“…Another anti-rumor approach (Fan, et al,2014)consideredthebudgetaswellastimeconstraintsinspreadingtrueinformation. Kotnis, (2014)proposedtoprovidetrainingtohigherdegreeindividualswhocanpropagatetrueinformation efficiently.Similarly,onlinetrainingtoemployeesalsocanalleviateorganizationalsecuritybreaches (Jenkins,Durcikova,&Burns,2013;SanNicolas-Rocca&Olfman,2013).Thisactivityincreases thesecuredinformationpropagationatorganizationlevel (Aurigemma,2013).Tripathyandothers consideredthetimetakenbyparticipantstobelievetherumorasanimportantfactortostrategizethe anti-rumorpropagation (Tripathy,Bagchi,&Mehta,2010).Duringanemergencycondition,Huo& Song(2016)analyzedtheinterplaybetweenrumorandtrueinformation.Theauthorsconcludedthat officialauthorityshouldbewisetocontroltherumorsquickerinthenetwork.Recently,anewrumor containingapproachusinganti-rumorcalledRumorContaining(RC)model (Pan,Yang,Yang,Wu, &Tang,2018)wasproposed.Thismodelconsideredbudgetandtimeconstraintsintheapproach. Themodelalsoevaluatestheforgettingrateoftheparticipants.Anti-rumorapproaches,discussed sofar,areconsideringdifferentfactorsincontrollingtherumorsinsocialnetworks.Mostofthese approachesdonotconsiderorpaystheleastattentiontotheimportanceofinfluentialinitiatorsin spreadinganti-rumorsinthenetwork.Butinitialspreaderscancontrolrumorsinthenetworkwhenthey areinfluentialintheircommunity.Also,theseapproachesprovidelesserimportancetothestrength ofrumorsinthenetwork.Whenrumorsaremore,thestrategyofanti-rumorshouldbeaggressive.…”