3Rui H X, Whinston A. Information or Attention? An Empirical Study of User Contribution on Twitter [ J ]. Information System E-Business Management, 20]2 (10) : 309 -324.
4Cheong M, Lee V C S. A Microblogging-Based Approach to Terrorism Informatics: Exploration and Chronicling Civilian Sentiment and Response to Terrorism Events via Twitter [ J]. Information System Front, 20]! (13) ; 45 -59.
5Sonnenbichler A C, Bazant C. Application of a Community Membership Life Cycle Model on Tag-Based Communities in -witter [C]. Proceedings of the 34th Annual Conference of the Gesellschaft fur Klassifikation e. V. , Karlsruhe, 2010:30 - 309.
6Wang A H, Machine Learning for the Detection of Spam in Twitter Networks [A]// Obaidat M S, Tsihrintzis G A, Filipe J (eds). E-Business and Telecommunications-Tth International Joint Conference, ICETE 2010, Athens, Greece, July 26- 28, 2010, Revised Selected Papers [ C] . CCIS 222. Springer Berlin Heidelberg, 2012:319 -333.
7Vosecky J, Leung K W, Ng W. Searching for Quality Microblog Posts: Filtering and Ranking Based on Content Analysis and Implicit Links [A]// Lee S - g, Peng Z, Zhou X, et al (Eds.) . Database System for Advanced Applications - 17th International Conference, DASFAA 2012, Busan, South Korea, April 15- 19, 2012, Proceedings, Part I [C]. LNCS 7238. Springer Berlin Heidelberg, 2012:397 - 413.