{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:42Z","timestamp":1750306722011,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,23]],"date-time":"2014-06-23T00:00:00Z","timestamp":1403481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,23]]},"DOI":"10.1145\/2615569.2615664","type":"proceedings-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T14:23:03Z","timestamp":1404224583000},"page":"283-284","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Infowar on the web"],"prefix":"10.1145","author":[{"given":"St\u00e9phane Bernard","family":"Bazan","sequence":"first","affiliation":[{"name":"Saint-Joseph University of Beirut, Beirut, Lebanon"}]},{"given":"Sabrine","family":"Saad","sequence":"additional","affiliation":[{"name":"Saint-Joseph University of Beirut, Beirut, Lebanon"}]},{"given":"Addis","family":"Tesfa","sequence":"additional","affiliation":[{"name":"Saint-Joseph University of Beirut, Beirut, Lebanon"}]}],"member":"320","published-online":{"date-parts":[[2014,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the WebSci10: Extending the Frontiers of Society On-Line","author":"Bazan S.","year":"2010","unstructured":"Bazan , S. , Varin , C. (2010) Web Science in the context of the Arab Near East . In: Proceedings of the WebSci10: Extending the Frontiers of Society On-Line , 2010 , Raleigh, NC: US. Bazan, S., Varin, C.(2010) Web Science in the context of the Arab Near East. In: Proceedings of the WebSci10: Extending the Frontiers of Society On-Line, 2010, Raleigh, NC: US."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the ACM WebSci'11","author":"Saad S.","year":"2011","unstructured":"Saad , S. , Bazan , S. , Varin , C. ( 2011 ) Asymmetric Cyber-warfare between Israel and Hezbollah: The Web as a new strategic battlefield. pp. 1--4 . In: Proceedings of the ACM WebSci'11 , June 14 --17 2011, Koblenz, Germany. Saad, S., Bazan, S., Varin, C. (2011) Asymmetric Cyber-warfare between Israel and Hezbollah: The Web as a new strategic battlefield. pp. 1--4. In: Proceedings of the ACM WebSci'11, June 14--17 2011, Koblenz, Germany."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the ACM WebSci'12","author":"El Amine S.","year":"2012","unstructured":"El Amine , S. , Bazan , S. , Saad , S. , Tesfa , A. , Varin , C. Infowar in Syria: The Web between Liberation and Repression . In: Proceedings of the ACM WebSci'12 , June 2012 , Evanston, USA. El Amine, S., Bazan, S., Saad, S., Tesfa, A., Varin, C. Infowar in Syria: The Web between Liberation and Repression. In: Proceedings of the ACM WebSci'12, June 2012, Evanston, USA."},{"key":"e_1_3_2_1_4_1","unstructured":"Giacomello G. 2003. Measuring Digital Wars: Learning from the experience of peace research and arms control. The Information Warfare Site Infocon Magazine Issue 1.  Giacomello G. 2003. Measuring Digital Wars: Learning from the experience of peace research and arms control. The Information Warfare Site Infocon Magazine Issue 1."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2011.608939"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00136"},{"key":"e_1_3_2_1_7_1","volume-title":"There is no cyberwar the way there is no nuclear war. Forbes","author":"Stiennon R.","year":"2011","unstructured":"Stiennon , R. ( 2011 ). There is no cyberwar the way there is no nuclear war. Forbes . November 2011. Stiennon, R. (2011). There is no cyberwar the way there is no nuclear war. Forbes. November 2011."},{"key":"e_1_3_2_1_8_1","volume-title":"Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. CSIS","author":"Lewis J. A.","year":"2002","unstructured":"Lewis , J. A. ( 2002 ). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. CSIS . December 2002. Lewis, J. A. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. CSIS. December 2002."},{"key":"e_1_3_2_1_9_1","volume-title":"The Israel-Hezbollah War of 2006: The Media as a Weapon in Asymmetrical Conflict","author":"Kalb M.","year":"2007","unstructured":"Kalb , M. , Saivetz , C. ( 2007 ). The Israel-Hezbollah War of 2006: The Media as a Weapon in Asymmetrical Conflict . Kalb, M., Saivetz, C. (2007). The Israel-Hezbollah War of 2006: The Media as a Weapon in Asymmetrical Conflict."}],"event":{"name":"WebSci '14: ACM Web Science Conference","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Bloomington Indiana USA","acronym":"WebSci '14"},"container-title":["Proceedings of the 2014 ACM conference on Web science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2615569.2615664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2615569.2615664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:33Z","timestamp":1750231173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2615569.2615664"}},"subtitle":["measuring mass annoyance"],"short-title":[],"issued":{"date-parts":[[2014,6,23]]},"references-count":9,"alternative-id":["10.1145\/2615569.2615664","10.1145\/2615569"],"URL":"https:\/\/doi.org\/10.1145\/2615569.2615664","relation":{},"subject":[],"published":{"date-parts":[[2014,6,23]]},"assertion":[{"value":"2014-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}