{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T06:31:26Z","timestamp":1771050686803,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006244","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T06:05:34Z","timestamp":1582610734000},"page":"4755-4762","source":"Crossref","is-referenced-by-count":5,"title":["PRAT - a Tool for Assessing Risk in Written Communication"],"prefix":"10.1109","author":[{"given":"Amendra","family":"Shrestha","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Kaati","sequence":"additional","affiliation":[]},{"given":"Nazar","family":"Akrami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Neural Information Processing Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2981-0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/10576100490483679"},{"key":"ref10","author":"gunning","year":"1952","journal-title":"The Technique of Clear Writing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.22"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCF.2016.7740427"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0152"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/09546550802073367"},{"key":"ref15","first-page":"4","article-title":"Characteristics of lone-wolf violent offenders: A comparison of assassins and school attackers","author":"mccauley","year":"2013","journal-title":"Perspectives on Terrorism"},{"key":"ref16","author":"mccauley","year":"2016","journal-title":"Friction How conflict radicalizes them and us"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.52.5.509"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1992.tb00970.x"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1002\/bsl.986","article-title":"The concept of leakage in threat assessment","volume":"4","author":"meloy","year":"2011","journal-title":"Behavioral Sciences &amp; the Law"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6916.2007.00047.x"},{"key":"ref4","article-title":"Universal sentence encoder","volume":"abs 1803 11175","author":"cer","year":"2018","journal-title":"CoRR"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/bsl.999"},{"key":"ref3","author":"bj\u00f6rnsson","year":"1968","journal-title":"L&#x00E4;sbarhet"},{"key":"ref6","article-title":"Detecting linguistic markers for radical violence in social media","author":"cohen","year":"2013","journal-title":"Terrorism and Political Violence"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIS.2010.037540"},{"key":"ref5","first-page":"332","article-title":"Using computerized text analysis to assess threatening communications and actual behavior","author":"chung","year":"2011","journal-title":"Threatening communications and behavior Perspectives in the pursuit of public figures"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1037\/h0057532"},{"key":"ref7","author":"dale","year":"1977","journal-title":"A Formula for Predicting Readability"},{"key":"ref2","article-title":"Levels of hate in online environments","author":"bergling","year":"2019","journal-title":"Advances in Social Networks Analysis and Mining (ASONAM) 2019 IEEE\/ACM International Conference on"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.12312"},{"key":"ref1","author":"allport","year":"1961","journal-title":"Pattern and growth in personality"},{"key":"ref20","article-title":"The normal personalities of extremists: Examining violent and non-violent defense of muslims","author":"obaidi","year":"2019","journal-title":"manuscript in preparation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.54.101601.145041"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587396"},{"key":"ref24","article-title":"Computerized text analysis of alQaeda transcripts","author":"pennebaker","year":"2008","journal-title":"The Content Analysis Reader"},{"key":"ref23","author":"pennebaker","year":"2011","journal-title":"The Secret Life of Pronouns What Our Words Say about Us"},{"key":"ref26","author":"pennebaker","year":"2001","journal-title":"Linguistic inquiry and word count (liwc) A text analysis program"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ADA564471"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2019,12,9]]},"end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006244.pdf?arnumber=9006244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:49:25Z","timestamp":1658094565000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006244","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}