{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:42:40Z","timestamp":1743115360686,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318530"},{"type":"electronic","value":"9783319318547"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31854-7_5","type":"book-chapter","created":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T10:34:17Z","timestamp":1462012457000},"page":"47-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Novel Hotspot Information Analysis System Using Automatic Information Extraction"],"prefix":"10.1007","author":[{"given":"Mo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Deyu","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Martinez, J., Tintin, R.: Modern use of ICTs as tools for support in social research. In: 2015 Second International Conference on eDemocracy & eGovernment (ICEDEG), pp. 67\u201372. IEEE (2015)","DOI":"10.1109\/ICEDEG.2015.7114466"},{"key":"5_CR2","unstructured":"Proenza, F., Girard, B., Proenza, F.: Problematic Internet Use among Internet Caf\u00e9 Users in China. MIT Press (2015)"},{"key":"5_CR3","unstructured":"BrightPlanet.Com: The deep Web: surfacing hidden value. \n                    http:\/\/brightplanet.com\n                    \n                  . Accessed Dec 2012"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Yang, S.Z.: The marketing chain in the mobile Internet era. In: 2011 International Conference on Machine Learning and Cybernetics (ICMLC), pp. 1058\u20131061. IEEE (2011)","DOI":"10.1109\/ICMLC.2011.6016917"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Wei, W., Qian, L.: The profound effect of modern Information Technology revolution on network economy society. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 299\u2013301. IEEE (2011)","DOI":"10.1109\/ICCSN.2011.6013833"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Inoue, A., Nagahata, R., Ishii, Y., et al.: Mobile internet-access behavior analysis. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, pp. 766\u2013770. IEEE Computer Society (2012)","DOI":"10.1109\/SNPD.2012.71"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Jin, H., Cui, B., Wang, J.: Mining mobile internet packets for malware detection. In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 481\u2013486. IEEE (2014)","DOI":"10.1109\/3PGCIC.2014.98"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/s11948-014-9564-6","volume":"21","author":"Y Al-Saggaf","year":"2014","unstructured":"Al-Saggaf, Y., Islam, M.Z.: Data mining and privacy of social network sites\u2019 users: implications of the data mining problem. Sci. Eng. Ethics 21, 941\u2013966 (2014)","journal-title":"Sci. Eng. Ethics"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, C., Zhang, J.: InForCE: forum data crawling with information extraction. In: 2010 4th International Universal Communication Symposium (IUCS), pp. 367\u2013373. IEEE (2010)","DOI":"10.1109\/IUCS.2010.5666252"},{"key":"5_CR10","unstructured":"Gao, K., Wang, W., Gao, S.: Modelling on web dynamic incremental crawling and information processing. In: 2013 Proceedings of International Conference on Modelling, Identification & Control (ICMIC), pp. 293\u2013298. IEEE (2013)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TVCG.2015.2467551","volume":"22","author":"ED Ragan","year":"2016","unstructured":"Ragan, E.D., Endert, A., Sanyal, J., et al.: Characterizing provenance in visualization and data analysis: an organizational framework of provenance types and purposes. IEEE Trans. Visual. Comput. Graph. 22, 31\u201340 (2016)","journal-title":"IEEE Trans. Visual. Comput. Graph."},{"key":"5_CR12","unstructured":"Zhao, X.J., Huang, F.F., Bo, L.I., et al.: Research on topic semantic information extraction for network news. Comput. Knowl. Technol. (2015)"}],"container-title":["Lecture Notes in Computer Science","Human Centered Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31854-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T22:22:42Z","timestamp":1559427762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31854-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318530","9783319318547"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31854-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}