{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:32:00Z","timestamp":1725863520260},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319459813"},{"type":"electronic","value":"9783319459820"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45982-0_19","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T10:31:38Z","timestamp":1472034698000},"page":"218-230","source":"Crossref","is-referenced-by-count":1,"title":["An Analysis of IETF Activities Using Mailing Lists and Social Media"],"prefix":"10.1007","author":[{"given":"Heiko","family":"Niedermayer","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Raumer","sequence":"additional","affiliation":[]},{"given":"Nikolai","family":"Schwellnus","sequence":"additional","affiliation":[]},{"given":"Edwin","family":"Cordeiro","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"19_CR1","unstructured":"Perpass - the perpass list is for IETF discussion of pervasive monitoring. https:\/\/www.ietf.org\/mailman\/listinfo\/perpass . Accessed 1 Apr 2016"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Alvestrand, H.: A mission statement for the IETF. RFC 3935 (Best Current Practice), October 2004","DOI":"10.17487\/rfc3935"},{"key":"19_CR3","unstructured":"Arkko, J.: IETF statistics: fun and useful trivia. http:\/\/www.arkko.com\/tools\/docstats.html . Accessed 1 Apr 2016"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bradner, S.: IETF working group guidelines and procedures. RFC 2418 (Best Current Practice), Updated by RFCs 3934, 7475, September 1998","DOI":"10.17487\/rfc2418"},{"key":"19_CR5","unstructured":"Bradner, S.: IETF structure and internet standards process. In: Presentation at the 81st IETF (2011)"},{"key":"19_CR6","unstructured":"Cerf, V.: IETF and the Internet Society. Webpage, July 1995. http:\/\/www.internetsociety.org\/internet\/what-internet\/history-internet\/ietf-and-internet-society"},{"key":"19_CR7","volume-title":"Open Sources: Voices From the Open Source Revolution","author":"S Ockman","year":"1999","unstructured":"Ockman, S., DiBona, C.: Open Sources: Voices From the Open Source Revolution. O\u2019Reilly Media, Sebastopol (1999)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Crocker, D., Clark, N.: An IETF with much diversity and professional conduct. RFC 7704 (Informational), November 2015","DOI":"10.17487\/RFC7704"},{"key":"19_CR9","unstructured":"Gidda, M.: Edward snowden and the NSA files timeline, August 2013. http:\/\/www.theguardian.com\/world\/2013\/jun\/23\/edward-snowden-nsa-files-timeline Accessed 1 Apr 2016"},{"key":"19_CR10","unstructured":"Hoffman, P., Harris, S.: The tao of IETF - a Novice\u2019s guide to the internet engineering task force. Webpage as specified in RFC 6722 (2012)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Hovey, R., Bradner, S.: The organizations involved in the IETF standards process. RFC 2028 (Best Current Practice), Updated by RFCs 3668, 3979, October 1996","DOI":"10.17487\/rfc2028"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Kucherawy, M.: IAB, IESG, and IAOC selection, confirmation, and recall process: operation of the nominating and recall committees. RFC 7437 (Best Current Practice), January 2015","DOI":"10.17487\/rfc7437"},{"key":"19_CR13","unstructured":"The Apache SpamAssassin Project: SpamAssassin. http:\/\/spamassassin.apache.org . Accessed 1 Apr 2016"},{"key":"19_CR14","unstructured":"The Apache SpamAssassin Project. Tests performed: v3.3.x. http:\/\/spamassassin.apache.org\/tests_3_3_x.html"}],"container-title":["Lecture Notes in Computer Science","Internet Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45982-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T18:45:43Z","timestamp":1568313943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45982-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459813","9783319459820"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45982-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}