References
- Chan, A., Chung, W., & Plante, D. (2015). Panel discussion: How should computing educators respond to changes in higher education? Paper presented at the Proceedings of the NSF Workshop on Curricular Development for Computing in Context, DeLand, Florida. Retrieved from https://protect-us.mimecast.com/s/0JzOBbfN5rKlck?domain=dl.acm.org.”
- Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008). Uncovering the dark Web: A case study of Jihad on the Web. Journal of the American Society for Information Science and Technology, 59(8), 1347–1358. doi:10.1002/asi.20838
- Fan, W., & Gordon, M. D. (2014). The power of social media analytics. Communications of the ACM, 57(6), 74–81. doi:10.1145/2602574
- Lange-Ionatamishvili, E., & Svetoka, S. (2015). Ch. 12. Strategic communications and social media in the Russia Ukraine conflict. In K. Geers (Ed.), Cyber war in perspective: Russian aggression against Ukraine. Tallinn: Estonia.
- Messing, P., Schram, J., & Golding, B. (2015). Teen says he hacked CIA director’s AOL account. New York Post. Retrieved from https://protect-us.mimecast.com/s/Y1zJBRt7pYeJFJ?domain=nypost.com
- Selyukh, A. (2013). Hackers send fake market-moving AP tweet on white house explosions. New York, NY: Thomson Reuters.
- Trotter, J. K. (2014). Public NYC taxicab database lets you see how celebrities tip. New York, NY: Gawker Media.
- Zeng, D., Chen, H., Lusch, R., & Li, S.-H. (2010). Social media analytics and intelligence. IEEE Intelligent Systems, 25(6), 13–16. doi:10.1109/MIS.2010.151