{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:40Z","timestamp":1759072120207,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,25]],"date-time":"2015-08-25T00:00:00Z","timestamp":1440460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,25]]},"DOI":"10.1145\/2808797.2808879","type":"proceedings-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T14:56:02Z","timestamp":1447426562000},"page":"934-941","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Identifying Disruptive Events from Social Media to Enhance Situational Awareness"],"prefix":"10.1145","author":[{"given":"Nasser","family":"Alsaedi","sequence":"first","affiliation":[{"name":"Cardiff School of Computer Science &amp; Informatics, Cardiff University"}]},{"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"Cardiff School of Computer Science &amp; Informatics, Cardiff University"}]},{"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff School of Computer Science &amp; Informatics, Cardiff University"}]}],"member":"320","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"A Combined Classification-Clustering Framework for Identifying Disruptive Events","volume":"2014","author":"Alsaedi N.","year":"2014","unstructured":"Alsaedi , N. , Burnap , P. and Rana , O. 2014 . A Combined Classification-Clustering Framework for Identifying Disruptive Events . SocialCom 2014 , pp. 1 -- 10 . Alsaedi, N., Burnap, P. and Rana, O. 2014. A Combined Classification-Clustering Framework for Identifying Disruptive Events. SocialCom 2014, pp. 1--10.","journal-title":"SocialCom"},{"key":"e_1_3_2_1_2_1","volume-title":"The wall street journal Politics and policy.","author":"Julian E.","year":"2014","unstructured":"Julian E. Barnes ( 2014 ) U.S. Military Plugs Into Social Media for Intelligence Gathering , The wall street journal Politics and policy. Julian E. Barnes (2014) U.S. Military Plugs Into Social Media for Intelligence Gathering, The wall street journal Politics and policy."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9275-8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433401"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871535"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978976"},{"volume-title":"Measuring User Influence in Twitter: The Million Follower Fallacy. ICWSM'10","author":"Cha M.","key":"e_1_3_2_1_7_1","unstructured":"Cha , M. , Haddadi , H. , Benevenuto , F. and Gummadi , P . 2010 . Measuring User Influence in Twitter: The Million Follower Fallacy. ICWSM'10 . Cha, M., Haddadi, H., Benevenuto, F. and Gummadi, P. 2010. Measuring User Influence in Twitter: The Million Follower Fallacy. ICWSM'10."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22844"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21462"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"June 2013","author":"Department of Homeland Security.","year":"2014","unstructured":"Department of Homeland Security. 2014 . Using Social Media for Enhanced Situational Awareness and Decision Support. Version 5.0 . June 2013 , pp. 1 -- 44 . Department of Homeland Security. 2014. Using Social Media for Enhanced Situational Awareness and Decision Support. Version 5.0. June 2013, pp. 1--44."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00887-0_40"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2009.10855867"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567997"},{"key":"e_1_3_2_1_14_1","first-page":"30","volume-title":"Proceedings of the ACL 2011 Workshop on Languages in Social Media","author":"Agarwal A.","unstructured":"Agarwal , A. , Xie , B. , Vovsha , I. , Rambow , O. and Passonneau , R . 2011. Sentiment analysis of twitter data . Proceedings of the ACL 2011 Workshop on Languages in Social Media , pp. 30 -- 38 . Agarwal, A., Xie, B., Vovsha, I., Rambow, O. and Passonneau, R. 2011. Sentiment analysis of twitter data. Proceedings of the ACL 2011 Workshop on Languages in Social Media, pp. 30--38."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Topic detection and tracking: event-based information","author":"James A.","unstructured":"James , A. 2002. Introduction to topic detection and tracking . In Topic detection and tracking: event-based information , pp. 1 -- 16 . James, A. 2002. Introduction to topic detection and tracking. In Topic detection and tracking: event-based information, pp. 1--16."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988738"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718489"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"volume-title":"ICWSM'11","author":"Petrovic S.","key":"e_1_3_2_1_19_1","unstructured":"Petrovic , S. , Osborne , M. and Lavrenko , V . 2011. RT to Win! Predicting Message Propagation in Twitter . ICWSM'11 . Petrovic, S., Osborne, M. and Lavrenko, V. 2011. RT to Win! Predicting Message Propagation in Twitter. ICWSM'11."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2012.6400485"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"Beyond Trending Topics: Real-Event Identification on Twitter. ICWSM'11","author":"Becker H.","unstructured":"Becker , H. , Naaman , M. and Gravano , L . 2011 . Beyond Trending Topics: Real-Event Identification on Twitter. ICWSM'11 , pp. 1 -- 17 . Becker, H., Naaman, M. and Gravano, L. 2011. Beyond Trending Topics: Real-Event Identification on Twitter. ICWSM'11, pp. 1--17."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_1_23_1","first-page":"511","volume-title":"Inferring Home Locations of Twitter Users. ICWSM'12","author":"Mahmud J.","unstructured":"Mahmud , J. , Nichols , J. and Drews , C . 2012. Where Is This Tweet From ? Inferring Home Locations of Twitter Users. ICWSM'12 , pp. 511 -- 514 . Mahmud, J., Nichols, J. and Drews, C. 2012. Where Is This Tweet From? Inferring Home Locations of Twitter Users. ICWSM'12, pp. 511--514."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.990133"},{"volume-title":"EMNLP'10","author":"Eisenstein J.","key":"e_1_3_2_1_26_1","unstructured":"Eisenstein , J. , O'Connor , B. , Noah , S. and Eric , X . 2010. A latent variable model for geographic lexical variation . EMNLP'10 . Eisenstein, J., O'Connor, B., Noah, S. and Eric, X. 2010. A latent variable model for geographic lexical variation. EMNLP'10."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124320"},{"key":"e_1_3_2_1_28_1","volume-title":"Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making, Policy & Internet (in press)","author":"Burnap P.","year":"2015","unstructured":"Burnap , P. and Williams , M . 2015 . Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making, Policy & Internet (in press) Burnap, P. and Williams, M. 2015. Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making, Policy & Internet (in press)"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0206-4"}],"event":{"name":"ASONAM '15: Advances in Social Networks Analysis and Mining 2015","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Paris France","acronym":"ASONAM '15"},"container-title":["Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2808879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808797.2808879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:15Z","timestamp":1750225695000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2808879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,25]]},"references-count":29,"alternative-id":["10.1145\/2808797.2808879","10.1145\/2808797"],"URL":"https:\/\/doi.org\/10.1145\/2808797.2808879","relation":{},"subject":[],"published":{"date-parts":[[2015,8,25]]},"assertion":[{"value":"2015-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}