{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:41:11Z","timestamp":1777045271014,"version":"3.51.4"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1109\/asonam49781.2020.9381415","type":"proceedings-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T20:17:37Z","timestamp":1616617057000},"page":"322-326","source":"Crossref","is-referenced-by-count":8,"title":["Against the Others! Detecting Moral Outrage in Social Media Networks"],"prefix":"10.1109","author":[{"given":"Wienke","family":"Strathern","sequence":"first","affiliation":[]},{"given":"Mirco","family":"Schoenfeld","sequence":"additional","affiliation":[]},{"given":"Raji","family":"Ghawi","sequence":"additional","affiliation":[]},{"given":"Juergen","family":"Pfeffer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2002.1003702"},{"key":"ref30","article-title":"The Development and Psychometric Properties of LIWC2015","author":"pennebaker","year":"2015","journal-title":"The University of Texas at Austin"},{"key":"ref10","article-title":"The psychological meaning of words: Liwc and computerized text analysis methods","author":"tausczik","year":"2009","journal-title":"Journal of Language and Social Psychology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-2166(01)00063-7"},{"key":"ref12","first-page":"xii","article-title":"The secret life of pronouns: What our words say about us, ser. The secret life of pronouns: What our words say about us","author":"pennebaker","year":"2011","journal-title":"Bloomsbury Press\/Bloomsbury Publishing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1618923114"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0142390"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.160162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/0003122417733673"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41636-6_28"},{"key":"ref18","author":"hennig","year":"2012","journal-title":"Studying Social Networks A Guide to Empirical Research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1214\/09-AOAS313"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/0022242918822300"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155923"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2012.737745"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2808828"},{"key":"ref6","article-title":"Detecting Online Firestorms in Social Media","author":"drasch","year":"0","journal-title":"ICIS 2015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052665"},{"key":"ref5","article-title":"Restricting the spread of firestorms in social networks","author":"mochalova","year":"0","journal-title":"ECIS 2014 Proceedings"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/12460125.2014.886494"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817741883"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/13527266.2013.797778"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0213-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.412"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568043"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.21307\/joss-2019-031","article-title":"Detecting change in longitudinal social networks","volume":"12 3","author":"mcculloh","year":"2011","journal-title":"Journal of Social Structure"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2017.01.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176343001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/2529204"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2001.838216"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-8240(89)80047-3"}],"event":{"name":"2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"The Hague, Netherlands","start":{"date-parts":[[2020,12,7]]},"end":{"date-parts":[[2020,12,10]]}},"container-title":["2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9381192\/9381291\/09381415.pdf?arnumber=9381415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T10:34:34Z","timestamp":1671705274000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9381415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/asonam49781.2020.9381415","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]}}}