K. Lee, J. Mahmud, J. Chen, M. Zhou, and J. Nichols, Who will retweet this?: Automatically identifying and engaging strangers on twitter to spread information, The 19th international conference on Intelligent User Interfaces, pp.247-256, 2014.
DOI : 10.1145/2700466

T. A. Hoang and E. P. Lim, Virality and Susceptibility in Information Diffusions, In: ICWSM, 2012.
DOI : 10.1145/2983323.2983800

F. Jin, E. Dougherty, P. Saraf, Y. Cao, and N. Ramakrishnan, Epidemiological modeling of news and rumors on Twitter, Proceedings of the 7th Workshop on Social Network Mining and Analysis, SNAKDD '13, p.8, 2013.
DOI : 10.1145/2501025.2501027

C. Budak, D. Agrawal, and A. Abbadi, Limiting the spread of misinformation in social networks, Proceedings of the 20th international conference on World wide web, WWW '11, pp.665-674, 2011.
DOI : 10.1145/1963405.1963499

F. Safieddine, W. Masri, and P. Pourghomi, Corporate Responsibility in Combating Online Misinformation, International Journal of Advanced Computer Science and Applications, vol.7, issue.2, pp.126-132, 2016.
DOI : 10.14569/IJACSA.2016.070217

URL : http://thesai.org/Downloads/Volume7No2/Paper_17-Corporate_Responsibility_in_Combating_Online_Misinformation.pdf

W. H. Dutton, G. Blank, and D. Gorseli, Cultures of the Internet: The Internet in Britain, Oxford Internet Survey Report, 2013.

M. Libicki, Conquest in cyberspace: National security and information warfare, 2007.
DOI : 10.1017/CBO9780511804250

N. Karlova and K. Fisher, Plz RT: A social diffusion model of misinformation and disinformation for understanding human information behaviour, Inform Res, vol.18, issue.1, pp.1-17, 2013.

K. K. Kumar and G. Geethakumari, Detecting misinformation in online social networks using cognitive psychology, Human-centric Computing and Information Sciences, vol.57, issue.10, pp.1-22, 2014.
DOI : 10.1145/2145204.2145274

URL : https://doi.org/10.1186/s13673-014-0014-x

S. Lewandowsky, U. K. Ecker, C. M. Seifert, N. Schwarz, and J. Cook, Misinformation and Its Correction, Psychological Science in the Public Interest, vol.10, issue.2489, pp.106-131, 2012.
DOI : 10.1111/j.1467-9280.1996.tb00377.x

D. Neys, W. Cromheeke, S. Osman, and M. , Biased but in Doubt: Conflict and Decision Confidence, PLoS ONE, vol.134, issue.1, p.15954, 2011.
DOI : 10.1371/journal.pone.0015954.s002

L. M. Bettencourt, A. Cintrón-arias, D. I. Kaiser, and C. Castillo-chávez, The power of a good idea: Quantitative modeling of the spread of ideas from epidemiological models. Physica A: Statistical Mechanics and its Applications, pp.513-536, 2006.

J. Martin, How to do a reverse Google Image search on Android or iPhone. PC Advisor (online), 2016.

F. Buchholz, On the role of file system metadata in digital forensics, Digital Investigation, pp.298-309, 2004.
DOI : 10.1016/j.diin.2004.10.002

A. Castiglione, G. Cattaneo, and A. De-santis, A Forensic Analysis of Images on Online Social Networks, 2011 Third International Conference on Intelligent Networking and Collaborative Systems, pp.679-684, 2011.
DOI : 10.1109/INCoS.2011.17

W. Contributors, Wikipedia : Version 1.0 Editorial Team. Wikipedia, The Free Encyclopedia, https, en.wikipedia.org/wiki/Wikipedia:Version_1.0_Editorial_Team

J. Osmond and Y. Darlington, Reflective analysis: Techniques for facilitating reflection, Australian Social Work, vol.35, issue.6, pp.3-14, 2015.
DOI : 10.1006/knac.1993.1003

J. Altmann, Observational Study of Behavior: Sampling Methods, Behaviour, vol.49, issue.3, pp.227-266, 1974.
DOI : 10.1163/156853974X00534