{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:13:44Z","timestamp":1725862424636},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319429106"},{"type":"electronic","value":"9783319429113"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42911-3_64","type":"book-chapter","created":{"date-parts":[[2016,8,9]],"date-time":"2016-08-09T00:01:34Z","timestamp":1470700894000},"page":"763-770","source":"Crossref","is-referenced-by-count":2,"title":["Towards Exposing Cyberstalkers in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Jiamou","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yingying","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,10]]},"reference":[{"key":"64_CR1","volume-title":"A Practical Guide To Coping With Cyberstalking","author":"H Al-Khateeb","year":"2011","unstructured":"Al-Khateeb, H., Alhaboby, Z., Barnes, J., Brown, A., Brown, R., Cobley, P., Gilbert, J., McNamara, N., Short, E., Shukla, M.: A Practical Guide To Coping With Cyberstalking, 1st edn. National Centre for Cyberstalking Research (NCCR), University of Bedfordshire, Luton (2011). Observation of strains. Infect Dis Ther. 3(1), 35\u201343. Andrews UK Limited (2015)","edition":"1"},{"key":"64_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511791383","volume-title":"Dynamical Processes on Complex Networks","author":"A Barrat","year":"2008","unstructured":"Barrat, A., Barthelemy, M., Vespignani, A.: Dynamical Processes on Complex Networks. Cambridge University Press, Cambridge (2008)"},{"key":"64_CR3","first-page":"31","volume":"139","author":"P Bocij","year":"2002","unstructured":"Bocij, P., McFarlane, L.: Online harassment: towards a definition of cyberstalking. Prison Serv. J. 139, 31\u201338 (2002)","journal-title":"Prison Serv. J."},{"issue":"1","key":"64_CR4","first-page":"32","volume":"140","author":"P Bocij","year":"2002","unstructured":"Bocij, P., McFarlane, L.: Cyber stalking: genuine problem or public hysteria? Prison Services J. 140(1), 32\u201335 (2002)","journal-title":"Prison Services J."},{"issue":"4","key":"64_CR5","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M Fire","year":"2014","unstructured":"Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019\u20132036 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"64_CR6","doi-asserted-by":"crossref","unstructured":"Liu, J., Moskvina, A.: Hierarchies, ties and power in organisational networks: model and analysis. In: Proceedings of ASONAM, pp. 202\u2013209 (2015)","DOI":"10.1145\/2808797.2808874"},{"issue":"1","key":"64_CR7","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/S0193-953X(05)70061-7","volume":"22","author":"J Meloy","year":"1999","unstructured":"Meloy, J.: Stalking. An old behavior, a new crime. Psychiatr. Clin. North Am. 22(1), 85\u201399 (1999)","journal-title":"Psychiatr. Clin. North Am."},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Mislove, A., Viswanath, B., Gummadi, K., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, WSDM 2010, pp. 251\u2013260 (2010)","DOI":"10.1145\/1718487.1718519"},{"key":"64_CR9","unstructured":"Moskvina, A., Liu, J.: How to build your network? a structural analysis. In: IJCAI, 2016 to appear"},{"issue":"4","key":"64_CR10","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1080\/15564880903227644","volume":"4","author":"N Parsons-Pollard","year":"2009","unstructured":"Parsons-Pollard, N., Moriarty, L.: Cyberstalking: utilizing what we do know. Vict. Offenders: Int. J. Evid. Based Res. Policy Pract. 4(4), 435\u2013441 (2009)","journal-title":"Vict. Offenders: Int. J. Evid. Based Res. Policy Pract."},{"issue":"2","key":"64_CR11","first-page":"180","volume":"1","author":"M Pittaro","year":"2007","unstructured":"Pittaro, M.: Cyber stalking: an analysis of online harassment and intimidation. Int. J. Cyber Criminol. (IJCC) 1(2), 180\u2013197 (2007)","journal-title":"Int. J. Cyber Criminol. (IJCC)"},{"key":"64_CR12","unstructured":"Reno, J.: Cyber stalking: A new challenge for law enforcement and industry. United States Department of Justice (1999)"}],"container-title":["Lecture Notes in Computer Science","PRICAI 2016: Trends in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42911-3_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:14:37Z","timestamp":1498320877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42911-3_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319429106","9783319429113"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42911-3_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}