{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:40:55Z","timestamp":1730274055450,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/isi.2008.4565037","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T16:05:44Z","timestamp":1216310744000},"page":"98-103","source":"Crossref","is-referenced-by-count":15,"title":["Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups"],"prefix":"10.1109","author":[{"given":"Hsinchun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Sven","family":"Thoms","sequence":"additional","affiliation":[]},{"given":"Tianjun","family":"Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.1"},{"key":"15","first-page":"3","article-title":"getting serious","year":"2007","journal-title":"The Economist"},{"journal-title":"Jihadinets","year":"0","author":"jones","key":"16"},{"key":"13","first-page":"1","article-title":"online social networking: it's all just geek to me","volume":"7","author":"lewis","year":"2007","journal-title":"Australian Counselling Association Journal"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_66"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/09546550601054873"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1080\/10576100701611296"},{"key":"2","first-page":"17","article-title":"what is web 2.0: design patterns and business models for the next generation of software","volume":"65","author":"o'reilly","year":"2007","journal-title":"Communications & Strategies"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(92)90039-S"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11127-007-9202-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1152301.1152311"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1108\/09593840510601513"},{"year":"0","key":"4"},{"key":"9","article-title":"youtube serves up 100 million videos a day online","author":"reuters","year":"0","journal-title":"USA Today"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.009"}],"event":{"name":"2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)","start":{"date-parts":[[2008,6,17]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2008,6,20]]}},"container-title":["2008 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4557995\/4565003\/04565037.pdf?arnumber=4565037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T10:49:24Z","timestamp":1489661364000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4565037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isi.2008.4565037","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}