{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T16:39:48Z","timestamp":1721061588505},"reference-count":27,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Advanced Engineering Informatics"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1016\/j.aei.2015.04.006","type":"journal-article","created":{"date-parts":[[2015,6,14]],"date-time":"2015-06-14T10:10:58Z","timestamp":1434276658000},"page":"787-798","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"title":["Collective intelligence applied to legal e-discovery: A ten-year case study of Australia franchise and trademark litigation"],"prefix":"10.1016","volume":"29","author":[{"given":"Charles V.","family":"Trappey","sequence":"first","affiliation":[]},{"given":"Amy J.C.","family":"Trappey","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.aei.2015.04.006_b0005","series-title":"Lattice Theory","author":"Birkhoff","year":"1973"},{"key":"10.1016\/j.aei.2015.04.006_b0010","series-title":"Data Mining Techniques: for Marketing, Sales, and Customer Support","author":"Berry","year":"1997"},{"key":"10.1016\/j.aei.2015.04.006_b0015","unstructured":"Copyright Act (Cth), Australia (1968)."},{"key":"10.1016\/j.aei.2015.04.006_b0020","first-page":"80","article-title":"Exploiting franchisee vulnerability","author":"Corones","year":"2008","journal-title":"Franchise Law Colloquium"},{"key":"10.1016\/j.aei.2015.04.006_b0025","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1142\/9789812389718_0025","article-title":"Knowledge discovery and data mining in databases","volume":"1","author":"Devedzic","year":"2001","journal-title":"Handbook Software Eng. Knowledge Eng."},{"issue":"3","key":"10.1016\/j.aei.2015.04.006_b0030","first-page":"37","article-title":"From data mining to knowledge discovery in databases","volume":"17","author":"Fayyad","year":"1996","journal-title":"AI Magazine"},{"key":"10.1016\/j.aei.2015.04.006_b0035","series-title":"Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD-95)","first-page":"112","article-title":"Knowledge discovery in textual databases (KDT)","author":"Feldman","year":"1995"},{"issue":"3","key":"10.1016\/j.aei.2015.04.006_b0040","first-page":"57","article-title":"Knowledge discovery in databases: an overview","volume":"13","author":"Frawley","year":"1992","journal-title":"AI Magazine"},{"key":"10.1016\/j.aei.2015.04.006_b0045","series-title":"Towards Very Large Knowledge Base Building and Knowledge Sharing","first-page":"25","article-title":"Ontologies and knowledge bases, towards a terminological clarification","author":"Guarino","year":"1995"},{"issue":"4","key":"10.1016\/j.aei.2015.04.006_b0050","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1504\/IJTM.2006.010271","article-title":"Technology and knowledge document cluster analysis for enterprise R&D strategic planning","volume":"36","author":"Hsu","year":"2006","journal-title":"Int. J. Technol. Manage."},{"key":"10.1016\/j.aei.2015.04.006_b0055","series-title":"Proceedings, 15th ISPE International Conference on Concurrent Engineering (CE2008)","first-page":"495","article-title":"Develop a formal ontology engineering methodology for technical knowledge definition in R&D knowledge management","author":"Huang","year":"2008"},{"key":"10.1016\/j.aei.2015.04.006_b0060","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1016\/j.techfore.2010.11.010","article-title":"Monitoring trends of technological changes based on the dynamic patent lattice. A modified formal concept analysis approach","volume":"78","author":"Lee","year":"2011","journal-title":"Technol. Forecast. Soc. Change"},{"key":"10.1016\/j.aei.2015.04.006_b0065","unstructured":"LexisNexis, LexisNexis Advance, , (access 15.11.2014) (2014)."},{"issue":"5","key":"10.1016\/j.aei.2015.04.006_b0070","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","article-title":"Term-weighting approaches in automatic text retrieval","volume":"24","author":"Salton","year":"1988","journal-title":"Inform. Process. Manage."},{"issue":"4","key":"10.1016\/j.aei.2015.04.006_b0075","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1108\/eb026562","article-title":"On the specification of term values in automatic indexing","volume":"29","author":"Salton","year":"1973","journal-title":"J. Document."},{"key":"10.1016\/j.aei.2015.04.006_b0080","series-title":"Applied Multivariate Techniques","author":"Sharma","year":"1996"},{"key":"10.1016\/j.aei.2015.04.006_b0085","series-title":"Multi-agent Systems for Concurrent Intelligent Design and Manufacturing","first-page":"215","article-title":"Ontologies","author":"Shen","year":"2001"},{"key":"10.1016\/j.aei.2015.04.006_b0090","unstructured":"A.H. Tan, Text mining: the state of the art and the challenges, in: Proceedings of PAKDD Workshop on Knowledge discovery from Advanced Databases, 1999, pp. 71\u201376."},{"key":"10.1016\/j.aei.2015.04.006_b0095","unstructured":"Therapeutic Goods Act (Cth), Australia, 1989."},{"key":"10.1016\/j.aei.2015.04.006_b0100","unstructured":"Trade Marks Act (Cth), Australia, 1995."},{"key":"10.1016\/j.aei.2015.04.006_b0105","unstructured":"Trade Practices Act (Cth), Australia, 1974."},{"key":"10.1016\/j.aei.2015.04.006_b0110","unstructured":"Trade Practices Regulations (Industry Code \u2013 Franchising) (Cth), Australia, 1998."},{"key":"10.1016\/j.aei.2015.04.006_b0115","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.aei.2013.04.003","article-title":"Constructing a dental implant ontology for domain specific clustering and life span analysis","volume":"27","author":"Trappey","year":"2013","journal-title":"Adv. Eng. Inform."},{"issue":"8","key":"10.1016\/j.aei.2015.04.006_b0120","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1108\/09590559610150366","article-title":"Retailing in Taiwan: modernization and the emergence of new formats","volume":"24","author":"Trappey","year":"1996","journal-title":"Int. J. Retail. Distrib. Manage."},{"issue":"5","key":"10.1016\/j.aei.2015.04.006_b0125","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1016\/j.ipm.2006.11.011","article-title":"Text mining techniques for patent analysis","volume":"43","author":"Tseng","year":"2007","journal-title":"Inform. Process. Manage."},{"key":"10.1016\/j.aei.2015.04.006_b0130","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1023\/A:1009976227802","article-title":"Learning algorithms for key phrase extraction","volume":"2","author":"Turney","year":"2000","journal-title":"Inform. Retrieval"},{"key":"10.1016\/j.aei.2015.04.006_b0135","doi-asserted-by":"crossref","unstructured":"R. Wille, Restructuring lattice theory: an approach based on hierarchies of concepts, in: Rivall (Ed.), Ordered Sets, Reidel, Dordrecht, 1982.","DOI":"10.1007\/978-94-009-7798-3_15"}],"container-title":["Advanced Engineering Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S147403461500052X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S147403461500052X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T10:28:17Z","timestamp":1572776897000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S147403461500052X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["S147403461500052X"],"URL":"https:\/\/doi.org\/10.1016\/j.aei.2015.04.006","relation":{},"ISSN":["1474-0346"],"issn-type":[{"value":"1474-0346","type":"print"}],"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Collective intelligence applied to legal e-discovery: A ten-year case study of Australia franchise and trademark litigation","name":"articletitle","label":"Article Title"},{"value":"Advanced Engineering Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.aei.2015.04.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}