{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T02:09:18Z","timestamp":1775614158258,"version":"3.50.1"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":37,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["W911NF-12-1-0037"],"award-info":[{"award-number":["W911NF-12-1-0037"]}]},{"name":"National Science Foundation","award":["IIS-1054199"],"award-info":[{"award-number":["IIS-1054199"]}]},{"name":"National Science Foundation","award":["IIS-0968489"],"award-info":[{"award-number":["IIS-0968489"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2736277.2741637","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T20:37:12Z","timestamp":1454704632000},"page":"1395-1405","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":434,"title":["Enquiring Minds"],"prefix":"10.1145","author":[{"given":"Zhe","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Ann Arbor, MI, USA"}]},{"given":"Paul","family":"Resnick","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Ann Arbor, MI, USA"}]},{"given":"Qiaozhu","family":"Mei","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Classification and regression trees","author":"Breiman L.","year":"1984","unstructured":"L. Breiman , J. Friedman , C. J. Stone , and R. A. Olshen . Classification and regression trees . CRC press , 1984 . L. Breiman, J. Friedman, C. J. Stone, and R. A. Olshen. Classification and regression trees. CRC press, 1984."},{"key":"e_1_3_2_1_2_1","first-page":"21","volume-title":"Proceedings","author":"Broder A. Z.","year":"1997","unstructured":"A. Z. Broder . On the resemblance and containment of documents. In Compression and Complexity of Sequences 1997 . Proceedings , pages 21 -- 29 . IEEE, 1997 . A. Z. Broder. On the resemblance and containment of documents. In Compression and Complexity of Sequences 1997. Proceedings, pages 21--29. IEEE, 1997."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143865"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.87"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11736790_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/11503-000"},{"key":"e_1_3_2_1_10_1","volume-title":"False rumor of explosion at white house causes stocks to briefly plunge","author":"Domm P.","year":"2013","unstructured":"P. Domm . False rumor of explosion at white house causes stocks to briefly plunge ; ap confirms its twitter feed was hacked., April 2013 . P. Domm. False rumor of explosion at white house causes stocks to briefly plunge; ap confirms its twitter feed was hacked., April 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622487.1622501"},{"key":"e_1_3_2_1_12_1","volume-title":"An extensive empirical study of feature selection metrics for text classification. The Journal of machine learning research, 3:1289--1305","author":"Forman G.","year":"2003","unstructured":"G. Forman . An extensive empirical study of feature selection metrics for text classification. The Journal of machine learning research, 3:1289--1305 , 2003 . G. Forman. An extensive empirical study of feature selection metrics for text classification. The Journal of machine learning research, 3:1289--1305, 2003."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media","author":"Friggeri A.","year":"2014","unstructured":"A. Friggeri , L. A. Adamic , D. Eckles , and J. Cheng . Rumor cascades . In Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media , 2014 . A. Friggeri, L. A. Adamic, D. Eckles, and J. Cheng. Rumor cascades. In Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185354.2185356"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"$1.00 per rt# bostonmarathon# prayforboston: Analyzing fake content on twitter. In eCrime Researchers Summit (eCRS)","author":"Gupta A.","year":"2013","unstructured":"A. Gupta , H. Lamba , and P. Kumaraguru . $1.00 per rt# bostonmarathon# prayforboston: Analyzing fake content on twitter. In eCrime Researchers Summit (eCRS) , 2013 , pages 1 -- 12 . IEEE , 2013. A. Gupta, H. Lamba, and P. Kumaraguru. $1.00 per rt# bostonmarathon# prayforboston: Analyzing fake content on twitter. In eCrime Researchers Summit (eCRS), 2013, pages 1--12. IEEE, 2013."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557077"},{"key":"e_1_3_2_1_19_1","first-page":"281","volume-title":"Proceedings of the fifth Berkeley symposium on mathematical statistics and probability","volume":"1","author":"MacQueen J.","year":"1967","unstructured":"J. MacQueen Some methods for classification and analysis of multivariate observations . In Proceedings of the fifth Berkeley symposium on mathematical statistics and probability , volume 1 , pages 281 -- 297 . Oakland, CA, USA. , 1967 . J. MacQueen et al. Some methods for classification and analysis of multivariate observations. In Proceedings of the fifth Berkeley symposium on mathematical statistics and probability, volume 1, pages 281--297. Oakland, CA, USA., 1967."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807306"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964869"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145274"},{"key":"e_1_3_2_1_23_1","first-page":"23","article-title":"A comparison of information seeking using search engines and social networks","volume":"10","author":"Morris M. R.","year":"2010","unstructured":"M. R. Morris , J. Teevan , and K. Panovich . A comparison of information seeking using search engines and social networks . ICWSM , 10 : 23 -- 26 , 2010 . M. R. Morris, J. Teevan, and K. Panovich. A comparison of information seeking using search engines and social networks. ICWSM, 10:23--26, 2010.","journal-title":"ICWSM"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753587"},{"key":"e_1_3_2_1_25_1","volume-title":"ICWSM","author":"Paul S. A.","year":"2011","unstructured":"S. A. Paul , L. Hong , and E. H. Chi . Is twitter a good place for asking questions? a characterization study . In ICWSM , 2011 . S. A. Paul, L. Hong, and E. H. Chi. Is twitter a good place for asking questions? a characterization study. In ICWSM, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0271-5309(97)00024-4"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"e_1_3_2_1_28_1","first-page":"1589","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"Qazvinian V.","year":"2011","unstructured":"V. Qazvinian , E. Rosengren , D. R. Radev , and Q. Mei . Rumor has it: Identifying misinformation in microblogs . In Proceedings of the Conference on Empirical Methods in Natural Language Processing , pages 1589 -- 1599 . Association for Computational Linguistics , 2011 . V. Qazvinian, E. Rosengren, D. R. Radev, and Q. Mei. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, pages 1589--1599. Association for Computational Linguistics, 2011."},{"key":"e_1_3_2_1_29_1","volume-title":"ICWSM","author":"Ratkiewicz J.","year":"2011","unstructured":"J. Ratkiewicz , M. Conover , M. Meiss , B. Gon\u00e7alves , A. Flammini , and F. Menczer . Detecting and tracking political abuse in social media . In ICWSM , 2011 . J. Ratkiewicz, M. Conover, M. Meiss, B. Gon\u00e7alves, A. Flammini, and F. Menczer. Detecting and tracking political abuse in social media. In ICWSM, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.46.5.484"},{"key":"e_1_3_2_1_32_1","first-page":"83891I","volume-title":"SPIE Defense, Security, and Sensing","author":"Seo E.","year":"2012","unstructured":"E. Seo , P. Mohapatra , and T. Abdelzaher . Identifying rumors and their sources in social networks . In SPIE Defense, Security, and Sensing , pages 83891I -- 83891I . International Society for Optics and Photonics , 2012 . E. Seo, P. Mohapatra, and T. Abdelzaher. Identifying rumors and their sources in social networks. In SPIE Defense, Security, and Sensing, pages 83891I--83891I. International Society for Optics and Photonics, 2012."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37401-2_14"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCIS-ISIS.2012.6505254"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_3_2_1_36_1","first-page":"409","article-title":"Culture matters: A survey study of social q&a behavior","volume":"11","author":"Yang J.","year":"2011","unstructured":"J. Yang , M. R. Morris , J. Teevan , L. A. Adamic , and M. S. Ackerman . Culture matters: A survey study of social q&a behavior . ICWSM , 11 : 409 -- 416 , 2011 . J. Yang, M. R. Morris, J. Teevan, L. A. Adamic, and M. S. Ackerman. Culture matters: A survey study of social q&a behavior. ICWSM, 11:409--416, 2011.","journal-title":"ICWSM"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488523"}],"event":{"name":"WWW '15: 24th International World Wide Web Conference","location":"Florence Italy","acronym":"WWW '15","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741637","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2736277.2741637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:29Z","timestamp":1750227149000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741637"}},"subtitle":["Early Detection of Rumors in Social Media from Enquiry Posts"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":37,"alternative-id":["10.1145\/2736277.2741637","10.5555\/2736277"],"URL":"https:\/\/doi.org\/10.1145\/2736277.2741637","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}