<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v24i11e40701</article-id>
      <article-id pub-id-type="pmid">36367965</article-id>
      <article-id pub-id-type="doi">10.2196/40701</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Opinion Leaders and Structural Hole Spanners Influencing Echo Chambers in Discussions About COVID-19 Vaccines on Social Media in China: Network Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Hu</surname>
            <given-names>Jiming</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Sufi</surname>
            <given-names>Fahim</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>Dandan</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5319-5820</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Zhou</surname>
            <given-names>Yadong</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2118-3080</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Ma</surname>
            <given-names>Feicheng</given-names>
          </name>
          <degrees>Prof Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Information Management</institution>
            <institution>Wuhan University</institution>
            <addr-line>No.16 Luojia Mountain</addr-line>
            <addr-line>Wuchang District</addr-line>
            <addr-line>Wuhan, 430072</addr-line>
            <country>China</country>
            <phone>86 1 350 711 9710</phone>
            <email>fchma@whu.edu.cn</email>
          </address>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0187-0131</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Information Management</institution>
        <institution>Wuhan University</institution>
        <addr-line>Wuhan</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>School of Data Science</institution>
        <institution>City University of Hong Kong</institution>
        <addr-line>Hong Kong</addr-line>
        <country>China (Hong Kong)</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Center for Studies of Information Resources</institution>
        <institution>Wuhan University</institution>
        <addr-line>Wuhan</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Big Data Institute</institution>
        <institution>Wuhan University</institution>
        <addr-line>Wuhan</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Department of Electrical and Computer Engineering</institution>
        <institution>University of Florida</institution>
        <addr-line>Gainesville, FL</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Feicheng Ma <email>fchma@whu.edu.cn</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>11</month>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>18</day>
        <month>11</month>
        <year>2022</year>
      </pub-date>
      <volume>24</volume>
      <issue>11</issue>
      <elocation-id>e40701</elocation-id>
      <history>
        <date date-type="received">
          <day>1</day>
          <month>7</month>
          <year>2022</year>
        </date>
        <date date-type="rev-request">
          <day>27</day>
          <month>10</month>
          <year>2022</year>
        </date>
        <date date-type="rev-recd">
          <day>31</day>
          <month>10</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>9</day>
          <month>11</month>
          <year>2022</year>
        </date>
      </history>
      <copyright-statement>©Dandan Wang, Yadong Zhou, Feicheng Ma. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 18.11.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2022/11/e40701" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Social media provide an ideal medium for breeding and reinforcing vaccine hesitancy, especially during public health emergencies. Algorithmic recommendation–based technology along with users’ selective exposure and group pressure lead to online echo chambers, causing inefficiency in vaccination promotion. Avoiding or breaking echo chambers largely relies on key users’ behavior.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>With the ultimate goal of eliminating the impact of echo chambers related to vaccine hesitancy on social media during public health emergencies, the aim of this study was to develop a framework to quantify the echo chamber effect in users’ topic selection and attitude contagion about COVID-19 vaccines or vaccinations; detect online opinion leaders and structural hole spanners based on network attributes; and explore the relationships of their behavior patterns and network locations, as well as the relationships of network locations and impact on topic-based and attitude-based echo chambers.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We called the Sina Weibo application programming interface to crawl tweets related to the COVID-19 vaccine or vaccination and user information on Weibo, a Chinese social media platform. Adopting social network analysis, we examined the low echo chamber effect based on topics in representational networks of information, according to attitude in communication flow networks of users under different interactive mechanisms (retweeting, commenting). Statistical and visual analyses were used to characterize behavior patterns of key users (opinion leaders, structural hole spanners), and to explore their function in avoiding or breaking topic-based and attitude-based echo chambers.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Users showed a low echo chamber effect in vaccine-related topic selection and attitude interaction. For the former, the homophily was more obvious in retweeting than in commenting, whereas the opposite trend was found for the latter. Speakers, replicators, and monologists tended to be opinion leaders, whereas common users, retweeters, and networkers tended to be structural hole spanners. Both leaders and spanners tended to be “bridgers” to disseminate diverse topics and communicate with users holding cross-cutting attitudes toward COVID-19 vaccines. Moreover, users who tended to echo a single topic could bridge multiple attitudes, while users who focused on diverse topics also tended to serve as bridgers for different attitudes.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This study not only revealed a low echo chamber effect in vaccine hesitancy, but further elucidated the underlying reasons from the perspective of users, offering insights for research about the form, degree, and formation of echo chambers, along with depolarization, social capital, stakeholder theory, user portraits, dissemination pattern of topic, and sentiment. Therefore, this work can help to provide strategies for public health and public opinion managers to cooperate toward avoiding or correcting echo chamber chaos and effectively promoting online vaccine campaigns.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>COVID-19</kwd>
        <kwd>COVID-19 vaccine</kwd>
        <kwd>echo chamber</kwd>
        <kwd>opinion leader</kwd>
        <kwd>structural hole spanner</kwd>
        <kwd>topic</kwd>
        <kwd>sentiment</kwd>
        <kwd>social media</kwd>
        <kwd>vaccine hesitancy</kwd>
        <kwd>public health</kwd>
        <kwd>vaccination</kwd>
        <kwd>health promotion</kwd>
        <kwd>online campaign</kwd>
        <kwd>social network analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Despite scientific consensus that COVID-19 vaccines are safe and effective [<xref ref-type="bibr" rid="ref1">1</xref>], there is still widely circulated controversial information on social media, with statements such as “while vaccinations offer good protection, they do not provide full immunity, and the extent to which they would be effective against new variants of the virus remains uncertain,” which damages public confidence [<xref ref-type="bibr" rid="ref2">2</xref>]. This misinformation leads to vaccine hesitancy, which has been recognized by the World Health Organization as a major global health threat [<xref ref-type="bibr" rid="ref3">3</xref>]. Social media platforms such as Twitter, Facebook, TikTok, and YouTube provide an ideal medium for spreading and reinforcing antivaccine ideas [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref7">7</xref>]. First, the information-filtering mechanism based on algorithmic recommendation technology mediates and facilitates content promotion by considering users’ interest and attitudes [<xref ref-type="bibr" rid="ref8">8</xref>]. Second, online users have access to a wealth of information and narratives. Affected by individual and social factors such as selective exposure and group pressure, users prefer to select information that fits their belief system, while ignoring dissident information. Gradually, echo chambers emerge, in which like-minded people continue to frame and strengthen shared narratives [<xref ref-type="bibr" rid="ref9">9</xref>]. In the vaccine promotion campaign, the trend of simplification of users’ vaccine-information sources is strengthened and the flow of information between groups with different ideologies toward vaccines is blocked, which widens the knowledge gap and assimilates value cognition [<xref ref-type="bibr" rid="ref10">10</xref>]. The accompanying group polarization and social fragmentation blind the public to preconceived misconceptions and undermine authorities’ efforts to improve the public’s information literacy [<xref ref-type="bibr" rid="ref11">11</xref>], causing inefficiency in the vaccine campaign [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>].</p>
        <p>Users in a social network can be divided into three roles: opinion leaders, structural hole spanners, and ordinary users [<xref ref-type="bibr" rid="ref14">14</xref>]. Lou and Tang [<xref ref-type="bibr" rid="ref15">15</xref>] pointed out that the top 1% of users acting as structural hole spanners control almost 80% of information diffusion between communities and 25% of information diffusion on Twitter. Wu et al [<xref ref-type="bibr" rid="ref16">16</xref>] revealed that 50% of URLs were posted by 1% of users serving as opinion leaders. Further, Cossard et al [<xref ref-type="bibr" rid="ref17">17</xref>] identified key users in echo chambers, while Jeon et al [<xref ref-type="bibr" rid="ref18">18</xref>] evaluated the characteristics of users who broke the echo chamber. </p>
        <p>To avoid or break an echo chamber, it is critical to characterize these key users and determine their impact on topic dissemination and opinion evolution, which could facilitate the communication within and between pro- and antivaccine groups, and thereby eliminate vaccine hesitancy. Toward this end, in this study, we developed a framework to evaluate and compare the degree of the effect of different forms of echo chambers on users’ interactive behavior using quantitative measurements. We further explored the hidden mechanisms of an echo chamber’s formation and its strengthening or disintegration by detecting key users who occupy critical network positions, analyzing the relationship between their behavior pattern, network location, and function both inside and outside of echo chambers. Although this framework was designed based on online debates of COVID-19 vaccine hesitancy as the background to offer insights for public health administrators, it could also be applied and expanded to other controversial theme discussions to serve as a reference for public opinion managers.</p>
      </sec>
      <sec>
        <title>Prior Work</title>
        <sec>
          <title>Echo Chamber of Vaccine Hesitancy</title>
          <p>Most studies in this field have concentrated on the presence, form, and degree of echo chambers, whereas limited research has aimed to develop efficient strategies to address the echo chamber effect. Schmidt et al [<xref ref-type="bibr" rid="ref6">6</xref>]analyzed vaccine-related posts on Facebook from 2010 to 2017, claiming the existence of highly polarized pro- and antivaccine groups by calculating each user’s attitude-polarization score based on their “like” and comment behavior. Mønsted and Lehmann [<xref ref-type="bibr" rid="ref5">5</xref>] obtained similar results from an analysis of tweets posted on Twitter from 2013 to 2016, using the assortativity coefficient derived from network structures. Rathje et al [<xref ref-type="bibr" rid="ref19">19</xref>] adopted the same index to examine the degree of the echo chamber effect during the COVID-19 epidemic. Apart from attitude-based self-isolation, Del Vicario et al [<xref ref-type="bibr" rid="ref20">20</xref>] found highly controversial topics by measuring the distance between how a certain topic is presented in tweets and the related users’ emotional response. Cossard et al [<xref ref-type="bibr" rid="ref17">17</xref>] further compared the echo chamber effect on users’ interactive behaviors (retweeting, mentioning) on Twitter during measles outbreaks, and identified key users occupying a central location in interactive networks to tighten the structures of echo chambers. To mitigate the negative effect of echo chambers, Jeon et al [<xref ref-type="bibr" rid="ref18">18</xref>] performed a user experiment using a game-based methodology to determine the characteristics of users who broke the echo chamber. The breakers were consistently aware of being trapped in echo chambers and tended to maintain diverse perspectives when consuming information.</p>
        </sec>
        <sec>
          <title>User Roles in Echo Chambers</title>
          <p>Social capital, as a set of resources embedded in relationships, results from holding certain locations in a social structure [<xref ref-type="bibr" rid="ref21">21</xref>]. Social capital theory suggests that a more central location in a social network, with cohesive social ties fostering trust and cooperation, leads to more bonding relationships. By contrast, structural hole theory emphasizes that social capital results from a bridging position, which can bring the ego diverse and nonredundant information [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>], as well as control of information flow [<xref ref-type="bibr" rid="ref24">24</xref>] so as to enhance innovation performance [<xref ref-type="bibr" rid="ref25">25</xref>]. The idea is grounded in weak tie theory [<xref ref-type="bibr" rid="ref26">26</xref>]. Weak ties represent loose connections in the network, making it easier to include a large number of talents with different views, information, and resources [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
          <p>Burt [<xref ref-type="bibr" rid="ref28">28</xref>] explained that whether social capital performs a greater function of bonding than bridging depends on the context. An “opinion leader” is a term used to broadly refer to any individual or entity with high influence in a network, and should not be predetermined but rather explored in different contexts [<xref ref-type="bibr" rid="ref29">29</xref>]. Opinion leaders occupy the center of the information network within their local communities, and can influence others by drawing their attention to certain topics or opinions and inspiring reactions to the messages they post [<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref32">32</xref>]. Opinion leaders have been found to be responsible for promoting an echo chamber [<xref ref-type="bibr" rid="ref33">33</xref>]. Through an online-search experiment, Bar-Gill and Gandal [<xref ref-type="bibr" rid="ref34">34</xref>] found that opinion leaders raised the potential for a topic echo chamber, promoting communities to focus on homogeneous topics. Guo et al [<xref ref-type="bibr" rid="ref29">29</xref>] analyzed the impact of opinion leaders of different genders, partisanship, and stakeholder categories on political homophily in Twitter communities. However, Dubois and Blank [<xref ref-type="bibr" rid="ref35">35</xref>] and Dubois et al [<xref ref-type="bibr" rid="ref36">36</xref>] drew conclusions from survey data that the contribution of opinion leaders to a political echo chamber was overvalued without considering the interests of information receivers and the diversity of information sources. Based on thorough qualitative interviews, Bergström and Jervelycke Belfrage [<xref ref-type="bibr" rid="ref37">37</xref>] also argued that opinion leaders brought attention to news others would have missed.</p>
          <p>The lack of connection among communities forms structural holes in social structures [<xref ref-type="bibr" rid="ref38">38</xref>]. Individuals filling the holes, acting as intermediaries between different communities, are regarded as “structural hole spanners” [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. By simulating opinion update rules of ordinary agents and structural hole agents, Gong et al [<xref ref-type="bibr" rid="ref40">40</xref>] proved that structural hole–based approaches could alleviate the echo chamber effect and reduce opinion polarity in social networks. Using social network analysis, Swarnakar et al [<xref ref-type="bibr" rid="ref41">41</xref>] emphasized that structural hole spanners acted as brokers and bridge-makers for collaboration of heterogeneous patterns on climate change.</p>
          <p>Research about opinion leaders’ impact on echo chambers has resulted in contradictory conclusions with respect to different social issues. Limited research has focused on the impact of structural hole spanners on echo chambers. Rather, research in this field has mainly focused on opinion-based echo chambers under specific topics, while ignoring users’ topic selection prior to opinion contagion. Despite these advancements, a gap remains in the literature: if both bonding and bridging arguments are valid depending on the context, under which conditions should they be complementary or otherwise?</p>
        </sec>
      </sec>
      <sec>
        <title>Research Questions</title>
        <p>Online echo chambers have been studied in the context of users’ interactions (eg, posting, retweeting, commenting, mentioning), focusing on rumor spread and management [<xref ref-type="bibr" rid="ref42">42</xref>-<xref ref-type="bibr" rid="ref44">44</xref>], political debates [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref45">45</xref>], and news consumption [<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref47">47</xref>]; however, related studies on vaccine hesitancy are rare, especially during public health emergencies. To assess whether users on Sina Weibo, the most popular microblogging platform in China (with a structure similar to Twitter), exhibited an echo chamber effect when discussing COVID-19 vaccines and vaccinations, and to further understand the formation mechanism or to design strategies to break it, we sought to identify the key users, how their behavior patterns relate to their online positions, and how they cooperate or compete to promote (prevent) the formation or strengthening (breaking) of the echo chamber. Toward this end, we established the following research questions (RQs):</p>
        <p>RQ1: Is there an echo chamber effect in topic selection and opinion contagion of users on Weibo when discussing COVID-19 vaccines and vaccinations? Does it differ between users’ retweeting and commenting behaviors?</p>
        <p>RQ2: Do users with different behavior patterns on Weibo tend to be regarded as opinion leaders or structural hole spanners?</p>
        <p>RQ3a: Do online opinion leaders and structural hole spanners tend to act as echoers or bridgers in topic dissemination?</p>
        <p>RQ3b: Do online opinion leaders and structural hole spanners tend to act as echoers or bridgers in attitude interaction?</p>
        <p>RQ4a: Do these key users acting as echoers in topic dissemination tend to play the same role in attitude interaction?</p>
        <p>RQ4b<bold>:</bold> Do these key users acting as bridgers in topic dissemination tend to play the same role in attitude interaction?</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Design and Definitions</title>
        <p><xref rid="figure1" ref-type="fig">Figure 1</xref> outlines the research framework. Note that although Weibo posts were analyzed in this study, we use the terms “tweet” and “retweet” throughout the manuscript to refer to activities on the platform, equivalent to activities on Twitter, for the sake of convenience. An original “tweet” refers to posts created by a registered Weibo user. A “retweet” refers to users’ forwarding behavior on Weibo. “Comments” refer to replies to an original post on Weibo.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Research framework.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>Our research did not require ethical board approval because it did not involve human or animal trials. The research data were derived from open access data available on social media, mainly through voluntary contributions from users. Our data and analysis of data were conducted in an unbiased and transparent manner, and the data were used only for scientific research without any ethical violations. To be specific, we anonymized key identifiable information, including the nickname field provided by each user and the ID number assigned to each user by the platform when they registered their unique account. We represented these two fields as nonrepeating consecutive integers incremented from 1 to uniquely identify each user, thus hiding the users’ personal information, which had no influence on the study results.</p>
      </sec>
      <sec>
        <title>Data Collection and Preprocessing</title>
        <p>From January 23, 2020, to February 11, 2021, there were numerous messages posted about the outbreak and cessation of the COVID-19 epidemic, as well as the initial exploration of vaccine development and vaccination on Weibo [<xref ref-type="bibr" rid="ref48">48</xref>]. As a medical innovation, the vaccine was widely debated in its early diffusion stage [<xref ref-type="bibr" rid="ref49">49</xref>]. We first used the Sina Weibo application programming interface to collect original tweets containing keywords (“COVID-19 vaccine [新冠疫苗]” or “COVID-19 vaccination [新冠疫苗接种]”). Considering that the interactive data (ie, retweet, comment, and like) of an original tweet could become stable approximately 1 week after it was posted [<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref51">51</xref>], we crawled the following-week interactive data for each original tweet, involving likes, retweets, and comments, and the information of posters, retweeting, and commenting users. There were initially 29,218 original tweets, 50,693 retweets, and 50,796 comments.</p>
        <p>For data preprocessing, we deleted the original tweets without any text (eg, only pictures, videos, or audio) or those that were duplicated or contained the above keywords but did not include any meaningful content. In addition, blank or meaningless comments and their subcomments were also eliminated. After excluding the corresponding retweets and comments as well as the user information, there were 26,788 original tweets, 48,231 retweets, and 46,224 comments from 77,625 users retained for analysis.</p>
      </sec>
      <sec>
        <title>Social Network Construction and Visualization</title>
        <sec>
          <title>Interactive Network Design</title>
          <p>To answer RQ1-4, we constructed interactive networks. Information representational and user communication flow networks are commonly used as the basis to measure polarization [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref44">44</xref>].</p>
        </sec>
        <sec>
          <title>Information Representational Network Construction</title>
          <p>First, we marked the topic for each original tweet. To cover all aspects of the vaccine, we performed this process based on the Health Belief Model, which indicates that the perceived susceptibility, perceived severity, perceived benefits, perceived barriers, cues to action, and self-efficacy have impacts on individuals’ motivation to carry out preventive health behaviors [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref53">53</xref>]. We invited two experienced researchers to label the topics for 10% of the original tweets, and the result passed intercoder reliability tests [<xref ref-type="bibr" rid="ref54">54</xref>] (κ=0.967). After repeating the review and eliminating disagreements, the topic-coding scheme was developed (we did not consider the construct of self-efficacy owing to its low prevalence in the data set), which is shown in <xref ref-type="table" rid="table1">Table 1</xref>. This scheme was used to label the remaining original tweets.</p>
          <p>Retweeting or commenting on an original tweet indicates that the users are interested in the tweet’s topic [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. Based on interactive data, we next established representational networks of information, which were undirected and weighted. In a global information network, each node represents an original tweet; if a user retweets or comments on original tweet <italic>i</italic> and original tweet <italic>j</italic>, an edge exists between <italic>i</italic> and <italic>j</italic>. The edge’s weight represents the number of common users who participate in discussion on the two original tweets. The retweet/comment information network only contained retweet/comment relationships. We then used Python’s NetworkX package to construct these three networks [<xref ref-type="bibr" rid="ref55">55</xref>] and calculated their detailed topological attributes. Finally, the chord diagram visualization of Echarts [<xref ref-type="bibr" rid="ref56">56</xref>] was used to visualize the degree of homophily based on topics in the networks.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Topic-coding scheme based on the Health Belief Model.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="270"/>
              <col width="730"/>
              <thead>
                <tr valign="top">
                  <td>Construct</td>
                  <td>Topics</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Perceived susceptibility</td>
                  <td>Risk of getting COVID-19 infection</td>
                </tr>
                <tr valign="top">
                  <td>Perceived severity</td>
                  <td>Severity of getting COVID-19 infection or refusing COVID-19 vaccination</td>
                </tr>
                <tr valign="top">
                  <td>Perceived benefits</td>
                  <td>Effectiveness of COVID-19 vaccination</td>
                </tr>
                <tr valign="top">
                  <td>Perceived barriers</td>
                  <td>Adverse effects of COVID-19 vaccination; cost of COVID-19 vaccination; fake (eg, counterfeit) vaccines, fraudulent information; safety (eg novelty), infectivity of vaccines, and standardization of vaccination process; conspiracy theory</td>
                </tr>
                <tr valign="top">
                  <td>Cues to action</td>
                  <td>Means to get vaccination; dos and don’ts of vaccination; domestic vaccine development, production, and vaccination; foreign vaccine development, production, and vaccination; personal vaccination experience</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
        <sec>
          <title>User Communication Flow Network Construction</title>
          <p>Many studies adopted the sentiment expressed in tweets created/retweeted/commented by users to represent their attitudes toward vaccines [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]. Considering the Chinese context of Weibo [<xref ref-type="bibr" rid="ref58">58</xref>], we used Baidu’s AipNLP [<xref ref-type="bibr" rid="ref59">59</xref>] to calculate the sentimental positive probability (0≤α≤1) of each original tweet, retweet, and comment. If 0≤α≤0.5, the text was regarded as negative; if 0&#60;α≤1, the text was regard as positive; and otherwise, it was regard as neutral. We counted the most frequently expressed sentiment type of the user, which represented their attitude toward vaccines. Next, we established communication flow networks of users, which were directed and weighted. In the global user network, each node represents a user; if user <italic>i</italic> retweets or comments on tweets (including original tweets, retweets, and comments) of user <italic>j</italic>, there is an edge from user <italic>i</italic> to <italic>j</italic>. The edge’s weight represents the number of interactions between the two users. The retweet/comment user network only contained retweet/comment relationships. We then used Python’s NetworkX package to construct these three networks [<xref ref-type="bibr" rid="ref55">55</xref>] and calculated their detailed topological attributes. Finally, Gephi was used to visualize the degree of homophily based on users’ attitudes, and the Fruchterman Reingold layout algorithm was used to visualize the connectivity in user networks [<xref ref-type="bibr" rid="ref60">60</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Echo Chamber Effect Quantification</title>
        <p>To answer RQ1, we used Python’s NetworkX package to calculate each network’s assortativity coefficient <italic>r</italic> (–1≤<italic>r</italic>≤1) based on the nodes’ attributes (topic in information networks, attitude in user networks) and their interaction, which measures the network’s homophily [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. An <italic>r</italic>&#62;0 indicates that the node generally tends to connect with other nodes with similar properties, and the network is referred to as an assortative network. A larger <italic>r</italic> value indicates more prominent assortativity. If <italic>r</italic>≤0, assortativity does not hold [<xref ref-type="bibr" rid="ref61">61</xref>].</p>
      </sec>
      <sec>
        <title>User Classification</title>
        <sec>
          <title>Method of Classification</title>
          <p>To answer RQ2, we characterized online users’ behavior patterns and detected opinion leaders and structural hole spanners based on their network locations. To answer RQ3-4, we defined two types of mediators to represent the above key users’ contributions to echo chambers. After coding users from these three perspectives, statistical tests were used to examine the relationships.</p>
        </sec>
        <sec>
          <title>User Coding Based on Behavior</title>
          <p>Villodre and Criado [<xref ref-type="bibr" rid="ref62">62</xref>] classified users based on their contrasting behaviors during the dissemination of crisis information. Based on a modification of their rules, we classified all users into 8 categories, as shown in <xref ref-type="table" rid="table2">Table 2</xref>. We then analyzed stakeholders for each category by matching keywords in each user’s personal authentication, introduction, and tags. Referring to the identity-keyword list from An and Ou [<xref ref-type="bibr" rid="ref63">63</xref>], after manually marking 10% of all users (intercoder reliability of two coders, κ=0.991), we modified and expanded the list, and finally determined 11 categories, as shown in <xref ref-type="table" rid="table3">Table 3</xref>. The remaining users were automatically coded using the new list.</p>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>User behavior taxonomy.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="230"/>
              <col width="480"/>
              <col width="260"/>
              <thead>
                <tr valign="top">
                  <td colspan="2">User category</td>
                  <td>Criterion</td>
                  <td>Behavior description</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Influential</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Speaker</td>
                  <td>Number of retweets received was three times higher (low speakers), 10 times higher (medium speakers), or 100 times higher (high speakers) than that of tweets they had posted</td>
                  <td>Users create widely shared content. They show less content-sharing behavior</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Networker</td>
                  <td>Number of tweets≥total mean; number of retweets received≥total mean; number of retweets received/number of retweets sent≥0.5</td>
                  <td>Users show equilibrium between creating content, sharing content, and being retransmitted</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Broadcaster</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Monologist</td>
                  <td>Number of tweets≥total mean; number of retweets received/own tweets≤0.3</td>
                  <td>Users create original content that is not widely shared</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Retweeter</td>
                  <td>Number of tweets≥total mean; number of retweets sent/own tweets≥0.5</td>
                  <td>Users mostly share others’ content</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Replicator</td>
                  <td>Number of comments sent/own tweets≥0.6</td>
                  <td>Users mostly comment on others’ content</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Isolator</td>
                  <td>Number of retweets sent=0; number of retweets received=0; number of comments sent=0; number of comments received=0</td>
                  <td>Users never share/comment on others’ content and they create some content that is never shared/commented by others</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Automatic</td>
                  <td>Send same comments multiple times under one tweet; personal information is blank</td>
                  <td>Users seem to act with automatization</td>
                </tr>
                <tr valign="top">
                  <td colspan="2">Common user</td>
                  <td>None of the above</td>
                  <td>Not applicable</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <table-wrap position="float" id="table3">
            <label>Table 3</label>
            <caption>
              <p>Stakeholder types and related keywords.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="220"/>
              <col width="780"/>
              <thead>
                <tr valign="top">
                  <td>Stakeholder types</td>
                  <td>Keywords (partial)</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Government</td>
                  <td>government, police, court, judicial bureau, judicial office, procuratorate, commission for discipline inspection, political and legal committee</td>
                </tr>
                <tr valign="top">
                  <td>Hospital</td>
                  <td>hospital</td>
                </tr>
                <tr valign="top">
                  <td>Traditional media</td>
                  <td>newspaper, radio, TV station, news, magazine, broadcast, daily, timely, weekly, monthly, morning post, evening post, channel</td>
                </tr>
                <tr valign="top">
                  <td>We-media</td>
                  <td>We-media, author, writer, reporter, editor, blogger, commentator, critic</td>
                </tr>
                <tr valign="top">
                  <td>Platform account</td>
                  <td>Sina Weibo, Weibo medical and health operation, Weibo secretary, Weibo administrator, Weibo rumor rebuttal, Weibo politics</td>
                </tr>
                <tr valign="top">
                  <td>Social organization</td>
                  <td>association, public welfare</td>
                </tr>
                <tr valign="top">
                  <td>Medical company</td>
                  <td>vaccine manufacturer (“SINOVAC BIOTECH CO., LTD”. [“科兴”], “CanSino Biologics Inc.” [“康希诺”], “Hualan,” “Zhifei,” “Kangtai”), medical enterprise</td>
                </tr>
                <tr valign="top">
                  <td>Common company</td>
                  <td>company, enterprise</td>
                </tr>
                <tr valign="top">
                  <td>Educational institution</td>
                  <td>middle school, high school, campus, technical school</td>
                </tr>
                <tr valign="top">
                  <td>Medical personnel</td>
                  <td>doctor, nurse</td>
                </tr>
                <tr valign="top">
                  <td>Common personnel</td>
                  <td>None of the above</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
        <sec>
          <title>User Coding Based on Network Features</title>
          <p>To measure the extent of each user being regarded as an opinion leader, we adopted in-degree centrality [<xref ref-type="bibr" rid="ref29">29</xref>], which represents the volume of network ties directed toward a user [<xref ref-type="bibr" rid="ref64">64</xref>], and the local clustering coefficient, which quantifies the degree to which the user’s neighbors aggregate with each other to form a clique (complete graph) [<xref ref-type="bibr" rid="ref65">65</xref>]. Burt [<xref ref-type="bibr" rid="ref38">38</xref>] proposed four metrics to describe structural hole spanners: effective size, efficiency, constraint, and hierarchy, the third of which is the most important. The effective size of a node measures the nonredundant connections of a node. Efficiency is the effective size divided by the number of the node’s neighbors. Yang et al [<xref ref-type="bibr" rid="ref25">25</xref>] and Tan et al [<xref ref-type="bibr" rid="ref66">66</xref>] chose “constraint” (between 0 and 1), which measures the extent to which the node’s contacts are redundant. When the constraint is closer to 0, there are fewer connections between the node’s contacts. Hierarchy measures the extent to which the aggregate constraint on the node is concentrated in a single contact. A hierarchy value closer to 0 indicates that the constraint is the same for the node’s relationship with each neighbor, whereas a value closer to 1 indicates that all constraints are concentrated in a single contact. The spanner tends to have higher values of effective size, efficiency, and hierarchy, and lower values of constraint [<xref ref-type="bibr" rid="ref67">67</xref>]. We used Ucinet [<xref ref-type="bibr" rid="ref68">68</xref>] to compute the above indices for each node in the global user network.</p>
        </sec>
        <sec>
          <title>User Coding Based on Contribution to the Echo Chamber</title>
          <p>To uncover the mechanisms of intra- and intergroup communication among holders of different interests and viewpoints, we conceptualized two types of social mediators. One was the “echoer,” who only initiated interactions with peers whose interests and viewpoints were highly homogenous, thereby contributing to the formation and even consolidation of echo chambers [<xref ref-type="bibr" rid="ref45">45</xref>]. The other was the “bridger,” who tended to initiate intergroup dialog across areas of interest and heterogeneous viewpoints, aiming to break down echo chamber barriers [<xref ref-type="bibr" rid="ref45">45</xref>]. To be specific, for a topic-based echo chamber, if a user only created, retweeted, or commented on tweets of the same topic, the user was considered to be an echoer; otherwise, they were considered to be a bridger. For an attitude-based echo chamber, if a user only created, retweeted, or commented on tweets from users who had the same attitude, the user was classified as an echoer; otherwise, they were classified as a bridger.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Descriptive Statistics</title>
        <p>Tweets about domestic, foreign status, and conspiracy accounted for 24.46% (n=29,653), 20.40% (n=24,734), and 16.46% (n=19,955) of total tweets (N=121,243), respectively. Overall, 42.51% (51,544/121,243) of tweets expressed a positive attitude toward vaccines and 13.12% (15,907/121,243) of tweets held a negative attitude. <xref rid="figure2" ref-type="fig">Figure 2</xref> shows that discussions about domestic status were the least controversial, whereas discussions related to counterfeit vaccines and fraudulent information were the most divisive.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>The distribution of attitudes expressed in tweets (original tweets, retweets, comments) about different topics.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Echo Chamber Effect in Networks</title>
        <p>Retweet, comment, and global information networks were all sparse, with a density of 0.003, 0.003, and 0.0002, respectively. In <xref rid="figure3" ref-type="fig">Figure 3</xref>, the outer ring of 13 different colors represents a collection of 13 different topics of original tweets, the arc length represents the total connection volume for all of the original tweets belonging to this topic, and the inner colored connecting bands indicate the flow direction and magnitude of the data relationship. The top four topics that interacted most frequently with others were “Foreign status,” “Domestic status,” “Conspiracy,” and “Means.” “Foreign status” was often retweeted by users with topics such as “Domestic status,” “Conspiracy,” and “Means” at the same time, along with “Effectiveness, “Severity,” and “Risk.” The assortativity coefficients of retweet, comment, and global information networks were 0.060, 0.022, and 0.048, respectively, indicating low topic-based homogeneity and that the retweet information network displayed more obvious homogeneity compared with the comment information network.</p>
        <p>Retweet, comment, and global user networks were also sparse, with densities lower than those of information networks. Compared with those of the retweet user network (0.003, 0.0003, 0.011), the comment user network had a higher clustering coefficient, transitivity, and reciprocity (0.007, 0.055, 0.025), indicating that the network built on comment relationships was more cohesive and stable, where users were closely connected and relatively stable [<xref ref-type="bibr" rid="ref69">69</xref>], while retweeting was mostly used for a one-way flow of information [<xref ref-type="bibr" rid="ref70">70</xref>]. As shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>, in the three user networks, clusters brought together people who were confident about vaccines and people with uncertainty [<xref ref-type="bibr" rid="ref71">71</xref>]. The more common edges were found between users holding a positive attitude and between users with a neutral attitude to users with a positive attitude. Users with a clear attitude hardly retweeted posts from users without a determined attitude. Compared with the retweet user network, the tendency of users with a negative/neutral attitude to comment on posts of other users with the same attitude was more obvious, whereas this tendency was less obvious for users with a positive attitude. The assortativity coefficients of the retweet, comment, and global user networks were 0.031, 0.042, and 0.055, respectively, indicating low attitude-based homogeneity and that the comment user network displayed more obvious homogeneity compared with the retweet user network.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Chord diagram representation of the retweet information network (a), comment information network (b), and global information network (c) colored by topic.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Communication flow network of users in the (a) retweet user network (b) comment user network, and (c) global user network. The size and color of each node represent its in-degree and user’s attitude (red=“positive”, blue=“negative”, orange=“neutral”), respectively. The color of the edge is explained in the corresponding legends in the figure.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Relationships Between User Behavior, Network Position, and Role in the Echo Chamber</title>
        <p>As shown in <xref rid="figure5" ref-type="fig">Figure 5</xref>, most users were coded as “common user,” sending 86.9% of retweets and 93.9% of comments. Only 1.0% of users were speakers, but receiving 81.3% of retweets and 62.8% of comments. Most of the original tweets were created by isolators. Retweeters not only often created tweets but also frequently retweeted others’ tweets.</p>
        <p>As shown in <xref rid="figure6" ref-type="fig">Figure 6</xref>, with respect to the weighted degree, most of the speakers’ weighted in-degree centrality was much higher than their weighted out-degree centrality. A different situation was found for retweeters. Speakers had a relatively higher average clustering coefficient (high speakers: 0.012, medium speakers: 0.013, low speakers: 0.007), whereas the average clustering coefficient of retweeters (0.0002) was the lowest among users (apart from isolators). Compared with that of retweeters, replicators had a higher average clustering coefficient (0.004), with in-degrees and out-degrees of similar size.</p>
        <p><xref rid="figure7" ref-type="fig">Figure 7</xref> and <xref rid="figure8" ref-type="fig">Figure 8</xref> show that influentials had more obvious structural hole properties than broadcasters. Among influentials, speakers had a higher effective size, efficiency, and lower constraint than networkers. High speakers performed in the same manner but with a much greater effect. However, some networkers had higher hierarchy than speakers, which indicated that a networker’s constraint was more concentrated on this actor and was more important. Among broadcasters, half of the monologists’ constraint values were lower than 0.500 and half of them had hierarchy values lower than 0.092. Although most of the replicators’ constraint values were lower than 0.333, they largely showed hierarchy values lower than 0.278. Compared with that of replicators, retweeters’ constraint was more concentrated in a single contact.</p>
        <p>Given the massive network size, we considered the top 5% of users in weighted in-degree centrality and local clustering coefficient as opinion leaders (n=386, 0.5% of all users), and the other users in the bottom 5% in constraint were considered as structural hole spanners (n=3123, 4.0% of all users). These two types of users were considered key users. As shown in <xref rid="figure9" ref-type="fig">Figure 9</xref>, opinion leaders were responsible for 38.4% of all of the information flow, while structural hole spanners were responsible for 50.2% of the information flow. Compared with the former, the latter tended to create, retweet, and comment on more tweets.</p>
        <p>As shown in <xref rid="figure10" ref-type="fig">Figure 10</xref>, common users, speakers, replicators, and networkers accounted for 44.0%, 36.3%, 10.6%, and 4.1% of opinion leaders, respectively. Common users, speakers, networkers, and retweeters accounted for 59.3%, 19.7%, 8.7%, and 8.7% of structural hole spanners, respectively. The <italic>χ</italic><sup>2</sup> tests showed a significant difference in the distribution of categories of users between opinion leaders and structural hole spanners (<italic>χ</italic><sup>2</sup><sub>7</sub>=184.650, <italic>P</italic>&#60;.001). Posthoc testing further showed that speakers, replicators, and monologists tended to be opinion leaders, whereas common users, retweeters, and networkers tended to be structural hole spanners.</p>
        <p>Isolators did not become opinion leaders or structural hole spanners, whereas 89.2% of isolaters were topic-based echoers and all of them were attitude-based echoers. The results of <italic>χ</italic><sup>2</sup> tests showed that the proportion of structural hole spanners acting as topic-based bridgers (74.2%) was significantly higher than that of opinion leaders (64.2%) (<italic>χ</italic><sup>2</sup><sub>1</sub>=17.148, <italic>P</italic>&#60;.001). The opposite result (<italic>χ</italic><sup>2</sup><sub>1</sub>=13.193, <italic>P</italic>&#60;.001) was found when considering attitude-based bridgers (structural hole spanners: 88.1%; opinion leaders: 94.3%). Hence, compared with being echoers, both opinion leaders and structural hole spanners tended to act as bridgers. Structural hole spanners were more likely to become bridgers than opinion leaders in topic-based echo chambers, whereas structural hole spanners were less likely to become bridgers than opinion leaders in attitude-based echo chambers.</p>
        <p>To address RQ4, the support and the confidence of the rule were calculated. As shown in <xref ref-type="table" rid="table4">Table 4</xref>, RQ4a was declined, whereas RQ4b was supported, with 62.8% of all key users acting as both topic-based and attitude-based bridgers. Approximately 85.9% of topic-based bridgers also acted as attitude-based bridgers. Specifically, 60.6% of opinion leaders (32.9% government accounts, 30.3% We-media, 19.2% traditional media) and 63.0% of structural hole spanners (39.4% common personnel, 28.4% We-media, 17.3% traditional media) acted as both topic-based and attitude-based bridgers.</p>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Percentage of user categories based on their behavior. No automatics were detected in the data set.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>The distribution of users’ weighted in-degree centrality, weighted out-degree centrality, and local clustering coefficient (the size of the circle). The depth of the shadow represents the number of users with corresponding centrality and clustering coefficients.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure7" position="float">
          <label>Figure 7</label>
          <caption>
            <p>Distribution of users’ structural hole indices (speakers and networks). The white dot, and upper and lower lines of the thick black line represent the index’s median, third quantile, and first quantile, respectively. The width of the red shadow represents the percentage of specific-category users whose index took on that value.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure8" position="float">
          <label>Figure 8</label>
          <caption>
            <p>Distribution of users’ structural hole indices (monologists, retweeters, replicators, and common users). The white dot, and upper and lower lines of the thick black line represent the index’s median, third quantile, and first quantile, respectively. The width of the red shadow represents the percentage of specific-category users whose index took on that value.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure9" position="float">
          <label>Figure 9</label>
          <caption>
            <p>Percentages of tweets from key users.</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig9.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure10" position="float">
          <label>Figure 10</label>
          <caption>
            <p>Composition of user categories in opinion leaders/structural hole spanners and their role in the topic-based echo chamber (left) and attitude-based echo chamber (right).</p>
          </caption>
          <graphic xlink:href="jmir_v24i11e40701_fig10.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Support and confidence of research question 4 (RQ4).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="200"/>
            <col width="0"/>
            <col width="80"/>
            <col width="0"/>
            <col width="200"/>
            <col width="0"/>
            <col width="290"/>
            <col width="0"/>
            <col width="100"/>
            <col width="0"/>
            <col width="100"/>
            <thead>
              <tr valign="top">
                <td colspan="3">User category</td>
                <td colspan="2">Number of users</td>
                <td colspan="2">Number of users as topic-based echoers/bridgers</td>
                <td colspan="2">Number of users as both topic-based and attitude-based echoers/bridgers</td>
                <td colspan="2">Support<sup>a</sup></td>
                <td>Confidence<sup>b</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="12">
                  <bold>RQ4a<sup>c</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Opinion leader</td>
                <td colspan="2">386</td>
                <td colspan="2">138</td>
                <td colspan="2">8</td>
                <td colspan="2">0.021</td>
                <td colspan="2">0.058</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Structural hole spanner</td>
                <td colspan="2">3123</td>
                <td colspan="2">807</td>
                <td colspan="2">23</td>
                <td colspan="2">0.007</td>
                <td colspan="2">0.029</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Total</td>
                <td colspan="2">3509</td>
                <td colspan="2">945</td>
                <td colspan="2">31</td>
                <td colspan="2">0.009</td>
                <td colspan="2">0.033</td>
              </tr>
              <tr valign="top">
                <td colspan="12">
                  <bold>RQ4b<sup>d</sup></bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Opinion leader</td>
                <td colspan="2">386</td>
                <td colspan="2">248</td>
                <td colspan="2">234</td>
                <td colspan="2">0.606</td>
                <td colspan="2">0.944</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Structural hole spanner</td>
                <td colspan="2">3123</td>
                <td colspan="2">2316</td>
                <td colspan="2">1968</td>
                <td colspan="2">0.630</td>
                <td colspan="2">0.850</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Total</td>
                <td colspan="2">3509</td>
                <td colspan="2">2564</td>
                <td colspan="2">2202</td>
                <td colspan="2">0.628</td>
                <td colspan="2">0.859</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>Support equals the number of users as both topic-based and attitude-based echoers (RQ4a)/bridgers (RQ4b) divided by the total number of users.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>Confidence equals the number of users as both topic-based and attitude-based echoers (RQ4a)/bridgers (RQ4b) divided by the number of users as topic-based echoers/bridgers.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>RQ4a: Do key users acting as echoers in topic dissemination tend to play the same role in attitude interaction?</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>RQ4b<bold>:</bold> Do key users acting as bridgers in topic dissemination tend to play the same role in attitude interaction?</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Echo Chamber Effect in Online Vaccine Communication</title>
        <p>Users showed an overall low echo chamber effect in vaccine-related topic selection and they tended to comment on more diverse topics than retweeting them. Discussions about the status of vaccine development, and vaccination at home and abroad, mostly mixed with conspiracy, largely caught users’ attention [<xref ref-type="bibr" rid="ref72">72</xref>]. The risk of contracting COVID-19 and the serious consequences of refusing to be vaccinated were cocommented with claims of vaccine effectiveness.</p>
        <p>In contrast to the findings of Mønsted and Lehmann [<xref ref-type="bibr" rid="ref5">5</xref>] and Schmidt et al [<xref ref-type="bibr" rid="ref6">6</xref>], users showed a low echo chamber effect in attitude interaction. Because the COVID-19 vaccine represents a medical innovation directly related to the safety of human life, a rational public, threatened by the public health emergency, was less bound by herd mentality [<xref ref-type="bibr" rid="ref73">73</xref>]. As the dominant opinion, a positive attitude appealed to following of a neutral crowd, which helped to weaken the echo chamber. These findings are inconsistent with those of Rathje et al [<xref ref-type="bibr" rid="ref19">19</xref>], possibly because national cultural backgrounds influence the cognition, decision-making, and interactive behavior of people belonging to different parties in the United States and United Kingdom. In addition, in contrast to the findings of Tsai et al [<xref ref-type="bibr" rid="ref45">45</xref>], we found that the overall homophily was more obvious in commenting than in retweeting. Specifically, users approving vaccines showed a more significant tendency to interact with like-minded neighbors by retweeting than by commenting [<xref ref-type="bibr" rid="ref43">43</xref>], while users against vaccines or with a neutral attitude acted more significantly by commenting than by retweeting, which suggested that the commenting mechanism might serve as an “anti-spiral of silence” to compete with a “silence spiral” in retweeting to form the global opinion climate [<xref ref-type="bibr" rid="ref74">74</xref>]. Retweeting amplifies the visibility of individuals’ opinions [<xref ref-type="bibr" rid="ref75">75</xref>], influenced by selective psychology, and opinions contrary to mainstream opinions are silenced. While the commenting network was more modularized and cohesive, users were under greater pressure from within their own communities.</p>
      </sec>
      <sec>
        <title>Users’ Behavior Patterns Contributing to Their Network Positions</title>
        <p>The most common behaviors were helpful in spreading information (high percentages of common users and retweeters), while few users frequently participated in two-way dialogs (low percentage of replicators) [<xref ref-type="bibr" rid="ref62">62</xref>]. Speakers were relatively scarce, but they created content provoking responses of others, which contributed to their popularity in the network, so as to be regarded as information centers within their communities. Networkers who demonstrated a balance between creating content, sharing content, and being retransmitted were more likely to fill structural holes to link otherwise less-connected communities. The commenting mechanism offered more chances to create cohesive communities, and hence nominate replicators in each cluster as opinion leaders, while the opposite situation was found for the retweeting mechanism and retweeters.</p>
        <p>Consistent with Yang et al [<xref ref-type="bibr" rid="ref14">14</xref>], opinion leaders and structural hole spanners tended to have a stronger influence than ordinary users. These two jointly played an important role in making the information propagate over a wider scale; the former affected their entire communities of the network, while the latter connecting to different communities affected the entire network [<xref ref-type="bibr" rid="ref76">76</xref>]. Specifically, spanners initiated interactions proactively [<xref ref-type="bibr" rid="ref77">77</xref>].</p>
      </sec>
      <sec>
        <title>Users With Different Network Positions Function in Echo Chamber Formation and Disintegration</title>
        <p>Tan et al [<xref ref-type="bibr" rid="ref66">66</xref>] found that degree centrality and structural holes were complementary at enhancing an organization’s innovation performance in low-density networks. Similarly, we found that both opinion leaders and structural hole spanners played a positive role in breaking the echo chamber for topic dissemination and attitude contagion about COVID-19 vaccines. Opinion leaders insulated others against rather than exacerbated the echo chamber [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], which contradicts with the findings of Cossard et al [<xref ref-type="bibr" rid="ref17">17</xref>]. As gatekeepers, because of social pressure and social support based in part on interpersonal trust [<xref ref-type="bibr" rid="ref78">78</xref>], they were responsible for filtering, curating, and disseminating information they deemed relevant to their social circle to prevent their followers from being trapped in echo chambers. Structural hole spanners diffused information from one group to another, negotiated and synthesized different topics and standpoints, and promoted cooperation in diverse knowledge and ideological fields [<xref ref-type="bibr" rid="ref79">79</xref>]. An et al [<xref ref-type="bibr" rid="ref80">80</xref>] found that the same topic could breed multiple emotions and stakeholders with high topic influence that might not necessarily have high sentiment influence, which, to some extent, explained why users as topic-based echoers might not necessarily act as attitude-based echoers, while users as topic-based bridgers also tended to act as attitude-based bridgers in this study. Aware of the negative impact of echo chambers on crisis management and vaccine promotion, despite different cultural backgrounds, government and We-media positively promoted heterogeneity, and the traditional media’s agenda-setting power was also evident in both topic and opinion spread [<xref ref-type="bibr" rid="ref29">29</xref>]. Moreover, Wagner and Reifegerste [<xref ref-type="bibr" rid="ref81">81</xref>] declared that although isolators were rarely found in their interviews, since participants reported communicating about pandemic-related media coverage “with basically everyone,” some participants might turn into isolators during the trajectory of the pandemic. Our findings certainly confirmed this prediction. We found many isolators, which meant that they did not contribute to increasing the scale of information dissemination, which is distinct from the phenomenon noted in disaster-information diffusion [<xref ref-type="bibr" rid="ref62">62</xref>]. However, the isolators were potential echoers by creating homogenized information and constantly reiterating a single point of view. Although no other users interacted with them, the words of isolators might invisibly reinforce the thoughts of others who saw or read their tweets.</p>
      </sec>
      <sec>
        <title>Theoretical Contributions</title>
        <p>The main theoretical contributions of this study are as follows. First, echo chambers in vaccine debates during a crisis differ from those related to general social issues. This study not only examined the echo chamber effect in different information-dissemination dimensions (topic, attitude) and based on different interactive mechanisms (retweeting, commenting), but also dug out the reasons for a low echo chamber effect from the perspective of the relationship of users’ network location and their function in preventing or breaking echo chambers. This offers a powerful complement to existing research focusing on echo chambers’ form, degree, formation, and depolarization.</p>
        <p>Second, we focused on two types of key users, namely opinion leaders and structural hole spanners, and characterized their behavioral patterns, which could be a supplement for feature engineering of these key users’ detection or prediction. In addition, referring to the bonding and bridging relationship of social capital, this study proposes two new types of social mediators, namely echoers and bridgers, to quantify key users’ impact on echo chambers, thereby enriching the application scope of social capital theories. Hence, users could be classified based on their behavior, network location, impact on echo chambers, and stakeholder theory [<xref ref-type="bibr" rid="ref63">63</xref>], offering insights for the construction of user portraits.</p>
        <p>Third, previous studies about online key users either focused only on their antecedents (factors contributing to individuals occupying a central location/filling a structural hole [<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref82">82</xref>,<xref ref-type="bibr" rid="ref83">83</xref>]) or only on outcome variables (such as the impact of their locations on knowledge management and innovation performance [<xref ref-type="bibr" rid="ref84">84</xref>,<xref ref-type="bibr" rid="ref85">85</xref>], information diffusion [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref76">76</xref>], and emotion contagion [<xref ref-type="bibr" rid="ref86">86</xref>]). This work linked key users’ antecedents and outcomes at the same time, which could be used to explore hidden behavioral paradigms.</p>
        <p>Fourth, we analyzed the relationship of users’ roles in topic-based and attitude-based echo chambers, providing a new research perspective for the dissemination pattern of topic and sentiment.</p>
        <p>Finally, most previous studies excluded users who did not interact with others in the data preprocessing step, ignoring their large-scale presence and potential influence on public opinion evolution. This study is thus the first to explore the impact of such users on echo chambers, which could offer a reference for further research about isolators.</p>
      </sec>
      <sec>
        <title>Practical Implications</title>
        <p>First, although a low echo chamber effect existed in users’ selection of topics about vaccines, users tended to focus on some specific topics, namely the status of vaccine development, vaccination at home and abroad, and conspiracies. Health medical and public opinion managers should be aware of the emergence of echo chambers centered on these topics, which might damage international cooperation for vaccinations and epidemic control [<xref ref-type="bibr" rid="ref87">87</xref>].</p>
        <p>Second, users with neutral attitudes toward vaccines were easily influenced by others with determined standpoints. The interaction between opposing viewpoints remained limited. Managers should invite online opinion leaders and structural hole spanners who act as bridgers to offer multiple aspects of vaccine knowledge to correct opponents’ misunderstanding and improve their health literacy. At the same time, although provaccine sentiment, as the mainstream opinion, was largely spread and echoed in retweeting, managers should monitor the evolution of other opinions in commenting to prevent the wrong view from turning defeat into victory.</p>
        <p>Third, echo chambers have been a major concern of the government, traditional media, and We-media. To obtain better effectiveness, these stakeholders should try to become opinion leaders or structural hole spanners according to their aims by adjusting their own usage behavior on social media. Our results showed that, compared with opinion leaders, structural hole spanners performed better in diffusing diversified topics, whereas opinion leaders performed better in bridging heterogeneous views.</p>
        <p>Finally, online isolators should not be ignored. Although these users were reluctant to interact with others and did not receive any feedback from others, they showed interest in creating messages. They were also immersed in personal echo chambers. Managers should take specific measures to break these isolators’ echo chambers.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>First, we simply divided users into two categories, namely echoers and bridgers, according to the rule as to whether the user spread more than one topic or interacted with cross-cutting neighbors, rather than quantifying the extent to which they acted as echoers/bridgers using continuous values. Further exploration is therefore warranted. Second, we did not manually find bot accounts in our data set, which was part of the strategy of Villodre and Criado [<xref ref-type="bibr" rid="ref62">62</xref>] in their study on Twitter data. To date, no tool has been developed for robot account identification for Weibo. In future research, it will be important to develop automated detection algorithms for larger-scale data [<xref ref-type="bibr" rid="ref88">88</xref>]. Bot accounts could be classified based on their behaviors such as posting repeatedly to appeal for attention or posting maliciously to damage credibility [<xref ref-type="bibr" rid="ref89">89</xref>], which might have different impacts on echo chambers. Finally, our data were limited to the early stage of vaccine promotion, and we did not consider the impact of subsequent virus variants on public perceptions of vaccines. Updated data should be supplemented in follow-up studies. Moreover, this research should be extended to other social media platforms (eg, Zhihu), users with higher information literacy [<xref ref-type="bibr" rid="ref90">90</xref>], and in discussions about different controversial social issues to evaluate the consistency or differences from our results.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>By adopting network analysis, this study evaluated and compared the echo chamber effect in users’ topic selection and attitude interaction based on different social media mechanisms (retweeting, commenting) in the vaccine debate during the public health emergency of COVID-19. We further used statistical and visual analyses to characterize behavioral patterns of key users (opinion leaders, structural hole spanners), and explored their function in avoiding/breaking or preventing/strengthening topic-based and attitude-based echo chambers. These findings could provide meaningful inspiration for health medical and public opinion managers to break online echo chambers and eliminate vaccine hesitancy.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">RQ</term>
          <def>
            <p>research question</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>Funding for this study was provided by the National Natural Science Foundation of China (71661167007, 71420107026) and by the National Key Research and Development Program of China (2018YFC0806904-03).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Marks</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Clemens</surname>
              <given-names>JD</given-names>
            </name>
          </person-group>
          <article-title>Looking beyond COVID-19 vaccine phase 3 trials</article-title>
          <source>Nat Med</source>
          <year>2021</year>
          <month>02</month>
          <day>19</day>
          <volume>27</volume>
          <issue>2</issue>
          <fpage>205</fpage>
          <lpage>211</lpage>
          <pub-id pub-id-type="doi">10.1038/s41591-021-01230-y</pub-id>
          <pub-id pub-id-type="medline">33469205</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-021-01230-y</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>WS</given-names>
            </name>
            <name name-style="western">
              <surname>Budenz</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Considering emotion in COVID-19 vaccine communication: addressing vaccine hesitancy and fostering vaccine confidence</article-title>
          <source>Health Commun</source>
          <year>2020</year>
          <month>12</month>
          <volume>35</volume>
          <issue>14</issue>
          <fpage>1718</fpage>
          <lpage>1722</lpage>
          <pub-id pub-id-type="doi">10.1080/10410236.2020.1838096</pub-id>
          <pub-id pub-id-type="medline">33124475</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Soares</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Rocha</surname>
              <given-names>JV</given-names>
            </name>
            <name name-style="western">
              <surname>Moniz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gama</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Laires</surname>
              <given-names>PA</given-names>
            </name>
            <name name-style="western">
              <surname>Pedro</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Dias</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Leite</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Nunes</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Factors associated with COVID-19 vaccine hesitancy</article-title>
          <source>Vaccines</source>
          <year>2021</year>
          <month>03</month>
          <day>22</day>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>300</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=vaccines9030300"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/vaccines9030300</pub-id>
          <pub-id pub-id-type="medline">33810131</pub-id>
          <pub-id pub-id-type="pii">vaccines9030300</pub-id>
          <pub-id pub-id-type="pmcid">PMC8004673</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jain</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sreenivas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tiwari</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Qureshi</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Bhatt</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tiwari</surname>
              <given-names>AA</given-names>
            </name>
          </person-group>
          <article-title>The dynamics of online opinion formation: polarization around the vaccine development for COVID-19</article-title>
          <source>Causes and symptoms of socio-cultural polarization: role of information and communication technologies</source>
          <year>2022</year>
          <publisher-loc>Singapore</publisher-loc>
          <publisher-name>Springer Singapore</publisher-name>
          <fpage>51</fpage>
          <lpage>72</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mønsted</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Characterizing polarization in online vaccine discourse-A large-scale study</article-title>
          <source>PLoS One</source>
          <year>2022</year>
          <month>2</month>
          <day>9</day>
          <volume>17</volume>
          <issue>2</issue>
          <fpage>e0263746</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0263746"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0263746</pub-id>
          <pub-id pub-id-type="medline">35139121</pub-id>
          <pub-id pub-id-type="pii">PONE-D-21-27127</pub-id>
          <pub-id pub-id-type="pmcid">PMC8827439</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Zollo</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Scala</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Betsch</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Quattrociocchi</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Polarization of the vaccination debate on Facebook</article-title>
          <source>Vaccine</source>
          <year>2018</year>
          <month>06</month>
          <day>14</day>
          <volume>36</volume>
          <issue>25</issue>
          <fpage>3606</fpage>
          <lpage>3612</lpage>
          <pub-id pub-id-type="doi">10.1016/j.vaccine.2018.05.040</pub-id>
          <pub-id pub-id-type="medline">29773322</pub-id>
          <pub-id pub-id-type="pii">S0264-410X(18)30660-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Van Poucke</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>COVID-19 vaccine hesitancy and shaming on TikTok: A multimodal appraisal analysis</article-title>
          <source>Advance Preprints</source>
          <comment>Preprint posted online March 30, 2022</comment>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://advance.sagepub.com/articles/preprint/COVID-19_vaccine_hesitancy_and_shaming_on_TikTok_A_multimodal_appraisal_analysis/19387028">https://advance.sagepub.com/articles/preprint/COVID-19_vaccine_hesitancy_ and_shaming_on_TikTok_A_ multimodal_appraisal_analysis/19387028</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Van Raemdonck</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The echo chamber of anti-vaccination conspiracies: Mechanisms of radicalization on Facebook and Reddit</article-title>
          <source>Institute for Policy, Advocacy and Governance Knowledge Series, Forthcoming</source>
          <year>2019</year>
          <access-date>2022-11-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3510196">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3510196</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Qian</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Echo chamber effect in rumor rebuttal discussions about COVID-19 in China: social media content and network analysis study</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>03</month>
          <day>25</day>
          <volume>23</volume>
          <issue>3</issue>
          <fpage>e27009</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/3/e27009/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/27009</pub-id>
          <pub-id pub-id-type="medline">33690145</pub-id>
          <pub-id pub-id-type="pii">v23i3e27009</pub-id>
          <pub-id pub-id-type="pmcid">PMC7996199</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sugiono</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Polarization as the impact of strengthening of anti-vaccine groups in social media (echo chamber perspective)</article-title>
          <source>J Penelitian Komunikasi Dan Opini Publik</source>
          <year>2021</year>
          <month>12</month>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>166</fpage>
          <lpage>182</lpage>
          <pub-id pub-id-type="doi">10.33299/jpkop.25.2.4194</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Biasio</surname>
              <given-names>LR</given-names>
            </name>
            <name name-style="western">
              <surname>Bonaccorsi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Lorini</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Pecorelli</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Assessing COVID-19 vaccine literacy: a preliminary online survey</article-title>
          <source>Hum Vaccin Immunother</source>
          <year>2021</year>
          <month>05</month>
          <day>04</day>
          <volume>17</volume>
          <issue>5</issue>
          <fpage>1304</fpage>
          <lpage>1312</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33118868"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/21645515.2020.1829315</pub-id>
          <pub-id pub-id-type="medline">33118868</pub-id>
          <pub-id pub-id-type="pmcid">PMC8078752</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Coman</surname>
              <given-names>IA</given-names>
            </name>
            <name name-style="western">
              <surname>Yamamoto</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Najera</surname>
              <given-names>CJ</given-names>
            </name>
          </person-group>
          <article-title>Exposure effects or confirmation bias? Examining reciprocal dynamics of misinformation, misperceptions, and attitudes toward COVID-19 vaccines</article-title>
          <source>Health Commun</source>
          <year>2022</year>
          <month>04</month>
          <day>12</day>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1080/10410236.2022.2059802</pub-id>
          <pub-id pub-id-type="medline">35414311</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Violette</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Aggarwal</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Simeoni</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>MacDougall</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Waite</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Vaccine hesitancy and Web 2.0: Exploring how attitudes and beliefs about influenza vaccination are exchanged in online threaded user comments</article-title>
          <source>Vaccine</source>
          <year>2019</year>
          <month>03</month>
          <day>22</day>
          <volume>37</volume>
          <issue>13</issue>
          <fpage>1769</fpage>
          <lpage>1774</lpage>
          <pub-id pub-id-type="doi">10.1016/j.vaccine.2019.02.028</pub-id>
          <pub-id pub-id-type="medline">30826142</pub-id>
          <pub-id pub-id-type="pii">S0264-410X(19)30223-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Leung</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>RAIN: Social Role-Aware Information Diffusion</article-title>
          <year>2015</year>
          <month>02</month>
          <day>09</day>
          <conf-name>AAAI'15: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence</conf-name>
          <conf-date>January 25-30, 2015</conf-date>
          <conf-loc>Austin, TX</conf-loc>
          <pub-id pub-id-type="doi">10.1609/aaai.v29i1.9164</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lou</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Mining structural hole spanners through information diffusion in social networks</article-title>
          <year>2013</year>
          <conf-name>WWW '13: Proceedings of the 22nd international conference on World Wide Web</conf-name>
          <conf-date>May 13-17, 2013</conf-date>
          <conf-loc>Rio de Janeiro, Brazil</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2488388.2488461</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hofman</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mason</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Watts</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Who says what to whom on twitter</article-title>
          <year>2011</year>
          <conf-name>20th International Conference on World Wide Web</conf-name>
          <conf-date>March 28-April 1, 2011</conf-date>
          <conf-loc>Hyderabad, India</conf-loc>
          <pub-id pub-id-type="doi">10.1145/1963405.1963504</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cossard</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>De Francisci Morales</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kalimeri</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mejova</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Paolotti</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Starnini</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Falling into the echo chamber: the Italian vaccination debate on Twitter</article-title>
          <year>2020</year>
          <month>05</month>
          <day>26</day>
          <conf-name>Fourteenth International AAAI Conference on Web and Social Media (ICWSM 2020)</conf-name>
          <conf-date>June 8-11, 2020</conf-date>
          <conf-loc>Atlanta, Georgia</conf-loc>
          <pub-id pub-id-type="doi">10.1609/icwsm.v14i1.7285</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jeon</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>ChamberBreaker: mitigating the echo chamber effect and supporting information hygiene through a gamified inoculation system</article-title>
          <source>Proc ACM Hum Comput Interact</source>
          <year>2021</year>
          <month>10</month>
          <day>13</day>
          <volume>5</volume>
          <issue>CSCW2</issue>
          <fpage>472</fpage>
          <pub-id pub-id-type="doi">10.1145/3479859</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rathje</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Roozenbeek</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>VanBavel</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>vanderLinden</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Social media behavior is associated with vaccine hesitancy</article-title>
          <source>PNAS Nexus</source>
          <year>2022</year>
          <volume>1</volume>
          <issue>4</issue>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1093/pnasnexus/pgac207</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Del</surname>
              <given-names>VM</given-names>
            </name>
            <name name-style="western">
              <surname>Gaito</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Quattrociocchi</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zignani</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zollo</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>News consumption during the Italian referendum: a cross-platform analysis on facebook and twitter</article-title>
          <year>2017</year>
          <conf-name>2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA)</conf-name>
          <conf-date>October 19-21, 2017</conf-date>
          <conf-loc>Tokyo, Japan</conf-loc>
          <pub-id pub-id-type="doi">10.1109/dsaa.2017.33</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bourdieu</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wacquant</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>An invitation to reflexive sociology</source>
          <year>1992</year>
          <publisher-loc>Chicago</publisher-loc>
          <publisher-name>University of Chicago Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arya</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Understanding collaboration outcomes from an extended resource-based view perspective: the roles of organizational characteristics, partner attributes, and network structures</article-title>
          <source>J Manag</source>
          <year>2016</year>
          <month>06</month>
          <day>30</day>
          <volume>33</volume>
          <issue>5</issue>
          <fpage>697</fpage>
          <lpage>723</lpage>
          <pub-id pub-id-type="doi">10.1177/0149206307305561</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beckman</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Haunschild</surname>
              <given-names>PR</given-names>
            </name>
            <name name-style="western">
              <surname>Phillips</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Friends or strangers? Firm-specific uncertainty, market uncertainty, and network partner selection</article-title>
          <source>Organ Sci</source>
          <year>2004</year>
          <month>06</month>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>259</fpage>
          <lpage>275</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.1040.0065</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gargiulo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Benassi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Trapped in your own net? Network cohesion, structural holes, and the adaptation of social capital</article-title>
          <source>Organ Sci</source>
          <year>2000</year>
          <month>04</month>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>183</fpage>
          <lpage>196</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.11.2.183.12514</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>A multilevel framework of firm boundaries: firm characteristics, dyadic differences, and network attributes</article-title>
          <source>Strat Mgmt J</source>
          <year>2010</year>
          <month>03</month>
          <volume>31</volume>
          <issue>3</issue>
          <fpage>237</fpage>
          <lpage>261</lpage>
          <pub-id pub-id-type="doi">10.1002/smj.815</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Granovetter</surname>
              <given-names>MS</given-names>
            </name>
          </person-group>
          <article-title>The strength of weak ties</article-title>
          <source>Am J Sociol</source>
          <year>1973</year>
          <month>05</month>
          <volume>78</volume>
          <issue>6</issue>
          <fpage>1360</fpage>
          <lpage>1380</lpage>
          <pub-id pub-id-type="doi">10.1086/225469</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sheer</surname>
              <given-names>VC</given-names>
            </name>
            <name name-style="western">
              <surname>Rice</surname>
              <given-names>RE</given-names>
            </name>
          </person-group>
          <article-title>Mobile instant messaging use and social capital: direct and indirect associations with employee outcomes</article-title>
          <source>Inf Manag</source>
          <year>2017</year>
          <month>01</month>
          <volume>54</volume>
          <issue>1</issue>
          <fpage>90</fpage>
          <lpage>102</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2016.04.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Burt</surname>
              <given-names>RS</given-names>
            </name>
          </person-group>
          <article-title>The network structure of social capital</article-title>
          <source>Res Organ Behav</source>
          <year>2000</year>
          <volume>22</volume>
          <fpage>345</fpage>
          <lpage>423</lpage>
          <pub-id pub-id-type="doi">10.1016/S0191-3085(00)22009-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>A. Rohde</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>HD</given-names>
            </name>
          </person-group>
          <article-title>Who is responsible for Twitter’s echo chamber problem? Evidence from 2016 U.S. election networks</article-title>
          <source>Inf Commun Soc</source>
          <year>2018</year>
          <month>07</month>
          <day>20</day>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>234</fpage>
          <lpage>251</lpage>
          <pub-id pub-id-type="doi">10.1080/1369118x.2018.1499793</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bruns</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>HOW long is a tweet? Mapping dynamic conversations on Twitter using Gawk and Gephi</article-title>
          <source>Inf Commun Soc</source>
          <year>2012</year>
          <month>12</month>
          <volume>15</volume>
          <issue>9</issue>
          <fpage>1323</fpage>
          <lpage>1351</lpage>
          <pub-id pub-id-type="doi">10.1080/1369118x.2011.635214</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gruzd</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wellman</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Takhteyev</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Imagining Twitter as an imagined community</article-title>
          <source>Am Behav Sci</source>
          <year>2011</year>
          <month>07</month>
          <day>25</day>
          <volume>55</volume>
          <issue>10</issue>
          <fpage>1294</fpage>
          <lpage>1318</lpage>
          <pub-id pub-id-type="doi">10.1177/0002764211409378</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>WW</given-names>
            </name>
            <name name-style="western">
              <surname>Sang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Blasiola</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>HW</given-names>
            </name>
          </person-group>
          <article-title>Predicting opinion leaders in Twitter activism networks</article-title>
          <source>Am Behav Sci</source>
          <year>2014</year>
          <month>03</month>
          <day>13</day>
          <volume>58</volume>
          <issue>10</issue>
          <fpage>1278</fpage>
          <lpage>1293</lpage>
          <pub-id pub-id-type="doi">10.1177/0002764214527091</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guess</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Nyhan</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lyons</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Reifler</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Avoiding the echo chamber about echo chambers</article-title>
          <source>Knight Foundation</source>
          <year>2018</year>
          <access-date>2022-11-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://kf-site-production.s3.amazonaws.com/media_elements/files/000/000/133/original/Topos_KF_White-Paper_Nyhan_V1.pdf">https://kf-site-production.s3.amazonaws.com/media_elements/files/000/000/133/original/Topos_KF_White-Paper_Nyhan_V1.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bar-Gill</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gandal</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Online exploration, content choice, and echo chambers: an experiment</article-title>
          <source>Vox EU</source>
          <year>2017</year>
          <month>04</month>
          <day>10</day>
          <access-date>2022-11-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cepr.org/voxeu/columns/online-exploration-content-choice-and-echo-chambers-experiment">https://cepr.org/voxeu/columns/online-exploration-content-choice-and-echo-chambers-experiment</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubois</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Blank</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>The echo chamber is overstated: the moderating effect of political interest and diverse media</article-title>
          <source>Inf Commun Soc</source>
          <year>2018</year>
          <month>01</month>
          <day>29</day>
          <volume>21</volume>
          <issue>5</issue>
          <fpage>729</fpage>
          <lpage>745</lpage>
          <pub-id pub-id-type="doi">10.1080/1369118x.2018.1428656</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubois</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Minaeian</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Paquet-Labelle</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Beaudry</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Who to trust on social media: how opinion leaders and seekers avoid disinformation and echo chambers</article-title>
          <source>Soc Media Soc</source>
          <year>2020</year>
          <month>04</month>
          <day>20</day>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>205630512091399</fpage>
          <pub-id pub-id-type="doi">10.1177/2056305120913993</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bergström</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jervelycke Belfrage</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>News in Social Media</article-title>
          <source>Digit Journal</source>
          <year>2018</year>
          <month>01</month>
          <day>12</day>
          <volume>6</volume>
          <issue>5</issue>
          <fpage>583</fpage>
          <lpage>598</lpage>
          <pub-id pub-id-type="doi">10.1080/21670811.2018.1423625</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Burt</surname>
              <given-names>RS</given-names>
            </name>
          </person-group>
          <article-title>The contingent value of social capital</article-title>
          <source>Admin Sci Quart</source>
          <year>1997</year>
          <month>06</month>
          <volume>42</volume>
          <issue>2</issue>
          <fpage>339</fpage>
          <pub-id pub-id-type="doi">10.2307/2393923</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>He</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Joint Community and Structural Hole Spanner Detection via Harmonic Modularity</article-title>
          <year>2016</year>
          <conf-name>KDD '16: 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</conf-name>
          <conf-date>August 13-17, 2016</conf-date>
          <conf-loc>San Francisco, CA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2939672.2939807</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gong</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Du</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Structural hole-based approach to control public opinion in a social network</article-title>
          <source>Engineer Appl Artif Intell</source>
          <year>2020</year>
          <month>08</month>
          <volume>93</volume>
          <fpage>103690</fpage>
          <pub-id pub-id-type="doi">10.1016/j.engappai.2020.103690</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Swarnakar</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mukherjee</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lahsen</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Collaboration networks, structural holes, and homophily: dynamics of non-state actors at the United Nations Climate Change Conference</article-title>
          <source>SSRN preprints</source>
          <comment>Preprint posted online April 11, 2022</comment>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4080749">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4080749</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bessi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Coletto</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Davidescu</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>Scala</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Caldarelli</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Quattrociocchi</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Science vs conspiracy: collective narratives in the age of misinformation</article-title>
          <source>PLoS One</source>
          <year>2015</year>
          <month>2</month>
          <day>23</day>
          <volume>10</volume>
          <issue>2</issue>
          <fpage>e0118093</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0118093"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0118093</pub-id>
          <pub-id pub-id-type="medline">25706981</pub-id>
          <pub-id pub-id-type="pii">PONE-D-14-35774</pub-id>
          <pub-id pub-id-type="pmcid">PMC4338055</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Qian</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The echo chamber effect of rumor rebuttal behavior of users in the early stage of COVID-19 epidemic in China</article-title>
          <source>Comput Human Behav</source>
          <year>2022</year>
          <month>03</month>
          <volume>128</volume>
          <fpage>107088</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34744299"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chb.2021.107088</pub-id>
          <pub-id pub-id-type="medline">34744299</pub-id>
          <pub-id pub-id-type="pii">S0747-5632(21)00411-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC8558265</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Viral misinformation and echo chambers: the diffusion of rumors about genetically modified organisms on social media</article-title>
          <source>Internet Res</source>
          <year>2020</year>
          <month>06</month>
          <day>22</day>
          <volume>30</volume>
          <issue>5</issue>
          <fpage>1547</fpage>
          <lpage>1564</lpage>
          <pub-id pub-id-type="doi">10.1108/intr-11-2019-0491</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tsai</surname>
              <given-names>WS</given-names>
            </name>
            <name name-style="western">
              <surname>Tao</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Chuan</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Echo chambers and social mediators in public advocacy issue networks</article-title>
          <source>Public Relat Rev</source>
          <year>2020</year>
          <month>03</month>
          <volume>46</volume>
          <issue>1</issue>
          <fpage>101882</fpage>
          <pub-id pub-id-type="doi">10.1016/j.pubrev.2020.101882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Zollo</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Del Vicario</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bessi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Scala</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Caldarelli</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Stanley</surname>
              <given-names>HE</given-names>
            </name>
            <name name-style="western">
              <surname>Quattrociocchi</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Anatomy of news consumption on Facebook</article-title>
          <source>Proc Natl Acad Sci U S A</source>
          <year>2017</year>
          <month>03</month>
          <day>21</day>
          <volume>114</volume>
          <issue>12</issue>
          <fpage>3035</fpage>
          <lpage>3039</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pnas.org/doi/abs/10.1073/pnas.1617052114?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1073/pnas.1617052114</pub-id>
          <pub-id pub-id-type="medline">28265082</pub-id>
          <pub-id pub-id-type="pii">1617052114</pub-id>
          <pub-id pub-id-type="pmcid">PMC5373354</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ho</surname>
              <given-names>JCF</given-names>
            </name>
          </person-group>
          <article-title>Exploring the fragmentation of the representation of data-driven journalism in the Twittersphere: a network analytics approach</article-title>
          <source>Soc Sci Comput Rev</source>
          <year>2020</year>
          <month>02</month>
          <day>21</day>
          <volume>40</volume>
          <issue>1</issue>
          <fpage>42</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1177/0894439320905522</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chu</surname>
              <given-names>SKW</given-names>
            </name>
            <name name-style="western">
              <surname>Chiu</surname>
              <given-names>DKW</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Exploring public response to COVID-19 on Weibo with LDA topic modeling and sentiment analysis</article-title>
          <source>Data Inf Manag</source>
          <year>2021</year>
          <month>01</month>
          <day>01</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>86</fpage>
          <lpage>99</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2543-9251(22)00024-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.2478/dim-2020-0023</pub-id>
          <pub-id pub-id-type="medline">35402850</pub-id>
          <pub-id pub-id-type="pii">S2543-9251(22)00024-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC8975181</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mo</surname>
              <given-names>PK</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Lau</surname>
              <given-names>JTF</given-names>
            </name>
          </person-group>
          <article-title>Intention to receive the COVID-19 vaccination in China: application of the diffusion of innovations theory and the moderating role of openness to experience</article-title>
          <source>Vaccines</source>
          <year>2021</year>
          <month>02</month>
          <day>05</day>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>129</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=vaccines9020129"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/vaccines9020129</pub-id>
          <pub-id pub-id-type="medline">33562894</pub-id>
          <pub-id pub-id-type="pii">vaccines9020129</pub-id>
          <pub-id pub-id-type="pmcid">PMC7915878</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xiao</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Analyzing internet topics by visualizing microblog retweeting</article-title>
          <source>J Vis Lang Comput</source>
          <year>2015</year>
          <month>06</month>
          <volume>28</volume>
          <fpage>122</fpage>
          <lpage>133</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jvlc.2014.11.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Machine learning methods to predict social media disaster rumor refuters</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2019</year>
          <month>04</month>
          <day>24</day>
          <volume>16</volume>
          <issue>8</issue>
          <fpage>1452</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph16081452"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph16081452</pub-id>
          <pub-id pub-id-type="medline">31022894</pub-id>
          <pub-id pub-id-type="pii">ijerph16081452</pub-id>
          <pub-id pub-id-type="pmcid">PMC6518238</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alkazemi</surname>
              <given-names>MF</given-names>
            </name>
            <name name-style="western">
              <surname>Guidry</surname>
              <given-names>JPD</given-names>
            </name>
            <name name-style="western">
              <surname>Almutairi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Messner</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>#Arabhealth on Instagram: examining public health messages to Arabian Gulf state audiences</article-title>
          <source>Health Commun</source>
          <year>2022</year>
          <month>01</month>
          <day>02</day>
          <volume>37</volume>
          <issue>1</issue>
          <fpage>39</fpage>
          <lpage>47</lpage>
          <pub-id pub-id-type="doi">10.1080/10410236.2020.1816283</pub-id>
          <pub-id pub-id-type="medline">32873096</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Champion</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Skinner</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Glanz</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Rimer</surname>
              <given-names>BK</given-names>
            </name>
            <name name-style="western">
              <surname>Viswanath</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The health belief model</article-title>
          <source>Health behavior and health education: theory, research, and practice</source>
          <year>2008</year>
          <publisher-loc>San Francisco, CA</publisher-loc>
          <publisher-name>Jossey-Bass</publisher-name>
          <fpage>45</fpage>
          <lpage>65</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krippendorff</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Computing Krippendorff's Alpha-Reliability</article-title>
          <source>University of Pennsylvania Repositories</source>
          <year>2011</year>
          <access-date>2022-11-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://repository.upenn.edu/asc_papers/43">https://repository.upenn.edu/asc_papers/43</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hagberg</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schult</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Swartxploring</surname>
              <given-names>NS</given-names>
            </name>
            <collab>dynamics</collab>
            <collab>function</collab>
          </person-group>
          <article-title>Exploring network structure, dynamics, and function</article-title>
          <year>2008</year>
          <conf-name>7th Python in Science Conference (SciPy2008)</conf-name>
          <conf-date>August 19-24, 2008</conf-date>
          <conf-loc>Pasadena, CA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ying</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kuai</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Xia</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>A bibliometric and visual analysis of global geo-ontology research</article-title>
          <source>Comput Geosci</source>
          <year>2017</year>
          <month>02</month>
          <volume>99</volume>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cageo.2016.10.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sufi</surname>
              <given-names>FK</given-names>
            </name>
            <name name-style="western">
              <surname>Razzak</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Khalil</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Tracking anti-vax social movement using AI based social media monitoring</article-title>
          <source>IEEE Trans Technol Soc</source>
          <year>2022</year>
          <fpage>online ahead of print</fpage>
          <pub-id pub-id-type="doi">10.1109/tts.2022.3192757</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Du</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Social media rumor refutation effectiveness: Evaluation, modelling and enhancement</article-title>
          <source>Inf Process Manag</source>
          <year>2021</year>
          <month>01</month>
          <volume>58</volume>
          <issue>1</issue>
          <fpage>102420</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ipm.2020.102420</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Suo</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Ji</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Emotion analysis of teaching evaluation system based on AI techno-logy towards Chinese texts</article-title>
          <source>MATEC Web Conf</source>
          <year>2021</year>
          <month>02</month>
          <day>15</day>
          <volume>336</volume>
          <fpage>05007</fpage>
          <pub-id pub-id-type="doi">10.1051/matecconf/202133605007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fruchterman</surname>
              <given-names>TMJ</given-names>
            </name>
            <name name-style="western">
              <surname>Reingold</surname>
              <given-names>EM</given-names>
            </name>
          </person-group>
          <article-title>Graph drawing by force-directed placement</article-title>
          <source>Softw Pract Exper</source>
          <year>1991</year>
          <month>11</month>
          <volume>21</volume>
          <issue>11</issue>
          <fpage>1129</fpage>
          <lpage>1164</lpage>
          <pub-id pub-id-type="doi">10.1002/spe.4380211102</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Newman</surname>
              <given-names>MEJ</given-names>
            </name>
          </person-group>
          <article-title>Assortative mixing in networks</article-title>
          <source>Phys Rev Lett</source>
          <year>2002</year>
          <month>11</month>
          <day>11</day>
          <volume>89</volume>
          <issue>20</issue>
          <fpage>208701</fpage>
          <pub-id pub-id-type="doi">10.1103/PhysRevLett.89.208701</pub-id>
          <pub-id pub-id-type="medline">12443515</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Villodre</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Criado</surname>
              <given-names>JI</given-names>
            </name>
          </person-group>
          <article-title>User roles for emergency management in social media: Understanding actors' behavior during the 2018 Majorca Island flash floods</article-title>
          <source>Gov Inf Q</source>
          <year>2020</year>
          <month>10</month>
          <volume>37</volume>
          <issue>4</issue>
          <fpage>101521</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32904927"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.giq.2020.101521</pub-id>
          <pub-id pub-id-type="medline">32904927</pub-id>
          <pub-id pub-id-type="pii">S0740-624X(20)30300-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC7462882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>An</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ou</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Social Network Sentiment Map of the Stakeholders in Public Health Emergencies</article-title>
          <source>Libr Inf Serv China</source>
          <year>2017</year>
          <volume>61</volume>
          <issue>20</issue>
          <fpage>30</fpage>
          <pub-id pub-id-type="doi">10.13266/j.issn.0252-3116.2017.20.013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wasserman</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Faust</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>Social network analysis: methods and applications</source>
          <year>1994</year>
          <publisher-loc>Cambridge, UK</publisher-loc>
          <publisher-name>Cambridge University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubois</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Gaffney</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The multiple facets of influence</article-title>
          <source>Am Behav Sci</source>
          <year>2014</year>
          <month>04</month>
          <day>08</day>
          <volume>58</volume>
          <issue>10</issue>
          <fpage>1260</fpage>
          <lpage>1277</lpage>
          <pub-id pub-id-type="doi">10.1177/0002764214527088</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Network closure or structural hole? The conditioning effects of network–level social capital on innovation performance</article-title>
          <source>Entrepreneur Theory Pract</source>
          <year>2015</year>
          <month>09</month>
          <day>01</day>
          <volume>39</volume>
          <issue>5</issue>
          <fpage>1189</fpage>
          <lpage>1212</lpage>
          <pub-id pub-id-type="doi">10.1111/etap.12102</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Gong</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Oksanen</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ding</surname>
              <given-names>AY</given-names>
            </name>
          </person-group>
          <article-title>Structural hole theory in social network analysis: a review</article-title>
          <source>IEEE Trans Comput Soc Syst</source>
          <year>2022</year>
          <month>6</month>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>724</fpage>
          <lpage>739</lpage>
          <pub-id pub-id-type="doi">10.1109/tcss.2021.3070321</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Whole Net Analysis: A Practical Guide to UCINET Software</source>
          <year>2019</year>
          <publisher-loc>Shanghai</publisher-loc>
          <publisher-name>Gezhi Publishing House</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weng</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Menczer</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Ahn</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Virality prediction and community structure in social networks</article-title>
          <source>Sci Rep</source>
          <year>2013</year>
          <month>8</month>
          <day>28</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>2522</fpage>
          <pub-id pub-id-type="doi">10.1038/srep02522</pub-id>
          <pub-id pub-id-type="medline">23982106</pub-id>
          <pub-id pub-id-type="pii">srep02522</pub-id>
          <pub-id pub-id-type="pmcid">PMC3755286</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Davidsen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ebel</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Bornholdt</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Emergence of a small world from local interactions: modeling acquaintance networks</article-title>
          <source>Phys Rev Lett</source>
          <year>2002</year>
          <month>03</month>
          <day>25</day>
          <volume>88</volume>
          <issue>12</issue>
          <fpage>128701</fpage>
          <pub-id pub-id-type="doi">10.1103/PhysRevLett.88.128701</pub-id>
          <pub-id pub-id-type="medline">11909506</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Himelboim</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Xiao</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>DKL</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>MY</given-names>
            </name>
            <name name-style="western">
              <surname>Borah</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>A social networks approach to understanding vaccine conversations on Twitter: network clusters, sentiment, and certainty in HPV social networks</article-title>
          <source>Health Commun</source>
          <year>2020</year>
          <month>05</month>
          <volume>35</volume>
          <issue>5</issue>
          <fpage>607</fpage>
          <lpage>615</lpage>
          <pub-id pub-id-type="doi">10.1080/10410236.2019.1573446</pub-id>
          <pub-id pub-id-type="medline">31199698</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bieber</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Prelec</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Jovic</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Nechev</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>The suspicious virus: conspiracies and COVID19 in the Balkans</article-title>
          <source>European Fund for the Balkans</source>
          <access-date>2022-11-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.balkanfund.org/biepag-publications/the-suspicious-virus-conspiracies-and-covid19-in-the-balkans">https://www.balkanfund.org/biepag-publications/the-suspicious-virus-conspiracies-and-covid19-in- the-balkans</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boyd</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Golder</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lotan</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter</article-title>
          <year>2010</year>
          <conf-name>HICSS-43 IEEE</conf-name>
          <conf-date>January 6, 2010</conf-date>
          <conf-loc>Kauai, HI</conf-loc>
          <fpage>1530</fpage>
          <lpage>1605</lpage>
          <pub-id pub-id-type="doi">10.1109/hicss.2010.412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kaya</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kawash</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Khoury</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Day</surname>
              <given-names>MY</given-names>
            </name>
          </person-group>
          <article-title>Influence and extension of the spiral of silence in social networks: a data-driven approach</article-title>
          <source>Social network based big data analysis and applications</source>
          <year>2018</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer International Publishing</publisher-name>
          <fpage>143</fpage>
          <lpage>164</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Do rumors diffuse differently from non-rumors? A systematically empirical analysis in Sina Weibo for rumor identification</article-title>
          <source>Advances in Knowledge Discovery and Data Mining. PAKDD 2017. Lecture Notes in Computer Science, vol 10234</source>
          <year>2017</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Fan</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Du</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>An SEI3R information propagation control algorithm with structural hole and high influential infected nodes in social networks</article-title>
          <source>Eng Appl Artif Intell</source>
          <year>2022</year>
          <month>02</month>
          <volume>108</volume>
          <fpage>104573</fpage>
          <pub-id pub-id-type="doi">10.1016/j.engappai.2021.104573</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fu</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zhuang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Understanding the user interactions on GitHub: a social network perspective</article-title>
          <year>2021</year>
          <conf-name>2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)</conf-name>
          <conf-date>May 5-7, 2021</conf-date>
          <conf-loc>Dalian, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/cscwd49262.2021.9437744</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Turcotte</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>York</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Irving</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Scholl</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Pingree</surname>
              <given-names>RJ</given-names>
            </name>
          </person-group>
          <article-title>News recommendations from social media opinion leaders: effects on media trust and information seeking</article-title>
          <source>J Comput-Mediat Comm</source>
          <year>2015</year>
          <month>06</month>
          <day>01</day>
          <volume>20</volume>
          <issue>5</issue>
          <fpage>520</fpage>
          <lpage>535</lpage>
          <pub-id pub-id-type="doi">10.1111/jcc4.12127</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Katz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lazarsfeld</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <source>Personal influence: The part played by people in the flow of mass communications</source>
          <year>2017</year>
          <publisher-loc>Milton Park, UK</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>An</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Ou</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Measuring and profiling the topical influence and sentiment contagion of public event stakeholders</article-title>
          <source>Int J Inf Manag</source>
          <year>2021</year>
          <month>06</month>
          <volume>58</volume>
          <fpage>102327</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2021.102327</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wagner</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Reifegerste</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>"The Part Played by People" in times of COVID-19: interpersonal communication about media coverage in a pandemic crisis</article-title>
          <source>Health Commun</source>
          <year>2021</year>
          <month>10</month>
          <day>13</day>
          <fpage>online ahead of print</fpage>
          <pub-id pub-id-type="doi">10.1080/10410236.2021.1989786</pub-id>
          <pub-id pub-id-type="medline">34645317</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>He</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Understanding structural hole spanners in location-based social networks: a data-driven study</article-title>
          <year>2021</year>
          <conf-name>UbiComp '21: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers</conf-name>
          <conf-date>September 21-26, 2021</conf-date>
          <conf-loc>virtual</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3460418.3480398</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khadangi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Bagheri</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Presenting novel application-based centrality measures for finding important users based on their activities and social behavior</article-title>
          <source>Comput Hum Behav</source>
          <year>2017</year>
          <month>08</month>
          <volume>73</volume>
          <fpage>64</fpage>
          <lpage>79</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.03.014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Phan</surname>
              <given-names>PH</given-names>
            </name>
          </person-group>
          <article-title>Internal capabilities, external structural holes network positions, and knowledge creation</article-title>
          <source>J Technol Transf</source>
          <year>2015</year>
          <month>4</month>
          <day>30</day>
          <volume>41</volume>
          <issue>5</issue>
          <fpage>1148</fpage>
          <lpage>1167</lpage>
          <pub-id pub-id-type="doi">10.1007/s10961-015-9415-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Gu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Research on the relationship between structural hole location, knowledge management and cooperative innovation performance in artificial intelligence</article-title>
          <source>Knowl Manag Res Pract</source>
          <year>2020</year>
          <month>09</month>
          <day>01</day>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.1080/14778238.2020.1813642</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Jia</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Social role-aware emotion contagion in image social networks</article-title>
          <year>2016</year>
          <conf-name>Thirtieth AAAI conference on artificial intelligence</conf-name>
          <conf-date>February 12-17, 2016</conf-date>
          <conf-loc>Phoenix, Arizona</conf-loc>
          <pub-id pub-id-type="doi">10.1609/aaai.v30i1.10003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ullah</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Tahir</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Harapan</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Myths and conspiracy theories on vaccines and COVID-19: potential effect on global vaccine refusals</article-title>
          <source>Vacunas</source>
          <year>2021</year>
          <month>05</month>
          <volume>22</volume>
          <issue>2</issue>
          <fpage>93</fpage>
          <lpage>97</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33727904"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.vacun.2021.01.001</pub-id>
          <pub-id pub-id-type="medline">33727904</pub-id>
          <pub-id pub-id-type="pii">S1576-9887(21)00010-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7951562</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Observation on spammers in Sina Weibo</article-title>
          <year>2013</year>
          <conf-name>2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)</conf-name>
          <conf-date>March 22-23, 2013</conf-date>
          <conf-loc>Hangzhou, China</conf-loc>
          <pub-id pub-id-type="doi">10.2991/iccsee.2013.284</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Teng</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Study of Bot detection on Sina-Weibo based on machine learning</article-title>
          <year>2017</year>
          <conf-name>2017 International Conference on Service Systems and Service Management</conf-name>
          <conf-date>June 16-18, 2017</conf-date>
          <conf-loc>Dalian, China</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icsssm.2017.7996292</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>The new stage of public engagement with science in the digital media environment: citizen science communicators in the discussion of GMOs on Zhihu</article-title>
          <source>New Genet Soc</source>
          <year>2022</year>
          <month>04</month>
          <day>26</day>
          <volume>41</volume>
          <issue>2</issue>
          <fpage>116</fpage>
          <lpage>135</lpage>
          <pub-id pub-id-type="doi">10.1080/14636778.2022.2063826</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
