{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:12:30Z","timestamp":1729635150619,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578822","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"215-220","source":"Crossref","is-referenced-by-count":6,"title":["Crowdsourcing and gamification techniques in Inspire (AQAP online magazine)"],"prefix":"10.1109","author":[{"given":"Edna F.","family":"Reid","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"4 200 AQAP Cost for Operation Hemorrhage","year":"2010","key":"19"},{"journal-title":"News Flash Inspire Al-Malahem Media","first-page":"5","year":"2011","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137293"},{"journal-title":"The Gamification of Jihad Transcript","year":"2011","author":"gladstone","key":"36"},{"key":"18","article-title":"AQAP: Paradigm shifts and lessons learned","author":"stewart","year":"2009","journal-title":"STRATFOR Global Intelligence"},{"year":"0","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20838"},{"year":"0","key":"34"},{"key":"16","article-title":"Analysis of jihadi extremist groups' videos","volume":"11","author":"reid","year":"2009","journal-title":"Forensic Science Comm"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1080\/10576100490483642"},{"year":"0","key":"14"},{"journal-title":"Gamification","year":"2011","author":"kim","key":"11"},{"key":"12","first-page":"149","article-title":"High-tech terror: Al-qaeda's use of new technology","volume":"30","author":"brachman","year":"2006","journal-title":"The Fletcher Forum of World Affairs"},{"journal-title":"Terrorists Turn to Gamification to Create More Devoted Followers","year":"2011","author":"goad","key":"21"},{"key":"20","article-title":"The world of holy warcraft","author":"brachman","year":"2011","journal-title":"Foreign Policy"},{"journal-title":"And Inspire the Believers","year":"2012","author":"landau","key":"22"},{"journal-title":"Inspire Reactions Inspire Al-Mahahem Media No 6","first-page":"11","year":"2011","key":"23"},{"journal-title":"The Shifting Tactics of AQAP","year":"2010","author":"zimmerman","key":"24"},{"year":"0","key":"25"},{"key":"26","first-page":"54","author":"hussain","year":"2010","journal-title":"Six Calls of Al-Anfal Inspire"},{"key":"27","first-page":"19","author":"latimer","year":"2001","journal-title":"Deception in War"},{"key":"28","first-page":"12","author":"khan","year":"2011","journal-title":"The Central Issue Inspire"},{"key":"29","first-page":"53","article-title":"The ultimate mowing machine","author":"ibrahim","year":"2010","journal-title":"Inspire Al-Malahem Media"},{"journal-title":"Crowdsourcing Why the Power of the Crowd Is Driving the Future of Business","year":"2008","author":"howe","key":"3"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-230-11723-5","author":"halverson","year":"2011","journal-title":"Master Narratives of Islamist Extremism"},{"year":"0","key":"10"},{"journal-title":"Inspire Al-Mahahem Media no 2","first-page":"4","year":"2010","key":"1"},{"key":"30","first-page":"26","author":"khowla","year":"2011","journal-title":"Which Is Better Martyrdom or Victory Inspire Al-Malahem Media"},{"journal-title":"Tips for Bad Guys Burn Don't Shred Coders Win A DARPA Challenge to Reassemble Shredded Documents","year":"2011","author":"macmillan","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2072652.2072655"},{"journal-title":"Gamification Workshop Presentation","year":"2011","author":"kim","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979575"},{"year":"0","key":"31"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1089\/g4h.2012.1010"},{"journal-title":"For the Win","year":"2011","key":"8"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578822.pdf?arnumber=6578822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T09:21:58Z","timestamp":1563787318000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578822\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578822","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}