{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:24Z","timestamp":1773510924538,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10489-021-02535-8","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T16:04:49Z","timestamp":1624291489000},"page":"2745-2762","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Social velocity based spatio-temporal anomalous daily activity discovery of social media users"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1775-0954","authenticated-orcid":false,"given":"Ahmet Sakir","family":"Dokuz","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"issue":"6","key":"2535_CR1","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: Are you a human, bot, or cyborg?. IEEE Transactions on Dependable and Secure Computing 9(6):811\u2013824. https:\/\/doi.org\/10.1109\/TDSC.2012.75","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"2535_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2980765.2980767","volume":"18","author":"R Yu","year":"2016","unstructured":"Yu R, Qiu H, Wen Z, Lin C, Liu Y (2016) A survey on social media anomaly detection. ACM SIGKDD Explorations Newsletter 18(1):1\u201314. https:\/\/doi.org\/10.1145\/2980765.2980767","journal-title":"ACM SIGKDD Explorations Newsletter"},{"issue":"2","key":"2535_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.eij.2015.11.004","volume":"17","author":"R Kaur","year":"2016","unstructured":"Kaur R, Singh S (2016) A survey of data mining and social network analysis based anomaly detection techniques. Egyptian Informatics Journal 17(2):199\u2013216. https:\/\/doi.org\/10.1016\/j.eij.2015.11.004","journal-title":"Egyptian Informatics Journal"},{"key":"2535_CR4","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.socnet.2014.05.002","volume":"39","author":"D Savage","year":"2014","unstructured":"Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Networks 39:62\u201370. https:\/\/doi.org\/10.1016\/j.socnet.2014.05.002","journal-title":"Soc Networks"},{"key":"2535_CR5","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.jnca.2016.02.021","volume":"68","author":"PV Bindu","year":"2016","unstructured":"Bindu PV, Thilagam PS (2016) Mining social networks for anomalies: Methods and challenges. J Netw Comput Appl 68:213\u2013229. https:\/\/doi.org\/10.1016\/j.jnca.2016.02.021","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"2535_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1080\/13658816.2017.1406943","volume":"32","author":"Y Gao","year":"2018","unstructured":"Gao Y, Wang S, Padmanabhan A, Yin J, Cao G (2018) Mapping spatiotemporal patterns of events using social media: a case study of influenza trends. Int J Geogr Inf Sci 32(3):425\u2013449. https:\/\/doi.org\/10.1080\/13658816.2017.1406943","journal-title":"Int J Geogr Inf Sci"},{"key":"2535_CR7","doi-asserted-by":"crossref","unstructured":"Chae J, Thom D, Bosch H, Jang Y, Maciejewski R, Ebert D S, Ertl T (2012) Spatiotemporal social media analytics for abnormal event detection and examination using seasonal-trend decomposition. In: 2012 IEEE conference on visual analytics science and technology (VAST), pp 143\u2013152","DOI":"10.1109\/VAST.2012.6400557"},{"key":"2535_CR8","doi-asserted-by":"crossref","unstructured":"Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: A survey. CoRR abs\/1901.03407, arXiv:1901.03407","DOI":"10.1145\/3394486.3406704"},{"key":"2535_CR9","doi-asserted-by":"crossref","unstructured":"Wang Z, Joo V, Tong C, Xin X, Chin H C (2014) Anomaly detection through enhanced sentiment analysis on social media data. In: 2014 IEEE 6th international conference on cloud computing technology and science, pp 917\u2013922","DOI":"10.1109\/CloudCom.2014.69"},{"key":"2535_CR10","doi-asserted-by":"crossref","unstructured":"Tonon A, Cudr\u00e9-Mauroux P, Blarer A, Lenders V, Motik B (2017) Armatweet: Detecting events by semantic tweet analysis. In: Blomqvist E, Maynard D, Gangemi A, Hoekstra R, Hitzler P, Hartig O (eds) The semantic web, pp 138\u2013153. Springer International Publishing, Cham","DOI":"10.1007\/978-3-319-58451-5_10"},{"issue":"9","key":"2535_CR11","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.14778\/3329772.3329778","volume":"12","author":"NT Tam","year":"2019","unstructured":"Tam NT, Weidlich M, Zheng B, Yin H, Hung NQV, Stantic B (2019) From anomaly detection to rumour detection using data streams of social platforms. Proceedings of the VLDB Endowment 12 (9):1016\u20131029. https:\/\/doi.org\/10.14778\/3329772.3329778","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2535_CR12","doi-asserted-by":"crossref","unstructured":"Akoglu L, McGlohon M, Faloutsos C (2010) oddball: Spotting anomalies in weighted graphs. In: Zaki M J, Yu J X, Ravindran B, Pudi V (eds) Advances in knowledge discovery and data mining, pp 410\u2013421. Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"2535_CR13","doi-asserted-by":"crossref","unstructured":"Hassanzadeh R, Nayak R (2013) A rule-based hybrid method for anomaly detection in online-social-network graphs. In: 2013 IEEE 25th international conference on tools with artificial intelligence, pp 351\u2013357","DOI":"10.1109\/ICTAI.2013.60"},{"key":"2535_CR14","doi-asserted-by":"publisher","unstructured":"Garcia-Rubio C, D\u00edaz Redondo RP, Campo C, Fernandez Vilas A (2018) Using entropy of social media location data for the detection of crowd dynamics anomalies. Electronics, 7(12). https:\/\/doi.org\/10.3390\/electronics7120380","DOI":"10.3390\/electronics7120380"},{"issue":"2","key":"2535_CR15","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1111\/coin.12205","volume":"35","author":"A Fernandez Vilas","year":"2019","unstructured":"Fernandez Vilas A, D\u00edaz Redondo RP, Ben Khalifa M (2019) Analysis of crowds\u2019 movement using twitter. Comput Intell 35(2):448\u2013472. https:\/\/doi.org\/10.1111\/coin.12205","journal-title":"Comput Intell"},{"key":"2535_CR16","doi-asserted-by":"crossref","unstructured":"Ferrari L, Rosi A, Mamei M, Zambonelli F (2011) Extracting urban patterns from location-based social networks. In: Proceedings of the 3rd ACM SIGSPATIAL international workshop on location-based social networks, pp 9\u201316","DOI":"10.1145\/2063212.2063226"},{"key":"2535_CR17","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eswa.2017.05.068","volume":"86","author":"AS Dokuz","year":"2017","unstructured":"Dokuz AS, Celik M (2017) Discovering socially important locations of social media users. Expert Syst Appl 86:113\u2013124. https:\/\/doi.org\/10.1016\/j.eswa.2017.05.068","journal-title":"Expert Syst Appl"},{"key":"2535_CR18","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jocs.2017.09.005","volume":"22","author":"M Celik","year":"2017","unstructured":"Celik M, Dokuz AS (2017) Discovering socio-spatio-temporal important locations of social media users. J Comp Sci 22:85\u201398. https:\/\/doi.org\/10.1016\/j.jocs.2017.09.005","journal-title":"J Comp Sci"},{"key":"2535_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.pmcj.2014.08.002","volume":"18","author":"J Han","year":"2015","unstructured":"Han J, Lee H (2015) Adaptive landmark recommendations for travel planning: Personalizing and clustering landmarks using geo-tagged social media. Pervasive and Mobile Computing 18:4\u201317. https:\/\/doi.org\/10.1016\/j.pmcj.2014.08.002","journal-title":"Pervasive and Mobile Computing"},{"issue":"2","key":"2535_CR20","doi-asserted-by":"publisher","first-page":"102057","DOI":"10.1016\/j.ipm.2019.102057","volume":"57","author":"A Khatibi","year":"2020","unstructured":"Khatibi A, Bel\u00e9m F, da Silva APC, Almeida JM, Gon\u00e7alves MA (2020) Fine-grained tourism prediction: Impact of social and environmental features. Information Processing & Management 57 (2):102057. https:\/\/doi.org\/10.1016\/j.ipm.2019.102057","journal-title":"Information Processing & Management"},{"key":"2535_CR21","doi-asserted-by":"crossref","unstructured":"Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake shakes twitter users: Real-time event detection by social sensors. In: Proceedings of the 19th international conference on World Wide Web, pp 851\u2013860","DOI":"10.1145\/1772690.1772777"},{"key":"2535_CR22","doi-asserted-by":"publisher","unstructured":"Xu Z, Liu Y, Yen N, Mei L, Luo X, Wei X, Hu C (2017) Crowdsourcing based description of urban emergency events using social media big data. IEEE Transactions on Cloud Computing, pp 1\u201311. https:\/\/doi.org\/10.1109\/TCC.2016.2517638","DOI":"10.1109\/TCC.2016.2517638"},{"key":"2535_CR23","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.neucom.2015.01.084","volume":"172","author":"D Pohl","year":"2016","unstructured":"Pohl D, Bouchachia A, Hellwagner H (2016) Online indexing and clustering of social media data for emergency management. Neurocomputing 172:168\u2013179. https:\/\/doi.org\/10.1016\/j.neucom.2015.01.084","journal-title":"Neurocomputing"},{"key":"2535_CR24","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.ins.2016.01.014","volume":"340-341","author":"P Arcaini","year":"2016","unstructured":"Arcaini P, Bordogna G, Ienco D, Sterlacchini S (2016) User-driven geo-temporal density-based exploration of periodic and not periodic events reported in social networks. Inf Sci 340-341:122\u2013143. https:\/\/doi.org\/10.1016\/j.ins.2016.01.014","journal-title":"Inf Sci"},{"issue":"3","key":"2535_CR25","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1016\/j.ipm.2018.03.001","volume":"56","author":"M Hasan","year":"2019","unstructured":"Hasan M, Orgun MA, Schwitter R (2019) Real-time event detection from the twitter data stream using the twitternews+ framework. Information Processing & Management 56(3):1146\u20131165. https:\/\/doi.org\/10.1016\/j.ipm.2018.03.001","journal-title":"Information Processing & Management"},{"key":"2535_CR26","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.ins.2019.05.054","volume":"527","author":"S Zhang","year":"2020","unstructured":"Zhang S, Mao X, Choo K-K R, Peng T, Wang G (2020) A trajectory privacy-preserving scheme based on a dual-k mechanism for continuous location-based services. Inf Sci 527:406\u2013419. https:\/\/doi.org\/10.1016\/j.ins.2019.05.054","journal-title":"Inf Sci"},{"key":"2535_CR27","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.eswa.2017.10.049","volume":"94","author":"G Cai","year":"2018","unstructured":"Cai G, Lee K, Lee I (2018) Itinerary recommender system with semantic trajectory pattern mining from geo-tagged photos. Expert Syst Appl 94:32\u201340. https:\/\/doi.org\/10.1016\/j.eswa.2017.10.049","journal-title":"Expert Syst Appl"},{"issue":"4","key":"2535_CR28","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1080\/15230406.2018.1496036","volume":"46","author":"F Hu","year":"2019","unstructured":"Hu F, Li Z, Yang C, Jiang Y (2019) A graph-based approach to detecting tourist movement patterns using social media data. Cartogr Geogr Inf Sci 46(4):368\u2013382. https:\/\/doi.org\/10.1080\/15230406.2018.1496036","journal-title":"Cartogr Geogr Inf Sci"},{"key":"2535_CR29","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1016\/j.future.2017.08.003","volume":"87","author":"H Yao","year":"2018","unstructured":"Yao H, Xiong M, Zeng D, Gong J (2018) Mining multiple spatial\u2013temporal paths from social media data. Futur Gener Comput Syst 87:782\u2013791. https:\/\/doi.org\/10.1016\/j.future.2017.08.003","journal-title":"Futur Gener Comput Syst"},{"key":"2535_CR30","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.knosys.2017.03.025","volume":"125","author":"D Yu","year":"2017","unstructured":"Yu D, Chen N, Jiang F, Fu B, Qin A (2017) Constrained nmf-based semi-supervised learning for social media spammer detection. Knowl-Based Syst 125:64\u201373. https:\/\/doi.org\/10.1016\/j.knosys.2017.03.025","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"2535_CR31","doi-asserted-by":"publisher","first-page":"18:1","DOI":"10.1145\/2811268","volume":"10","author":"R Yu","year":"2015","unstructured":"Yu R, He X, Liu Y (2015) Glad: Group anomaly detection in social media analysis. ACM Transactions on Knowledge Discovery from Data 10(2):18:1\u201318:22. https:\/\/doi.org\/10.1145\/2811268","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"2535_CR32","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.pmcj.2016.03.005","volume":"33","author":"P Giridhar","year":"2016","unstructured":"Giridhar P, Amin MT, Abdelzaher T, Wang D, Kaplan L, George J, Ganti R (2016) Clarisense+: An enhanced traffic anomaly explanation service using social network feeds. Pervasive and Mobile Computing 33:140\u2013155. https:\/\/doi.org\/10.1016\/j.pmcj.2016.03.005","journal-title":"Pervasive and Mobile Computing"},{"key":"2535_CR33","doi-asserted-by":"crossref","unstructured":"Chua A, Marcheggiani E, Servillo L, Vande Moere A (2015) Flowsampler: Visual analysis of urban flows in geolocated social media data. In: Aiello L M, McFarland D (eds) Social informatics, pp 5\u201317. Springer International Publishing, Cham","DOI":"10.1007\/978-3-319-15168-7_2"},{"key":"2535_CR34","doi-asserted-by":"crossref","unstructured":"Santos BP, Rettore PHL, Ramos HS, Vieira LFM, Loureiro AAF (2018) Enriching traffic information with a spatiotemporal model based on social media. In: 2018 IEEE Symposium on computers and communications (ISCC), pp 00464\u201300469","DOI":"10.1109\/ISCC.2018.8538665"},{"key":"2535_CR35","doi-asserted-by":"crossref","unstructured":"Huang C, Wu X, Wang D (2016) Crowdsourcing-based urban anomaly prediction system for smart cities. In: Proceedings of the 25th ACM international on conference on information and knowledge management, pp 1969\u20131972","DOI":"10.1145\/2983323.2983886"},{"key":"2535_CR36","doi-asserted-by":"publisher","unstructured":"Sakkari M, D. Algarni A, Zaied M (2019) Urban crowd detection using som, dbscan and lbsn data entropy: A twitter experiment in new york and madrid. Electronics, 8(6). https:\/\/doi.org\/10.3390\/electronics8060692","DOI":"10.3390\/electronics8060692"},{"issue":"7","key":"2535_CR37","doi-asserted-by":"publisher","first-page":"308:1","DOI":"10.3390\/ijgi8070308","volume":"8","author":"Z Xu","year":"2019","unstructured":"Xu Z, Cui G, Zhong M, Wang X (2019) Anomalous urban mobility pattern detection based on gps trajectories and poi data. ISPRS International Journal of Geo-Information 8(7):308:1\u2013308:20. https:\/\/doi.org\/10.3390\/ijgi8070308","journal-title":"ISPRS International Journal of Geo-Information"},{"key":"2535_CR38","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ijinfomgt.2018.02.003","volume":"40","author":"J Kim","year":"2018","unstructured":"Kim J, Bae J, Hastak M (2018) Emergency information diffusion on online social media during storm cindy in u.s. Int J Inf Manag 40:153\u2013165. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.02.003","journal-title":"Int J Inf Manag"},{"key":"2535_CR39","doi-asserted-by":"crossref","unstructured":"Jayarajah K, Subbaraju V, Weerakoon D, Misra A, Tam LT, Athaide N (2017) Discovering anomalous events from urban informatics data. In: Pham T, Kolodny MA (eds) Ground\/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR VIII, pp 70\u201383","DOI":"10.1117\/12.2262404"},{"issue":"4","key":"2535_CR40","doi-asserted-by":"publisher","first-page":"40:1","DOI":"10.1145\/3057281","volume":"35","author":"S Wang","year":"2017","unstructured":"Wang S, Zhang X, Cao J, He L, Stenneth L, Yu PS, Li Z, Huang Z (2017) Computing urban traffic congestions by incorporating sparse gps probe data and social media data. ACM Trans Inf Syst 35(4):40:1\u201340:30. https:\/\/doi.org\/10.1145\/3057281","journal-title":"ACM Trans Inf Syst"},{"key":"2535_CR41","doi-asserted-by":"crossref","unstructured":"Shin S, Choi M, Choi J, Langevin S, Bethune C, Horne P, Kronenfeld N, Kannan R, Drake B, Park H, Choo J (2017) Stexnmf: Spatio-temporally exclusive topic discovery for anomalous event detection. In: 2017 IEEE International conference on data mining (ICDM), pp 435\u2013444","DOI":"10.1109\/ICDM.2017.53"},{"key":"2535_CR42","unstructured":"Chae J, Cui Y, Jang Y, Wang G, Malik A, Ebert DS (2015) Trajectory-based Visual Analytics for Anomalous Human Movement Analysis using Social Media. In: Bertini E, Roberts JC (eds) EuroVis workshop on visual analytics (EuroVA), pp 43\u201347. The Eurographics Association"},{"key":"2535_CR43","doi-asserted-by":"crossref","unstructured":"Pan B, Zheng Y, Wilkie D, Shahabi C (2013) Crowd sensing of traffic anomalies based on human mobility and social media. In: Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems, pp 344\u2013353","DOI":"10.1145\/2525314.2525343"},{"key":"2535_CR44","doi-asserted-by":"crossref","unstructured":"Gabrielli L, Rinzivillo S, Ronzano F, Villatoro D (2014) From tweets to semantic trajectories: Mining anomalous urban mobility patterns. In: Nin J, Villatoro D (eds) Citizen in Sensor Networks, pp 26\u201335. Springer International Publishing, Cham","DOI":"10.1007\/978-3-319-04178-0_3"},{"key":"2535_CR45","unstructured":"Viswanath B, Bashir MA, Crovella M, Guha S, Gummadi KP, Krishnamurthy B, Mislove A (2014) Towards detecting anomalous user behavior in online social networks. In: 23rd USENIX Security Symposium (USENIX Security 14), pp 223\u2013238. USENIX Association, San Diego, CA"},{"issue":"1","key":"2535_CR46","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TVCG.2015.2467196","volume":"22","author":"N Cao","year":"2016","unstructured":"Cao N, Shi C, Lin S, Lu J, Lin Y, Lin C (2016) Targetvue: Visual analysis of anomalous user behaviors in online communication systems. IEEE Trans Vis Comput Graph 22(1):280\u2013289. https:\/\/doi.org\/10.1109\/TVCG.2015.2467196","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"2535_CR47","doi-asserted-by":"crossref","unstructured":"Harikant N, Suma V (2017) Risk analysis in facebook based on user anomalous behaviors. In: 2017 International conference on intelligent computing and control systems (ICICCS), pp 967\u2013971","DOI":"10.1109\/ICCONS.2017.8250609"},{"key":"2535_CR48","doi-asserted-by":"publisher","first-page":"638","DOI":"10.28948\/ngumuh.535232","volume":"8","author":"AS Dokuz","year":"2019","unstructured":"Dokuz AS (2019) Anomalous activity detection from daily social media user mobility data. Nigde Omer Halisdemir Universitesi Muhendislik Bilimleri Dergisi 8:638\u2013651. https:\/\/doi.org\/10.28948\/ngumuh.535232","journal-title":"Nigde Omer Halisdemir Universitesi Muhendislik Bilimleri Dergisi"},{"key":"2535_CR49","unstructured":"Twitter (2019) Twitter developers web site. https:\/\/dev.twitter.com\/"},{"key":"2535_CR50","unstructured":"Yamamoto Y (2019) Twitter4j java library. http:\/\/twitter4j.org\/en\/index.html"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02535-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02535-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02535-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T05:16:31Z","timestamp":1644470191000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02535-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["2535"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02535-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"17 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}