{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T17:52:17Z","timestamp":1726249937655},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535024"},{"type":"electronic","value":"9783031535031"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53503-1_34","type":"book-chapter","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T19:02:44Z","timestamp":1709146964000},"page":"412-423","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Blogs About Uyghur Discourse Using Topic Induced Hyperlink Network"],"prefix":"10.1007","author":[{"given":"Ifeanyichukwu","family":"Umoga","sequence":"first","affiliation":[]},{"given":"Stella","family":"Mbila-Uma","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"Alassad","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"34_CR1","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvsf1qdq","volume-title":"The War on the Uyghurs: China\u2019s Internal Campaign Against a Muslim Minority","author":"SR Roberts","year":"2020","unstructured":"Roberts, S.R.: The War on the Uyghurs: China\u2019s Internal Campaign Against a Muslim Minority. Princeton University Press, Princeton (2020)"},{"issue":"1","key":"34_CR2","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/0022-2836(81)90087-5","volume":"147","author":"TF Smith","year":"1981","unstructured":"Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Molec. Biol. 147(1), 195\u2013197 (1981)","journal-title":"J. Molec. Biol."},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.24843\/KP.2019.v41.i01.p01","volume":"41","author":"A Rakhima","year":"2019","unstructured":"Rakhima, A., Satyawati, N.G.A.D.: Gross violations of human rights veiled within Xinjiang political reeducation camps. Kertha Patrika 41, 1 (2019). https:\/\/doi.org\/10.24843\/KP.2019.v41.i01.p01","journal-title":"Kertha Patrika"},{"key":"34_CR4","doi-asserted-by":"publisher","unstructured":"Clarke, M.: China and the Uyghurs: the \u2018Palestinization\u2019 of Xinjiang?. Middle East Policy 22 (2015). https:\/\/doi.org\/10.1111\/mepo.12148","DOI":"10.1111\/mepo.12148"},{"issue":"6","key":"34_CR5","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1080\/1369118X.2015.1061577","volume":"19","author":"RA Clothey","year":"2016","unstructured":"Clothey, R.A., Koku, E.F., Erkin, E., Emat, H.: A voice for the voiceless: online social activism in Uyghur language blogs and state control of the Internet in China. Inf. Commun. Soc. 19(6), 858\u2013874 (2016). https:\/\/doi.org\/10.1080\/1369118X.2015.1061577","journal-title":"Inf. Commun. Soc."},{"issue":"4","key":"34_CR6","doi-asserted-by":"publisher","first-page":"2173","DOI":"10.3390\/ijerph19042173","volume":"19","author":"S Di Sotto","year":"2022","unstructured":"Di Sotto, S., Viviani, M.: Health misinformation detection in the social web: an overview and a data science approach. Int. J. Environ. Res. Public Health 19(4), 2173 (2022). https:\/\/doi.org\/10.3390\/ijerph19042173","journal-title":"Int. J. Environ. Res. Public Health"},{"issue":"3","key":"34_CR7","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1080\/10810730.2020.1737761","volume":"25","author":"MC Jenkins","year":"2020","unstructured":"Jenkins, M.C., Moreno, M.A.: Vaccination discussion among parents on social media: a content analysis of comments on parenting blogs. J. Health Commun. 25(3), 232\u2013242 (2020). https:\/\/doi.org\/10.1080\/10810730.2020.1737761","journal-title":"J. Health Commun."},{"key":"34_CR8","doi-asserted-by":"publisher","unstructured":"Akinnubi, A., Agarwal, N., Stine, Z., Oyedotun, S.: Analyzing online opinions and influence campaigns on blogs using BlogTracker. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 309\u2013312. ACM, Virtual Event Netherlands (2021). https:\/\/doi.org\/10.1145\/3487351.3489483","DOI":"10.1145\/3487351.3489483"},{"key":"34_CR9","unstructured":"Sehgal, V., Peshin, A., Afroz, S., Farid, H.: Mutual hyperlinking among misinformation peddlers (2021). Accessed 30 Jan 2023. http:\/\/arxiv.org\/abs\/2104.11694"},{"key":"34_CR10","unstructured":"Shaik, M., Hussain, M., Stine, Z., Agarwal, N.: Developing situational awareness from blogosphere: an Australian case study (2021)"},{"issue":"2","key":"34_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/13183222.2008.11008970","volume":"15","author":"HW Park","year":"2008","unstructured":"Park, H.W., Jankowski, N.W.: A hyperlink network analysis of citizen blogs in South Korean Politics. Javn. - Public 15(2), 57\u201374 (2008). https:\/\/doi.org\/10.1080\/13183222.2008.11008970","journal-title":"Javn. - Public"},{"issue":"5","key":"34_CR12","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1177\/0047287517708256","volume":"57","author":"H Raisi","year":"2018","unstructured":"Raisi, H., Baggio, R., Barratt-Pugh, L., Willson, G.: Hyperlink network analysis of a tourism destination. J. Travel Res. 57(5), 671\u2013686 (2018). https:\/\/doi.org\/10.1177\/0047287517708256","journal-title":"J. Travel Res."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Akinnubi, A., Agarwal, N.: Blog data analytics using blogtrackers (2023)","DOI":"10.31235\/osf.io\/497zg"},{"key":"34_CR14","doi-asserted-by":"publisher","unstructured":"J. Ortiz Costa and A. Kulkarni, \"Leveraging Knowledge Graph for Open-Domain Question Answering,\" in 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI), Dec. 2018, pp. 389\u2013394. https:\/\/doi.org\/10.1109\/WI.2018.00-63","DOI":"10.1109\/WI.2018.00-63"},{"key":"34_CR15","doi-asserted-by":"publisher","unstructured":"Tong, Z., Zhang, H.: A text mining research based on LDA topic modelling. In: Computer Science Information Technology ( CS & IT ), pp. 201\u2013210 (2016). https:\/\/doi.org\/10.5121\/csit.2016.60616","DOI":"10.5121\/csit.2016.60616"},{"key":"34_CR16","doi-asserted-by":"publisher","unstructured":"Marcoux, T., Obadimu, A., Agarwal, N.: Dynamics of online toxicity in the Asia-Pacific region. In: Trends and Applications in Knowledge Discovery and Data Mining, Cham, pp. 80\u201387 (2020). https:\/\/doi.org\/10.1007\/978-3-030-60470-7_9","DOI":"10.1007\/978-3-030-60470-7_9"},{"key":"34_CR17","unstructured":"Hanu, L.: How well can we detoxify comments online? (2020). https:\/\/medium.com\/unitary\/how-well-can-we-detoxify-comments-online-bfffe5f716d7. Accessed 30 Jan 2023"},{"issue":"5916","key":"34_CR18","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"SP Borgatti","year":"2009","unstructured":"Borgatti, S.P., Mehra, A., Brass, D.J., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892\u2013895 (2009). https:\/\/doi.org\/10.1126\/science.1165821","journal-title":"Science"},{"key":"34_CR19","unstructured":"Maizland, L.: China\u2019s Repression of Uyghurs in Xinjiang. Council on Foreign Relations. https:\/\/www.cfr.org\/backgrounder\/china-xinjiang-uyghurs-muslims-repression-genocide-human-rights. Accessed 30 Jan 2023"},{"key":"34_CR20","unstructured":"Ibrahim, A.: Muslim Leaders Are Betraying the Uighurs - Foreign Policy. https:\/\/foreignpolicy.com\/2019\/07\/08\/muslim-leaders-are-betraying-the-uighurs\/. Accessed 30 Jan 2023"},{"key":"34_CR21","unstructured":"Wei, Y.: China\u2019s Muslims Forced to Eat Pork During Ramadan (2020). https:\/\/bitterwinter.org\/chinas-muslims-forced-to-eat-pork-during-ramadan\/. Accessed 30 Jan 2023"},{"key":"34_CR22","unstructured":"Detsch, J.: Pentagon says US will not retaliate for Turkey in Syria - Al-Monitor: Independent, trusted coverage of the Middle East. https:\/\/www.al-monitor.com\/originals\/2020\/03\/pentagon-us-not-retaliate-turkey-syria.html. Accessed 30 Jan 2023"},{"key":"34_CR23","unstructured":"Certo, P.: The World Needs a Water Treaty. Foreign Policy In Focus (2019). https:\/\/fpif.org\/the-world-needs-a-water-treaty\/. Accessed 30 Jan 2023"},{"key":"34_CR24","unstructured":"Muslim Leaders Are Betraying the Uighurs - Foreign Policy. https:\/\/foreignpolicy.com\/2019\/07\/08\/muslim-leaders-are-betraying-the-uighurs\/. Accessed 30 Jan 2023"},{"key":"34_CR25","unstructured":"Roberts, G.: Uyghurs, Political Islam & the BRI. The Unz Review (2019). https:\/\/www.unz.com\/article\/uyghurs-political-islam-the-bri\/. Accessed 30 Jan 2023"},{"key":"34_CR26","unstructured":"Shimizu, T.: What has happened to me A testimony of a Uyghur woman. Accessed 6 Oct 2023. https:\/\/note.com\/tomomishimizu\/n\/n4cade047aed8"},{"key":"34_CR27","unstructured":"Watson, I., Westcott, B.: Uyghur refugee tells of death and fear inside China\u2019s Xinjiang camps | CNN. https:\/\/www.cnn.com\/2019\/01\/18\/asia\/uyghur-china-detention-center-intl\/index.html. Accessed 31 Jan 2023"},{"key":"34_CR28","unstructured":"Lee, P.: Deeper and Darker in the Uyghur-Turkish Passport Mystery. The Unz Review (2015). https:\/\/www.unz.com\/plee\/deeper-and-darker-in-the-uyghur-turkish-passport-mystery\/. Accessed 07 Oct 2023)"},{"key":"34_CR29","unstructured":"Norton, B., Singh, A.: No, the UN did not report China has \u2018massive internment camps\u2019 for Uighur Muslims., The Grayzone (2018). http:\/\/thegrayzone.com\/2018\/08\/23\/un-did-not-report-china-internment-camps-uighur-muslims\/.. Accessed 31 Jan 2023"},{"key":"34_CR30","doi-asserted-by":"publisher","unstructured":"Mbila-Uma, S., Umoga, I., Alassad, M., Agarwal, N.: Conducting morality and emotion analysis on blog discourse. In: Takada, H., Marutschke, D.M., Alvarez, C., Inoue, T., Hayashi, Y., Hernandez-Leo, D. (eds.) International Conference on Collaboration Technologies, pp. 185\u2013192. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-42141-9_15","DOI":"10.1007\/978-3-031-42141-9_15"},{"key":"34_CR31","doi-asserted-by":"publisher","unstructured":"Nwana, L., Onyepunuka, U., Alassad, M., Agarwal, N.: Computational analysis of the belt and road initiative (BRI) discourse on Indonesian twitter. In: Takada, H., Marutschke, D.M., Alvarez, C., Inoue, T., Hayashi, Y., Hernandez-Leo, D. (eds.) International Conference on Collaboration Technologies, 22 August 2023, pp. 176\u2013184. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-42141-9_14","DOI":"10.1007\/978-3-031-42141-9_14"},{"key":"34_CR32","unstructured":"Shajari, S., Agarwal, N., Alassad, M.: Commenter Behavior Characterization on YouTube Channels. arXiv preprint arXiv:2304.07681 (2023)"}],"container-title":["Studies in Computational Intelligence","Complex Networks & Their Applications XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53503-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T19:09:59Z","timestamp":1709147399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53503-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535024","9783031535031"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53503-1_34","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Menton","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}