{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T12:03:40Z","timestamp":1743509020010,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/istel.2018.8661050","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T18:58:46Z","timestamp":1551985126000},"page":"32-38","source":"Crossref","is-referenced-by-count":2,"title":["An Activity-Based User Trusting Behavior Diffusion Model in Social Networks"],"prefix":"10.1109","author":[{"given":"Mina Abbaspour","family":"Orangi","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Hashemi Golpayegani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1194","article-title":"The spread of behavior in an online social network experiment","author":"centola","year":"2010","journal-title":"science 329 5996"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1086\/521848"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2011.6148013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.06.009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2012.6395398"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.116"},{"key":"ref16","first-page":"805","article-title":"A trust model stemmed from the diffusion theory for opinion evaluation","author":"fang","year":"2013","journal-title":"Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems"},{"key":"ref17","first-page":"1","article-title":"Trust evaluation on Facebook using multiple contexts","author":"\u0161vec","year":"2013","journal-title":"The 21st Conference on User Modeling Adaptation and Personalization"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484757"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.115"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/001872675400700102"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2858791"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12041"},{"key":"ref8","article-title":"Trust propagation with Mixed-Effects models","author":"overgoor","year":"2012","journal-title":"ICWSM"},{"key":"ref7","first-page":"85","article-title":"A privacy, trust and policy based authorization framework for services in distributed environments","volume":"2","author":"singh","year":"2007","journal-title":"International Journal of Computer Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.112"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983753"},{"key":"ref20","first-page":"41","article-title":"Studying the affecting factors on trust in social commerce","volume":"4","author":"esmaeili","year":"2015","journal-title":"International Journal of Advanced studies in Computer Science and Engineering"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2980","DOI":"10.1038\/srep02980","article-title":"The anatomy of a scientific rumor","volume":"3","author":"de domenico","year":"2013","journal-title":"Scientific Reports"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2015.93"}],"event":{"name":"2018 9th International Symposium on Telecommunications (IST)","start":{"date-parts":[[2018,12,17]]},"location":"Tehran, Iran","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 9th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8653247\/8660802\/08661050.pdf?arnumber=8661050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:25:20Z","timestamp":1643253920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8661050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/istel.2018.8661050","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}