[1]
Carlos Castillo, Marcelo Mendoza, Barbara Poblete, information credibility on Twitter, in WWW 2011: the ACM proceedings of the 20th international conference on World Wide Web, New York, NY, USA, 2011, pp.675-684.
DOI: 10.1145/1963405.1963500
Google Scholar
[2]
S. Nakamura, S. Konishi, A. Jatowt, H. Ohshima, H. Kondo, T. Tezuka, S. Oyama, and K. Tanaka,Trustworthiness Analysis of Web Search Results, Proc. of the 11th European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2007), LNCS, Vol. 4675, pp.38-49, Budapest, Hungary, September (2007).
DOI: 10.1007/978-3-540-74851-9_4
Google Scholar
[3]
B. J. Fogg and H. Tseng, The elements of computer credibility, " In CHI , 99: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 80-87, New York, NY, USA, 1999. ACM.
DOI: 10.1145/302979.303001
Google Scholar
[4]
Gunther. A. C. 1992, Biased press or biased public? Attitudes toward media coverage of social groups, Public opinion quarterly 56: 147-167.
DOI: 10.1086/269308
Google Scholar
[5]
Self, C. C. 1996, Credibility. In An integrated approach to communication theory and research, eds. M. B. Salwen and D. W. Stacks. Mahwah, NJ: Lawrence Erlbaum Associates, p.421.
Google Scholar
[6]
A. l. Hughes and L. Palen, Twitter adoption and use in mass convergence and emergency events, In Proceedings of the 2009 ISCRAM Conference, (2009).
Google Scholar
[7]
M. Mathioudakis and N. Koudas, TwitterMonitor: trend detection over the twitter stream, In Proceedings of the 2010 international conference on Management of data pages 1155-1158. ACM, (2010).
DOI: 10.1145/1807167.1807306
Google Scholar
[8]
Fan Yang, Yang Liu, and Xiaohui Yu, Min Yang, Automatic detection of rumor on Sina Weibo, In MDS 2012: the Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, Beijing, China, (2012).
DOI: 10.1145/2350190.2350203
Google Scholar
[9]
Aditi Gupta and Ponnurangam Kumaraguru, Credibility Ranking of Tweets during High Impact Events, , In PSOSM 2012: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, Lyon, France, (2012).
DOI: 10.1145/2185354.2185356
Google Scholar
[10]
Meredith Ringel Morris, Scott Counts, Asta Roseway, Aaron Hoff, and Julia Schwarz, Tweeting is Believing? Understanding Microblog Credibility Perceptions, In CSCW 2012: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, New York, NY, USA, 2012, pp.441-450.
DOI: 10.1145/2145204.2145274
Google Scholar
[11]
Byungkyu Kang and John O'Donovan, Modeling Topic Specific Credibility in Twitter, In IUI 2012: Proceedings of the 2012 ACM international conference on Intelligent User Interfaces, Lisbon, Portugal, 2012, pp.12-17.
DOI: 10.1145/2166966.2166998
Google Scholar
[12]
J. Ratkiewicz, M. Conover, M. Meiss, B. Goncalves, S. Patil, A. Flammini, and F. Menczer, Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams, arXiv, Nov (2010).
DOI: 10.1145/1963192.1963301
Google Scholar
[13]
Y. Duan, L. Jiang, T. Qin, M. Zhou, and H. -Y. Shum, An empirical study on learning to rank of tweets, " In COLING, 10.
Google Scholar
[14]
Canini, K. R., Suh, B., And Pirolli, P. L, Finding credible information sources in social networks based on content and social structure, In Proceedings of the third IEEE International Conference on Social Computing (SocialCom) (2011).
DOI: 10.1109/passat/socialcom.2011.91
Google Scholar
[15]
Pal, A. & Counts, S, What's in a @name? How Name Value Biases Judgment of Microblog Authors, ICWSM (2011).
DOI: 10.1609/icwsm.v5i1.14091
Google Scholar
[16]
Twitter Blog. blog. twitter. com. #numbers, March 14, (2011).
Google Scholar
[17]
S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru, Phi. sh/$ocial: the phishing landscape through short urls, CEAS 2011, pages 92-101, (2011).
DOI: 10.1145/2030376.2030387
Google Scholar
[18]
DuBois, T., Golbeck, j., and Srinivasan, A. Predicting trust and distrust in social networks, In Proceedings of the third IEEE International Conference on Social Computing (SocialCom) (2011).
DOI: 10.1109/passat/socialcom.2011.56
Google Scholar
[19]
Victor, P., Cornelis, C., Cock, M. D., and Herrera-Viedma, E, Practical aggregation operators for gradual trust and distrust, Fuzzy Sets and Systems 184, 1 (2011), 126-147.
DOI: 10.1016/j.fss.2010.10.015
Google Scholar