1. Ahmed, W., Bath, P.A., Demartini, G.: Using Twitter as a data source: an overview of ethical, legal, and methodological challenges. Ethics Online Res. 2, 79–107 (2017)
2. Barricelli, B.R., Casiraghi, E., Fogli, D.: A survey on digital twin: definitions, characteristics, applications, and design implications. IEEE Access 7, 167653–167671 (2019). https://doi.org/10.1109/ACCESS.2019.2953499
3. CCIS;FS Bäumer,2017
4. Bäumer, F.S., Kersting, J., Orlikowski, M., Geierhos, M.: Towards a multi-stage approach to detect privacy breaches in physician reviews. In: SEMANTICS Posters &Demos (2018)
5. Bäumer, F.S., Denisov, S., Su Lee, Y., Geierhos, M.: Towards authority-dependent risk identification and analysis in online networks. In: Halimi, A., Ayday, E. (eds.) Proceedings of the IST-190 Research Symposium (RSY) on AI, ML and BD for Hybrid Military Operations (AI4HMO) (2021)