1. Brown, JJ, Reingen, PH: Social ties and word-of-mouth referral behavior. J. Consum. Res. 14(3), 350–362 (1987).
2. Goldenberg, J, Libai, B, Muller, E: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Marketing Letters. 12(3), 211–223 (2001). http://link.springer.com/article/10.1023%2FA%3A1011122126881 .
3. Metaxas, PT, Mustafaraj, E, Gayo-Avello, D: How (not) to predict elections. In: Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust (PASSAT) and the 3rd International Conference on Social Computing (SocialCom) (2011).
4. Cao, Q, Sirivianos, M, Yang, X, Pregueiro, T: Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI) (2012).
5. Thomas, K, Grier, C, Paxson, V: Adapting social spam infrastructure for political censorship. In: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats (LEET) (2012).