{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:30:32Z","timestamp":1726043432722},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030304423"},{"type":"electronic","value":"9783030304430"}],"license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-30443-0_12","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T06:13:03Z","timestamp":1567577583000},"page":"132-140","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bibliomining the Pareto Principle of Public Libraries"],"prefix":"10.1007","author":[{"given":"Yi-Ting","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jiann-Cherng","family":"Shieh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1016\/j.ipm.2005.05.008","volume":"42","author":"S Nicholson","year":"2006","unstructured":"Nicholson, S.: The basis for bibliomining: frameworks for bringing together usage-based data mining and bibliometrics through data warehousing in digital library services. Inf. Process. Manag. 42(3), 785\u2013804 (2006)","journal-title":"Inf. Process. Manag."},{"key":"12_CR2","unstructured":"Shieh, J.C.: Bibliomining. Mandarin Library & Information Service, Taipei (2009)"},{"issue":"2B","key":"12_CR3","first-page":"293","volume":"18","author":"Z Xiang","year":"2014","unstructured":"Xiang, Z., Hao, Z.: Personalized requirements oriented data mining and implementation for college libraries. Comput. Modell. New Technol. 18(2B), 293\u2013300 (2014)","journal-title":"Comput. Modell. New Technol."},{"issue":"4","key":"12_CR4","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1108\/LHT-01-2017-0019","volume":"35","author":"P Hajek","year":"2017","unstructured":"Hajek, P., Stejskal, J.: Library usage mining in the context of alternative costs: the case of the municipal library of Prague. Libr. Hi Tech 35(4), 565\u2013583 (2017)","journal-title":"Libr. Hi Tech"},{"key":"12_CR5","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2011","unstructured":"Han, J., Kamber, M., Pei, J.: Data mining: concepts and techniques. Morgan Kaufmann, Waltham (2011)"},{"issue":"10","key":"12_CR6","first-page":"14","volume":"1","author":"J Bajpai","year":"2016","unstructured":"Bajpai, J., Metkewar, P.S.: Data quality issues and current approaches to data cleaning process in data warehousing. Glob. Res. Dev. J. Eng. 1(10), 14\u201318 (2016)","journal-title":"Glob. Res. Dev. J. Eng."},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.acalib.2015.06.007","volume":"41","author":"L Siguenza-Guzman","year":"2015","unstructured":"Siguenza-Guzman, L., Saquicela, V., Avila-Ord\u00f3\u00f1ez, E., Vandewalle, J., Cattrysse, D.: Literature review of data mining applications in academic libraries. J. Acad. Libr. 41(4), 499\u2013510 (2015)","journal-title":"J. Acad. Libr."},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.acalib.2015.12.014","volume":"42","author":"SM Al-Daihani","year":"2016","unstructured":"Al-Daihani, S.M., Abrahams, A.: A text mining analysis of academic libraries\u2019 tweets. J. Acad. Libr. 42(2), 135\u2013143 (2016)","journal-title":"J. Acad. Libr."},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1108\/EL-06-2015-0094","volume":"35","author":"F Wu","year":"2017","unstructured":"Wu, F., Hu, Y.H., Wang, P.R.: Developing a novel recommender network-based ranking mechanism for library book acquisition. Electron. Libr. 35(1), 50\u201368 (2017)","journal-title":"Electron. Libr."},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1108\/EL-07-2013-0136","volume":"33","author":"J Renaud","year":"2015","unstructured":"Renaud, J., Britton, S., Wang, D., Ogihara, M.: Mining library and university data to understand library use patterns. Electron. Libr. 33(3), 355\u2013372 (2015)","journal-title":"Electron. Libr."},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1108\/01435121111112871","volume":"32","author":"D Goodall","year":"2011","unstructured":"Goodall, D., Pattern, D.: Academic library non\/low use and undergraduate student achievement: a preliminary report of research in progress. Libr. Manag. 32(3), 159\u2013170 (2011)","journal-title":"Libr. Manag."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Yang, Y.T., Shieh, J.C.: Target marketing public libraries\u2019 vital readers: before. In: Wilimowska, Z., Borzemski, L., \u015awi\u0105tek, J. (eds.) Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology \u2013 ISAT 2018. ISAT 2018. Advances in Intelligent Systems and Computing, vol. 854. Springer, Cham (2019)","DOI":"10.1007\/978-3-319-99993-7_19"},{"key":"12_CR13","volume-title":"The 80\/20 Principle: The Secret of Achieving More with Less","author":"R Koch","year":"2011","unstructured":"Koch, R.: The 80\/20 Principle: The Secret of Achieving More with Less. Currency Doubleday, New York (2011)"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.future.2017.06.011","volume":"77","author":"MR Mesbahi","year":"2017","unstructured":"Mesbahi, M.R., Rahmani, A.M., Hosseinzadeh, M.: Highly reliable architecture using the 80\/20 rule in cloud computing data centers. Fut. Gener. Comput. Syst. 77, 77\u201386 (2017)","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"5","key":"12_CR15","first-page":"458","volume":"43","author":"RL Trueswell","year":"1969","unstructured":"Trueswell, R.L.: Some behavioral patterns of library readers: the 80\/20 rule. Wilson Libr. Bull. 43(5), 458\u2013461 (1969)","journal-title":"Wilson Libr. Bull."},{"issue":"3","key":"12_CR16","doi-asserted-by":"publisher","first-page":"118","DOI":"10.18438\/B8PG8T","volume":"11","author":"JL Nash","year":"2016","unstructured":"Nash, J.L.: Richard trueswell\u2019s contribution to collection evaluation and management: a review. Evid. Based Libr. Inf. Pract. 11(3), 118\u2013124 (2016)","journal-title":"Evid. Based Libr. Inf. Pract."},{"issue":"3","key":"12_CR17","first-page":"261","volume":"3","author":"L Hardesty","year":"1981","unstructured":"Hardesty, L.: Use of library materials at a small liberal arts college. Libr. Res. 3(3), 261\u2013282 (1981)","journal-title":"Libr. Res."},{"issue":"2","key":"12_CR18","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.acalib.2014.12.002","volume":"41","author":"M Singson","year":"2015","unstructured":"Singson, M., Hangsing, P.: Implication of 80\/20 rule in electronic journal usage of UGC-infonet consortia. J. Acad. Libr. 41(2), 207\u2013219 (2015)","journal-title":"J. Acad. Libr."},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1108\/eb026772","volume":"41","author":"QL Burrell","year":"1985","unstructured":"Burrell, Q.L.: The 80\/20 rule: library lore or statistical law? J. Doc. 41(1), 24\u201339 (1985)","journal-title":"J. Doc."},{"issue":"1\u20132","key":"12_CR20","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1080\/03615260801970774","volume":"55","author":"TE Nisonger","year":"2008","unstructured":"Nisonger, T.E.: The \u201c80\/20 rule\u201d and core journals. Serials Libr. 55(1\u20132), 62\u201384 (2008)","journal-title":"Serials Libr."},{"key":"12_CR21","volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary edn. Wiley, New York (2015)","edition":"20 Anniversary"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology \u2013 ISAT 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30443-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T10:54:28Z","timestamp":1664276068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30443-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"ISBN":["9783030304423","9783030304430"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30443-0_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,5]]},"assertion":[{"value":"5 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Architecture and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wroc\u0142aw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isat2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isat.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}