{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:04:27Z","timestamp":1740099867587,"version":"3.37.3"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010057","name":"University of Winchester","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010057","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/snams52053.2020.9336550","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T23:20:56Z","timestamp":1612394456000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Effects of Reputation Systems and Group Decision Making Systems Usage on Online Social Networks"],"prefix":"10.1109","author":[{"given":"Gulsum Akkuzu","family":"Kaya","sequence":"first","affiliation":[{"name":"Computer Engineering, Rize Recep Tayyip Erdogan University,Rize,TURKEY"}]},{"given":"Abdul","family":"Badwan","sequence":"additional","affiliation":[{"name":"University of Winchester,Department of Digital Technology and Solutions,Winchester,United Kingdom"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1287\/orsc.1050.0158"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/988772.988811"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.5121\/ijasuc.2010.1301"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ARES.2008.180"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ICDCSW.2007.16"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.dss.2005.05.019"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/503376.503456"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/1378889.1378908"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.chb.2007.10.005"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/CISE.2010.5676798"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.future.2012.06.010"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.2307\/25148667"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SNAMS.2019.8931831"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.18564\/jasss.3111"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.knosys.2016.12.001"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ECS.2017.8067861"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1287\/mnsc.1060.0540"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.24846\/v26i3y201701"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.ins.2014.11.011"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.asoc.2012.08.009","article-title":"A linguistic consensus model for web 2.0 communities","volume":"13","author":"alonso","year":"2013","journal-title":"Applied Soft Computing"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.dss.2013.05.007"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/s13748-016-0108-y"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.dss.2009.12.006"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1016\/j.asoc.2015.02.023","article-title":"Trust based consensus model for social network in an incomplete linguistic information context","volume":"35","author":"wu","year":"2015","journal-title":"Applied Soft Computing"},{"key":"ref3","first-page":"74","article-title":"Online privacy concerns among social networks' users","volume":"6","author":"mohamed","year":"2011","journal-title":"Cross Cultural Communication"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.knosys.2018.06.036"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2501654.2501661"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.eswa.2015.01.003"},{"key":"ref8","article-title":"Application of extended iowa operator for making group decision on co-owned contents in osns","author":"akkuzu","year":"0","journal-title":"10 th IEEE International Conference on Intelligent Systems"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.5220\/0007702206740684"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2810103.2813603"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1080\/07360932.2013.781517"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.cose.2014.10.012"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/TMM.2018.2887019"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1093\/acrefore\/9780190236557.013.262"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.5220\/0005668302650272"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ACCESS.2020.2994408"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/JSAC.2013.130609"},{"key":"ref47","article-title":"Modeling user reputation in online social networks: The role of costs, benefits, and reciprocity","author":"schweitzer","year":"2019","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s00500-015-2002-0"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1002\/sec.146"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1111\/itor.12143"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/ARES.2007.123"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.inffus.2017.09.012"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/SITA.2015.7358420"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.ins.2018.11.037"},{"key":"ref43","article-title":"Who is authoritative? understanding reputation mechanisms in quora","author":"paul","year":"2012","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TFUZZ.2006.889952"}],"event":{"name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2020,12,14]]},"location":"Paris, France","end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9336519\/9336528\/09336550.pdf?arnumber=9336550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:21Z","timestamp":1656602301000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9336550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/snams52053.2020.9336550","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}