{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:05Z","timestamp":1755838385329,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T00:00:00Z","timestamp":1409011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,26]]},"DOI":"10.1145\/2637002.2637023","type":"proceedings-article","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T12:19:23Z","timestamp":1408623563000},"page":"175-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Investigating people"],"prefix":"10.1145","author":[{"given":"Sean","family":"McKeown","sequence":"first","affiliation":[{"name":"University of Glasgow, Glasgow, Scotland"}]},{"given":"David","family":"Maxwell","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, Scotland"}]},{"given":"Leif","family":"Azzopardi","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, Scotland"}]},{"given":"William Bradley","family":"Glisson","sequence":"additional","affiliation":[{"name":"University of South Alabama, Mobile, AL"}]}],"member":"320","published-online":{"date-parts":[[2014,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"E. J. Appel. Internet Searches for Vetting Investigations and Open-source Intelligence. 2011.   E. J. Appel. Internet Searches for Vetting Investigations and Open-source Intelligence . 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03655-2_60"},{"key":"e_1_3_2_1_3_1","unstructured":"C. Best. Open source intelligence. Mining Massive Data Sets for Security: Advances in Data Mining Search Social Networks and Text Mining and Their Applications to Security 19:331--344 2008.  C. Best. Open source intelligence. Mining Massive Data Sets for Security: Advances in Data Mining Search Social Networks and Text Mining and Their Applications to Security 19:331--344 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506508"},{"key":"e_1_3_2_1_5_1","unstructured":"A. Broughton B. Foley S. Ledermaier and A. Cox. The use of social media in the recruitment process. acas 2013.  A. Broughton B. Foley S. Ledermaier and A. Cox. The use of social media in the recruitment process. acas 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-011-9221-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4054-2_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518704"},{"key":"e_1_3_2_1_9_1","unstructured":"Department of Homeland Security. DHS terrorist use of social networking facebook case study | public intelligence 2010.  Department of Homeland Security. DHS terrorist use of social networking facebook case study | public intelligence 2010."},{"volume-title":"England: Willan","year":"2003","author":"Finch E.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148297"},{"key":"e_1_3_2_1_12_1","unstructured":"J. Grasz. Thirty-seven percent of companies use social networks to research potential job candidates according to new CareerBuilder survey - CareerBuilder 2012.  J. Grasz. Thirty-seven percent of companies use social networks to research potential job candidates according to new CareerBuilder survey - CareerBuilder 2012."},{"volume-title":"Proc. of the 13th World Wide Web Conference","year":"2004","author":"Guha R.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"33","volume-title":"Proc. of OAIR '13","author":"Hanbury A.","year":"2013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1732323.1732342"},{"volume-title":"Iowa State University","year":"2012","author":"Holland B. R.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1840784.1840789"},{"issue":"1","key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/meet.14504901142","article-title":"Task difficulty and domain knowledge effects on information search behaviors","volume":"49","author":"Liu C.","year":"2012","journal-title":"Proc. of the American Society for Information Science and Technology"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"K. Louise Barriball and A. While. Collecting data using a semi-structured interview: a discussion paper. Journal of advanced nursing 19(2):328--335 1994.  K. Louise Barriball and A. While. Collecting data using a semi-structured interview: a discussion paper. Journal of advanced nursing 19(2):328--335 1994.","DOI":"10.1111\/j.1365-2648.1994.tb01088.x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:8"},{"key":"e_1_3_2_1_21_1","unstructured":"A. Markham and E. Buchanan. Ethical decision-making and internet research: Recommendations from the aoir ethics working committee (version 2.0). Technical report 2012.  A. Markham and E. Buchanan. Ethical decision-making and internet research: Recommendations from the aoir ethics working committee (version 2.0). Technical report 2012."},{"key":"e_1_3_2_1_22_1","unstructured":"NATO. NATO open source intelligence handbook 2001.  NATO. NATO open source intelligence handbook 2001."},{"key":"e_1_3_2_1_23_1","first-page":"2","volume-title":"Proc. of International Conference on Intelligence Analysis","volume":"5","author":"Pirolli P.","year":"2005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410534176"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1591>3.3.CO;2-I"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.07.143"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(02)00031-6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009927"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390506"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1498759.1498819"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277787"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10367"},{"key":"e_1_3_2_1_33_1","unstructured":"R. Wolff J. McDevitt and J. Stark. Using social media to prevent gang violence and engage youth 2011.  R. Wolff J. McDevitt and J. Stark. Using social media to prevent gang violence and engage youth 2011."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2331791.2331794"},{"volume-title":"Addison Wealey","year":"1949","author":"Zipf G.","key":"e_1_3_2_1_35_1"}],"event":{"name":"IIiX '14: Fifth Information Interaction in Context Symposium","sponsor":["University of Regensburg University of Regensburg","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Regensburg Germany","acronym":"IIiX '14"},"container-title":["Proceedings of the 5th Information Interaction in Context Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637002.2637023","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2637002.2637023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:31Z","timestamp":1750277671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637002.2637023"}},"subtitle":["a qualitative analysis of the search behaviours of open-source intelligence analysts"],"short-title":[],"issued":{"date-parts":[[2014,8,26]]},"references-count":35,"alternative-id":["10.1145\/2637002.2637023","10.1145\/2637002"],"URL":"https:\/\/doi.org\/10.1145\/2637002.2637023","relation":{},"subject":[],"published":{"date-parts":[[2014,8,26]]},"assertion":[{"value":"2014-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}