{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:35:40Z","timestamp":1729643740753,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/stc-csit.2017.8098762","type":"proceedings-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T16:50:03Z","timestamp":1510246203000},"page":"175-178","source":"Crossref","is-referenced-by-count":6,"title":["Analysis of the methods of data collection on social networks"],"prefix":"10.1109","author":[{"given":"Andriy","family":"Peleshchyshyn","sequence":"first","affiliation":[]},{"given":"Oleg","family":"Mastykash","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1186\/s40294-016-0024-9"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"212","DOI":"10.17706\/jcp.12.3.212-220","article-title":"Recommendation System for Criminal Behavioral Analysis on Social Network using Genetic Weighted K-Means Clustering","author":"soundarya","year":"2017","journal-title":"Journal of Computers"},{"key":"ref10","first-page":"407","article-title":"Using Entity Framework Code First with an Existing Database","author":"lee","year":"2016","journal-title":"ASP NET MVC with Entity Framework and CSS Apress"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/STC-CSIT.2016.7589872"},{"key":"ref11","article-title":"Methods and VLSI-structures for neural element implementation","author":"tsmots","year":"2010","journal-title":"Perspective Technologies and Methods in MEMS Design (MEMSTECH) 2010 Proceedings of VIth International Conference on IEEE"},{"key":"ref5","first-page":"87","article-title":"Development of verification system of sociodemographic data of virtual community member","author":"fedushko","year":"2016","journal-title":"Radio Electronics Computer Science Control Article"},{"key":"ref8","first-page":"108","article-title":"Functional-network model of tasks performance of virtual communication life cycle directions","author":"trach","year":"2016","journal-title":"XIth International Scientific and Technical Conference"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TCSET.2016.7452207"},{"key":"ref2","first-page":"144","article-title":"Methods of Determining Information Support of Web Community User Personal Data Verification System","volume":"550","author":"korobiichuk","year":"2017","journal-title":"Automation 2017 ICA 2017 Advances in Intelligent Systems and Computing"},{"key":"ref9","article-title":"Methods for forming an informational image of a higher education institution","volume":"12","author":"korzh","year":"2015","journal-title":"Webology"},{"key":"ref1","article-title":"The latent nature of global information warfare","author":"floridi","year":"2014","journal-title":"4th Quarter"}],"event":{"name":"2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","start":{"date-parts":[[2017,9,5]]},"location":"Lviv","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8086159\/8098722\/08098762.pdf?arnumber=8098762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T19:12:15Z","timestamp":1570302735000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8098762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/stc-csit.2017.8098762","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}