{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:14:12Z","timestamp":1761808452555,"version":"3.41.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030779603"},{"type":"electronic","value":"9783030779610"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77961-0_7","type":"book-chapter","created":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T19:07:58Z","timestamp":1623352078000},"page":"68-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Big Data for National Security in the Era of COVID-19"],"prefix":"10.1007","author":[{"given":"Pedro","family":"C\u00e1rdenas","sequence":"first","affiliation":[]},{"given":"Boguslaw","family":"Obara","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Ivrissimtzis","sequence":"additional","affiliation":[]},{"given":"Ibad","family":"Kureshi","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Theodoropoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,9]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Kharroubi, S., Saleh F.: Are Lockdown Measures Effective Against COVID-19? Front Public Health. 8, 549692 (2020). Accessed 22 Oct 2020, https:\/\/doi.org\/10.3389\/fpubh.2020.549692","DOI":"10.3389\/fpubh.2020.549692"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"301","DOI":"10.3201\/eid2701.201377","volume":"27","author":"P Peretti-Watel","year":"2021","unstructured":"Peretti-Watel, P., Seror, V., Cortaredona, S., Launay, O., Raude, J., Verger, P., et al.: Attitudes about COVID-19 Lockdown among General Population, France, March 2020. Emerg. Infect. Dis. 27(1), 301\u2013303 (2021). https:\/\/doi.org\/10.3201\/eid2701.201377","journal-title":"Emerg. Infect. Dis."},{"key":"7_CR3","unstructured":"Human Development Report: United Nations Development Program, pp. 22\u201333. Oxford University Press, New York and Oxford (1994)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Kureshi, I., Theodoropoulos, G., Magina, E., O\u2019Hare, G., Roche, J.: Towards an info-symbiotic framework for disaster risk management. In: The 19th IEEE\/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT 2015), Xinhua International Hotel, Chengdu, China, 14\u201316 October 2015 (2015)","DOI":"10.1109\/DS-RT.2015.26"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Toth, T., Theodoropoulos, G., Boland, S., Kureshi, I., Ghandar, A.: Global challenge governance: time for big modelling? In: 2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Milan, Italy, pp. 244\u2013253 (2019)","DOI":"10.1109\/ICCICC46617.2019.9146059"},{"key":"7_CR6","unstructured":"Roff, H.: Uncomfortable Ground Truths: Predictive Analytics and National Security. Brookings National Security Report (2020)"},{"key":"7_CR7","unstructured":"Akhgar, B., Saathoff, G., Arabnia, H., Hill, R., Staniforth, A., Bayerl, P.: Application of big data for national security: a practitioner\u2019s guide to emerging technologies. Butterworth-Heinemann, Paperback ISBN: 9780128019672, eBook ISBN: 9780128019733 (2015)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Dolyle, A., et al.: The EMBERS architecture for streaming predictive analytics. In: IEEE International Conference on Big Data, USA (2014)","DOI":"10.1109\/BigData.2014.7004477"},{"key":"7_CR9","unstructured":"ICEWS Homepage. https:\/\/lmt.co\/3owTj8L, Accessed 10 Jan 2021"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Muthiah, S., et al.: EMBERS at 4 years: experiences operating an open source indicators forecasting system. In: Proceedings of the 22nd ACM SIGKDD, New York, NY, USA (2016)","DOI":"10.1145\/2939672.2939709"},{"key":"7_CR11","unstructured":"Parang, S., Naren, R.: EMBERS AutoGSR: automated coding of civil unrest events. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2016). Association for Computing Machinery, New York (2016)"},{"key":"7_CR12","unstructured":"Zhang, X., Li, J., Zhang, X., Fu, J., Wang, D.: Construction of a geopolitical environment simulation and prediction platform coupling multi-source geopolitical environmental factors. Sci. Technol. Rev. 36(3) (2018)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Van Puyvelde, D., Coulthart, S., Hossain, M.S.: Beyond the buzzword: big data and national security decision-making. Int. Affairs 93(6) (2017)","DOI":"10.1093\/ia\/iix184"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, P., Theodoropoulos, G., Obara, B., Kureshi, I.: Defining an alert mechanism for detecting likely threats to National Security. In: IEEE International Conference on Big Data, USA (2018)","DOI":"10.1109\/BigData.2018.8622569"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, P., Theodoropoulos, G., Obara, B.: Web insights for national security: analysing participative online activity to interpret crises. In: IEEE International Conference on Cognitive Informatics and Cognitive Computing, Italy (2019)","DOI":"10.1109\/ICCICC46617.2019.9146090"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, P., Obara, B., Theodoropoulos, G., Kureshi, I.: Analysing social media as a hybrid tool to detect and interpret likely radical behavioural traits for national security. In: IEEE International Conference on Big Data, USA (2019)","DOI":"10.1109\/BigData47090.2019.9006259"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, P., Theodoropoulos, G., Obara, B., Kureshi, I.: A conceptual framework for social movements analytics for national security. In: The International Conference on Computational Science (2018)","DOI":"10.1007\/978-3-319-93698-7_23"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, P., Theodoropoulos, G., Obara, B., Kureshi, I.: Unveiling ideological features through data analytics to construe national security instabilities. In: IEEE International Conference on Big Data, USA (2020)","DOI":"10.1109\/BigData50022.2020.9378020"},{"key":"7_CR19","unstructured":"Idris, M.Y.: Social Instability, Policy Uncertainty, and Financial Risk: Evidence from the Egyptian Exchange and Borse de Tunis, Belfer Center for Science and International Affairs Harvard Kennedy School. (2015)"},{"key":"7_CR20","unstructured":"Institute for Economics and Peace: Global Peace Index 2020 (2020)"},{"key":"7_CR21","unstructured":"Wilson, J.: US lockdown protests may have spread virus widely, cellphone data suggests, The Guardian (2020)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Davies, S.E.: National security and pandemics, United Nations, UN Chronicle (2013)","DOI":"10.18356\/0dfec716-en"},{"key":"7_CR23","unstructured":"Klarevas, L., Clarke, C.: COVID-19 Is a Threat to National Security. Let\u2019s Start Treating It as Such, Just Security (2020)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Sandoval-Almazan, R., Gil-Garcia, J.R.: Cyberactivism through social media: twitter, youtube, and the Mexican political movement \u201ci\u2019m number 132\u201d. In: Hawaii International Conference on System Sciences (2013)","DOI":"10.1109\/HICSS.2013.161"},{"key":"7_CR25","unstructured":"Storck, M.: The role of social media in political mobilisation: A case study of the January 2011 Egyptian uprising. University of St Andrews, Scotland (2011)"},{"key":"7_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316476840","volume-title":"Big Crisis Data: Social Media in Disasters and Time-Critical Situations","author":"C Castillo","year":"2016","unstructured":"Castillo, C.: Big Crisis Data: Social Media in Disasters and Time-Critical Situations. Cambridge University Press, Cambridge (2016)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Bagrow, J.P., Wang, D., Barab\u00e1si, A.-L.: Collective response of human populations to large-scale emergencies. PLoS ONE 6(3) (2011)","DOI":"10.1371\/journal.pone.0017680"},{"key":"7_CR28","unstructured":"Personal Protective Equipment: Questions and Answers, Centers for Disease Control and Prevention Homepage. https:\/\/bit.ly\/38wHUQU, Accessed 10 May 2020"},{"key":"7_CR29","unstructured":"Coronavirus (COVID-19) Outbreak Glossary, Kaiser Family Foundation. https:\/\/bit.ly\/3bn4j4R, Accessed 15 Jan 2021"},{"key":"7_CR30","unstructured":"Becker, A.: COVID-19 crisis catalog: A glossary of terms, Texas Medical Center Home Page. Accessed 26 May 2020"},{"issue":"2","key":"7_CR31","first-page":"69","volume":"3","author":"G Rud\u00e9","year":"1976","unstructured":"Rud\u00e9, G.: Ideology and popular protest. Hist. Reflect.\/R\u00e9flexions Historiques 3(2), 69\u201377 (1976)","journal-title":"Hist. Reflect.\/R\u00e9flexions Historiques"},{"key":"7_CR32","doi-asserted-by":"publisher","DOI":"10.1525\/9780520312234","volume-title":"Studies in the Theory of Ideology","author":"JB Thompson","year":"1984","unstructured":"Thompson, J.B.: Studies in the Theory of Ideology. Polity Press, Cambridge (1984)"},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1080\/13569310600687908","volume":"11","author":"TA Van Dijk","year":"2006","unstructured":"Van Dijk, T.A.: Ideology and discourse analysis. J. Polit. Ideol. 11(2), 115\u2013140 (2006)","journal-title":"J. Polit. Ideol."},{"key":"7_CR34","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s11109-018-09523-8","volume":"42","author":"RS Gutting","year":"2019","unstructured":"Gutting, R.S.: Contentious activities, disrespectful protesters: effect of protest context on protest support and mobilization across ideology and authoritarianism. Polit. Behav. 42, 865\u2013890 (2019)","journal-title":"Polit. Behav."},{"issue":"5","key":"7_CR35","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1177\/0963721415595023","volume":"24","author":"D Matsumoto","year":"2015","unstructured":"Matsumoto, D., et al.: The role of intergroup emotions in political violence. Curr. Direct. Psychol. Sci. 24(5), 369\u2013373 (2015)","journal-title":"Curr. Direct. Psychol. Sci."},{"key":"7_CR36","unstructured":"Troost, D.: Emotions of Protest. Emotions in Politics. Palgrave Studies in Political Psychology series, Palgrave Macmillan, London (2013)"},{"key":"7_CR37","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-28099-8_1262-1","volume-title":"Encyclopedia of Personality and Individual Differences","author":"BA Saunders","year":"2017","unstructured":"Saunders, B.A., Ngo, J.: The right-wing authoritarianism scale. In: Zeigler-Hill, V., Shackelford, T. (eds.) Encyclopedia of Personality and Individual Differences, pp. 71\u201376. Springer, Cham. (2017). https:\/\/doi.org\/10.1007\/978-3-319-28099-8_1262-1"},{"issue":"2","key":"7_CR38","doi-asserted-by":"publisher","first-page":"571","DOI":"10.5964\/jspp.v4i2.168","volume":"4","author":"P Dunwoody","year":"2016","unstructured":"Dunwoody, P., Funke, F.: The aggression-submission-conventionalism scale: testing a new three factor measure of authoritarianism. J. Social Polit. Psychol. 4(2), 571\u2013600 (2016)","journal-title":"J. Social Polit. Psychol."},{"key":"7_CR39","unstructured":"Cullen, P.J., Reichborn-Kjennerud, E.: MCDC Countering Hybrid Warfare Project: Understanding Hybrid Warfare. Multinational Capability Development Campaign (2017)"},{"key":"7_CR40","unstructured":"Jeffery, A.: Scenes of protests across the country demanding states reopen the economy amid coronavirus pandemic, CNBC. Accessed 18 Apr 2020"},{"key":"7_CR41","unstructured":"Hundreds protest COVID-19 orders at Texas Capitol, FOX4News Homepage. https:\/\/bit.ly\/38IA1rl, Accessed 14 Jan 2021"},{"key":"7_CR42","unstructured":"Hutchinson, B.: Operation Gridlock\u2019: Convoy in Michigan\u2019s capital protests stay-at-home orders, ABCNews. Accessed 16 Apr 2020"},{"key":"7_CR43","volume-title":"English Verb Classes and Alternations: A Preliminary Investigation","author":"B Levin","year":"1993","unstructured":"Levin, B.: English Verb Classes and Alternations: A Preliminary Investigation. University of Chicago Press, Chicago (1993)"},{"key":"7_CR44","volume-title":"Open Source Indicators Program Handbook","author":"T Reed","year":"2017","unstructured":"Reed, T., et al.: Open Source Indicators Program Handbook. The MITRE Corporation, USA (2017)"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77961-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T22:05:25Z","timestamp":1749506725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77961-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030779603","9783030779610"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77961-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krakow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"156","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"212 full and 43 short papers were selected from 479 submissions to the workshops\/ thematic tracks. The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}