{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:45:41Z","timestamp":1770842741886,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2016,3,2]],"date-time":"2016-03-02T00:00:00Z","timestamp":1456876800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Norges Forskningsr\u00e5d (NO), VERDIKT program","award":["213401"],"award-info":[{"award-number":["213401"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Supported Coop Work"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10606-016-9251-z","type":"journal-article","created":{"date-parts":[[2016,3,2]],"date-time":"2016-03-02T10:15:42Z","timestamp":1456913742000},"page":"167-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Bloggers\u2019 Responses to the Snowden Affair: Combining Automated and Manual Methods in the Analysis of News Blogging"],"prefix":"10.1007","volume":"25","author":[{"given":"Dag","family":"Elgesem","sequence":"first","affiliation":[]},{"given":"Ingo","family":"Feinerer","sequence":"additional","affiliation":[]},{"given":"Lubos","family":"Steskal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,2]]},"reference":[{"key":"9251_CR1","volume-title":"Trust in Society","author":"M Bacharach","year":"2001","unstructured":"Bacharach, M. and D. Gambetta (2001). Trust in Signs, in K. Cook (eds): Trust in Society. New York: Russell Sage."},{"key":"9251_CR2","first-page":"71","volume-title":"Text mining: classification, clustering, and applications","author":"DM Blei","year":"2009","unstructured":"Blei, D. M. and John D. Lafferty (2009). Topic models. A. N. Srivastava and M. Sahami (eds): Text mining: classification, clustering, and applications. London: Chapman and Hall, pp. 71\u201389."},{"key":"9251_CR3","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, David M., A. Y. Ng, and M. I. Jordan (2003). Latent dirichlet allocation. Journal of machine Learning research, vol. 3, pp. 993\u20131022.","journal-title":"Journal of machine Learning research"},{"issue":"2","key":"9251_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/1750481314568544","volume":"9","author":"J Branum","year":"2015","unstructured":"Branum, J. and J. Charteris-Black (2015). The Edward Snowden Affair: A corpus study of the British press. Discourse and Communication, vol. 9, no. 2, pp. 1\u201322","journal-title":"Discourse and Communication"},{"key":"9251_CR5","volume-title":"Gatewatching. Collaborative Online News Production","year":"2005","unstructured":"Bruns, A. (eds) (2005). Gatewatching. Collaborative Online News Production. New York: Peter Lang."},{"key":"9251_CR6","unstructured":"Bruns, A. (2007). Methodologies for Mapping the Political Blogosphere: An Exploration Using the IssueCrawler Research Tool. First Monday. http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/1834\/1718 . Accessed 23 June 2015."},{"key":"9251_CR7","volume-title":"The Uses of Blogs","year":"2006","unstructured":"Bruns, A. and J. Jacobs (eds) (2006). The Uses of Blogs. New York: Peter Lang."},{"key":"9251_CR8","first-page":"2420","volume":"8","author":"A Chadwick","year":"2014","unstructured":"Chadwick, A. and B. Collister (2014). Boundary-Drawing Power and the Renewal of Professional News Organizations: The Case of The Guardian and the Snowden National Security Agency Leak. International Journal of Communication, vol. 8, pp. 2420\u20132441.","journal-title":"International Journal of Communication"},{"key":"9251_CR9","volume-title":"Media Consumption and Public Engagement","author":"N Couldry","year":"2007","unstructured":"Couldry, N., S. Livingstone and T. Markham (2007). Media Consumption and Public Engagement. Basingstoke: Palgrave."},{"issue":"1","key":"9251_CR10","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1023\/A:1007612920971","volume":"42","author":"IS Dhillon","year":"2001","unstructured":"Dhillon, I.S. and D.S. Modha (2001). Concept Decompositions for Large Sparse Text Data Using Clustering. Machine Learning, vol. 42, no. 1, pp. 143\u2013175.","journal-title":"Machine Learning"},{"key":"9251_CR11","unstructured":"Duns J. (2015). News of Devils. The media and Edward Snowden. CreateSpace Independent Publishing Platform."},{"key":"9251_CR12","unstructured":"Edward Snowden: the whistleblower behind the NSA surveillance revelations (2013, June 11). The Guardian. http:\/\/www.theguardian.com\/world\/2013\/jun\/09\/edward-snowden-nsa-whistleblower-surveillance . Accessed: March 21, 2015."},{"key":"9251_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511806421","volume-title":"Explaining Human Behavior","author":"J Elster","year":"2007","unstructured":"Elster, Jon (2007). Explaining Human Behavior. Cambridge: Cambridge University Press."},{"key":"9251_CR14","doi-asserted-by":"crossref","DOI":"10.1002\/0471445428","volume-title":"Statistical methods for rates and proportions","author":"JL Fleiss","year":"2003","unstructured":"Fleiss, J.L., B. Levin and M.C. Paik (2003): Statistical methods for rates and proportions, 3rd ed. Hoboken: Wiley.","edition":"3"},{"key":"9251_CR15","volume-title":"Streetwise. How Taxi Drivers Establish Their Customer\u2019s Trustworthiness","author":"D Gambetta","year":"2005","unstructured":"Gambetta, D. and H. Hamill (2005). Streetwise. How Taxi Drivers Establish Their Customer\u2019s Trustworthiness. New York: Russell Sage."},{"key":"9251_CR16","volume-title":"No Place to Hide. Edward Snowden, the NSA and the Surveillance State","author":"G Greenwald","year":"2014","unstructured":"Greenwald, G. (2014). No Place to Hide. Edward Snowden, the NSA and the Surveillance State. London: Hamish Hamilton."},{"issue":"10","key":"9251_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v050.i10","volume":"50","author":"K Hornik","year":"2012","unstructured":"Hornik, K., I. Feinerer, M. Kober and C. Buchta (2012). Spherical k-Means Clustering. Journal of Statistical Software, vol. 50, no. 10, 1\u201322.","journal-title":"Journal of Statistical Software"},{"issue":"4","key":"9251_CR18","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1080\/19331680802546571","volume":"5","author":"D Karpf","year":"2008","unstructured":"Karpf, D. (2008). Understanding Blog Space. Journal of Information Technology and Politics. Vol. 5, no. 4, pp. 369\u2013385.","journal-title":"Journal of Information Technology and Politics."},{"issue":"3","key":"9251_CR19","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1177\/107769900908600308","volume":"86","author":"M Leccese","year":"2009","unstructured":"Leccese, M. (2009). Online Information Sources of Political Blogs. Journalism and Mass Communication Quarterly. vol. 86, no. 3, pp. 578\u2013593.","journal-title":"Journalism and Mass Communication Quarterly."},{"key":"9251_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C. D., P. Raghavan and H. Sch\u00fctze (2008). Introduction to Information Retrieval. Cambridge: Cambridge University Press."},{"key":"9251_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-44409-2","volume-title":"Blogosphere and its Exploration","author":"C Meinel","year":"2015","unstructured":"Meinel, C., J. Bross, P. Bergen and P. Henning (2015). Blogosphere and its Exploration. New York: Springer."},{"issue":"3","key":"9251_CR22","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1177\/0894439310382511","volume":"29","author":"H Moe","year":"2011","unstructured":"Moe, H. (2011). Mapping the Norwegian Blogosphere: Methodological Challenges in Internationalizing Internet Research. Social Science Computer Review. Vol. 29, no. 3, pp. 313\u2013326","journal-title":"Social Science Computer Review."},{"key":"9251_CR23","volume-title":"Games and Information. An Introduction to Game Theory","author":"E Rasmussen","year":"2006","unstructured":"Rasmussen, Eric (2006). Games and Information. An Introduction to Game Theory. London: Blackwell."},{"key":"9251_CR24","unstructured":"PEW Research Center (2013). Public Split over Impact of NSA Leak, But Most Want Snowden Persecuted. http:\/\/www.people-press.org\/2013\/06\/17\/public-split-over-impact-of-nsa-leak-but-most-want-snowden-prosecuted\/ . Last visited: March 21, 2015."},{"key":"9251_CR25","volume-title":"Blogging","author":"JW Rettberg","year":"2008","unstructured":"Rettberg, J. W. (2008). Blogging. Cambridge: Polity."},{"key":"9251_CR26","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8718.001.0001","volume-title":"Digital Methods","author":"R Rogers","year":"2013","unstructured":"Rogers, R. (2013). Digital Methods. Cambridge: MIT Press."},{"key":"9251_CR27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw, P. J. (1987). Silhouettes: a Graphical Aid to the Interpretation and Validation of Cluster Analysis. Computational and Applied Mathematics, vol. 20, pp. 53\u201365. doi: 10.1016\/0377-0427(87)90125-7 .","journal-title":"Computational and Applied Mathematics"},{"issue":"2","key":"9251_CR28","doi-asserted-by":"crossref","first-page":"197","DOI":"10.24908\/ss.v12i2.4776","volume":"12","author":"J Dijck van","year":"2014","unstructured":"van Dijck, J. (2014). Datafication, dataism and dataveillance: Big data between scientific paradigm and ideology. Surveillance & Society, vol. 12, no. 2, pp. 197\u2013208.","journal-title":"Surveillance & Society"},{"key":"9251_CR29","unstructured":"Wemple, E. (2013). Leaker, Source or Whistleblower. Washington Post http:\/\/www.washingtonpost.com\/blogs\/erik-wemple\/wp\/2013\/06\/10\/edward-snowden-leaker-source-or-whistleblower\/ . Accessed 21 March 2015."}],"container-title":["Computer Supported Cooperative Work (CSCW)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10606-016-9251-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10606-016-9251-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10606-016-9251-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T01:24:06Z","timestamp":1567646646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10606-016-9251-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,2]]},"references-count":29,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["9251"],"URL":"https:\/\/doi.org\/10.1007\/s10606-016-9251-z","relation":{},"ISSN":["0925-9724","1573-7551"],"issn-type":[{"value":"0925-9724","type":"print"},{"value":"1573-7551","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,2]]}}}