{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:34:47Z","timestamp":1742949287156,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":13,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461461692"},{"type":"electronic","value":"9781461461708"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-6170-8_172","type":"book-chapter","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T14:48:47Z","timestamp":1412434127000},"page":"19-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities"],"prefix":"10.1007","author":[{"given":"Lisa","family":"Kaati","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"issue":"2","key":"172_CR170","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1344411.1344413","volume":"26","author":"A Abbasi","year":"2008","unstructured":"Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7:1\u20137:29","journal-title":"ACM Trans Inf Syst"},{"key":"172_CR171","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/WI-IAT.2010.63","volume-title":"Proceedings of the 2010 IEEE\/WIC\/ACM international conference on web intelligence and intelligent agent technology \u2013 volume 01, WI-IAT'10, Toronto","author":"S Asur","year":"2010","unstructured":"Asur S, Huberman BA (2010) Predicting the future with social media. In: Proceedings of the 2010 IEEE\/WIC\/ACM international conference on web intelligence and intelligent agent technology \u2013 volume 01, WI-IAT'10, Toronto. IEEE Computer Society, Washington, DC, pp 492\u2013499"},{"key":"172_CR172","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/EISIC.2012.20","volume-title":"In: Proceedings of the European intelligence and security informatics conference 2012","author":"J Brynielsson","year":"2012","unstructured":"Brynielsson J, Horndahl A, Johansson F, Kaati L, M\u00e5rtenson C, Svenson P (2012) Analysis of weak signals for detecting lone wolf terrorists. In: Proceedings of the European intelligence and security informatics conference 2012, Odense, pp 197\u2013204"},{"key":"172_CR173","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-25952-7_13","volume-title":"Intelligence and security informatics","author":"HC Chen","year":"2004","unstructured":"Chen HC, Goldberg MK, Magdon-Ismail M (2004) Identifying multi-ID users in open forums. In: Intelligence and security informatics. Springer, Berlin\/New York, pp 176\u2013186"},{"key":"172_CR174","first-page":"850","volume-title":"ASONAM","author":"J Dahlin","year":"2012","unstructured":"Dahlin J, Johansson F, Kaati L, M\u00e5rtenson C, Svenson P (2012) Combining entity matching techniques for detecting extremist behavior on discussion boards. In: ASONAM, Istanbul, pp 850\u2013857"},{"key":"172_CR175","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1081870.1081883","volume-title":"Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, KDD'05","author":"D Gruhl","year":"2005","unstructured":"Gruhl D, Guha R, Kumar R, Novak J, Tomkins A (2005) The predictive power of online chatter. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, KDD'05, Chicago. ACM, New York, pp 78\u201387"},{"issue":"3","key":"172_CR176","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1561\/1500000005","volume":"1","author":"P Juola","year":"2006","unstructured":"Juola P (2006) Authorship attribution. Found Trends Inf Retr 1(3):233\u2013334","journal-title":"Found Trends Inf Retr"},{"key":"172_CR177","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/SP.2012.46","volume-title":"2012 IEEE symposium on security and privacy (SP)","author":"A Narayanan","year":"2012","unstructured":"Narayanan A, Paskov H, Gong N, Bethencourt J, Stefanov E, Shin E, Song D (2012) On the feasibility of internet-scale author identification. In: 2012 IEEE symposium on security and privacy (SP), San Francisco, pp 300\u2013314"},{"key":"172_CR178","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/988672.988678","volume-title":"Proceedings of the 13th international conference on world wide web, WWW'04","author":"J Novak","year":"2004","unstructured":"Novak J, Raghavan P, Tomkins A (2004) Anti-aliasing on the web. In: Proceedings of the 13th international conference on world wide web, WWW'04, New York. ACM, New York, pp 30\u201339"},{"issue":"3","key":"172_CR179","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol 60(3): 538\u2013556","journal-title":"J Am Soc Inf Sci Technol"},{"key":"172_CR180","first-page":"163","volume-title":"ISA","author":"J Veijalainen","year":"2010","unstructured":"Veijalainen J, Semenov A, Kypp\u00f6 J (2010) Tracing potential school shooters in the digital sphere. In: ISA, Miyazaki, pp 163\u2013178"},{"key":"172_CR181","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge\/New York"},{"issue":"3","key":"172_CR182","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R Zheng","year":"2006","unstructured":"Zheng R, Li J, Chen H, Huang Z (2006) A framework for authorship identification of online messages: writing-style features and classification techniques. J Am Soc Inf Sci Technol 57(3):378\u2013393","journal-title":"J Am Soc Inf Sci Technol"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6170-8_172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:49:01Z","timestamp":1591051741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-6170-8_172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781461461692","9781461461708"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_172","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"5 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}