{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:46:08Z","timestamp":1758635168594},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319595689"},{"type":"electronic","value":"9783319595696"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59569-6_40","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T09:38:19Z","timestamp":1496309899000},"page":"320-325","source":"Crossref","is-referenced-by-count":13,"title":["Identifying Right-Wing Extremism in German Twitter Profiles: A Classification Approach"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Hartung","sequence":"first","affiliation":[]},{"given":"Roman","family":"Klinger","sequence":"additional","affiliation":[]},{"given":"Franziska","family":"Schmidtke","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Vogel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"40_CR1","unstructured":"Amadeu-Antonio-Stiftung: Rechtsextreme und menschenverachtende Ph\u00e4nomene im Social Web (2016). \nhttps:\/\/www.amadeu-antonio-stiftung.de\/w\/files\/pdfs\/monitoringbericht-2015.pdf"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Ashcroft, M., Fisher, A., Kaati, L., Omer, E., Prucha, N.: Detecting jihadist messages on twitter. In: Proceedings of EISIC (2015)","DOI":"10.1109\/EISIC.2015.27"},{"key":"40_CR3","unstructured":"Berger, J.: Nazis vs. ISIS on Twitter. A Comparative Study of White Nationalist and ISIS Online Social Media Networks. Tech. rep., Center for Cyber and Homeland Security, George Washington University, Washington, D.C. (2016)"},{"key":"40_CR4","unstructured":"Blanquart, G., Cook, D.: Twitter influence and cumulative perceptions of extremist support. a case study of geert wilders. In: Proceedings of ACTC (2013)"},{"key":"40_CR5","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"40_CR6","unstructured":"Ferrara, E., Wang, W.Q., Varol, O., Flammini, A., Galstyan, A.: Predicting online extremism, content adopters, and interaction reciprocity (2016). arxiv: \nhttps:\/\/arxiv.org\/abs\/1605.00659"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Kaati, L., Omer, E., Prucha, N., Shrestha, A.: Detecting multipliers of jihadism on twitter. In: IEEE International Conference on Data Mining Workshop (ICDMW) (2015)","DOI":"10.1109\/ICDMW.2015.9"},{"key":"40_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"40_CR9","volume-title":"Politics and the Twitter Revolution","author":"J Parmelee","year":"2013","unstructured":"Parmelee, J., Bichars, S.: Politics and the Twitter Revolution. Lexington Books, Landham, MD (2013)"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Plutchik, R.: The nature of emotions. American Scientist (2001)","DOI":"10.1511\/2001.4.344"},{"key":"40_CR11","unstructured":"Quent, M., Salheiser, A., Schmidtke, F.: Gef\u00e4hrdungen der demokratischen Kultur in Th\u00fcringen (2016). \nhttp:\/\/www.denkbunt-thueringen.de\/wp-content\/uploads\/2016\/02\/Gef%C3%A4hrdungsanalyse.pdf"},{"issue":"1","key":"40_CR12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s13388-014-0005-5","volume":"3","author":"JR Scanlon","year":"2014","unstructured":"Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Secur. Inform. 3(1), 5 (2014)","journal-title":"Secur. Inform."},{"key":"40_CR13","volume-title":"Rechtsextremismus im Wandel","author":"R St\u00f6ss","year":"2010","unstructured":"St\u00f6ss, R.: Rechtsextremismus im Wandel. Friedrich-Ebert-Stiftung, Berlin (2010)"},{"key":"40_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-37256-8_11","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"J Suttles","year":"2013","unstructured":"Suttles, J., Ide, N.: Distant supervision for emotion classification with discrete binary values. In: Gelbukh, A. (ed.) CICLing 2013. LNCS, vol. 7817, pp. 121\u2013136. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-37256-8_11"},{"key":"40_CR15","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-94-007-7293-9_11","volume-title":"The 3rd International Workshop on Intelligent Data Analysis and Management","author":"IH Ting","year":"2013","unstructured":"Ting, I.H., Chi, H.M., Wu, J.S., Wang, S.L.: An approach for hate groups detection in facebook. In: Uden, L., Wang, L., Hong, T.P., Yang, H.C., Ting, I.H. (eds.) The 3rd International Workshop on Intelligent Data Analysis and Management, pp. 101\u2013106. Springer, Netherlands (2013). doi:\n10.1007\/978-94-007-7293-9_11"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Wei, Y., Singh, L., Martin, S.: Identification of extremism on twitter. In: International Conference on Advances in Social Networks Analysis and Mining (2016)","DOI":"10.1109\/ASONAM.2016.7752398"}],"container-title":["Lecture Notes in Computer Science","Natural Language Processing and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59569-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T09:51:01Z","timestamp":1496310661000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59569-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319595689","9783319595696"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59569-6_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}