{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:31:12Z","timestamp":1725496272191},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/isi.2011.5984053","type":"proceedings-article","created":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T19:28:09Z","timestamp":1313522889000},"page":"71-76","source":"Crossref","is-referenced-by-count":4,"title":["Analyzing social media in escalating crisis situations"],"prefix":"10.1109","author":[{"given":"Il-Chul","family":"Moon","sequence":"first","affiliation":[]},{"given":"Alice H.","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","first-page":"206","DOI":"10.4135\/9781848608245.n16","article-title":"Smart agents and organizations of the future","author":"carley","year":"2002","journal-title":"Handbook of New Media Social Shaping and Consequences of ICTs"},{"key":"13","first-page":"163","article-title":"Topic chains for understanding a news corpus","author":"kim","year":"2011","journal-title":"CICLing (2)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148258"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.21236\/ADA528611","author":"carley","year":"2010","journal-title":"ORA User?s Guide 2010"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1658377.1658381"},{"journal-title":"Letter Dated 4 June 2010 from the Permanent Representative of the Republic of Korea to the United Nations Addressed to the President of the Security Council (S\/2010\/281) and Other Relevant Letters","year":"2010","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.412"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1858948.1858955"},{"journal-title":"Text to Network (TONK)","year":"2010","author":"moon","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1162\/jmlr.2003.3.4-5.993"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1177\/0049124193022001006"}],"event":{"name":"2011 IEEE International Conference on Intelligence and Security Informatics (ISI 2011)","start":{"date-parts":[[2011,7,10]]},"location":"Beijing, China","end":{"date-parts":[[2011,7,12]]}},"container-title":["Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5975309\/5983989\/05984053.pdf?arnumber=5984053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T03:17:17Z","timestamp":1560482237000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5984053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isi.2011.5984053","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}