{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:06:08Z","timestamp":1720717568223},"reference-count":8,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Science"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1016\/j.jocs.2023.102115","type":"journal-article","created":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T20:36:03Z","timestamp":1694291763000},"page":"102115","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Preface\u2014From the modeling of social behavior to computational diplomacy"],"prefix":"10.1016","volume":"77","author":[{"given":"Bastien","family":"Chopard","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Davishofer","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Helbing","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Levrat","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Sloot","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jocs.2023.102115_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102112","article-title":"Computational approaches to conflict research from modeling and data to computational diplomacy","volume":"72","author":"Cederman","year":"2023","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.jocs.2023.102115_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102061","article-title":"Democracy by design: Perspectives for digitally assisted, participatory upgrades of society","volume":"71","author":"Helbing","year":"2023","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.jocs.2023.102115_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102056","article-title":"Datafying diplomacy: How to enable the computational analysis and support of international negotiations","volume":"71","author":"Cafiero","year":"2023","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.jocs.2023.102115_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102058","article-title":"The dynamics of alliances: The case of Ukraine and Russia","volume":"71","author":"Galam","year":"2023","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.jocs.2023.102115_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102074","article-title":"An automated pattern recognition system for conflict","volume":"72","author":"Chadefaux","year":"2023","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.jocs.2023.102115_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102107","article-title":"Facilitating simulation development for global challenge response and anticipation in a timely way","volume":"72","author":"Groen","year":"2023","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.jocs.2023.102115_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2023.102096","article-title":"Fostering interdisciplinary collaboration in computational diplomacy: A multi-layered network approach to improve our understanding of institutional complexity and effective governance design","volume":"72","author":"Wernli","year":"2023","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.jocs.2023.102115_b8","article-title":"Why does history surprise us?","volume":"72","author":"Ho\u0142yst","year":"2023","journal-title":"J. Comput. Sci."}],"container-title":["Journal of Computational Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877750323001758?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877750323001758?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T09:18:45Z","timestamp":1711185525000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877750323001758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":8,"alternative-id":["S1877750323001758"],"URL":"https:\/\/doi.org\/10.1016\/j.jocs.2023.102115","relation":{},"ISSN":["1877-7503"],"issn-type":[{"value":"1877-7503","type":"print"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Preface\u2014From the modeling of social behavior to computational diplomacy","name":"articletitle","label":"Article Title"},{"value":"Journal of Computational Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jocs.2023.102115","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"simple-article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"102115"}}