{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:40:29Z","timestamp":1742974829431,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319093772"},{"type":"electronic","value":"9783319093789"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09378-9_7","type":"book-chapter","created":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T10:44:42Z","timestamp":1410777882000},"page":"95-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Social Network Analysis in the Enterprise: Challenges and Opportunities"],"prefix":"10.1007","author":[{"given":"Valentin","family":"Burger","sequence":"first","affiliation":[]},{"given":"David","family":"Hock","sequence":"additional","affiliation":[]},{"given":"Ingo","family":"Scholtes","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Ho\u00dffeld","sequence":"additional","affiliation":[]},{"given":"David","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Seufert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,20]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Cohen R, Erez K, Ben Avraham D, Havlin S (2001) Breakdown of the internet under intentional attack. Phys Rev Lett 86:3682\u20133685. doi:10.1103\/PhysRevLett.86.3682, http:\/\/link.aps.org\/doi\/10.1103\/PhysRevLett.86.3682","DOI":"10.1103\/PhysRevLett.86.3682"},{"key":"7_CR2","volume-title":"Grooming, gossip, and the evolution of language","author":"R Dunbar","year":"1998","unstructured":"Dunbar R (1998) Grooming, gossip, and the evolution of language. Harvard University Press, Cambridge"},{"issue":"2","key":"7_CR3","doi-asserted-by":"crossref","first-page":"298","DOI":"10.21136\/CMJ.1973.101168","volume":"23","author":"M Fiedler","year":"1973","unstructured":"Fiedler M (1973) Algebraic connectivity of graphs. Czechoslov Math J 23(2):298\u2013305","journal-title":"Czechoslov Math J"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40(1):35\u201341. http:\/\/www.jstor.org\/stable\/3033543","DOI":"10.2307\/3033543"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Garcia D, Mavrodiev P, Schweitzer F (2013) Social resilience in online communities: the autopsy of friendster. In: Proceedings of the first ACM conference on online social networks (COSN\u201913), Boston. ACM, New York, pp 39\u201350. doi:10.1145\/2512938.2512946. http:\/\/doi.acm.org\/10.1145\/2512938.2512946.","DOI":"10.1145\/2512938.2512946"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Garcia D, Zanetti MS, Schweitzer F (2013) The role of emotions in contributors activity: a case study of the GENTOO community. In: Proceedings of the 3rd international conference on social computing and its applications (SCA2013), Anaheim","DOI":"10.1109\/CGC.2013.71"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Hock D, Hartmann M, Gebert S, Jarschel M, Zinner T, Tran-Gia P (2013) Pareto-optimal resilient controller placement in SDN-based core networks. In: 25th international teletraffic congress (ITC), Shanghai","DOI":"10.1109\/ITC.2013.6662939"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Hock D, Hartmann M, Menth M, Schwartz C (2010) Optimizing unique shortest paths for resilient routing and fast reroute in IP-based networks. In: IEEE\/IFIP network operations and management symposium (NOMS), Osaka","DOI":"10.1109\/NOMS.2010.5488482"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Holme P, Saram\u00e4ki J (2012) Temporal networks. Phys Rep 519(3):97\u2013125. doi:http:\/\/dx.doi.org\/10.1016\/j.physrep.2012.03.001, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0370157312000841","DOI":"10.1016\/j.physrep.2012.03.001"},{"key":"7_CR10","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: an introduction","author":"ME Newman","year":"2010","unstructured":"Newman ME (2010) Networks: an introduction. Oxford University Press, Oxford\/New York"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TSMCB.2008.2006638","volume":"39","author":"D Olguin","year":"2009","unstructured":"Olguin D, Waber B, Kim T, Mohan A, Ara K, Pentland A (2009) Sensible organizations: technology and methodology for automatically measuring organizational behavior. IEEE Trans Syst Man Cybern Part B Cybern 39(1):43\u201355. doi:10.1109\/TSMCB.2008.2006638","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Pfitzner R, Scholtes I, Garas A, Tessone CJ, Schweitzer F (2013) Betweenness preference: quantifying correlations in the topological dynamics of temporal networks. Phys Rev Lett 110:198,701. doi:10.1103\/PhysRevLett.110.198701, http:\/\/link.aps.org\/doi\/10.1103\/PhysRevLett.110.198701","DOI":"10.1103\/PhysRevLett.110.198701"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Scholtes I, Wider N, Pfitzner R, Garas A, Juan Tessone C, Schweitzer F (2013) Slow-down vs. speed-up of diffusion in non-Markovian temporal networks. ArXiv e-prints","DOI":"10.1038\/ncomms6024"},{"key":"7_CR14","unstructured":"Sch\u00f6ndienst V, Krasnova H, G\u00fcnther O, Riehle D (2011) Micro-blogging adoption in the enterprise: an empirical analysis. In: Wirtschaftsinformatik, Zurich, p 22"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Zanetti MS, Scholtes I, Tessone CJ, Schweitzer F (2013) The rise and fall of a central contributor: dynamics of social organization and performance in the GENTOO community. In: Proceedings of the 6th international workshop on cooperative and human aspects of software engineering (CHASE 2013) held at ICSE 2013, San Francisco","DOI":"10.1109\/CHASE.2013.6614731"},{"key":"7_CR16","volume-title":"Graph spectra for complex networks","author":"P Van Mieghem","year":"2012","unstructured":"Van Mieghem P (2012) Graph spectra for complex networks. Cambridge University Press, Cambridge\/New York"},{"key":"7_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications. Structural analysis in the social sciences","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Structural analysis in the social sciences. Cambridge University Press, Cambridge\/New York"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/03081080500054810","volume":"53","author":"CW Wu","year":"2005","unstructured":"Wu CW (2005) Algebraic connectivity of directed graphs. Linear Multilinear Algebra 53(3):203\u2013223","journal-title":"Linear Multilinear Algebra"},{"key":"#cr-split#-7_CR19.1","unstructured":"Zanetti MS, Sarig\u00f6l E, Scholtes I, Tessone CJ, Schweitzer F (2012) A quantitative study of social organisation in open source software communities. In: Jones AV"},{"key":"#cr-split#-7_CR19.2","unstructured":"(ed) 2012 Imperial College computing student workshop, openaccess series in informatics (OASIcs), London, vol 28. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, pp 116-122. doi:http:\/\/dx.doi.org\/10.4230\/OASIcs.ICCSW.2012.116, http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2012\/3774"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Zanetti MS, Scholtes I, Tessone CJ, Schweitzer F (2013) Categorizing bugs with social networks: a case study on four open source software communities. In: 35th international conference on software engineering (ICSE\u201913), San Francisco, 18\u201326 May 2013, pp 1032\u20131041","DOI":"10.1109\/ICSE.2013.6606653"}],"container-title":["Springer Proceedings in Complexity","Socioinformatics - The Social Impact of Interactions between Humans and IT"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09378-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T04:15:37Z","timestamp":1675829737000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09378-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319093772","9783319093789"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09378-9_7","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"type":"print","value":"2213-8684"},{"type":"electronic","value":"2213-8692"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"20 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}