},{"key":"4034_CR31","unstructured":"Ng A (2013) Machine learning and AI via brain simulations. Accessed: May, 3, 2018"},{"key":"4034_CR32","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1080\/00224545.1975.9923258","volume":"96","author":"NKU Nkpa","year":"1975","unstructured":"Nkpa NKU (1975) Rumor mongering in war time. J Soc Psychol 96:27\u201335","journal-title":"J Soc Psychol"},{"key":"4034_CR33","unstructured":"Qazvinian V, Rosengren E, Radev DR, Mei Q (2011) Rumor has it: identifying misinformation in microblogs. In: Proceedings of the conference on empirical methods in natural language processing (pp 1589\u20131599). Association for Computational Linguistics"},{"key":"4034_CR34","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv6zddck","volume-title":"On rumors : how falsehoods spread, why we believe them, and what can be done","author":"CR Sunstein","year":"2014","unstructured":"Sunstein CR (2014) On rumors: how falsehoods spread, why we believe them, and what can be done. Princeton University Press"},{"key":"4034_CR35","unstructured":"Vosoughi S (2015) Automatic detection and verification of rumors on Twitter. Ph.D. thesis Massachusetts Institute of Technology"},{"key":"4034_CR36","doi-asserted-by":"crossref","unstructured":"Wang S, and Terano T (2015) Detecting rumor patterns in streaming social media. In: 2015 IEEE International Conference on Big Data (Big Data) (pp 2709\u20132715)","DOI":"10.1109\/BigData.2015.7364071"},{"key":"4034_CR37","doi-asserted-by":"crossref","unstructured":"Wu K, Yang S, Zhu KQ (2015) False rumors detection on Sina Weibo by propagation structures. In: 2015 IEEE 31st International Conference on Data Engineering (pp 651\u2013662). IEEE","DOI":"10.1109\/ICDE.2015.7113322"},{"key":"4034_CR38","doi-asserted-by":"crossref","unstructured":"Yang F, Liu Y, Yu X, Yang M (2012) Automatic detection of rumor on sina weibo. In: Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics - MDS \u201912 (pp 1\u20137). New York, New York, USA:ACM Press","DOI":"10.1145\/2350190.2350203"},{"key":"4034_CR39","doi-asserted-by":"crossref","unstructured":"Zamani S, Asadpour M, Moazzami D (2017) Rumor detection for persian tweets. In: 2017 Iranian Conference on Electrical Engineering (ICEE) (pp 1532\u20131536). IEEE","DOI":"10.1109\/IranianCEE.2017.7985287"},{"key":"4034_CR40","doi-asserted-by":"crossref","unstructured":"Zarharan M, Ahangar S, Rezvaninejad FS, Bidhendi ML, Jalali SS, Eetemadi S, Pilehvar MT, Minaei-Bidgoli B (2019) Persian stance classification dataset. In: Conference for Truth and Trust Online 2019","DOI":"10.36370\/tto.2019.30"},{"key":"4034_CR41","doi-asserted-by":"crossref","unstructured":"Zeng L, Starbird K, Spiro ES (2016) Rumors at the speed of light? modeling the rate of rumor transmission during crisis. In: 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp 1969\u20131978). IEEE","DOI":"10.1109\/HICSS.2016.248"},{"key":"4034_CR42","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1111\/hir.12115","volume":"32","author":"Z Zhang","year":"2015","unstructured":"Zhang Z, Zhang Z, Li H (2015) Predictors of the authenticity of internet health rumours. Health Info Libr J 32:195\u2013205","journal-title":"Health Info Libr J"},{"key":"4034_CR43","doi-asserted-by":"crossref","unstructured":"Zhang X, Ghorbani AA (2019) An overview of online fake news: characterization, detection, and discussion. Information Processing and Management, (p 102025)","DOI":"10.1016\/j.ipm.2019.03.004"},{"key":"4034_CR44","doi-asserted-by":"crossref","unstructured":"Zhang W, Skiena S (2010) Trading strategies to exploit blog and news sentiment. In: Fourth international conference on weblogs and social media, ICWSM 2010. Washington, DC, USA","DOI":"10.1609\/icwsm.v4i1.14075"},{"key":"4034_CR45","doi-asserted-by":"crossref","unstructured":"Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: Early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th International Conference on World Wide Web WWW \u201915 (pp 1395\u20131405). Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee","DOI":"10.1145\/2736277.2741637"},{"key":"4034_CR46","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","volume":"13","author":"L Zhou","year":"2004","unstructured":"Zhou L, Burgoon JK, Nunamaker JF, Twitchell D (2004) Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decis Negot 13:81\u2013106","journal-title":"Group Decis Negot"},{"key":"4034_CR47","doi-asserted-by":"crossref","unstructured":"Zubiaga A, Liakata M, Procter R (2017) Exploiting context for rumour detection in social media. In: International Conference on Social Informatics (pp 109\u2013123). Springer","DOI":"10.1007\/978-3-319-67217-5_8"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04034-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-04034-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04034-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:06:06Z","timestamp":1744203966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-04034-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,24]]},"references-count":47,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["4034"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-04034-1","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2022,6,24]]},"assertion":[{"value":"29 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}