{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:12Z","timestamp":1750307292006,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T00:00:00Z","timestamp":1297123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,2,8]]},"DOI":"10.1145\/1940761.1940924","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"827-828","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Microblogging for distributed surveillance in response to violent crises"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Heverin","sequence":"first","affiliation":[{"name":"Drexel University"}]}],"member":"320","published-online":{"date-parts":[[2011,2,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240736"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439309332302"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460583"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 7th International Information Systems for Crisis Response and Management Conference (ISCRAM","author":"Heverin T.","year":"2010","unstructured":"Heverin , T. and Zach , L . 2010. Microblogging for crisis communication: examination of Twitter use in response to a 2009 violent crisis in the Seattle-Tacoma, Washington area . In Proceedings of the 7th International Information Systems for Crisis Response and Management Conference (ISCRAM 2010 ). Heverin, T. and Zach, L. 2010. Microblogging for crisis communication: examination of Twitter use in response to a 2009 violent crisis in the Seattle-Tacoma, Washington area. In Proceedings of the 7th International Information Systems for Crisis Response and Management Conference (ISCRAM 2010)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/000276427101500104"},{"key":"e_1_3_2_1_6_1","first-page":"61","article-title":"Cyber civil rights","volume":"89","author":"Citron D","year":"2009","unstructured":"Citron , D . Cyber civil rights . Boston U. Law Rev. 89 ( Feb. 2009 ), 61 -- 125 . Citron, D. Cyber civil rights. Boston U. Law Rev. 89 (Feb. 2009), 61--125.","journal-title":"Boston U. Law Rev."},{"key":"e_1_3_2_1_7_1","article-title":"Hunt by the Crowd: an exploratory qualitative analysis on cyber surveillance","volume":"9","author":"Pan X","year":"2010","unstructured":"Pan , X . Hunt by the Crowd: an exploratory qualitative analysis on cyber surveillance in China. Global Media J. 9 , (Spring 2010 ). Pan, X. Hunt by the Crowd: an exploratory qualitative analysis on cyber surveillance in China. Global Media J. 9, (Spring 2010).","journal-title":"China. Global Media J."},{"key":"e_1_3_2_1_8_1","first-page":"323","article-title":"A study of cyber-violence and internet service providers' liability: lessons from China. Pac Rim Law &amp;","volume":"18","author":"Cheung A. S. Y","year":"2009","unstructured":"Cheung , A. S. Y . A study of cyber-violence and internet service providers' liability: lessons from China. Pac Rim Law &amp; Policy J. 18 ( Apr. 2009 ), 323 -- 346 . DOI= http:\/\/dx.doi.org\/10722\/58894 10722\/58894 Cheung, A. S. Y. A study of cyber-violence and internet service providers' liability: lessons from China. Pac Rim Law &amp; Policy J. 18 (Apr. 2009), 323--346. DOI= http:\/\/dx.doi.org\/10722\/58894","journal-title":"Policy J."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986209350437"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9275-8"}],"event":{"name":"iConference '11: iConference 2011","acronym":"iConference '11","location":"Seattle Washington USA"},"container-title":["Proceedings of the 2011 iConference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940761.1940924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940761.1940924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:43Z","timestamp":1750244383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940761.1940924"}},"subtitle":["ethical considerations"],"short-title":[],"issued":{"date-parts":[[2011,2,8]]},"references-count":10,"alternative-id":["10.1145\/1940761.1940924","10.1145\/1940761"],"URL":"https:\/\/doi.org\/10.1145\/1940761.1940924","relation":{},"subject":[],"published":{"date-parts":[[2011,2,8]]},"assertion":[{"value":"2011-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}