{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T01:39:47Z","timestamp":1772761187617,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T00:00:00Z","timestamp":1472774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T00:00:00Z","timestamp":1472774400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["#025071"],"award-info":[{"award-number":["#025071"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1217466"],"award-info":[{"award-number":["IIS-1217466"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141410095"],"award-info":[{"award-number":["N000141410095"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2257"],"award-info":[{"award-number":["N00014-16-1-2257"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s41060-016-0023-0","type":"journal-article","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T06:39:35Z","timestamp":1472798375000},"page":"137-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["The good, the bad, and the ugly: uncovering novel research opportunities in social media mining"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3264-7904","authenticated-orcid":false,"given":"Huan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Fred","family":"Morstatter","sequence":"additional","affiliation":[]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Zafarani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,2]]},"reference":[{"key":"23_CR1","unstructured":"Beigi, G., Tang, J., Liu, H.: Signed link analysis in social media networks. In: Tenth International AAAI Conference on Web and Social Media (2016)"},{"key":"23_CR2","volume-title":"Pattern Recognition and Machine Learning","author":"CM Bishop","year":"2001","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2001)"},{"issue":"4","key":"23_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2133806.2133826","volume":"55","author":"DM Blei","year":"2012","unstructured":"Blei, D.M.: Probabilistic topic models. Commun. ACM 55(4), 77\u201384 (2012)","journal-title":"Commun. ACM"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Cha, M., Kwak, H., Rodriguez, P., Ahn, Y.Y., Moon, S.: I tube, you tube, everybody tubes: analyzing the world\u2019s largest user generated content video system. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 1\u201314. ACM (2007)","DOI":"10.1145\/1298306.1298309"},{"issue":"5","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/TNET.2008.2011358","volume":"17","author":"M Cha","year":"2009","unstructured":"Cha, M., Kwak, H., Rodriguez, P., Ahn, Y.Y., Moon, S.: Analyzing the video popularity characteristics of large-scale user generated content systems. IEEE\/ACM Trans. Netw. (TON) 17(5), 1357\u20131370 (2009)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"23_CR6","unstructured":"Chang, J., Gerrish, S., Wang, C., Boyd-Graber, J.L., Blei, D.M.: Reading tea leaves: How humans interpret topic models. Adv. Neural Inf. Process. Syst. 288\u2013296 (2009)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 21\u201330. ACM (2010)","DOI":"10.1145\/1920261.1920265"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Gao, H., Wang, X., Tang, J., Liu, H.: Network denoising in social media. In: Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 564\u2013571. ACM (2013)","DOI":"10.1145\/2492517.2492547"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 211\u2013220. ACM (2009)","DOI":"10.1145\/1518701.1518736"},{"issue":"suppl 1","key":"23_CR10","doi-asserted-by":"publisher","first-page":"5228","DOI":"10.1073\/pnas.0307752101","volume":"101","author":"TL Griffiths","year":"2004","unstructured":"Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Natl. Acad. Sci. 101(suppl 1), 5228\u20135235 (2004)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Grimmer, J., Stewart, B.M.: Text as data: The promise and pitfalls of automatic content analysis methods for political texts. Polit. Anal. 21 (3), 267\u2013297 (2013)","DOI":"10.1093\/pan\/mps028"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th international Conference on World Wide Web, pp. 403\u2013412. ACM (2004)","DOI":"10.1145\/988672.988727"},{"key":"23_CR13","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Huberman, B.A., Romero, D.M., Wu, F.: Social networks that matter: Twitter under the microscope. In: Available at SSRN 1313405 (2008)","DOI":"10.2139\/ssrn.1313405"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Iofciu, T., Fankhauser, P., Abel, F., Bischoff, K.: Identifying users across social tagging systems. In: ICWSM, pp. 522\u2013525 (2011)","DOI":"10.1609\/icwsm.v5i1.14153"},{"key":"23_CR16","first-page":"259","volume":"2","author":"D Jensen","year":"2002","unstructured":"Jensen, D., Neville, J.: Linkage and autocorrelation cause feature selection bias in relational learning. ICML 2, 259\u2013266 (2002)","journal-title":"ICML"},{"issue":"5","key":"23_CR17","doi-asserted-by":"publisher","first-page":"377","DOI":"10.14778\/2732269.2732274","volume":"7","author":"N Korula","year":"2014","unstructured":"Korula, N., Lattanzi, S.: An efficient reconciliation algorithm for social networks. Proc. VLDB Endow. 7(5), 377\u2013388 (2014)","journal-title":"Proc. VLDB Endow."},{"key":"23_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-9372-3","volume-title":"Twitter Data Analytics","author":"S Kumar","year":"2014","unstructured":"Kumar, S., Morstatter, F., Liu, H.: Twitter Data Analytics. Springer, New York (2014)"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, S., Zafarani, R., Liu, H.: Understanding user migration patterns in social media. In: AAAI (2011)","DOI":"10.1609\/aaai.v25i1.8089"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Kumar, S., Zafarani, R., Liu, H.: Understanding user migration patterns in social media. In: Twenty-Fifth AAAI Conference on Artificial Intelligence (2011)","DOI":"10.1609\/aaai.v25i1.8089"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Kunegis, J., Preusse, J., Schwagereit, F.: What is the added value of negative links in online social networks? In: Proceedings of the 22nd International Conference on World Wide Web, pp. 727\u2013736. ACM (2013)","DOI":"10.1145\/2488388.2488452"},{"issue":"5915","key":"23_CR22","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1126\/science.1167742","volume":"323","author":"D Lazer","year":"2009","unstructured":"Lazer, D., Pentland, A.S., Adamic, L., Aral, S., Barabasi, A.L., Brewer, D., Christakis, N., Contractor, N., Fowler, J., Gutmann, M., et al.: Life in the network: the coming age of computational social science. Science 323(5915), 721 (2009)","journal-title":"Science"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: ICWSM, pp. 185\u2013192 (2011)","DOI":"10.1609\/icwsm.v5i1.14106"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World wide web, pp. 641\u2013650. ACM (2010)","DOI":"10.1145\/1772690.1772756"},{"key":"23_CR25","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1177\/000271624222200106","volume":"222","author":"A Loudon","year":"1942","unstructured":"Loudon, A.: Know your enemy. ANNALS Am. Acad. Polit. Soc. Sci. 222, 26\u201331 (1942)","journal-title":"ANNALS Am. Acad. Polit. Soc. Sci."},{"key":"23_CR26","first-page":"5","volume":"11","author":"A Mislove","year":"2011","unstructured":"Mislove, A., Lehmann, S., Ahn, Y.Y., Onnela, J.P., Rosenquist, J.N.: Understanding the demographics of twitter users. ICWSM 11, 5 (2011)","journal-title":"ICWSM"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Morstatter, F., Dani, H., Sampson, J., Liu, H.: Can one tamper with the sample api? Toward neutralizing bias from spam and bot content. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 81\u201382. International World Wide Web Conferences Steering Committee (2016)","DOI":"10.1145\/2872518.2889372"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Morstatter, F., Liu, H.: A novel measure for coherence in statistical topic models. In: Association for Computational Linguistics, pp. 543\u2013548 (2016)","DOI":"10.18653\/v1\/P16-2088"},{"key":"23_CR29","unstructured":"Morstatter, F., Pfeffer, J., Liu, H., Carley, K.M.: Is the sample good enough? comparing data from twitter\u2019s streaming api with twitter\u2019s firehose. In: ICWSM (2013)"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Morstatter, F., Pfeffer, J., Mayer, K., Liu, H.: Text, topics, and turkers: A consensus measure for statistical topics. In: Proceedings of the 26th ACM Conference on Hypertext & Social Media, pp. 123\u2013131. ACM (2015)","DOI":"10.1145\/2700171.2791028"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Morstatter, F., Wu, L., Nazer, T.H., Carley, K.M., Liu, H.: A new approach to bot detection: striking the balance between precision and recall, pp. 1\u20138 (2016)","DOI":"10.1109\/ASONAM.2016.7752287"},{"issue":"1\u20132","key":"23_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1500000011","volume":"2","author":"B Pang","year":"2008","unstructured":"Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr. 2(1\u20132), 1\u2013135 (2008)","journal-title":"Found. Trends Inf. Retr."},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Tang, J., Aggarwal, C., Liu, H.: Recommendations in signed social networks. In: Proceedings of the 25th International Conference on World Wide Web, pp. 31\u201340. International World Wide Web Conferences Steering Committee (2016)","DOI":"10.1145\/2872427.2882971"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Tang, J., Chang, S., Aggarwal, C., Liu, H.: Negative link prediction in social media. In: Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, pp. 87\u201396. ACM (2015)","DOI":"10.1145\/2684822.2685295"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Tang, J., Chang, Y., Aggarwal, C., Liu, H.: A survey of signed network mining in social media. ACM Comput. Surv. 42, 1\u201337 (2016)","DOI":"10.1145\/2956185"},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Tang, J., Hu, X., Gao, H., Liu, H.: Unsupervised feature selection for multi-view data in social media. In: SDM, pp. 270\u2013278. SIAM (2013)","DOI":"10.1137\/1.9781611972832.30"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, H.: Feature selection with linked data in social media. In: SDM. pp. 118\u2013128. SIAM (2012)","DOI":"10.1137\/1.9781611972825.11"},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, H.: Unsupervised feature selection for linked social media data. In: KDD, pp. 904\u2013912. ACM (2012)","DOI":"10.1137\/1.9781611972825.11"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, H.: Coselect: feature selection with instance selection for social media data. In: SDM, pp. 695\u2013703. SIAM (2013)","DOI":"10.1137\/1.9781611972832.77"},{"issue":"4","key":"23_CR40","first-page":"19","volume":"8","author":"J Tang","year":"2014","unstructured":"Tang, J., Liu, H.: Feature selection for social media data. ACM Trans. Knowl. Discov. Data (TKDD) 8(4), 19 (2014)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"issue":"1","key":"23_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00298ED1V01Y201009DMK003","volume":"2","author":"L Tang","year":"2010","unstructured":"Tang, L., Liu, H.: Community detection and mining in social media. Synth. Lect. Data Min. Knowl. Discov. 2(1), 1\u2013137 (2010)","journal-title":"Synth. Lect. Data Min. Knowl. Discov."},{"key":"23_CR42","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 243\u2013258. ACM (2011)","DOI":"10.1145\/2068816.2068840"},{"key":"23_CR43","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139088510","volume-title":"Social Media Mining: An Introduction","author":"R Zafarani","year":"2014","unstructured":"Zafarani, R., Abbasi, M.A., Liu, H.: Social Media Mining: An Introduction. Cambridge University Press, Cambridge (2014)"},{"key":"23_CR44","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1609\/icwsm.v3i1.13993","volume":"9","author":"R Zafarani","year":"2009","unstructured":"Zafarani, R., Liu, H.: Connecting corresponding identities across communities. ICWSM 9, 354\u2013357 (2009)","journal-title":"ICWSM"},{"key":"23_CR45","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Liu, H.: Connecting users across social media sites: a behavioral-modeling approach. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 41\u201349. ACM (2013)","DOI":"10.1145\/2487575.2487648"},{"key":"23_CR46","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Liu, H.: 10 bits of surprise: Detecting malicious users with minimum information. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 423\u2013431. ACM (2015)","DOI":"10.1145\/2806416.2806535"},{"issue":"6","key":"23_CR47","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/2666680","volume":"58","author":"R Zafarani","year":"2015","unstructured":"Zafarani, R., Liu, H.: Evaluation without ground truth in social media research. Commun. ACM 58(6), 54\u201360 (2015)","journal-title":"Commun. ACM"},{"issue":"2","key":"23_CR48","first-page":"16","volume":"10","author":"R Zafarani","year":"2015","unstructured":"Zafarani, R., Tang, L., Liu, H.: User identification across social media. ACM Trans. Knowl. Discov. Data (TKDD) 10(2), 16 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-016-0023-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41060-016-0023-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-016-0023-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T22:49:32Z","timestamp":1692485372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41060-016-0023-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,2]]},"references-count":48,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1007\/s41060-016-0023-0","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,2]]},"assertion":[{"value":"3 August 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}