How Visibility and Divided Attention Constrain Social Contagion. Hodas, N. O. & Lerman, K. In 2012 International Conference on Privacy, Security, Risk and Trust, PASSAT 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012, pages 249–257, 2012. IEEE Computer Society.
Paper doi bibtex @inproceedings{DBLP:conf/socialcom/HodasL12,
author = {Nathan Oken Hodas and
Kristina Lerman},
title = {How Visibility and Divided Attention Constrain Social Contagion},
booktitle = {2012 International Conference on Privacy, Security, Risk and Trust,
{PASSAT} 2012, and 2012 International Confernece on Social Computing,
SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
pages = {249--257},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/SocialCom-PASSAT.2012.129},
doi = {10.1109/SOCIALCOM-PASSAT.2012.129},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/socialcom/HodasL12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"ELCchwuW8bdXMaLdS","bibbaseid":"hodas-lerman-howvisibilityanddividedattentionconstrainsocialcontagion-2012","downloads":0,"creationDate":"2017-07-14T20:29:29.358Z","title":"How Visibility and Divided Attention Constrain Social Contagion","author_short":["Hodas, N. O.","Lerman, K."],"year":2012,"bibtype":"inproceedings","biburl":"https://dblp.org/pid/99/433.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Nathan","Oken"],"propositions":[],"lastnames":["Hodas"],"suffixes":[]},{"firstnames":["Kristina"],"propositions":[],"lastnames":["Lerman"],"suffixes":[]}],"title":"How Visibility and Divided Attention Constrain Social Contagion","booktitle":"2012 International Conference on Privacy, Security, Risk and Trust, PASSAT 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012","pages":"249–257","publisher":"IEEE Computer Society","year":"2012","url":"https://doi.org/10.1109/SocialCom-PASSAT.2012.129","doi":"10.1109/SOCIALCOM-PASSAT.2012.129","timestamp":"Thu, 23 Mar 2023 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/socialcom/HodasL12.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/socialcom/HodasL12,\n author = {Nathan Oken Hodas and\n Kristina Lerman},\n title = {How Visibility and Divided Attention Constrain Social Contagion},\n booktitle = {2012 International Conference on Privacy, Security, Risk and Trust,\n {PASSAT} 2012, and 2012 International Confernece on Social Computing,\n SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},\n pages = {249--257},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/SocialCom-PASSAT.2012.129},\n doi = {10.1109/SOCIALCOM-PASSAT.2012.129},\n timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/socialcom/HodasL12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Hodas, N. O.","Lerman, K."],"key":"DBLP:conf/socialcom/HodasL12","id":"DBLP:conf/socialcom/HodasL12","bibbaseid":"hodas-lerman-howvisibilityanddividedattentionconstrainsocialcontagion-2012","role":"author","urls":{"Paper":"https://doi.org/10.1109/SocialCom-PASSAT.2012.129"},"metadata":{"authorlinks":{"lerman, k":"https://bibbase.org/show?bib=https://bibbase.org/network/files/iNQKC4NCiGYaef6D9"}},"downloads":0},"search_terms":["visibility","divided","attention","constrain","social","contagion","hodas","lerman"],"keywords":[],"authorIDs":["fbwoK7T4JSHosNKvD"],"dataSources":["Hvc9pNwWw2boxABn6","kxTAWhAJ5AEaGtDRP","mQx34sdtPSKFkQLhg","wYLr8SBM4nf5YstZT","wGK6ZauNs4mPREmZA","myJ9KFC5zXN4qYWpW","jBaLf3eYjNGbA43MA","hzmGg9XcrhhzCFFLq"]}