{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:54:08Z","timestamp":1772808848762,"version":"3.50.1"},"reference-count":82,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T00:00:00Z","timestamp":1532563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2019,4]]},"abstract":"<jats:p> The widespread use of big social data has influenced the research community in several significant ways. In particular, the notion of social trust has attracted a great deal of attention from information processors and computer scientists as well as information consumers and formal organisations. This attention is embodied in the various shapes social trust has taken, such as its use in recommendation systems, viral marketing and expertise retrieval. Hence, it is essential to implement frameworks that are able to temporally measure a user\u2019s credibility in all categories of big social data. To this end, this article suggests the CredSaT (Credibility incorporating Semantic analysis and Temporal factor), which is a fine-grained credibility analysis framework for use in big social data. A novel metric that includes both new and current features, as well as the temporal factor, is harnessed to establish the credibility ranking of users. Experiments on real-world datasets demonstrate the efficacy and applicability of our model in determining highly domain-based trustworthy users. Furthermore, CredSaT may also be used to identify spammers and other anomalous users. <\/jats:p>","DOI":"10.1177\/0165551518790424","type":"journal-article","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T14:02:45Z","timestamp":1532613765000},"page":"259-280","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":59,"title":["CredSaT: Credibility ranking of users in big social data incorporating semantic analysis and temporal factor"],"prefix":"10.1177","volume":"45","author":[{"given":"Bilal","family":"Abu-Salih","sequence":"first","affiliation":[{"name":"Curtin University, Australia"}]},{"given":"Pornpit","family":"Wongthongtham","sequence":"additional","affiliation":[{"name":"Curtin University, Australia"}]},{"given":"Kit Yan","family":"Chan","sequence":"additional","affiliation":[{"name":"Curtin University, Australia"}]},{"given":"Dengya","family":"Zhu","sequence":"additional","affiliation":[{"name":"Curtin University, Australia"}]}],"member":"179","published-online":{"date-parts":[[2018,7,26]]},"reference":[{"key":"bibr1-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551517698787"},{"key":"bibr2-0165551518790424","doi-asserted-by":"publisher","DOI":"10.2307\/41703503"},{"key":"bibr3-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2015.05.002"},{"key":"bibr4-0165551518790424","doi-asserted-by":"publisher","DOI":"10.3233\/SW-130117"},{"key":"bibr5-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.06.009"},{"key":"bibr6-0165551518790424","volume-title":"Sentiment analysis in the bio-medical domain: techniques, tools, and applications","author":"Satapathy R","year":"2018"},{"key":"bibr7-0165551518790424","volume-title":"Proceedings of the COLING, the 26th international conference on computational linguistics: technical papers","author":"Cambria E"},{"key":"bibr8-0165551518790424","volume-title":"Proceedings of the international conference on collaboration technologies and systems (CTS)","author":"Demchenko Y"},{"key":"bibr9-0165551518790424","volume-title":"Proceedings of the international congress on big data","author":"Abu-Salih B"},{"key":"bibr10-0165551518790424","first-page":"190","volume-title":"Proceedings of the 10th international conference on computer and automation engineering","author":"Nabipourshiri R"},{"key":"bibr11-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515603324"},{"key":"bibr12-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551512459921"},{"key":"bibr13-0165551518790424","volume-title":"Proceedings of the W3C workshop on the future of social networking","author":"Passant A"},{"key":"bibr14-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.23"},{"key":"bibr15-0165551518790424","volume-title":"Proceedings of the 3rd international conference on web search and data mining","author":"Weng J"},{"key":"bibr16-0165551518790424","volume-title":"Proceedings of the 7th workshop on social network mining and analysis","author":"Silva A"},{"key":"bibr17-0165551518790424","volume-title":"Proceedings of the 1st international workshop on social media retrieval and analysis","author":"Yeniterzi R"},{"key":"bibr18-0165551518790424","volume-title":"Proceedings of the 19th international conference on World Wide Web","author":"Kwak H"},{"key":"bibr19-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-4585-18-7_7"},{"key":"bibr20-0165551518790424","volume-title":"Proceedings of the IEEE\/WIC\/ACM international joint conferences on web intelligence (WI) and intelligent agent technologies (IAT)","author":"Agarwal M"},{"key":"bibr21-0165551518790424","volume-title":"Proceedings of the 20th international conference on software, telecommunications and computer networks (SoftCOM)","author":"Podobnik V"},{"key":"bibr22-0165551518790424","volume-title":"Proceedings of the international conference on social computing","author":"Sikdar S"},{"key":"bibr23-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.95.012301"},{"key":"bibr24-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-013-0252-2"},{"key":"bibr25-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"bibr26-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516628733"},{"key":"bibr27-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4276"},{"key":"bibr28-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515613226"},{"key":"bibr29-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2716930"},{"key":"bibr30-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.117"},{"key":"bibr31-0165551518790424","volume-title":"Proceedings of the conference on empirical methods in natural language processing","author":"Poria S"},{"key":"bibr32-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2771234"},{"key":"bibr33-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2723012"},{"key":"bibr34-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.004"},{"issue":"2","key":"bibr35-0165551518790424","volume":"33","author":"Dragoni M","year":"2018","journal-title":"IEEE Intell Syst App"},{"key":"bibr36-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55394-8"},{"key":"bibr37-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.4531228"},{"key":"bibr38-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.002"},{"key":"bibr39-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.31"},{"key":"bibr40-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.036"},{"key":"bibr41-0165551518790424","volume-title":"Proceedings of the international conference on advances in social networks analysis and mining","author":"AlRubaian M"},{"key":"bibr42-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1504\/IJSTM.2015.073917"},{"key":"bibr43-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22768"},{"key":"bibr44-0165551518790424","volume-title":"Proceedings of the congress on evolutionary computation","author":"Kawabe T"},{"key":"bibr45-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1145\/2811282"},{"key":"bibr46-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1504\/IJWBC.2016.074274"},{"key":"bibr47-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.042"},{"key":"bibr48-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-11-2016-0489"},{"key":"bibr49-0165551518790424","unstructured":"Wongthontham P, Abu-Salih B. Ontology-based approach for semantic data extraction from social big data: state-of-the-art and research directions. arXiv preprint arXiv:180101624. 2018, https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1801\/1801.01624.pdf"},{"key":"bibr50-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-018-0467-6"},{"key":"bibr51-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/5254.747902"},{"key":"bibr52-0165551518790424","volume-title":"Proceedings of the 21st SIGKDD international conference on knowledge discovery and data mining","author":"Embar VR"},{"key":"bibr53-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.072"},{"key":"bibr54-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.08.001"},{"key":"bibr55-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0619-y"},{"key":"bibr56-0165551518790424","volume-title":"Proceedings of the international joint conference on neural networks (IJCNN)","author":"Song S"},{"key":"bibr57-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37210-0_48"},{"key":"bibr58-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11116-2_10"},{"key":"bibr59-0165551518790424","volume-title":"Proceedings of the international conference on services computing","author":"Liu D"},{"key":"bibr60-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0532-5"},{"key":"bibr61-0165551518790424","unstructured":"Zhao L, Hua T, Lu C-T, et al. A topic-focused trust model for Twitter. Comput Comm 2015, https:\/\/www.researchgate.net\/profile\/Liang_Zhao60\/publication\/281787851_A_Topic-focused_Trust_Model_for_Twitter\/links\/55f8c03808aeafc8ac19660c\/A-Topic-focused-Trust-Model-for-Twitter.pdf (accessed 27 July 2018)."},{"key":"bibr62-0165551518790424","volume-title":"Proceedings of the 5th international conference on weblogs and social media","author":"Brown P"},{"key":"bibr63-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.011"},{"key":"bibr64-0165551518790424","volume-title":"Proceedings of the 25th international conference on World Wide Web","author":"Pal A"},{"key":"bibr65-0165551518790424","volume-title":"Proceedings of the 4th workshop on analytics for noisy unstructured text data","author":"Michelson M"},{"key":"bibr66-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2717879"},{"key":"bibr67-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516657712"},{"key":"bibr68-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515602846"},{"key":"bibr69-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1561\/1500000024"},{"issue":"3","key":"bibr70-0165551518790424","first-page":"10","volume":"33","author":"Yin H","year":"2015","journal-title":"ACM T Inform Syst"},{"key":"bibr71-0165551518790424","author":"Yardi S","year":"2009","journal-title":"Detecting spam in a Twitter network"},{"key":"bibr72-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0256090915575450"},{"key":"bibr73-0165551518790424","first-page":"13","volume":"8","author":"Kaggal VC","year":"2016","journal-title":"Biomed Inform Insights"},{"key":"bibr74-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1177\/0165551513478738"},{"key":"bibr75-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2332453"},{"key":"bibr76-0165551518790424","unstructured":"Sayce D. 10 billion tweets \u2026 number of tweets per day 2016, http:\/\/www.dsayce.com\/social-media\/10-billions-tweets\/ (accessed 23 July 2018)."},{"key":"bibr77-0165551518790424","volume-title":"Mental models","author":"Gentner D","year":"1983"},{"key":"bibr78-0165551518790424","volume-title":"Proceedings of the international conference on security and cryptography (SECRYPT)","author":"Wang AH."},{"key":"bibr79-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1002\/9780470028261"},{"key":"bibr80-0165551518790424","unstructured":"Makice K. Twitter API: up and running: learn how to build applications with the Twitter API. Sebastopol, CA: O\u2019Reilly Media, Inc., 2009."},{"key":"bibr81-0165551518790424","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0231-3"},{"issue":"4","key":"bibr82-0165551518790424","first-page":"4444","volume":"9","author":"Saravanakumar M","year":"2012","journal-title":"Life Sci J"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551518790424","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0165551518790424","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551518790424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T22:35:25Z","timestamp":1740782125000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551518790424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,26]]},"references-count":82,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["10.1177\/0165551518790424"],"URL":"https:\/\/doi.org\/10.1177\/0165551518790424","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,26]]}}}