{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:26:41Z","timestamp":1747153601392,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_35","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"493-511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Grounded Theory-Driven Knowledge Production Features Mining: One Empirical Study Based on Big Data Technology"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7917-2726","authenticated-orcid":false,"given":"Hao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yiyang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6531-8963","authenticated-orcid":false,"given":"Mulan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0351-9505","authenticated-orcid":false,"given":"Yufang","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Qinwei","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7545-7385","authenticated-orcid":false,"given":"Pengcheng","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8095-323X","authenticated-orcid":false,"given":"Yijing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"35_CR1","unstructured":"Chen, X.: The application of grounded theory in Chinese education research. Peking Univ. Educ. Rev. 13(01), 2\u201315, 188 (2015). (in Chinese)"},{"issue":"4","key":"35_CR2","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1097\/00006199-196807000-00014","volume":"17","author":"BG Glaser","year":"1968","unstructured":"Glaser, B.G., Strauss, A.L., Strutzel, E.: The discovery of grounded theory; strategies for qualitative research. Nurs. Res. 17(4), 555 (1968)","journal-title":"Nurs. Res."},{"key":"35_CR3","unstructured":"Glaser, B.G., Holton, J.: Remodeling grounded theory. Hist. Soc. Res. \u2013 Suppl. 4(1), 47\u201368 (2007)"},{"issue":"4","key":"35_CR4","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.ipm.2011.12.001","volume":"48","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Rousseau, R.: Towards are presentation of diffusion and interaction of scientific ideas: the case of fiberoptics communication. Inf. Process. Manag. 48(4), 791\u2013801 (2012)","journal-title":"Inf. Process. Manag."},{"issue":"1","key":"35_CR5","first-page":"62","volume":"41","author":"S Ge","year":"2015","unstructured":"Ge, S.: Research on the diffusion process of academic innovation. Chin. Libr. J. 41(1), 62\u201375 (2015). (in Chinese)","journal-title":"Chin. Libr. J."},{"issue":"2","key":"35_CR6","first-page":"1","volume":"2","author":"C Chen","year":"2017","unstructured":"Chen, C.: Science mapping: a systematic review of the literature. JDIS 2(2), 1\u201340 (2017)","journal-title":"JDIS"},{"key":"35_CR7","volume-title":"Grounded Theory: 1984\u20131994","author":"BG Glaser","year":"1995","unstructured":"Glaser, B.G.: Grounded Theory: 1984\u20131994. Sociology Press, Mill Valley (1995)"},{"key":"35_CR8","volume-title":"Doing Formal Grounded Theory: A Proposal","author":"BG Glaser","year":"2007","unstructured":"Glaser, B.G.: Doing Formal Grounded Theory: A Proposal. Sociology Press, Mill Valley (2007)"},{"key":"35_CR9","unstructured":"Fei, X.: Grounded theory research methodology: elements, research procedures and judgment criteria. Rev. Public Adm. 03, 23\u201343+197 (2008). (in Chinese)"},{"key":"35_CR10","first-page":"72","volume":"11","author":"H Wang","year":"2019","unstructured":"Wang, H., Cui, X.: Research on the flipped classroom based on the perception of students majoring in graphic files. Libr. Res. Work 11, 72\u201377 (2019). (in Chinese)","journal-title":"Libr. Res. Work"},{"issue":"05","key":"35_CR11","first-page":"29","volume":"21","author":"JCY Ng","year":"2019","unstructured":"Ng, J.C.Y., Shan, Z., Tan, Q.: Research on the evolution process of procrastination at different ages: based on the classical grounded theory. J. Shijiazhuang Univ. 21(05), 29\u201339 (2019). (in Chinese)","journal-title":"J. Shijiazhuang Univ."},{"issue":"04","key":"35_CR12","first-page":"22","volume":"26","author":"G Wang","year":"2016","unstructured":"Wang, G.: Characteristics and formation mechanism of marine environmental risks: analysis based on grounded theory. China Popul. Resour. Environ. 26(04), 22\u201329 (2016). (in Chinese)","journal-title":"China Popul. Resour. Environ."},{"issue":"3","key":"35_CR13","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s11192-010-0313-6","volume":"86","author":"CP Hu","year":"2011","unstructured":"Hu, C.P., Hu, J.M., Gao, Y., et al.: A journal co-citation analysis of library and information science in China. Scientometrics 86(3), 657\u2013670 (2011). (in Chinese)","journal-title":"Scientometrics"},{"key":"35_CR14","first-page":"50","volume":"01","author":"Q Liu","year":"2012","unstructured":"Liu, Q., Ye, Y.: The technical method of bibliographic information mining and the realization of its software SATI\u2014Taking Chinese and foreign library and information science as an example. J. Inf. Resour. Manag. 01, 50\u201358 (2012). (in Chinese)","journal-title":"J. Inf. Resour. Manag."},{"issue":"7","key":"35_CR15","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1002\/asi.21309","volume":"61","author":"C Chen","year":"2010","unstructured":"Chen, C., et al.: The structure and dynamics of co-citation clusters: a multiple-perspective co-citation analysis. JASIST 61(7), 1386\u20131409 (2010)","journal-title":"JASIST"},{"key":"35_CR16","first-page":"890","volume":"04","author":"Z Feng","year":"2004","unstructured":"Feng, Z., Zhang, D., Fan, H.: A preliminary study on the characteristics of middle school students\u2019 psychological quality. Psychol. Sci. 04, 890\u2013895 (2004). (in Chinese)","journal-title":"Psychol. Sci."},{"key":"35_CR17","first-page":"406","volume":"06","author":"L Zhang","year":"2003","unstructured":"Zhang, L., Wang, X., Feng, Z., et al.: Qualitative and quantitative research on the concept and components of nurses\u2019 psychological quality. J. Nurs. 06, 406\u2013407 (2003). (in Chinese)","journal-title":"J. Nurs."},{"key":"35_CR18","first-page":"941","volume":"10","author":"J Liu","year":"2006","unstructured":"Liu, J., Zhang, L., Feng, Z., Wang, T.: Concept and component analysis of nurse competency characteristics. J. Fourth Mil. Med. Univ. 10, 941\u2013944 (2006). (in Chinese)","journal-title":"J. Fourth Mil. Med. Univ."},{"key":"35_CR19","first-page":"119","volume":"05","author":"R Tian","year":"2013","unstructured":"Tian, R., Yao, C., Yuan, J., Pan, Y.: Research progress on the mobility of scientific and technological talents based on scientific research experience. Books Inf. 05, 119\u2013125 (2013). (in Chinese)","journal-title":"Books Inf."},{"key":"35_CR20","unstructured":"Introduction to Zhigang Li [EB\/OL]. http:\/\/ibs.ouc.edu.cn\/2020\/0325\/c7073a283147\/page.htm"},{"key":"35_CR21","unstructured":"Li, J., Zhang, S., Wang, W.: Exploration on the antecedent motivation of users\u2019 academic social insufficiency in scientific research social networks: a qualitative research perspective. Mod. Inf. 39(02), 121\u2013127+144 (2019). (in Chinese)"},{"issue":"04","key":"35_CR22","first-page":"81","volume":"62","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Li, J., Wang, W.: The influence mechanism of insufficient social networking of academic social networking site users: an exploration based on qualitative methods. Libr. Inf. Serv. 62(04), 81\u201388 (2018). (in Chinese)","journal-title":"Libr. Inf. Serv."},{"key":"35_CR23","first-page":"75","volume":"03","author":"W Wang","year":"2017","unstructured":"Wang, W., Xie, Y., Liu, K.: Research on user willingness to use virtual health community based on grounded theory. Inf. Doc. Serv. 03, 75\u201382 (2017). (in Chinese)","journal-title":"Inf. Doc. Serv."},{"key":"35_CR24","unstructured":"Wang, W., Zhang, Z., Li, S., Wu, Z., Xie, Y.: Construction of user online health information acceptance-driven situation model based on system evaluation method. Mod. Intell. 39(09), 74\u201383, 108 (2019). (in Chinese)"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:11:02Z","timestamp":1685459462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}