{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:04:40Z","timestamp":1774551880700,"version":"3.50.1"},"reference-count":84,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/EEI-AUT\/28918\/2017"],"award-info":[{"award-number":["PTDC\/EEI-AUT\/28918\/2017"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Portugal 2020 Program","award":["CENTRO-01-0247-FEDER-113066"],"award-info":[{"award-number":["CENTRO-01-0247-FEDER-113066"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The usability of the events information on social media has been widely studied recently. Several surveys have reviewed the specific type of events on social media using various techniques. Most of the existing methods for event detection are segregated as they approach certain situations that limit the overall details of events happening consecutively on social media while ignoring the crucial relationship between the evolution of these events. Numerous events that materialize on the social media sphere every day before our eyes jeopardize people\u2019s safety and are referred to by using a high-level concept of dangerous events. The front of dangerous events is broad, yet no known work exists that fully addresses and approaches this issue. This work introduces the term dangerous events and defines its scope in terms of practicality to establish the origins of the events caused by the previous events and their respective relationship. Furthermore, it divides dangerous events into sentiment, scenario, and action-based dangerous events grouped on their similarities. The existing research and methods related to event detection are surveyed, including some available events datasets and knowledge-base to address the problem. Finally, the survey is concluded with suggestions for future work and possible related challenges.<\/jats:p>","DOI":"10.1007\/s13278-022-00980-y","type":"journal-article","created":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T20:02:47Z","timestamp":1666468967000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Detection of dangerous events on social media: a critical review"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3786-0744","authenticated-orcid":false,"given":"M. Luqman","family":"Jamil","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2337-0779","authenticated-orcid":false,"given":"Sebasti\u00e3o","family":"Pais","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0466-1618","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Cordeiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"980_CR1","unstructured":"Abdollahi S, Gottschalk S, Demidova E (2020) Eventkg+click: a dataset of language-specific event-centric user interaction traces. ArXiv arXiv:2010.12370"},{"key":"980_CR2","doi-asserted-by":"crossref","unstructured":"Abdukhamidov E, Juraev F, Abuhamad M, AbuHmed T (2021) An exploration of geo-temporal characteristics of users\u2019 reactions on social media during the pandemic. CoRR arXiv:1031.3032","DOI":"10.3390\/electronics11101648"},{"key":"980_CR3","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2020.916.935","author":"WZ AL-Dyani","year":"2020","unstructured":"AL-Dyani WZ, Ahmad FK, Kamaruddin SS (2020) A survey on event detection models for text data streams. J Comput Sci. https:\/\/doi.org\/10.3844\/jcssp.2020.916.935","journal-title":"J Comput Sci"},{"key":"980_CR4","doi-asserted-by":"publisher","unstructured":"Allan J, Papka R, Lavrenko V (1998) On-line new event detection and tracking. 37\u201345. https:\/\/doi.org\/10.1145\/290941.290954","DOI":"10.1145\/290941.290954"},{"key":"980_CR5","doi-asserted-by":"crossref","unstructured":"Arachie C, Gaur M, Anzaroot S, Groves W, Zhang K, Jaimes A (2019) Unsupervised detection of sub-events in large scale disasters. CoRR arXiv:1912.13332","DOI":"10.1609\/aaai.v34i01.5370"},{"issue":"11","key":"980_CR6","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1080\/1369118X.2016.1252410","volume":"20","author":"F Bailo","year":"2017","unstructured":"Bailo F, Vromen A (2017) Hybrid social and news media protest events: from #marchinmarch to #bustthebudget in australia. Inform. Commun. Soc. 20(11):1660\u20131679. https:\/\/doi.org\/10.1080\/1369118X.2016.1252410","journal-title":"Inform. Commun. Soc."},{"key":"980_CR7","doi-asserted-by":"crossref","unstructured":"Becker H, Iter D, Naaman M, Gravano L (2012) Identifying content for planned events across social media sites. In: Proceedings of the fifth acm international conference on web search and data mining. 533\u2013542. http:\/\/www.cs.columbia.edu\/texttildelow hila\/papers\/wsdm12-becker.pdf","DOI":"10.1145\/2124295.2124360"},{"key":"980_CR8","unstructured":"Benson E, Haghighi A, Barzilay R (2011) Event discovery in social media feeds. In: proceedings of the 49th annual meeting of the association for computational linguistics: human language technologies-volume 1:389\u2013398. https:\/\/www.aclweb.org\/anthology\/P11-1040\/"},{"key":"980_CR9","unstructured":"Chanda AK (2021) Efficacy of BERT embeddings on predicting disaster from twitter data. CoRR arXiv:2108.10698"},{"key":"980_CR10","doi-asserted-by":"publisher","first-page":"128494","DOI":"10.1109\/ACCESS.2021.3111035","volume":"9","author":"R Chandra","year":"2021","unstructured":"Chandra R, Saini R (2021) Biden vs trump: modeling us general elections using bert language model. IEEE Access 9:128494\u2013128505. https:\/\/doi.org\/10.1109\/ACCESS.2021.3111035","journal-title":"IEEE Access"},{"key":"980_CR11","doi-asserted-by":"crossref","unstructured":"Dai Z, Yang Z, Yang Y, Carbonell JG, Le QV, Salakhutdinov R (2019) Transformer-xl: attentive language models beyond a fixed-length context. CoRR arXiv:1901.02860","DOI":"10.18653\/v1\/P19-1285"},{"key":"980_CR12","doi-asserted-by":"publisher","unstructured":"Datar M, Immorlica N, Indyk P, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the Twentieth annual symposium on computational geometry. SCG \u201904, pp. 253\u2013262. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/997817.997857","DOI":"10.1145\/997817.997857"},{"key":"980_CR13","doi-asserted-by":"crossref","unstructured":"Demszky D, Garg N, Voigt R, Zou J, Gentzkow M, Shapiro J, Jurafsky D (2019) Analyzing polarization in social media: method and application to tweets on 21 mass shootings. CoRR arXiv:1904.01596","DOI":"10.18653\/v1\/N19-1304"},{"key":"980_CR14","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) BERT: pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805"},{"key":"980_CR15","unstructured":"Doxin S (2021) Social media: statistics & facts . https:\/\/www.statista.com\/topics\/1164\/social-networks\/#dossierSummary__chapter1"},{"key":"980_CR16","doi-asserted-by":"publisher","first-page":"68917","DOI":"10.1109\/ACCESS.2021.3074819","volume":"9","author":"L Dwarakanath","year":"2021","unstructured":"Dwarakanath L, Kamsin A, Rasheed RA, Anandhan A, Shuib L (2021) Automated machine learning approaches for emergency response and coordination via social media in the aftermath of a disaster: A review. IEEE Access 9:68917\u201368931. https:\/\/doi.org\/10.1109\/ACCESS.2021.3074819","journal-title":"IEEE Access"},{"key":"980_CR17","doi-asserted-by":"publisher","first-page":"68917","DOI":"10.1109\/ACCESS.2021.3074819","volume":"9","author":"L Dwarakanath","year":"2021","unstructured":"Dwarakanath L, Kamsin A, Rasheed RA, Anandhan A, Shuib L (2021) Automated machine learning approaches for emergency response and coordination via social media in the aftermath of a disaster: A review. IEEE Access 9:68917\u201368931. https:\/\/doi.org\/10.1109\/ACCESS.2021.3074819","journal-title":"IEEE Access"},{"key":"980_CR18","unstructured":"Euronews (2020) Germany slams attempt to storm Reichstag after COVID-19 protest. https:\/\/www.euronews.com\/2020\/08\/29\/thousands-of-anti-corona-protesters-flood-berlin"},{"key":"980_CR19","doi-asserted-by":"crossref","unstructured":"Fu X, Padmanabhan MR, Kumar RG, Basu S, Dorius S, Pavan A (2020) Measuring the impact of influence on individuals: roadmap to quantifying attitude. CoRR arXiv:2010.13304","DOI":"10.1109\/ASONAM49781.2020.9381300"},{"key":"980_CR20","doi-asserted-by":"publisher","unstructured":"GabAllah NA, Rafea A (2019) Unsupervised topic extraction from twitter: a feature-pivot approach. https:\/\/doi.org\/10.5220\/0007959001850192","DOI":"10.5220\/0007959001850192"},{"key":"980_CR21","unstructured":"Ge T, Cui L, Chang B, Sui Z, Wei F, Zhou M (2018) Eventwiki: a knowledge base of major events. In: LREC 2018. LREC 2018. https:\/\/www.microsoft.com\/en-us\/research\/publication\/eventwiki-knowledge-base-major-events\/"},{"key":"980_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139084789.002","volume-title":"Sentiment analysis: mining opinions, sentiments, and emotions","author":"KO Geddes","year":"2015","unstructured":"Geddes KO, Czapor SR, Labahn G (2015) Sentiment analysis: mining opinions, sentiments, and emotions. Cambridge University Press, Cambridge. https:\/\/doi.org\/10.1017\/CBO9781139084789.002"},{"key":"980_CR23","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.chb.2017.08.046","volume":"77","author":"M Hajarian","year":"2017","unstructured":"Hajarian M, Bastanfard A, Mohammadzadeh J, Khalilian M (2017) Introducing fuzzy like in social networks and its effects on advertising profits and human behavior. Comput Hum Behav 77:282\u2013293. https:\/\/doi.org\/10.1016\/j.chb.2017.08.046","journal-title":"Comput Hum Behav"},{"key":"980_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08057-3","author":"M Hajarian","year":"2019","unstructured":"Hajarian M, Bastanfard A, Mohammadzadeh J, Khalilian M (2019) Snefl: social network explicit fuzzy like dataset and its application for incel detection. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-08057-3","journal-title":"Multimedia Tools Appl"},{"key":"980_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00658-3","author":"AH Hossny","year":"2020","unstructured":"Hossny AH, Mitchell L, Lothian N, Osborne G (2020) Feature selection methods for event detection in twitter: a text mining approach. Social Netw Anal Min. https:\/\/doi.org\/10.1007\/s13278-020-00658-3","journal-title":"Social Netw Anal Min"},{"issue":"1","key":"980_CR26","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnlssr.2020.11.003","volume":"2","author":"L Huang","year":"2021","unstructured":"Huang L, Liu G, Chen T, Yuan H, Shi P, Miao Y (2021) Similarity-based emergency event detection in social media. J Saf Sci Resil 2(1):11\u201319. https:\/\/doi.org\/10.1016\/j.jnlssr.2020.11.003","journal-title":"J Saf Sci Resil"},{"issue":"1","key":"980_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-022-00882-z","volume":"12","author":"ML Jamil","year":"2022","unstructured":"Jamil ML, Pais S, Cordeiro J, Dias G (2022) Detection of extreme sentiments on social networks with bert. Soc Netw Anal Min 12(1):1\u201316","journal-title":"Soc Netw Anal Min"},{"issue":"11","key":"980_CR28","doi-asserted-by":"publisher","first-page":"15169","DOI":"10.1007\/s11042-018-6894-4","volume":"78","author":"H Jelodar","year":"2019","unstructured":"Jelodar H, Wang Y, Yuan C, Feng X, Jiang X, Li Y, Zhao L (2019) Latent dirichlet allocation (lda) and topic modeling: models, applications, a survey. Multimedia Tools Appl 78(11):15169\u201315211","journal-title":"Multimedia Tools Appl"},{"key":"980_CR29","doi-asserted-by":"crossref","unstructured":"Joachims T (1998) Text categorization with support vector machines: learning with many relevant features. https:\/\/www.cs.cornell.edu\/people\/tj\/publications\/joachims_98a.pdf","DOI":"10.1007\/BFb0026683"},{"key":"980_CR30","doi-asserted-by":"crossref","unstructured":"Joshi M, Chen D, Liu Y, Weld DS, Zettlemoyer L, Levy O (2019) Spanbert: improving pre-training by representing and predicting spans. CoRR arXiv:1907.10529","DOI":"10.1162\/tacl_a_00300"},{"key":"980_CR31","doi-asserted-by":"crossref","unstructured":"Khandpur RP, Ji T, Jan STK, Wang G, Lu C, Ramakrishnan N (2017) Crowdsourcing cybersecurity: cyber attack detection using social media. CoRR arXiv:1702.07745","DOI":"10.1145\/3132847.3132866"},{"issue":"5","key":"980_CR32","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1080\/14747731.2011.621287","volume":"8","author":"HH Khondker","year":"2011","unstructured":"Khondker HH (2011) Role of the new media in the arab spring. Globalizations 8(5):675\u2013679. https:\/\/doi.org\/10.1080\/14747731.2011.621287","journal-title":"Globalizations"},{"key":"980_CR33","doi-asserted-by":"crossref","unstructured":"Kibanov M, Stumme G, Amin I, Lee JG (2017) Mining social media to inform peatland fire and haze disaster management. CoRR arXiv:1706.05406","DOI":"10.1007\/s13278-017-0446-1"},{"key":"980_CR34","doi-asserted-by":"crossref","unstructured":"Kong Q, Booth E, Bailo F, Johns A, Rizoiu M-A (2021) Slipping to the extreme: a mixed method to explain how extreme opinions infiltrate online discussions. arXiv arXiv:2109.00302","DOI":"10.1609\/icwsm.v16i1.19312"},{"key":"980_CR35","doi-asserted-by":"publisher","unstructured":"Kuzey E, Vreeken J, Weikum G (2014) A fresh look on knowledge bases: distilling named events from news. In: Proceedings of the 23rd ACM international conference on conference on information and knowledge management. CIKM \u201914, pp. 1689\u20131698. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/2661829.2661984","DOI":"10.1145\/2661829.2661984"},{"key":"980_CR36","doi-asserted-by":"publisher","unstructured":"Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? https:\/\/doi.org\/10.1145\/1772690.1772751","DOI":"10.1145\/1772690.1772751"},{"issue":"1","key":"980_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-021-00847-8","volume":"12","author":"E Lenihan","year":"2022","unstructured":"Lenihan E (2022) A classification of antifa twitter accounts based on social network mapping and linguistic analysis. Soc Netw Anal Min 12(1):1\u201310","journal-title":"Soc Netw Anal Min"},{"key":"980_CR38","doi-asserted-by":"crossref","unstructured":"Li R, Lei KH, Khadiwala R, Chen-Chuan Chang K (2012) TEDAS: a twitter-based event detection and analysis system. data engineering (icde). In: 2012 IEEE 28th international conference on, 1273\u20131276. https:\/\/experts.illinois.edu\/en\/publications\/tedas-a-twitter-based-event-detection-and-analysis-system","DOI":"10.1109\/ICDE.2012.125"},{"key":"980_CR39","unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V (2019) Roberta: a robustly optimized BERT pretraining approach. CoRR arXiv:1907.11692"},{"key":"980_CR40","doi-asserted-by":"publisher","unstructured":"Liu J, Singhal T, Blessing LTM, Wood KL, Lim KH (2021) Crisisbert: a robust transformer for crisis classification and contextual crisis embedding. In: Proceedings of the 32nd ACM conference on hypertext and social media. HT \u201921, pp. 133\u2013141. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3465336.3475117","DOI":"10.1145\/3465336.3475117"},{"key":"980_CR41","doi-asserted-by":"publisher","unstructured":"Li Z, Wang B, Li M, Ma W-Y (2005) A probabilistic model for retrospective news event detection. In: Proceedings of the 28th annual international ACM SIGIR conference on research and development in information retrieval. SIGIR \u201905, pp. 106\u2013113. Association for Computing Machinery, New York, NY, USA . https:\/\/doi.org\/10.1145\/1076034.1076055","DOI":"10.1145\/1076034.1076055"},{"key":"980_CR42","doi-asserted-by":"crossref","unstructured":"Mehrotra R, Sanner S, Buntine W, Xie L (2013) Improving lda topic models for microblogs via tweet pooling and automatic labeling. In: Proceedings of the 36th international acm sigir conference on research and development in information retrieval. 889\u2013892. https:\/\/dl.acm.org\/doi\/10.1145\/2484028.2484166","DOI":"10.1145\/2484028.2484166"},{"key":"980_CR43","unstructured":"Merriam-Webster (2021) Dangerous . https:\/\/www.merriam-webster.com\/dictionary\/dangerous"},{"key":"980_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-021-00855-8","author":"C Messaoudi","year":"2022","unstructured":"Messaoudi C, Guessoum Z, Romdhane L (2022) Opinion mining in online social media: a survey. Social Netw Anal Min. https:\/\/doi.org\/10.1007\/s13278-021-00855-8","journal-title":"Social Netw Anal Min"},{"issue":"8","key":"980_CR45","doi-asserted-by":"publisher","first-page":"34705","DOI":"10.2196\/34705","volume":"24","author":"H Metzler","year":"2022","unstructured":"Metzler H, Baginski H, Niederkrotenthaler T, Garcia D (2022) Detecting potentially harmful and protective suicide-related content on twitter: machine learning approach. J Med Internet Res 24(8):34705. https:\/\/doi.org\/10.2196\/34705","journal-title":"J Med Internet Res"},{"key":"980_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3106705","author":"A Minoofam","year":"2021","unstructured":"Minoofam A, Bastanfard A, Keyvanpour M (2021) Trcla: a transfer learning approach to reduce negative transfer for cellular learning automata. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2021.3106705","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"980_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00681-4","author":"I Moutidis","year":"2020","unstructured":"Moutidis I, Williams H (2020) Good and bad events: combining network-based event detection with sentiment analysis. Social Netw Anal Min. https:\/\/doi.org\/10.1007\/s13278-020-00681-4","journal-title":"Social Netw Anal Min"},{"key":"980_CR48","unstructured":"Murarka A, Radhakrishnan B, Ravichandran S (2020) Detection and classification of mental illnesses on social media using roberta. CoRR arXiv:2011.11226"},{"key":"980_CR49","unstructured":"Ng LHX, Cruickshank IJ, Carley KM (2021) Coordinating narratives and the capitol riots on parler. ArXiv arXiv:2109.00945"},{"key":"980_CR50","unstructured":"Nourbakhsh A, Li Q, Liu X, Shah S (2017) \u201dBreaking\u201d disasters: predicting and characterizing the global news value of natural and man-made disasters"},{"key":"980_CR51","unstructured":"Pacheco D, Hui P, Torres-Lugo C, Truong BT, Flammini A, Menczer F (2020) Uncovering coordinated networks on social media. CoRR arXiv:2001.05658"},{"key":"980_CR52","doi-asserted-by":"publisher","unstructured":"Pais S, Tanoli IK, Albardeiro M, Cordeiro J (2020) Unsupervised approach to detect extreme sentiments on social networks. In: 2020 IEEE\/ACM International conference on advances in social networks analysis and mining (ASONAM), pp. 651\u2013658. https:\/\/doi.org\/10.1109\/ASONAM49781.2020.9381420","DOI":"10.1109\/ASONAM49781.2020.9381420"},{"key":"980_CR53","unstructured":"Petrovic S, Osborne M, Lavrenko V (2010) Streaming first story detection with application to twitter. In: Human language technologies: The 2010 annual conference of the north american chapter of the association for computational linguistics, 181\u2013189 . https:\/\/dl.acm.org\/doi\/10.5555\/1857999.1858020"},{"key":"980_CR54","unstructured":"Plaza-del-Arco FM, Halat S, Pad\u00f3 S, Klinger R (2021) Multi-task learning with sentiment, emotion, and target detection to recognize hate speech and offensive language. 2109\u201310255 arXiv:2109.10255 [cs.CL]"},{"issue":"10","key":"980_CR55","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1007\/s11431-020-1647-3","volume":"63","author":"X Qiu","year":"2020","unstructured":"Qiu X, Sun T, Xu Y, Shao Y, Dai N, Huang X (2020) Pre-trained models for natural language processing: a survey. Sci China E Technol Sci 63(10):1872\u20131897. https:\/\/doi.org\/10.1007\/s11431-020-1647-3arXiv:2003.08271","journal-title":"Sci China E Technol Sci"},{"key":"980_CR56","unstructured":"Radford A, Narasimhan K, Salimans T, Sutskever I, et al (2018) Improving language understanding by generative pre-training"},{"key":"980_CR57","doi-asserted-by":"crossref","unstructured":"Re F, Vegh D, Atzenhofer D, Stoehr N (2021) Team \u201cdadefrni\u201d at case 2021 task 1: document and sentence classification for protest event detection. In: Proceedings of the 4th workshop on challenges and applications of automated extraction of socio-political events from text (CASE 2021), pp. 171\u2013178","DOI":"10.18653\/v1\/2021.case-1.22"},{"key":"980_CR58","doi-asserted-by":"publisher","unstructured":"Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake shakes twitter users: real-time event detection by social sensors. 851\u2013860 . https:\/\/doi.org\/10.1145\/1772690.1772777","DOI":"10.1145\/1772690.1772777"},{"key":"980_CR59","doi-asserted-by":"crossref","unstructured":"Salas A, Georgakis P, Petalas Y (2017) Incident detection using data from social media. https:\/\/ieeexplore.ieee.org\/document\/8317967","DOI":"10.1109\/ITSC.2017.8317967"},{"key":"980_CR60","unstructured":"Sanh V, Debut L, Chaumond J, Wolf T (2019) Distilbert, a distilled version of BERT: smaller, faster, cheaper and lighter. CoRR arXiv:1910.01108"},{"key":"980_CR61","doi-asserted-by":"publisher","unstructured":"Savargiv M, Bastanfard A (2013) Text material design for fuzzy emotional speech corpus based on persian semantic and structure. In: 2013 International conference on fuzzy theory and its applications (iFUZZY), pp. 380\u2013384 . https:\/\/doi.org\/10.1109\/iFuzzy.2013.6825469","DOI":"10.1109\/iFuzzy.2013.6825469"},{"key":"980_CR62","unstructured":"Schinas M, Papadopoulos S, Kompatsiaris Y, Mitkas P (2018) Event detection and retrieval on social media. arXiv:1807.03675"},{"key":"980_CR63","doi-asserted-by":"publisher","first-page":"6300","DOI":"10.1016\/j.eswa.2010.11.069","volume":"38","author":"Shi","year":"2011","unstructured":"Shi et al (2011) Rough set and ensemble learning based semi-supervised algorithm for text classification. Expert Syst Appl 38:6300\u20136306. https:\/\/doi.org\/10.1016\/j.eswa.2010.11.069","journal-title":"Expert Syst Appl"},{"key":"980_CR64","doi-asserted-by":"crossref","unstructured":"Subasic I, Berendt B (2011) Peddling or creating? Investigating the role of twitter in news reporting. In: European conference on information retrieval, 207\u2013213. https:\/\/dl.acm.org\/doi\/10.5555\/1996889.1996916","DOI":"10.1007\/978-3-642-20161-5_21"},{"key":"980_CR65","unstructured":"Sundaram YW, HaX L (2012) Social event detection with interaction graph modeling. In: Proceedings of the 20th acm international conference on multimedia, 865\u2013868. (2012). https:\/\/dl.acm.org\/doi\/10.1145\/2393347.2396332"},{"key":"980_CR66","doi-asserted-by":"publisher","unstructured":"Tan L (2015) The art and science of analyzing software data. 493\u2013517. https:\/\/doi.org\/10.1016\/B978-0-12-411519-4.00017-3","DOI":"10.1016\/B978-0-12-411519-4.00017-3"},{"key":"980_CR67","doi-asserted-by":"crossref","unstructured":"Tanase M, Cercel D, Chiru C (2020) UPB at semeval-2020 task 12: multilingual offensive language detection on social media by fine-tuning a variety of bert-based models. CoRR arXiv:2010.13609","DOI":"10.18653\/v1\/2020.semeval-1.296"},{"key":"980_CR68","doi-asserted-by":"crossref","unstructured":"Vapnik VN (1995) The nature of statistical learning theory. https:\/\/www.springer.com\/gp\/book\/9780387987804","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"980_CR69","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. arXiv:1706.03762"},{"key":"980_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.datak.2013.08.006","volume":"88","author":"KN Vavliakis","year":"2013","unstructured":"Vavliakis KN, Symeonidis AL, Mitkas PA (2013) Event identification in web social media through named entity recognition and topic modeling. Data Knowledge Eng 88:1\u201324. https:\/\/doi.org\/10.1016\/j.datak.2013.08.006","journal-title":"Data Knowledge Eng"},{"key":"980_CR71","doi-asserted-by":"crossref","unstructured":"Wang X, Wang Z, Han X, Jiang W, Han R, Liu Z, Li J, Li P, Lin Y, Zhou J (2020) MAVEN: a massive general domain event detection dataset. In: Proceedings of EMNLP 2020","DOI":"10.18653\/v1\/2020.emnlp-main.129"},{"key":"980_CR72","doi-asserted-by":"crossref","unstructured":"Webb GI, Sammut C (2010) Encyclopedia of machine learning. 30\u201345. https:\/\/link.springer.com\/referenceworkentry\/10.1007\/978-0-387-30164-8_576","DOI":"10.1007\/978-0-387-30164-8"},{"key":"980_CR73","unstructured":"Weiler A, Grossniklaus M, Scholl MH (2014) Event identification and tracking in social media streaming data edbt\/icdt. 282\u2013287. https:\/\/kops.uni-konstanz.de\/handle\/123456789\/27471"},{"key":"980_CR74","unstructured":"Wens Js, Sung Lee B (2011) Event detection in twitter. icwsm, 11: 401-408. (2011). https:\/\/www.researchgate.net\/publication\/221297914_Event_Detection_in_Twitter"},{"key":"980_CR75","unstructured":"Wikipedia (2021) 2021 Bangladesh communal violence. https:\/\/en.wikipedia.org\/wiki\/2021_Bangladesh_communal_violence"},{"key":"980_CR76","unstructured":"Wu Y, Schuster M, Chen Z, Le QV, Norouzi M, Macherey W, Krikun M, Cao Y, Gao Q, Macherey K, Klingner J, Shah A, Johnson M, Liu X, Kaiser L, Gouws S, Kato Y, Kudo T, Kazawa H, Stevens K, Kurian G, Patil N, Wang W, Young C, Smith J, Riesa J, Rudnick A, Vinyals O, Corrado G, Hughes M, Dean J (2016) Google\u2019s neural machine translation system: bridging the gap between human and machine translation. CoRR arXiv:1609.08144"},{"key":"980_CR77","unstructured":"Lafferty et al. (2001) Conditional random fields: Probabilistic models for segmenting and labeling sequence data. https:\/\/repository.upenn.edu\/cgi\/viewcontent.cgi?article=1162 &context=cis_papers"},{"key":"980_CR78","doi-asserted-by":"crossref","unstructured":"Yamaguchi A, Chrysostomou G, Margatina K, Aletras N (2021) Frustratingly simple pretraining alternatives to masked language modeling. CoRR arXiv:2109.01819","DOI":"10.18653\/v1\/2021.emnlp-main.249"},{"key":"980_CR79","unstructured":"Yang Z, Dai Z, Yang Y, Carbonell JG, Salakhutdinov R, Le QV (2019) Xlnet: generalized autoregressive pretraining for language understanding. CoRR arXiv:1906.08237"},{"key":"980_CR80","unstructured":"Yang Y, Hu X, Liu H, Zhang J, Li Z, Yu PS (2018) Understanding and monitoring human trafficking via social sensors: a sociological approach. CoRR arXiv:1805.10617"},{"key":"980_CR81","doi-asserted-by":"crossref","unstructured":"Yu S, Wu B (2018) Exploiting structured news information to improve event detection via dual-level clustering. In: 2018 IEEE third international conference on data science in cyberspace (dsc), 873\u2013880. https:\/\/ieeexplore.ieee.org\/document\/8411961","DOI":"10.1109\/DSC.2018.00140"},{"key":"980_CR82","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2022.101824","volume":"95","author":"B Zhou","year":"2022","unstructured":"Zhou B, Zou L, Mostafavi A, Lin B, Yang M, Gharaibeh N, Cai H, Abedin J, Mandal D (2022) Victimfinder: harvesting rescue requests in disaster response from social media with bert. Comput Environ Urban Syst 95:101824. https:\/\/doi.org\/10.1016\/j.compenvurbsys.2022.101824","journal-title":"Comput Environ Urban Syst"},{"key":"980_CR83","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jiang J, Chen X, Wang W (2021) #stayhome or #marathon? Social media enhanced pandemic surveillance on spatial-temporal dynamic graphs. CoRR arXiv:2108.03670","DOI":"10.1145\/3459637.3482222"},{"key":"980_CR84","doi-asserted-by":"crossref","unstructured":"Zhu W, Bhat S (2021) Euphemistic phrase detection by masked language model. ArXiv arXiv:2109.04666","DOI":"10.18653\/v1\/2021.findings-emnlp.16"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00980-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-022-00980-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00980-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T13:40:23Z","timestamp":1672666823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-022-00980-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,22]]},"references-count":84,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["980"],"URL":"https:\/\/doi.org\/10.1007\/s13278-022-00980-y","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,22]]},"assertion":[{"value":"17 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships or conflicts of interest that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that they have no known ethics issue that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The author's consent participates.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The author's consent publication.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"154"}}