{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T09:42:21Z","timestamp":1776418941147,"version":"3.51.2"},"reference-count":269,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T00:00:00Z","timestamp":1579132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Text mining in big data analytics is emerging as a powerful tool for harnessing the power of unstructured textual data by analyzing it to extract new knowledge and to identify significant patterns and correlations hidden in the data. This study seeks to determine the state of text mining research by examining the developments within published literature over past years and provide valuable insights for practitioners and researchers on the predominant trends, methods, and applications of text mining research. In accordance with this, more than 200 academic journal articles on the subject are included and discussed in this review; the state-of-the-art text mining approaches and techniques used for analyzing transcripts and speeches, meeting transcripts, and academic journal articles, as well as websites, emails, blogs, and social media platforms, across a broad range of application areas are also investigated. Additionally, the benefits and challenges related to text mining are also briefly outlined.<\/jats:p>","DOI":"10.3390\/bdcc4010001","type":"journal-article","created":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T07:39:02Z","timestamp":1579246742000},"page":"1","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":239,"title":["Text Mining in Big Data Analytics"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0897-8663","authenticated-orcid":false,"given":"Hossein","family":"Hassani","sequence":"first","affiliation":[{"name":"Research Institute of Energy Management and Planning, University of Tehran, Tehran 1417466191, Iran"}]},{"given":"Christina","family":"Beneki","sequence":"additional","affiliation":[{"name":"Department of Tourism, Faculty of Economic Sciences, Ionian University, Kalypso Building, 4 P. Vraila Armeni, 49100 Corfu, Greece"}]},{"given":"Stephan","family":"Unger","sequence":"additional","affiliation":[{"name":"Department of Economics and Business, Saint Anselm College, 100 Saint Anselm Drive, Manchester, NH 03103, USA"}]},{"given":"Maedeh Taj","family":"Mazinani","sequence":"additional","affiliation":[{"name":"Department of Management, University of Tehran, Tehran 1417466191, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4109-0690","authenticated-orcid":false,"given":"Mohammad Reza","family":"Yeganegi","sequence":"additional","affiliation":[{"name":"Department of Accounting, Islamic Azad University, Central Tehran Branch, Tehran 1955847781, Iran"}]}],"member":"1968","published-online":{"date-parts":[[2020,1,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Talabis, M.R.M., McPherson, R., Miyamoto, I., Martin, J.L., and Kaye, D. (2015). Security and text mining. Information Security Analytics, Elsevier.","DOI":"10.1016\/B978-0-12-800207-0.00006-X"},{"key":"ref_2","unstructured":"Mitkov, R. (2005). Text Data Mining. The Oxford Handbook of Computational Linguistics, Oxford University Press."},{"key":"ref_3","first-page":"18","article-title":"Using SVMs for text categorization, Microsoft research","volume":"13","author":"Dumais","year":"1998","journal-title":"IEEE Intell. Syst. Mag."},{"key":"ref_4","unstructured":"Guduru, N. (2006). Text Mining with Support Vector Machines and Non-Negative Matrix Factorization Algorithms. [Ph.D. Thesis, University of Rhodes Island]."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bholat, D., Hansen, S., Santos, P., and Schonhardt-Bailey, C. (2015). CCBS Handbook No. 33, Text Mining For Central Banks, Bank of England.","DOI":"10.2139\/ssrn.2624811"},{"key":"ref_6","unstructured":"OPEC Bulletin (2020, January 01). Language Lessons, July\u2013August 2019. Available online: https:\/\/www.opec.org\/opec_web\/static_files_project\/media\/downloads\/publications\/OB07_082019.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s11127-006-9124-y","article-title":"Changing minds? Not in Congress!","volume":"131","author":"Poole","year":"2007","journal-title":"Public Choice"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1080\/19331680802149608","article-title":"Classifying party affiliation from political speech","volume":"5","author":"Yu","year":"2008","journal-title":"J. Inf. Technol. Polit."},{"key":"ref_9","unstructured":"Esuli, A. (2019, June 27). A Bibliography on Sentiment Classification. Available online: http:\/\/liinwww.ira.uka.de\/bibliography\/Misc\/Sentiment.html."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Dave, K., Lawrence, S., and Pennock, D.M. (2003, January 20\u201324). Mining the peanut gallery: Opinion extraction and semantic classification of product reviews. Proceedings of the 12th international conference on World Wide Web (WWW2003), Budapest, Hungary.","DOI":"10.1145\/775152.775226"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hu, M., and Liu, B. (2004, January 22). Mining and summarizing customer reviews. Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u20192004), Seattle, WA, USA.","DOI":"10.1145\/1014052.1014073"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L., and Vaithyanathan, S. (2002, January 6\u20137). Thumbs up? Sentiment classification using machine learning techniques. Proceedings of the ACL-02 Conference on Empirical Methods in Natural Language Processing (EMNLP\u201902), Philadelphia, PA, USA.","DOI":"10.3115\/1118693.1118704"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Rajagopalan, S., Srikant, R., and Xu, Y. (2003, January 20). Mining newsgroups using networks arising from social behavior. Proceedings of the 12th International Conference on World Wide Web (WWW2003), Budapest, Hungary.","DOI":"10.1145\/775152.775227"},{"key":"ref_14","unstructured":"Kwon, N., Zhou, L., Hovy, E., and Shulman, S.W. (2007, January 20\u201323). Identifying and classifying subjective claims. Proceedings of the 8th Annual International Conference on Digital Government Research: Bridging Disciplines & Domains, New York, NY, USA."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1081\/PAD-200064221","article-title":"E-rulemaking: Issues in current research and practice","volume":"28","author":"Shulman","year":"2015","journal-title":"Int. J. Public Adm."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Thomas, M., Pang, B., and Lee, L. (2006, January 22\u201323). Get out the vote: Determining support or opposition from Congressional floor-debate transcripts. Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing (EMNLP\u201906), Sydney, Australia.","DOI":"10.3115\/1610075.1610122"},{"key":"ref_17","unstructured":"Esuli, A., and Sebastiani, F. (2006, January 22). SENTIWORDNET: A Publicly Available Lexical Resource for Opinion Mining. Proceedings of the Fifth International Conference on Language Resources and Evaluation (LREC\u201906), Genoa, Italy."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Pang, B., and Lee, L. (2004, January 21\u201326). A sentimental education: Sentiment analysis using subjectivity summarization based on minimum cuts. Proceedings of the 42nd Meeting of the Association for Computational Linguistics, Barcelona, Spain.","DOI":"10.3115\/1218955.1218990"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yu, H., and Hatzivassiloglou, V. (2003, January 11). Towards answering opinion questions: Separating facts from opinions and identifying the polarity of opinion sentences. Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing, Sapporo, Japan.","DOI":"10.3115\/1119355.1119372"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Turney, P.D. (2002, January 7\u201312). Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews. Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, Philadelphia, PA, USA.","DOI":"10.3115\/1073083.1073153"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Pang, B., and Lee, L. (2005, January 25\u201330). Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales. Proceedings of the 43rd Meeting of the Association for Computational Linguistics, Ann Arbor, MI, USA.","DOI":"10.3115\/1219840.1219855"},{"key":"ref_22","unstructured":"Wilson, T., Wiebe, J., and Hwa, R. (2006, January 16\u201320). Just how mad are you? Finding strong and weak opinion clauses. Proceedings of the 21st Conference of the American Association for Artificial Intelligence, Boston, MA, USA."},{"key":"ref_23","unstructured":"Baccianella, S., Esuli, A., and Sebastiani, F. (2010, January 17\u201323). SENTIWORDNET 3.0: An enhanced lexical resource for sentiment analysis and opinion mining. Proceedings of the International Conference on Language Resources and Evaluation, LREC, Valletta, Malta."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1500000011","article-title":"Opinion Mining and Sentiment Analysis","volume":"2","author":"Pang","year":"2008","journal-title":"Found. Trends Inf. Retr."},{"key":"ref_25","unstructured":"(2019, June 28). Wordnet. Available online: https:\/\/wordnet.princeton.edu\/."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1093\/ijl\/3.4.235","article-title":"Introduction to WordNet: An On-line Lexical Database","volume":"3","author":"Miller","year":"1990","journal-title":"Int. J. Lexicogr."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1080\/19331681.2018.1485608","article-title":"Validating a sentiment dictionary for German political language\u2014A workbench note","volume":"15","author":"Rauh","year":"2018","journal-title":"J. Inf. Technol. Polit."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/10584609.2012.671234","article-title":"Affective news: The automated coding of sentiment in political texts","volume":"29","author":"Young","year":"2012","journal-title":"Polit. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.ins.2016.05.052","article-title":"iSA: A fast, scalable and accurate algorithm for sentiment analysis of social media content","volume":"367\u2013368","author":"Ceron","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1111\/j.1540-5907.2009.00428.x","article-title":"A method of automated nonparametric content analysis for social science","volume":"54","author":"Hopkins","year":"2010","journal-title":"Am. J. Polit. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1080\/19331681.2016.1214094","article-title":"Can social media reveal the preferences of voters? A comparison between sentiment analysis and traditional opinion polls","volume":"14","author":"Oliveira","year":"2017","journal-title":"J. Inf. Technol. Polit."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1080\/19331680802154145","article-title":"Good news or bad news? Conducting sentiment analysis on Dutch text to distinguish between positive and negative relations","volume":"5","author":"Kleinnijenhuis","year":"2008","journal-title":"J. Inf. Technol. Polit."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1093\/pan\/mpn007","article-title":"Lexical cohesion analysis of political speech","volume":"16","author":"Klebanov","year":"2008","journal-title":"Polit. Anal."},{"key":"ref_34","unstructured":"Acharya, A., Crawford, N., and Maduabum, M. (2016). A Nation Divided: Classifying Presidential Speeches, Stanford Univesity."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Lakoff, G. (2002). Moral Politics: How Liberals and Conservatives Think, The University of Chicago Press. [2nd ed.].","DOI":"10.7208\/chicago\/9780226471006.001.0001"},{"key":"ref_36","unstructured":"Lakoff, G., and Johnson, M. (1980). Metaphors We Live By, The Chicago University Press."},{"key":"ref_37","unstructured":"Miner, G., Elder, J., Fast, A., Hill, T., Nisbet, R., and Delen, D. (2012). Practical Text Mining and Statistical Analysis for Non-Structured Text Data, Academic Press."},{"key":"ref_38","first-page":"33","article-title":"Text Classification using Support Vector Machine","volume":"4","author":"Anurag","year":"2015","journal-title":"Int. J. Eng. Sci. Invent."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Lu, Y., Wang, H., Zhai, C., and Roth, D. (2012, January 2). Unsupervised discovery of opposing opinion networks from forum discussions. Proceedings of the 21st ACM International Conference on Information and Knowledge Management, Maui, HI, USA.","DOI":"10.1145\/2396761.2398489"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1111\/j.1467-8640.2006.00277.x","article-title":"Sentiment classification of movie reviews using contextual valence shifters","volume":"22","author":"Kennedy","year":"2006","journal-title":"Comput. Intell."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.eswa.2016.03.028","article-title":"Classification of sentiment reviews using n-gram machine learning approach","volume":"57","author":"Tripathy","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_42","first-page":"137","article-title":"Text categorization with Support Vector Machines: Learning with many relevant features","volume":"Volume 1398","author":"Rouveirol","year":"1998","journal-title":"Machine Learning: ECML-98"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Sardianos, C., Katakis, I.M., Petasis, G., and Karkaletsis, V. (2015, January 4). Argument extraction from news. Proceedings of the 2nd Workshop on Argumentation Mining, Denver, CO, USA.","DOI":"10.3115\/v1\/W15-0508"},{"key":"ref_44","unstructured":"Florou, E., Konstantopoulos, S., Koukourikos, A., and Karampiperis, P. (2013, January 8). Argument extraction for supporting public policy formulation. Proceedings of the 7th Workshop on Language Technology for Cultural Heritage, Social Sciences, and Humanities, Sofia, Bulgaria."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1142\/S0218213015400242","article-title":"Argument extraction from news, blogs, and social media","volume":"24","author":"Goudas","year":"2015","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Lippi, M., and Torroni, P. (2016, January 12). Argument Mining from Speech: Detecting Claims in Political Debates. Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, Phoenix, AZ, USA.","DOI":"10.1609\/aaai.v30i1.10384"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/505282.505283","article-title":"Machine learning in automated text categorization","volume":"34","author":"Sebastiani","year":"2002","journal-title":"ACM Comput. Surv."},{"key":"ref_48","first-page":"34","article-title":"Text classification by augmenting Bag of Words (BOW) representation with co-occurrence feature","volume":"16","author":"Soumya","year":"2014","journal-title":"OSR J. Comput. Eng."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Giannakopoulos, G., Mavridi, P., Paliouras, G., Papadakis, G., and Tserpes, K. (2012, January 13). Representation models for text classification: A comparative analysis over three web document types. Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, Craiova, Romania.","DOI":"10.1145\/2254129.2254148"},{"key":"ref_50","first-page":"13","article-title":"A survey of text similarity approaches","volume":"68","author":"Gomaa","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-Vector Networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"ref_52","first-page":"282","article-title":"Sentiment Analysis and Opinion Mining: A Survey","volume":"2","author":"Vinodhini","year":"2012","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Berger, A.L., Brown, P.F., Della Pietra, S.A., Della Pietra, V.J., Gillett, J.R., Lafferty, J.D., Mercer, R.L., Printz, H., and Ure\u0161, L. (1994). The Candide system for machine translation. HLT \u201994 Proceedings of the Workshop on Human Language Technology, Association for Computational Linguistics.","DOI":"10.3115\/1075812.1075844"},{"key":"ref_54","unstructured":"Diermeier, D., Godbout, J.-F., Yu, B., and Kaufmann, S. (2007, January 4). Language and ideology in Congress. Proceedings of the Annual Meeting of the Midwest Political Science Association (MPSA\u201907), Chicago, IL, USA."},{"key":"ref_55","unstructured":"Evans, M., Wayne, M., Cates, C.L., and Lin, J. (2005, January 7). Recounting the court? Toward a text-centered computational approach to understanding they dynamics of the judicial system. Proceedings of the Annual Meeting of the Midwest Political Science Association, Chicago, IL, USA."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1017\/S0003055403000698","article-title":"Extracting policy positions from political texts using words as data","volume":"97","author":"Laver","year":"2003","journal-title":"Am. Polit. Sci. Rev."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.ipm.2016.07.001","article-title":"Analytical mapping of opinion mining and sentiment analysis research during 2000\u20132015","volume":"53","author":"Piryani","year":"2017","journal-title":"Inf. Process. Manag."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Riloff, E., and Wiebe, J. (2003, January 11\u201312). Learning extraction patterns for subjective expressions. Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing (EMNLP-2003), Sapporo, Japan.","DOI":"10.3115\/1119355.1119369"},{"key":"ref_59","first-page":"1106","article-title":"Exploiting subjectivity classification to improve information extraction","volume":"Volume 3","author":"Riloff","year":"2005","journal-title":"Proceedings of the 20th National Conference on Artificial Intelligence"},{"key":"ref_60","unstructured":"Lafferty, J., McCallum, A., and Pereira, F. (July, January 28). Conditional random fields: Probabilistic models for segmenting and labeling sequence data. Proceedings of the Eighteenth International Conference on Machine Learning, Williams College, MA, USA."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/0004-3702(95)00123-9","article-title":"An empirical study of automated dictionary construction for information extraction in three domains","volume":"85","author":"Riloff","year":"1996","journal-title":"Artif. Intell."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Choi, Y., Cardie, C., Riloff, E., and Patwardhan, S. (2006, January 22\u201323). Identifying sources of opinions with conditional random fields and extraction patterns. Proceedings of the Conference on Human Language Technology and Empirical Methods in Natural Language Processing, Sydney, Australia.","DOI":"10.3115\/1220575.1220620"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Wilson, T., Wiebe, J., and Hoffmann, P. (2005, January 6\u20138). Recognizing contextual polarity in phrase-level sentiment analysis. Proceedings of the Conference on Human Language Technology and Empirical Methods in Natural Language Processing, Vancouver, BC, Canada.","DOI":"10.3115\/1220575.1220619"},{"key":"ref_64","unstructured":"Chesley, P., Vincent, B., Xu, L., and Srihari, R.K. (2006). Using verbs and adjectives to automatically classify blog sentiment. AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs (2006), AAAI."},{"key":"ref_65","first-page":"590","article-title":"Adapting a polarity lexicon using integer linear programming for domain-specific sentiment classification","volume":"Volume 2","author":"Choi","year":"2009","journal-title":"Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing"},{"key":"ref_66","first-page":"151","article-title":"Target-dependent twitter sentiment classification","volume":"Volume 1","author":"Jiang","year":"2011","journal-title":"Proceedings of the 49th, Annual Meeting of the Association for Computational Linguistics: Human Language Technologies"},{"key":"ref_67","first-page":"77","article-title":"Sentence-Level Sentiment Polarity Classification Using a Linguistic Approach","volume":"Volume 7008","author":"Xing","year":"2011","journal-title":"Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation"},{"key":"ref_68","first-page":"5","article-title":"Sentiment analysis using product review data","volume":"2","author":"Fang","year":"2015","journal-title":"J. Bigdata"},{"key":"ref_69","unstructured":"Levy, L.W., Karst, K.L., and Winkler, A. (2000). Hate Speech. Encyclopedia of the American Constitution, Macmillan. [2nd ed.]."},{"key":"ref_70","unstructured":"Warner, W., and Hirschberg, J. (2012, January 7). Detecting Hate Speech on the World Wide Web. Proceedings of the 2012 Workshop on Language in Social Media (LSM 2012), Montr\u00e9al, QC, Canada."},{"key":"ref_71","first-page":"373","article-title":"The Rich Transcription 2007 Meeting Recognition Evaluation","volume":"Volume 4625","author":"Stiefelhagen","year":"2008","journal-title":"Multimodal Technologies for Perception of Humans. RT 2007, CLEAR 2007. Lecture Notes in Computer Science"},{"key":"ref_72","unstructured":"Camelin, N., B\u00e9chet, F., Damnati, G., and De Mori, R. (2007, January 27\u201331). Speech Mining in Noisy Audio Message Corpus. Proceedings of the Interspeech 2007, Antwerp, Belgium. Available online: https:\/\/www.semanticscholar.org\/paper\/Speech-mining-in-noisy-audio-message-corpus-Camelin-B\u00e9chet\/9d59c1f2d228fce67c5c6fac7f04cc1a2b29b532."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1177\/1468794107085298","article-title":"Entering the blogosphere: Some strategies for using blogs in social research","volume":"8","author":"Hookway","year":"2008","journal-title":"Qual. Res."},{"key":"ref_74","unstructured":"Thompson, C. (New York Magazine, 2006). The Early Years, New York Magazine."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., and Freire, M.M. (2007). Probabilistic Techniques for Corporate Blog Mining. PAKDD 2007: Emerging Technologies in Knowledge Discovery and Data Mining, Springer.","DOI":"10.1007\/978-3-540-77018-3"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Sappleton, N. (2013). Techniques for analyzing blogs and micro-blogs. Advancing Research Methods with New Technologies, IGI Global.","DOI":"10.4018\/978-1-4666-3918-8"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"2766","DOI":"10.1016\/j.eswa.2010.08.067","article-title":"Dimensionality reduction techniques for blog visualization","volume":"38","author":"Tsai","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"5330","DOI":"10.1016\/j.eswa.2010.10.025","article-title":"A tag-topic model for blog mining","volume":"38","author":"Tsai","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Abbasi, M., and Liu, H. (2014). Social Media Mining: An Introduction, Cambridge University Press.","DOI":"10.1017\/CBO9781139088510"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Sammut, C., and Webb, G.I. (2017). Text mining for news and blogs analysis. Encyclopedia of Machine Learning and Data Mining, Springer.","DOI":"10.1007\/978-1-4899-7687-1"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C. (2011). Data Mining in social media. Social Network Data Analytics, Springer.","DOI":"10.1007\/978-1-4419-8462-3"},{"key":"ref_82","first-page":"406","article-title":"Convergence of influential bloggers for topic discovery in the blogosphere","volume":"Volume 6007","author":"Chai","year":"2010","journal-title":"Advances in Social Computing. SBP 2010. Lecture Notes in Computer Science"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Leban, G., Fortuna, B., Brank, J., and Grobelnik, M. (2014). Event registry: Learning about world events from news. WWW \u201914 Companion Proceedings of the 23rd International Conference on World Wide Web, ACM.","DOI":"10.1145\/2567948.2577024"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Tsai, F.S., and Chan, K.L. (2007, January 10\u201313). Dimensionality reduction techniques for data exploration. Proceedings of the 2007 6th International Conference on Information, Communications and Signal Processing, Singapore.","DOI":"10.1109\/ICICS.2007.4449863"},{"key":"ref_85","first-page":"46","article-title":"Detecting Cyber Security Threats in Weblogs using Probabilistic Models","volume":"Volume 4430","author":"Yang","year":"2007","journal-title":"PAISI 2007: Intelligence and Security Informatics"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Liang, H., Tsai, F.S., and Kdwee, A.T. (2009, January 8\u201310). Detecting novel business blogs. Proceedings of the 7th International Conference on Information, Communications and Signal Processing, Macau, China.","DOI":"10.1109\/ICICS.2009.5397541"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1504\/IJWET.2012.048519","article-title":"A data-centric approach to feed search in blogs","volume":"7","author":"Tsai","year":"2012","journal-title":"Int. J. Web Eng. Technol."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Cao, L., Huang, J.Z., Bailey, J., Koh, Y.S., and Luo, J. (2012). Blogger-Link-Topic Model for Blog Mining. New Frontiers in Applied Data Mining. PAKDD 2011. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/978-3-642-28320-8"},{"key":"ref_89","first-page":"267","article-title":"Dimensionality reduction framework for blog mining and visualisation","volume":"4","author":"Tsai","year":"2012","journal-title":"Int. J. Data Mining Model. Manag."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Sa, P., Sahoo, M., Murugappan, M., Wu, Y., and Majhi, B. (2018). A Multidimensional Approach to Blog Mining. Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, Springer.","DOI":"10.1007\/978-981-10-3376-6"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.jss.2016.06.012","article-title":"Large scale opinion mining for social, news and blog data","volume":"127","author":"Tsirakis","year":"2017","journal-title":"J. Syst. Softw."},{"key":"ref_92","first-page":"330","article-title":"A survey on sentiment analysis challenges","volume":"30","author":"Hussein","year":"2018","journal-title":"J. King Saud Univ. Eng. Sci."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1016\/j.future.2017.10.028","article-title":"Modeling public mood and emotion: Blog and news sentiment and socio-economic phenomena","volume":"96","author":"Chen","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Cao, L., Yu, P.S., Zhang, C., and Zhang, H. (2009). Blog Data Mining for Cyber Security Threats. Data Mining for Business Applications, Springer.","DOI":"10.1007\/978-0-387-79420-4"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"2883","DOI":"10.1007\/s00500-016-2265-0","article-title":"Sec-Buzzer: Cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation","volume":"21","author":"Lee","year":"2017","journal-title":"Soft Comput."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.protcy.2013.11.036","article-title":"A Framework for opinion mining in blogs for agriculture","volume":"8","author":"Valsamidis","year":"2013","journal-title":"Procedia Technol."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1016\/j.ipm.2018.10.017","article-title":"Can media forecast technological progress? A text-mining approach to the on-line newspaper and blog\u2019s representation of prospective industrial technologies","volume":"56","author":"Kim","year":"2019","journal-title":"Inf. Process. Manag."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Thomassey, S., and Zeng, X. (2018). Social media analytics for decision support in fashion buying processes. Artificial Intelligence for Fashion Industry in the Big Data Era, Springer Series in Fashion Business, Springer.","DOI":"10.1007\/978-981-13-0080-6"},{"key":"ref_99","unstructured":"Satapathy, S.C., Avadhani, P.S., and Abraham, A. (2012, January 5\u20137). Detecting and searching system for event on internet blog data using cluster mining algorithm. Proceedings of the International Conference on Information Systems Design and Intelligent Applications 2012 (INDIA 2012), Visakhapatnam, India."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.1016\/j.ijinfomgt.2016.02.009","article-title":"Make your travel smarter: Summarizing urban tourism information from massive blog data","volume":"36","author":"Yuan","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"830","DOI":"10.1177\/0165551515603323","article-title":"Where to go and what to play: Towards summarizing popular information from massive tourism blogs","volume":"41","author":"Xu","year":"2019","journal-title":"J. Inf. Sci."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Evans, D.K., Klavans, J.L., and McKeown, K.R. (2004, January 2\u20137). Columbia newsblaster: Multilingual news summarization on the web. Proceedings of the Demonstration Papers at HLT-NAACL, Boston, MA, USA. Available online: https:\/\/www.aclweb.org\/anthology\/N04-3001.","DOI":"10.3115\/1614025.1614026"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/2822907","article-title":"Multimedia news summarization in search","volume":"7","author":"Li","year":"2016","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Kouris, P., Alexandridis, G., and Stafylopatis, A. (2019, January 28). Abstractive text summarization based on deep learning and semantic content generalization. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Florence, Italy.","DOI":"10.18653\/v1\/P19-1501"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Chen, Y., Conroy, N.J., and Rubin, V.L. (2015, January 1). Misleading online content: Recognizing clickbait as false news. Proceedings of the 2015 ACM on Workshop on Multimodal Deception Detection, Seattle, WA, USA.","DOI":"10.1145\/2823465.2823467"},{"key":"ref_106","unstructured":"The Radicati Group, Inc. (2020, January 01). Email Statistics Report, 2019\u20132023\u2013Executive Summary February. Available online: https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2018\/12\/Email-Statistics-Report-2019-2023-Executive-Summary.pdf."},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Indurkhya, N., and Damerau, F.J. (2010). Text preprocessing. Handbook of Natural Language Processing, Chapman & Hall\/CRC. [2nd ed.].","DOI":"10.1201\/9781420085938"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Vakali, A., and Pallis, G. (2007). E-mail mining: Emerging techniques for E-Mail management. Web Data Management Practices: Emerging Techniques and Technologies, IGI Global.","DOI":"10.4018\/978-1-59904-228-2"},{"key":"ref_109","first-page":"57","article-title":"Email analysis and information extraction for enterprise benefit","volume":"30","author":"Kvassay","year":"2011","journal-title":"Comput. Inform."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A.V., and Rong, X. (2015). Data mining for the internet of things: literature review and challenges. Int. J. Distrib. Sens. Netw., 431047.","DOI":"10.1155\/2015\/431047"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Aggarwal, V., Bhatnagar, V., and Mishra, D. (2018). Big Data: Issues, challenges, and techniques in business intelligence. Big Data Analytics. Advances in Intelligent Systems and Computing, Springer.","DOI":"10.1007\/978-981-10-6620-7"},{"key":"ref_112","unstructured":"Klimt, B., and Yang, Y. (2004, January 30\u201331). Introducing the Enron corpus. Proceedings of the CEAS 2004\u2014First Conference on Email and Anti-Spam, Mountain View, CA, USA."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Minkov, E., Wang, R.C., and Cohen, W.W. (2005, January 6\u20138). Extracting personal names from emails: Applying named entity recognition to informal text. Proceedings of the Conference on Human Language Technology and Empirical Methods in Natural Language Processing, Vancouver, BC, Canada.","DOI":"10.3115\/1220575.1220631"},{"key":"ref_114","unstructured":"Androutsopoulos, I., Koutsias, J., Chrinos, K.V., Paliouras, G., and Spyropoulos, C. (2000, January 2). An evaluation of naive Bayesian anti-spam filtering. Proceedings of the 1th European Conference on Machine Learning in the New Information Age, Barcelona, Spain."},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Weerkamp, W., Balog, K., and De Rijke, M. (2009, January 6\u20139). Using contextual information to improve search in email archives. Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval, Toulouse, France.","DOI":"10.1007\/978-3-642-00958-7_36"},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-013-0658-2","article-title":"Email mining: Tasks, common techniques, and tools","volume":"41","author":"Tang","year":"2014","journal-title":"Knowl. Inf. Syst."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"9044","DOI":"10.1109\/ACCESS.2017.2702187","article-title":"Email classification research trends: review and open issues","volume":"5","author":"Mujtaba","year":"2017","journal-title":"IEEE Access"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Hangal, S., Lam, M.S., and Heer, J. (2011, January 16\u201319). MUSE: Reviving memories using email archives. Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, Santa Barbara, CA, USA.","DOI":"10.1145\/2047196.2047206"},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Liu, B. (2012). Sentiment Analysis and Opinion Mining, Morgan & Claypool Publishers.","DOI":"10.1007\/978-3-031-02145-9"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Liu, S., and Lee, I. (2015, January 24\u201327). A Hybrid Sentiment Analysis Framework for Large Email Data. Proceedings of the 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Taipei, Taiwan.","DOI":"10.1109\/ISKE.2015.91"},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2018.01.026","article-title":"Discovering sentiment sequence within email data through trajectory representation","volume":"99","author":"Liu","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_122","unstructured":"Wimmer, B. (2015). Business Espionage: Risk, Threats, and Countermeasures, Butterworth-Heinemann."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Chi, H., Scarllet, C., Prodanoff, Z.G., and Hubbard, D. (2016). Determining predisposition to insider threat activities by using text analysis. Future Technologies Conference (FTC), IEEE.","DOI":"10.1109\/FTC.2016.7821723"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Soh, C., Yu, S., Narayanan, A., Duraisamy, S., and Chen, L. (2019). Employee profiling via aspect-based sentiment and network for insider threats detection. Expert Syst. Appl., 351\u2013361.","DOI":"10.1016\/j.eswa.2019.05.043"},{"key":"ref_125","unstructured":"(2020, January 01). Cisco Talos Intelligence Group Report. Available online: https:\/\/www.talosintelligence.com\/."},{"key":"ref_126","unstructured":"Osterman Research, Inc. (2017). Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing, An Osterman Research White Paper, Osterman Research, Inc."},{"key":"ref_127","unstructured":"Tretyakov, K. (2004). Machine Learning Techniques in Spam Filtering. Data Mining Problem-Oriented Seminar, MTAT. Available online: https:\/\/courses.cs.ut.ee\/2004\/dm-seminarspring\/uploads\/Main\/P06.pdf."},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Bhowmick, A., and Hazarika, S.M. (2016). Machine learning for E-Mail spam filtering: review, techniques and trends. arXiv.","DOI":"10.1007\/978-981-10-4765-7_61"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"e01802","DOI":"10.1016\/j.heliyon.2019.e01802","article-title":"Machine learning for email spam filtering: Review, approaches and open research problems","volume":"5","author":"Dada","year":"2019","journal-title":"Heliyon"},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.asej.2018.06.001","article-title":"Efficient email classification approach based on semantic methods","volume":"9","author":"Bahgat","year":"2018","journal-title":"Ain Shams Eng. J."},{"key":"ref_131","first-page":"169","article-title":"An enhanced online phishing e-mail detection framework based on evolving connectionist system","volume":"9","author":"Almomani","year":"2013","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"e3929","DOI":"10.1002\/cpe.3929","article-title":"Multilayer hybrid strategy for phishing email zero-day filtering","volume":"29","author":"Chowdhury","year":"2016","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.dss.2018.01.001","article-title":"Detection of online phishing email using dynamic evolving neural network based on reinforcement learning","volume":"107","author":"Smadi","year":"2018","journal-title":"Decis. Support Syst."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s11192-014-1434-0","article-title":"Use of web mining in studying innovation","volume":"102","author":"Waterworth","year":"2015","journal-title":"Scientometrics"},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1177\/0894439316643050","article-title":"B Big Data, Big Noise: The Challenge of Finding Issue Networks on the Web","volume":"35","author":"Waldherr","year":"2017","journal-title":"Soc. Sci. Comput. Rev."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/240455.240473","article-title":"The world wide web: Quagmire or gold mine","volume":"39","author":"Etzioni","year":"1996","journal-title":"Commun. ACM"},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/BF03325089","article-title":"Data preparation for mining World Wide Web browsing patterns","volume":"1","author":"Cooley","year":"1999","journal-title":"Knowl. Inf. Syst."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Markov, Z., and Larose, D.T. (2007). Data Mining the Web: Uncovering Patterns in Web Content, Structure and Usage, Wiley-Interscience.","DOI":"10.1002\/0470108096"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"5228","DOI":"10.1016\/j.eswa.2013.03.008","article-title":"Web mining and privacy concerns: Some important legal issues to be consider before applying any data and information extraction technique in web-based environments","volume":"40","year":"2013","journal-title":"Expert Syst. Appl."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Masand, B., and Spiliopoulou, M. (1999). Data mining of user navigation patterns. Web Usage Analysis and User Profiling. WebKDD 1999. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/3-540-44934-5"},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Mohania, M., and Tjoa, A.M. (1999). Research Issues in Web Data Mining. DataWarehousing and Knowledge Discovery. DaWaK 1999. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/3-540-48298-9"},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Xu, G., Zhang, Y., and Li, L. (2011). Web Mining and Social Networking, Springer.","DOI":"10.1007\/978-1-4419-7735-9"},{"key":"ref_143","first-page":"17","article-title":"Ranking of web pages using aggregation of page rank and hits algorithm","volume":"7","author":"Kanathey","year":"2018","journal-title":"Int. J. Adv. Stud. Comput. Sci. Eng."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.datak.2004.08.001","article-title":"Mining interesting knowledge from weblogs: A survey","volume":"53","author":"Facca","year":"2005","journal-title":"Data Knowl. Eng."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/846183.846188","article-title":"Web usage mining: Discovery and applications of usage patterns from web data","volume":"1","author":"Srivastava","year":"2000","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.datak.2006.06.001","article-title":"Combined mining of web server logs and web contents for classifying user navigation patterns and predicting users\u2019 future requests","volume":"61","author":"Liu","year":"2007","journal-title":"Data Knowl. Eng."},{"key":"ref_147","first-page":"272","article-title":"Fuzzy information retrieval in WWW: A survey","volume":"6","author":"Kohli","year":"2014","journal-title":"Int. J. Adv. Intell. Paradig."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.inffus.2018.08.003","article-title":"FORA: An OWO based framework for finding Outliers in Web Usage Mining","volume":"48","author":"Gupta","year":"2019","journal-title":"Inf. Fusion"},{"key":"ref_149","first-page":"15","article-title":"Anomaly detection: A survey","volume":"41","author":"Chola","year":"2009","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_150","unstructured":"Das, K., Deep, K., Pant, M., Bansal, J., and Nagar, A. (2014, January 23). An analytical study of ordered weighted geometric averaging operator on Web data set as a MCDM problem. Proceedings of the Fourth International Conference on Soft Computing for Problem Solving, Assam, India."},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1002\/int.21810","article-title":"OWA operator-based hybrid framework for outlier reduction in web mining","volume":"31","author":"Gupta","year":"2016","journal-title":"Int. J. Intell. Syst."},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.inffus.2015.07.004","article-title":"Web news mining in an evolving framework","volume":"28","author":"Iglesias","year":"2016","journal-title":"Inf. Fusion"},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.asoc.2016.11.034","article-title":"Evolving type-2 web news mining","volume":"54","author":"Pratama","year":"2017","journal-title":"Appl. Soft Comput."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/360402.360406","article-title":"Web mining research: A survey","volume":"2","author":"Kosala","year":"2000","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.procs.2017.05.355","article-title":"Automating the extraction of static content and dynamic behaviour from e-commerce websites","volume":"109","author":"Dias","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1016\/j.ifacol.2018.08.101","article-title":"Integration and Analysis of Agricultural Market Information Based on Web Mining","volume":"51","author":"Zhou","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"ref_157","unstructured":"Symantec Corporation Inc. (2020, January 01). Internet Security Threat Report. Available online: https:\/\/resource.elq.symantec.com\/LP=6819?CID=70138000001QvI4AAK."},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2015.04.001","article-title":"Tutorial and critical analysis of phishing websites methods","volume":"17","author":"Mohammad","year":"2015","journal-title":"Comput. Sci. Rev."},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Yi, P., Guan, Y., Zou, F., Yao, Y., Wang, W., and Zhu, T. (2018). Web Phishing Detection Using a Deep Learning Framework. Wirel. Commun. Mob. Comput., 1\u20139.","DOI":"10.1155\/2018\/4678746"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3233\/IDA-130627","article-title":"Identifying User Sessions from Web Server Logs with Integer Programming","volume":"18","author":"Dell","year":"2014","journal-title":"Intell. Data Anal."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.ijhcs.2019.06.012","article-title":"Assisted pattern mining for discovering interactive behaviors on the web","volume":"130","author":"Apaolaza","year":"2019","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_162","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.inffus.2017.02.006","article-title":"Biometric information fusion for web user navigation and preferences analysis: An overview","volume":"38","author":"Slanzi","year":"2017","journal-title":"Inf. Fusion"},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.tele.2017.10.006","article-title":"Sentiment analysis on Twitter: A text mining approach to the Syrian refugee crisis","volume":"35","author":"Ayvaz","year":"2018","journal-title":"Telemat. Inf."},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1017\/S0269888914000277","article-title":"A survey on text mining in social networks","volume":"30","author":"Irfan","year":"2015","journal-title":"Knowl. Eng. Rev."},{"key":"ref_165","unstructured":"Calzolari, N., Choukri, K., Maegaard, B., Mariani, J., Odijk, J., Piperidis, S., Rosner, M., and Tapias, D. (2010, January 17\u201323). Twitter as a corpus for sentiment analysis and opinion mining. Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC\u201910), Valletta, Malta."},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jfds.2017.11.002","article-title":"Twitter as a tool for forecasting stock market movements: A short-window event study","volume":"4","author":"Nisar","year":"2018","journal-title":"J. Financ. Data Sci."},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jocs.2010.12.007","article-title":"Twitter mood predicts the stock market","volume":"2","author":"Bollen","year":"2011","journal-title":"J. Comput. Sci."},{"key":"ref_168","doi-asserted-by":"crossref","unstructured":"Ruiz, E.J., Hristidis, V., Castillo, C., Gionis, A., and Jaimes, A. (2012, January 8\u201312). Correlating financial time series with micro-blogging activity. Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, (WSDM\u201912), Seattle, WA, USA.","DOI":"10.1145\/2124295.2124358"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1016\/j.dss.2013.02.006","article-title":"Automated news reading: Stock price prediction based on financial news using context-capturing features","volume":"55","author":"Hagenau","year":"2013","journal-title":"Decis. Support Syst."},{"key":"ref_170","unstructured":"Zhang, L. (2013). Sentiment Analysis on Twitter with Stock Price and Significant Keyword Correlation, The University of Texas."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Bing, L., Chan, K.C., and Ou, C. (2014, January 5\u20137). Public sentiment analysis in Twitter data for prediction of a company\u2019s stock price movements. Proceedings of the 2014 IEEE 11th International Conference on e-Business Engineering, Guangzhou, China.","DOI":"10.1109\/ICEBE.2014.47"},{"key":"ref_172","doi-asserted-by":"crossref","first-page":"62","DOI":"10.4236\/sn.2015.43008","article-title":"Sentiment analysis of investor opinions on twitter","volume":"4","author":"Dickinson","year":"2015","journal-title":"Soc. Netw."},{"key":"ref_173","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1016\/j.procs.2018.05.111","article-title":"Real-time sentiment analysis of Twitter streaming data for stock prediction","volume":"132","author":"Das","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_174","first-page":"52","article-title":"Stock market classification model using sentiment analysis on twitter based on hybrid naive bayes classifiers","volume":"11","author":"Alkubaisi","year":"2018","journal-title":"Comput. Inf. Sci."},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Broadstock, D.C., and Zhang, D. (2019). Social-media and intraday stock returns: The pricing power of sentiment. Financ. Res. Lett., 116\u2013123.","DOI":"10.1016\/j.frl.2019.03.030"},{"key":"ref_176","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1016\/j.jclepro.2019.02.063","article-title":"An Arabic social media based framework for incidents and events monitoring in smart cities","volume":"220","author":"Alkhatib","year":"2019","journal-title":"J. Clean. Prod."},{"key":"ref_177","unstructured":"Gupta, B., Sharma, S., and Chennamaneni, A. (2016, January 11). Twitter Sentiment Analysis: An Examination of Cybersecurity Attitudes and Behavior. Proceedings of the 2016 Pre-ICIS SIGDSA\/IFIP WG8.3 Symposium: Innovations in Data Analytics, Dublin, Ireland."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ijhm.2016.02.001","article-title":"Twitter sentiment analysis: Capturing sentiment from integrated resort tweets","volume":"55","author":"Philer","year":"2016","journal-title":"Int. J. Hosp. Manag."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.soscij.2016.09.004","article-title":"How do journalists leverage Twitter? Expressive and consumptive use of Twitter","volume":"54","author":"Lee","year":"2017","journal-title":"Soc. Sci. J."},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1016\/j.jss.2016.06.050","article-title":"A pattern-matched Twitter analysis of US cancer-patient sentiments","volume":"206","author":"Crannell","year":"2016","journal-title":"J. Surg. Res."},{"key":"ref_181","doi-asserted-by":"crossref","unstructured":"Wang, H., Can, D., Kazemzadeh, A., Bar, F., and Narayanan, S. (2012, January 8\u201314). A system for real-time twitter sentiment analysis of 2012 US presidential election cycle. Proceedings of the ACL 2012 System Demonstrations, Jeju Island, Korea.","DOI":"10.1063\/pt.4.0099"},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Greco, F., and Polli, A. (2019). Emotional text mining: Customer profiling in brand management. Int. J. Inf. Manag.","DOI":"10.1016\/j.ijinfomgt.2019.04.007"},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.procs.2018.10.296","article-title":"Text mining to understand the influence of social media applications on smartphone supply chain","volume":"140","author":"Akundi","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_184","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.procs.2018.10.297","article-title":"Social Media Analysis of User\u2019s Responses to Terrorism Using Sentiment Analysis and Text Mining","volume":"140","author":"Mansour","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_185","doi-asserted-by":"crossref","unstructured":"Reyes-Menendez, A., Saura, J.R., and Alvarez-Alonso, C. (2018). Understanding #WorldEnvironmentDay user opinions in Twitter: A topic-based sentiment analysis approach. Int. J. Environ. Res. Public Health, 15.","DOI":"10.3390\/ijerph15112537"},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.acalib.2015.12.014","article-title":"A text mining analysis of academic libraries\u2019 Tweets","volume":"42","author":"Abrahams","year":"2016","journal-title":"J. Acad. Librariansh."},{"key":"ref_187","unstructured":"Center, P.R. (2017). Social Media Fact Sheet, Pew Research Center."},{"key":"ref_188","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.ijinfomgt.2017.08.003","article-title":"Social network analysis: Characteristics of online social networks after a disaster","volume":"38","author":"Kim","year":"2018","journal-title":"Int. J. Inf. Manag."},{"key":"ref_189","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1016\/j.ijinfomgt.2013.01.001","article-title":"Social media competitive analysis and text mining: A case study in the pizza industry","volume":"33","author":"He","year":"2013","journal-title":"Int. J. Inf. Manag."},{"key":"ref_190","first-page":"8","article-title":"Analysis and classification of Arabic newspapers\u2019 Facebook pages using text mining techniques","volume":"1","author":"Salloum","year":"2017","journal-title":"Int. J. Inf. Technol. Lang. Stud."},{"key":"ref_191","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.acalib.2018.02.004","article-title":"Analysis of academic libraries\u2019 facebook posts: Text and data analytics","volume":"44","author":"Abrahams","year":"2018","journal-title":"J. Acad. Librariansh."},{"key":"ref_192","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.trpro.2018.10.105","article-title":"Transport analysis approach based on big data and text mining analysis from social media","volume":"33","author":"Serna","year":"2018","journal-title":"Transp. Res. Procedia"},{"key":"ref_193","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.jairtraman.2019.04.001","article-title":"Voice of airline passenger: A text mining approach to understand customer satisfaction","volume":"77","author":"Sezgen","year":"2019","journal-title":"J. Air Transp. Manag."},{"key":"ref_194","doi-asserted-by":"crossref","unstructured":"Suresh, V., Roohi, S., and Eirinaki, M. (2014, January 1). Aspect-based opinion mining and recommendation system for restaurant reviews. Proceedings of the 8th ACM Conference on Recommender systems, Foster City, CA, USA.","DOI":"10.1145\/2645710.2645716"},{"key":"ref_195","doi-asserted-by":"crossref","unstructured":"Saha, S., and Santra, A.K. (2017, January 10\u201312). Restaurant rating based on textual feedback. Proceedings of the 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), Vellore, India.","DOI":"10.1109\/ICMDCS.2017.8211542"},{"key":"ref_196","doi-asserted-by":"crossref","unstructured":"Chen, M.-Y., Liao, C.-H., and Hsieh, R.-P. (2019). Modeling public mood and emotion: Stock market trend prediction with anticipatory computing approach. Comput. Hum. Behav.","DOI":"10.1016\/j.chb.2019.03.021"},{"key":"ref_197","unstructured":"Benferhat, S., Tabia, K., and Ali, M. (2017). Stock volatility prediction using recurrent neural networks with sentiment analysis. International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, Springer."},{"key":"ref_198","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.datak.2018.08.003","article-title":"Leveraging social media news to predict stock index movement using RNN-boost","volume":"118","author":"Chen","year":"2018","journal-title":"Data Knowl. Eng."},{"key":"ref_199","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.pacfin.2018.07.007","article-title":"Tweeting the financial market: Media effect in the era of Big Data","volume":"51","author":"Liu","year":"2018","journal-title":"Pac. Basin Financ. J."},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.jocs.2017.10.013","article-title":"Exploiting investors social network for stock prediction in China\u2019s market","volume":"28","author":"Zhang","year":"2018","journal-title":"J. Comput. Sci."},{"key":"ref_201","doi-asserted-by":"crossref","unstructured":"Pejic-Bach, M., Bertoncel, T., Me\u0161ko, M., and Krstic, \u017d. (2019). Text mining of industry 4.0 job advertisements. Int. J. Inf. Manag.","DOI":"10.1016\/j.ijinfomgt.2019.07.014"},{"key":"ref_202","doi-asserted-by":"crossref","first-page":"1314","DOI":"10.1016\/j.eswa.2014.09.024","article-title":"Business intelligence in banking: A literature analysis from 2002 to 2013 using text mining and latent Dirichlet allocation","volume":"42","author":"Moro","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"ref_203","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.iedeen.2017.06.002","article-title":"Research trends on Big Data in Marketing: A text mining and topic modeling based literature analysis","volume":"24","author":"Amado","year":"2018","journal-title":"Eur. Res. Manag. Bus. Econ."},{"key":"ref_204","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.jbusres.2019.01.053","article-title":"A text mining and topic modelling perspective of ethnic marketing research","volume":"103","author":"Moro","year":"2019","journal-title":"J. Bus. Res."},{"key":"ref_205","doi-asserted-by":"crossref","first-page":"e12280","DOI":"10.1111\/exsy.12280","article-title":"Insights from a text mining survey on Expert Systems research from 2000 to 2016","volume":"35","author":"Cortez","year":"2018","journal-title":"Expert Syst."},{"key":"ref_206","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1108\/IJCHM-07-2016-0340","article-title":"Brand strategies in social media in hospitality and tourism","volume":"30","author":"Moro","year":"2018","journal-title":"Int. J. Contemp. Hosp. Manag."},{"key":"ref_207","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s10551-015-2622-4","article-title":"A text mining-based review of cause-related marketing literature","volume":"139","author":"Guerreiro","year":"2016","journal-title":"J. Bus. Ethics"},{"key":"ref_208","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.jbusres.2018.10.055","article-title":"Understanding the use of virtual reality in marketing: A text mining-based review","volume":"100","author":"Loureiro","year":"2019","journal-title":"J. Bus. Res."},{"key":"ref_209","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.compind.2019.04.018","article-title":"Industry 4.0: Emerging themes and future research avenues using a text mining approach","volume":"109","author":"Galati","year":"2019","journal-title":"Comput. Ind."},{"key":"ref_210","first-page":"4667","article-title":"The at 55: A content-driven review and analysis","volume":"57","author":"Guan","year":"2017","journal-title":"Int. J. Prod. Res."},{"key":"ref_211","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.ijpe.2018.06.006","article-title":"A text mining based overview of inventory research in the ISIR special issues 1994-2016","volume":"209","author":"Demeter","year":"2018","journal-title":"Int. J. Prod. Econ."},{"key":"ref_212","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/s11367-016-1153-2","article-title":"Implicit prioritization in life cycle assessment: Text mining and detecting metapatterns in the literature","volume":"22","author":"Grubert","year":"2016","journal-title":"Int. J. Life Cycle Assess."},{"key":"ref_213","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.solener.2017.11.023","article-title":"History and trends in solar irradiance and PV power forecasting: A preliminary assessment and review using text mining","volume":"168","author":"Yang","year":"2018","journal-title":"Sol. Energy"},{"key":"ref_214","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.annals.2017.07.011","article-title":"A text mining approach to analyzing Annals literature","volume":"66","author":"Moro","year":"2017","journal-title":"Ann. Tour. Res."},{"key":"ref_215","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s10806-019-09781-4","article-title":"Pain in Pig Production: Text Mining Analysis of the Scientific Literature","volume":"32","author":"Contiero","year":"2019","journal-title":"J. Agric. Environ. Ethics"},{"key":"ref_216","doi-asserted-by":"crossref","unstructured":"Wang, S.-H., Ding, Y., Zhao, W., Huang, Y.-H., Perkins, R., Zou, W., and Chen, J.J. (2016). Text mining for identifying topics in the literatures about adolescent substance use and depression. BMC Public Health, 16.","DOI":"10.1186\/s12889-016-2932-1"},{"key":"ref_217","doi-asserted-by":"crossref","first-page":"182","DOI":"10.3389\/fnsys.2014.00182","article-title":"A practical application of text mining to literature on cognitive rehabilitation and enhancement through neurostimulation","volume":"8","author":"Balan","year":"2014","journal-title":"Front. Syst. Neurosci."},{"key":"ref_218","doi-asserted-by":"crossref","unstructured":"Matthiesen, R. (2016). Review and literature mining on proteostasis factors and cancer. Proteostasis. Methods in Molecular Biology, Humana Press.","DOI":"10.1007\/978-1-4939-3756-1"},{"key":"ref_219","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.compbiomed.2019.04.008","article-title":"Exploring diseases and syndromes in neurology case reports from 1955 to 2017 with text mining","volume":"109","author":"Karami","year":"2019","journal-title":"Comput. Biol. Med."},{"key":"ref_220","doi-asserted-by":"crossref","unstructured":"Kayal, S., Afzal, Z., Tsatsaronis, G., Doornenbal, M., Katrenko, S., and Gregory, M. (2018, January 13). A framework to automatically extract funding information from text. Proceedings of the International Conference on Machine Learning, Optimization, and Data Science, Volterra, Italy.","DOI":"10.1007\/978-3-030-13709-0_27"},{"key":"ref_221","doi-asserted-by":"crossref","unstructured":"Yousif, A., Niu, Z., Nyamawe, A.S., and Hu, Y. (2018, January 26\u201328). Improving citation sentiment and purpose classification using hybrid deep neural network model. Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, Cairo, Egypt.","DOI":"10.1007\/978-3-319-99010-1_30"},{"key":"ref_222","doi-asserted-by":"crossref","unstructured":"Sag, M. (2019). The new legal landscape for text mining and machine learning. J. Copyr. Soc. USA, 66.","DOI":"10.2139\/ssrn.3331606"},{"key":"ref_223","unstructured":"(2020, January 01). Directive (EU) 2019\/790 of the European Parliament and of the Council of 17 April 2019 on Copyright in the Digital Single Market. Available online: https:\/\/eur-lex.europa.eu\/eli\/dir\/2019\/790\/oj."},{"key":"ref_224","first-page":"11","article-title":"Improved keyword and keyphrase extraction from meeting transcripts","volume":"52","author":"Sheeba","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_225","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1109\/TASL.2010.2052119","article-title":"A supervised framework for keyword extraction from meeting transcripts","volume":"19","author":"Liu","year":"2010","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"ref_226","doi-asserted-by":"crossref","unstructured":"Liu, F., Pennell, D., Liu, F., and Liu, Y. (2009). Unsupervised approaches for automatic keyword extraction using meeting transcripts. NAACL\u201909 Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Association for Computational Linguistics.","DOI":"10.3115\/1620754.1620845"},{"key":"ref_227","unstructured":"Song, H.-J., Go, J., Park, S.-B., and Park, S.-Y. (2013, January 9\u201314). A just-in-time keyword extraction from meeting transcripts. Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Atlanta, GA, USA."},{"key":"ref_228","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10844-015-0391-2","article-title":"A just-in-time keyword extraction from meeting transcripts using temporal and participant information","volume":"48","author":"Song","year":"2017","journal-title":"J. Intell. Inf. Syst."},{"key":"ref_229","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1016\/j.csl.2009.04.007","article-title":"Improving supervised learning for meeting summarization using sampling and regression","volume":"24","author":"Xie","year":"2010","journal-title":"Comput. Speech Lang."},{"key":"ref_230","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10772-009-9048-2","article-title":"Text segmentation of spoken meeting transcripts","volume":"11","author":"Sharp","year":"2008","journal-title":"Int. J. Speech Technol."},{"key":"ref_231","doi-asserted-by":"crossref","first-page":"123024","DOI":"10.1088\/1367-2630\/13\/12\/123024","article-title":"Comparing intermittency and network measurements of words and their dependence on authorship","volume":"13","author":"Amancio","year":"2011","journal-title":"New J. Phys."},{"key":"ref_232","doi-asserted-by":"crossref","first-page":"043029","DOI":"10.1088\/1367-2630\/14\/4\/043029","article-title":"Identification of literary movements using complex networks to represent texts","volume":"14","author":"Amancio","year":"2012","journal-title":"New J. Phys."},{"key":"ref_233","doi-asserted-by":"crossref","unstructured":"Amancio, D.R. (2015). A complex network approach to stylometry. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0136076"},{"key":"ref_234","doi-asserted-by":"crossref","unstructured":"Wang, T., Brede, M., Ianni, A., and Mentzakis, E. (2019). Characterizing dynamic communication in online eating disorder communities: A multiplex network approach. Appl. Netw. Sci., 4.","DOI":"10.1007\/s41109-019-0125-4"},{"key":"ref_235","first-page":"954","article-title":"Text mining approaches for automated literature knowledge extraction and representation","volume":"160","author":"Nuzzo","year":"2010","journal-title":"Stud. Health Technol. Inform."},{"key":"ref_236","doi-asserted-by":"crossref","unstructured":"Gentzkow, M., Kelly, B.T., and Taddy, M. (2017). Text As Data. NBER Work. Pap.","DOI":"10.3386\/w23276"},{"key":"ref_237","doi-asserted-by":"crossref","first-page":"368","DOI":"10.7763\/IJFCC.2013.V2.187","article-title":"Latent text mining for cybercrime forensics","volume":"2","author":"Lau","year":"2013","journal-title":"Int. J. Future Comput. Commun."},{"key":"ref_238","doi-asserted-by":"crossref","unstructured":"Suh-Lee, C., Ju-Yeon, J., and Yoohwan, K. (2016, January 17\u201319). Text mining for security threat detection discovering hidden information in unstructured log messages. Proceedings of the 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA.","DOI":"10.1109\/CNS.2016.7860492"},{"key":"ref_239","unstructured":"Venkat, N., and Gudivada, C.R. (2018). Text Mining for Modeling Cyberattacks. Computational Analysis and Understanding of Natural Languages: Principles, Methods and Applications, Elsevier. Chapter 14."},{"key":"ref_240","doi-asserted-by":"crossref","unstructured":"Dong, F., Yuan, S., Ou, H., and Liu, L. (2018, January 21\u201322). New Cyber Threat Discovery from Darknet Marketplaces. Proceedings of the IEEE Conference on Big Data and Analytics (ICBDA), Shanghai, China.","DOI":"10.1109\/ICBDAA.2018.8629658"},{"key":"ref_241","unstructured":"Kaplan, J., Sharma, S., and Weinberg, A. (2020, January 01). Meeting the Cybersecurity Challenge. Available online: https:\/\/www.mckinsey.com\/business-functions\/digital-mckinsey\/our-insights\/meeting-the-cybersecurity-challenge."},{"key":"ref_242","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1080\/21582041.2015.1117648","article-title":"A consideration of the social impact of cybercrime: Examples from hacking, piracy, and child abuse material online","volume":"11","author":"Aiken","year":"2015","journal-title":"Contemp. Soc. Sci."},{"key":"ref_243","unstructured":"Ponemon Institute (2020, January 01). 2017 Cost of Data Breach Study: Global Overview (Research Report). Ponemon Institute. Available online: https:\/\/www.ibm.com\/downloads\/cas\/ZYKLN2E3."},{"key":"ref_244","unstructured":"(2020, January 01). EC Horizon 2020, Secure Societies\u2014Protecting Freedom and Security of Europe and Its Citizens. Available online: https:\/\/ec.europa.eu\/programmes\/horizon2020\/en\/h2020-section\/secure-societies-%E2%80%93-protecting-freedom-and-security-europe-and-its-citizens."},{"key":"ref_245","unstructured":"Akhgar, B., Staniforth, A., and Bosco, F. (2014). Social media and its role for LEAs. Cyber Crime and Cyber Terrorism Investigator\u2019s Handbook, Elsevier."},{"key":"ref_246","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.chb.2018.11.039","article-title":"Toward a cybercrime classification ontology: A knowledge-based approach","volume":"92","author":"Donalds","year":"2019","journal-title":"Comput. Hum. Behav."},{"key":"ref_247","doi-asserted-by":"crossref","unstructured":"Hicks, C. (2017, January 4\u20137). An ontological approach to misinformation: Quickly finding relevant information. Proceedings of the 50th Hawaii International Conference on System Sciences, (HICSS 2017), Waikoloa Village, HI, USA.","DOI":"10.24251\/HICSS.2017.111"},{"key":"ref_248","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.cose.2019.02.003","article-title":"Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts","volume":"83","author":"Yu","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_249","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1016\/j.ejor.2019.06.022","article-title":"Detecting fake news for reducing misinformation risks using analytics approaches","volume":"279","author":"Zhang","year":"2019","journal-title":"Eur. J. Oper. Res."},{"key":"ref_250","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.osnem.2018.12.001","article-title":"Source detection of rumor in social network\u2014A review","volume":"9","author":"Shelke","year":"2019","journal-title":"Online Soc. Netw. Media"},{"key":"ref_251","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.ins.2019.05.035","article-title":"A Survey on fake news and rumour detection techniques","volume":"497","author":"Bondielli","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_252","unstructured":"European Data Protection Supervisor (2020, January 01). Meeting the Challenges of Big Data: A Call for Transparency, User Control, Data Protection by Design and Accountability, Opinion 7\/2015. Available online: https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/15-11-19_big_data_en.pdf."},{"key":"ref_253","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.clsr.2014.01.009","article-title":"Legal aspects of text mining","volume":"30","author":"Truyens","year":"2014","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_254","first-page":"102351","article-title":"Sharing information online rationally: An observation of user privacy concerns and awareness using serious game","volume":"48","author":"Fatima","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_255","doi-asserted-by":"crossref","unstructured":"Chilton, P.A. (2004). Analysing Political Discourse: Theory and Practice, Routledge.","DOI":"10.4324\/9780203561218"},{"key":"ref_256","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1007\/s13042-015-0367-0","article-title":"MapReduce-based fuzzy c-means clustering algorithm: Implementation and scalability","volume":"6","author":"Ludwig","year":"2015","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"ref_257","doi-asserted-by":"crossref","unstructured":"Kontopoulos, I., Giannakopoulos, G., and Varlamis, I. (2017). Distributing n-gram graphs for classification. Eur. Conf. Adv. Databases Inf. Syst., 3\u201311.","DOI":"10.1007\/978-3-319-67162-8_1"},{"key":"ref_258","doi-asserted-by":"crossref","unstructured":"Paul, M.J., Sarker, A., Brownstein, J.S., Nikfarjam, A., Scotch, M., Smith, K.L., and Gonzalez, G. (2016). Social media mining for public health monitoring and surveillance. Pacific Symposium on Biocomputing 2016, (PSB 2016), World Scientific Publishing Co.","DOI":"10.1142\/9789814749411_0043"},{"key":"ref_259","doi-asserted-by":"crossref","unstructured":"Jordan, S.E., Hovet, S.E., Fung, I.C.-H., Liang, H., Fu, K.-W., and Tse, Z.T.H. (2018). Using Twitter for public health surveillance from monitoring and prediction to public response. Data, 4.","DOI":"10.3390\/data4010006"},{"key":"ref_260","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ijmedinf.2017.01.001","article-title":"Text mining approach to predict hospital admissions using early medical records from the emergency department","volume":"100","author":"Lucini","year":"2017","journal-title":"Int. J. Med Inform."},{"key":"ref_261","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.procs.2017.11.177","article-title":"Pattern-based mining in electronic health records for complex clinical process analysis","volume":"119","author":"Metsker","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_262","doi-asserted-by":"crossref","first-page":"2584","DOI":"10.1016\/j.eswa.2011.08.113","article-title":"Mining sentiments in SMS texts for teaching evaluation","volume":"39","author":"Leong","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_263","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.chb.2012.07.020","article-title":"Examining students\u2019 online interaction in a live video streaming environment using data mining and text mining","volume":"29","author":"He","year":"2013","journal-title":"Comput. Hum. Behav."},{"key":"ref_264","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1016\/j.tele.2018.04.015","article-title":"Educational data mining: A review of evaluation process in the e-learning","volume":"35","author":"Rodrigues","year":"2018","journal-title":"Telemat. Inform."},{"key":"ref_265","doi-asserted-by":"crossref","unstructured":"Ferreira-Mello, R., Andr\u00e9, M., Pinheiro, A., Costa, E., and Romero, C. (2019). Text mining in education. WIREs Data Min. Knowl. Discov., e1332.","DOI":"10.1002\/widm.1332"},{"key":"ref_266","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.cose.2016.11.002","article-title":"Modeling and analysis of identity threat behaviors through text mining of identity theft stories","volume":"65","author":"Zaeem","year":"2017","journal-title":"Comput. Secur."},{"key":"ref_267","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.knosys.2019.05.004","article-title":"Graph-based clustering of extracted paraphrases for labelling crime reports","volume":"179","author":"Das","year":"2019","journal-title":"Knowl. Based Syst."},{"key":"ref_268","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/j.eswa.2017.06.035","article-title":"Identifying child abuse through text mining and machine learning","volume":"88","author":"Amrit","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"ref_269","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1017\/S0047279413000342","article-title":"Tracing poverty and inequality in international development discourses: An algorithmic and visual analysis of agencies\u2019 annual reports and occasional white papers, 1978\u20132010","volume":"43","author":"Esser","year":"2014","journal-title":"J. Soc. Policy"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/4\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:05:16Z","timestamp":1760364316000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/4\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,16]]},"references-count":269,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["bdcc4010001"],"URL":"https:\/\/doi.org\/10.3390\/bdcc4010001","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,16]]}}}