{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:47:02Z","timestamp":1742928422290,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642323836"},{"type":"electronic","value":"9783642323843"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-32384-3_35","type":"book-chapter","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T06:31:01Z","timestamp":1345098661000},"page":"291-302","source":"Crossref","is-referenced-by-count":0,"title":["Online Social Networks: Emerging Security and Safety Applications"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Marco","family":"Manso","sequence":"additional","affiliation":[]},{"given":"Damian","family":"Puchalski","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Samp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"The 2011 Social Media Consumer Trend and Benchmark Report, Experian Information Solutions (2011)"},{"key":"35_CR2","unstructured":"http:\/\/www.simplyzesty.com\/social-media\/twitter\/top-10-most-tweeted-about-events-ever-so-far\/\n                     (last visited March 12, 2012)"},{"key":"35_CR3","unstructured":"http:\/\/blog.twitter.com\/2011\/06\/global-pulse.html\n                     (last visited March 12, 2012)"},{"key":"35_CR4","unstructured":"Internet Standard, Social Media 2012. Raport, II Edycja (2012)"},{"key":"35_CR5","unstructured":"Internet Standard, Social Media 2010. Raport, I Edycja (2010)"},{"key":"35_CR6","unstructured":"National Policing Improvement Agency, Engage: Digital and Social Media for the Police Service, NPIA, London (2010)"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Crump, J.: What Are the Police Doing on Twitter? Social Media, the Police and the Public Policy and Internet 3(4) Article 7, (2011)","DOI":"10.2202\/1944-2866.1130"},{"key":"35_CR8","unstructured":"Pring, C.: Using Social Media for Crisis Management (2011)"},{"key":"35_CR9","unstructured":"Birgfeld, B.: Why Crisis Management and Social Media Must Co-exist (2010)"},{"key":"35_CR10","unstructured":"http:\/\/www.alert24.pl\/alert24\/0,0.html"},{"key":"35_CR11","unstructured":"http:\/\/kontakt24.tvn.pl\/"},{"key":"35_CR12","unstructured":"http:\/\/tvp.info\/modul-specjalny\/tvp-info-jako-jedyna-telewizja-pokazala-ladowanie-boeinga-na-zywo-zobacz-je-u-nas\/5596559\n                     (last visited March 12, 2012)"},{"key":"35_CR13","unstructured":"http:\/\/kontakt24.tvn.pl\/temat,wyladowal-szczesliwie-eskortowaly-go-f-16,151146.html\n                     (last visited March 12, 2012)"},{"key":"35_CR14","unstructured":"http:\/\/www.alert24.pl\/alert24\/1,84880,10608235,Awaria-czarterowego-boeinga--Zawrocil-na-lotnisko.html\n                     (last visited March 12, 2012)"},{"key":"35_CR15","unstructured":"http:\/\/wiadomosci.gazeta.pl\/wiadomosci\/1,114873,10608235.html\n                     (last visited March 12, 2012)"},{"key":"35_CR16","unstructured":"http:\/\/uk.reuters.com\/article\/2011\/11\/11\/uk-poland-clashes-idUKTRE7AA5BQ20111111\n                     (last visited March 12, 2012)"},{"key":"35_CR17","unstructured":"http:\/\/www.tvn24.pl\/12690,1724324,0,2,policja-wycenila-straty-po-zadymach-11-listopada-w-stolicy,wiadomosc.html\n                    , (last visited March 12, 2012)"},{"key":"35_CR18","unstructured":"http:\/\/wiadomosci.gazeta.pl\/wiadomosci\/1,114873,10668247,Poznan--Nie-dopuscimy-powtorki-11-listopada-w-Warszawie-.html\n                     (last visited March 12, 2012)"},{"key":"35_CR19","unstructured":"http:\/\/www.tvn24.pl\/12690,1724857,0,1,marsz-rownosci-i-pikieta-onr-w-poznaniu,wiadomosc.html\n                     (last visited March 12, 2012)"},{"key":"35_CR20","unstructured":"Sayers, M.: Social Media and the Law: Police Explore New Ways to Fight Crime (2011)"},{"key":"35_CR21","unstructured":"http:\/\/www.scmagazineus.com\/iran-election-protesters-use-twitte-to-recruit-hackers\/article\/138545\/\n                     (last visited March 12, 2012)"},{"key":"35_CR22","unstructured":"Carr, J.: Inside Cyber Warfare. O\u2019Reilly Media (2009)"},{"key":"35_CR23","doi-asserted-by":"crossref","unstructured":"Osborne, G., Turnbull, B.: Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. In: International Conference on Availability, Reliability and Security, ARES 2009 (2009)","DOI":"10.1109\/ARES.2009.120"},{"key":"35_CR24","unstructured":"Beckett, J.: Future Directions Framework. State Electronic Evidence Branch, New South Wales Police, Tech. Rep. (2005)"},{"key":"35_CR25","doi-asserted-by":"crossref","unstructured":"Hristidis, V., et al.: Survey of Data Management and Analysis in Disaster Situations. Journal of Systems and Software 83(10) (2010)","DOI":"10.1016\/j.jss.2010.04.065"},{"key":"35_CR26","doi-asserted-by":"crossref","unstructured":"Strom, R., Dorai, C., Buttner, G., Li, Y.: SMILE - Distributed Middleware for Event Stream Processing. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 553\u2013554 (2007)","DOI":"10.1109\/IPSN.2007.4379722"},{"key":"35_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1007\/11896548_70","volume-title":"Current Trends in Database Technology \u2013 EDBT 2006","author":"R.S. Barga","year":"2006","unstructured":"Barga, R.S., Caituiro-Monge, H.: Event Correlation and Pattern Detection in CEDR. In: Grust, T., H\u00f6pfner, H., Illarramendi, A., Jablonski, S., Fischer, F., M\u00fcller, S., Patranjan, P.-L., Sattler, K.-U., Spiliopoulou, M., Wijsen, J. (eds.) EDBT 2006. LNCS, vol.\u00a04254, pp. 919\u2013930. Springer, Heidelberg (2006)"},{"key":"35_CR28","unstructured":"Cuppens, F., Miege, A.: Alert Correlation in a Cooperative Intrusion Detection Framework. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 202\u2013215 (2002)"},{"key":"35_CR29","doi-asserted-by":"crossref","unstructured":"Abadi, D., Carney, D., Cetintemel, U., Cherniack, M., Convey, C., Lee, S., Stonebraker, M., Tatbul, N., Zdonik, S.: Aurora: A New Model and Architecture for Data Stream Management. VLDB Journal\u00a012(2) (2003)","DOI":"10.1007\/s00778-003-0095-z"},{"key":"35_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-642-10265-3_18","volume-title":"Software Technologies for Embedded and Ubiquitous Systems","author":"L. Coppolino","year":"2009","unstructured":"Coppolino, L., D\u2019Antonio, S., Elia, I.A., Romano, L.: From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. In: Lee, S., Narasimhan, P. (eds.) SEUS 2009. LNCS, vol.\u00a05860, pp. 192\u2013202. Springer, Heidelberg (2009)"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing and Communications Challenges 4"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32384-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T17:09:42Z","timestamp":1675098582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-32384-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642323836","9783642323843"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32384-3_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}