참고문헌
- S. Asur and B. A. Huberman, "Predicting the future with social media," in Proc. of IEEE/WIC/ACM International Conference on Web Intelligence, pp. 492-499, 2010.
- W. G. Mangold and D. J.Faulds, "Social media: The new hybrid element of the promotion mix," Business horizons, vol. 52, no. 4, pp. 357-365, 2009. https://doi.org/10.1016/j.bushor.2009.03.002
- A. M. Kaplan and M. Haenlein, "Users of the world, unite! The challenges and opportunities of Social Media," Business horizons, vol. 53, no. 1, pp. 59-68, 2010. https://doi.org/10.1016/j.bushor.2009.09.003
- W. S. Chow andL. S. Chan, "Social network, social trust and shared goals in organizational knowledge sharing," Information & Management, vol. 45, no. 7, pp. 458-465, 2008. https://doi.org/10.1016/j.im.2008.06.007
- K. Lewis, M. Gonzalez and J. Kaufman, "Social selection and peer influence in an online social network," in Proc. of the National Academy of Sciences, vol. 109, no. 1, pp. 68-72, 2012. https://doi.org/10.1073/pnas.1109739109
- K. Fehl, D. J. Post and D. Semmann, "Co‐evolution of behaviour and social network structure promotes human cooperation," Ecology letters, vol. 14, no. 6, pp. 546-551, 2011. https://doi.org/10.1111/j.1461-0248.2011.01615.x
- A. T. Wal, "Cluster emergence and network evolution: a longitudinal analysis of the inventor network in Sophia-Antipoli," Regional Studies, vol. 47, no. 5, pp. 651-668, 2013. https://doi.org/10.1080/00343401003614258
- J. H. Kietzmann, K. Hermkens and I. P. McCarthy, "Social media? Get serious! Understanding the functional building blocks of social media," Business horizons, vol. 54, no. 3, pp. 241-251, 2011. https://doi.org/10.1016/j.bushor.2011.01.005
- A. L. Kavanaugha, E. A. Foxa, S. D. Sheetzb, S. Yanga, L. T. Lid, D. J. Shoemakerc, A. Natsevf and L. Xieg, "Social media use by government: From the routine to the critical," Government Information Quarterly, vol. 29, no. 4, pp. 480-491, 2012. https://doi.org/10.1016/j.giq.2012.06.002
- Z. Wang, P. Cui, L. Xie, H. Chen, W. Zhu and S. Yang, "Analyzing social media via event facets," in Proc. of ACM Multimedia Conference, pp.1359-1360, 2012.
- K. Bok, J. Lim, M. Ahn and J. Yoo, "A Social Search Scheme Considering User Preferences and Popularities in Mobile Environments," KSII Transactions on Internet and Information Systems, vol.10. no.2, pp.744-768, 2016. https://doi.org/10.3837/tiis.2016.02.017
- H. Kwak, C. Lee, H. Park and S. B. Moon, "What is Twitter, a social network or a news media?," in Proc. of International Conference on World Wide Web, pp.591-600, 2010.
- N. B. Ellison, J. Vitak, R. Gray and C. Lampe, "Cultivating social resources on social network sites: Facebook relationship maintenance behaviors and their role in social capital processes," Journal of Computer‐Mediated Communication, vol. 19, no. 4, pp. 855-870, 2014.
- E. W. T. Ngai, K. K. Moon, S. S. Lam, E. S. K. Chin and S. S. C. Tao, "Social media models, technologies, and applications: An academic review and case study," Industrial Management and Data Systems, vol. 115, no. 5, pp. 769-802, 2015. https://doi.org/10.1108/IMDS-03-2015-0075
- S. Abu-Nimeh, T. M. Chen and O. Alzubi, "Malicious and spam posts in online social networks," IEEE Computer, vol. 44, no. 9, pp. 23-28, 2011. https://doi.org/10.1109/MC.2011.222
- J. Fogeland E. Nehmad, "Internet social network communities: Risk taking, trust, and privacy concerns," Computers in human behavior, vol. 25, no. 1, pp. 153-160, 2009. https://doi.org/10.1016/j.chb.2008.08.006
- S. Hamdi, A. L. Gancarski, A. Bouzeghoub and S. B. Yahia, "IRIS: A novel method of direct trust computation for generating trusted social networks," in Proc. of International Conference on Trust, Security and Privacy in Computing and Communications, pp. 616-623, 2012.
- Z. Zhang and K. Wang, "A Trust Model for Multimedia Social Networks," Social Network Analysis and Mining, vol. 3, no. 4, pp. 969-979, 2013. https://doi.org/10.1007/s13278-012-0078-4
- A. Louati, J. E. Haddad and S. Pinson, "Trust-based service discovery in multi-relation social networks," in Proc. of International Conference on Service-Oriented Computing, pp. 664-671, 2012.
- M. Burke, C. Marlow and T. M. Lento, "Social network activity and social well-being," in Proc. of International Conference on Human Factors in Computing Systems, pp.1909-1912, 2010.
- D. Boyd and N. B. Ellison, "Social network sites: Definition, history, and scholarship," Journal of Computer‐Mediated Communication, vol. 13, no. 1, pp. 210-230, 2007.
- Y. Han, L. Kim and J. Cha, "Computing user reputation in a social network of web 2.0," Computing and Informatics, vol. 31, no. 2, pp. 447-462, 2012.
- M. Eirinaki, M. D. Louta and I. Varlamis, "A Trust-Aware System for Personalized User Recommendations in Social Networks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 4, pp. 409-421, 2014. https://doi.org/10.1109/TSMC.2013.2263128
- H. Hosseinmardi, R. Han, Q. Lv, S. Mishra and A. Ghasemianlangroodi, "Towards understanding cyberbullying behavior in a semi-anonymous social network," in Proc. of International Conference on Advances in Social Networks Analysis and Mining, pp. 244-252, 2014.
- Z. Yan, R. Kantola, G. Shi and P. Zhang, "Unwanted content control via trust management in pervasive social networking," in Proc. of International Conference on Trust, Security and Privacy in Computing and Communications, pp. 202-290, 2013.
- X. Liu, L. Shi, Y. Wang, Z. Xin and W. Fu, "A Dynamic Trust Conference Algorithm for Social Network," in Proc. of International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.340-346, 2013.
피인용 문헌
- 소셜 네트워크에서 연결 관계와 영향력을 고려한 사용자 간접 신뢰도 판별 vol.18, pp.5, 2017, https://doi.org/10.5392/jkca.2018.18.05.280
- 자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계 vol.19, pp.5, 2018, https://doi.org/10.7472/jksii.2018.19.5.1
- Trust evaluation of multimedia documents based on extended provenance model in social semantic web vol.78, pp.20, 2019, https://doi.org/10.1007/s11042-018-6243-7
- IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/8937448
- Defending against Internal Attacks in Healthcare-Based WSNs vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/2081246