{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:34:16Z","timestamp":1774449256529,"version":"3.50.1"},"reference-count":115,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Online social networks have established virtual platforms enabling people to express their opinions, interests and thoughts in a variety of contexts and domains, allowing legitimate users as well as spammers and other untrustworthy users to publish and spread their content. Hence, it is vital to have an accurate understanding of the contextual content of social users, thus establishing grounds for measuring their social influence accordingly. In particular, there is the need for a better understanding of domain-based social trust to improve and expand the analysis process and determining the credibility of Social Big Data. The aim of this paper is to determine domain-based social influencers by means of a framework that incorporates semantic analysis and machine learning modules to measure and predict users\u2019 credibility in numerous domains at different time periods. The evaluation of the experiment conducted herein validates the applicability of semantic analysis and machine learning techniques in detecting highly trustworthy domain-based influencers.<\/jats:p>","DOI":"10.1186\/s40537-020-0283-3","type":"journal-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T12:02:51Z","timestamp":1581336171000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Time-aware domain-based social influence prediction"],"prefix":"10.1186","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9875-4369","authenticated-orcid":false,"given":"Bilal","family":"Abu-Salih","sequence":"first","affiliation":[]},{"given":"Kit Yan","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Al-Kadi","sequence":"additional","affiliation":[]},{"given":"Marwan","family":"Al-Tawil","sequence":"additional","affiliation":[]},{"given":"Pornpit","family":"Wongthongtham","sequence":"additional","affiliation":[]},{"given":"Tomayess","family":"Issa","sequence":"additional","affiliation":[]},{"given":"Heba","family":"Saadeh","sequence":"additional","affiliation":[]},{"given":"Malak","family":"Al-Hassan","sequence":"additional","affiliation":[]},{"given":"Bushra","family":"Bremie","sequence":"additional","affiliation":[]},{"given":"Abdulaziz","family":"Albahlal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,10]]},"reference":[{"issue":"3","key":"283_CR1","doi-asserted-by":"publisher","first-page":"370","DOI":"10.2307\/2095356","volume":"52","author":"JM McPherson","year":"1987","unstructured":"McPherson JM, Smith-Lovin L. Homophily in voluntary organizations: status distance and the composition of face-to-face groups. Am Sociol Rev. 1987;52(3):370\u20139.","journal-title":"Am Sociol Rev."},{"key":"283_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.jpubeco.2016.08.011","volume":"143","author":"Y Halberstam","year":"2016","unstructured":"Halberstam Y, Knight B. Homophily, group size, and the diffusion of political information in social networks: evidence from Twitter. J Public Econ. 2016;143:73\u201388.","journal-title":"J Public Econ."},{"key":"283_CR3","unstructured":"Kang J-H, Lerman K, editors. Using lists to measure homophily on twitter. In: Workshops at the twenty-sixth AAAI conference on artificial intelligence; 2012."},{"issue":"1","key":"283_CR4","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson M, Smith-Lovin L, Cook JM. Birds of a feather: homophily in social networks. Ann Rev Sociol. 2001;27(1):415\u201344.","journal-title":"Ann Rev Sociol"},{"key":"283_CR5","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8358.001.0001","volume-title":"Networked: the new social operating system","author":"L Rainie","year":"2012","unstructured":"Rainie L, Wellman B. Networked: the new social operating system. Cambridge: MIT Press; 2012."},{"issue":"6","key":"283_CR6","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1002\/(SICI)1097-4571(199507)46:6<400::AID-ASI2>3.0.CO;2-Y","volume":"46","author":"B Hj\u00f8rland","year":"1995","unstructured":"Hj\u00f8rland B, Albrechtsen H. Toward a new horizon in information science: domain-analysis. J Am Soc Inf Sci. 1995;46(6):400\u201325.","journal-title":"J Am Soc Inf Sci."},{"key":"283_CR7","doi-asserted-by":"crossref","unstructured":"Abu Salih B, Wongthongtham P, Beheshti S-M-R, Zhu D, editors. A preliminary approach to domain-based evaluation of users\u2019 trustworthiness in online social networks. In: 2015 IEEE international congress on big data (BigData Congress). New York: IEEE; 2015.","DOI":"10.1109\/BigDataCongress.2015.74"},{"key":"283_CR8","volume-title":"Trustworthiness in social big data incorporating semantic analysis, machine learning and distributed data processing","author":"B Abu-Salih","year":"2018","unstructured":"Abu-Salih B. Trustworthiness in social big data incorporating semantic analysis, machine learning and distributed data processing. Perth: Curtin University; 2018."},{"key":"283_CR9","doi-asserted-by":"crossref","unstructured":"Abu-Salih B, Bremie B, Wongthongtham P, Duan K, Issa T, Chan KY, et al., editors. Social credibility incorporating semantic analysis and machine learning: a survey of the state-of-the-art and future research directions 2019; Cham: Springer International Publishing.","DOI":"10.1007\/978-3-030-15035-8_87"},{"key":"283_CR10","unstructured":"Abu-Salih B, Wongthongtham P, Beheshti S-M-R, Zajabbari B. Towards a methodology for social business intelligence in the era of big social data incorporating trust and semantic analysis. In: Second international conference on advanced data and information engineering (DaEng-2015); Bali, Indonesia: Springer; 2015."},{"issue":"5","key":"283_CR11","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1108\/JKM-11-2016-0489","volume":"22","author":"B Abu-Salih","year":"2018","unstructured":"Abu-Salih B, Wongthongtham P, Chan KY. Twitter mining for ontology-based domain discovery incorporating machine learning. J Knowl Manag. 2018;22(5):949\u201381.","journal-title":"J Knowl Manag."},{"key":"283_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.inffus.2015.08.005","volume":"28","author":"G Bello-Orgaz","year":"2016","unstructured":"Bello-Orgaz G, Jung JJ, Camacho D. Social big data: recent achievements and new challenges. Inf Fusion. 2016;28:45\u201359.","journal-title":"Inf Fusion."},{"issue":"4","key":"283_CR13","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.2307\/41703503","volume":"36","author":"HC Chen","year":"2012","unstructured":"Chen HC, Chiang RHL, Storey VC. Business intelligence and analytics: from big data to big impact. MIS Q. 2012;36(4):1165\u201388.","journal-title":"MIS Q."},{"issue":"1","key":"283_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s40537-017-0063-x","volume":"4","author":"E Olshannikova","year":"2017","unstructured":"Olshannikova E, Olsson T, Huhtam\u00e4ki J, K\u00e4rkk\u00e4inen H. Conceptualizing big social data. J Big Data. 2017;4(1):3.","journal-title":"J Big Data."},{"issue":"5\u20136","key":"283_CR15","first-page":"815","volume":"13","author":"A Hermida","year":"2012","unstructured":"Hermida A, Fletcher F, Korell D, Logan D. SHARE, LIKE, RECOMMEND decoding the social media news consumer. J Stud. 2012;13(5\u20136):815\u201324.","journal-title":"J Stud."},{"key":"283_CR16","doi-asserted-by":"crossref","unstructured":"Mendoza M, Poblete B, Castillo C, editors. Twitter Under Crisis: Can we trust what we RT? In: Proceedings of the first workshop on social media analytics. New York: ACM; 2010.","DOI":"10.1145\/1964858.1964869"},{"issue":"3","key":"283_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2870630","volume":"34","author":"S Papadopoulos","year":"2016","unstructured":"Papadopoulos S, Bontcheva K, Jaho E, Lupu M, Castillo C. Overview of the special issue on trust and veracity of information in social media. ACM Trans Inf Syst. 2016;34(3):14.","journal-title":"ACM Trans Inf Syst"},{"key":"283_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2015.08.001","volume":"76","author":"L Zhao","year":"2016","unstructured":"Zhao L, Hua T, Lu CT, Chen IR. A topic-focused trust model for Twitter. Comput Commun. 2016;76:1\u201311.","journal-title":"Comput Commun"},{"key":"283_CR19","doi-asserted-by":"crossref","unstructured":"Ito J, Song J, Toda H, Koike Y, Oyama S, editors. Assessment of tweet credibility with LDA features. In: Proceedings of the 24th international conference on world wide web; New York: ACM; 2015.","DOI":"10.1145\/2740908.2742569"},{"key":"283_CR20","doi-asserted-by":"crossref","unstructured":"Agichtein E, Castillo C, Donato D, Gionis A, Mishne G, editors. Finding high-quality content in social media. In: Proceedings of the 2008 international conference on web search and data mining. New York: ACM; 2008.","DOI":"10.1145\/1341531.1341557"},{"issue":"2","key":"283_CR21","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1177\/0165551518790424","volume":"45","author":"B Abu-Salih","year":"2018","unstructured":"Abu-Salih B, Wongthongtham P, Chan KY, Zhu D. CredSaT: Credibility ranking of users in big social data incorporating semantic analysis and temporal factor. J Inf Sci. 2018;45(2):259\u201380.","journal-title":"J Inf Sci."},{"issue":"1","key":"283_CR22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s40537-015-0024-1","volume":"2","author":"B Abu-Salih","year":"2015","unstructured":"Abu-Salih B, Wongthongtham P, Zhu D, Alqrainy S. An approach for time-aware domain-based analysis of users\u2019 trustworthiness in big social data. Int J Big Data. 2015;2(1):16.","journal-title":"Int J Big Data"},{"key":"283_CR23","doi-asserted-by":"crossref","unstructured":"Chan KY, Kwong CK, Wongthongtham P, Jiang H, Fung CKY, Abu-Salih B, et al. Affective design using machine learning: a survey and its prospect of conjoining big data. Int J Comput Integr Manuf. 2018;1\u201319.","DOI":"10.1080\/0951192X.2018.1526412"},{"key":"283_CR24","first-page":"119","volume-title":"Social media marketing and SEO. Introducing SEO","author":"A Shenoy","year":"2016","unstructured":"Shenoy A, Prabhu A. Social media marketing and SEO. Introducing SEO. Berlin: Springer; 2016. p. 119\u201327."},{"issue":"1","key":"283_CR25","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1186\/s40537-019-0224-1","volume":"6","author":"S Kumar","year":"2019","unstructured":"Kumar S, Zymbler M. A machine learning approach to analyze customer satisfaction from airline tweets. J Big Data. 2019;6(1):62.","journal-title":"J Big Data."},{"issue":"6","key":"283_CR26","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/69.824597","volume":"11","author":"IN Chengalur-Smith","year":"1999","unstructured":"Chengalur-Smith IN, Ballou DP, Pazer HL. The impact of data quality information on decision making: an exploratory analysis. IEEE Trans Knowl Data Eng. 1999;11(6):853\u201364.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"283_CR27","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.jbusres.2016.08.007","volume":"70","author":"M Janssen","year":"2017","unstructured":"Janssen M, van der Voort H, Wahyudi A. Factors influencing big data decision-making quality. J Bus Res. 2017;70:338\u201345.","journal-title":"J Bus Res."},{"issue":"3","key":"283_CR28","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/2811282","volume":"48","author":"E Momeni","year":"2016","unstructured":"Momeni E, Cardie C, Diakopoulos N. A survey on assessment and ranking methodologies for user-generated content on the Web. ACM Comput Surv. 2016;48(3):41.","journal-title":"ACM Comput Surv"},{"issue":"4","key":"283_CR29","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan W, Nepal S, Paris C. A survey of trust in social networks. ACM Comput Surv. 2013;45(4):47.","journal-title":"ACM Comput Surv."},{"issue":"1","key":"283_CR30","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1504\/IJWBC.2016.074274","volume":"12","author":"A Amalanathan","year":"2016","unstructured":"Amalanathan A, Anouncia SM. A review on user influence ranking factors in social networks. Int J Web Based Communities. 2016;12(1):74\u201383.","journal-title":"Int J Web Based Communities"},{"key":"283_CR31","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.knosys.2016.05.042","volume":"106","author":"Y Ruan","year":"2016","unstructured":"Ruan Y, Durresi A. A survey of trust management systems for online social communities\u2013Trust modeling, trust inference and attacks. Knowl-Based Syst. 2016;106:150\u201363.","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"283_CR32","first-page":"405","volume":"10","author":"S Harrington","year":"2013","unstructured":"Harrington S, Highfield T, Bruns A. More than a backchannel: twitter and television. Participations. 2013;10(1):405\u20139.","journal-title":"Participations."},{"key":"283_CR33","doi-asserted-by":"crossref","unstructured":"Nabipourshiri R, Abu-Salih B, Wongthongtham P. Tree-based classification to users\u2019 trustworthiness in OSNs. Proceedings of the 2018 10th international conference on computer and automation engineering\u2014ICCAE 2018; Brisbane, Australia. 3193004: ACM; 2018. p. 190\u20134.","DOI":"10.1145\/3192975.3193004"},{"key":"283_CR34","doi-asserted-by":"crossref","unstructured":"Wongthongtham P, Abu-Salih B, editors. Ontology and trust based data warehouse in new generation of business intelligence: State-of-the-art, challenges, and opportunities. In: 2015 IEEE 13th international conference on industrial informatics (INDIN). New York: IEEE; 2015.","DOI":"10.1109\/INDIN.2015.7281780"},{"issue":"4","key":"283_CR35","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1007\/s40815-018-0467-6","volume":"20","author":"P Wongthongtham","year":"2018","unstructured":"Wongthongtham P, Chan KY, Potdar V, Abu-Salih B, Gaikwad S, Jain P. State-of-the-art ontology annotation for personalised teaching and learning and prospects for smart learning recommender based on multiple intelligence and fuzzy ontology. Int J Fuzzy Syst. 2018;20(4):1357\u201372.","journal-title":"Int J Fuzzy Syst"},{"issue":"4","key":"283_CR36","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1080\/10919392.2018.1517481","volume":"28","author":"P Wongthongtham","year":"2018","unstructured":"Wongthongtham P, Salih BA. Ontology-based approach for identifying the credibility domain in social Big Data. J Organ Comput Electron Commerce. 2018;28(4):354\u201377.","journal-title":"J Organ Comput Electron Commerce."},{"issue":"4","key":"283_CR37","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/TBDATA.2017.2762719","volume":"4","author":"M Cheung","year":"2017","unstructured":"Cheung M, She J, Wang N. Characterizing user connections in social media through user-shared images. IEEE Trans Big Data. 2017;4(4):447\u201358.","journal-title":"IEEE Trans Big Data."},{"issue":"6","key":"283_CR38","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1177\/0165551518761012","volume":"44","author":"G Jang","year":"2018","unstructured":"Jang G, Myaeng S-H. Predicting event mentions based on a semantic analysis of microblogs for inter-region relationships. J Inf Sci. 2018;44(6):818\u201329.","journal-title":"J Inf Sci."},{"issue":"6","key":"283_CR39","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ipm.2018.08.004","volume":"54","author":"M Celik","year":"2018","unstructured":"Celik M, Dokuz AS. Discovering socially similar users in social media datasets based on their socially important locations. Inf Process Manag. 2018;54(6):1154\u201368.","journal-title":"Inf Process Manag"},{"key":"283_CR40","doi-asserted-by":"crossref","unstructured":"Inversini A, Eynard D, Marchiori E, Gentile L, editors. Destinations similarity based on user generated pictures\u2019 tags. ENTER; 2012.","DOI":"10.1007\/978-3-7091-1142-0_42"},{"key":"283_CR41","doi-asserted-by":"crossref","unstructured":"Thorne C, Klinger R, editors. On the Semantic Similarity of Disease Mentions in $$\\textsc {medline}^{\\circledR} $$ and Twitter. In: International conference on applications of natural language to information systems. Berlin: Springer; 2018.","DOI":"10.1007\/978-3-319-91947-8_34"},{"key":"283_CR42","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jbi.2017.03.016","volume":"69","author":"Z He","year":"2017","unstructured":"He Z, Chen Z, Oh S, Hou J, Bian J. Enriching consumer health vocabulary through mining a social Q&A site: a similarity-based approach. J Biomed Inform. 2017;69:75\u201385.","journal-title":"J Biomed Inform"},{"key":"283_CR43","doi-asserted-by":"crossref","unstructured":"Raja MAM, Swamynathan S, editors. Ensemble learning for network data stream classification using similarity and online genetic algorithm classifiers. In: 2016 International conference on advances in computing, communications and informatics (ICACCI). New York: IEEE; 2016.","DOI":"10.1109\/ICACCI.2016.7732277"},{"key":"283_CR44","doi-asserted-by":"crossref","unstructured":"Fel\u00edcio CZ, de Almeida CM, Alves G, Pereira FS, Paixao KV, de Amo S, editors. Visual perception similarities to improve the quality of user cold start recommendations. In: Canadian conference on artificial intelligence. Berlin: Springer; 2016.","DOI":"10.1007\/978-3-319-34111-8_13"},{"issue":"6","key":"283_CR45","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s00530-013-0309-1","volume":"20","author":"X Ma","year":"2014","unstructured":"Ma X, Wang H, Li H, Liu J, Jiang H. Exploring sharing patterns for video recommendation on YouTube-like social media. Multimed Syst. 2014;20(6):675\u201391.","journal-title":"Multimed Syst"},{"issue":"4","key":"283_CR46","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1177\/0165551516653082","volume":"43","author":"O Demirsoz","year":"2017","unstructured":"Demirsoz O, Ozcan R. Classification of news-related tweets. J Inf Sci. 2017;43(4):509\u201324.","journal-title":"J Inf Sci."},{"issue":"1","key":"283_CR47","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2906151","volume":"49","author":"W Jiang","year":"2016","unstructured":"Jiang W, Wang G, Bhuiyan MZA, Wu J. Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput Surv. 2016;49(1):10.","journal-title":"ACM Comput Surv."},{"issue":"2","key":"283_CR48","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11704-011-0323-4","volume":"5","author":"G Wang","year":"2011","unstructured":"Wang G, Wu J. FlowTrust: trust inference with network flows. Front Comput Sci China. 2011;5(2):181.","journal-title":"Front Comput Sci China."},{"key":"283_CR49","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.future.2012.06.010","volume":"31","author":"W Jiang","year":"2014","unstructured":"Jiang W, Wang G, Wu J. Generating trusted graphs for trust evaluation in online social networks. Fut Gener Comput Syst. 2014;31:48\u201358.","journal-title":"Fut Gener Comput Syst."},{"key":"283_CR50","doi-asserted-by":"publisher","first-page":"201","DOI":"10.2307\/202051","volume":"1","author":"M Granovetter","year":"1983","unstructured":"Granovetter M. The strength of weak ties: a network theory revisited. Sociol Theory. 1983;1:201\u201323.","journal-title":"Sociol Theory."},{"key":"283_CR51","unstructured":"Hang C-W, Singh MP, editors. Trust-based recommendation based on graph similarity. In: Proceedings of the 13th international workshop on trust in agent societies (TRUST) Toronto, Canada; 2010."},{"issue":"1","key":"283_CR52","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/5254.747902","volume":"14","author":"B Chandrasekaran","year":"1999","unstructured":"Chandrasekaran B, Josephson JR, Benjamins VR. What are ontologies, and why do we need them? IEEE Intell Syst. 1999;14(1):20\u20136.","journal-title":"IEEE Intell Syst"},{"key":"283_CR53","doi-asserted-by":"crossref","unstructured":"Embar VR, Bhattacharya I, Pandit V, Vaculin R, editors. Online topic-based social influence analysis for the wimbledon championships. In: Proceedings of the 21th ACM SIGKDD International conference on knowledge discovery and data mining. New York: ACM; 2015.","DOI":"10.1145\/2783258.2788593"},{"key":"283_CR54","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.chb.2015.04.072","volume":"52","author":"ZG Zhu","year":"2015","unstructured":"Zhu ZG, Su JQ, Kong LP. Measuring influence in online social network based on the user-content bipartite graph. Comput Hum Behav. 2015;52:184\u20139.","journal-title":"Comput Hum Behav"},{"issue":"6","key":"283_CR55","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1007\/s11036-015-0619-y","volume":"20","author":"S Lyu","year":"2015","unstructured":"Lyu S, Liu J, Tang M, Xu Y, Chen J. Efficiently predicting trustworthiness of mobile services based on trust propagation in social networks. Mob Netw Appl. 2015;20(6):840\u201352.","journal-title":"Mob Netw Appl."},{"key":"283_CR56","doi-asserted-by":"crossref","unstructured":"Song S, Li Q, Zheng X, editors. Detecting popular topics in micro-blogging based on a user interest-based model. In: The 2012 international joint conference on neural networks (IJCNN). New York: IEEE; 2012.","DOI":"10.1109\/IJCNN.2012.6252458"},{"key":"283_CR57","first-page":"441","volume-title":"Social computing, behavioral-cultural modeling and prediction. Lecture Notes in Computer Science","author":"M-A Abbasi","year":"2013","unstructured":"Abbasi M-A, Liu H. Measuring user credibility in social media. In: Greenberg A, Kennedy W, Bos N, editors. Social computing, behavioral-cultural modeling and prediction. Lecture Notes in Computer Science. 7812th ed. Berlin: Springer; 2013. p. 441\u20138.","edition":"7812"},{"key":"283_CR58","doi-asserted-by":"crossref","unstructured":"Zhai Y, Li X, Chen J, Fan X, Cheung WK, editors. A novel topical authority-based microblog ranking. In: Asia\u2013Pacific web conference. Berlin: Springer; 2014.","DOI":"10.1007\/978-3-319-11116-2_10"},{"key":"283_CR59","doi-asserted-by":"crossref","unstructured":"Liu D, Wang L, Zheng J, Ning K, Zhang L-J, editors. Influence analysis based expert finding model and its applications in enterprise social network. In: IEEE International conference on services computing (SCC), 2013. New York: IEEE; 2013.","DOI":"10.1109\/SCC.2013.72"},{"issue":"1","key":"283_CR60","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1186\/s13638-016-0532-5","volume":"2016","author":"L Kuang","year":"2016","unstructured":"Kuang L, Tang X, Yu MQ, Huang YJ, Guo KH. A comprehensive ranking model for tweets big data in online social network. EURASIP J Wirel Commun Netw. 2016;2016(1):46.","journal-title":"EURASIP J Wirel Commun Netw."},{"key":"283_CR61","doi-asserted-by":"crossref","unstructured":"Cheng X, Li X, editors. Trust evaluation in online social networks based on knowledge graph. In: Proceedings of the 2018 international conference on algorithms, computing and artificial intelligence. New York: ACM; 2018.","DOI":"10.1145\/3302425.3302480"},{"key":"283_CR62","volume-title":"Sentiment analysis in social network","author":"FA Pozzi","year":"2016","unstructured":"Pozzi FA, Fersini E, Messina E, Liu B. Sentiment analysis in social network. Burlington: Morgan Kaufmann; 2016."},{"issue":"22","key":"283_CR63","doi-asserted-by":"publisher","first-page":"8840","DOI":"10.1016\/j.eswa.2015.07.036","volume":"42","author":"DH Alahmadi","year":"2015","unstructured":"Alahmadi DH, Zeng X-J. ISTS: Implicit social trust and sentiment based approach to recommender systems. Expert Syst Appl. 2015;42(22):8840\u20139.","journal-title":"Expert Syst Appl"},{"key":"283_CR64","doi-asserted-by":"crossref","unstructured":"Alahmadi DH, Zeng X-J, editors. Twitter-based recommender system to address cold-start: a genetic algorithm based trust modelling and probabilistic sentiment analysis. In: 2015 IEEE 27th international conference on tools with artificial intelligence (ICTAI). New York: IEEE. ; 2015.","DOI":"10.1109\/ICTAI.2015.149"},{"key":"283_CR65","doi-asserted-by":"crossref","unstructured":"Wang Z, Chong CS, Lan L, Yang Y, Ho SB, Tong JC, editors. Fine-grained sentiment analysis of social media with emotion sensing. In: 2016 future technologies conference (FTC). New York: IEEE; 2016.","DOI":"10.1109\/FTC.2016.7821783"},{"key":"283_CR66","doi-asserted-by":"crossref","unstructured":"De Boom C, Van Canneyt S, Bohez S, Demeester T, Dhoedt B, editors. Learning semantic similarity for very short texts. In: 2015 IEEE international conference on data mining workshop (ICDMW). New York: IEEE; 2015.","DOI":"10.1109\/ICDMW.2015.86"},{"issue":"3","key":"283_CR67","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10791-010-9161-5","volume":"14","author":"K Sarvabhotla","year":"2011","unstructured":"Sarvabhotla K, Pingali P, Varma V. Sentiment classification: a lexical similarity based approach for extracting subjectivity in documents. Inf Retr. 2011;14(3):337\u201353.","journal-title":"Inf Retr"},{"issue":"3","key":"283_CR68","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TMM.2014.2298216","volume":"16","author":"Q Fang","year":"2014","unstructured":"Fang Q, Sang J, Xu C, Rui Y. Topic-sensitive influencer mining in interest-based social media networks via hypergraph learning. IEEE Trans Multimed. 2014;16(3):796\u2013812.","journal-title":"IEEE Trans Multimed"},{"key":"283_CR69","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.is.2016.10.004","volume":"69","author":"U Ahmad","year":"2017","unstructured":"Ahmad U, Zahid A, Shoaib M, AlAmri A. HarVis: an integrated social media content analysis framework for YouTube platform. Inf Syst. 2017;69:25\u201339.","journal-title":"Inf Syst."},{"key":"283_CR70","doi-asserted-by":"publisher","first-page":"30062","DOI":"10.1038\/srep30062","volume":"6","author":"F Morone","year":"2016","unstructured":"Morone F, Min B, Bo L, Mari R, Makse HA. Collective influence algorithm to find influencers via optimal percolation in massively large social media. Sci Rep. 2016;6:30062.","journal-title":"Sci Rep."},{"key":"283_CR71","doi-asserted-by":"crossref","unstructured":"Nabipourshiri R, Abu-Salih B, Wongthongtham P, editors. Tree-based classification to users\u2019 trustworthiness in OSNs. In: Proceedings of the 2018 10th international conference on computer and automation engineering; New York: ACM; 2018.","DOI":"10.1145\/3192975.3193004"},{"key":"283_CR72","doi-asserted-by":"crossref","unstructured":"Paryani J, TK AK, George K, editors. Entropy-based model for estimating veracity of topics from tweets. In: International conference on computational collective intelligence. Berlin: Springer; 2017.","DOI":"10.1007\/978-3-319-67077-5_40"},{"issue":"2","key":"283_CR73","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/TBDATA.2018.2824812","volume":"5","author":"D Zhang","year":"2018","unstructured":"Zhang D, Wang D, Vance N, Zhang Y, Mike S. On scalable and robust truth discovery in big data social media sensing applications. IEEE Trans Big Data. 2018;5(2):195\u2013208.","journal-title":"IEEE Trans Big Data."},{"key":"283_CR74","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1109\/ACCESS.2015.2490723","volume":"3","author":"A Immonen","year":"2015","unstructured":"Immonen A, P\u00e4\u00e4kk\u00f6nen P, Ovaska E. Evaluating the quality of social media data in big data architecture. IEEE Access. 2015;3:2028\u201343.","journal-title":"IEEE Access."},{"issue":"12","key":"283_CR75","first-page":"3382","volume":"28","author":"G Zhao","year":"2016","unstructured":"Zhao G, Qian X, Lei X, Mei T. Service quality evaluation by exploring social users\u2019 contextual information. IEEE Trans Knowl Data Eng. 2016;28(12):3382\u201394.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"283_CR76","doi-asserted-by":"crossref","unstructured":"Zhao G, Qian X, editors. Prospects and challenges of deep understanding social users and urban services\u2014a position paper. In: 2015 IEEE international conference on multimedia big data; New York: IEEE; 2015.","DOI":"10.1109\/BigMM.2015.80"},{"key":"283_CR77","volume-title":"Big data: principles and best practices of scalable realtime data systems","author":"N Marz","year":"2015","unstructured":"Marz N, Warren J. Big data: principles and best practices of scalable realtime data systems. Shelter Island: Manning Publications Co.; 2015."},{"key":"283_CR78","volume-title":"Data, data everywhere: a special report on managing information","author":"K Cukier","year":"2010","unstructured":"Cukier K. Data, data everywhere: a special report on managing information. Westminster: Economist Newspaper; 2010."},{"key":"283_CR79","unstructured":"Beyer M. Gartner says solving \u2018big data\u2019 challenge involves more than just managing volumes of data. 2011. http:\/\/www.gartnercom\/it\/pagejsp?id=1731916. Accessed 15 July 2019."},{"issue":"2","key":"283_CR80","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2481244.2481246","volume":"14","author":"W Fan","year":"2013","unstructured":"Fan W, Bifet A. Mining big data. ACM SIGKDD Explor Newsl. 2013;14(2):1.","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"283_CR81","unstructured":"Kaisler S, Armour F, Espinosa JA, Money W, editors. Big data: issues and challenges moving forward. In: 46th Hawaii international conference on system sciences (HICSS), 2013. 7\u201310 Jan 2013. 2013."},{"issue":"1","key":"283_CR82","first-page":"1","volume":"4","author":"CG Akcora","year":"2014","unstructured":"Akcora CG, Carminati B, Ferrari E, Kantarcioglu M. Detecting anomalies in social network data consumption. Soc Netw Anal Mining. 2014;4(1):1\u201316.","journal-title":"Soc Netw Anal Mining."},{"key":"283_CR83","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/ACCESS.2014.2332453","volume":"2","author":"H Han","year":"2014","unstructured":"Han H, Yonggang W, Tat-Seng C, Xuelong L. Toward scalable systems for big data analytics: a technology tutorial. IEEE Access. 2014;2:652\u201387.","journal-title":"IEEE Access."},{"issue":"2","key":"283_CR84","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1108\/SL-01-2019-0003","volume":"47","author":"K Butner","year":"2019","unstructured":"Butner K, Ho G. How the human-machine interchange will transform business operations. Strateg Leadersh. 2019;47(2):25\u201333.","journal-title":"Strateg Leadersh."},{"issue":"1","key":"283_CR85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-014-0007-7","volume":"2","author":"MM Najafabadi","year":"2015","unstructured":"Najafabadi MM, Villanustre F, Khoshgoftaar TM, Seliya N, Wald R, Muharemagic E. Deep learning applications and challenges in big data analytics. J Big Data. 2015;2(1):1.","journal-title":"J Big Data."},{"issue":"1","key":"283_CR86","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1186\/s40537-019-0227-y","volume":"6","author":"H Asri","year":"2019","unstructured":"Asri H, Mousannif H, Al Moatassime H. Reality mining and predictive analytics for building smart applications. J Big Data. 2019;6(1):66.","journal-title":"J Big Data."},{"key":"283_CR87","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.cosrev.2015.05.002","volume":"17","author":"CK Emani","year":"2015","unstructured":"Emani CK, Cullot N, Nicolle C. Understandable big data: a survey. Comput Sci Rev. 2015;17:70\u201381.","journal-title":"Comput Sci Rev."},{"issue":"3","key":"283_CR88","doi-asserted-by":"publisher","first-page":"233","DOI":"10.3233\/SW-130117","volume":"4","author":"P Hitzler","year":"2013","unstructured":"Hitzler P, Janowicz K. Linked data, big data, and the 4th paradigm. Sem Web. 2013;4(3):233\u20135.","journal-title":"Sem Web."},{"key":"283_CR89","unstructured":"Wang AH, editor Don\u2019t follow me: Spam detection in Twitter. In: Proceedings of the 2010 international conference on security and cryptography (SECRYPT). 26\u201328 July 2010. 2010."},{"key":"283_CR90","first-page":"18","volume-title":"Naive Bayes classifiers","author":"KP Murphy","year":"2006","unstructured":"Murphy KP. Naive Bayes classifiers. Vancouver: University of British Columbia; 2006. p. 18."},{"key":"283_CR91","unstructured":"RapidMiner. Naive Bayes. https:\/\/docs.rapidminer.com\/latest\/studio\/operators\/modeling\/predictive\/bayesian\/naive_bayes.html. Accessed 15 July 2019."},{"key":"283_CR92","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387","volume-title":"Applied logistic regression","author":"DW Hosmer Jr","year":"2013","unstructured":"Hosmer DW Jr, Lemeshow S, Sturdivant RX. Applied logistic regression. Hoboken: Wiley; 2013."},{"key":"283_CR93","doi-asserted-by":"crossref","unstructured":"Caruana R, Niculescu-Mizil A, editors. An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd international conference on Machine learning. New York: ACM; 2006.","DOI":"10.1145\/1143844.1143865"},{"key":"283_CR94","first-page":"38","volume-title":"C4.5: Programming for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR. C4.5: Programming for machine learning. Burlington: Morgan Kauffmann; 1993. p. 38."},{"key":"283_CR95","unstructured":"Ho TK, editor Random decision forests. In: Proceedings of the third international conference on document analysis and recognition, 1995. New York: IEEE; 1995."},{"issue":"5","key":"283_CR96","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman JH. Greedy function approximation: a gradient boosting machine. Ann Stat. 2001;29(5):1189\u2013232.","journal-title":"Ann Stat."},{"key":"283_CR97","unstructured":"Idoine C, Krensky P, Brethenoux E, Hare J, Sicular S, Vashisth S. Magic Quadrant for data science and machine-learning platforms. Gartner. 2018. https:\/\/RapidMiner.com\/resource\/read-gartner-magic-quadrant-data-science-platforms\/. Accessed 13 Oct 2018."},{"key":"283_CR98","doi-asserted-by":"crossref","unstructured":"Kunnakorntammanop S, Thepwuttisathaphon N, Thaicharoen S, editors. An experience report on building a big data analytics framework using Cloudera CDH and RapidMiner Radoop with a cluster of commodity computers. In: International conference on soft computing in data science; Berlin: Springer; 2019.","DOI":"10.1007\/978-981-15-0399-3_17"},{"key":"283_CR99","unstructured":"Bockermann C, Blom H, editors. Processing data streams with the rapidminer streams-plugin. In: Proceedings of the RapidMiner community meeting and conference; 2012."},{"key":"283_CR100","volume-title":"Electronic statistics textbook","author":"I StatSoft","year":"2013","unstructured":"StatSoft I. Electronic statistics textbook. Tulsa: StatSoft; 2013."},{"key":"283_CR101","doi-asserted-by":"crossref","first-page":"100003","DOI":"10.1016\/j.yjbinx.2019.100003","volume":"1","author":"NZ Zulkarnain","year":"2019","unstructured":"Zulkarnain NZ, Meziane F. Ultrasound reports standardisation using rhetorical structure theory and domain ontology. J Biomed Inf X. 2019;1:100003.","journal-title":"J Biomed Inf X."},{"key":"283_CR102","first-page":"131","volume-title":"Advances in Intelligent Systems and Computing","author":"Mohammed Elhenawy","year":"2016","unstructured":"Elhenawy M, El-Shawarby I, Rakha H. Modeling the perception reaction time and deceleration level for different surface conditions using machine learning techniques. In: Advances in applied digital human modeling and simulation. Berlin: Springer; 2017. p. 131\u201342."},{"issue":"4","key":"283_CR103","doi-asserted-by":"publisher","first-page":"2978","DOI":"10.1166\/asl.2017.7627","volume":"23","author":"MFAA Muhamed","year":"2017","unstructured":"Muhamed MFAA, Jabar FA, Wahid SNS, Paino H, Dangi MRM. Predicting customer recommendation towards homestay at west Pahang region. Adv Sci Lett. 2017;23(4):2978\u201382.","journal-title":"Adv Sci Lett."},{"key":"283_CR104","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and trusted computing. Lecture notes in computer Science","author":"M McCord","year":"2011","unstructured":"McCord M, Chuah M. Spam detection on twitter using traditional classifiers. In: Calero JA, Yang L, M\u00e1rmol F, Garc\u00eda Villalba L, Li A, Wang Y, editors. Autonomic and trusted computing. Lecture notes in computer Science. 6906th ed. Berlin Heidelberg: Springer; 2011. p. 175\u201386.","edition":"6906"},{"key":"283_CR105","doi-asserted-by":"crossref","unstructured":"Silva A, Guimar\u00e3es S, Meira Jr W, Zaki M, editors. ProfileRank: finding relevant content and influential users based on information diffusion. In: Proceedings of the 7th workshop on social network mining and analysis. New York: ACM; 2013.","DOI":"10.1145\/2501025.2501033"},{"key":"283_CR106","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/978-3-031-02145-9","volume-title":"A survey of opinion mining and sentiment analysis. Mining text data","author":"B Liu","year":"2012","unstructured":"Liu B, Zhang L. A survey of opinion mining and sentiment analysis. Mining text data. Berlin: Springer; 2012. p. 415\u201363."},{"issue":"2\u20133","key":"283_CR107","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1561\/1500000024","volume":"6","author":"K Balog","year":"2012","unstructured":"Balog K, Fang Y, de Rijke M, Serdyukov P, Si L. Expertise retrieval. Found Trends Inf Retr. 2012;6(2\u20133):127\u2013256.","journal-title":"Found Trends Inf Retr."},{"issue":"3","key":"283_CR108","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2699670","volume":"33","author":"HZ Yin","year":"2015","unstructured":"Yin HZ, Cui B, Chen L, Hu ZT, Zhou XF. Dynamic user modeling in social media systems. ACM Trans Inf Syst. 2015;33(3):10.","journal-title":"ACM Trans Inf Syst."},{"issue":"6832","key":"283_CR109","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1038\/35074206","volume":"410","author":"T Berners-Lee","year":"2001","unstructured":"Berners-Lee T, Hendler J. Publishing on the semantic web. Nature. 2001;410(6832):1023\u20134.","journal-title":"Nature"},{"issue":"3","key":"283_CR110","first-page":"372","volume":"9","author":"A Kumar","year":"2012","unstructured":"Kumar A, Sebastian TM. Sentiment analysis on twitter. Int J Comput Sci Issues. 2012;9(3):372\u20138.","journal-title":"Int J Comput Sci Issues."},{"issue":"1","key":"283_CR111","doi-asserted-by":"publisher","first-page":"101","DOI":"10.4018\/IJKM.2020010105","volume":"16","author":"J Meneghello","year":"2020","unstructured":"Meneghello J, Thompson N, Lee K, Wong KW, Abu-Salih B. Unlocking social media and user generated content as a data source for knowledge management. Int J Knowl Manag. 2020;16(1):101\u201322.","journal-title":"Int J Knowl Manag."},{"issue":"4\u20136","key":"283_CR112","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1504\/IJSTM.2015.073917","volume":"21","author":"B Zhang","year":"2015","unstructured":"Zhang B, Song QQ, Ding JH, Wang L. A trust-based sentiment delivering calculation method in microblog. Int J Serv Technol Manag. 2015;21(4\u20136):185\u201398.","journal-title":"Int J Serv Technol Manag"},{"issue":"12","key":"283_CR113","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1002\/asi.22768","volume":"63","author":"Y Bae","year":"2012","unstructured":"Bae Y, Lee H. Sentiment analysis of twitter audiences: measuring the positive or negative influence of popular twitterers. J Am Soc Inform Sci Technol. 2012;63(12):2521\u201335.","journal-title":"J Am Soc Inform Sci Technol"},{"key":"283_CR114","doi-asserted-by":"crossref","unstructured":"Kawabe T, Namihira Y, Suzuki K, Nara M, Sakurai Y, Tsuruta S, et al., editors. Tweet credibility analysis evaluation by improving sentiment dictionary. In: IEEE congress on evolutionary computation (CEC), 2015; New York: IEEE; 2015.","DOI":"10.1109\/CEC.2015.7257176"},{"key":"283_CR115","doi-asserted-by":"crossref","unstructured":"Weng J, Lim E-P, Jiang J, He Q, editors. Twitterrank: finding topic-sensitive influential twitterers. In: Proceedings of the third ACM international conference on Web search and data mining; New York: ACM; 2010.","DOI":"10.1145\/1718487.1718520"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-020-0283-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40537-020-0283-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-020-0283-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T04:03:20Z","timestamp":1665806600000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-020-0283-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,10]]},"references-count":115,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["283"],"URL":"https:\/\/doi.org\/10.1186\/s40537-020-0283-3","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,10]]},"assertion":[{"value":"30 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"10"}}