{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T06:31:15Z","timestamp":1771050675916,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1109\/asonam49781.2020.9381387","type":"proceedings-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T16:17:37Z","timestamp":1616602657000},"page":"720-726","source":"Crossref","is-referenced-by-count":7,"title":["Introducing Digital-7 Threat Assessment of Individuals in Digital Environments"],"prefix":"10.1109","author":[{"given":"Amendra","family":"Shrestha","sequence":"first","affiliation":[]},{"given":"Nazar","family":"Akrami","sequence":"additional","affiliation":[]},{"given":"Lisa","family":"Kaati","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.19165\/2019.1.08","article-title":"The practitioner's guide to the galaxy-a comparison of risk assessment tools for violent extremism","author":"van der heide","year":"2019","journal-title":"ICCT Research paper"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/spc3.12018"},{"key":"ref11","first-page":"193","article-title":"Detecting potential warning behaviors of ideological radicalization in an alt-right subreddit","author":"grover","year":"0","journal-title":"Proceedings of the Thirteenth International Conference on Web and Social Media ICWSM 2019 Munich Germany June 11&#x2013;14 2019"},{"key":"ref12","article-title":"Across the universe? a comparative analysis of violent radicalization across three offender types with implications for criminal justice training and education","author":"horgan","year":"2016","journal-title":"National Criminal Justice Reference System"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-1759-7.ch118"},{"key":"ref14","article-title":"Ensamagerande valdsverkare. profiler, riskbedomningar och digitala spar","author":"kaati","year":"2019","journal-title":"Swedish Defence Research Agency FOI-R-4736-SE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCF.2016.7740427"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0152"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1992.tb00970.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2458\/v3i2.16477"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1037\/tam0000061"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1037\/tam0000143"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3343521"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006244"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12365"},{"key":"ref6","author":"calhoun","year":"2003","journal-title":"Contemporary threat management A guide for identifying assessing and managing individuals of violent intent"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.218"},{"key":"ref5","article-title":"Mechanisms of political radicalization: Pathways toward terrorism","volume":"20","author":"c","year":"2008","journal-title":"Terrorism and Political Violence"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2014.849948"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2020.1718661"},{"key":"ref2","author":"allport","year":"1961","journal-title":"Pattern and growth in personality"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745448"},{"key":"ref1","author":"akrami","year":"2018","journal-title":"Assessment of risk in written communication Introducing the profile risk assessmenttool(PRAT)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/bsl.999"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(02)00505-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/bsl.986"},{"key":"ref24","author":"pennebaker","year":"2008","journal-title":"Computerized text analysis of al-Qaeda transcripts"},{"key":"ref23","author":"pennebaker","year":"2011","journal-title":"The Secret Life of Pronouns What Our Words Say about Us"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIS.2010.037540"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ADA564471"}],"event":{"name":"2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"The Hague, Netherlands","start":{"date-parts":[[2020,12,7]]},"end":{"date-parts":[[2020,12,10]]}},"container-title":["2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9381192\/9381291\/09381387.pdf?arnumber=9381387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T18:33:14Z","timestamp":1698085994000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9381387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/asonam49781.2020.9381387","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]}}}