{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:20Z","timestamp":1740141320346,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T00:00:00Z","timestamp":1497916800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T00:00:00Z","timestamp":1497916800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141310835"],"award-info":[{"award-number":["N000141310835"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10588-017-9255-3","type":"journal-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T09:25:32Z","timestamp":1497950732000},"page":"224-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Mining online communities to inform strategic messaging: practical methods to identify community-level insights"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1030-6236","authenticated-orcid":false,"given":"Matthew","family":"Benigni","sequence":"first","affiliation":[]},{"given":"Kenneth","family":"Joseph","sequence":"additional","affiliation":[]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,20]]},"reference":[{"key":"9255_CR1","unstructured":"Barbera P (2014) Tweeting the revolution: social media use and the #euromaidan protests | huffington post"},{"key":"9255_CR2","volume-title":"From tweets to intelligence: understanding the Islamic Jihad supporting community on Twitter. In social computing, behavioral-cultural modeling, and prediction, page to appear","author":"M Benigni","year":"2016","unstructured":"Benigni M, Carley KM (2016) From tweets to intelligence: understanding the Islamic Jihad supporting community on Twitter. In social computing, behavioral-cultural modeling, and prediction, page to appear. Springer, New York"},{"key":"9255_CR3","doi-asserted-by":"crossref","unstructured":"Benigni M, Joseph K, Carley KM (2017) Online extremism and the communities that sustain it: Detecting the isis supporting community on twitter. Under Revision to PLOS ONE","DOI":"10.1371\/journal.pone.0181405"},{"key":"9255_CR4","unstructured":"Berger JM, Morgan J (2015) The isis twitter census: defining and describing the population of isis supporters on twitter. The Brookings Project on US Relations with the Islamic World 3(20)"},{"key":"9255_CR5","unstructured":"Berger JM (2015) Tailored online interventions: the Islamic state\u2019s recruitment strategy. Combating Terrorism Center Sentinel"},{"issue":"10","key":"9255_CR6","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech 2008(10):P10008","journal-title":"J Stat Mech"},{"key":"9255_CR7","unstructured":"Callimachi R (2015) ISIS and the Lonely Young American. The New York Times"},{"key":"9255_CR8","unstructured":"Carley KM (2006) A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. Technical report"},{"issue":"1","key":"9255_CR9","first-page":"1","volume":"47","author":"HC Chang","year":"2010","unstructured":"Chang HC (2010) A new perspective on twitter hashtag use: Diffusion of innovation theory. Proc Am Soc Inf Sci Technol 47(1):1\u20134","journal-title":"Proc Am Soc Inf Sci Technol"},{"key":"9255_CR10","unstructured":"DeMasi O, Mason D, Ma J (2016) Understanding communities via hashtag engagement: a clustering based approach. In: Tenth International AAAI Conference on Web and Social Media"},{"key":"9255_CR11","unstructured":"Dewey T, Kaden J, Marks M, Matsushima S, Zhu B (2012) The impact of social media on social unrest in the Arab Spring. Int Policy Prog"},{"key":"9255_CR12","doi-asserted-by":"crossref","unstructured":"Dhillon IS (2001) Co-clustering documents and words using bipartite spectral graph partitioning. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining, ACM, pp 269\u2013274","DOI":"10.1145\/502512.502550"},{"key":"9255_CR13","unstructured":"Dozier K (2016) Anti-ISIS-Propaganda Czars Ninja war plan: we were never here, March 2016"},{"issue":"3","key":"9255_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010) Community detection in graphs. Physics Rep 486(3):75\u2013174","journal-title":"Physics Rep"},{"key":"9255_CR15","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-37210-0_34","volume-title":"Social computing, behavioral-cultural modeling and prediction","author":"K Glasgow","year":"2013","unstructured":"Glasgow K, Fink C (2013) Hashtag lifespan and social networks during the london riots. In: Greenberg AM, Kennedy WG, Bos ND (eds) Social computing, behavioral-cultural modeling and prediction. Springer, Berlin, pp 311\u2013320. doi: 10.1007\/978-3-642-37210-0_34"},{"issue":"1","key":"9255_CR16","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1214\/aoms\/1177705148","volume":"32","author":"LA Goodman","year":"1961","unstructured":"Goodman LA (1961) Snowball sampling. Ann Math Stat 32(1):148\u2013170","journal-title":"Ann Math Stat"},{"key":"9255_CR17","doi-asserted-by":"crossref","unstructured":"Hamilton WL, Clark K, Leskovec J, Jurafsky D (2016) Inducing domain-specific sentiment lexicons from unlabeled corpora","DOI":"10.18653\/v1\/D16-1057"},{"key":"9255_CR18","doi-asserted-by":"crossref","unstructured":"Herrick D (2016) The social side of cyber power? social media and cyber operations. In: Cyber Conflict (CyCon), 2016 8th International Conference on, NATO CCD COE, pp 99\u2013111","DOI":"10.1109\/CYCON.2016.7529429"},{"issue":"2","key":"9255_CR19","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1111\/j.1460-2466.2012.01626.x","volume":"62","author":"PN Howard","year":"2012","unstructured":"Howard PN, Parks MR (2012) Social media and political change: capacity, constraint, and consequence. J Commun 62(2):359\u2013362","journal-title":"J Commun"},{"issue":"1","key":"9255_CR20","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1111\/misr.12020","volume":"15","author":"MM Hussain","year":"2013","unstructured":"Hussain MM, Howard PN (2013) What best explains successful protest cascades? ICTs and the fuzzy causes of the Arab Spring. Int Stud Rev 15(1):48\u201366","journal-title":"Int Stud Rev"},{"key":"9255_CR21","unstructured":"Jensen DN (2016) Lennart meri and the \u2019new normal\u2019 | huffington post"},{"issue":"6292","key":"9255_CR22","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.1126\/science.aaf0675","volume":"352","author":"NF Johnson","year":"2016","unstructured":"Johnson NF, Zheng M, Vorobyeva Y, Gabriel A, Qi H, Velasquez N, Manrique P, Johnson D, Restrepo E, Song C, Wuchty S (2016) online ecology of adversarial aggregates: ISIS and beyond. Science 352(6292):1459\u20131463","journal-title":"Science"},{"issue":"2","key":"9255_CR23","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1111\/j.1548-1425.2012.01362.x","volume":"39","author":"JS Juris","year":"2012","unstructured":"Juris JS (2012) Reflections on #occupy everywhere: social media, public space, and emerging logics of aggregation. Am Ethnol 39(2):259\u2013279","journal-title":"Am Ethnol"},{"issue":"2","key":"9255_CR24","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"Stuart Lloyd","year":"1982","unstructured":"Lloyd Stuart (1982) Least squares quantization in pcm. IEEE Trans Inf Theory 28(2):129\u2013137","journal-title":"IEEE Trans Inf Theory"},{"key":"9255_CR25","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1080\/1369118X.2011.592648","volume":"14","author":"BD Loader","year":"2011","unstructured":"Loader BD, Mercea D (2011) Networking democracy? Inf Commun Soc 14:757\u2013769","journal-title":"Inf Commun Soc"},{"key":"9255_CR26","first-page":"1375","volume":"5","author":"G Lotan","year":"2011","unstructured":"Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I, Boyd D (2011) The revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int J Commun 5:1375\u20131405","journal-title":"Int J Commun"},{"key":"9255_CR27","unstructured":"MacQueen J (1967) Some methods for classification and analysis of multivariate observations. In: Proceedings of the fifth Berkeley symposium on mathematical statistics and probability, vol 1, University of California Press, pp 281\u2013297"},{"issue":"4","key":"9255_CR28","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1080\/13629387.2011.639562","volume":"16","author":"M Nanabhay","year":"2011","unstructured":"Nanabhay M, Farmanfarmaian R (2011) From spectacle to spectacular: how physical space, social media and mainstream broadcast amplified the public sphere in Egypt\u2019s Revolution\u2019. J N Afr Stud 16(4):573\u2013603","journal-title":"J N Afr Stud"},{"issue":"3","key":"9255_CR29","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s10618-011-0224-z","volume":"24","author":"S Papadopoulos","year":"2012","unstructured":"Papadopoulos S, Kompatsiaris Y, Vakali A, Spyridonos P (2012) Community detection in social media. Data Min Knowl Discov 24(3):515\u2013554","journal-title":"Data Min Knowl Discov"},{"key":"9255_CR30","doi-asserted-by":"crossref","unstructured":"Peel L, Larremore DB, Clauset A (2016) The ground truth about metadata and community detection in networks","DOI":"10.1126\/sciadv.1602548"},{"key":"9255_CR31","first-page":"1532","volume":"12","author":"J Pennington","year":"2014","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: global vectors for word representation. Proc Emprical Methods Nat Lang Process 12:1532\u20131543","journal-title":"Proc Emprical Methods Nat Lang Process"},{"key":"9255_CR32","unstructured":"REST Twitter (2016) API"},{"key":"9255_CR33","unstructured":"Roxburgh G (2016) Ukraine wins the 2016 eurovision song contest | news | eurovision song contest"},{"key":"9255_CR34","unstructured":"Sakaki T, Okazaki M, Matsuo Y (2016) Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web WWW \u201910, ACM, pp 851\u2013860"},{"key":"9255_CR35","volume-title":"Active learning literature survey. Computer Sciences Technical Report 1648","author":"B Settles","year":"2009","unstructured":"Settles B (2009) Active learning literature survey. Computer Sciences Technical Report 1648. University of Wisconsin, Madison"},{"key":"9255_CR36","unstructured":"Shamanska A (2016) Hackers in Ukraine deface separatist websites to mark victory day. Accessed 23 Oct 2016"},{"key":"9255_CR37","doi-asserted-by":"crossref","unstructured":"Starbird K, Palen L (2012) (How) will the revolution be retweeted?: information diffusion and the 2011 Egyptian uprising. In: Proceedings of the acm 2012 conference on computer supported cooperative work, ACM, 2012, pp 7\u201316","DOI":"10.1145\/2145204.2145212"},{"key":"9255_CR38","unstructured":"Steinbach M, Karypis G, Kumar V, et al. (2000) A comparison of document clustering techniques. In: KDD workshop on text mining, vol 400, Boston, pp 525\u2013526"},{"key":"9255_CR39","first-page":"1","volume":"11","author":"J Szostek","year":"2014","unstructured":"Szostek J (2014) The media battles of Ukraine\u2019s EuroMaidan. Digital Icons 11:1\u201319","journal-title":"Digital Icons"},{"key":"9255_CR40","doi-asserted-by":"crossref","unstructured":"Tang L, Wang X, Liu H (2009) Uncoverning groups via heterogeneous interaction analysis. In: Ninth IEEE International Conference on Data Mining, ICDM\u201909, IEEE, pp 503\u2013512","DOI":"10.1109\/ICDM.2009.20"},{"key":"9255_CR41","doi-asserted-by":"crossref","unstructured":"Tufekci Z (2014) Big questions for social media big data: representativeness, validity and other methodological pitfalls. In: ICWSM \u201914: Proceedings of the 8th international AAAI conference on weblogs and social media","DOI":"10.1609\/icwsm.v8i1.14517"},{"key":"9255_CR42","unstructured":"UNIAN (2016) Rada adopts bill allowing lutsenko to be nominated prosecutor general. Accessed 20 Oct 2016"},{"key":"9255_CR43","doi-asserted-by":"crossref","unstructured":"Veilleux-Lepage Y (2015) Paradigmatic Shifts in Jihadism in Cyberspace: the emerging role of unaffiliated sympathizers in the Islamic State\u2019s social media strategy. J Terror Res","DOI":"10.15664\/jtr.1183"},{"key":"9255_CR44","unstructured":"Veilleux-Lepage Y (2014) Retweeting the Caliphate: the role of soft-sympathizers in the Islamic state\u2019s social media strategy. In: 2014 6th International Terrorism and Transnational Crime Conference, March 2014"},{"key":"9255_CR45","unstructured":"Wagstaff K, Cardie C, Rogers S , Schrdl S, et al. (2001)Constrained k-means clustering with background knowledge. In: ICML, vol 1, pp 577\u2013584"},{"key":"9255_CR46","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge"},{"key":"9255_CR47","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/978-3-642-36973-5_102","volume-title":"Advances in information retrieval","author":"I Weber","year":"2013","unstructured":"Weber I, Garimella VRK, Teka A (2013) Political hashtag trends. In: Serdyukov P, Kuznetsov OS, Kamps J, Agichtein E, Segalovich I, Yilmaz E (eds) Advances in information retrieval. Springer, Berlin, pp 857\u2013860. doi: 10.1007\/978-3-642-36973-5_102"},{"key":"9255_CR48","doi-asserted-by":"crossref","unstructured":"Wei W, Joseph K, Liu H, Carley KM (2015) The fragility of twitter social networks against suspended users. In: Proceedings of the 2015 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 9\u201316","DOI":"10.1145\/2808797.2809316"},{"issue":"2","key":"9255_CR49","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1177\/1940161212471716","volume":"18","author":"G Wolfsfeld","year":"2013","unstructured":"Wolfsfeld G, Segev E, Sheafer T (2013) Social media and the arab spring politics comes first. Int J Press 18(2):115\u2013137","journal-title":"Int J Press"},{"key":"9255_CR50","unstructured":"Wood P (2016) IS conflict: counting the civilian cost of US-led air strikes"},{"issue":"3","key":"9255_CR51","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s13278-011-0021-0","volume":"1","author":"KA Zweig","year":"2011","unstructured":"Zweig KA, Kaufmann M (2011) A systematic approach to the one-mode projection of bipartite graphs. Soc Netw Anal Min 1(3):187\u2013218","journal-title":"Soc Netw Anal Min"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-017-9255-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-017-9255-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-017-9255-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T02:53:48Z","timestamp":1692845628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-017-9255-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,20]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["9255"],"URL":"https:\/\/doi.org\/10.1007\/s10588-017-9255-3","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2017,6,20]]},"assertion":[{"value":"20 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}