{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T16:32:01Z","timestamp":1745857921781},"reference-count":84,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Quantitative Linguistics"],"published-print":{"date-parts":[[2019,1,2]]},"DOI":"10.1080\/09296174.2017.1405719","type":"journal-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T10:27:18Z","timestamp":1512556038000},"page":"1-21","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":10,"title":["The Stylometric Impacts of Ageing and Life Events on Identity"],"prefix":"10.1080","volume":"26","author":[{"given":"David","family":"Kernot","sequence":"first","affiliation":[{"name":"National Security College, The Australian National University, Canberra, Australia"},{"name":"Defence Science &amp; Technology Group, Edinburgh, Australia"}]},{"given":"Terry","family":"Bossomaier","sequence":"additional","affiliation":[{"name":"The Centre for Research in Complex Systems, Charles Sturt University, Bathurst, Australia"}]},{"given":"Roger","family":"Bradbury","sequence":"additional","affiliation":[{"name":"National Security College, The Australian National University, Canberra, Australia"}]}],"member":"301","published-online":{"date-parts":[[2017,12,6]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1093\/brain\/awt269"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0111445"},{"issue":"58","key":"CIT0003","volume":"23","author":"Argamon S.","year":"2003","journal-title":"Text"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1145\/1461928"},{"key":"CIT0005","volume-title":"Elegy for Iris","author":"Bayley J.","year":"1998"},{"key":"CIT0006","volume-title":"Iris: A memoir of Iris Murdoch","author":"Bayley J.","year":"1999"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1006\/brln.2000.2293"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1177\/0956797614566658"},{"key":"CIT0009","unstructured":"Brewer, W. F. (1984). The story schema: Universal and culture-specific properties. Center for the Study of Reading Technical Report; no. 322."},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.40.2.540"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/07351692209349017"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2007.04.006"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1037\/lhb0000102"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0802430105"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1890\/11-0889.1"},{"key":"CIT0017","volume-title":"Defence White Paper","author":"Department of Defence","year":"2016"},{"key":"CIT0018","volume-title":"Never Mind about the Bourgeoisie: The Correspondence between Iris Murdoch and Brian Medlin 1976 \u2013 1995","author":"Dooley G.","year":"2014"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1038\/nature09389"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.cortex.2013.05.012"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1093\/cercor\/bhv020"},{"issue":"1","key":"CIT0022","first-page":"1","volume":"6","author":"Frantzeskou G.","year":"2007","journal-title":"International Journal of Digital Evidence"},{"key":"CIT0023","unstructured":"Fuentes, K. M. (2016). Cyberterrorism: The use of social networking to recruit Westerners an informational guide for law enforcement agencies (Doctoral dissertation). UTICA COLLEGE."},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.jneuroling.2008.07.006"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1093\/brain\/awh341"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0801_3"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1111\/j.1461-0248.2008.01160.x"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1177\/0956797614567339"},{"key":"CIT0029","first-page":"3","author":"Hirsch B. D.","year":"2014","journal-title":"The Shakespeare International Year book"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1080\/0013838X.2012.668789"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.03.006"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1353\/shq.2006.0073"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqq001"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1561\/1500000005"},{"key":"CIT0036","unstructured":"Kernot, D. (2013). The identification of authors using cross document co-referencing. MPhil thesis. The University of New South Wales. Nov 2013."},{"key":"CIT0037","volume-title":"Data and Decision Sciences in Action: Proceedings of the Australian Society for Operations Research Conference 2016","author":"Kernot D.","year":"2016"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1080\/09296174.2017.1304049"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.4236\/ojml.2017.71002"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080301"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(73)90036-4"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.3138\/9781442686328"},{"key":"CIT0044","volume-title":"19th Annual Rotman Research Institute Conference, Cognitive Aging: Research and Practice","author":"Lancashire I.","year":"2009"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X13001581"},{"key":"CIT0046","unstructured":"Layton, R. M. (2016). An examination of how law enforcement assess precursors of radicalization by observing the social media content of potential terrorists: A qualitative case study (Doctoral dissertation). Northcentral University."},{"key":"CIT0047","unstructured":"Le, X. (2010). Longitudinal detection of dementia through lexical and syntactic changes in writing (Master\u2019s thesis). Department of Computer Science, University of Toronto. http:\/\/ftp.cs.totonto.edu\/pub\/gh\/Lan"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqr013"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1037\/1045-3830.22.4.557"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0504_1"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.2.558"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1057\/9780230282964"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1139\/p67-165"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213004001466"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/8.4.203"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/9.1.1"},{"key":"CIT0057","volume-title":"The science of words","author":"Miller G. A.","year":"1995"},{"key":"CIT0058","volume-title":"Living on paper: Letters from Iris Murdoch 1934-1995","author":"Murdoch I.","year":"2015"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2005.12.002"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-010-0037-9"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-4079(11)62167-2"},{"key":"CIT0062","volume-title":"Linguistic inquiry and word count: LIWC2015","author":"Pennebaker J.W.","year":"2015"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.54.101601.145041"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1192\/bjp.168.5.545"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1212\/WNL.0000000000001774"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2016.05.06"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1038\/517420a"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1016\/j.schres.2015.04.023"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1023\/A:1001018624850"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1080\/0013838X.2012.668785"},{"key":"CIT0071","first-page":"307","volume":"5","author":"Rudman J.","year":"2016","journal-title":"Journal of Early Modern Studies"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1038\/517419a"},{"key":"CIT0073","first-page":"1","author":"Segarra S.","year":"2017","journal-title":"Digital Scholarship in the Humanities"},{"key":"CIT0074","volume-title":"Early warning signals of tipping-points in blog posts","author":"Slater D.","year":"2012"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1001\/jama.1996.03530310034029"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v60:3"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.3115\/1117794.1117802"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1016\/j.copbio.2014.11.020"},{"key":"CIT0079","unstructured":"Turner, A. & Greene, E. (1977). The construction and use of a propositional text base (Technical Report 63). Boulder, CO: University of Colorado, Institute for the Study of Intellectual Behavior."},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1023\/A:1001749303137"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-010-0038-8"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1312114110"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.1179\/174327908X392852"},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.1016\/j.cortex.2013.10.010"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1353\/shq.2011.0004"},{"key":"CIT0086","volume-title":"Iris Murdoch as I knew her","author":"Wilson A. N.","year":"2004"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuropsychologia.2015.01.034"}],"container-title":["Journal of Quantitative Linguistics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09296174.2017.1405719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T08:14:57Z","timestamp":1545120897000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09296174.2017.1405719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,6]]},"references-count":84,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,12,6]]},"published-print":{"date-parts":[[2019,1,2]]}},"alternative-id":["10.1080\/09296174.2017.1405719"],"URL":"https:\/\/doi.org\/10.1080\/09296174.2017.1405719","relation":{},"ISSN":["0929-6174","1744-5035"],"issn-type":[{"value":"0929-6174","type":"print"},{"value":"1744-5035","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,6]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=njql20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=njql20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2017-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}