{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:47Z","timestamp":1767340007355,"version":"3.40.3"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031456442"},{"type":"electronic","value":"9783031456459"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-45645-9_24","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T04:30:12Z","timestamp":1707798612000},"page":"249-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Diagnosis Model for Detection of e-threats Against Soft-Targets"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7036-5174","authenticated-orcid":false,"given":"S\u00f3nia M. A.","family":"Morgado","sequence":"first","affiliation":[]},{"given":"Margarida","family":"Carvalho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7260-9403","authenticated-orcid":false,"given":"S\u00e9rgio","family":"Felgueiras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"24_CR1","unstructured":"Laschi, M., Lombroso, C.: Le d\u00e9lit politique.\u00a0Actes du Premier Congr\u00e8s International d\u2019Anthropologie Criminelle, Rome 1885, pp. 379\u2013389, Bocca Fr\u00e9res, Turin (1886)"},{"key":"24_CR2","unstructured":"Calhoun, T., Weston, S.: Contemporary threat management. San Diego: Specialized Training Services (2003)"},{"key":"24_CR3","volume-title":"Mentally disordered offenders in pursuit of celebrities and politicians","author":"PE Dietz","year":"1989","unstructured":"Dietz, P.E., Martell, D.: Mentally disordered offenders in pursuit of celebrities and politicians. National Institute of Justice, Washington, DC (1989)"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1520\/JFS14457J","volume":"44","author":"R Fein","year":"1999","unstructured":"Fein, R., Vossekuil, B.: Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers. J. Forensic Sci. 44, 321\u2013333 (1999)","journal-title":"J. Forensic Sci."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Fein, R., Vossekuil, B., Holden, G.: Threat assessment: An approach to prevent targeted violence (NCJ 155000). Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice (1995)","DOI":"10.1037\/e517592006-001"},{"key":"24_CR6","first-page":"341","volume":"38","author":"PE Dietz","year":"2010","unstructured":"Dietz, P.E., Martell, D.: Commentary: approaching and stalking public figures\u2014a prerequisite to attack. J. Am. Acad. Psychiatry Law 38, 341\u2013348 (2010)","journal-title":"J. Am. Acad. Psychiatry Law"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1002\/bsl.999","volume":"30","author":"JR Meloy","year":"2012","unstructured":"Meloy, J.R., Hoffmann, J., Guldimann, A., James, D.: The role of warning behaviors in threat assessment: an exploration and suggested typology. Behav. Sci. Law 30, 256\u2013279 (2012). https:\/\/doi.org\/10.1002\/bsl.999","journal-title":"Behav. Sci. Law"},{"key":"24_CR8","unstructured":"Morgado, S.M.A., Felgueiras, S.: E-threats detection against public spaces and events. In: Yang, X.S., Sherratt, S., Dey, N., Joshi, A. (eds.) Proceedings of Eighth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems (Forthcoming). Springer, Singapore (2023)"},{"key":"24_CR9","unstructured":"Martins, M.: Ciberespa\u00e7o: uma Nova Realidade para a Seguran\u00e7a Internacional 5(133), 32\u201349 (2012). https:\/\/www.idn.gov.pt\/pt\/publicacoes\/nacao\/Documents\/NeD133\/NeD133.pdf"},{"key":"24_CR10","unstructured":"World Economic Forum: The Global Risks Report 2022: 17h Edition (2022). https:\/\/wef.ch\/risks22"},{"key":"24_CR11","doi-asserted-by":"publisher","unstructured":"Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021. Luxembourg: Publications Office of the European Union (2021). https:\/\/doi.org\/10.2813\/113799","DOI":"10.2813\/113799"},{"key":"24_CR12","unstructured":"European Comission: COM\/2017\/041 final. Fourth progress report towards an effective and genuine Security Union. Luxembourg, Publications Office of the EU (2017)"},{"key":"24_CR13","doi-asserted-by":"publisher","unstructured":"Zeman, T.: Soft targets: definition and identification. Acad. Appl. Res. Mil. Publ. Manag. Sci. 19(1), 109\u2013119 (2020). https:\/\/doi.org\/10.32565\/aarms.2020.1.10","DOI":"10.32565\/aarms.2020.1.10"},{"key":"24_CR14","unstructured":"Kalvach, Z.: Basics of soft targets protection\u2013guidelines. Soft Targets Protection Institute, Prague (2016)"},{"issue":"3","key":"24_CR15","first-page":"453","volume":"8","author":"P Be\u0148ov\u00e1","year":"2019","unstructured":"Be\u0148ov\u00e1, P., Ho\u0161kov\u00e1-Mayerov\u00e1, \u0160, Navr\u00e1til, J.: Terrorist attacks on selected soft targets. J. Secur. Sustain. Issues 8(3), 453\u2013471 (2019)","journal-title":"J. Secur. Sustain. Issues"},{"key":"24_CR16","doi-asserted-by":"publisher","unstructured":"Schmid, A.: Layers of preventive measures for soft target protection against terrorist attacks. In A. Schmid (ed.), Handbook of terrorism prevention and preparedness. The Hague, NL: ICCT Press (2020). https:\/\/doi.org\/10.19165\/2020.6.01","DOI":"10.19165\/2020.6.01"},{"key":"24_CR17","unstructured":"Europol: EU Terrorism situation & Trend report (TE-SAT) (2022). https:\/\/www.europol.europa.eu\/publications-events\/main-reports\/tesat-report"},{"key":"24_CR18","unstructured":"United Nations: A more secure world: Our shared responsibility. Report of the High-level Panel on Threats, Challenges and Change (2004). http:\/\/providus.lv\/article_files\/931\/original\/HLP_report_en.pdf?1326375616"},{"key":"24_CR19","doi-asserted-by":"publisher","unstructured":"Creppell, I.: The concept of normative threat. Int. Theor. 3(3), 450\u2013487 (2011). https:\/\/doi.org\/10.1017\/S1752971911000170","DOI":"10.1017\/S1752971911000170"},{"issue":"2","key":"24_CR20","first-page":"1","volume":"2020","author":"BN Urinov","year":"2020","unstructured":"Urinov, B.N.: Theoretical aspects of organizational behavior and corporate culture. Econ. Innovative Technol. 2020(2), 1\u20138 (2020)","journal-title":"Econ. Innovative Technol."},{"issue":"181","key":"24_CR21","first-page":"1167","volume":"I","author":"P Granjo","year":"2006","unstructured":"Granjo, P.: Quando o conceito de \u00abrisco\u00bb se torna perigoso. An\u00e1lise Social XL I(181), 1167\u20131179 (2006)","journal-title":"An\u00e1lise Social XL"},{"key":"24_CR22","unstructured":"Nunes, P.: Mundos virtuais, riscos reais: fundamentos para a defini\u00e7\u00e3o de uma Estrat\u00e9gia da Informa\u00e7\u00e3o Nacional. Revista Militar (2506), 1169\u20131198 (2010). https:\/\/www.revistamilitar.pt\/artigo\/608"},{"key":"24_CR23","volume-title":"Risk society towards a new modernity","author":"U Beck","year":"1992","unstructured":"Beck, U.: Risk society towards a new modernity, 2nd edn. Sage Publications, Newbury Park (1992)","edition":"2"},{"key":"24_CR24","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1016\/j.apergo.2012.05.009","volume":"44","author":"P Eachus","year":"2013","unstructured":"Eachus, P., Stedmon, A., Baillie, L.: Hostile intent in public crowded spaces: a field study. Appl. Ergonomic 44, 703\u2013709 (2013). https:\/\/doi.org\/10.1016\/j.apergo.2012.05.009","journal-title":"Appl. Ergonomic"},{"key":"24_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/9781444319514","volume-title":"The rise of the network society","author":"M Castells","year":"2009","unstructured":"Castells, M.: The rise of the network society, 2nd edn. Blackwell Publishing Ltd, New Jersey (2009)","edition":"2"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Alotaibi, A., Hasanat, M.H.A.: Racism detection in Twitter using deep learning and text mining techniques for the Arabic language. In: 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), pp. 161\u2013164. IEEE, Riyadh (2020)","DOI":"10.1109\/SMART-TECH49988.2020.00047"},{"key":"24_CR27","doi-asserted-by":"publisher","unstructured":"Khan H., Yu F., Sinha A., Gokhale S.: A Parsimonious and Practical Approach to Detecting Offensive Speech. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 688\u2013695. IEEE, Greater Noida (2021). https:\/\/doi.org\/10.1109\/ICCCIS51004.2021.9397140","DOI":"10.1109\/ICCCIS51004.2021.9397140"},{"key":"24_CR28","doi-asserted-by":"publisher","unstructured":"Mussiraliyeva, S., Bolatbek, M., Omarov, B., Medetbek, Z., Baispay, G., Ospanov, R.: On detecting online radicalization and extremism using natural language processing. In: 21st International Arab Conference on Information Technology (ACIT). IEEE, Giza (2020). https:\/\/doi.org\/10.1109\/ACIT50332.2020.9300086","DOI":"10.1109\/ACIT50332.2020.9300086"},{"key":"24_CR29","doi-asserted-by":"publisher","unstructured":"Aziz, N., Maarof M., Zainal, A.: Hate speech and offensive language detection: a new feature set with filter-embedded combining feature selection. In: The 3rd International Cyber Resilience Conference (CRC) IEEE, Ghent (2021). https:\/\/doi.org\/10.1109\/CRC50527.2021.9392486","DOI":"10.1109\/CRC50527.2021.9392486"},{"key":"24_CR30","unstructured":"Bujlow, T., Espa\u00f1ol C.V., Pareta S.J., Ros B.P.: Web Tracking: Mechanisms, Implications, and Defenses. ARXIV.ORG Digital Library (2015). https:\/\/www.researchgate.net\/publication\/280590332_Web_Tracking_Mechanisms_Implications_and_Defenses"},{"key":"24_CR31","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s10611-019-09877-y","volume":"73","author":"A Weert","year":"2019","unstructured":"Weert, A., Eijkman, Q.: Early detection of extremism? The local security professional on assessment of potential threats pose by youth. Crime Law Soc. Chang. 73, 491\u2013507 (2019). https:\/\/doi.org\/10.1007\/s10611-019-09877-y","journal-title":"Crime Law Soc. Chang."},{"key":"24_CR32","unstructured":"Morgado, S.M.A., Ferraz, R.: An\u00e1lise de conte\u00fado e pesquisa em ci\u00eancias policiais: Contextualiza\u00e7\u00e3o em ambiente virtual, facebook, e o planeamento de grandes eventos. In Costa, A. P., Tuzzo, S., Ruano, L., Silva, C. T., Souza, F. N, Souza, D. N. (eds.) CIAQ2016 \u2013 Investiga\u00e7\u00e3o Qualitativa em Ci\u00eancias Sociais, vol 3, pp. 600\u2013608, CIAQ, Lisboa (2016a)"},{"key":"24_CR33","unstructured":"Morgado, S.M.A., R. Ferraz, R.: Social media: facebook e a gest\u00e3o policial no planeamento de grandes eventos. International Journal of Marketing Communication and New Media (Special Number 1\u2014QRMCNM), 27\u201347 (2016b)"},{"key":"24_CR34","unstructured":"Morgado, S: Going Global: Health organizations and networking \u2013 information society and social media. In: Proceedings in Scientific Conference 2013, pp 47\u201351. Thomson, Slovakia (2013)"},{"key":"24_CR35","unstructured":"Morgado, S., Alfaro, R.: Technology embracement in objective driven police: UAV\u2019s in public security police in Portugal. In N. S. Teixeira, N. S., Oliveira, C. S. Lopes, M., Sardinha, B., Santos, A., Macedo, M. (eds.), International Conference on Risks, Security and Citizens: Proceedings\/Atas, pp. 298\u2013305. Set\u00fabal: Munic\u00edpio de Set\u00fabal (2017)"},{"key":"24_CR36","unstructured":"Mendes, S., Morgado, S.: Intelligence services intervention: Constraints in portuguese democratic state. In: N. S. Teixeira, N. S., Oliveira, C. S. Lopes, M., Sardinha, B., Santos, A., Macedo, M. (eds.), International Conference on Risks, Security and Citizens: Proceedings\/Atas, pp. 285\u2013297. Set\u00fabal: Munic\u00edpio de Set\u00fabal (2017)"},{"key":"24_CR37","unstructured":"Campbell, T.A.: Artificial intelligence: an overview of state initiatives. Future Grasp, LLC, Evergreen (2019)"},{"key":"24_CR38","unstructured":"Risi, F.T., Pera, A.: Artificial Intelligence in the field of criminal law. Special collection: Artificial Intelligence, pp. 6\u201317. UNICRI, Torino (2020)"},{"key":"24_CR39","doi-asserted-by":"publisher","unstructured":"Morgado, S.M.A., Felgueiras, S.: Technological Policing: Big Data versus Real Data. Politeia \u2013 Revista Portuguesa de Ci\u00eancias Policiais XIX, 139\u2013151 (2022). https:\/\/doi.org\/10.57776\/hkcb-br21","DOI":"10.57776\/hkcb-br21"},{"issue":"2","key":"24_CR40","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/23738871.2016.1228990","volume":"1","author":"P Bernal","year":"2016","unstructured":"Bernal, P.: Data gathering, surveillance and human rights: recasting the debate. J. Cyber Policy 1(2), 243\u2013264 (2016). https:\/\/doi.org\/10.1080\/23738871.2016.1228990","journal-title":"J. Cyber Policy"},{"issue":"1","key":"24_CR41","doi-asserted-by":"publisher","first-page":"205395172097788","DOI":"10.1177\/2053951720977882","volume":"8","author":"LE Bridges","year":"2021","unstructured":"Bridges, L.E.: Digital failure: Unbecoming the \u201cgood\u201d data subject through entropic, fugitive, and queer data. Big Data Soc. 8(1), 2053951720977882 (2021). https:\/\/doi.org\/10.1177\/2053951720977882","journal-title":"Big Data Soc."},{"issue":"1","key":"24_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10611-016-9678-7","volume":"68","author":"CB Sanders","year":"2017","unstructured":"Sanders, C.B., Sheptycki, J.: Policing, crime and \u2018big data\u2019; towards a critique of the moral economy of stochastic governance. Crime Law Soc. Chang. 68(1), 1\u201315 (2017). https:\/\/doi.org\/10.1007\/s10611-016-9678-7","journal-title":"Crime Law Soc. Chang."},{"key":"24_CR43","unstructured":"UNICRI: Strategic programme framework. UNICRI, Torino (2020)"},{"key":"24_CR44","doi-asserted-by":"publisher","unstructured":"Risse, M.: Human rights and artificial intelligence: an urgently needed agenda. Hum. Rights Q. 41(1), 1\u201316 (2019). https:\/\/doi.org\/10.1353\/hrq.2019.0000","DOI":"10.1353\/hrq.2019.0000"},{"key":"24_CR45","unstructured":"Council of Europe: CETS 005 - Convention for the Protection of Human Rights and Fundamental Freedoms (coe.int) (2019). https:\/\/rm.coe.int\/1680a2353d"},{"key":"24_CR46","doi-asserted-by":"publisher","unstructured":"Wakefield, A.: The public surveillance functions of private security. Surveill. Soc. 2(4) (2002). https:\/\/doi.org\/10.24908\/ss.v2i4.3362","DOI":"10.24908\/ss.v2i4.3362"},{"key":"24_CR47","unstructured":"Benson, B.L.: Crime control through private enterprise. Independent Rev. 2(3), 341\u2013371 (1998). http:\/\/www.jstor.org\/stable\/24561016"},{"key":"24_CR48","unstructured":"European Parliament, Council of the European Union: EU Directive 95\/46\/EC - on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:31995L0046"},{"issue":"1","key":"24_CR49","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1093\/idpl\/ipv028","volume":"6","author":"B Custers","year":"2016","unstructured":"Custers, B., Ur\u0161i\u010d, H.: Big data and data reuse: a taxonomy of data reuse for balancing big data benefits and personal data protection. Int. Data Privacy Law 6(1), 4\u201315 (2016). https:\/\/doi.org\/10.1093\/idpl\/ipv028","journal-title":"Int. Data Privacy Law"},{"issue":"1","key":"24_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1353\/hrq.2019.0000","volume":"41","author":"M Risse","year":"2019","unstructured":"Risse, M.: Human rights and artificial intelligence: an urgently needed agenda. Hum. Rights Q. 41(1), 1\u201316 (2019). https:\/\/doi.org\/10.1353\/hrq.2019.0000","journal-title":"Hum. Rights Q."},{"key":"24_CR51","unstructured":"Council of Europe: Council Framework Decision 2008\/977\/JHA - On the protection of personal data processed in the framework of police and judicial cooperation in criminal matters (2008). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32008F0977"},{"key":"24_CR52","doi-asserted-by":"publisher","unstructured":"European Commission. Directorate-General for Communications Networks, Content and Technology: Ethics guidelines for trustworthy AI, Publications Office (2019a). https:\/\/doi.org\/10.2759\/346720","DOI":"10.2759\/346720"},{"key":"24_CR53","unstructured":"European Commission. Directorate-General for Communications Networks, Content and Technology: Assessment List for Trustworthy Artificial Intelligence (ALTAI) for self-assessment. Publications Office (2020). https:\/\/digital-strategy.ec.europa.eu\/en\/library\/assessment-list-trustworthy-artificial-intelligence-altai-self-assessment"},{"key":"24_CR54","unstructured":"European Commission: Ethics by design and ethics of use approaches for artificial intelligence (2021). https:\/\/ec.europa.eu\/info\/funding-tenders\/opportunities\/docs\/2021-2027\/horizon\/guidance\/ethics-by-design-and-ethics-of-use-approaches-for-artificial-intelligence_he_en.pdf"},{"key":"24_CR55","doi-asserted-by":"crossref","unstructured":"Land, M.K., Aronson, J.D.: Human rights and technology: new challenges for justice and accountability. Ann. Rev. Law Soc. Sci. (Forthcoming) 16, 223\u2013240 (2020)","DOI":"10.1146\/annurev-lawsocsci-060220-081955"},{"key":"24_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106587","volume":"138","author":"Y Lei","year":"2020","unstructured":"Lei, Y., Yang, B., Jiang, X., Jia, F., Li, N., Nandi, A.K.: Applications of machine learning to machine fault diagnosis: a review and roadmap. Mech. Syst. Signal Process. 138, 106587 (2020). https:\/\/doi.org\/10.1016\/j.ymssp.2019.106587","journal-title":"Mech. Syst. Signal Process."},{"key":"24_CR57","doi-asserted-by":"crossref","unstructured":"Pfisterer, F., van Rijn, J.N., Probst, P., M\u00fcller, A.C., Bischl, B.: Learning multiple defaults for machine learning algorithms. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 241\u2013242. GECO, Kyoto (2021)","DOI":"10.1145\/3449726.3459523"},{"key":"24_CR58","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-030-72657-7_21","volume-title":"Trends and Applications in Information Systems and Technologies","author":"SMA Morgado","year":"2021","unstructured":"Morgado, S.M.A., Felgueiras, S.: Big Data in Policing: Profiling, patterns, and out of the box thinking. In: Rocha, \u00c1., Adeli, H., Dzemyda, G., Moreira, F., Ramalho Correia, A.M. (eds.) WorldCIST 2021. AISC, vol. 1365, pp. 217\u2013226. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72657-7_21"},{"issue":"1","key":"24_CR59","first-page":"30","volume":"9","author":"KCA Khanzode","year":"2020","unstructured":"Khanzode, K.C.A., Sarode, R.D.: Advantages and disadvantages of artificial intelligence and machine learning: a literature review. Int. J. Libr. Inf. Sci. (IJLIS) 9(1), 30\u201336 (2020)","journal-title":"Int. J. Libr. Inf. Sci. (IJLIS)"},{"key":"24_CR60","doi-asserted-by":"publisher","unstructured":"Ray, S.: A quick review of machine learning algorithms. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 35\u201339. IEEE, India (2019). https:\/\/doi.org\/10.1109\/COMITCon.2019.8862451","DOI":"10.1109\/COMITCon.2019.8862451"},{"key":"24_CR61","first-page":"1","volume":"1","author":"A Boin","year":"2010","unstructured":"Boin, A., Comfort, L.K., Demchak, C.C.: The rise of resilience. Designing Resilience Preparing Extreme Events 1, 1\u201312 (2010)","journal-title":"Designing Resilience Preparing Extreme Events"},{"key":"24_CR62","unstructured":"Pais, L.G., Felgueiras, S., Rodrigues, A., Santos, J., Varela, T.: Protesto pol\u00edtico e atividade policial: a perce\u00e7\u00e3o dos\u201d media\u201d.\u00a0An\u00e1lise Social 216(3\u00ba), 494\u2013517 (2015)"},{"key":"24_CR63","unstructured":"Beridze, I.: Foreword. Special collection: Artificial Intelligence. UNICRI, Torino (2020)"},{"key":"24_CR64","unstructured":"Felgueiras, S., Pais, L.G., Morgado, S.M.A.: Interoperability: Diagnosing a novel assess model. European Law Enforcement Research Bulletin, Special Conference Edition: Innovations in law enforcement: Implications for practice. Educ. Civ. Soc. (4), 255\u2013260 (2018). https:\/\/bulletin.cepol.europa.eu\/index.php\/bulletin\/article\/view\/339\/301"}],"container-title":["Lecture Notes in Networks and Systems","Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45645-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T03:26:43Z","timestamp":1741577203000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45645-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031456442","9783031456459"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45645-9_24","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}