{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:44:46Z","timestamp":1775367886023,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s13278-020-00719-7","type":"journal-article","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T15:50:40Z","timestamp":1610207440000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":78,"title":["Information diffusion modeling and analysis for socially interacting networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Pawan","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9870-7383","authenticated-orcid":false,"given":"Adwitiya","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,9]]},"reference":[{"issue":"1","key":"719_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s10115-013-0671-5","volume":"38","author":"B Aditya Prakash","year":"2014","unstructured":"Aditya Prakash B, Vreeken J, Faloutsos C (2014) Efficiently spotting the starting points of an epidemic in a large graph. Knowl Inf Syst 38(1):35\u201359","journal-title":"Knowl Inf Syst"},{"key":"719_CR2","doi-asserted-by":"crossref","unstructured":"Bo X, Liu L (2010) Information diffusion through online social networks. In: IEEE international conference on emergency management and management sciences (ICEMMS), Beijing, China, Aug 2010","DOI":"10.1109\/ICEMMS.2010.5563505"},{"key":"719_CR3","doi-asserted-by":"crossref","unstructured":"Broecheler M, Shakarian P, Subrahmanian VS (2010) A scalable framework for modeling competitive diffusion in social networks. In: IEEE international conference on social computing, privacy, security, risk and trust, Minneapolis MN, Aug 2010.","DOI":"10.1109\/SocialCom.2010.49"},{"key":"719_CR4","doi-asserted-by":"crossref","unstructured":"Cheng J, Kleinberg J, Leskovec J, Liben-Nowell D, State B, Subbian K, Adamic L (2018) Do Diffusion protocols govern cascade growth?. arXiv preprint arXiv:1805.07368, May 2018.","DOI":"10.1609\/icwsm.v12i1.15023"},{"key":"719_CR5","doi-asserted-by":"crossref","unstructured":"Cho E, Myers SA, Leskovec J (2017) Friendship and mobility: user movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery & data mining, pp 1082\u20131090, Aug 2011","DOI":"10.1145\/2020408.2020579"},{"key":"719_CR6","first-page":"1","volume":"99","author":"P Di Giamberardino","year":"2017","unstructured":"Di Giamberardino P, Compagnucci L, De Giorgi C, Iacoviello D (2017) Modeling the effects of prevention and early diagnosis on HIV\/AIDS infection diffusion. IEEE Trans Syst Man Cybern Syst 99:1\u201312","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"3","key":"719_CR7","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSC.2014.2310216","volume":"7","author":"M Doo","year":"2014","unstructured":"Doo M, Liu L (2014) Probabilistic diffusion of social influence with incentives. IEEE Trans Serv Comput 7(3):387\u2013400","journal-title":"IEEE Trans Serv Comput"},{"key":"719_CR8","volume-title":"MODM: multi-objective diffusion model for dynamic social networks using evolutionary algorithm","author":"I Fatima","year":"2013","unstructured":"Fatima I, Fahim M, Lee Y-K, Lee S (2013) MODM: multi-objective diffusion model for dynamic social networks using evolutionary algorithm. Springer, New York"},{"key":"719_CR9","doi-asserted-by":"crossref","unstructured":"Fouad MR, Elbassioni K, Bertino E (2012) Modeling the risk & amp: utility of information sharing in social networks. In: IEEE international conference on privacy, security, risk and trust (PASSAT) and social computing (SocialCom), Amsterdam, Netherlands, pp 441\u2013450, Sept 2012","DOI":"10.1109\/SocialCom-PASSAT.2012.131"},{"key":"719_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/9781400833993","volume-title":"Social and economics networks","author":"MO Jackson","year":"2008","unstructured":"Jackson MO (2008) Social and economics networks. Princeton University Press, Princeton, pp 1\u2013520"},{"issue":"2","key":"719_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TSMC.2014.2339198","volume":"45","author":"Y Jiang","year":"2015","unstructured":"Jiang Y, Jiang JC ( 2015) Diffusion in social networks: a multiagent perspective. IEEE Trans Syst Man Cybern Syst 45(2):198\u2013213","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"17","key":"719_CR12","doi-asserted-by":"publisher","first-page":"4573","DOI":"10.1109\/TSP.2014.2339799","volume":"62","author":"C Jiang","year":"2014","unstructured":"Jiang C, Chen Y, Liu KJR (2014) Evolutionary dynamics of information diffusion over social networks. IEEE Trans Signal Process 62(17):4573\u20134586","journal-title":"IEEE Trans Signal Process"},{"issue":"7","key":"719_CR13","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TSMC.2016.2531690","volume":"47","author":"K Kandhway","year":"2017","unstructured":"Kandhway K, Kuri J (2017) Using Node centrality and optimal control to maximize information diffusion in social networks. IEEE Trans Syst Man Cybern Syst 47(7):1099\u20131110","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"719_CR14","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery & data mining, pp 137\u2013146, Aug 2003","DOI":"10.1145\/956750.956769"},{"key":"719_CR15","doi-asserted-by":"crossref","unstructured":"Krishna Kumar KP , Geethakumari G (2013) Information diffusion model for spread of misinformation in online social networks. In: IEEE international conference on advances in computing, communications and informatics (ICACCI), Mysore, India, pp 1172\u20131177, Aug. 2013","DOI":"10.1109\/ICACCI.2013.6637343"},{"key":"719_CR16","doi-asserted-by":"crossref","unstructured":"Kumar P, Sinha A (2016) Real-time analysis and visualization of online social media dynamics. In: IEEE international conference on next generation computing technologies, Dehradun, pp 362\u2013367, Oct 2016","DOI":"10.1109\/NGCT.2016.7877442"},{"key":"719_CR17","doi-asserted-by":"crossref","unstructured":"Kuo TT, Hung SC, Lin WS, Lin SD, Peng TC, Shih CC (2011) Assessing the quality of diffusion models using real-world social network data. In: IEEE international conference on technologies and applications of artificial intelligence (TAAI), Chung-Li, China, pp 200\u2013205, Nov 2011","DOI":"10.1109\/TAAI.2011.42"},{"issue":"1","key":"719_CR18","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s13278-016-0406-1","volume":"6","author":"S Lamprier","year":"2016","unstructured":"Lamprier S, Bourigault S, Gallinari P (2016) Influence learning for cascade diffusion models: focus on partial orders of infections. Soc Netw Anal Min 6(1):93","journal-title":"Soc Netw Anal Min"},{"issue":"1","key":"719_CR19","doi-asserted-by":"publisher","first-page":"1-es","DOI":"10.1145\/1217299.1217301","volume":"1","author":"J Leskovec","year":"2007","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2007) Graph Evolution: Densification and Shrinking Diameters. ACM Trans Knowl Discov Data 1(1):1-es","journal-title":"ACM Trans Knowl Discov Data"},{"key":"719_CR20","doi-asserted-by":"crossref","unstructured":"Li Y, Chen Z (2007) Diffusion of Innovations in a Small World Network. In: IEEE international conference on wireless communications, networking and mobile computing, Shanghai, China, Sept 2007.","DOI":"10.1109\/WICOM.2007.1376"},{"key":"719_CR21","doi-asserted-by":"crossref","unstructured":"Mahdi K, Torabi S, Safar M (2010) Diffusion and reverse diffusion processes in social networks: analysis using the degree of diffusion. In: IEEE international conference on Ubi-media computing (U-Media), Jinhua, July 2010","DOI":"10.1109\/UMEDIA.2010.5544484"},{"key":"719_CR23","unstructured":"McAuley J, Leskovec L (2012) Learning to discover social circles in ego networks. In: NIPS"},{"key":"719_CR24","doi-asserted-by":"crossref","unstructured":"Mini U, Jacob P (2014) Information diffusion through social media-analysing brand promotion through social network analysis tools-a business case Study. In: IEEE conference on IT business, industry and government (CSIBIG), pp. 1\u20134, Indore, India, March 2014","DOI":"10.1109\/CSIBIG.2014.7057007"},{"key":"719_CR25","doi-asserted-by":"crossref","unstructured":"Niu J, Huang S, Shu L, Stojmenovic I (2013) Activities information diffusion in chinese largest recommendation social network: patterns and generative model. In: IEEE international conference on global communications (GLOBECOM), Atlanta GA, pp 3083\u20133088, Dec 2013","DOI":"10.1109\/GLOCOM.2013.6831545"},{"key":"719_CR26","doi-asserted-by":"crossref","unstructured":"Rosa D, Giua A (2013) A non-progressive model of innovation diffusion in social networks. In: IEEE conference on decision and control, florence, Italy, Dec 2013","DOI":"10.1109\/CDC.2013.6760869"},{"issue":"12","key":"719_CR27","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/TSMC.1979.4310134","volume":"9","author":"D Sahal","year":"1979","unstructured":"Sahal D (1979) The temporal and spatial aspects of diffusion of technology. IEEE Trans Syst Man Cybern Syst 9(12):829\u2013839","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"719_CR28","doi-asserted-by":"crossref","unstructured":"Sato Y, Shimokawa H, Ata S, Oka I (2012) Towards social networking: a proof-of-concept model. In: IEEE international conference on privacy, security, risk and trust (PASSAT) and social computing (SocialCom), Amterdam, Netherlands, pp 526\u2013531, Sept 2012","DOI":"10.1109\/SocialCom-PASSAT.2012.82"},{"key":"719_CR29","doi-asserted-by":"crossref","unstructured":"Shi H-w, Zhao A-m, Th H, Bressers A, Deboer C (2011) The optimization of the knowledge diffusion processes and an innovation service relationship model in the context of social networks. In: IEEE international conference on industrial engineering and engineering management (IE&EM), Changchun, China, pp 1418\u20131423, Sept 2011","DOI":"10.1109\/ICIEEM.2011.6035422"},{"key":"719_CR30","unstructured":"European Union (2010) Social network overview: current trends and research challenges, Nov 2010."},{"key":"719_CR31","doi-asserted-by":"crossref","unstructured":"Wang F, Wang H, Xu K, Wu J, Jia X (2013) Characterizing information diffusion in online social networks with linear diffusive model. In: IEEE international conference on distributed computing systems (ICDCS), Philadelphia PA, pp 307\u2013316, July 2013","DOI":"10.1109\/ICDCS.2013.14"},{"issue":"2","key":"719_CR32","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TSMC.2014.2359857","volume":"45","author":"Y Wang","year":"2014","unstructured":"Wang Y, Vasilakos AV, Ma J, Xiong N (2014) On studying the impact of uncertainty on behavior diffusion in social networks. IEEE Trans Syst Man Cybern Syst 45(2):185\u2013197","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"719_CR33","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1007\/s42452-019-1701-z","volume":"1","author":"S Yadav","year":"2009","unstructured":"Yadav S, Sinha A, Kumar P (2009) Multi-attribute identity resolution for online social network. SN Applied Sciences 1:1653","journal-title":"SN Applied Sciences"},{"key":"719_CR34","doi-asserted-by":"crossref","unstructured":"Yagan O, Qian D, Zhang J, Cochran D (2012) Information diffusion in overlaying social-physical networks. In: IEEE annual conference on information sciences and systems (CISS), Princeton NJ, pp 1\u20136, March 2012","DOI":"10.1109\/CISS.2012.6310749"},{"key":"719_CR35","doi-asserted-by":"crossref","unstructured":"Yin H, Benson AR, Leskovec J, Gleich DF (2017) Local higher-order graph clustering. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/3097983.3098069"},{"issue":"1","key":"719_CR36","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/TEM.2013.2259495","volume":"61","author":"MA Zaffar","year":"2014","unstructured":"Zaffar MA, Kumar RL, Zhao K (2014) Impact of interorganizational relationships on technology diffusion: an agent-based simulation modeling approach. IEEE Trans Eng Manag 61(1):68\u201379","journal-title":"IEEE Trans Eng Manag"},{"issue":"4","key":"719_CR37","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/JSTSP.2014.2314858","volume":"8","author":"J Zhang","year":"2014","unstructured":"Zhang J, Moura JMF (2014) Diffusion in social networks as sis epidemics: beyond full mixing and complete graphs. IEEE J Select Top Signal Process 8(4):537\u2013551","journal-title":"IEEE J Select Top Signal Process"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00719-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-020-00719-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00719-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T06:39:13Z","timestamp":1744180753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-020-00719-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,9]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["719"],"URL":"https:\/\/doi.org\/10.1007\/s13278-020-00719-7","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,9]]},"assertion":[{"value":"20 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"11"}}