{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:37:17Z","timestamp":1743147437601,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319574530"},{"type":"electronic","value":"9783319574547"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57454-7_26","type":"book-chapter","created":{"date-parts":[[2017,4,22]],"date-time":"2017-04-22T12:09:31Z","timestamp":1492862971000},"page":"330-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Using Network Flows to Identify Users Sharing Extremist Content on Social Media"],"prefix":"10.1007","author":[{"given":"Yifang","family":"Wei","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,23]]},"reference":[{"key":"26_CR1","unstructured":"Stanford corenlp sentiment analyzer. http:\/\/stanfordnlp.github.io\/CoreNLP\/sentiment.html"},{"key":"26_CR2","unstructured":"Stromfront. https:\/\/www.stormfront.org\/forum\/"},{"key":"26_CR3","unstructured":"Vader sentiment analysis. https:\/\/github.com\/cjhutto\/vaderSentiment"},{"issue":"5","key":"26_CR4","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67\u201375 (2005)","journal-title":"IEEE Intell. Syst."},{"key":"26_CR5","unstructured":"Agarwal, S., Sureka, A.: Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats. CoRR, abs\/1511.06858 (2015)"},{"key":"26_CR6","unstructured":"Berger, J., Morgan, J.: The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter. Brookings Proj. US Relat. Islamic World 3(20) (2015)"},{"key":"26_CR7","unstructured":"Berger, J., Strathearn, B.: Who matters online: measuring influence, evaluating content and countering violent extremism in online social networks (2013)"},{"key":"26_CR8","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-319-01285-8_11","volume-title":"Computational Models of Complex Systems","author":"M Bouchard","year":"2014","unstructured":"Bouchard, M., Joffres, K., Frank, R.: Preliminary analytical considerations in designing a terrorism and extremism online network extractor. In: Mago, V.K., Dabbaghian, V. (eds.) Computational Models of Complex Systems. ISRL, vol. 53, pp. 171\u2013184. Springer, Cham (2014). doi:10.1007\/978-3-319-01285-8_11"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Buntain, C., Golbeck, J., Liu, B., LaFree, G.: Evaluating public response to the Boston Marathon bombing and other acts of terrorism through Twitter. In: ICWSM, pp. 555\u2013558 (2016)","DOI":"10.1609\/icwsm.v10i1.14774"},{"issue":"1","key":"26_CR10","first-page":"1","volume":"4","author":"P Burnap","year":"2014","unstructured":"Burnap, P., Williams, M.L., Sloan, L., et al.: Tweeting the terror: modelling the social media reaction to the woolwich terrorist attack. Soc. Netw. Anal. Mining 4(1), 1\u201314 (2014)","journal-title":"Soc. Netw. Anal. Mining"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Chakrabarti, S.: Dynamic personalized pagerank in entity-relation graphs. In: WWW, pp. 571\u2013580. ACM (2007)","DOI":"10.1145\/1242572.1242650"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Chatfield, A.T., Reddick, C.G., Brajawidagda, U.: Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided Twitter networks. In: dg.o, pp. 239\u2013249. ACM (2015)","DOI":"10.1145\/2757401.2757408"},{"key":"26_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"C Manning","year":"2008","unstructured":"Manning, C., Raghavan, P., Schtze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Dahlin, J., Johansson, F., Kaati, L., Martenson, C., Svenson, P.: Combining entity matching techniques for detecting extremist behavior on discussion boards. In: ASONAM, pp. 850\u2013857. IEEE (2012)","DOI":"10.1109\/ASONAM.2012.154"},{"issue":"4","key":"26_CR15","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1080\/1478601X.2012.704723","volume":"25","author":"WC Hale","year":"2012","unstructured":"Hale, W.C.: Extremism on the world wide web: a research review. Crim. Justice Stud. 25(4), 343\u2013356 (2012)","journal-title":"Crim. Justice Stud."},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Mei, J., Frank, R.: Sentiment crawling: extremist content collection through a sentiment analysis guided web-crawler. In: ASONAM. ACM (2015)","DOI":"10.1145\/2808797.2809373"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Rowe, M., Saif, H.: Mining pro-isis radicalisation signals from social media users. In: ICWSM, pp. 329\u2013338 (2016)","DOI":"10.1609\/icwsm.v10i1.14716"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Scrivens, R., Davies, G., Frank, R., Mei, J.: Sentiment-based identification of radical authors. In: ICDMW, pp. 979\u2013986. IEEE (2015)","DOI":"10.1109\/ICDMW.2015.64"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Wei, Y., Singh, L., Martin, S.: Identification of extremism on Twitter. In: Social Network Analysis Surveillance Technologies (SNAT) at ASONAM (2016)","DOI":"10.1109\/ASONAM.2016.7752398"},{"issue":"5","key":"26_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MIS.2005.96","volume":"20","author":"Y Zhou","year":"2005","unstructured":"Zhou, Y., Reid, E., Qin, J., Chen, H., Lai, G.: Us domestic extremist groups on the web: link and content analysis. IEEE Intell. Syst. 20(5), 44\u201351 (2005)","journal-title":"IEEE Intell. Syst."}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57454-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:15:36Z","timestamp":1710346536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-57454-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319574530","9783319574547"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57454-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"23 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/pakdd2017.snu.ac.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}