{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T02:23:54Z","timestamp":1777429434237,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":53,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662680995","type":"print"},{"value":"9783662681008","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-662-68100-8_2","type":"book-chapter","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T22:01:34Z","timestamp":1695852094000},"page":"25-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Power of\u00a0Weak Signals: A Twitter Analysis on\u00a0Game of\u00a0Thrones\u2019 Final Season"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8229-330X","authenticated-orcid":false,"given":"Hiba","family":"Abou Jamra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0449-5277","authenticated-orcid":false,"given":"Marinette","family":"Savonnet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, L.M., et al.: Sensing trending topics in Twitter. IEEE Trans. Multimedia 15(6), 1268\u20131282 (2013)","DOI":"10.1109\/TMM.2013.2265080"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Aishwarya, K.M., Ramesh, R., Sobarad, P.M., Singh, V.: Lossy image compression using svd coding algorithm. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1384\u20131389. IEEE (2016)","DOI":"10.1109\/WiSPNET.2016.7566363"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Ansoff, H.I.: Managing strategic surprise by response to weak signals. Calif. Manag. Rev. 18(2), 21\u201333 (1975)","DOI":"10.2307\/41164635"},{"key":"2_CR4","unstructured":"Ansoff, H.I., McDonnell, E.J.: Implanting strategic management (1990)"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.physa.2005.05.094","volume":"360","author":"M Baiesi","year":"2006","unstructured":"Baiesi, M.: Scaling and precursor motifs in earthquake networks. Physica A 360(2), 534\u2013542 (2006)","journal-title":"Physica A"},{"key":"2_CR6","unstructured":"Blanco, S., Lesca, N.: From weak signals to anticipative information: learning from the implementation of an information selection method. In: Proceedings of the International Conference In Search of Time (ISIDA), pp. 197\u2013210. Citeseer (2003)"},{"issue":"10","key":"2_CR7","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"V Blondel","year":"2008","unstructured":"Blondel, V., Guillaume, J.-L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008(10), P10008 (2008)","journal-title":"J. Stat. Mech: Theory Exp."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Brewster, B., Andrews, S., Polovina, S., Hirsch, L., Akhgar, B.: Environmental scanning and knowledge representation for the detection of organised crime threats. In: 21th International Conference on Conceptual Structures (ICCS), July 2014","DOI":"10.1007\/978-3-319-08389-6_22"},{"issue":"1\u20137","key":"2_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 30(1\u20137), 107\u2013117 (1998)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"2_CR10","unstructured":"Burden, R.L., Faires, J.D.: Numerical Analysis, 9th edn. Brooks Cole Cengage Learning, Boston (2011)"},{"key":"2_CR11","unstructured":"Cao, L.: Singular value decomposition applied to digital image processing. In: Division of Computing Studies, pp. 1\u201315. Arizona State University Polytechnic Campus, Mesa, Arizona State University polytechnic Campus (2006)"},{"key":"2_CR12","unstructured":"Chatfield, C.: The Analysis of Time Series: An Introduction. Chapman and Hall\/CRC, Boca Raton (2003)"},{"key":"2_CR13","unstructured":"Coffman, B.: Weak signal research, part I: introduction. J. Transit. Manag. 2(1) (1997)"},{"issue":"11","key":"2_CR14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0143638","volume":"10","author":"T Davies","year":"2015","unstructured":"Davies, T., Marchione, E.: Event networks and the identification of crime pattern motifs. PLoS ONE 10(11), e0143638 (2015)","journal-title":"PLoS ONE"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.techfore.2017.03.020","volume":"119","author":"F Dotsika","year":"2017","unstructured":"Dotsika, F., Watkins, A.: Identifying potentially disruptive trends by means of keyword network analysis. Technol. Forecast. Soc. Chang. 119, 114\u2013127 (2017)","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"3","key":"2_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/BF02288367","volume":"1","author":"C Eckart","year":"1936","unstructured":"Eckart, C., Young, G.: The approximation of one matrix by another of lower rank. Psychometrika 1(3), 211\u2013218 (1936)","journal-title":"Psychometrika"},{"key":"2_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106650","volume":"212","author":"M El Akrouchi","year":"2021","unstructured":"El Akrouchi, M., Benbrahim, H., Kassou, I.: End-to-end LDA-based automatic weak signal detection in web news. Knowl.-Based Syst. 212, 106650 (2021)","journal-title":"Knowl.-Based Syst."},{"issue":"4","key":"2_CR18","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1198\/000313002533","volume":"56","author":"M Friendly","year":"2002","unstructured":"Friendly, M.: Corrgrams: exploratory displays for correlation matrices. Am. Stat. 56(4), 316\u2013324 (2002)","journal-title":"Am. Stat."},{"key":"2_CR19","unstructured":"Godet, M.: From Anticipation to Action: A Handbook of Strategic Prospective. UNESCO Publishing, Paris (1994)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-60299-2_9","volume-title":"Principles and Practice of Constraint Programming \u2014 CP \u201995","author":"DQ Goldin","year":"1995","unstructured":"Goldin, D.Q., Kanellakis, P.C.: On similarity queries for time-series data: constraint specification and implementation. In: Montanari, U., Rossi, F. (eds.) CP 1995. LNCS, vol. 976, pp. 137\u2013153. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60299-2_9"},{"issue":"3","key":"2_CR21","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.futures.2007.08.021","volume":"40","author":"E Hiltunen","year":"2008","unstructured":"Hiltunen, E.: The future sign and its three dimensions. Futures 40(3), 247\u2013260 (2008)","journal-title":"Futures"},{"key":"2_CR22","unstructured":"Hiltunen, E.: Weak signals in organizational futures learning. Ph.D. thesis, Helsinki School of Economics (2010)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Ho\u010devar, T., Dem\u0161ar, J.: A combinatorial approach to graphlet counting. Bioinformatics 30(4), 559\u2013565 (2014)","DOI":"10.1093\/bioinformatics\/btt717"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Ilmola, L., Kuusi, O.: Filters of weak signals hinder foresight: monitoring weak signals efficiently in corporate decision-making. Futures 38(8), 908\u2013924 (2006). Organisational Foresight","DOI":"10.1016\/j.futures.2005.12.019"},{"key":"2_CR25","unstructured":"Jordan, J.: The Four Stages of Highly Effective Crisis Management: How to Manage the Media in the Digital Age. CRC Press, Boca Raton (2011)"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-24712-5_19","volume-title":"Communications and Multimedia Security","author":"K Juszczyszyn","year":"2011","unstructured":"Juszczyszyn, K., Ko\u0142aczek, G.: Motif-based attack detection in network communication graphs. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol. 7025, pp. 206\u2013213. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24712-5_19"},{"key":"2_CR27","unstructured":"Kodinariya, T.M., Makwana, P.R.: Review on determining number of cluster in k-means clustering. Int. J. 1(6), 90\u201395 (2013)"},{"key":"2_CR28","unstructured":"Korvers, P.M.W.: Accident Precursors: Pro-active Identification of Safety Risks in the Chemical Process Industry. eLibrary.ru (2004)"},{"issue":"1","key":"2_CR29","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.futures.2009.08.003","volume":"42","author":"T Kuosa","year":"2010","unstructured":"Kuosa, T.: Futures signals sense-making framework (FSSF): a start-up tool to analyse and categorise weak signals, wild cards, drivers, trends and other types of information. Futures 42(1), 42\u201348 (2010)","journal-title":"Futures"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Kwon, L.-N., Park, J.-H., Moon, Y.-H., Lee, B., Shin, Y.H., Kim, Y.-K.: Weak signal detecting of industry convergence using information of products and services of global listed companies - focusing on growth engine industry in South Korea. J. Open Innov. Technol. Mark. Complex. 4(1) (2018)","DOI":"10.1186\/s40852-018-0083-6"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Lesca, H., Lesca, N.: Weak Signals for Strategic Intelligence: Anticipation Tool for Managers. ISTE Ltd. (2011)","DOI":"10.1002\/9781118602775"},{"issue":"2","key":"2_CR32","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28(2), 129\u2013137 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR33","unstructured":"Macrae, C.: Interrogating the unknown: risk analysis and sensemaking in airline safety oversight. Number 43 in CARR Discussion Papers (DP 43). Centre for Analysis of Risk and Regulation, London School of Economics (2007)"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Maitre, J., M\u00e9nard, M., Chiron, G., Bouju, A., Sid\u00e8re, N.: A meaningful information extraction system for interactive analysis of documents. In: International Conference on Document Analysis and Recognition (ICDAR), pp. 92\u201399 (2019)","DOI":"10.1109\/ICDAR.2019.00024"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"McMinn, A.J., Moshfeghi, Y., Jose, J.M.: Building a Large-scale corpus for evaluating event detection on Twitter. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, CIKM \u201913, pp. 409\u2013418. Association for Computing Machinery, New York, NY, USA (2013)","DOI":"10.1145\/2505515.2505695"},{"issue":"3","key":"2_CR36","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.futures.2011.10.004","volume":"44","author":"S Mendon\u00e7a","year":"2012","unstructured":"Mendon\u00e7a, S., Cardoso, G., Cara\u00e7a, J.: The strategic strength of weak signal analysis. Futures 44(3), 218\u2013228 (2012)","journal-title":"Futures"},{"issue":"5","key":"2_CR37","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s11573-018-0898-4","volume":"88","author":"C M\u00fchlroth","year":"2018","unstructured":"M\u00fchlroth, C., Grottke, M.: A systematic literature review of mining weak signals and trends for corporate foresight. J. Bus. Econ. 88(5), 643\u2013687 (2018). https:\/\/doi.org\/10.1007\/s11573-018-0898-4","journal-title":"J. Bus. Econ."},{"key":"2_CR38","unstructured":"Phimister, J., Bier, V., Kunreuther, H.: Accident Precursor Analysis and Management: Reducing Technological Risk Through Diligence. The National Academies Press, Washington, DC (2004)"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Pr\u017eulj, N., Corneil, D.G., Jurisica, I.: Modeling interactome: scale-free or geometric? Bioinformatics 20(18), 3508\u20133515 (2004)","DOI":"10.1093\/bioinformatics\/bth436"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Rasc\u00e3o, J.P.: Strategic information surveillance. In: Leon, R.-D. (ed.) Managerial Strategies for Business Sustainability During Turbulent Times, pp. 78\u201399. IGI Global (2018)","DOI":"10.4018\/978-1-5225-2716-9.ch005"},{"key":"2_CR41","unstructured":"Ribeiro, P., Paredes, P., Silva, M.E.P., Aparicio, D., Silva, F.: A survey on subgraph counting: concepts, algorithms and applications to network motifs and graphlets. arXiv preprint arXiv:1910.13011 (2019)"},{"key":"2_CR42","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.futures.2011.10.005","volume":"44","author":"P Rossel","year":"2012","unstructured":"Rossel, P.: Early detection, warnings, weak signals and seeds of change: a turbulent domain of futures studies. Futures 44, 229\u2013239 (2012)","journal-title":"Futures"},{"key":"2_CR43","doi-asserted-by":"publisher","unstructured":"Rousseau, P., Camara, D., Kotzinos, D.: Weak Signal Detection and Identification in Large Data Sets: A Review of Methods and Applications. Springer, Cham (2021). https:\/\/doi.org\/10.13140\/RG.2.2.20808.24327\/1","DOI":"10.13140\/RG.2.2.20808.24327\/1"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Saritas, O., Smith, J.: The big picture - trends, drivers, wild cards, discontinuities and weak signals. Futures 43, 292\u2013312 (2011)","DOI":"10.1016\/j.futures.2010.11.007"},{"key":"2_CR45","unstructured":"Schoemaker, P.J.H., Day, G.S.: How to make sense of weak signals. Leading Organ. Perspect. New Era 2, 37\u201347 (2009)"},{"key":"2_CR46","unstructured":"Soufiani, H.A., Airoldi, E.: Graphlet decomposition of a weighted network. In: Lawrence, N.D., Girolami, M. (eds.) Proceedings of the Fifteenth International Conference on Artificial Intelligence and Statistics, Proceedings of Machine Learning Research, vol. 22, pp. 54\u201363, La Palma, Canary Islands, 21\u201323 April 2012. PMLR (2012)"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Stewart, G.W.: On the early history of the singular value decomposition. SIAM Rev. 35(4), 551\u2013566 (1993)","DOI":"10.1137\/1035134"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Tang, J.: Computational models for social network analysis: a brief survey. In: Proceedings of the 26th International Conference on World Wide Web Companion, WWW \u201917 Companion, Republic and Canton of Geneva, CHE, pp. 921\u2013925. International World Wide Web Conferences Steering Committee (2017)","DOI":"10.1145\/3041021.3051101"},{"key":"2_CR49","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.futures.2014.12.007","volume":"66","author":"D Thorleuchter","year":"2015","unstructured":"Thorleuchter, D., Van den Poel, D.: Idea mining for web-based weak signal detection. Futures 66, 25\u201334 (2015)","journal-title":"Futures"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"van Veen, B.L., Ortt, J.R.: Unifying weak signals definitions to improve construct understanding. Futures 134, 102837 (2021)","DOI":"10.1016\/j.futures.2021.102837"},{"key":"2_CR51","unstructured":"Venugopal, V., Ates, A., McKiernan, P.: Revisiting Ansoff\u2019s weak signals - a systematic literature review. In: 36th Annual Conference of the British Academy of Management (2022)"},{"key":"2_CR52","unstructured":"Welz, K., Brecht, L., Pengl, A., Kauffeldt, J.V., Schallmo, D.R.A.: Weak signals detection: criteria for social media monitoring tools. In: ISPIM Innovation Symposium, p. 1. The International Society for Professional Innovation Management (ISPIM) (2012)"},{"issue":"16","key":"2_CR53","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1016\/j.eswa.2012.04.059","volume":"39","author":"J Yoon","year":"2012","unstructured":"Yoon, J.: Detecting weak signals for long-term business opportunities using text mining of Web news. Expert Syst. Appl. 39(16), 1243\u20131250 (2012)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Transactions on Large-Scale Data- and Knowledge-Centered Systems LV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-68100-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T22:02:20Z","timestamp":1695852140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-68100-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783662680995","9783662681008"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-68100-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}