{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:33:32Z","timestamp":1762508012783,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T00:00:00Z","timestamp":1579478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"AI-enabled Processes (AIP) Research Centre at Macquarie University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,20]]},"DOI":"10.1145\/3336191.3371865","type":"proceedings-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T19:08:16Z","timestamp":1579720096000},"page":"825-828","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["personality2vec: Enabling the Analysis of Behavioral Disorders in Social Networks"],"prefix":"10.1145","author":[{"given":"Amin","family":"Beheshti","sequence":"first","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Vahid","family":"Moraveji-Hashemi","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Shahpar","family":"Yakhchi","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Hamid Reza","family":"Motahari-Nezhad","sequence":"additional","affiliation":[{"name":"EY AI Lab, Palo Alto, CA, USA"}]},{"given":"Seyed Mohssen","family":"Ghafari","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2011.594923"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133171"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236230"},{"key":"e_1_3_2_1_4_1","unstructured":"Amin Beheshti Boualem Benatallah Alireza Tabebordbar Hamid Reza Motahari-Nezhad Moshe Chai Barukh and Reza Nouri. 2018b. DataSynapse: A Social Data Curation Foundry. Distributed and Parallel Databases (2018) 1--34.  Amin Beheshti Boualem Benatallah Alireza Tabebordbar Hamid Reza Motahari-Nezhad Moshe Chai Barukh and Reza Nouri. 2018b. DataSynapse: A Social Data Curation Foundry. Distributed and Parallel Databases (2018) 1--34."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-014-7171-9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2190\/8YQM-B04H-PG4D-BLLH"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Adam Bermingham Maura Conway Lisa McInerney Neil O'Hare and Alan F Smeaton. 2009. Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In ASONAM. IEEE.  Adam Bermingham Maura Conway Lisa McInerney Neil O'Hare and Alan F Smeaton. 2009. Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In ASONAM. IEEE.","DOI":"10.1109\/ASONAM.2009.31"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735703.2735705"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Sameer Hinduja and Justin W Patchin. 2010. Bullying cyberbullying and suicide. Archives of suicide research Vol. 14 3 (2010) 206--221.  Sameer Hinduja and Justin W Patchin. 2010. Bullying cyberbullying and suicide. Archives of suicide research Vol. 14 3 (2010) 206--221.","DOI":"10.1080\/13811118.2010.494133"},{"key":"e_1_3_2_1_10_1","unstructured":"https:\/\/www.kaggle.com\/fifthtribe\/how-isis-uses twitter\/home. [n.d.]. How ISIS Uses Twitter.  https:\/\/www.kaggle.com\/fifthtribe\/how-isis-uses twitter\/home. [n.d.]. How ISIS Uses Twitter."},{"key":"e_1_3_2_1_11_1","volume-title":"Political Psychology","volume":"35","author":"Kruglanski Arie W","year":"2014"},{"key":"e_1_3_2_1_12_1","first-page":"2001","article-title":"Linguistic inquiry and word count: LIWC 2001. Mahway","volume":"71","author":"Pennebaker James W","year":"2001","journal-title":"Lawrence Erlbaum Associates"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K15-1026"},{"volume-title":"Web Information Systems Engineering - WISE 2019 - 20th International Conference, Hong Kong, China, November 26--30","year":"2019","author":"Tabebordbar Alireza","key":"e_1_3_2_1_14_1"}],"event":{"name":"WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Houston TX USA","acronym":"WSDM '20"},"container-title":["Proceedings of the 13th International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:15Z","timestamp":1750202595000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,20]]},"references-count":14,"alternative-id":["10.1145\/3336191.3371865","10.1145\/3336191"],"URL":"https:\/\/doi.org\/10.1145\/3336191.3371865","relation":{},"subject":[],"published":{"date-parts":[[2020,1,20]]},"assertion":[{"value":"2020-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}