{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:26:37Z","timestamp":1756383997239},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icaiic57133.2023.10067026","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:38:05Z","timestamp":1679593085000},"page":"018-024","source":"Crossref","is-referenced-by-count":4,"title":["Twitter User Sentiments Analysis: Health System Cyberattacks Case Study"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Abusaqer","sequence":"first","affiliation":[{"name":"Minot State University,Department of Math and Computer Science,Minot,ND,USA"}]},{"given":"M.","family":"Benaoumeur Senouci","sequence":"additional","affiliation":[{"name":"University of Southern Denmark,The Faculty of Engineering SDU Mechatronics (CIM),S&#x00F8;nderborg,Denmark"}]},{"given":"Kenneth","family":"Magel","sequence":"additional","affiliation":[{"name":"North Dakota State University,Department of Computer Science,Fargo,ND,USA"}]}],"member":"263","reference":[{"journal-title":"Healthcare IT News","article-title":"UHS hospital chain hit with apparent ransomware attack","year":"2021","key":"ref1"},{"journal-title":"Global Sentiment Analysis Of COVID-19 Tweets Over Time","year":"2021","author":"Mansoor","key":"ref2"},{"key":"ref3","article-title":"Sentiment Analysis in Python: TextBlob vs Vader Sentiment vs Flair vs Building It From Scratch","author":"ES","year":"2022","journal-title":"neptune"},{"journal-title":"Tools and Applications for Sentiment Analysis Implementation","article-title":"Approaches","author":"Ferri","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30319-2_1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iacc.2017.0186"},{"key":"ref7","first-page":"1010","volume-title":"Broadly Improving User Classification via Communication-Based Name and Location Clustering on Twitter","author":"Bergsma","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v9i4.1897"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17269\/s41997-020-00393-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3052931"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc4040033"},{"key":"ref12","article-title":"Sentiment Analysis: VADER or TextBlob?","author":"White","year":"2021","journal-title":"Medium"},{"article-title":"Universal Health Services, Inc. | Healthcare Delivered with Passion","volume-title":"UHS","year":"2022","key":"ref13"},{"article-title":"Cyberattack hits major hospital system, possibly one of the largest in US history","volume-title":"NBC News","year":"2021","key":"ref14"},{"article-title":"Statement from Universal Health Services","volume-title":"UHS","year":"2021","key":"ref15"},{"key":"ref16","article-title":"FBI warns ransomware assault threatens US health care system: At least 5 hospitals have been hit this week","author":"James","year":"2021","journal-title":"USA TODAY"},{"journal-title":"Cybersecurity Attacks during a Pandemic: It Is Not Just ITs Job!","first-page":"3","author":"Middaugh","key":"ref17"},{"journal-title":"Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic","year":"2021","author":"Klick","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2576952"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14401"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W15-2905"},{"volume-title":"Twitter IDs","year":"2021","key":"ref22"},{"volume-title":"re \u2014 Regular expression operations \u2014 Python 3.8.8 documentation","year":"2021","key":"ref23"},{"key":"ref24","article-title":"Data Cleaning for NLP of Social Media Text in 2 Simple Steps","author":"Dukare","year":"2021","journal-title":"Medium"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25741-9_2"},{"volume-title":"Pipelines","year":"2022","key":"ref26"},{"key":"ref27","first-page":"38","article-title":"Transformers: State-of-the-Art Natural Language Processing","author":"Wolf","year":"2022","journal-title":"Association for Computational Linguistics"},{"key":"ref28","article-title":"All NLP tasks using Transformers Pipeline","author":"Jaiswal","year":"2022","journal-title":"Analytics Vidhya"},{"journal-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding","year":"2022","author":"Devlin","key":"ref29"},{"article-title":"Overview of ROBERTa model","volume-title":"GeeksforGeeks","year":"2022","key":"ref30"},{"journal-title":"RoBERTa: A Robustly Optimized BERT Pretraining Approach","year":"2019","author":"Liu","key":"ref31"},{"volume-title":"RoBERTa: An optimized method for pretraining self-supervised NLP systems","year":"2022","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.eacl-main.142"},{"volume-title":"cardiffnlp\/twitter-roberta-base-sentiment. Hugging Face","year":"2022","key":"ref34"},{"key":"ref35","article-title":"Cyber attack shuts down US fuel pipeline jugular, Biden briefed","author":"Bing","year":"2022","journal-title":"Reuters"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4135\/9781529789768"}],"event":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","start":{"date-parts":[[2023,2,20]]},"location":"Bali, Indonesia","end":{"date-parts":[[2023,2,23]]}},"container-title":["2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10066849\/10066958\/10067026.pdf?arnumber=10067026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T05:48:15Z","timestamp":1710395295000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10067026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icaiic57133.2023.10067026","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}