{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:18Z","timestamp":1740098898076,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-EAR-1520870"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,2]]},"DOI":"10.1145\/3079452.3079465","type":"proceedings-article","created":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T12:20:03Z","timestamp":1499257203000},"page":"127-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Emotional and Linguistic Cues of Depression from Social Media"],"prefix":"10.1145","author":[{"given":"Nikhita","family":"Vedula","sequence":"first","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Srinivasan","family":"Parthasarathy","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Twitter inc. http:\/\/www.twitter.com. Accessed: 2016-05--20. Twitter inc. http:\/\/www.twitter.com. Accessed: 2016-05--20."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557035"},{"key":"e_1_3_2_1_3_1","volume-title":"reciprocity, and social history. Games and economic behavior, 10(1):122--142","author":"Berg J.","year":"1995","unstructured":"J. Berg , J. Dickhaut , and K. McCabe . Trust , reciprocity, and social history. Games and economic behavior, 10(1):122--142 , 1995 . J. Berg, J. Dickhaut, and K. McCabe. Trust, reciprocity, and social history. Games and economic behavior, 10(1):122--142, 1995."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741665"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_1_8_1","first-page":"418","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom)","author":"DuBois T.","year":"2011","unstructured":"T. DuBois , J. Golbeck , and A. Srinivasan . Predicting trust and distrust in social networks. In Privacy, Security , Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom) , pages 418 -- 424 . IEEE, 2011 . T. DuBois, J. Golbeck, and A. Srinivasan. Predicting trust and distrust in social networks. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), pages 418--424. IEEE, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/379153.379157"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807193"},{"key":"e_1_3_2_1_12_1","first-page":"518","volume-title":"VLDB","volume":"99","author":"Gionis A.","year":"1999","unstructured":"A. Gionis , P. Indyk , R. Motwani , Similarity search in high dimensions via hashing . In VLDB , volume 99 , pages 518 -- 529 , 1999 . A. Gionis, P. Indyk, R. Motwani, et al. Similarity search in high dimensions via hashing. In VLDB, volume 99, pages 518--529, 1999."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594173.1594174"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183470"},{"key":"e_1_3_2_1_15_1","first-page":"282","volume-title":"et al. Filmtrust: Movie recommendations using trust in web-based social networks","author":"Golbeck J.","year":"2006","unstructured":"J. Golbeck , J. Hendler , et al. Filmtrust: Movie recommendations using trust in web-based social networks . In IEEE Consumer communications and networking conference, volume 96 , pages 282 -- 286 . Citeseer , 2006 . J. Golbeck, J. Hendler, et al. Filmtrust: Movie recommendations using trust in web-based social networks. In IEEE Consumer communications and networking conference, volume 96, pages 282--286. Citeseer, 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921639"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_20_1","volume-title":"The limits of organization","author":"Kenneth A.","year":"1974","unstructured":"A. Kenneth The limits of organization . N--Y. : Norton , 1974 . A. Kenneth et al. The limits of organization. N--Y.: Norton, 1974."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765751.1765753"},{"key":"e_1_3_2_1_22_1","volume-title":"Sentiment analysis and opinion mining. Synthesis lectures on human language technologies, 5(1):1--167","author":"Liu B.","year":"2012","unstructured":"B. Liu . Sentiment analysis and opinion mining. Synthesis lectures on human language technologies, 5(1):1--167 , 2012 . B. Liu. Sentiment analysis and opinion mining. Synthesis lectures on human language technologies, 5(1):1--167, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0022386"},{"key":"e_1_3_2_1_24_1","first-page":"121","volume-title":"National Conference on artificial Intelligence","volume":"20","author":"Massa P.","unstructured":"P. Massa and P. Avesani . Controversial users demand local trust metrics: An experimental study on epinions. com community . In National Conference on artificial Intelligence , volume 20 , page 121 . Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2005. P. Massa and P. Avesani. Controversial users demand local trust metrics: An experimental study on epinions. com community. In National Conference on artificial Intelligence, volume 20, page 121. Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2005."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04409-0_52"},{"key":"e_1_3_2_1_26_1","volume-title":"The pagerank citation ranking: bringing order to the web","author":"Page L.","year":"1999","unstructured":"L. Page , S. Brin , R. Motwani , and T. Winograd . The pagerank citation ranking: bringing order to the web . 1999 . L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: bringing order to the web. 1999."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1609\/icwsm.v8i1.14557","article-title":"On understanding the divergence of online social group discussion","volume":"14","author":"Purohit H.","year":"2014","unstructured":"H. Purohit , Y. Ruan , D. Fuhry , S. Parthasarathy , and A. P. Sheth . On understanding the divergence of online social group discussion . ICWSM , 14 : 396 -- 405 , 2014 . H. Purohit, Y. Ruan, D. Fuhry, S. Parthasarathy, and A. P. Sheth. On understanding the divergence of online social group discussion. ICWSM, 14:396--405, 2014.","journal-title":"ICWSM"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/978-3-540-25952-7_26","volume-title":"Intelligence and Security Informatics","author":"Rochlin G. I.","year":"2004","unstructured":"G. I. Rochlin . Mind the gap : The growing distance between institutional and technical capabilities in organizations performing critical operations . In Intelligence and Security Informatics , pages 349 -- 358 . Springer , 2004 . G. I. Rochlin. Mind the gap: The growing distance between institutional and technical capabilities in organizations performing critical operations. In Intelligence and Security Informatics, pages 349--358. Springer, 2004."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2034161.2034164"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951407"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/2140436.2140440"},{"key":"e_1_3_2_1_32_1","volume-title":"Social identity and intergroup relations","author":"Tajfel H.","year":"2010","unstructured":"H. Tajfel . Social identity and intergroup relations . Cambridge University Press , 2010 . H. Tajfel. Social identity and intergroup relations. Cambridge University Press, 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.05.006"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753486"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135792"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860485"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/1938545.1938548"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.003"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24747-0_19"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-005-4807-3"}],"event":{"name":"DH '17: International Conference on Digital Health","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"],"location":"London United Kingdom","acronym":"DH '17"},"container-title":["Proceedings of the 2017 International Conference on Digital Health"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3079452.3079465","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3079452.3079465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T07:32:34Z","timestamp":1673595154000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3079452.3079465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,2]]},"references-count":41,"alternative-id":["10.1145\/3079452.3079465","10.1145\/3079452"],"URL":"https:\/\/doi.org\/10.1145\/3079452.3079465","relation":{},"subject":[],"published":{"date-parts":[[2017,7,2]]},"assertion":[{"value":"2017-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}