{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T22:59:49Z","timestamp":1761951589929,"version":"build-2065373602"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/isi.2008.4565020","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T20:05:44Z","timestamp":1216325144000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of cyberactivism: A case study of online free Tibet activities"],"prefix":"10.1109","author":[{"family":"Tianjun Fu","sequence":"first","affiliation":[]},{"family":"Hsinchun Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/pa.161"},{"journal-title":"The Web of hate Extremists exploit the Internet","year":"1996","author":"hoffman","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20827"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.3200\/TSSS.96.5.189-192"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.012"},{"key":"6","first-page":"97","author":"aelst","year":"2004","journal-title":"Cyberprotest New media citizens and social movements"},{"key":"5","article-title":"activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy","author":"denning","year":"1999","journal-title":"Internet and International Systems Information Technology and American Foreign Policy Decision-making Workshop"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0363-8111(01)00086-8"},{"key":"9","article-title":"exploring gray web forums: analysis and crime lead discovery on forum-based communities in taiwan","author":"wang","year":"0","journal-title":"Law Enforcement Review (Taiwan)"},{"key":"8","article-title":"updateable pat-tree approach to chinese key phrase extraction using mutual information: a linguistic foundation for knowledge management","author":"ong","year":"1999","journal-title":"Proceedings of the Second Asian Digital Library Conference"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(89)90102-6"}],"event":{"name":"2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)","start":{"date-parts":[[2008,6,17]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2008,6,20]]}},"container-title":["2008 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4557995\/4565003\/04565020.pdf?arnumber=4565020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T14:31:49Z","timestamp":1489674709000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4565020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/isi.2008.4565020","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}