{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:27Z","timestamp":1750221387118,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T00:00:00Z","timestamp":1523232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NOVA LINCS","award":["UID\/CEC\/04516\/2013"],"award-info":[{"award-number":["UID\/CEC\/04516\/2013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,9]]},"DOI":"10.1145\/3167132.3167321","type":"proceedings-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T13:54:10Z","timestamp":1530626050000},"page":"1772-1781","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards an approach to elicit domain requirements from social networks"],"prefix":"10.1145","author":[{"given":"Cl\u00e1udio","family":"Borges","sequence":"first","affiliation":[{"name":"UNL, Portugal"}]},{"given":"Jo\u00e3o","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":"UNL, Portugal"}]},{"given":"Armanda","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"UNL, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2018,4,9]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"48","article-title":"The Role of Social Networks in Emergency Management","volume":"2","author":"Li L.","year":"2010","journal-title":"IJISCRAM."},{"key":"e_1_3_2_1_2_1","first-page":"180","volume-title":"An Exploratory Study of Topic Importance in Requirements Elicitation Interviews,\". CAiSE","author":"Burnay C.","year":"2014"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA235785"},{"issue":"1","key":"e_1_3_2_1_5_1","first-page":"16","article-title":"Social Network Extraction: A Review of Automatic Techniques","volume":"95","author":"Arif T.","year":"2014","journal-title":"Int. J. Comput. Appl."},{"volume-title":"Network Extraction of Conference Participants.' Budapest, Hungary,\" 12th Intern. Conference on World Wide Web","year":"2003","author":"Tomobe K.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"M. Kautz H. Selman B. and Shah \"The Hidden Web. \" in American Association for Artificial Intelligence magazine vol. 18(2) 1997 p. pp 27--35.  M. Kautz H. Selman B. and Shah \"The Hidden Web. \" in American Association for Artificial Intelligence magazine vol. 18(2) 1997 p. pp 27--35."},{"key":"e_1_3_2_1_8_1","unstructured":"Twitter API.\" {Online}. Available: dev.twitter.com.  Twitter API.\" {Online}. Available: dev.twitter.com."},{"key":"e_1_3_2_1_9_1","unstructured":"\"Unified Social Network API | docs.oneall.com.\" {Online}. Available: https:\/\/docs.oneall.com\/api\/. {Accessed: 26-Mar-2016}  \"Unified Social Network API | docs.oneall.com.\" {Online}. Available: https:\/\/docs.oneall.com\/api\/. {Accessed: 26-Mar-2016}"},{"key":"e_1_3_2_1_10_1","unstructured":"Social-Searcher \"#1 Social Media Search & Monitoring API.\" {Online}. Available: http:\/\/www.social-searcher.com\/api\/. {Accessed: 26-Mar-2016}.  Social-Searcher \"#1 Social Media Search & Monitoring API.\" {Online}. Available: http:\/\/www.social-searcher.com\/api\/. {Accessed: 26-Mar-2016}."},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Web Data Extraction, Applications and Techniques : A Survey","author":"Ferrara E.","year":"2010","journal-title":"ACM Trans. Comput. Log."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2013.2296520"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2014.60"},{"key":"e_1_3_2_1_14_1","unstructured":"\"Web Scraping Services Data Extraction Scrap Data from Website.\" {Online}. Available: http:\/\/www.iwebscraping.com\/. {Accessed: 26-Mar-2016}.  \"Web Scraping Services Data Extraction Scrap Data from Website.\" {Online}. Available: http:\/\/www.iwebscraping.com\/. {Accessed: 26-Mar-2016}."},{"key":"e_1_3_2_1_15_1","unstructured":"\"screen-scraper: Data extraction software and services.\" {Online}. Available: http:\/\/www.screen-scraper.com\/. {Accessed: 26-Mar-2016}.  \"screen-scraper: Data extraction software and services.\" {Online}. Available: http:\/\/www.screen-scraper.com\/. {Accessed: 26-Mar-2016}."},{"volume-title":"EMTerms 1.0: A Terminological Resource for Crisis Tweets,\" ISCRAM","year":"2015","author":"Temnikova I.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"Tweepy.org \"Tweepy.\" {Online}. Available: http:\/\/www.tweepy.org\/. {Accessed: 26-Mar-2016}.  Tweepy.org \"Tweepy.\" {Online}. Available: http:\/\/www.tweepy.org\/. {Accessed: 26-Mar-2016}."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810340"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882435"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-015-0021-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.67"},{"volume-title":"University of Toronto","year":"1995","author":"Yu E.","key":"e_1_3_2_1_22_1"},{"volume-title":"Hydro International","year":"2017","author":"Rodrigues A.","key":"e_1_3_2_1_23_1"},{"volume-title":"Tackling Complexity in the Heart of Software","year":"2003","author":"Evans E.","key":"e_1_3_2_1_24_1"}],"event":{"name":"SAC 2018: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Pau France","acronym":"SAC 2018"},"container-title":["Proceedings of the 33rd Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167132.3167321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:27:00Z","timestamp":1750213620000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167321"}},"subtitle":["the case of emergency systems"],"short-title":[],"issued":{"date-parts":[[2018,4,9]]},"references-count":23,"alternative-id":["10.1145\/3167132.3167321","10.1145\/3167132"],"URL":"https:\/\/doi.org\/10.1145\/3167132.3167321","relation":{},"subject":[],"published":{"date-parts":[[2018,4,9]]},"assertion":[{"value":"2018-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}