{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:58:29Z","timestamp":1762955909391,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T00:00:00Z","timestamp":1524182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA\/AFRL","award":["FA8750-14-C-0240"],"award-info":[{"award-number":["FA8750-14-C-0240"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,20]]},"DOI":"10.1145\/3170427.3174364","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T16:09:06Z","timestamp":1524240546000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Technology-assisted Investigative Search"],"prefix":"10.1145","author":[{"given":"Mayank","family":"Kejriwal","sequence":"first","affiliation":[{"name":"USC Viterbi School of Engineering, Marina del Rey, CA, USA"}]},{"given":"Pedro","family":"Szekely","sequence":"additional","affiliation":[{"name":"USC Viterbi School of Engineering, Marina del Rey, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Situation awareness and the cognitive management of complex systems. Human factors 37, 1","author":"Adams Marilyn Jager","year":"1995","unstructured":"Marilyn Jager Adams, Yvette J Tenney, and Richard W Pew. 1995. Situation awareness and the cognitive management of complex systems. Human factors 37, 1 (1995), 85--104."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2331533"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.152"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978542.1978562"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2481674.2481683"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2007.4384776"},{"key":"e_1_3_2_1_7_1","unstructured":"DIG. Domain-specific Insight Graphs (DIG). http:\/\/usc-isi-i2.github.io\/dig\/. (2017). Accessed: 2017--10--10."},{"key":"e_1_3_2_1_8_1","unstructured":"ELI5. Explain it Like I'm 5. https:\/\/pypi.python.org\/pypi\/eli5. (2017). Accessed: 2017--10--10."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi4031549"},{"key":"e_1_3_2_1_11_1","volume-title":"Always Lurking: Understanding and Mitigating Bias in Online Human Trafficking Detection. arXiv preprint arXiv:1712.00846.","author":"Hundman Kyle","year":"2017","unstructured":"Kyle Hundman, Thamme Gowda, Mayank Kejriwal, and Benedikt Boecking. 2017. Always Lurking: Understanding and Mitigating Bias in Online Human Trafficking Detection. arXiv preprint arXiv:1712.00846."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3080546.3080547"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052642"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2763164"},{"key":"e_1_3_2_1_15_1","volume-title":"Mohammad Ali Abbasi, and Huan Liu","author":"Kumar Shamanth","year":"2011","unstructured":"Shamanth Kumar, Geoffrey Barbier, Mohammad Ali Abbasi, and Huan Liu. 2011. TweetTracker: An Analysis Tool for Humanitarian and Disaster Relief. In ICWSM."},{"key":"e_1_3_2_1_16_1","unstructured":"MEMEX. DARPA MEMEX. https:\/\/www.darpa.mil\/program\/memex. (2017). Accessed: 2017--10--10."},{"key":"e_1_3_2_1_17_1","unstructured":"Palantir. Palantir. https:\/\/www.palantir.com\/. (2017). Accessed: 2017--10--10."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25010-6_12"},{"key":"e_1_3_2_1_19_1","volume-title":"Society. AAAI\/ACM Conference on AI, Ethics and Society. http:\/\/www.aies-conference.com\/. (2017","author":"AI","year":"2017","unstructured":"AI and Society. AAAI\/ACM Conference on AI, Ethics and Society. http:\/\/www.aies-conference.com\/. (2017). Accessed: 2017--10--10."}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Montreal QC Canada","acronym":"CHI '18"},"container-title":["Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3170427.3174364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3170427.3174364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:58Z","timestamp":1750207438000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3170427.3174364"}},"subtitle":["A Case Study from an Illicit Domain"],"short-title":[],"issued":{"date-parts":[[2018,4,20]]},"references-count":19,"alternative-id":["10.1145\/3170427.3174364","10.1145\/3170427"],"URL":"https:\/\/doi.org\/10.1145\/3170427.3174364","relation":{},"subject":[],"published":{"date-parts":[[2018,4,20]]},"assertion":[{"value":"2018-04-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}