{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:05Z","timestamp":1761401885076,"version":"3.37.3"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s13278-017-0449-y","type":"journal-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T12:20:46Z","timestamp":1499689246000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Adult content consumption in online social networks"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2852-8371","authenticated-orcid":false,"given":"Mauro","family":"Coletto","sequence":"first","affiliation":[]},{"given":"Luca Maria","family":"Aiello","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Lucchese","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Silvestri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"449_CR1","doi-asserted-by":"crossref","unstructured":"Adamic LA, Glance N (2005) The political blogosphere and the 2004 us election: divided they blog. In: International workshop on Link discovery. ACM","DOI":"10.1145\/1134271.1134277"},{"key":"449_CR2","series-title":"Human-computer interaction series","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-319-23835-7_5","volume-title":"User community discovery","author":"LM Aiello","year":"2015","unstructured":"Aiello LM (2015) Group types in social media. In: Paliouras G, Papadopoulos S, Vogiatzis D, Kompatsiaris Y (eds) User community discovery. Human-computer interaction series. Springer, Berlin, pp 97\u2013134"},{"key":"449_CR3","doi-asserted-by":"crossref","unstructured":"Aiello LM, Barrat A, Cattuto C, Ruffo G, Schifanella R (2010) Link creation and profile alignment in the aNobii social network. In: SocialCom","DOI":"10.1109\/SocialCom.2010.42"},{"issue":"2","key":"449_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2180861.2180866","volume":"6","author":"LM Aiello","year":"2012","unstructured":"Aiello LM, Barrat A, Schifanella R, Cattuto C, Markines B, Menczer F (2012) Friendship prediction and homophily in social media. ACM Trans Web 6(2):1\u201333","journal-title":"ACM Trans Web"},{"issue":"2","key":"449_CR5","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1111\/j.1468-2958.1995.tb00368.x","volume":"22","author":"M Allen","year":"1995","unstructured":"Allen M, D\u2019Alessio D, Brezgel K (1995) A meta-analysis summarizing the effects of pornography II aggression after exposure. Hum Commun Res 22(2):258\u2013283","journal-title":"Hum Commun Res"},{"issue":"1","key":"449_CR6","doi-asserted-by":"crossref","first-page":"20","DOI":"10.5465\/amr.1989.4278999","volume":"14","author":"BE Ashforth","year":"1989","unstructured":"Ashforth BE, Mael F (1989) Social identity theory and the organization. Acad Manag Rev 14(1):20\u201339","journal-title":"Acad Manag Rev"},{"issue":"2","key":"449_CR7","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s12119-005-1008-7","volume":"9","author":"F Attwood","year":"2005","unstructured":"Attwood F (2005) What do people do with porn? Qualitative research into the consumption, use, and experience of pornography and other sexually explicit media. Sex Cult 9(2):65\u201386","journal-title":"Sex Cult"},{"key":"449_CR8","doi-asserted-by":"crossref","unstructured":"Barbieri N, Bonchi F, Manco G (2013) Cascade-based community detection. In: WSDM. ACM","DOI":"10.1145\/2433396.2433403"},{"issue":"2","key":"449_CR9","doi-asserted-by":"crossref","first-page":"02","DOI":"10.1371\/journal.pone.0118093","volume":"10","author":"A Bessi","year":"2015","unstructured":"Bessi A, Coletto M, Davidescu GA, Scala A, Caldarelli G, Quattrociocchi W (2015) Science vs conspiracy: collective narratives in the age of misinformation. PloS one 10(2):02","journal-title":"PloS one"},{"key":"449_CR10","doi-asserted-by":"crossref","unstructured":"Blackburn J, Simha R, Kourtellis N, Zuo X, Ripeanu M, Skvoretz J, Iamnitchi A (2012) Branded with a scarlet c: cheaters in a gaming social network. In: WWW: proceedings of the 21st international conference on World Wide Web. ACM, New York, NY, USA, pp 81\u201390","DOI":"10.1145\/2187836.2187848"},{"issue":"10","key":"449_CR11","doi-asserted-by":"crossref","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech Theory Exp 2008(10):P10008","journal-title":"J Stat Mech Theory Exp"},{"issue":"2","key":"449_CR12","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1177\/1357034X12440827","volume":"18","author":"N Boero","year":"2012","unstructured":"Boero N, Pascoe CJ (2012) Pro-anorexia communities and online interaction: bringing the pro-ana body online. Body Soc 18(2):27\u201357","journal-title":"Body Soc"},{"issue":"1","key":"449_CR13","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/BF02908761","volume":"9","author":"T Buzzell","year":"2005","unstructured":"Buzzell T (2005) Demographic characteristics of persons using pornography in three technological contexts. Sex Cult 9(1):28\u201348","journal-title":"Sex Cult"},{"issue":"10\u201317","key":"449_CR14","first-page":"30","volume":"10","author":"M Cha","year":"2010","unstructured":"Cha M, Haddadi H, Benevenuto F, Gummadi PK (2010) Measuring user influence in twitter: the million follower fallacy. Icwsm 10(10\u201317):30","journal-title":"Icwsm"},{"issue":"1","key":"449_CR15","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2224\/sbp.2013.41.1.157","volume":"41","author":"A-S Chen","year":"2013","unstructured":"Chen A-S, Leung M, Chen C-H, Yang SC (2013) Exposure to internet pornography among taiwanese adolescents. Soc Behav Pers Int J 41(1):157\u2013164","journal-title":"Soc Behav Pers Int J"},{"key":"449_CR16","doi-asserted-by":"crossref","unstructured":"Cheng J, Adamic L, Dow PA, Kleinberg JM, Leskovec J (2014) Can cascades be predicted? In: Proceedings of the 23rd international conference on World Wide Web. ACM, pp 925\u2013936","DOI":"10.1145\/2566486.2567997"},{"issue":"21","key":"449_CR17","doi-asserted-by":"crossref","first-page":"2249","DOI":"10.1056\/NEJMsa0706154","volume":"358","author":"NA Christakis","year":"2008","unstructured":"Christakis NA, Fowler JH (2008) The collective dynamics of smoking in a large social network. N Engl J Med 358(21):2249\u20132258","journal-title":"N Engl J Med"},{"key":"449_CR18","volume-title":"Sociology of deviant behavior","author":"M Clinard","year":"2015","unstructured":"Clinard M, Meier R (2015) Sociology of deviant behavior. Wadsworth Cengage Learning, Boston"},{"key":"449_CR19","doi-asserted-by":"crossref","unstructured":"Coletto M, Aiello LM, Lucchese C, Silvestri F (2016) On the behaviour of deviant communities in online social networks. In: ICWSM 2016. K\u00f6ln, Germany","DOI":"10.1007\/s13278-017-0449-y"},{"key":"449_CR20","unstructured":"Conover M, Ratkiewicz J, Francisco M, Gon\u00e7alves B, Menczer F, Flammini A (2011) Political polarization on twitter. In: ICWSM"},{"key":"449_CR21","volume-title":"The experience of \u2018bad\u2019behavior in online social spaces: a survey of online users","author":"JP Davis","year":"2002","unstructured":"Davis JP (2002) The experience of \u2018bad\u2019behavior in online social spaces: a survey of online users. Social Computing Group, Microsoft Research, Redmond"},{"key":"449_CR22","doi-asserted-by":"crossref","unstructured":"De Choudhury M (2015) Anorexia on tumblr: a characterization study. In: Digital health. ACM","DOI":"10.1145\/2750511.2750515"},{"issue":"4","key":"449_CR23","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/1734213.1734219","volume":"57","author":"S Dolev","year":"2010","unstructured":"Dolev S, Elovici Y, Puzis R (2010) Routing betweenness centrality. J ACM (JACM) 57(4):25","journal-title":"J ACM (JACM)"},{"key":"449_CR24","unstructured":"Dow PA, Adamic LA, Friggeri A (2013) The anatomy of large facebook cascades. In: ICWSM"},{"issue":"1","key":"449_CR25","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1002\/job.243","volume":"25","author":"PD Dunlop","year":"2004","unstructured":"Dunlop PD, Lee K (2004) Workplace deviance, organizational citizenship behavior, and business unit performance: the bad apples do spoil the whole barrel. J Organ Behav 25(1):67\u201380","journal-title":"J Organ Behav"},{"key":"449_CR26","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, crowds, and markets: reasoning about a highly connected world","author":"D Easley","year":"2010","unstructured":"Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge"},{"issue":"6","key":"449_CR27","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1086\/229693","volume":"96","author":"SL Feld","year":"1991","unstructured":"Feld SL (1991) Why your friends have more friends than you do. Am J Sociol 96(6):1464\u20131477","journal-title":"Am J Sociol"},{"key":"449_CR28","unstructured":"Feller A, Kuhnert M, Sprenger TO, Welpe IM (2011) Divided they tweet: the network structure of political microbloggers and discussion topics. In: ICWSM"},{"issue":"3","key":"449_CR29","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1080\/1468199031000153973","volume":"18","author":"M Ferree","year":"2003","unstructured":"Ferree M (2003) Women and the web: cybersex activity and implications. Sex Relationsh Ther 18(3):385\u2013393","journal-title":"Sex Relationsh Ther"},{"issue":"3","key":"449_CR30","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010) Community detection in graphs. Phys Rep 486(3):75\u2013174","journal-title":"Phys Rep"},{"issue":"3","key":"449_CR31","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1177\/1049732307311640","volume":"18","author":"J Gavin","year":"2008","unstructured":"Gavin J, Rodham K, Poyer H (2008) The presentation of \u201cpro-anorexia\u201d in online group interactions. Qual Health Res 18(3):325\u2013333","journal-title":"Qual Health Res"},{"key":"449_CR32","doi-asserted-by":"crossref","unstructured":"Grabowicz PA, Aiello LM, Eguiluz VM, Jaimes A (2013) Distinguishing topical and social groups based on common identity and bond theory. In: WSDM. ACM","DOI":"10.1145\/2433396.2433475"},{"key":"449_CR33","unstructured":"Guerra PHC, Meira\u00a0Jr, W, Cardie C, Kleinberg R (2013) A measure of polarization on social media networks based on community boundaries. In: ICWSM"},{"key":"449_CR34","volume-title":"Online negative enabling support groups","author":"SM Haas","year":"2010","unstructured":"Haas SM, Irr ME, Jennings NA, Wagner LM (2010) Online negative enabling support groups. New Media & Society, Beverley Hills"},{"issue":"5","key":"449_CR35","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/s10508-006-9064-0","volume":"35","author":"GM Hald","year":"2006","unstructured":"Hald GM (2006) Gender differences in pornography consumption among young heterosexual danish adults. Arch Sex Behav 35(5):577\u2013585","journal-title":"Arch Sex Behav"},{"issue":"4","key":"449_CR36","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1111\/jcom.12037","volume":"63","author":"GM Hald","year":"2013","unstructured":"Hald GM, Malamuth NN, Lange T (2013) Pornography and sexist attitudes among heterosexuals. J Commun 63(4):638\u2013660","journal-title":"J Commun"},{"issue":"7","key":"449_CR37","first-page":"1","volume":"53","author":"GM Hald","year":"2015","unstructured":"Hald GM, \u0160tulhofer A (2015) What types of pornography do people use and do they cluster? Assessing types and categories of pornography consumption in a large-scale online sample. J Sex Res 53(7):1\u201311","journal-title":"J Sex Res"},{"key":"449_CR38","unstructured":"Hodas NO, Kooti F, Lerman K (2013) Friendship paradox redux: your friends are more interesting than you. In: ICWSM"},{"key":"449_CR39","doi-asserted-by":"crossref","unstructured":"Kayes I, Kourtellis N, Quercia D, Iamnitchi A, Bonchi F (2015) The social world of content abusers in community question answering. In: WWW: proceedings of the 24th international conference on World Wide Web. ACM, New York, NY, USA, pp 570\u2013580","DOI":"10.1145\/2736277.2741674"},{"issue":"11","key":"449_CR40","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak M, Gallos LK, Havlin S, Liljeros F, Muchnik L, Stanley HE, Makse HA (2010) Identification of influential spreaders in complex networks. Nat Phys 6(11):888\u2013893","journal-title":"Nat Phys"},{"issue":"7","key":"449_CR41","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1001\/jamapsychiatry.2014.93","volume":"71","author":"S K\u00fchn","year":"2014","unstructured":"K\u00fchn S, Gallinat J (2014) Brain structure and functional connectivity associated with pornography consumption: the brain on porn. JAMA Psychiatry 71(7):827\u2013834","journal-title":"JAMA Psychiatry"},{"issue":"4","key":"449_CR42","doi-asserted-by":"publisher","first-page":"4","DOI":"10.5817\/CP2014-4-4","volume":"8","author":"IL Kvalem","year":"2014","unstructured":"Kvalem IL, Tr\u00e6en B, Lewin B, \u0160tulhofer A (2014) Self-perceived effects of internet pornography use, genital appearance satisfaction, and sexual self-esteem among young Scandinavian adults. Cyberpsychol J Psychosoc Res Cyberspace 8(4):4. doi: 10.5817\/CP2014-4-4","journal-title":"Cyberpsychol J Psychosoc Res Cyberspace"},{"key":"449_CR44","doi-asserted-by":"crossref","unstructured":"Lee L-H, Chen H-H (2011) Collaborative cyberporn filtering with collective intelligence. In: SIGIR. ACM","DOI":"10.1145\/2009916.2010095"},{"issue":"2","key":"449_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0147617","volume":"11","author":"K Lerman","year":"2016","unstructured":"Lerman K, Yan X, Wu X-Z (2016) The \u201cmajority illusion\u201d in social networks. PLoS One 11(2):1\u201313","journal-title":"PLoS One"},{"key":"449_CR46","doi-asserted-by":"crossref","unstructured":"Leskovec J, Horvitz E (2008) Planetary-scale views on a large instant-messaging network. In: Proceedings of the 17th international conference on World Wide Web. ACM, pp 915\u2013924","DOI":"10.1145\/1367497.1367620"},{"key":"449_CR47","doi-asserted-by":"crossref","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2005) Graphs over time: densification laws, shrinking diameters and possible explanations. In: ACM SIGKDD. ACM","DOI":"10.1145\/1081870.1081893"},{"key":"449_CR48","doi-asserted-by":"crossref","unstructured":"Leskovec J, McGlohon M, Faloutsos C, Glance NS, Hurst M (2007) Patterns of cascading behavior in large blog graphs. In: SDM, vol 7. SIAM, pp 551\u2013556","DOI":"10.1137\/1.9781611972771.60"},{"issue":"1","key":"449_CR49","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1140\/epjds\/s13688-014-0008-y","volume":"3","author":"D Martin-Borregon","year":"2014","unstructured":"Martin-Borregon D, Aiello LM, Grabowicz P, Jaimes A, Baeza-Yates R (2014) Characterization of online groups along space, time, and social dimensions. EPJ Data Sci 3(1):8","journal-title":"EPJ Data Sci"},{"issue":"3","key":"449_CR50","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1177\/0044118X02250123","volume":"34","author":"KJ Mitchell","year":"2003","unstructured":"Mitchell KJ, Finkelhor D, Wolak J (2003) The exposure of youth to unwanted sexual material on the internet a national survey of risk, impact, and prevention. Youth Soc 34(3):330\u2013358","journal-title":"Youth Soc"},{"issue":"6","key":"449_CR51","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1016\/j.chb.2010.04.017","volume":"26","author":"EM Morgan","year":"2010","unstructured":"Morgan EM, Snelson C, Elison-Bowers P (2010) Image and video disclosure of substance use on social media websites. Comput Hum Behav 26(6):1405\u20131411","journal-title":"Comput Hum Behav"},{"key":"449_CR52","doi-asserted-by":"crossref","unstructured":"Negoescu RA, Gatica-Perez D (2008) Analyzing flickr groups. In: CIVR. ACM, New York, NY, USA","DOI":"10.1145\/1386352.1386406"},{"issue":"23","key":"449_CR53","doi-asserted-by":"crossref","first-page":"8577","DOI":"10.1073\/pnas.0601602103","volume":"103","author":"ME Newman","year":"2006","unstructured":"Newman ME (2006) Modularity and community structure in networks. Proc Natl Acad Sci 103(23):8577\u20138582","journal-title":"Proc Natl Acad Sci"},{"issue":"3","key":"449_CR54","doi-asserted-by":"crossref","first-page":"032805","DOI":"10.1103\/PhysRevE.92.032805","volume":"92","author":"V Nicosia","year":"2015","unstructured":"Nicosia V, Latora V (2015) Measuring and modeling correlations in multiplex networks. Phys Rev E 92(3):032805","journal-title":"Phys Rev E"},{"key":"449_CR55","volume-title":"Handbook of graphs and networks: from the genome to the internet","author":"R Pastor-Satorras","year":"2002","unstructured":"Pastor-Satorras R, Vespignani A (2002) Epidemics and immunization in scale-free networks. In: Bornholdt S, Schuster HG (eds) Handbook of graphs and networks: from the genome to the internet. Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim"},{"issue":"1","key":"449_CR56","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/019722496129693","volume":"12","author":"DJ Phillips","year":"1996","unstructured":"Phillips DJ (1996) Defending the boundaries: identifying and countering threats in a usenet newsgroup. Inf Soc 12(1):39\u201362","journal-title":"Inf Soc"},{"key":"449_CR57","unstructured":"Pingdom (2012) Report: social network demographics in 2012. In: Pingdom.com Tech Blog"},{"issue":"37","key":"449_CR58","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1590\/S1414-32832011005000018","volume":"15","author":"JdS Ramos","year":"2011","unstructured":"Ramos JdS, Pereira Neto AdF, Bagrichevsky M (2011) Pro-anorexia cultural identity: characteristics of a lifestyle in a virtual community. Interface (Botucatu) 15(37):447\u2013460","journal-title":"Interface (Botucatu)"},{"key":"449_CR59","unstructured":"Ratkiewicz J, Conover M, Meiss M, Gon\u00e7alves B, Patil S, Flammini A, Menczer F (2011) Detecting and tracking the spread of astroturf memes in microblog streams. In: WWW"},{"key":"449_CR60","unstructured":"Romero DM, Tan C, Ugander J (2013) On the interplay between social and topical structure. In: ICWSM"},{"issue":"4","key":"449_CR61","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1177\/1059840514563313","volume":"31","author":"P Romito","year":"2015","unstructured":"Romito P, Beltramini L (2015) Factors associated with exposure to violent or degrading pornography among high school students. J Sch Nurs 31(4):280\u2013290","journal-title":"J Sch Nurs"},{"issue":"6","key":"449_CR62","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1089\/cpb.2007.0179","volume":"11","author":"C Sabina","year":"2008","unstructured":"Sabina C, Wolak J, Finkelhor D (2008) The nature and dynamics of internet pornography exposure for youth. Cyberpshychol Behav 11(6):691\u2013693","journal-title":"Cyberpshychol Behav"},{"key":"449_CR63","doi-asserted-by":"crossref","unstructured":"Schifanella R, Barrat A, Cattuto C, Markines B, Menczer F (2010) Folks in folksonomies: social link prediction from shared metadata. In: WSDM. ACM","DOI":"10.1145\/1718487.1718521"},{"key":"449_CR64","unstructured":"Schuhmacher M, Zirn C, V\u00f6lker J (2013) Exploring youporn categories, tags, and nicknames for pleasant recommendations. In: Workshop on search and exploration of X-rated information. ACM"},{"key":"449_CR65","doi-asserted-by":"crossref","unstructured":"Shores KB, He Y, Swanenburg KL, Kraut R, Riedl J (2014) The identification of deviance and its impact on retention in a multiplayer game. In: CSCW: proceedings of the 17th ACM conference on computer supported cooperative work and social computing. ACM, New York, NY, USA, pp 1356\u20131365","DOI":"10.1145\/2531602.2531724"},{"issue":"3","key":"449_CR66","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1089\/cpb.1998.1.275","volume":"1","author":"JR Suler","year":"1998","unstructured":"Suler JR, Phillips WL (1998) The bad boys of cyberspace: deviant behavior in a multimedia chat community. Cyberpsychol Behav 1(3):275\u2013294","journal-title":"Cyberpsychol Behav"},{"key":"449_CR67","unstructured":"Thibaut JW, Kelley HH (1959) The social psychology of groups. In: Database: PsycINFO"},{"key":"449_CR68","doi-asserted-by":"crossref","unstructured":"Tyson G, Elkhatib Y, Sastry N, Uhlig S (2013) Demystifying porn 2.0: a look into a major adult video streaming website. In: IMC. ACM","DOI":"10.1145\/2504730.2504739"},{"key":"449_CR69","unstructured":"Tyson G, Elkhatib Y, Sastry N, Uhlig S (2015) Are people really social in porn 2.0? In: ICWSM"},{"key":"449_CR70","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications, vol 8. Cambridge University Press, Cambridge"},{"issue":"2","key":"449_CR71","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1177\/1046496406286420","volume":"37","author":"JM Wellen","year":"2006","unstructured":"Wellen JM, Neale M (2006) Deviance, self-typicality, and group cohesion the corrosive effects of the bad apples on the barrel. Small Group Res 37(2):165\u2013186","journal-title":"Small Group Res"},{"issue":"2","key":"449_CR72","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1542\/peds.2006-1891","volume":"119","author":"J Wolak","year":"2007","unstructured":"Wolak J, Mitchell K, Finkelhor D (2007) Unwanted and wanted exposure to online pornography in a national sample of youth internet users. Pediatrics 119(2):247\u2013257","journal-title":"Pediatrics"},{"issue":"10","key":"449_CR73","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/1400181.1400198","volume":"51","author":"J Xu","year":"2008","unstructured":"Xu J, Chen H (2008) The topology of dark networks. Commun ACM 51(10):58\u201365","journal-title":"Commun ACM"},{"issue":"5","key":"449_CR74","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1089\/cpb.2005.8.473","volume":"8","author":"ML Ybarra","year":"2005","unstructured":"Ybarra ML, Mitchell KJ (2005) Exposure to internet pornography among children and adolescents: a national survey. Cyberpsychol Behav 8(5):473\u2013486","journal-title":"Cyberpsychol Behav"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-017-0449-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-017-0449-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-017-0449-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T05:05:08Z","timestamp":1569733508000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-017-0449-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["449"],"URL":"https:\/\/doi.org\/10.1007\/s13278-017-0449-y","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2017,7,10]]},"article-number":"28"}}