{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:47Z","timestamp":1777854527646,"version":"3.51.4"},"reference-count":42,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:p>In this article, we present a Social Network Analysis\u2013based approach to investigate user behaviour during a cryptocurrency speculative bubble in order to extract knowledge patterns about it. Our approach is general and can be applied to any past, present and future cryptocurrency speculative bubble. To verify its potential, we apply it to investigate the Ethereum speculative bubble happened in the years 2017 and 2018. We also describe several interesting knowledge patterns about the behaviour of specific categories of users that we obtained from this investigation. Furthermore, we describe how our approach can support the construction of an identikit of the speculators who maneuvered behind the Ethereum bubble analysed. Finally, we show that this capability of supporting the hunting for speculators is intrinsic of our approach and can cover past, present and future bubbles.<\/jats:p>","DOI":"10.1177\/01655515211047428","type":"journal-article","created":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T06:36:59Z","timestamp":1639463819000},"page":"1060-1085","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":16,"title":["A Social Network Analysis\u2013based approach to investigate user behaviour during a cryptocurrency speculative bubble"],"prefix":"10.1177","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1947-8667","authenticated-orcid":false,"given":"Gianluca","family":"Bonifazi","sequence":"first","affiliation":[{"name":"Department of Information Engineering, Marche Polytechnic University, Italy"}]},{"given":"Enrico","family":"Corradini","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Marche Polytechnic University, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1360-8499","authenticated-orcid":false,"given":"Domenico","family":"Ursino","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Marche Polytechnic University, Italy"}]},{"given":"Luca","family":"Virgili","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Marche Polytechnic University, Italy"}]}],"member":"179","published-online":{"date-parts":[[2021,12,14]]},"reference":[{"key":"bibr1-01655515211047428","author":"Nakamoto S.","year":"2008","journal-title":"Bitcoin: a peer-to-peer electronic cash system"},{"key":"bibr2-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1257\/mac.4.3.184"},{"key":"bibr3-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.121732"},{"key":"bibr4-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.180643"},{"key":"bibr5-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516673480"},{"key":"bibr6-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1177\/0165551517748289"},{"key":"bibr7-01655515211047428","volume-title":"Introduction to ego network analysis","author":"DeJordy R","year":"2008"},{"key":"bibr8-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"bibr9-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.96.040601"},{"key":"bibr10-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.irfa.2018.09.003"},{"key":"bibr11-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"bibr12-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.170623"},{"key":"bibr13-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.intfin.2019.02.003"},{"key":"bibr14-01655515211047428","first-page":"114","volume-title":"Proceedings of the international conference on network and system security (NSS\u201919)","author":"Sun H"},{"key":"bibr15-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1177\/0165551517748290"},{"key":"bibr16-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.11.031"},{"key":"bibr17-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1080\/13504851.2014.916379"},{"key":"bibr18-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2015.02.029"},{"key":"bibr19-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2018.08.015"},{"key":"bibr20-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2019.08.007"},{"key":"bibr21-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2017.05.010"},{"key":"bibr22-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2020.101505"},{"key":"bibr23-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1002\/ijfe.1851"},{"key":"bibr24-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2017.12.006"},{"key":"bibr25-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1080\/00036846.2015.1005827"},{"key":"bibr26-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.irfa.2016.02.008"},{"key":"bibr27-01655515211047428","first-page":"276","volume-title":"Proceedings of the international conference on information and communication technologies in education, research, and industrial applications (ICTERI\u201918)","author":"Soloviev VN"},{"key":"bibr28-01655515211047428","first-page":"1","volume-title":"Proceedings of the IEEE symposium series on computational intelligence (SSCI\u201917)","author":"Phillips RC"},{"key":"bibr29-01655515211047428","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm12020053"},{"key":"bibr30-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"bibr31-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"bibr32-01655515211047428","first-page":"2721","volume-title":"Proceedings of the 29th international security symposium (USENIX\u201920)","author":"Kalodner H"},{"key":"bibr33-01655515211047428","first-page":"439","volume-title":"Proceedings of the international conference on complex systems (ICCS\u201918)","author":"Somin S"},{"key":"bibr34-01655515211047428","first-page":"498","volume-title":"Proceedings of the 2017 12th international conference for internet technology and secured transactions (ICITST\u201917)","author":"Chan W"},{"key":"bibr35-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2941650"},{"key":"bibr36-01655515211047428","doi-asserted-by":"publisher","DOI":"10.3390\/fi8010007"},{"key":"bibr37-01655515211047428","first-page":"537","volume-title":"Proceedings of the IEEE international conference on data science and advanced analytics (DSAA\u201916)","author":"Maesa DDF"},{"key":"bibr38-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.077"},{"key":"bibr39-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.041"},{"key":"bibr40-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515621005"},{"key":"bibr41-01655515211047428","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516644171"},{"key":"bibr42-01655515211047428","volume-title":"Trusses: cohesive subgraphs for social network analysis","author":"Cohen J","year":"2008"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211047428","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01655515211047428","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211047428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:26Z","timestamp":1777504166000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01655515211047428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["10.1177\/01655515211047428"],"URL":"https:\/\/doi.org\/10.1177\/01655515211047428","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,14]]}}}