{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,11]],"date-time":"2024-02-11T11:41:40Z","timestamp":1707651700906},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s13198-022-01812-0","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T11:05:39Z","timestamp":1671447939000},"page":"415-428","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A trust based model for recommendations of malignant people in social network"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2258-1865","authenticated-orcid":false,"given":"Govind Kumar","family":"Jha","sequence":"first","affiliation":[]},{"given":"Hardeo Kumar","family":"Thakur","sequence":"additional","affiliation":[]},{"given":"Preetish","family":"Ranjan","sequence":"additional","affiliation":[]},{"given":"Manish","family":"Gaur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,19]]},"reference":[{"key":"1812_CR1","doi-asserted-by":"crossref","unstructured":"Abomhara Mohamed, K\u00f8ien Geir\u00a0M (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Sec Mobil 65\u201388","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"1812_CR2","doi-asserted-by":"crossref","unstructured":"Beck Martin, H\u00fcser Simone (2012) Political change in the middle east: an attempt to analyze the\u2019arab\u2019 spring","DOI":"10.2139\/ssrn.2145853"},{"key":"1812_CR3","doi-asserted-by":"crossref","unstructured":"Cha Meeyoung, Mislove Alan, Gummadi Krishna\u00a0P (2009) A measurement-driven analysis of information propagation in the flickr social network. In: proceedings of the 18th international conference on world wide web pp 721\u2013730","DOI":"10.1145\/1526709.1526806"},{"key":"1812_CR4","doi-asserted-by":"crossref","unstructured":"Chinchore Anand, Jiang Frank, Xu Guandong (2015) Intelligent sybil attack detection on abnormal connectivity behavior in mobile social networks. In international conference on knowledge management in organizations pp 602\u2013617. Springer","DOI":"10.1007\/978-3-319-21009-4_45"},{"key":"1812_CR5","doi-asserted-by":"crossref","unstructured":"Correa Carlos\u00a0D, Ma Kwan-Liu (2011) Visualizing social networks. In social network data analytics, pp 307\u2013326. Springer","DOI":"10.1007\/978-1-4419-8462-3_11"},{"key":"1812_CR6","doi-asserted-by":"crossref","unstructured":"Du Nan, Wang Hao, Faloutsos Christos (2010) Analysis of large multi-modal social networks: patterns and a generator. In joint european conference on machine learning and knowledge discovery in databases pp 393\u2013408. Springer","DOI":"10.1007\/978-3-642-15880-3_31"},{"key":"1812_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.ins.2019.02.015","volume":"486","author":"Gianni D\u2019Angelo","year":"2019","unstructured":"D\u2019Angelo Gianni, Palmieri Francesco, Rampone Salvatore (2019) Detecting unfair recommendations in trust-based pervasive environments. Inf Sci 486:31\u201351","journal-title":"Inf Sci"},{"key":"1812_CR8","doi-asserted-by":"crossref","unstructured":"Faghani Mohammad\u00a0Reza, Saidi Hossein (2009) Malware propagation in online social networks. In 2009 4th international conference on malicious and unwanted software (MALWARE) pp 8\u201314","DOI":"10.1109\/MALWARE.2009.5403023"},{"key":"1812_CR9","doi-asserted-by":"crossref","unstructured":"Ferreira Ana, Huynen Jean-Louis, Koenig Vincent, Lenzini Gabriele (2014) A conceptual framework to study socio-technical security. In: international conference on human aspects of information security, privacy, and trust. pp 318\u2013329. Springer","DOI":"10.1007\/978-3-319-07620-1_28"},{"key":"1812_CR10","doi-asserted-by":"crossref","unstructured":"Huber Markus, Mulazzani Martin, Schrittwieser Sebastian, Weippl Edgar (2010) Cheap and automated socio-technical attacks based on social networking sites. In proceedings of the 3rd ACM workshop on artificial intelligence and security pages 61\u201364","DOI":"10.1145\/1866423.1866435"},{"key":"1812_CR11","unstructured":"Jha Govind\u00a0Kumar, Gaur Manish, Ranjan Preetish, Thakur Hardeo\u00a0Kumar (2011) A survey on trustworthy model of recommender system. Int J Syst Assur Eng Manage pp 1\u201318"},{"issue":"1","key":"1812_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/07468342.1996.11973744","volume":"27","author":"Dan Kalman","year":"1996","unstructured":"Kalman Dan (1996) A singularly valuable decomposition: the svd of a matrix. Coll Math J 27(1):2\u201323","journal-title":"Coll Math J"},{"issue":"7","key":"1812_CR13","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"David Liben-Nowell","year":"2007","unstructured":"Liben-Nowell David, Kleinberg Jon (2007) The link-prediction problem for social networks. J Am Soc Inform Sci Technol 58(7):1019\u20131031","journal-title":"J Am Soc Inform Sci Technol"},{"issue":"4","key":"1812_CR14","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1016\/j.eswa.2013.09.005","volume":"41","author":"Blerina Lika","year":"2014","unstructured":"Lika Blerina, Kolomvatsos Kostas, Hadjiefthymiades Stathes (2014) Facing the cold start problem in recommender systems. Expert Syst Appl 41(4):2065\u20132073","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1812_CR15","first-page":"1","volume":"3","author":"Weng Lilian","year":"2013","unstructured":"Lilian Weng, Filippo Menczer, Yeol Ahn Yong (2013) Virality prediction and community structure in social networks. Sci Reports 3(1):1\u20136","journal-title":"Sci Reports"},{"issue":"4","key":"1812_CR16","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"Eagle Nathan","year":"2006","unstructured":"Nathan Eagle, Sandy Pentland Alex (2006) Reality mining: sensing complex social systems. Personal ubiquitous comput 10(4):255\u2013268","journal-title":"Personal ubiquitous comput"},{"issue":"1","key":"1812_CR17","first-page":"1","volume":"4","author":"Yavero\u011flu \u00d6mer Nebil","year":"2014","unstructured":"Nebil Yavero\u011flu \u00d6mer, No\u00ebl Malod-Dognin, Darren Davis, Zoran Levnajic, Vuk Janjic, Rasa Karapandza, Aleksandar Stojmirovic, Nata\u0161a Pr\u017eulj (2014) Revealing the hidden language of complex networks. Sci Reports 4(1):1\u20139","journal-title":"Sci Reports"},{"key":"1812_CR18","unstructured":"Noel Steven, Jajodia Sushil (2005) Understanding complex network attack graphs through clustered adjacency matrices. In 21st annual computer security applications conference (ACSAC\u201905), pages 10 IEEE"},{"key":"1812_CR19","doi-asserted-by":"crossref","unstructured":"Nohuddin Puteri\u00a0NE, Christley Rob, Coenen Frans, Patel Yogesh, Setzkorn Christian, Williams Shane (2010) Frequent pattern trend analysis in social networks. In international conference on advanced data mining and applications pp 358\u2013369. Springer","DOI":"10.1007\/978-3-642-17316-5_35"},{"issue":"3","key":"1812_CR20","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11896-019-09334-5","volume":"34","author":"Gareth Norris","year":"2019","unstructured":"Norris Gareth, Brookes Alexandra, Dowell David (2019) The psychology of internet fraud victimisation: a systematic review. J Police Crim Psychol 34(3):231\u2013245","journal-title":"J Police Crim Psychol"},{"key":"1812_CR21","doi-asserted-by":"crossref","unstructured":"Nurse Jason\u00a0RC, Creese Sadie, Goldsmith Michael, Lamberts Koen (2011) Trustworthy and effective communication of cybersecurity risks: a review. In: 2011 1st workshop on socio-technical aspects in security and trust (STAST) pp 60\u201368. IEEE","DOI":"10.1109\/STAST.2011.6059257"},{"key":"1812_CR22","doi-asserted-by":"crossref","unstructured":"Rajput Balsing (2020) Emerging trends and patterns of cyber economic crimes. In: cyber economic crime in India pp 97\u2013142. Springer","DOI":"10.1007\/978-3-030-44655-0_6"},{"issue":"3","key":"1812_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4018\/IJDCF.2018070102","volume":"10","author":"Preetish Ranjan","year":"2018","unstructured":"Ranjan Preetish, Singh Vrijendra, Kumar Prabhat, Prakash Satya (2018) Models for the detection of malicious intent people in society. Int J Digital Crime Forensics (IJDCF) 10(3):15\u201326","journal-title":"Int J Digital Crime Forensics (IJDCF)"},{"issue":"1","key":"1812_CR24","doi-asserted-by":"publisher","first-page":"153","DOI":"10.4018\/IJISP.2021010108","volume":"15","author":"Preetish Ranjan","year":"2021","unstructured":"Ranjan Preetish, Vaish Abhishek (2021) Socio-technical attack approximation based on structural virality of information in social networks. Int J Inform Sec Priv (IJISP) 15(1):153\u2013172","journal-title":"Int J Inform Sec Priv (IJISP)"},{"key":"1812_CR25","doi-asserted-by":"crossref","unstructured":"Sarna Geetika, Bhatia MPS (2018) Identification of suspicious patterns in social network using zipf\u2019s law. In 2018 international conference on advances in computing, communication control and networking (ICACCCN) pp 957\u2013962. IEEE","DOI":"10.1109\/ICACCCN.2018.8748515"},{"issue":"1","key":"1812_CR26","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1287\/mnsc.2015.2158","volume":"62","author":"Goel Sharad","year":"2016","unstructured":"Sharad Goel, Ashton Anderson, Jake Hofman, Watts Duncan J (2016) The structural virality of online diffusion. Manage Sci 62(1):180\u2013196","journal-title":"Manage Sci"},{"issue":"1","key":"1812_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s13278-016-0326-0","volume":"6","author":"Laan Steven","year":"2016","unstructured":"Steven Laan, Maarten Marx, Mokken Robert J (2016) Close communities in social networks: boroughs and 2-clubs. Soc Net Analy Mining 6(1):20","journal-title":"Soc Net Analy Mining"},{"key":"1812_CR28","doi-asserted-by":"crossref","unstructured":"Tan Li, Ponnam Suma, Gillham Patrick, Edwards Bob, Johnson Erik (2013) Analyzing the impact of social media on social movements: a computational study on twitter and the occupy wall street movement. In proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining pp 1259\u20131266","DOI":"10.1145\/2492517.2500262"},{"key":"1812_CR29","unstructured":"Tareaf Raad Bin, Berger Philipp, Hennig Patrick, Meinel Christoph. Malicious Behaviour Identification in Online Social Networks. In Silvia Bonomi and Etienne Rivi\u00e8re, editors, 18th IFIP International conference on distributed applications and interoperable systems (DAIS) volume LNCS-10853 of distributed applications and interoperable systems, pages 18\u201325, Springer International Publishing, Spain"},{"key":"1812_CR30","doi-asserted-by":"crossref","unstructured":"Zhang Huiqi, Dantu Ram (2010) Predicting social ties in mobile phone networks. In 2010 IEEE international conference on intelligence and security informatics pp 25\u201330. IEEE","DOI":"10.1109\/ISI.2010.5484780"},{"issue":"1","key":"1812_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2556609","volume":"8","author":"Yang Zhi","year":"2014","unstructured":"Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Zhao Ben Y, Yafei Dai (2014) Uncovering social network sybils in the wild. ACM Trans Knowledge Discov Data (TKDD) 8(1):1\u201329","journal-title":"ACM Trans Knowledge Discov Data (TKDD)"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-022-01812-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-022-01812-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-022-01812-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T10:29:07Z","timestamp":1674901747000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-022-01812-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,19]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["1812"],"URL":"http:\/\/dx.doi.org\/10.1007\/s13198-022-01812-0","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,19]]},"assertion":[{"value":"5 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest related to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The research having no involvement of Human participation and\/or animals, thus nothing to disclose.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animal rights"}},{"value":"Informed consent was obtained from all authors included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}