{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:06:55Z","timestamp":1744193215862,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578812","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"169-172","source":"Crossref","is-referenced-by-count":8,"title":["Context matters: Improving the uses of big data for forecasting civil unrest: Emerging phenomena and big data"],"prefix":"10.1109","author":[{"given":"Pedro","family":"Manrique","sequence":"first","affiliation":[]},{"given":"Hong","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Morgenstern","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Velasquez","sequence":"additional","affiliation":[]},{"given":"Tsai-Ching","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1353\/dss.0.0092"},{"key":"2","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1353\/jod.0.0102","article-title":"Moldova's \"twitter revolution","volume":"20","author":"mungiu-pippidi","year":"2009","journal-title":"Journal of Democracy"},{"journal-title":"Dynamics of contention","year":"2001","author":"tarrow","key":"10"},{"journal-title":"Invisible Armies An Epic History of Guerrilla Warfare from Ancient Times to the Present","year":"2013","author":"boot","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2012.01635.x"},{"key":"6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.24908\/ss.v7i1.3304","article-title":"Discrimination by design: Data mining in the united states's 'war on terrorism","volume":"7","author":"guzik","year":"2009","journal-title":"Surveillance & Society"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/97\/28002"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0048596"},{"key":"9","first-page":"3","article-title":"Narratives and social movements: The power of stories","author":"davies","year":"2002","journal-title":"Stories of Change Narrative and Social Movements"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470999103"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578812.pdf?arnumber=6578812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T13:22:45Z","timestamp":1563801765000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578812","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}