{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:41:01Z","timestamp":1767706861120,"version":"3.41.2"},"reference-count":43,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T00:00:00Z","timestamp":1415664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11,11]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this article was to confirm whether users\u2019 interests are reflected by tweeted Web pages, and to evaluate the credibility of interest reflection of tweeted Web pages. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Interest reflection of Twitter is investigated based on the context of sharing behavior. A context-oriented approach is proposed to evaluate the interest reflection of tweeted Web pages based on machine learning. Some different distribution models of similarity are present, and infer whether tweeted Web pages reflect respective users\u2019 interests by analyzing user access profiles. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The analysis of browsing behaviors finds that many users partially hide their own concerns, hobbies and interests, and emphasize the concerns about social phenomenon. The extensive experimental results showed the context-oriented approach is effective on real net view data. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 As the first-of-its-kind study on evaluating the credibility of interest reflection on Twitter, extensive experiments have been conducted on the data sets containing real net view data. For higher accuracy and less subjectivity, various features are generated from user\u2019s Web view and Twitter submission background with some different context factors.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ijwis-04-2014-0019","type":"journal-article","created":{"date-parts":[[2014,11,16]],"date-time":"2014-11-16T13:19:46Z","timestamp":1416143986000},"page":"343-362","source":"Crossref","is-referenced-by-count":11,"title":["Evaluating credibility of interest reflection on Twitter"],"prefix":"10.1108","volume":"10","author":[{"given":"Hao","family":"Han","sequence":"first","affiliation":[]},{"given":"Hidekazu","family":"Nakawatase","sequence":"first","affiliation":[]},{"given":"Keizo","family":"Oyama","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122723084863900_b10","doi-asserted-by":"crossref","unstructured":"Abel, F.\n               , \n                  Gao, Q.\n               , \n                  Houben, G.-J.\n                and \n                  Tao, K.\n                (2011), \u201cAnalyzing user modeling on Twitter for personalized news recommendations\u201d, Proceedings of the 19th International Conference on User Modeling, Adaption, and Personalization, Girona, Spain, pp. 1-12.","DOI":"10.1007\/978-3-642-22362-4_1"},{"key":"key2020122723084863900_b28","unstructured":"Andre, P.\n               , \n                  Bernstein, M.\n                and \n                  Luther, K.\n                (2012), \u201cVision statement: what makes a great tweet\u201d, available at: http:\/\/hbr.org\/2012\/05\/what-makes-a-great-tweet\/"},{"key":"key2020122723084863900_b9","doi-asserted-by":"crossref","unstructured":"Bakshy, E.\n               , \n                  Hofman, J.M.\n               , \n                  Mason, W.A.\n                and \n                  Watts, D.J.\n                (2011), \u201cEveryone\u2019s an influencer: quantifying influence on twitter\u201d, Proceedings of the 4th ACM International Conference on Web Search and Data Mining, Hong Kong, pp. 65-74.","DOI":"10.1145\/1935826.1935845"},{"key":"key2020122723084863900_b23","doi-asserted-by":"crossref","unstructured":"Bilenko, M.\n               , \n                  Basu, S.\n                and \n                  Mooney, R.J.\n                (2004), \u201cIntegrating constraints and metric learning in semi-supervised clustering\u201d, Proceedings of the 21st International Conference on Machine Learning, Banff, pp. 81-88.","DOI":"10.1145\/1015330.1015360"},{"key":"key2020122723084863900_b42","doi-asserted-by":"crossref","unstructured":"Cao, X.\n               , \n                  Chen, K.\n               , \n                  Long, R.\n               , \n                  Zheng, G.\n                and \n                  Yu, Y.\n                (2012), \u201cNews comments generation via mining microblogs\u201d, Proceedings of the 21st International World Wide Web Conference, Lyon, pp. 471-472.","DOI":"10.1145\/2187980.2188082"},{"key":"key2020122723084863900_b12","unstructured":"Castellano, G.\n               , \n                  Fanelli, A.M.\n                and \n                  Torsello, M.A.\n                (2006), \u201cMining usage profiles from access data using fuzzy clustering\u201d, Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, Stevens Point, WI, pp. 157-160."},{"key":"key2020122723084863900_b3","doi-asserted-by":"crossref","unstructured":"Castillo, C.\n               , \n                  Mendoza, M.\n                and \n                  Poblete, B.\n                (2011), \u201cInformation credibility on twitter\u201d, Proceedings of the 20th International Conference on World Wide Web, Hyderabad, pp. 675-684.","DOI":"10.1145\/1963405.1963500"},{"key":"key2020122723084863900_b24","doi-asserted-by":"crossref","unstructured":"Cataldi, M.\n               , \n                  Caro, L.D.\n                and \n                  Schifanella, C.\n                (2010), \u201cEmerging topic detection on twitter based on temporal and social terms evaluation\u201d, Proceedings of the 10th International Workshop on Multimedia Data Mining, Washington, DC, p. -.","DOI":"10.1145\/1814245.1814249"},{"key":"key2020122723084863900_b5","unstructured":"Celebrating Twitter7\n                (2013), available at: http:\/\/blog.twitter.com\/2013\/celebrating-twitter7"},{"key":"key2020122723084863900_b43","doi-asserted-by":"crossref","unstructured":"Chu, Z.\n               , \n                  Gianvecchio, S.\n               , \n                  Wang, H.\n                and \n                  Jajodia, S.\n                (2010), \u201cWho is tweeting on Twitter: human, bot, or cyborg?\u201d, Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, pp. 21-30.","DOI":"10.1145\/1920261.1920265"},{"key":"key2020122723084863900_b20","doi-asserted-by":"crossref","unstructured":"Cohen, J.\n                (1960), \u201cA coefficient of agreement for nominal scales\u201d, Educational and Psychological Measurement, Vol. 20 No. 1, pp. 37-46.","DOI":"10.1177\/001316446002000104"},{"key":"key2020122723084863900_b1","doi-asserted-by":"crossref","unstructured":"Duggal, A.\n               , \n                  Misra, M.\n                and \n                  Srinivasaraghavan, R.\n                (2012), \u201cCategorising context and using short term contextual information to obtain long term context\u201d, Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 1771-1776.","DOI":"10.1109\/TrustCom.2012.2"},{"key":"key2020122723084863900_b14","doi-asserted-by":"crossref","unstructured":"Go, G.\n               , \n                  Yang, J.\n               , \n                  Park, H.\n                and \n                  Han, S.\n                (2010), \u201cUsing online media sharing behavior as implicit feedback for collaborative filtering\u201d, Proceedings of the 2nd IEEE International Conference on Social Computing, Minneapolis, MN, pp. 439-445.","DOI":"10.1109\/SocialCom.2010.70"},{"key":"key2020122723084863900_b29","doi-asserted-by":"crossref","unstructured":"Guo, Q.\n                and \n                  Agichtein, E.\n                (2012), \u201cBeyond dwell time: estimating document relevance from cursor movements and other post-click searcher behavior\u201d, Proceedings of the 21st International World Wide Web Conference, Lyon, France, pp. 569-578.","DOI":"10.1145\/2187836.2187914"},{"key":"key2020122723084863900_b25","doi-asserted-by":"crossref","unstructured":"Gupta, M.\n               , \n                  Zhao, P.\n                and \n                  Han, J.\n                (2012), \u201cEvaluating event credibility on Twitter\u201d, Proceedings of the 2012 SIAM International Conference on Data Mining, Anaheim, California, USA, pp. 153-164.","DOI":"10.1137\/1.9781611972825.14"},{"key":"key2020122723084863900_b6","unstructured":"Halpern, D.\n                (2014), \u201cHow to get more twitter followers\u201d, available at: http:\/\/socialtriggers.com\/twitter-tips\/"},{"key":"key2020122723084863900_b17","doi-asserted-by":"crossref","unstructured":"Han, H.\n               , \n                  Nakawatase, H.\n                and \n                  Oyama, K.\n                (2012), \u201cAn exploratory analysis of browsing behavior of Web news on Twitter\u201d, Proceedings of the 2012 ASE\/IEEE International Conference on Social Informatics, Lausanne, pp. 86-95.","DOI":"10.1109\/SocialInformatics.2012.41"},{"key":"key2020122723084863900_b22","unstructured":"Hodge, K.\n                (2010), \u201c10 news stories that broke on Twitter first\u201d, available at: www.techradar.com\/news\/internet\/10-newsstories-that-broke-on-twitter-first-719532"},{"key":"key2020122723084863900_b39","unstructured":"iRevolution\n                (2013), \u201cTweeting is believing? Analyzing perceptions of credibility on Twitter\u201d, available at: http:\/\/irevolution.net\/2013\/01\/06\/tweeting-isbelieving\/"},{"key":"key2020122723084863900_b2","doi-asserted-by":"crossref","unstructured":"Java, A.\n               , \n                  Song, X.\n               , \n                  Finin, T.\n                and \n                  Tseng, B.\n                (2007), \u201cWhy we Twitter: understanding microblogging usage and communities\u201d, Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, San Jose, CA, pp. 56-65.","DOI":"10.1145\/1348549.1348556"},{"key":"key2020122723084863900_b7","doi-asserted-by":"crossref","unstructured":"Kelly, D.\n                and \n                  Belkin, N.J.\n                (2001), \u201cReading time, scrolling and interaction: exploring implicit sources of user preferences for relevance feedback\u201d, Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, New Orleans, LA, USA, pp. 408-409.","DOI":"10.1145\/383952.384045"},{"key":"key2020122723084863900_b4","doi-asserted-by":"crossref","unstructured":"Kohlschutter, C.\n               , \n                  Fankhauser, P.\n                and \n                  Nejdl, W.\n                (2010), \u201cBoilerplate detection using shallow text features\u201d, Proceedings of the 3rd ACM International Conference on Web Search and Data Mining, New York, NY, pp. 441-450.","DOI":"10.1145\/1718487.1718542"},{"key":"key2020122723084863900_b18","doi-asserted-by":"crossref","unstructured":"Kwak, H.\n               , \n                  Lee, C.\n               , \n                  Park, H.\n                and \n                  Moon, S.\n                (2010), \u201cWhat is Twitter, a social network or a news media?\u201d, Proceedings of the 19th International World Wide Web Conference, Raleigh, NC, pp. 591-600.","DOI":"10.1145\/1772690.1772751"},{"key":"key2020122723084863900_b19","doi-asserted-by":"crossref","unstructured":"Li, H.\n               , \n                  Tian, Y.\n               , \n                  Lee, W.-C.\n               , \n                  Giles, C.L.\n                and \n                  Chen, M.-C.\n                (2010), \u201cPersonalized feed recommendation service for social networks\u201d, Proceedings of the 2nd IEEE International Conference on Social Computing, Minneapolis, MN, pp. 96-103.","DOI":"10.1109\/SocialCom.2010.23"},{"key":"key2020122723084863900_b13","unstructured":"Morales, G.D.F.\n               , \n                  Gionis, A.\n                and \n                  Lucchese, C.\n                (2012), \u201cFrom chatter to headlines: harnessing the real-time Web for personalized news recommendation\u201d, Proceedings of the 5th ACM International Conference on Web Search and Data Mining, Seattle, WA, pp. 153-162."},{"key":"key2020122723084863900_b26","doi-asserted-by":"crossref","unstructured":"Morita, M.\n                and \n                  Shinoda, Y.\n                (1994), \u201cInformation filtering based on user behavior analysis and best match text retrieval\u201d, Proceedings of the 17th annual international ACM SIGIR Conference on Research and Development in Information Retrieval, Dublin, pp. 272-281.","DOI":"10.1007\/978-1-4471-2099-5_28"},{"key":"key2020122723084863900_b27","doi-asserted-by":"crossref","unstructured":"Phelan, O.\n               , \n                  McCarthy, K.\n                and \n                  Smyth, B.\n                (2009), \u201cUsing Twitter to recommend real-time topical news\u201d, Proceedings of the 3rd ACM Conference on Recommender Systems, New York, NY, pp. 385-388.","DOI":"10.1145\/1639714.1639794"},{"key":"key2020122723084863900_b32","unstructured":"Safe Browsing API\n                (2014), available at: http:\/\/developers.google.com\/safe-browsing\/"},{"key":"key2020122723084863900_b35","doi-asserted-by":"crossref","unstructured":"Sakaki, T.\n               , \n                  Okazaki, M.\n                and \n                  Matsuo, Y.\n                (2010), \u201cEarthquake shakes Twitter users: real-time event detection by social sensors\u201d, Proceedings of the 19th International World Wide Web Conference, Raleigh, NC, pp. 851-860.","DOI":"10.1145\/1772690.1772777"},{"key":"key2020122723084863900_b33","unstructured":"Sen\n                (2006), available at: http:\/\/ultimania.org\/sen\/"},{"key":"key2020122723084863900_b34","unstructured":"SVM-Light Support Vector Machine\n                (2008), available at: http:\/\/svmlight.joachims.org\/"},{"key":"key2020122723084863900_b36","doi-asserted-by":"crossref","unstructured":"Takashita, T.\n               , \n                  Abe, Y.\n               , \n                  Itokawa, T.\n               , \n                  Kitasuka, T.\n                and \n                  Aritsugi, M.\n                (2011), \u201cDesign and implementation of a system for finding appropriate tags to photos in flickr from Web browsing behaviour\u201d, International Journal of Web and Grid Services, Vol. 7 No. 1, pp. 75-90.","DOI":"10.1504\/IJWGS.2011.038385"},{"key":"key2020122723084863900_b37","unstructured":"The Article as Luxury or Byproduct\n                (2011), available at: http:\/\/buzzmachine.com\/2011\/05\/28\/the-article-as-luxury-or-byproduct\/"},{"key":"key2020122723084863900_b38","unstructured":"Tweet Buttons\n                (2014), available at: http:\/\/dev.twitter.com\/docs\/tweet-button\/"},{"key":"key2020122723084863900_b40","unstructured":"Twitter Turns Six\n                (2012), available at: http:\/\/blog.twitter.com\/2012\/03\/twitter-turnssix.html"},{"key":"key2020122723084863900_b15","doi-asserted-by":"crossref","unstructured":"Velayathan, G.\n                and \n                  Yamada, S.\n                (2007), \u201cInvestigating user browsing behavior\u201d, Proceedings of the 2007 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops, Silicon Valley, CA, pp. 195-198.","DOI":"10.1109\/WI-IATW.2007.122"},{"key":"key2020122723084863900_b41","unstructured":"Viera, A.J.\n                and \n                  Garrett, J.M.\n                (2005), \u201cUnderstanding interobserver agreement: the kappa statistic\u201d, Family Medicine, Vol. 37 No. 5, pp. 360-363."},{"key":"key2020122723084863900_b21","doi-asserted-by":"crossref","unstructured":"Weng, J.\n               , \n                  Lim, E.-P.\n               , \n                  Jiang, J.\n                and \n                  He, Q.\n                (2010), \u201cTwitterrank: finding topic-sensitive influential twitterers\u201d, Proceedings of the 3rd ACM International Conference on Web Search and Data Mining, New York, NY, USA, pp. 261-270.","DOI":"10.1145\/1718487.1718520"},{"key":"key2020122723084863900_b30","doi-asserted-by":"crossref","unstructured":"White, R.W.\n               , \n                  Bennett, P.N.\n                and \n                  Dumais, S.T.\n                (2010), \u201cPredicting short-term interests using activity-based search context\u201d, Proceedings of the 19th ACM International Conference on Information and Knowledge Management, Toronto, Ontario, pp. 1009-1018.","DOI":"10.1145\/1871437.1871565"},{"key":"key2020122723084863900_b8","doi-asserted-by":"crossref","unstructured":"won Kim, D.\n               , \n                  Lee, K.Y.\n               , \n                  Lee, D.\n                and \n                  Lee, K.H.\n                (2005), \u201cA k-populations algorithm for clustering categorical data\u201d, Pattern Recognition, Vol. 38 No. 7, pp. 1131-1134.","DOI":"10.1016\/j.patcog.2004.11.017"},{"key":"key2020122723084863900_b16","doi-asserted-by":"crossref","unstructured":"Wu, H.C.\n               , \n                  Luk, R.W.P.\n               , \n                  Wong, K.F.\n                and \n                  Kwok, K.L.\n                (2008), \u201cInterpreting TF-IDF term weights as making relevance decisions\u201d, ACM Transactions on Information Systems, Vol. 26 No. 3, p. -.","DOI":"10.1145\/1361684.1361686"},{"key":"key2020122723084863900_b31","doi-asserted-by":"crossref","unstructured":"Wu, S.\n               , \n                  Hofman, J.M.\n               , \n                  Mason, W.A.\n                and \n                  Watts, D.J.\n                (2011), \u201cWho says what to whom on Twitter\u201d, Proceedings of the 20th International World Wide Web Conference, Hyderabad, pp. 705-714.","DOI":"10.1145\/1963405.1963504"},{"key":"key2020122723084863900_b11","doi-asserted-by":"crossref","unstructured":"Xiao, F.\n               , \n                  Noro, T.\n                and \n                  Tokuda, T.\n                (2012), \u201cNews-topic oriented hashtag recommendation in Twitter based on characteristic co-occurrence word detection\u201d, Proceedings of the 12th International Conference on Web Engineering, Berlin, pp. 16-30.","DOI":"10.1007\/978-3-642-31753-8_2"}],"container-title":["International Journal of Web Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IJWIS-04-2014-0019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-04-2014-0019\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-04-2014-0019\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:23:55Z","timestamp":1753395835000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijwis\/article\/10\/4\/343-362\/160560"}},"subtitle":[],"editor":[{"given":"Maria","family":"Indrawan-Santiago","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,11,11]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,11,11]]}},"alternative-id":["10.1108\/IJWIS-04-2014-0019"],"URL":"https:\/\/doi.org\/10.1108\/ijwis-04-2014-0019","relation":{},"ISSN":["1744-0084"],"issn-type":[{"type":"print","value":"1744-0084"}],"subject":[],"published":{"date-parts":[[2014,11,11]]}}}