{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:06:23Z","timestamp":1757617583328,"version":"3.44.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031818202"},{"type":"electronic","value":"9783031818219"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81821-9_4","type":"book-chapter","created":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T09:16:46Z","timestamp":1740993406000},"page":"55-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DisEvD: A Benchmark Dataset for\u00a0Disruptive Event Identification from\u00a0Online Social Network"],"prefix":"10.1007","author":[{"given":"Aditi","family":"Seetha","sequence":"first","affiliation":[]},{"given":"Jitendra","family":"Parmar","sequence":"additional","affiliation":[]},{"given":"Satyendra Singh","family":"Chouhan","sequence":"additional","affiliation":[]},{"given":"Emmanuel S.","family":"Pilli","sequence":"additional","affiliation":[]},{"given":"Abhinav","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Alsaedi, N., Burnap, P.: Feature extraction and analysis for identifying disruptive events from social media. In: Proceedings of the IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1495\u20131502 (2015)","DOI":"10.1145\/2808797.2808867"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2996183","volume":"17","author":"N Alsaedi","year":"2017","unstructured":"Alsaedi, N., Burnap, P., Rana, O.: Can we predict a riot? Disruptive event detection using twitter. ACM Trans. Internet Technol. (TOIT) 17(2), 1\u201326 (2017)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"1","key":"4_CR3","first-page":"56","volume":"5","author":"AR Hananto","year":"2022","unstructured":"Hananto, A.R., Rahayu, S.A., Hariguna, T.: Covid-19 vaccination: a retrospective observation and sentiment analysis of the twitter social media platform in Indonesia. Int. J. Inform. Inf. Syst. 5(1), 56\u201368 (2022)","journal-title":"Int. J. Inform. Inf. Syst."},{"key":"4_CR4","unstructured":"Das, M.: Social media posts trigger seven communal riots in a month in West Bengal (2020)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"McMinn, A.J., Moshfeghi, Y., Jose, J.M.: Building a large-scale corpus for evaluating event detection on twitter. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, pp. 409\u2013418 (2013)","DOI":"10.1145\/2505515.2505695"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Maven: a massive general domain event detection dataset. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1652\u20131671 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.129"},{"issue":"6","key":"4_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.3390\/data7060069","volume":"7","author":"N Alnazzawi","year":"2022","unstructured":"Alnazzawi, N.: Using twitter to detect hate crimes and their motivations: the hatemotiv corpus. Data 7(6), 69 (2022)","journal-title":"Data"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Giorgi, S., et al.: Twitter corpus of the# blacklivesmatter movement and counter protests: 2013 to 2021. In: Proceedings of the International AAAI Conference on Web and Social Media, vol.\u00a016, pp. 1228\u20131235 (2022)","DOI":"10.1609\/icwsm.v16i1.19373"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Wang, S., Giridhar, P., Kaplan, L., Abdelzaher, T.: Unsupervised event tracking by integrating twitter and instagram. In: Proceedings of the 2nd International Workshop on Social Sensing, pp. 81\u201386 (2017)","DOI":"10.1145\/3055601.3055615"},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/ijgi7040150","volume":"7","author":"Y Huang","year":"2018","unstructured":"Huang, Y., Li, Y., Shan, J.: Spatial-temporal event detection from geo-tagged tweets. ISPRS Int. J. Geo Inf. 7(4), 150 (2018)","journal-title":"ISPRS Int. J. Geo Inf."},{"key":"4_CR11","unstructured":"Modha, S., Majumder, P., Mandl, T.: Filtering aggression from the multilingual social media feed. In: Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018), pp. 199\u2013207 (2018)"},{"key":"4_CR12","unstructured":"Morabia, K., Murthy, N.L.B., Malapati, A., Samant, S.: Sedtwik: segmentation-based event detection from tweets using wikipedia. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop, pp. 77\u201385 (2019)"},{"issue":"2","key":"4_CR13","first-page":"508","volume":"8","author":"Z Shah","year":"2019","unstructured":"Shah, Z., Dunn, A.G.: Event detection on twitter by mapping unexpected changes in streaming data into a spatiotemporal lattice. IEEE Trans. Big Data 8(2), 508\u2013522 (2019)","journal-title":"IEEE Trans. Big Data"},{"issue":"5","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-019-8201-6","volume":"14","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Peng, H., Li, J., Song, Y., Li, X.: Event detection and evolution in multi-lingual social streams. Front. Comput. Sci. 14(5), 1\u201315 (2020)","journal-title":"Front. Comput. Sci."},{"key":"4_CR15","unstructured":"Alsmadi, I., O\u2019Brien, M.: Event detection in twitter: a content and time-based analysis. arXiv preprint arXiv:2111.05274 (2021)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Chen, E., Ferrara, E.: Tweets in time of conflict: a public dataset tracking the twitter discourse on the war between Ukraine and Russia. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 17, pp. 1006\u20131013 (2023)","DOI":"10.1609\/icwsm.v17i1.22208"},{"issue":"3","key":"4_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103340","volume":"60","author":"R Suwaileh","year":"2023","unstructured":"Suwaileh, R., Elsayed, T., Imran, M.: IDRISI-RE: a generalizable dataset with benchmarks for location mention recognition on disaster tweets. Inf. Process. Manag. 60(3), 103340 (2023)","journal-title":"Inf. Process. Manag."},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.3390\/make5010003","volume":"5","author":"AM Alduailaj","year":"2023","unstructured":"Alduailaj, A.M., Belghith, A.: Detecting Arabic cyberbullying tweets using machine learning. Mach. Learn. Knowl. Extr. 5(1), 29\u201342 (2023)","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Ahmad, K., Conci, N., Boato, G., De\u00a0Natale, F.G.B.: USED: a large-scale social event detection dataset. In: Proceedings of the 7th International Conference on Multimedia Systems, pp. 1\u20136 (2016)","DOI":"10.1145\/2910017.2910624"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"George, Y., Karunasekera, S., Harwood, A., Li, K.H.: Spatio-temporal event detection using poisson model and quad-tree on geotagged social media. In: Proceedings of IEEE International Conference on Big Data (Big Data), pp. 2247\u20132256. IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9006284"},{"issue":"9","key":"4_CR21","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1080\/13658816.2020.1719495","volume":"34","author":"A Ristea","year":"2020","unstructured":"Ristea, A., Al Boni, M., Resch, B., Gerber, M.S., Leitner, M.: Spatial crime distribution and prediction for sporting events using social media. Int. J. Geogr. Inf. Sci. 34(9), 1708\u20131739 (2020)","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"4_CR22","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"issue":"1","key":"4_CR23","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.aci.2018.08.003","volume":"17","author":"A Tharwat","year":"2020","unstructured":"Tharwat, A.: Classification assessment methods. Appl. Comput. Inform. 17(1), 168\u2013192 (2020)","journal-title":"Appl. Comput. Inform."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Blondel, V.D., Guillaume, J.-L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), P10008 (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"issue":"1","key":"4_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.90.012811","volume":"90","author":"S Sobolevsky","year":"2014","unstructured":"Sobolevsky, S., Campari, R., Belyi, A., Ratti, C.: General optimization technique for high-quality community detection in complex networks. Phys. Rev. E 90(1), 012811 (2014)","journal-title":"Phys. Rev. E"},{"issue":"12","key":"4_CR26","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. 99(12), 7821\u20137826 (2002)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"3\u20135","key":"4_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3\u20135), 75\u2013174 (2010)","journal-title":"Phys. Rep."},{"issue":"1","key":"4_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-019-41695-z","volume":"9","author":"VA Traag","year":"2019","unstructured":"Traag, V.A., Waltman, L., Van Eck, N.J.: From Louvain to Leiden: guaranteeing well-connected communities. Sci. Rep. 9(1), 1\u201312 (2019)","journal-title":"Sci. Rep."},{"key":"4_CR29","unstructured":"Rosenberg, A., Hirschberg, J.: V-measure: a conditional entropy-based external cluster evaluation measure. In: Proceedings of the Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp. 410\u2013420 (2007)"},{"issue":"2","key":"4_CR30","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TNN.2008.2005601","volume":"20","author":"PA Est\u00e9vez","year":"2009","unstructured":"Est\u00e9vez, P.A., Tesmer, M., Perez, C.A., Zurada, J.M.: Normalized mutual information feature selection. IEEE Trans. Neural Netw. 20(2), 189\u2013201 (2009)","journal-title":"IEEE Trans. Neural Netw."},{"key":"4_CR31","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, 53\u201365 (1987)","journal-title":"J. Comput. Appl. Math."}],"container-title":["Lecture Notes in Computer Science","Big Data and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81821-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:59:02Z","timestamp":1757141942000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81821-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031818202","9783031818219"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81821-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"4 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no potential competing interests with respect to the research, authorship, and\/or publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"BDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bigda2024a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scis.uohyd.ac.in\/~bda2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}