{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:46:39Z","timestamp":1725972399171},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319777023"},{"type":"electronic","value":"9783319777030"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77703-0_64","type":"book-chapter","created":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T11:53:05Z","timestamp":1521892385000},"page":"644-653","source":"Crossref","is-referenced-by-count":1,"title":["Using Social Network Analysis to Identify User Preferences for Cultural Events"],"prefix":"10.1007","author":[{"given":"Stevan","family":"Milovanovi\u0107","sequence":"first","affiliation":[]},{"given":"Zorica","family":"Bogdanovi\u0107","sequence":"additional","affiliation":[]},{"given":"Aleksandra","family":"Labus","sequence":"additional","affiliation":[]},{"given":"Du\u0161an","family":"Bara\u0107","sequence":"additional","affiliation":[]},{"given":"Marijana","family":"Despotovi\u0107-Zraki\u0107","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"64_CR1","unstructured":"Fernando, M., Ginige, A., Hol, A.: Structural and behavioural models for social computing applications. In: 27th Australasian Conference on Information Systems, no. 53, University of Wollongong, Wollongong (2016)"},{"key":"64_CR2","series-title":"Research for Development","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53243-1","volume-title":"CoDesign for Public-Interest Services","author":"Daniela Selloni","year":"2017","unstructured":"Selloni, D.: CoDesign for Public-Interest Services, Milan (2017)"},{"key":"64_CR3","volume-title":"Computational Social Networks: Tools, Perspectives and Applications","author":"A Abraham","year":"2012","unstructured":"Abraham, A., Hassanien, A.: Computational Social Networks: Tools, Perspectives and Applications. Springer Science & Business Media, Auburn (2012)"},{"key":"64_CR4","volume-title":"Social Computing: Concepts, Methodologies, Tools, and Applications","author":"S Dasgupta","year":"2009","unstructured":"Dasgupta, S.: Social Computing: Concepts, Methodologies, Tools, and Applications. IGI Global, New York (2009)"},{"key":"64_CR5","doi-asserted-by":"crossref","unstructured":"Parameswaran, M., Whinston, A.B.: Social computing: an overview. J. CAIS 19, Article no. 37 (2007)","DOI":"10.17705\/1CAIS.01937"},{"key":"64_CR6","volume-title":"Handbook of Research on Strategic Performance Management and Measurement Using Data Envelopment Analysis","author":"IH Osman","year":"2013","unstructured":"Osman, I.H.: Handbook of Research on Strategic Performance Management and Measurement Using Data Envelopment Analysis. IGI Global, Hershey (2013)"},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Khosrow-Pour, M.: Social Computing in Encyclopedia of Information Science and Technology, 3rd edn, p. 6754 (2014)","DOI":"10.4018\/978-1-4666-5888-2"},{"key":"64_CR8","first-page":"91","volume":"14","author":"M Fernando","year":"2016","unstructured":"Fernando, M., Ginige, A., Hol, A.: Enhancing business outcomes through social computing. J. IADIS Int. J. 14, 91\u2013108 (2016)","journal-title":"J. IADIS Int. J."},{"key":"64_CR9","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.procs.2015.08.185","volume":"60","author":"V Podobnik","year":"2015","unstructured":"Podobnik, V., Lovrek, I.: Implicit social networking: discovery of hidden relationships, roles and communities among consumers. J. Procedia Comput. Sci. 60, 583\u2013592 (2015)","journal-title":"J. Procedia Comput. Sci."},{"key":"64_CR10","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks (The Facebook case). In: ACM Workshop on Privacy in the Electronic Society, Alexandria, USA, pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"64_CR11","unstructured":"Cachia, R.: Social Computing: Study on the Use and Impact of Online Social Networking, Luxembourg (2008)"},{"key":"64_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.comcom.2016.12.011","volume":"100","author":"MA Brand\u00e3o","year":"2017","unstructured":"Brand\u00e3o, M.A., Moro, M.M.: Social professional networks: a survey and taxonomy. J. Comput. Commun. 100, 20\u201331 (2017)","journal-title":"J. Comput. Commun."},{"key":"64_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.procs.2017.03.005","volume":"106","author":"S Schlattmann","year":"2017","unstructured":"Schlattmann, S.: Capturing the collaboration intensity of research institutions using social network analysis. Procedia Comput. Sci. 106, 25\u201331 (2017)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"64_CR14","doi-asserted-by":"publisher","first-page":"177","DOI":"10.12720\/jait.7.3.177-181","volume":"7","author":"M Erfanmanesh","year":"2016","unstructured":"Erfanmanesh, M., Hosseini, E.: Using social network analysis method to visualize library & information science research. J. Adv. Inf. Technol. 7(3), 177\u2013182 (2016)","journal-title":"J. Adv. Inf. Technol."},{"key":"64_CR15","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.chb.2016.02.052","volume":"60","author":"L de-Marcos","year":"2016","unstructured":"de-Marcos, L., Garc\u00eda-L\u00f3pez, E., Garc\u00eda-Cabot, A., Medina-Merodio, J., Dom\u00ednguez, A., Mart\u00ednez-Herr\u00e1iz, J., Diez-Folledo, T.: Social network analysis of a gamified e-learning course: small-world phenomenon and network metrics as predictors of academic performance. J. Comput. Hum. Behav. 60, 312\u2013321 (2016)","journal-title":"J. Comput. Hum. Behav."},{"key":"64_CR16","unstructured":"Get Started with Analytics for Android. https:\/\/firebase.google.com\/docs\/analytics\/android\/start\/"},{"key":"64_CR17","unstructured":"Borgatti, S.P., Everett, M.G., Freeman, L.C.: UCINET for windows: software for social network analysis. J. Analytic Technologies, Harvard, MA (2002)"},{"key":"64_CR18","unstructured":"Van Eck, N.J., Waltman, L.: VOSviewer Manual: Pajek NET Format. https:\/\/gephi.org\/users\/supported-graph-formats\/pajek-net-format\/"},{"key":"64_CR19","unstructured":"UCINET 6 for Windows Help \u2013 Normalization. http:\/\/www.analytictech.com\/ucinet\/help\/1mmzzrm.htm"},{"key":"64_CR20","unstructured":"UCINET 6 for Windows Help \u2013 Hierarchical cluster analysis. http:\/\/www.analytictech.com\/ucinet\/help\/3j.x0e.htm"},{"key":"64_CR21","doi-asserted-by":"crossref","unstructured":"Batagelj, V., Mrvar, A.: Pajek: program for analysis and visualization of large networks. In: Timeshift-The World in Twenty-Five Years: Ars Electronica, pp. 242\u2013251 (2004)","DOI":"10.1007\/978-3-642-18638-7_4"},{"key":"64_CR22","unstructured":"Pajek NET Format. https:\/\/gephi.org\/users\/supported-graph-formats\/pajek-net-format\/"},{"key":"64_CR23","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1002\/asi.21075","volume":"60","author":"NJ Eck Van","year":"2009","unstructured":"Van Eck, N.J., Waltman, L.: How to normalize cooccurrence data? An analysis of some well-known similarity measures. J. Am. Soc. Inf. Sci. Technol. 60, 1635\u20131651 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77703-0_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T11:28:15Z","timestamp":1570966095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77703-0_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319777023","9783319777030"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77703-0_64","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}