{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T14:45:22Z","timestamp":1746283522545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750176"},{"type":"electronic","value":"9783030750183"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75018-3_13","type":"book-chapter","created":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T10:06:41Z","timestamp":1620382001000},"page":"205-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Event Precursors in Social Networks: A Graphlet-Based Method"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8229-330X","authenticated-orcid":false,"given":"Hiba","family":"Abou Jamra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0449-5277","authenticated-orcid":false,"given":"Marinette","family":"Savonnet","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6382-2288","authenticated-orcid":false,"given":"\u00c9ric","family":"Leclercq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Ackley, J.L., Puranik, T.G., Mavris, D.: A supervised learning approach for safety event precursor identification in commercial aviation. In: AIAA Aviation Forum, p. 2880 (2020)","DOI":"10.2514\/6.2020-2880"},{"issue":"2","key":"13_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.2307\/41164635","volume":"18","author":"HI Ansoff","year":"1975","unstructured":"Ansoff, H.I.: Managing strategic surprise by response to weak signals. Calif. Manage. Rev. 18(2), 21\u201333 (1975)","journal-title":"Calif. Manage. Rev."},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.physa.2005.05.094","volume":"360","author":"M Baiesi","year":"2006","unstructured":"Baiesi, M.: Scaling and precursor motifs in earthquake networks. Phys. A 360(2), 534\u2013542 (2006)","journal-title":"Phys. A"},{"key":"13_CR4","unstructured":"Brownlee, J.: Introduction to time series forecasting with python: how to prepare data and develop models to predict the future. Machine Learning Mastery (2017)"},{"key":"13_CR5","unstructured":"Coffman, B.: Weak signal research, part I: Introduction. J. Trans. Manag. 2(1) (1997)"},{"key":"13_CR6","unstructured":"Corcoran, W.R.: Defining and analyzing precursors. In: Accident precursor analysis and management: Reducing technological risk through diligence, pp. 79\u201388. National Academy Press Washington, DC (2004)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Davies, T., Marchione, E.: Event networks and the identification of crime pattern motifs. PloS one 10(11), e0143638 (2015)","DOI":"10.1371\/journal.pone.0143638"},{"key":"13_CR8","unstructured":"Godet, M.: From anticipation to action: a handbook of strategic prospective. UNESCO publishing (1994)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-60299-2_9","volume-title":"Principles and Practice of Constraint Programming \u2014 CP \u201995","author":"DQ Goldin","year":"1995","unstructured":"Goldin, D.Q., Kanellakis, P.C.: On similarity queries for time-series data: constraint specification and implementation. In: Montanari, U., Rossi, F. (eds.) CP 1995. LNCS, vol. 976, pp. 137\u2013153. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60299-2_9"},{"key":"13_CR10","unstructured":"Hiltunen, E.: Weak Signals in Organisational Futures. Aalto University School of Economics, Aalto (2010)"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Ho\u010devar, T., Dem\u0161ar, J.: A combinatorial approach to Graphlet counting. Bioinf. 30(4), 559\u2013565 (2014). https:\/\/doi.org\/10.1093\/bioinformatics\/btt717","DOI":"10.1093\/bioinformatics\/btt717"},{"issue":"12","key":"13_CR12","doi-asserted-by":"publisher","first-page":"i171","DOI":"10.1093\/bioinformatics\/btv227","volume":"31","author":"Y Hulovatyy","year":"2015","unstructured":"Hulovatyy, Y., Chen, H., Milenkovi\u0107, T.: Exploring the structure and function of temporal networks with dynamic graphlets. Bioinformatics 31(12), i171\u2013i180 (2015)","journal-title":"Bioinformatics"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-24712-5_19","volume-title":"Communications and Multimedia Security","author":"K Juszczyszyn","year":"2011","unstructured":"Juszczyszyn, K., Ko\u0142aczek, G.: Motif-based attack detection in network communication graphs. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol. 7025, pp. 206\u2013213. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24712-5_19"},{"key":"13_CR14","doi-asserted-by":"publisher","unstructured":"Krigsholm, R.: Applying text mining for identifying future signals of land administration. Land 8(12), 181 (2019). https:\/\/doi.org\/10.3390\/land8120181","DOI":"10.3390\/land8120181"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Maitre, J., M\u00e9nard, M., Chiron, G., Bouju, A., Sid\u00e8re, N.: A meaningful information extraction system for interactive analysis of documents. In: International Conference on Document Analysis and Recognition (ICDAR), pp. 92\u201399. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00024"},{"issue":"1","key":"13_CR16","first-page":"1","volume":"6","author":"ALM Moreira","year":"2015","unstructured":"Moreira, A.L.M., Hayashi, T.W.N., Coelho, G.P., da Silva, A.E.A.: A clustering method for weak signals to support anticipative intelligence. Int. J. Artif. Intell. Expert Syst. (IJAE) 6(1), 1\u201314 (2015)","journal-title":"Int. J. Artif. Intell. Expert Syst. (IJAE)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Ning, Y., Muthiah, S., Rangwala, H., Ramakrishnan, N.: Modeling precursors for event forecasting via nested multi-instance learning. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1095\u20131104 (2016)","DOI":"10.1145\/2939672.2939802"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Pr\u017eulj, N.: Biological network comparison using GraphLet degree distribution. Bioinformatics 23(2), e177\u2013e183 (2007)","DOI":"10.1093\/bioinformatics\/btl301"},{"issue":"18","key":"13_CR19","doi-asserted-by":"publisher","first-page":"3508","DOI":"10.1093\/bioinformatics\/bth436","volume":"20","author":"N Pr\u017eulj","year":"2004","unstructured":"Pr\u017eulj, N., Corneil, D.G., Jurisica, I.: Modeling interactome: scale-free or geometric? Bioinform. 20(18), 3508\u20133515 (2004)","journal-title":"Bioinform."},{"issue":"7","key":"13_CR20","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1093\/jamia\/ocy041","volume":"25","author":"S Ray","year":"2018","unstructured":"Ray, S., McEvoy, D.S., Aaron, S., Hickman, T.T., Wright, A.: Using statistical anomaly detection models to find clinical decision support malfunctions. J. Am. Med. Inform. Assoc. 25(7), 862\u2013871 (2018)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"13_CR21","unstructured":"Ribeiro, P., Paredes, P., Silva, M.E., Aparicio, D., Silva, F.: A survey on subgraph counting: concepts, algorithms and applications to network motifs and graphlets. arXiv preprint arXiv:1910.13011 (2019)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Ripley, B.D., Venables, W.: Modern applied statistics with S. Springer (2002)","DOI":"10.1007\/978-0-387-21706-2"},{"key":"13_CR23","unstructured":"Welz, K., Brecht, L., Pengl, A., Kauffeldt, J.V., Schallmo, D.R.: Weak signals detection: criteria for social media monitoring tools. In: ISPIM Innovation Symposium, p. 1. The International Society for Professional Innovation Management (ISPIM) (2012)"},{"issue":"16","key":"13_CR24","doi-asserted-by":"publisher","first-page":"12543","DOI":"10.1016\/j.eswa.2012.04.059","volume":"39","author":"J Yoon","year":"2012","unstructured":"Yoon, J.: Detecting weak signals for long-term business opportunities using text mining of web news. Expert Syst. Appl. 39(16), 12543\u201312550 (2012)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Business Information Processing","Research Challenges in Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75018-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T10:10:46Z","timestamp":1620382246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75018-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750176","9783030750183"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75018-3_13","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"8 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research Challenges in Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rcis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.rcis-conf.com\/rcis2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"99","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held online due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}