{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T02:11:40Z","timestamp":1777515100705,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":8,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Echo chambers in online social networks, in which users prefer to interact only with ideologically-aligned peers, are believed to facilitate misinformation spreading and contribute to radicalize political discourse. In this paper, we gauge the effects of echo chambers in information spreading phenomena over political communication networks. Mining 12 million Twitter messages, we reconstruct a network in which users interchange opinions related to the impeachment of the former Brazilian President Dilma Rousseff. We define a continuous political leaning parameter, independent of the network\u2019s structure, that allows to quantify the presence of echo chambers in the strongly connected component of the network. These are reflected in two well-separated communities of similar sizes with opposite views of the impeachment process. By means of simple spreading models, we show that the capability of users in propagating the content they produce, measured by the associated spreading capacity, strongly depends on their attitude. Users expressing pro-impeachment leanings are capable to transmit information, on average, to a larger audience than users expressing anti-impeachment leanings. Furthermore, the users\u2019 spreading capacity is correlated to the diversity, in terms of political position, of the audience reached. Our method can be exploited to identify the presence of echo chambers and their effects across different contexts and shed light upon the mechanisms allowing to break echo chambers.<\/jats:p>","DOI":"10.1140\/epjds\/s13688-019-0213-9","type":"journal-article","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T17:03:38Z","timestamp":1575911018000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":138,"title":["Quantifying echo chamber effects in information spreading over political communication networks"],"prefix":"10.1140","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8582-1531","authenticated-orcid":false,"given":"Wesley","family":"Cota","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7159-2769","authenticated-orcid":false,"given":"Silvio C.","family":"Ferreira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4051-6007","authenticated-orcid":false,"given":"Romualdo","family":"Pastor-Satorras","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9161-5339","authenticated-orcid":false,"given":"Michele","family":"Starnini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"213_CR1","series-title":"Information society series","volume-title":"The reputation society: how online opinions are reshaping the offline world","author":"H Masum","year":"2011","unstructured":"Masum H, Newmark C, Tovey M (2011) The reputation society: how online opinions are reshaping the offline world. Information society series. MIT Press, Cambridge"},{"key":"213_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge"},{"issue":"5915","key":"213_CR3","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1126\/science.1167742","volume":"323","author":"D Lazer","year":"2009","unstructured":"Lazer D, Pentland A, Adamic L, Aral S, Barab\u00e1si A-L, Brewer D, Christakis N, Contractor N, Fowler J, Gutmann M, Jebara T, King G, Macy M, Roy D, Van Alstyne M (2009) Computational social science. Science 323(5915):721\u2013723","journal-title":"Science"},{"issue":"4","key":"213_CR4","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1111\/jcom.12077","volume":"64","author":"JK Lee","year":"2014","unstructured":"Lee JK, Choi J, Kim C, Kim Y (2014) Social media, network heterogeneity, and opinion polarization. J Commun 64(4):702\u2013722","journal-title":"J Commun"},{"key":"213_CR5","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1038\/nature11421","volume":"489","author":"RM Bond","year":"2012","unstructured":"Bond RM, Fariss CJ, Jones JJ, Kramer ADI, Marlow C, Settle JE, Fowler JH (2012) A 61-million-person experiment in social influence and political mobilization. Nature 489:295\u2013298","journal-title":"Nature"},{"issue":"51","key":"213_CR6","doi-asserted-by":"publisher","first-page":"21544","DOI":"10.1073\/pnas.0908800106","volume":"106","author":"S Aral","year":"2009","unstructured":"Aral S, Muchnik L, Sundararajan A (2009) Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proc Natl Acad Sci 106(51):21544\u201321549","journal-title":"Proc Natl Acad Sci"},{"key":"213_CR7","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2508436.2508438","volume-title":"Proceedings of the 2Nd workshop on politics, elections and data, PLEAD \u201913","author":"A Hanna","year":"2013","unstructured":"Hanna A, Wells C, Maurer P, Friedland L, Shah D, Matthes J (2013) Partisan alignments and political polarization online: a computational approach to understanding the French and US presidential elections. In: Proceedings of the 2Nd workshop on politics, elections and data, PLEAD \u201913. ACM, New York, pp 15\u201322"},{"key":"213_CR8","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1145\/2492517.2492557","volume-title":"Proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining\u2014ASONAM \u201913","author":"I Weber","year":"2013","unstructured":"Weber I, Garimella VRK, Batayneh A (2013) Secular vs. islamist polarization in Egypt on Twitter. In: Proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining\u2014ASONAM \u201913. ACM, New York, pp 290\u2013297"},{"key":"213_CR9","first-page":"700","volume-title":"Proceedings of the 18th ACM conference on computer supported cooperative work & social computing, CSCW 2015","author":"J Borge-Holthoefer","year":"2015","unstructured":"Borge-Holthoefer J, Magdy W, Darwish K, Weber I (2015) Content and network dynamics behind Egyptian political polarization on Twitter. In: Proceedings of the 18th ACM conference on computer supported cooperative work & social computing, CSCW 2015, Vancouver, BC, Canada, March 14\u201318, 2015, pp 700\u2013711"},{"key":"213_CR10","doi-asserted-by":"publisher","DOI":"10.1038\/srep00197","volume":"1","author":"S Gonz\u00e1lez-Bail\u00f3n","year":"2011","unstructured":"Gonz\u00e1lez-Bail\u00f3n S, Borge-Holthoefer J, Rivero A, Moreno Y (2011) The dynamics of protest recruitment through an online network. Sci Rep 1:197","journal-title":"Sci Rep"},{"key":"213_CR11","volume-title":"Proc. 5th international AAAI conference on weblogs and social media (ICWSM)","author":"M Conover","year":"2011","unstructured":"Conover M, Ratkiewicz J, Francisco M, Gon\u00e7alves B, Flammini A, Menczer F (2011) Political polarization on Twitter. In: Proc. 5th international AAAI conference on weblogs and social media (ICWSM)"},{"key":"213_CR12","doi-asserted-by":"publisher","DOI":"10.1140\/epjds6","volume":"1","author":"MD Conover","year":"2012","unstructured":"Conover MD, Gon\u00e7alves B, Flammini A, Menczer F (2012) Partisan asymmetries in online political activity. EPJ Data Sci 1:6","journal-title":"EPJ Data Sci"},{"issue":"2","key":"213_CR13","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1111\/j.1083-6101.2009.01440.x","volume":"14","author":"RK Garrett","year":"2009","unstructured":"Garrett RK (2009) Echo chambers online?: politically motivated selective exposure among Internet news users. J\u00a0Comput-Mediat Commun 14(2):265\u2013285","journal-title":"J\u00a0Comput-Mediat Commun"},{"key":"213_CR14","series-title":"International World Wide Web Conferences steering committee","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1145\/3178876.3186139","volume-title":"Proceedings of the 2018 World Wide Web Conference, WWW \u201918","author":"K Garimella","year":"2018","unstructured":"Garimella K, De Francisci Morales G, Gionis A, Mathioudakis M (2018) Political discourse on social media: echo chambers, gatekeepers, and the price of bipartisanship. In: Proceedings of the 2018 World Wide Web Conference, WWW \u201918, Republic and Canton of Geneva, Switzerland. International World Wide Web Conferences steering committee, pp 913\u2013922"},{"issue":"11","key":"213_CR15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0206841","volume":"13","author":"MT Bastos","year":"2018","unstructured":"Bastos MT, Mercea D, Baronchelli A (2018) The geographic embedding of online echo chambers: evidence from the Brexit campaign. PLoS ONE 13(11):e0206841","journal-title":"PLoS ONE"},{"issue":"3","key":"213_CR16","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1073\/pnas.1517441113","volume":"113","author":"M Del Vicario","year":"2016","unstructured":"Del Vicario M, Bessi A, Zollo F, Petroni F, Scala A, Caldarelli G, Stanley HE, Quattrociocchi W (2016) The spreading of misinformation online. Proc Natl Acad Sci 113(3):554\u2013559","journal-title":"Proc Natl Acad Sci"},{"key":"213_CR17","doi-asserted-by":"publisher","DOI":"10.1038\/srep37825","volume":"6","author":"MD Vicario","year":"2016","unstructured":"Vicario MD, Vivaldo G, Bessi A, Zollo F, Scala A, Caldarelli G, Quattrociocchi W (2016) Echo chambers: emotional contagion and group polarization on Facebook. Sci Rep 6:37825","journal-title":"Sci Rep"},{"issue":"4","key":"213_CR18","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1177\/1461444809342775","volume":"12","author":"M Wojcieszak","year":"2010","unstructured":"Wojcieszak M (2010) \u2018Don\u2019t talk to me\u2019: effects of ideologically homogeneous online groups and politically dissimilar offline ties on extremism. New Media Soc 12(4):637\u2013655","journal-title":"New Media Soc"},{"issue":"10","key":"213_CR19","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1177\/0956797615594620","volume":"26","author":"P Barber\u00e1","year":"2015","unstructured":"Barber\u00e1 P, Jost JT, Nagler J, Tucker JA, Bonneau R (2015) Tweeting from left to right: is online political communication more than an echo chamber? Psychol Sci 26(10):1531\u20131542","journal-title":"Psychol Sci"},{"issue":"5","key":"213_CR20","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1080\/1369118X.2018.1428656","volume":"21","author":"E Dubois","year":"2018","unstructured":"Dubois E, Blank G (2018) The echo chamber is overstated: the moderating effect of political interest and diverse media. Inf Commun Soc 21(5):729\u2013745","journal-title":"Inf Commun Soc"},{"issue":"9","key":"213_CR21","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2015-60657-4","volume":"88","author":"P Holme","year":"2015","unstructured":"Holme P (2015) Modern temporal network theory: a colloquium. Eur Phys J B 88(9):234","journal-title":"Eur Phys J B"},{"key":"213_CR22","series-title":"Series on complexity science","volume-title":"A guide to temporal networks","author":"R Lambiotte","year":"2016","unstructured":"Lambiotte R, Masuda N (2016) A guide to temporal networks. Series on complexity science, vol 4. World Scientific, Singapore"},{"key":"213_CR23","first-page":"3","volume-title":"Proceedings of the 3rd wonference on online social networks, WOSN\u201910","author":"W Galuba","year":"2010","unstructured":"Galuba W, Aberer K, Chakraborty D, Despotovic Z, Kellerer W (2010) Outtweeting the Twitterers\u2014predicting information cascades in microblogs. In: Proceedings of the 3rd wonference on online social networks, WOSN\u201910. USENIX Association, Berkeley, pp 3\u20133"},{"key":"213_CR24","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1145\/2487788.2488017","volume-title":"Proceedings of the 22nd international conference on World Wide Web\u2014WWW \u201913 companion","author":"M Jenders","year":"2013","unstructured":"Jenders M, Kasneci G, Naumann F (2013) Analyzing and predicting viral tweets. In: Proceedings of the 22nd international conference on World Wide Web\u2014WWW \u201913 companion. ACM, New York, pp 657\u2013664"},{"key":"213_CR25","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/1963192.1963301","volume-title":"Proceedings of the 20th international conference companion on World wide web\u2014WWW \u201911","author":"J Ratkiewicz","year":"2011","unstructured":"Ratkiewicz J, Conover M, Meiss M, Gon\u00e7alves B, Patil S, Flammini A, Menczer F (2011) Detecting and tracking political abuse in social media. In: Proceedings of the 20th international conference companion on World wide web\u2014WWW \u201911. ACM, New York, p 249"},{"key":"213_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0029358","volume":"7","author":"PA Grabowicz","year":"2012","unstructured":"Grabowicz PA, Ramasco JJ, Moro E, Pujol JM, Eguiluz VM (2012) Social features of online networks: the strength of intermediary ties in online social media. PLoS ONE 7:1\u20139","journal-title":"PLoS ONE"},{"key":"213_CR27","volume-title":"Temporal networks","year":"2013","unstructured":"Holme P, Saram\u00e4ki J (eds) (2013) Temporal networks. Springer, Berlin"},{"key":"213_CR28","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: an introduction","author":"MEJ Newman","year":"2010","unstructured":"Newman MEJ (2010) Networks: an introduction. Oxford University Press, Oxford"},{"key":"213_CR29","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59:96\u2013104","journal-title":"Commun ACM"},{"issue":"49","key":"213_CR30","doi-asserted-by":"publisher","first-page":"12435","DOI":"10.1073\/pnas.1803470115","volume":"115","author":"M Stella","year":"2018","unstructured":"Stella M, Ferrara E, De Domenico M (2018) Bots increase exposure to negative and inflammatory content in online social systems. Proc Natl Acad Sci 115(49):12435\u201312440","journal-title":"Proc Natl Acad Sci"},{"issue":"1","key":"213_CR31","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao C, Ciampaglia GL, Varol O, Yang K-C, Flammini A, Menczer F (2018) The spread of low-credibility content by social bots. Nat Commun 9(1):4787","journal-title":"Nat Commun"},{"issue":"3\u20135","key":"213_CR32","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010) Community detection in graphs. Phys Rep 486(3\u20135):75\u2013174","journal-title":"Phys Rep"},{"key":"213_CR33","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech Theory Exp 2008:P10008","journal-title":"J Stat Mech Theory Exp"},{"key":"213_CR34","volume-title":"Infectious diseases in humans","author":"RM Anderson","year":"1992","unstructured":"Anderson RM, May RM (1992) Infectious diseases in humans. Oxford University Press, Oxford"},{"issue":"4","key":"213_CR35","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1016\/j.physa.2012.09.030","volume":"392","author":"L Zhao","year":"2013","unstructured":"Zhao L, Cui H, Qiu X, Wang X, Wang J (2013) SIR rumor spreading model in the new media age. Phys A, Stat Mech Appl 392(4):995\u20131003","journal-title":"Phys A, Stat Mech Appl"},{"key":"213_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.111.128701","volume":"111","author":"C Granell","year":"2013","unstructured":"Granell C, G\u00f3mez S, Arenas A (2013) Dynamical interplay between awareness and epidemic spreading in multiplex networks. Phys Rev Lett 111:128701","journal-title":"Phys Rev Lett"},{"key":"213_CR37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.71.046119","volume":"71","author":"P Holme","year":"2005","unstructured":"Holme P (2005) Network reachability of real-world contact sequences. Phys Rev E 71:46119","journal-title":"Phys Rev E"},{"key":"213_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0203958","volume":"13","author":"P T\u00f6rnberg","year":"2018","unstructured":"T\u00f6rnberg P (2018) Echo chambers and viral misinformation: modeling fake news as complex contagion. PLoS ONE 13:1\u201321","journal-title":"PLoS ONE"},{"key":"213_CR39","doi-asserted-by":"publisher","DOI":"10.1140\/epjds18","volume":"2","author":"RA Ba\u00f1os","year":"2013","unstructured":"Ba\u00f1os RA, Borge-Holthoefer J, Moreno Y (2013) The role of hidden influentials in the diffusion of online information cascades. EPJ Data Sci 2:6","journal-title":"EPJ Data Sci"},{"key":"213_CR40","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-015-0042-4","volume":"4","author":"R Alvarez","year":"2015","unstructured":"Alvarez R, Garcia D, Moreno Y, Schweitzer F (2015) Sentiment cascades in the 15m movement. EPJ Data Sci 4:6","journal-title":"EPJ Data Sci"},{"key":"213_CR41","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0378-8733(83)90028-X","volume":"5","author":"SB Seidman","year":"1983","unstructured":"Seidman SB (1983) Network structure and minimum degree. Soc Netw 5:269\u2013287","journal-title":"Soc Netw"},{"key":"213_CR42","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2487788.2487809","volume-title":"Proceedings of the 22Nd international conference on World Wide Web, WWW \u201913 companion","author":"AT Hadgu","year":"2013","unstructured":"Hadgu AT, Garimella K, Weber I (2013) Political hashtag hijacking in the U.S. In: Proceedings of the 22Nd international conference on World Wide Web, WWW \u201913 companion. ACM, New York, pp 55\u201356"},{"key":"213_CR43","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2512938.2512951","volume-title":"Proceedings of the first ACM conference on online social networks, COSN \u201913","author":"P Gon\u00e7alves","year":"2013","unstructured":"Gon\u00e7alves P, Ara\u00fajo M, Benevenuto F, Cha M (2013) Comparing and combining sentiment analysis methods. In: Proceedings of the first ACM conference on online social networks, COSN \u201913. ACM, New York, pp 27\u201338"},{"key":"213_CR44","first-page":"192","volume-title":"Proceedings of 3rd IEEE conference on social computing (SocialCom)","author":"M Conover","year":"2011","unstructured":"Conover M, Gon\u00e7alves B, Ratkiewicz J, Flammini A, Menczer F (2011) Predicting the political alignment of Twitter users. In: Proceedings of 3rd IEEE conference on social computing (SocialCom), pp 192\u2013199"},{"issue":"9","key":"213_CR45","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1073\/pnas.082090499","volume":"99","author":"DJ Watts","year":"2002","unstructured":"Watts DJ (2002) A simple model of global cascades on random networks. Proc Natl Acad Sci 99(9):5766\u20135771","journal-title":"Proc Natl Acad Sci"},{"issue":"3","key":"213_CR46","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1086\/521848","volume":"113","author":"D Centola","year":"2007","unstructured":"Centola D, Macy M (2007) Complex contagions and the weakness of long ties. Am J Sociol 113(3):702\u2013734","journal-title":"Am J Sociol"},{"key":"213_CR47","first-page":"67","volume-title":"Proceedings of the 12th international conference on knowledge-based intelligent information and engineering systems, part III, KES \u201908","author":"K Saito","year":"2008","unstructured":"Saito K, Nakano R, Kimura M (2008) Prediction of information diffusion probabilities for independent cascade model. In: Proceedings of the 12th international conference on knowledge-based intelligent information and engineering systems, part III, KES \u201908. Springer, Berlin, pp 67\u201375"},{"key":"213_CR48","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-642-17572-5_48","volume-title":"Proceedings of the 6th international conference on Internet and network economics, WINE\u201910","author":"A Borodin","year":"2010","unstructured":"Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: Proceedings of the 6th international conference on Internet and network economics, WINE\u201910. Springer, Berlin, pp 539\u2013550"},{"issue":"16","key":"213_CR49","doi-asserted-by":"publisher","first-page":"3476","DOI":"10.1016\/j.physa.2013.03.050","volume":"392","author":"F Karimi","year":"2013","unstructured":"Karimi F, Holme P (2013) Threshold model of cascades in empirical temporal networks. Phys A, Stat Mech Appl 392(16):3476\u20133483","journal-title":"Phys A, Stat Mech Appl"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-019-0213-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-019-0213-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-019-0213-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T04:54:03Z","timestamp":1613019243000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-019-0213-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["213"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-019-0213-9","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"6 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"35"}}