{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:33:17Z","timestamp":1775763197463,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3365921.3365942","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T09:35:56Z","timestamp":1582364156000},"page":"28-35","source":"Crossref","is-referenced-by-count":4,"title":["Towards Context-Aware Social Behavioral Analytics"],"prefix":"10.1145","author":[{"given":"Amin","family":"Beheshti","sequence":"first","affiliation":[{"name":"Macquarie University Sydney, Australia"}]},{"given":"Vahid Moraveji","family":"Hashemi","sequence":"additional","affiliation":[{"name":"Macquarie University Sydney, Australia"}]},{"given":"Shahpar","family":"Yakhchi","sequence":"additional","affiliation":[{"name":"Macquarie University Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Charu C. Aggarwal. 2011. An Introduction to Social Network Data Analytics. In Social Network Data Analytics.  Charu C. Aggarwal. 2011. An Introduction to Social Network Data Analytics. In Social Network Data Analytics.","DOI":"10.1007\/978-1-4419-8462-3"},{"key":"e_1_3_2_1_2_1","volume-title":"Service-Oriented Computing - ICSOC 2018 Workshops - ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT","author":"Amouzgar Farhad","year":"2018"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Itamar Arel and etal 2010. Deep machine learning-a new frontier in artificial intelligence research. IEEE computational intelligence magazine 5 4 (2010).  Itamar Arel and et al. 2010. Deep machine learning-a new frontier in artificial intelligence research. IEEE computational intelligence magazine 5 4 (2010).","DOI":"10.1109\/MCI.2010.938364"},{"key":"e_1_3_2_1_4_1","article-title":"Mapping Extension's networks: Using social network analysis to explore Extension's outreach","volume":"49","author":"Bartholomay Tom","year":"2011","journal-title":"Journal of extension"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2011.594923"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133171"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236230"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-018-7245-1"},{"key":"e_1_3_2_1_9_1","volume-title":"Business Process Management Forum - BPM Forum","author":"Beheshti Amin","year":"2018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054726"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Adam Bermingham and etal 2009. Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In ASONAM. IEEE.  Adam Bermingham and et al. 2009. Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In ASONAM. IEEE.","DOI":"10.1109\/ASONAM.2009.31"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0105918"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0090718"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.02.032"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Randy Borum. 2014. Psychological vulnerabilities and propensities for involvement in violent extremism. Behavioral sciences & the law 32 3 (2014) 286--305.  Randy Borum. 2014. Psychological vulnerabilities and propensities for involvement in violent extremism. Behavioral sciences & the law 32 3 (2014) 286--305.","DOI":"10.1002\/bsl.2110"},{"key":"e_1_3_2_1_17_1","first-page":"2493","article-title":"Natural language processing (almost) from scratch","author":"Collobert Ronan","year":"2011","journal-title":"Journal of machine learning research 12"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Bertjan Doosje and etal 2016. Terrorism radicalization and de-radicalization. Current Opinion in Psychology 11 (2016).  Bertjan Doosje and et al. 2016. Terrorism radicalization and de-radicalization. Current Opinion in Psychology 11 (2016).","DOI":"10.1016\/j.copsyc.2016.06.008"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWBC.2012.046256"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Irene Gilp\u00e9rez-L\u00f3pez and etal 2017. An initial study on radicalization risk factors: Towards an assessment software tool. In DEXA. IEEE.  Irene Gilp\u00e9rez-L\u00f3pez and et al. 2017. An initial study on radicalization risk factors: Towards an assessment software tool. In DEXA. IEEE.","DOI":"10.1109\/DEXA.2017.19"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2016.2572538"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002716208317539"},{"key":"e_1_3_2_1_23_1","unstructured":"https:\/\/www.kaggle.com\/fifthtribe\/how-isis-uses twitter\/home. [n.d.]. How ISIS Uses Twitter.  https:\/\/www.kaggle.com\/fifthtribe\/how-isis-uses twitter\/home. [n.d.]. How ISIS Uses Twitter."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2011.587064"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Arie W Kruglanski and etal 2014. The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology 35 S1 (2014).  Arie W Kruglanski and et al. 2014. The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology 35 S1 (2014).","DOI":"10.1111\/pops.12163"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Haewoon Kwak Changhyun Lee Hosung Park and Sue Moon. 2010. What is Twitter a social network or a news media?. In WWW.  Haewoon Kwak Changhyun Lee Hosung Park and Sue Moon. 2010. What is Twitter a social network or a news media?. In WWW.","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Ra\u00fal Lara-Cabrera and etal 2017. Measuring the radicalisation risk in social networks. IEEE Access 5 (2017).  Ra\u00fal Lara-Cabrera and et al. 2017. Measuring the radicalisation risk in social networks. IEEE Access 5 (2017).","DOI":"10.1109\/ACCESS.2017.2706018"},{"key":"e_1_3_2_1_28_1","unstructured":"Jong-Ryul Lee and Chin-Wan Chung. 2014. A fast approximation for influence maximization in large social networks. In WWW. ACM.  Jong-Ryul Lee and Chin-Wan Chung. 2014. A fast approximation for influence maximization in large social networks. In WWW. ACM."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Lin Li Anna Scaglione Ananthram Swami and Qing Zhao. 2011. Trust opinion diffusion and radicalization in social networks. In ASILOMAR. IEEE.  Lin Li Anna Scaglione Ananthram Swami and Qing Zhao. 2011. Trust opinion diffusion and radicalization in social networks. In ASILOMAR. IEEE.","DOI":"10.1109\/ACSSC.2011.6190091"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2015.08.020"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Elena Mastors and etal 2014. Omar al-Hammami: A case study in radicalization. Behavioral sciences 32 3 (2014).  Elena Mastors and et al. 2014. Omar al-Hammami: A case study in radicalization. Behavioral sciences 32 3 (2014).","DOI":"10.1002\/bsl.2108"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"John Monahan. 2012. The individual risk assessment of terrorism. Psychology Public Policy and Law 18 2 (2012).  John Monahan. 2012. The individual risk assessment of terrorism. Psychology Public Policy and Law 18 2 (2012).","DOI":"10.1037\/a0025792"},{"key":"e_1_3_2_1_33_1","unstructured":"Ashwini Nadkarni and Stefan G Hofmann. 2012. Why do people use Facebook? Personality and individual differences 52 3 (2012) 243--249.  Ashwini Nadkarni and Stefan G Hofmann. 2012. Why do people use Facebook? Personality and individual differences 52 3 (2012) 243--249."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Preslav Nakov and etal 2016. SemEval-2016 Task 4: Sentiment Analysis in Twitter. In SemEval@NAACL-HLT.  Preslav Nakov and et al. 2016. SemEval-2016 Task 4: Sentiment Analysis in Twitter. In SemEval@NAACL-HLT.","DOI":"10.18653\/v1\/S16-1001"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601602103"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Frank Ohlhorst. 2012. Big data analytics: turning big data into big money. Vol. 65. John Wiley & Sons.  Frank Ohlhorst. 2012. Big data analytics: turning big data into big money. Vol. 65. John Wiley & Sons.","DOI":"10.1002\/9781119205005"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Daniel Preo\u0163iuc-Pietro and etal 2015. Studying user income through language behaviour and affect in social media. PloS one 10 9 (2015).  Daniel Preo\u0163iuc-Pietro and et al. 2015. Studying user income through language behaviour and affect in social media. PloS one 10 9 (2015).","DOI":"10.1371\/journal.pone.0138717"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Khadije Rahimkhani and etal 2015. A fast algorithm for finding most influential people based on the linear threshold model. Expert Systems with Applications 42 3 (2015).  Khadije Rahimkhani and et al. 2015. A fast algorithm for finding most influential people based on the linear threshold model. Expert Systems with Applications 42 3 (2015).","DOI":"10.1016\/j.eswa.2014.09.037"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7364017"},{"key":"e_1_3_2_1_40_1","unstructured":"J Peter Rothe. 2017. The scientific analysis of personality. Routledge.  J Peter Rothe. 2017. The scientific analysis of personality. Routledge."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Hassan Saif and etal 2017. A semantic graph-based approach for radicalisation detection on social media. In European semantic web conference. Springer.  Hassan Saif and et al. 2017. A semantic graph-based approach for radicalisation detection on social media. In European semantic web conference. Springer.","DOI":"10.1007\/978-3-319-58068-5_35"},{"key":"e_1_3_2_1_42_1","volume-title":"Service-Oriented Computing - ICSOC 2018 Workshops - ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT","author":"Schiliro Francesco","year":"2018"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195555.3195564"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Ramine Tinati and etal 2012. Identifying communicator roles in twitter. In WWW. ACM.  Ramine Tinati and et al. 2012. Identifying communicator roles in twitter. In WWW. ACM.","DOI":"10.1145\/2187980.2188256"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Humberto M Trujillo and etal 2016. Psychometric properties of the Spanish version of the activism and radicalism intention scale. Revista de Psicolog\u00eda Social 31 1 (2016).  Humberto M Trujillo and et al. 2016. Psychometric properties of the Spanish version of the activism and radicalism intention scale. Revista de Psicolog\u00eda Social 31 1 (2016).","DOI":"10.1080\/02134748.2015.1101317"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Jianshu Weng and etal 2010. Twitterrank: finding topic-sensitive influential twitterers. In Web search and data mining conference. ACM.  Jianshu Weng and et al. 2010. Twitterrank: finding topic-sensitive influential twitterers. In Web search and data mining conference. ACM.","DOI":"10.1145\/1718487.1718520"}],"event":{"name":"MoMM2019: The 17th International Conference on Advances in Mobile Computing & Multimedia","location":"Munich Germany","acronym":"MoMM2019","sponsor":["Johannes Kepler University, Linz, Austria","@WAS International Organization of Information Integration and Web-based Applications and Services"]},"container-title":["Proceedings of the 17th International Conference on Advances in Mobile Computing &amp; Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365942","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365921.3365942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:37Z","timestamp":1750202617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365942"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":46,"alternative-id":["10.1145\/3365921.3365942","10.1145\/3365921"],"URL":"https:\/\/doi.org\/10.1145\/3365921.3365942","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]}}}