{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T01:12:51Z","timestamp":1649034771953},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":31,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Soc Sc"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s42001-019-00050-y","type":"journal-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T10:03:02Z","timestamp":1564653782000},"page":"315-329","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Angels or demons? Classifying desirable heavy users and undesirable power sellers in online C2C marketplace"],"prefix":"10.1007","volume":"2","author":[{"given":"Hikaru","family":"Yamamoto","sequence":"first","affiliation":[]},{"given":"Nina","family":"Sugiyama","sequence":"additional","affiliation":[]},{"given":"Fujio","family":"Toriumi","sequence":"additional","affiliation":[]},{"given":"Hikaru","family":"Kashida","sequence":"additional","affiliation":[]},{"given":"Takuma","family":"Yamaguchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"issue":"3","key":"50_CR1","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1287\/mksc.1090.0502","volume":"28","author":"M Abe","year":"2009","unstructured":"Abe, M. (2009). Counting your customers one by one, a hierarchical bayes extension to the pareto\/NBD model. Marketing Science,\n                           28(3), 541\u2013553.","journal-title":"Marketing Science"},{"key":"50_CR2","unstructured":"Akoglu, L., Chandy, R., & Faloutsos, C. (2013). Opinion fraud detection in online reviews by network effects. In\u00a0International AAAI Conference on Web and Social Media. Retrieved from\u00a0\n                    https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM13\/paper\/view\/5981"},{"issue":"3","key":"50_CR3","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/4132332","volume":"26","author":"S Ba","year":"2002","unstructured":"Ba, S., & Pavlou, P. A. (2002). Evidence of the effect of trust building technology in electronic markets, price premiums and buyer behavior. MIS Quarterly,\n                           26(3), 243\u2013268.","journal-title":"MIS Quarterly"},{"key":"50_CR4","unstructured":"Cheng, J., Danescu-Niculescu-Mizil, C., & Leskovec, J. (2015). Antisocial behavior in online discussion communities. In\u00a0International AAAI Conference on Web and Social Media. Retrieved from\u00a0\n                    https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM15\/paper\/view\/10469\/10489"},{"issue":"3","key":"50_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.2753\/JEC1086-4415150306","volume":"15","author":"C Chiu","year":"2011","unstructured":"Chiu, C., Ku, Y., Lie, T., & Chen, Y. (2011). Internet auction fraud detection using social network analysis and classification tree approaches. International Journal of Electronic Commerce,\n                           15(3), 123\u2013147.","journal-title":"International Journal of Electronic Commerce"},{"issue":"10","key":"50_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MC.2004.165","volume":"37","author":"CEH Chua","year":"2004","unstructured":"Chua, C. E. H., & Wareham, J. (2004). Fighting internet auction fraud, an assessment and proposal. Computer,\n                           37(10), 31\u201337.","journal-title":"Computer"},{"issue":"10","key":"50_CR7","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1287\/mnsc.49.10.1407.17308","volume":"49","author":"C Dellarocas","year":"2003","unstructured":"Dellarocas, C. (2003). The digitization of word-of-mouth, promise and challenges of online feedback mechanisms. Management Science,\n                           49(10), 1407\u20131424.","journal-title":"Management Science"},{"issue":"2","key":"50_CR8","doi-asserted-by":"publisher","first-page":"395","DOI":"10.2307\/41703461","volume":"36","author":"A Dimoka","year":"2012","unstructured":"Dimoka, A., Hong, Y., & Pavlou, P. A. (2012). On product uncertainty in online markets: theory and evidence. MIS Quarterly,\n                           36(2), 395\u2013426.","journal-title":"MIS Quarterly"},{"issue":"10","key":"50_CR9","first-page":"1","volume":"84","author":"TR Eisenmann","year":"2006","unstructured":"Eisenmann, T. R., Parker, G., & Van Alstyne, M. (2006). Strategies for two-sided markets. Harvard Business Review,\n                           84(10), 1\u201311.","journal-title":"Harvard Business Review"},{"issue":"3","key":"50_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.2753\/JEC1086-4415100304","volume":"10","author":"DG Gregg","year":"2006","unstructured":"Gregg, D. G., & Scott, J. E. (2006). The role of reputation systems in reducing on-line auction fraud. International Journal of Electronic Commerce,\n                           10(3), 95\u2013120.","journal-title":"International Journal of Electronic Commerce"},{"issue":"12","key":"50_CR11","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1145\/953460.953500","volume":"46","author":"S Grazioli","year":"2003","unstructured":"Grazioli, S., & Jarvenpaa, S. L. (2003). Deceived, under target online. Communications of the ACM,\n                           46(12), 196\u2013205.","journal-title":"Communications of the ACM"},{"issue":"4","key":"50_CR12","first-page":"65","volume":"94","author":"A Hagiu","year":"2016","unstructured":"Hagiu, A., & Rothman, S. (2016). Network effects aren\u2019t enough. Harvard Business Review,\n                           94(4), 65\u201371.","journal-title":"Harvard Business Review"},{"issue":"3","key":"50_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1177\/1094670510375460","volume":"13","author":"T Hennig-Thurau","year":"2010","unstructured":"Hennig-Thurau, T., Malthouse, E. C., Friege, C., Gensler, S., Lobschat, L., Rangaswamy, A., et al. (2010). The impact of new media on customer relationships. Journal of Service Research,\n                           13(3), 311\u2013330.","journal-title":"Journal of Service Research"},{"issue":"7","key":"50_CR14","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari, A., Ali Tavakoli, M., Salim, N., & Heydari, Z. (2015). Detection of review spam, a survey. Expert Systems with Applications,\n                           42(7), 3634\u20133642.","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"50_CR15","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.im.2007.12.002","volume":"45","author":"K Jones","year":"2008","unstructured":"Jones, K., & Leonard, L. N. K. (2008). Trust in consumer-to-consumer electronic commerce. Information and Management,\n                           45(2), 88\u201395.","journal-title":"Information and Management"},{"key":"50_CR16","unstructured":"Li, H., Chen, Z., Mukherjee, A., Liu, B., & Shao, J. (2015). Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns.\u00a0In\u00a0International AAAI Conference on Web and Social Media. Retrieved from\u00a0\n                    https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM15\/paper\/view\/10534"},{"issue":"12","key":"50_CR17","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1287\/mnsc.2015.2304","volume":"62","author":"M Luca","year":"2016","unstructured":"Luca, M., & Zervas, G. (2016). Fake it till you make it, reputation, competition, and yelp review fraud. Management Science,\n                           62(12), 3412\u20133427.","journal-title":"Management Science"},{"key":"50_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025550","author":"C Moser","year":"2017","unstructured":"Moser, C., Resnick, P., & Schoenebeck, S. (2017). Community commerce, facilitating trust in mom-to-mom sale groups on facebook. CHI\u201917. \n                    https:\/\/doi.org\/10.1145\/3025453.3025550\n                    \n                  .","journal-title":"CHI\u201917"},{"issue":"1","key":"50_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"PA Pavlou","year":"2004","unstructured":"Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research,\n                           15(1), 37\u201359.","journal-title":"Information Systems Research"},{"issue":"4","key":"50_CR20","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1287\/isre.1060.0106","volume":"17","author":"PA Pavlou","year":"2006","unstructured":"Pavlou, P. A., & Dimoka, A. (2006). The nature and role of feedback text comments in online marketplaces: implications for trust building, price premiums, and seller differentiation. Information Systems Research,\n                           17(4), 392\u2013414.","journal-title":"Information Systems Research"},{"issue":"1","key":"50_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/mnsc.33.1.1","volume":"33","author":"DC Schmittlein","year":"1987","unstructured":"Schmittlein, D. C., Morrison, D. G., & Colombo, R. (1987). Counting your customers, who are they and what will they do next? Management Science,\n                           33(1), 1\u201324.","journal-title":"Management Science"}],"container-title":["Journal of Computational Social Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-019-00050-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42001-019-00050-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-019-00050-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T23:05:21Z","timestamp":1596150321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42001-019-00050-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["50"],"URL":"https:\/\/doi.org\/10.1007\/s42001-019-00050-y","relation":{},"ISSN":["2432-2717","2432-2725"],"issn-type":[{"value":"2432-2717","type":"print"},{"value":"2432-2725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"31 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}