{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:21:05Z","timestamp":1762953665831,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icdim.2017.8244643","type":"proceedings-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T21:18:26Z","timestamp":1515532706000},"page":"263-268","source":"Crossref","is-referenced-by-count":10,"title":["Message content in the life of rumors: Comparing three rumor types"],"prefix":"10.1109","author":[{"given":"Alton Y. K.","family":"Chua","sequence":"first","affiliation":[]},{"given":"Rajiv","family":"Aricat","sequence":"additional","affiliation":[]},{"given":"Dion","family":"Goh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.comcom.2015.07.016"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1093\/acprof:oso\/9780199753697.001.0001"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/2531602.2531735"},{"year":"2004","author":"krippendorff","journal-title":"Content Analysis An Introduction to Its Methodology","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1093\/poq\/10.4.501"},{"year":"0","author":"liu","article-title":"Rumors on social media in disasters: extending transmission to retransmission","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1080\/01292986.2015.1130157"},{"key":"ref12","article-title":"Rumor spreading in online-offline social networks","author":"ma","year":"2016","journal-title":"PACIS 2016 Proceedings Paper 173"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"149","DOI":"10.3233\/IDA-120571","article-title":"Towards combating rumors in social networks: Models and metrics","volume":"17","author":"tripathy","year":"2013","journal-title":"Intell Data Anal"},{"key":"ref14","first-page":"44","article-title":"Corporate rumors: How they start and how to stop them","volume":"72","author":"esposito","year":"1983","journal-title":"Manag Rev"},{"year":"1990","author":"kapferer","journal-title":"Rumors Uses Interpretations and Images","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/0271-5309(86)90022-4"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1080\/10810730.2012.665417"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/0271-5309(91)90033-R"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1177\/1354067X09337865"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1371\/journal.pone.0089052"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1017\/S002238160909077X"},{"year":"1947","author":"allport","journal-title":"The Psychology of Rumor","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/0271-5309(88)90004-3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1177\/019027250406700105"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1086\/265665"},{"year":"2009","author":"sunstein","journal-title":"On Rumors How Falsehoods Spread Why We Believe Them What Can Be Done","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1177\/0392192107073434"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1142\/S0129183115500801"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1037\/0003-066X.46.5.484"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1111\/j.1460-2466.1974.tb00386.x","article-title":"On rumor","volume":"24","author":"rosnow","year":"1974","journal-title":"Jouranl of Communications"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2539150.2539184"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1177\/1354067X12464986"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2501025.2501027"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1371\/journal.pone.0121443"},{"key":"ref24","article-title":"Rumor has it: Identifying misinformation in microblogs","author":"qazvinian","year":"2011","journal-title":"Paper presented at the Proc Conf Emp Meth in Nat Lang Proc Assoc Comp Ling"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.25300\/MISQ\/2013\/37.2.05"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14559","article-title":"Rumor cascades","author":"friggeri","year":"2014","journal-title":"Proc of Intl AAAI Conf on Web and Social Media"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.2307\/20650277"}],"event":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2017,9,12]]},"location":"Fukuoka","end":{"date-parts":[[2017,9,14]]}},"container-title":["2017 Twelfth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8231152\/8244639\/08244643.pdf?arnumber=8244643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T14:31:42Z","timestamp":1693405902000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8244643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icdim.2017.8244643","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}