{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T23:01:39Z","timestamp":1765666899066},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,1,13]],"date-time":"2011-01-13T00:00:00Z","timestamp":1294876800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s10796-010-9293-6","type":"journal-article","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T10:38:52Z","timestamp":1294828732000},"page":"1-3","source":"Crossref","is-referenced-by-count":6,"title":["Introduction to special issue on terrorism informatics"],"prefix":"10.1007","volume":"13","author":[{"given":"Hsinchun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yilu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Edna F.","family":"Reid","sequence":"additional","affiliation":[]},{"given":"Catherine A.","family":"Larson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,13]]},"reference":[{"key":"9293_CR1","unstructured":"Chen, H., Reid, E., Sinai, J., Silke, A., & Ganor, B. (Eds.) (2008). Preface. Terrorism informatics: Knowledge management and data mining for homeland security (Integrated Series in Information Systems). New York: Springer."},{"key":"9293_CR2","doi-asserted-by":"crossref","unstructured":"Cheong, M., & Lee, V. (2011). A Microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via twitter, Information Systems Frontiers, doi: 10.1007\/s10796-010-9273-x .","DOI":"10.1007\/s10796-010-9273-x"},{"key":"9293_CR3","doi-asserted-by":"crossref","unstructured":"Hayne, S., Troup, L., & McComb, S. (2011). \u201cWhere\u2019s Farah?\u201d: Knowledge silos and information fusion by distributed collaborating teams. Information Systems Frontiers, doi: 10.1007\/s10796-010-9274-9 .","DOI":"10.1007\/s10796-010-9274-9"},{"key":"9293_CR4","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, G. A., & Chen, H. (2011). Identity matching using personal and social identity features. Information Systems Frontiers, doi: 10.1007\/s10796-010-9270-0 .","DOI":"10.1007\/s10796-010-9270-0"},{"key":"9293_CR5","doi-asserted-by":"crossref","unstructured":"Oh, O., Agrawal, M., & Rao, R. (2011). Information control and terrorism: tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers, doi: 10.1007\/s10796-010-9275-8 .","DOI":"10.1007\/s10796-010-9275-8"},{"key":"9293_CR6","doi-asserted-by":"crossref","unstructured":"Prentice, S., Taylor, P., Rayson, P., Hoskins, A., & O\u2019Loughlin, B. (2011). Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict. Information Systems Frontiers, doi: 10.1007\/s10796-010-9272-y .","DOI":"10.1007\/s10796-010-9272-y"},{"key":"9293_CR7","doi-asserted-by":"crossref","unstructured":"Qin, J., Zhou, Y., & Chen, H. (2011). A multi-region empirical study on the internet presence of global extremist organizations. Information Systems Frontiers, doi: 10.1007\/s10796-010-9277-6 .","DOI":"10.1007\/s10796-010-9277-6"},{"key":"9293_CR8","doi-asserted-by":"crossref","unstructured":"Roberts, N. C. (2011). Tracking and disrupting dark networks: Challenges of data collection and analysis. Information Systems Frontiers, doi: 10.1007\/s10796-010-9271-z .","DOI":"10.1007\/s10796-010-9271-z"},{"key":"9293_CR9","doi-asserted-by":"crossref","unstructured":"Skillicorn, D. (2011). Computational approaches to suspicion in adversarial settings. Information Systems Frontiers, doi: 10.1007\/s10796-010-9279-4 .","DOI":"10.1007\/s10796-010-9279-4"},{"key":"9293_CR10","doi-asserted-by":"crossref","unstructured":"Zeng, D., Wei, D., Chau, M., &Wang, F. (2011). Domain-specific chinese word segmentation using suffix tree and mutual information. Information Systems Frontiers, doi: 10.1007\/s10796-010-9278-5 .","DOI":"10.1007\/s10796-010-9278-5"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-010-9293-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-010-9293-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-010-9293-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T19:37:13Z","timestamp":1559936233000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-010-9293-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,13]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["9293"],"URL":"https:\/\/doi.org\/10.1007\/s10796-010-9293-6","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,13]]}}}