{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:56Z","timestamp":1725520676877},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_7","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T07:31:09Z","timestamp":1224487869000},"page":"53-60","source":"Crossref","is-referenced-by-count":9,"title":["Virtual Weapons for Real Wars: Text Mining for National Security"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Zanasi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Lisse, W.: The Economics of Information and the Internet. Competitive Intelligence Review\u00a09(4) (1998)","key":"7_CR1","DOI":"10.1002\/(SICI)1520-6386(199810\/12)9:4<48::AID-CIR8>3.0.CO;2-W"},{"key":"7_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511754470","volume-title":"Reshaping National Intelligence in an Age of Information","author":"G.F. Treverton","year":"2001","unstructured":"Treverton, G.F.: Reshaping National Intelligence in an Age of Information. Cambridge University Press, Cambridge (2001)"},{"unstructured":"Ronfeldt, D., Arquilla, J.: The Advent of Netwar \u2013Rand Corporation (1996)","key":"7_CR3"},{"unstructured":"Goldfinger, C.: Travail et hors Travail: vers une societe fluide. In: Jacob, O. (ed.) (1998)","key":"7_CR4"},{"doi-asserted-by":"crossref","unstructured":"Kohlmann, E.: The Real Online Terrorist Threat \u2013 Foreign Affairs (September\/October 2006)","key":"7_CR5","DOI":"10.2307\/20032074"},{"unstructured":"Mueller, J.: Is There Still a Terrorist Threat? \u2013 Foreign Affairs (September\/ October 2006)","key":"7_CR6"},{"unstructured":"Riedel, B.: Al Qaeda Strikes Back \u2013 Foreign Affairs (May\/June 2007)","key":"7_CR7"},{"volume-title":"Text Mining and its Applications to Intelligence, CRM and Knowledge Management","year":"2007","unstructured":"Zanasi, A. (ed.): Text Mining and its Applications to Intelligence, CRM and Knowledge Management. WIT Press, Southampton (2007)","key":"7_CR8"},{"unstructured":"Bobbitt, P.: The Shield of Achilles: War, Peace, and the Course of History, Knopf (2002)","key":"7_CR9"},{"unstructured":"Zanasi, A.: New forms of war, new forms of Intelligence: Text Mining. In: ITNS Conference, Riyadh (2007)","key":"7_CR10"},{"unstructured":"Steinberg, J.: In Protecting the Homeland 2006\/2007 - The Brookings Institution (2006)","key":"7_CR11"},{"key":"7_CR12","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7105.001.0001","volume-title":"The Virtual Community","author":"H. Rheingold","year":"2000","unstructured":"Rheingold, H.: The Virtual Community. MIT Press, Cambridge (2000)"},{"unstructured":"Feldman, S.: Insider Trading and More, IDC Report, Doc#28651 (December 2002)","key":"7_CR13"},{"doi-asserted-by":"crossref","unstructured":"de Laat, M.: Network and content analysis in an online community discourse. University of Nijmegen (2002)","key":"7_CR14","DOI":"10.3115\/1658616.1658755"},{"unstructured":"Benedetti, A.: Il linguaggio delle nuove Brigate Rosse, Erga Edizioni (2002)","key":"7_CR15"},{"key":"7_CR16","volume-title":"Competitive Intelligence Thru Data Mining Public Sources - Competitive Intelligence Review","author":"A. Zanasi","year":"1998","unstructured":"Zanasi, A.: Competitive Intelligence Thru Data Mining Public Sources - Competitive Intelligence Review, vol.\u00a09(1). John Wiley & Sons, Inc., Chichester (1998)"},{"unstructured":"The Other War, The Economist March 26 (2003)","key":"7_CR17"},{"unstructured":"Campbell, D.: - World under Watch, Interception Capabilities in the 21st Century \u2013 ZDNet.co (2001) (updated version of Interception Capabilities 2000, A report to European Parlement - 1999)","key":"7_CR18"},{"unstructured":"Zanasi, A.: Email, chatlines, newsgroups: a continuous opinion surveys source thanks to text mining. In: Excellence in Int\u2019l Research 2003 - ESOMAR (Nl) (2003)","key":"7_CR19"},{"unstructured":"Jones, C.W.: Online Impression Management. University of California paper (July 2005)","key":"7_CR20"},{"key":"7_CR21","doi-asserted-by":"crossref","DOI":"10.4135\/9781849209373","volume-title":"Introducing Social Networks","author":"A. Degenne","year":"1999","unstructured":"Degenne, A., Forse, M.: Introducing Social Networks. Sage Publications, London (1999)"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:57:12Z","timestamp":1619510232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_7","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}