{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T16:44:02Z","timestamp":1749919442344},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811317972"},{"type":"electronic","value":"9789811317996"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1799-6_54","type":"book-chapter","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T05:03:05Z","timestamp":1565326985000},"page":"519-527","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards a Methodology for Social Business Intelligence in the Era of Big Social Data Incorporating Trust and Semantic Analysis"],"prefix":"10.1007","author":[{"given":"Bilal","family":"Abu Salih","sequence":"first","affiliation":[]},{"given":"Pornpit","family":"Wongthongtham","sequence":"additional","affiliation":[]},{"given":"Seyed-Mehdi-Reza","family":"Beheshti","sequence":"additional","affiliation":[]},{"given":"Behrang","family":"Zajabbari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,10]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, M., Bin, Z.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (2013)","DOI":"10.1109\/WI-IAT.2013.202"},{"key":"54_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-35063-4_16","volume-title":"Web Information Systems Engineering - WISE 2012","author":"Seyed-Mehdi-Reza Beheshti","year":"2012","unstructured":"Beheshti, S.-M.-R., et al.: A Framework and a language for on-line analytical processing on graphs. In: Wang, X.S., et al. (eds.) Web Information Systems Engineering\u2014WISE, pp. 213\u2013227. Springer, Berlin, Heidelberg (2012)"},{"key":"54_CR3","first-page":"51","volume-title":"Notes on Numerical Fluid Mechanics and Multidisciplinary Design","author":"Seyed-Mehdi-Reza Beheshti","year":"2013","unstructured":"Beheshti, S.-M.-R., Benatallah, B., Motahari-Nezhad, H.: Enabling the analysis of cross-cutting aspects in ad-hoc processes. In: Salinesi, C., Norrie, M., Pastor, \u00d3. (eds.) Advanced Information Systems Engineering, pp. 51\u201367. Springer, Berlin, Heidelberg (2013)"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Berlanga, R., et al.: Towards a semantic data infrastructure for social business intelligence. In: Catania, B., et al. (eds.) New Trends in Databases and Information Systems, pp. 319\u2013327. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-01863-8_34"},{"issue":"5","key":"54_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Sci. Am. 284(5), 28\u201337 (2001)","journal-title":"Sci. Am."},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Carrasco, R.d.S., et al.: Ontology supported system for searching evidence of wild animals trafficking in social network posts. Revista Brasileira de Computa\u00e7\u00e3o Aplicada 6(1), 16\u201331(2014)","DOI":"10.5335\/rbca.2014.3140"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Chen, M., et al.: Open issues and outlook. In: Big Data, pp. 81\u201389. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-06245-7_7"},{"key":"54_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-39031-9_5","volume-title":"Software Architecture","author":"Carlos E. Cuesta","year":"2013","unstructured":"Cuesta, C., M. Mart\u00ednez-Prieto, J. Fern\u00e1ndez.: Towards an architecture for managing big semantic data in real-time. In: Drira, K. (ed.) Software Architecture, pp. 45\u201353. Springer Berlin Heidelberg (2013)"},{"key":"54_CR9","unstructured":"Dumbill, E.: Planning for Big Data. O\u2019Reilly Media, Inc., USA (2012)"},{"key":"54_CR10","unstructured":"Gantz, J., Reinsel, D.: The Digital Universe Decade\u2014Are You Ready? \n                    http:\/\/www.emc.com\/collateral\/analyst-reports\/idcdigital-universe-are-you-ready.pdf\n                    \n                  , Forschungsbericht (2010)"},{"issue":"3","key":"54_CR11","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s10796-012-9400-y","volume":"15","author":"L Garc\u00eda-Moya","year":"2013","unstructured":"Garc\u00eda-Moya, L., et al.: Storing and analysing voice of the market data in the corporate data warehouse. Inf. Syst. Front. 15(3), 331\u2013349 (2013)","journal-title":"Inf. Syst. Front."},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Ghahremanlou, L., Sherchan, W., Thom, J.A.: Geotagging twitter messages in crisis management. Compu. J. bxu034 (2014)","DOI":"10.1093\/comjnl\/bxu034"},{"issue":"1","key":"54_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/mksc.12.1.1","volume":"12","author":"A Griffin","year":"1993","unstructured":"Griffin, A., Hauser, J.R.: The voice of the customer. Mark. Sci. 12(1), 1\u201327 (1993)","journal-title":"Mark. Sci."},{"issue":"5","key":"54_CR14","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"TR Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Int. J. Hum Comput Stud. 43(5), 907\u2013928 (1995)","journal-title":"Int. J. Hum Comput Stud."},{"key":"54_CR15","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/ACCESS.2014.2332453","volume":"2","author":"H Han","year":"2014","unstructured":"Han, H., et al.: Toward scalable systems for big data analytics: a technology tutorial. Access, IEEE. 2, 652\u2013687 (2014)","journal-title":"Access, IEEE."},{"key":"54_CR16","doi-asserted-by":"crossref","unstructured":"Iwanaga, I.S.M., et al.: Building an earthquake evacuation ontology from twitter. In: 2011 IEEE International Conference on Granular Computing (GrC) (2011)","DOI":"10.1109\/GRC.2011.6122613"},{"issue":"1","key":"54_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1108\/02651339410057518","volume":"11","author":"A Johne","year":"1994","unstructured":"Johne, A.: Listening to the voice of the market. Int. Mark. Rev. 11(1), 47\u201359 (1994)","journal-title":"Int. Mark. Rev."},{"issue":"1","key":"54_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00416ED1V01Y201204HLT016","volume":"5","author":"B Liu","year":"2012","unstructured":"Liu, B.: Sentiment analysis and opinion mining. Synth. Lect. Hum. Lang. Technol. 5(1), 1\u2013167 (2012)","journal-title":"Synth. Lect. Hum. Lang. Technol."},{"key":"54_CR19","doi-asserted-by":"crossref","unstructured":"Louati, A., El Haddad, J., Pinson, S.: A distributed decision making and propagation approach for trust-based service discovery in social networks. In: Group Decision and Negotiation. A Process-Oriented View, pp. 262\u2013269. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-07179-4_30"},{"key":"54_CR20","unstructured":"Makice, K.: Twitter API: Up and Running: Learn How to Build Applications with the Twitter API. O\u2019Reilly Media, Inc., USA (2009)"},{"issue":"1","key":"54_CR21","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.dss.2006.12.005","volume":"45","author":"J Manuel P\u00e9rez-Mart\u00ednez","year":"2008","unstructured":"Manuel P\u00e9rez-Mart\u00ednez, J., et al.: Contextualizing data warehouses with documents. Decis. Support Syst. 45(1), 77\u201394 (2008)","journal-title":"Decis. Support Syst."},{"key":"54_CR22","unstructured":"Manyika, J., et al.: Big Data: The Next Frontier for Innovation, Competition, and Productivity. McKinsey Global Institute (2011)"},{"key":"54_CR23","doi-asserted-by":"crossref","unstructured":"Vassiliadis, P., Simitsis, A., Skiadopoulos, S.: On the conceptual and logical modeling of ETL processes. In: International Conference on Advanced Information Systems Engineering, pp. 782\u2013786 (2002)","DOI":"10.1145\/583890.583893"},{"key":"54_CR24","doi-asserted-by":"crossref","unstructured":"Paik, I., et al.: Big data infrastructure for active situation awareness on social network services. In: Proceedings of the 2013 IEEE International Congress on Big Data, IEEE Computer Society, pp. 411\u2013412 (2013)","DOI":"10.1109\/BigData.Congress.2013.61"},{"key":"54_CR25","unstructured":"Podobnik, V., et al.: How to calculate trust between social network users? In: 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE (2012)"},{"key":"54_CR26","unstructured":"Power, D.J.: A Brief History of Decision Support Systems. \n                    http:\/\/DSSResources.COM\/history\/dsshistory.html"},{"key":"54_CR27","unstructured":"Reidenbach, R.E.: Listening to the Voice of the Market: How to Increase Market Share and Satisfy Current Customers. CRC Press, USA (2012)"},{"issue":"1","key":"54_CR28","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1504\/IJWGS.2005.007547","volume":"1","author":"L Schlesinger","year":"2005","unstructured":"Schlesinger, L., Irmert, F., Lehner, W.: Supporting the ETL-process by web service technologies. Int. J. Web Grid Serv. 1(1), 31\u201347 (2005)","journal-title":"Int. J. Web Grid Serv."},{"issue":"4","key":"54_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2501654.2501661","volume":"45","author":"Wanita Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(4) (2013)","journal-title":"ACM Computing Surveys"},{"key":"54_CR30","first-page":"61","volume-title":"Lecture Notes in Electrical Engineering","author":"Bayar Tsolmon","year":"2013","unstructured":"Tsolmon, B., Lee, K.-S.: A Graph-based reliable user classification. In: Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013), p. 61\u201368. Springer, Singapore (2014)"},{"key":"54_CR31","doi-asserted-by":"crossref","unstructured":"Wright, A.: Searching the deep web. In: Communications of ACM (2008)","DOI":"10.1145\/1400181.1400187"}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the International Conference on Data Engineering 2015 (DaEng-2015)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1799-6_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T05:09:11Z","timestamp":1565327351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1799-6_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811317972","9789811317996"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1799-6_54","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}