{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:17:09Z","timestamp":1743153429717,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031480560"},{"type":"electronic","value":"9783031480577"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48057-7_27","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:01:30Z","timestamp":1700892090000},"page":"435-444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the\u00a0Vulnerability of\u00a0Military Personnel Through Open Source Intelligence: A Case Study of\u00a0Lithuanian Armed Forces"],"prefix":"10.1007","author":[{"given":"Paulius","family":"Malakauskis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8852-8605","authenticated-orcid":false,"given":"Au\u0161rius","family":"Juozapavi\u010dius","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"27_CR1","unstructured":"Army social media guide. U.S. Army, 13 February 2023. https:\/\/www.army.mil\/SOCIALMEDIA\/"},{"key":"27_CR2","unstructured":"Using social media - a guide for military personnel. Ministry of Defence, U.K., 13 February 2023. https:\/\/www.gov.uk\/government\/publications\/using-social-media-a-guide-for-military-personnel"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Akhgar, B.: OSINT as an integral part of the national security apparatus. Open Source Intelligence Investigation: From Strategy to Implementation, pp. 3\u20139 (2016)","DOI":"10.1007\/978-3-319-47671-1_1"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"B\u00e4r, D., Calderon, F., Lawlor, M., Licklederer, S., Totzauer, M., Feuerriegel, S.: Analyzing social media activities at Bellingcat (2022). arXiv preprint arXiv:2209.10271","DOI":"10.1145\/3578503.3583604"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1365\/s43439-021-00042-7","volume":"2","author":"I B\u00f6hm","year":"2021","unstructured":"B\u00f6hm, I., Lolagar, S.: Open source intelligence: introduction, legal, and ethical considerations. Int. Cybersecur. Law Rev. 2, 317\u2013337 (2021). https:\/\/doi.org\/10.1365\/s43439-021-00042-7","journal-title":"Int. Cybersecur. Law Rev."},{"key":"27_CR6","unstructured":"Dixon, S.: Number of global social network users 2017\u20132027. Statista, 13 February 2023. https:\/\/www.statista.com\/markets\/424\/topic\/540\/social-media-user-generated-content"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Dressler, J.C., Bronk, C., Wallach, D.S.: Exploiting military OpSec through open-source vulnerabilities. In: 2015 IEEE Military Communications Conference. MILCOM 2015, pp. 450\u2013458. IEEE (2015). https:\/\/doi.org\/10.1109\/MILCOM.2015.7357484","DOI":"10.1109\/MILCOM.2015.7357484"},{"key":"27_CR8","unstructured":"Emonet, F.: To post or not to post. NCO J. (2020). https:\/\/www.armyupress.army.mil\/Portals\/7\/nco-journal\/images\/2020\/June\/Social-Media\/Social-Media.pdf"},{"issue":"5","key":"27_CR9","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.bushor.2018.02.001","volume":"61","author":"DR Hayes","year":"2018","unstructured":"Hayes, D.R., Cappa, F.: Open-source intelligence for risk assessment. Bus. Horiz. 61(5), 689\u2013697 (2018)","journal-title":"Bus. Horiz."},{"issue":"5","key":"27_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.35467\/sdq\/131759","volume":"32","author":"CA Kozera","year":"2020","unstructured":"Kozera, C.A., et al.: Fitness OSINT: identifying and tracking military and security personnel with fitness applications for intelligence gathering purposes. Secur. Defence Q. 32(5), 41\u201352 (2020)","journal-title":"Secur. Defence Q."},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Lakomy, M.: Assessing the potential of OSINT on the internet in supporting military operations. Bezpiecze\u0144stwo. Teoria i Praktyka 3(XLVIII) (2022). https:\/\/doi.org\/10.48269\/2451-0718-btip-2022-3-022","DOI":"10.48269\/2451-0718-btip-2022-3-022"},{"key":"27_CR12","unstructured":"Laso\u0144, M., et al.: The total defence 21st century.com - building a resilient society. Bezpiecze\u0144stwo. Teoria i Praktyka 3(XLVIII) (2022)"},{"issue":"8","key":"27_CR13","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1177\/0163443716646173","volume":"38","author":"S Maltby","year":"2016","unstructured":"Maltby, S., Thornham, H.: The digital mundane: social media and the military. Media Cult. Soc. 38(8), 1153\u20131168 (2016). https:\/\/doi.org\/10.1177\/0163443716646173","journal-title":"Media Cult. Soc."},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.cose.2018.10.009","volume":"81","author":"H Pellet","year":"2019","unstructured":"Pellet, H., Shiaeles, S., Stavrou, S.: Localising social network users and profiling their movement. Comput. Secur. 81, 49\u201357 (2019)","journal-title":"Comput. Secur."},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-030-86890-1_24","volume-title":"Information and Communications Security","author":"T Riebe","year":"2021","unstructured":"Riebe, T., et al.: CySecAlert: an alert generation system for cyber security events using open source intelligence data. In: Gao, D., Li, Q., Guan, X., Liao, X. (eds.) ICICS 2021. LNCS, vol. 12918, pp. 429\u2013446. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86890-1_24"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Tabatabaei, F., Wells, D.: OSINT in the context of cyber-security. Open Source Intelligence Investigation: From Strategy to Implementation, pp. 213\u2013231 (2016)","DOI":"10.1007\/978-3-319-47671-1_14"},{"key":"27_CR17","doi-asserted-by":"publisher","unstructured":"Williams, H.J., Blum, I.: Defining second generation open source intelligence (OSINT) for the defense enterprise. Technical report, Rand Corporation (2018). https:\/\/doi.org\/10.7249\/rr1964","DOI":"10.7249\/rr1964"}],"container-title":["Lecture Notes in Computer Science","HCI International 2023 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48057-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:05:51Z","timestamp":1700892351000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48057-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031480560","9783031480577"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48057-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}