{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T07:43:50Z","timestamp":1774165430495,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T00:00:00Z","timestamp":1128124800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Comput Math Organiz Theor"],"published-print":{"date-parts":[[2005,10]]},"DOI":"10.1007\/s10588-005-5377-0","type":"journal-article","created":{"date-parts":[[2006,1,14]],"date-time":"2006-01-14T00:22:56Z","timestamp":1137198176000},"page":"201-228","source":"Crossref","is-referenced-by-count":171,"title":["Communication Networks from the Enron Email Corpus \u201cIt's Always About the People. Enron is no Different\u201d"],"prefix":"10.1007","volume":"11","author":[{"given":"Jana","family":"Diesner","sequence":"first","affiliation":[]},{"given":"Terrill L.","family":"Frantz","sequence":"additional","affiliation":[]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,1,14]]},"reference":[{"key":"5377_CR1","unstructured":"Bekkerman, R., A. McCallum, and G. Huang (2004), \u201cAutomatic Categorization of Email into Folders:Benchmark Experiments on Enron and SRI Corpora,\u201d CIIR Technical Report IR-418 2004. Retrieved June 16,2004, from http:\/\/www.cs.umass.edu\/~ronb\/papers\/email.pdf"},{"key":"5377_CR2","unstructured":"Berry, M.W. and M. Browne (2005), \u201cEmail Surveillance Using Nonnegative Matrix Factorization,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conferenceon Data Mining 2005. Newport Beach, CA, April 2005, 45\u201354."},{"key":"5377_CR3","first-page":"241","volume-title":"Dynamic Social Network Modeling and Analysis: 2002 Workshop Summary and Papers","author":"S.P. Borgatti","year":"2004","unstructured":"Borgatti, S.P. (2004), \u201cThe Key Player Problem,\u201d in R. Breiger, K. M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: 2002 Workshop Summary and Papers. Washington, DC: National Academies Press, 241\u2013252."},{"issue":"1","key":"5377_CR4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1287\/orsc.2.1.40","volume":"2","author":"J. S. Brown","year":"1991","unstructured":"Brown, J. S. and P. Duguid (1991), \u201cOrganization Learning and Communities-of-Practice: Toward a Unified View of Working, Learning, and Innovation,\u201d Organization Science, 2(1), 40\u201357.","journal-title":"Organization Science"},{"key":"5377_CR5","unstructured":"Carley, K.M. (2003), \u201cDynamic Network Analysis,\u201d in R. Breiger, K.M. Carley, and P. Pattison (Eds.), Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, Committee on Human Factors,National Research Council, National Research Council. Washington, DC, 133\u2013145."},{"key":"5377_CR6","unstructured":"Carley, K.M., J. Diesner, J. Reminga, and M. Tsvetovat (forthcoming), \u201cToward an Interoperable DynamicNetwork Analysis Toolkit,\u201d Decision Support Systems Journal, Special Issue on Cyberinfrastructure for Homeland Security: Advances in Information Sharing, Data Mining, and Collaboration Systems."},{"key":"5377_CR7","doi-asserted-by":"crossref","unstructured":"Carley, K.M. and J. Reminga (2004), \u201cORA: Organization Risk Analyzer,\u201d Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http:\/\/www.casos.cs.cmu.edu\/projects\/ora\/publications.html","DOI":"10.21236\/ADA460034"},{"key":"5377_CR8","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1002\/(SICI)1099-1379(199711)18:1+<533::AID-JOB906>3.3.CO;2-V","volume":"18","author":"Kathleen M. Carley","year":"1997","unstructured":"Carley, Kathleen M. (1997), \u201cExtracting Team Mental Models Through Textual Analysis,\u201d Journal of Organizational Behavior, 18, 533\u2013538.","journal-title":"Journal of Organizational Behavior"},{"key":"5377_CR9","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/0304-422X(94)90011-6","volume":"22","author":"Kathleen M. Carley","year":"1994","unstructured":"Carley, Kathleen M. (1994), \u201cExtracting Culture through Textual Analysis,\u201d Poetics, 22, 291\u2013312.","journal-title":"Poetics"},{"issue":"3","key":"5377_CR10","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1093\/sf\/70.3.601","volume":"70","author":"Kathleen M. Carley","year":"1992","unstructured":"Carley, Kathleen M. and M. Palmquist (1992), \u201cExtracting, Representing and Analyzing Mental Models,\u201d Social Forces, 70(3), 601\u2013636.","journal-title":"Social Forces"},{"key":"5377_CR11","doi-asserted-by":"crossref","unstructured":"Chapanond, A., M.S. Krishnamoorthy, and B. Yener (2005), \u201cGraph Theoretic and Spectral Analysis of Enron Email Data,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 15\u201322.","DOI":"10.1007\/s10588-005-5381-4"},{"key":"5377_CR12","unstructured":"Cohen, W.W. (n.d), CALD, CMU. Retrieved October 5, 2004, from http:\/\/www-2.cs.cmu.edu\/~enron\/"},{"key":"5377_CR13","unstructured":"Corrada-Emmanuel, A. (n.d.), \u201cEnron Email Dataset Research.\u201d Retrieved October 5, 2004, from http:\/\/ciir.cs.umass.edu\/~corrada\/enron\/"},{"key":"5377_CR14","unstructured":"Diesner, J. and K.M. Carley (2005a), \u201cExploration of Communication Networks from the Enron Email Corpus,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 3\u201314."},{"key":"5377_CR15","doi-asserted-by":"crossref","unstructured":"Diesner, J. and K.M. Carley (2005b), \u201cRevealing Social Structure from Texts: Meta-Matrix Text Analysisas a novel method for Network Text Analysis,\u201d Chapter 4 in V.K. Narayanan and D.J. Armstrong (Eds.), Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations. Harrisburg, PA: Idea Group Publishing, pp. 81\u2013108.","DOI":"10.4018\/978-1-59140-396-8.ch004"},{"key":"5377_CR16","unstructured":"Duan, Y., J. Wang, M. Kam, and J. Canny (2002), \u201cA Secure Online Algorithm for Link Analysis on Weighted Graph,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAMInternational Conference on Data Mining 2005. Newport Beach, CA, April 2005, 71\u201381."},{"key":"5377_CR17","unstructured":"Enron Scandal at a Glance (2002), BBC News. Retrieved October 13, 2004, from http:\/\/news.bbc.co.uk\/1\/hi\/business\/1780075.stm"},{"key":"5377_CR18","unstructured":"FERC Western Energy Markets\u2014Enron Investigation, PA02-2. (n.d.), Retrieved October 18, 2004, from http:\/\/www.ferc.gov\/industries\/electric\/indusact\/wem\/pa02-2\/info-release.asp."},{"key":"5377_CR19","unstructured":"Ferc\/Apsen web site. (n.d.), Retrieved between November 4, 2004 and June 22, 2005, from http:\/\/ferc.aspensys.com."},{"key":"5377_CR20","volume-title":"Enron. The Raise and Fall","author":"L. Fox","year":"2003","unstructured":"Fox, L. (2003), Enron. The Raise and Fall. Wiley & Sons: Hoboken, N.J."},{"key":"5377_CR21","volume-title":"What Went Wrong at Enron","author":"P.C. Fusaro","year":"2002","unstructured":"Fusaro, P.C. and R.M. Miller (2002), What Went Wrong at Enron. Wiley & Sons: Hoboken, N.J."},{"key":"5377_CR22","volume-title":"Mental Models","author":"P. Johnson-Laird","year":"1983","unstructured":"Johnson-Laird, P. (1983). Mental Models. Cambridge, MA: Harvard University."},{"key":"5377_CR23","doi-asserted-by":"crossref","unstructured":"Keila, P.S. and D.B. Skillicorn (2005), \u201cStructure in the Enron Email Dataset,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 55\u201364.","DOI":"10.1007\/s10588-005-5379-y"},{"key":"5377_CR24","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1177\/014920639402000206","volume":"20","author":"R. Klimoski","year":"1994","unstructured":"Klimoski, R. and S. Mohammed (1994), \u201cTeam Mental Model: Construct or Metaphor?\u201d Journal of Management 20, 403\u2013437.","journal-title":"Journal of Management"},{"key":"5377_CR25","unstructured":"Klimt, B. and Y. Yang (2004, a), \u201cIntroducing the Enron Corpus,\u201d First Conference on Email and Anti-Spam (CEAS), Mountain View, CA. Retrieved October 14, 2004, from http:\/\/www.ceas.cc\/papers-2004\/168.pdf"},{"key":"5377_CR26","doi-asserted-by":"crossref","unstructured":"Klimt, B. and Y. Yang (2004, b), \u201cThe Enron Corpus: A New Dataset for Email Classification Research,\u201dEuropean Conference on Machine Learning, Pisa, Italy.","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"5377_CR27","unstructured":"Lehmann, M. (n.d.), \u201cString Similarity,\u201d Retrieved from http:\/\/search.cpan.org\/~mlehmann\/String-Similarity-1\/Similarity.pm."},{"key":"5377_CR28","unstructured":"Malin, Bradley (2005), \u201cUnsupervised Name Disambiguation via Social Network Similarity,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 93\u2013102."},{"key":"5377_CR29","unstructured":"McCallum, A., A. Corrada-Emmanuel, and X. Wang (2005), \u201cThe Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks, with Application to Enron and Academic Email,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining2005. Newport Beach, CA, April 2005, 33\u201344."},{"key":"5377_CR30","doi-asserted-by":"crossref","unstructured":"Meyers, E.W. (1986), \u201cAn O(ND) Difference Algorithm and its Variations,\u201d Algorithmica, 1(2).","DOI":"10.1007\/BF01840446"},{"key":"5377_CR31","unstructured":"MIP (2002), \u201cFortune Magazine's List of 10 Corporate Sins,\u201d Retrieved November 11, 2004, from http:\/\/www.mip-paris.com\/knowledge\/article.asp?id=132"},{"key":"5377_CR32","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195160369.001.0001","volume-title":"Theories of Communication Networks","author":"P.R. Monge","year":"2003","unstructured":"Monge, P.R. and N.S. Contractor (2003), Theories of Communication Networks. New York: Oxford University Press."},{"key":"5377_CR33","doi-asserted-by":"crossref","DOI":"10.4135\/9781849208741","volume-title":"Computer-assisted Text Analysis","author":"R. Popping","year":"2000","unstructured":"Popping, R. (2000). Computer-assisted Text Analysis. Thousand Oaks, CA: Sage Publications."},{"key":"5377_CR34","unstructured":"Powers, W.C. (2002), Report of Investigation, By the Special Investigative Committee of the Board of Directors of Enron Corp, Retrieved November 4, 2004, from http:\/\/news.findlaw.com\/hdocs\/docs\/enron\/sicreport\/sicreport020102.pdf"},{"key":"5377_CR35","doi-asserted-by":"crossref","unstructured":"Priebe, C.E., J.M. Conroy, D.J. Marchette, and Y. Park (2005), \u201cScan Statistics on Enron Graphs,\u201d Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA, April 2005, 23\u201332.","DOI":"10.1007\/s10588-005-5378-z"},{"key":"5377_CR36","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1037\/0033-2909.100.3.349","volume":"100","author":"W.B. Rouse","year":"1986","unstructured":"Rouse, W.B. and N.M. Morris (1986), \u201cOn Looking into the Black Box; Prospects and Limits in the Search for Mental Models,\u201d Psychological Bulletin, 100, 349\u2013363.","journal-title":"Psychological Bulletin"},{"key":"5377_CR37","unstructured":"Sanborn, R. (n.d.), Enron. Retrieved November 4, 2004, from http:\/\/www.hoylecpa.com\/cpe\/lesson001\/Lesson.htm"},{"key":"5377_CR38","volume-title":"Social Network Analysis","author":"J. Scott","year":"2000","unstructured":"Scott, J. (2000), Social Network Analysis. 2nd edition, London: Sage.","edition":"2nd edition"},{"key":"5377_CR39","unstructured":"SEC Spotlight on Enron. (n.d.), Retrieved November 4, 2004, from http:\/\/www.sec.gov\/spotlight\/enron.htm"},{"key":"5377_CR40","unstructured":"Watkins, S. (2002), e Mail to Enron Chairman Kenneth Lay, Retrieved November 2, 2004 from http:\/\/www.itmweb.com\/f012002.htm Sherron Watkins e Mail to Enron Chairman Kenneth Lay (2002), Retrieved November 11, 2004, from http:\/\/www.itmweb.com\/f012002.htm"},{"key":"5377_CR41","unstructured":"Shetty, J. and J. Adibi (n.d., a), \u201cEx employee status report,\u201d Retrieved November 4, 2004, from http:\/\/www.isi.edu\/~adibi\/Enron\/Enron_Employee_Status.xls"},{"key":"5377_CR42","unstructured":"Shetty, J. and J. Adibi (n.d., b), The Enron Dataset Database Schema and Brief Statistical Report,Retrieved November 4, 2004, from http:\/\/www.isi.edu\/~adibi\/Enron\/Enron_Dataset_Report.pdf"},{"key":"5377_CR43","unstructured":"SRI International, CALO (Cognitive Assistant that Learns and Organizes) (2004), Retrieved November 4,2004, from http:\/\/www.ai.sri.com\/project\/CALO"},{"key":"5377_CR44","doi-asserted-by":"crossref","unstructured":"Tsvetovat, M., J. Reminga, and K.M. Carley (2003), Dy Net ML: Interchange Format for Rich Social Network Data, CASOS Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International, URL:http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/isri2004\/abstracts\/04-105.html","DOI":"10.2139\/ssrn.2729286"},{"key":"5377_CR45","unstructured":"UC Berkeley (n.d), Enron Email Analysis Project. Retrieved from http:\/\/bailando.sims.berkeley.edu\/enron_email.html"},{"key":"5377_CR46","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/S0019-9958(85)80046-2","volume":"64","author":"E. Ukkonen","year":"1985","unstructured":"Ukkonen, E. (1985), \u201cAlgorithms for Approximate String Matching,\u201d Information and Control, 64,100\u2013118.","journal-title":"Information and Control"},{"key":"5377_CR47","unstructured":"United States District Court Southern District of Texas, Indictment (2002), Retrieved October 8, 2004, from http:\/\/news.findlaw.com\/hdocs\/docs\/enron\/usandersen030702ind.pdf"},{"key":"5377_CR48","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S. and K. Faust (1994), Social Network Analysis. New York: Cambridge University Press."}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-005-5377-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-005-5377-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-005-5377-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T16:11:59Z","timestamp":1626970319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-005-5377-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,10]]}},"alternative-id":["5377"],"URL":"https:\/\/doi.org\/10.1007\/s10588-005-5377-0","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10]]}}}