{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T18:10:21Z","timestamp":1673719821580},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Science Foundation","award":["1849053","1934884"],"award-info":[{"award-number":["1849053","1934884"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s13278-021-00763-x","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T18:04:43Z","timestamp":1625162683000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Measuring the impact of influence on individuals: roadmap to quantifying attitude"],"prefix":"10.1007","volume":"11","author":[{"given":"Xiaoyun","family":"Fu","sequence":"first","affiliation":[]},{"given":"Madhavan","family":"Padmanabhan","sequence":"additional","affiliation":[]},{"given":"Raj Gaurav","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Samik","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Shawn","family":"Dorius","sequence":"additional","affiliation":[]},{"given":"A.","family":"Pavan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,1]]},"reference":[{"key":"763_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Khan A, Yan X (2011) On flow authority discovery in social networks. In: Proceedings of SIAM international conference on data mining, pp 522\u2013533","DOI":"10.1137\/1.9781611972818.45"},{"key":"763_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1146\/annurev.psych.52.1.27","volume":"52","author":"I Ajzen","year":"2001","unstructured":"Ajzen I (2001) Nature and operation of attitudes. Annu Rev Psychol 52:27\u201358","journal-title":"Annu Rev Psychol"},{"issue":"6092","key":"763_CR3","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1126\/science.1215842","volume":"337","author":"S Aral","year":"2012","unstructured":"Aral S, Walker D (2012) Identifying influential and susceptible members of social networks. Science 337(6092):337\u2013341","journal-title":"Science"},{"key":"763_CR4","doi-asserted-by":"crossref","unstructured":"Arora A, Galhotra S, Ranu S (2017) Debunking the myths of influence maximization: An in-depth benchmarking study. In: SIGMOD, pp 651\u2013666","DOI":"10.1145\/3218967"},{"key":"763_CR5","doi-asserted-by":"crossref","unstructured":"Barbieri N, Bonchi F, Manco G (2012) Topic-aware social influence propagation models. In: ICDM, pp 81\u201390","DOI":"10.1109\/ICDM.2012.122"},{"key":"763_CR6","doi-asserted-by":"crossref","unstructured":"Bastian Mathieu, Heymann Sebastien (2009) and Mathieu Jacomy. An open source software for exploring and manipulating networks, Gephi","DOI":"10.1609\/icwsm.v3i1.13937"},{"issue":"10","key":"763_CR7","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp 2008(10):P10008","journal-title":"J Stat Mech: Theory Exp"},{"key":"763_CR8","doi-asserted-by":"crossref","unstructured":"Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: SODA, pp 946\u2013957","DOI":"10.1137\/1.9781611973402.70"},{"issue":"6","key":"763_CR9","doi-asserted-by":"publisher","first-page":"666","DOI":"10.14778\/2735703.2735706","volume":"8","author":"S Chen","year":"2015","unstructured":"Chen S, Fan J, Li G, Feng J, Tan K-L, Tang J (2015) Online topic-aware influence maximization. Proc VLDB Endow 8(6):666\u2013677","journal-title":"Proc VLDB Endow"},{"key":"763_CR10","doi-asserted-by":"crossref","unstructured":"Chen W, Collins A, Cummings R, Ke T, Liu Z, Rinc\u00f3n D, Sun X, Wang Y, Wei W, Yuan Y (2011) Influence maximization in social networks when negative opinions may emerge and propagate. In: SDM, pp 379\u2013390","DOI":"10.1137\/1.9781611972818.33"},{"key":"763_CR11","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: SIGKDD, pp 1029\u20131038","DOI":"10.1145\/1835804.1835934"},{"key":"763_CR12","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: KDD, pp 57\u201356","DOI":"10.1145\/502512.502525"},{"key":"763_CR13","unstructured":"Duane A, Scott J (1996) Understanding Change in Social Attitudes"},{"key":"763_CR14","volume-title":"Belief, attitude, intention, and behavior: an introduction to theory and research","author":"M Fishbein","year":"1975","unstructured":"Fishbein M, Ajzen I (1975) Belief, attitude, intention, and behavior: an introduction to theory and research. Addison-Wesley, Boston"},{"key":"763_CR15","unstructured":"Fowler James H, Christakis Nicholas A (2011) Connected: The surprising power of our social networks and how they shape our lives. Little, Brown Spark"},{"key":"763_CR16","doi-asserted-by":"crossref","unstructured":"Fu X, Padmanabhan M, Gaurav R, Basu S, Dorius S, Pavan A (2020) Measuring the impact of influence on individuals: Roadmap to quantifying attitude. In: IEEE\/ACM 2020 international conference on advances in social networks analysis and mining, ASONAM, pp 227\u2013231. IEEE Computer Society","DOI":"10.1109\/ASONAM49781.2020.9381300"},{"key":"763_CR17","doi-asserted-by":"crossref","unstructured":"Galhotra S, Arora A, Roy S (2016) Holistic influence maximization: combining scalability and efficiency with opinion-aware models. In: SIGMOD, pages 743\u2013758","DOI":"10.1145\/2882903.2882929"},{"key":"763_CR18","first-page":"199","volume":"13","author":"J Guo","year":"2013","unstructured":"Guo J, Zhang P, Zhou C, Cao Y, Guo L (2013) Personalized influence maximization on social networks. CIKM 13:199\u2013208","journal-title":"CIKM"},{"issue":"9","key":"763_CR19","doi-asserted-by":"publisher","first-page":"913","DOI":"10.14778\/3099622.3099623","volume":"10","author":"K Huang","year":"2017","unstructured":"Huang K, Wang S, Bevilacqua G, Xiao X, Lakshmanan LVS (2017) Revisiting the stop-and-stare algorithms for influence maximization. Proc VLDB Endow 10(9):913\u2013924","journal-title":"Proc VLDB Endow"},{"key":"763_CR20","first-page":"918","volume":"2012","author":"K Jung","year":"2012","unstructured":"Jung K, Heo W, Chen W (2012) IRIE: scalable and robust influence maximization in social networks. ICDM 2012:918\u2013923","journal-title":"ICDM"},{"key":"763_CR21","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: KDD, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"issue":"8","key":"763_CR22","first-page":"235","volume":"9","author":"A Krause","year":"2008","unstructured":"Krause A, Singh A, Guestrin C (2008) Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies. J Mach Learn Res 9(8):235\u2013284","journal-title":"J Mach Learn Res"},{"key":"763_CR23","doi-asserted-by":"crossref","unstructured":"Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: KDD, pp 420\u2013429","DOI":"10.1145\/1281192.1281239"},{"key":"763_CR24","first-page":"560","volume":"2011","author":"FH Li","year":"2011","unstructured":"Li FH, Li CT, Shan MK (2011) Labeled influence maximization in social networks for target marketing. PASSAT\/SocialCom 2011:560\u2013563","journal-title":"PASSAT\/SocialCom"},{"issue":"10","key":"763_CR25","first-page":"1070","volume":"8","author":"Y Li","year":"2015","unstructured":"Li Y, Zhang D, Tan K-L (2015) Real-time targeted influence maximization for online advertisements. VLDB 8(10):1070\u20131081","journal-title":"VLDB"},{"key":"763_CR26","doi-asserted-by":"crossref","unstructured":"Liu Q, Xiang B, Zhang L, Chen E, Tan C, Chen J (2013) Linear computation for independent social influence. In: IEEE 13th international conference on data mining, pp 468\u2013477","DOI":"10.1109\/ICDM.2013.48"},{"key":"763_CR27","doi-asserted-by":"crossref","unstructured":"Liu Q, Xiang B, Yuan NJ, Chen E, Xiong H, Zheng Y, Yang Y (2017) An influence propagation view of pagerank. ACM Trans Know Dis Data 11(3)","DOI":"10.1145\/3046941"},{"key":"763_CR28","doi-asserted-by":"crossref","unstructured":"Lu W, Lakshmanan LVS (2012) Profit maximization over social networks. In: ICDM, pp 479\u2013488","DOI":"10.1109\/ICDM.2012.145"},{"key":"763_CR29","doi-asserted-by":"crossref","unstructured":"Martin Shawn, Brown W\u00a0Michael, Klavans Richard, Boyack Kevin (01 2011) Openord: An open-source toolbox for large graph layout. Proc SPIE, 7868:786806","DOI":"10.1117\/12.871402"},{"key":"763_CR30","doi-asserted-by":"crossref","unstructured":"Nemhauser George, Wolsey Laurence, Fisher ML (1978) An analysis of approximations for maximizing submodular set functions. 14:265\u2013294","DOI":"10.1007\/BF01588971"},{"key":"763_CR31","doi-asserted-by":"crossref","unstructured":"Nguyen H, Thai M, Dinh T (2016) Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings SIGMOD, pp 695\u2013710","DOI":"10.1145\/2882903.2915207"},{"key":"763_CR32","first-page":"771","volume":"2018","author":"M Padmanabhan","year":"2018","unstructured":"Padmanabhan M, Somisetty N, Basu S, Pavan A (2018) Influence maximization in social networks with non-target constraints. IEEE International Conference on Big Data, Big Data 2018:771\u2013780","journal-title":"IEEE International Conference on Big Data, Big Data"},{"key":"763_CR33","unstructured":"Rokeach M (1970) Beliefs. Jossey-Bass, Attitudes and Values"},{"key":"763_CR34","first-page":"1683","volume":"16","author":"C Song","year":"2016","unstructured":"Song C, Hsu W, Lee ML (2016) Targeted influence maximization in social networks. Proc CIKM 16:1683\u20131692","journal-title":"Proc CIKM"},{"key":"763_CR35","doi-asserted-by":"crossref","unstructured":"Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: A martingale approach. In: SIGMOD, pages 1539\u20131554","DOI":"10.1145\/2723372.2723734"},{"key":"763_CR36","doi-asserted-by":"crossref","unstructured":"Tang Y, Xiao X, Shi Y (2014) Influence maximization: near-optimal time complexity meets practical efficiency. In: SIGMOD, pp 75\u201386","DOI":"10.1145\/2588555.2593670"},{"issue":"6380","key":"763_CR37","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi S, Roy D, Aral S (2018) The spread of true and false news online. Science 359(6380):1146\u20131151","journal-title":"Science"},{"issue":"2","key":"763_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/h0025848","volume":"9","author":"R Zajonc","year":"1968","unstructured":"Zajonc R (1968) Attitudinal effects of mere exposure. J Pers Soc Psychol 9(2):1\u201327","journal-title":"J Pers Soc Psychol"},{"key":"763_CR39","doi-asserted-by":"crossref","unstructured":"Zhang H, Dinh TN, Thai MT (2013) Maximizing the spread of positive influence in online social networks. In: ICDCS, pp 317\u2013326","DOI":"10.1109\/ICDCS.2013.37"},{"key":"763_CR40","doi-asserted-by":"crossref","unstructured":"Zhou C, Zhang P, Zang W, Guo L (2014) Maximizing the cumulative influence through a social network when repeat activation exists. In: International Conference on Computational Science, pp 422 \u2013 431","DOI":"10.1016\/j.procs.2014.05.038"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-021-00763-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-021-00763-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-021-00763-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T10:55:02Z","timestamp":1672656902000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-021-00763-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["763"],"URL":"https:\/\/doi.org\/10.1007\/s13278-021-00763-x","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,1]]},"assertion":[{"value":"15 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"61"}}