{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T01:46:30Z","timestamp":1770083190747,"version":"3.49.0"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2017-03948"],"award-info":[{"award-number":["RGPIN-2017-03948"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10664-019-09721-w","type":"journal-article","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T16:18:58Z","timestamp":1558541938000},"page":"3755-3789","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["ESSMArT way to manage customer requests"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2243-5721","authenticated-orcid":false,"given":"Maleknaz","family":"Nayebi","sequence":"first","affiliation":[]},{"given":"Liam","family":"Dicke","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Ittyipe","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Carlson","sequence":"additional","affiliation":[]},{"given":"Guenther","family":"Ruhe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,21]]},"reference":[{"key":"9721_CR1","doi-asserted-by":"crossref","unstructured":"Allahyari M, Pouriyeh S, Assefi M, Safaei S, Trippe ED, Gutierrez JB, Kochut K (2017) Text summarization techniques: a brief survey. arXiv preprint arXiv:1707.02268","DOI":"10.14569\/IJACSA.2017.081052"},{"key":"9721_CR2","first-page":"26","volume-title":"Evaluating an assistant for creating bug report assignment recommenders","author":"J Anvik","year":"2016","unstructured":"Anvik J (2016) Evaluating an assistant for creating bug report assignment recommenders, vol 1705, pp 26\u201339"},{"key":"9721_CR3","unstructured":"Anvik J, Hiew L, Murphy GC (2006) Who should fix this bug? In: Proceedings of the 28th international conference on Software engineering. ACM, pp 361\u2013370"},{"key":"9721_CR4","doi-asserted-by":"crossref","unstructured":"Auffarth B, L\u00f3pez M, Cerquides J (2010) Comparison of redundancy and relevance measures for feature selection in tissue classification of ct images. In: Industrial conference on data mining. Springer, pp 248\u2013262","DOI":"10.1007\/978-3-642-14400-4_20"},{"key":"9721_CR5","unstructured":"Bandera H, Bell DA, Little AD, York BB (2018) Increasing efficiency and effectiveness of support engineers in resolving problem tickets, Apr. 19 2018. US Patent App. 15\/293,988"},{"key":"9721_CR6","first-page":"1208","volume-title":"IJCAI","author":"S Banerjee","year":"2015","unstructured":"Banerjee S, Mitra P, Sugiyama K (2015) Multi-document abstractive summarization using ilp based multi-sentence compression. In: IJCAI, pp 1208\u20131214"},{"key":"9721_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/2682571.2797081","volume-title":"Proceedings of the 2015 ACM Symposium on Document Engineering, DocEng \u201815","author":"J Batista","year":"2015","unstructured":"Batista J, Ferreira R, Tomaz H, Ferreira R, Dueire Lins R, Simske S, Silva G, Riss M (2015) A quantitative and qualitative assessment of automatic text summarization systems. In: Proceedings of the 2015 ACM Symposium on Document Engineering, DocEng \u201815. ACM, New York, pp 65\u201368"},{"key":"9721_CR8","volume-title":"Workshop on predictive software models (PSM 2004), A STEP Software Technology & Engineering Practice","author":"T Bruckhaus","year":"2004","unstructured":"Bruckhaus T, Ling CX, Madhavji NH, Sheng S (2004) Software escalation prediction with data mining. In: Workshop on predictive software models (PSM 2004), A STEP Software Technology & Engineering Practice"},{"key":"9721_CR9","doi-asserted-by":"crossref","unstructured":"Carenini G, Ng RT, Zhou X (2007) Summarizing email conversations with clue words. In: Proceedings of the 16th international conference on world wide web. ACM, pp 91\u2013100","DOI":"10.1145\/1242572.1242586"},{"key":"9721_CR10","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jss.2015.10.011","volume":"112","author":"N Cerpa","year":"2016","unstructured":"Cerpa N, Bardeen M, Astudillo CA, Verner J (2016) Evaluating different families of prediction methods for estimating software project outcomes. J Syst Softw 112:48\u201364","journal-title":"J Syst Softw"},{"key":"9721_CR11","first-page":"192","volume":"4","author":"Das","year":"2007","unstructured":"Das, Martins AF (2007) A survey on automatic text summarization. Literature Survey for the Language and Statistics II course at CMU 4:192\u2013195","journal-title":"Literature Survey for the Language and Statistics II course at CMU"},{"key":"9721_CR12","volume-title":"Empirical Software Engineering and Measurement, 2009. ESEM 2009. 3rd International Symposium on, pages 56\u201368. IEEE","author":"Du","year":"2009","unstructured":"Du, Ruhe G (2009) Does explanation improve the acceptance of decision support for product release planning? In: Empirical Software Engineering and Measurement, 2009. ESEM 2009. 3rd International Symposium on, pages 56\u201368. IEEE"},{"issue":"2","key":"9721_CR13","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/321510.321519","volume":"16","author":"P Edmundson","year":"1969","unstructured":"Edmundson P (1969) New methods in automatic extracting. Journal of the ACM (JACM) 16(2):264\u2013285","journal-title":"Journal of the ACM (JACM)"},{"issue":"4","key":"9721_CR14","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSMCC.2011.2161285","volume":"42","author":"M Galar","year":"2012","unstructured":"Galar M, Fernandez A, Barrenechea E, Bustince H, Herrera F (2012) A review on ensem- bles for the class imbalance problem: bagging-, boosting-, and hybrid-based approaches. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Re- views) 42(4):463\u2013484","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Re- views)"},{"issue":"1","key":"9721_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-016-9475-9","volume":"47","author":"M Gambhir","year":"2017","unstructured":"Gambhir M, Gupta V (Jan 2017) Recent automatic text summarization techniques: a survey. Artif Intell Rev 47(1):1\u201366","journal-title":"Artif Intell Rev"},{"issue":"3","key":"9721_CR16","doi-asserted-by":"publisher","first-page":"258","DOI":"10.4304\/jetwi.2.3.258-268","volume":"2","author":"V Gupta","year":"2010","unstructured":"Gupta V, Lehal GS (2010) A survey of text summarization extractive techniques. Journal of emerging technologies in web intelligence 2(3):258\u2013268","journal-title":"Journal of emerging technologies in web intelligence"},{"issue":"4","key":"9721_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst MA, Dumais ST, Osuna E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intelligent Systems and their applications 13(4):18\u201328","journal-title":"IEEE Intelligent Systems and their applications"},{"key":"9721_CR18","unstructured":"Hyv\u00e4rinen JK, Oja E (2004) Independent component analysis, vol 46. Wiley"},{"key":"9721_CR19","doi-asserted-by":"crossref","unstructured":"Jha N, Mahmoud A (2018) Using frame semantics for classifying and summarizing application store reviews. Empir Softw Eng:1\u201334","DOI":"10.1007\/s10664-018-9605-x"},{"issue":"4","key":"9721_CR20","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1007\/s10664-015-9401-9","volume":"21","author":"L Jonsson","year":"2016","unstructured":"Jonsson L, Borg M, Broman D, Sandahl K, Eldh S, Runeson P (2016) Automated bug assignment: ensemble-based machine learning in large scale industrial contexts. Empir Softw Eng 21(4):1533\u20131578","journal-title":"Empir Softw Eng"},{"key":"9721_CR21","doi-asserted-by":"crossref","unstructured":"Kabeer SJ, Nayebi M, Ruhe G, Carlson C, Chew F (2017) Predicting the vector impact of change-an industrial case study at brightsquid. In: Empirical software engineering and measurement (ESEM), 2017 ACM\/IEEE international symposium on. IEEE, pp 131\u2013140","DOI":"10.1109\/ESEM.2017.20"},{"key":"9721_CR22","unstructured":"Kim S, Ernst MD (2007) Which warnings should i fix first? In: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. ACM, pp 45\u201354"},{"key":"9721_CR23","unstructured":"Kitchenham BA, Pfleeger SL (2008) Personal opinion surveys. In: Guide to advanced empirical software engineering. Springer, pp 63\u201392"},{"key":"9721_CR24","doi-asserted-by":"crossref","unstructured":"Lemberger PP, Morel M (2013) Managing complexity of information systems: the value of simplicity. Wiley","DOI":"10.1002\/9781118562017"},{"issue":"3","key":"9721_CR25","first-page":"18","volume":"2","author":"MW Liaw","year":"2002","unstructured":"Liaw MW et al (2002) Classification and regression by randomforest. R news 2(3):18\u201322","journal-title":"R news"},{"key":"9721_CR26","unstructured":"Lin C-Y (2004) Rouge: a package for automatic evaluation of summaries. Text Summarization Branches Out"},{"key":"9721_CR27","unstructured":"Ling CX, Sheng S, Bruckhaus T, Madhavji NH (2005) Predicting software escalations with maximum roi. In: Data Mining, Fifth IEEE International Conference on. IEEE, p 4"},{"issue":"1","key":"9721_CR28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MS.2015.153","volume":"33","author":"W Maalej","year":"2016","unstructured":"Maalej W, Nayebi M, Johann T, Ruhe G (2016) Toward data-driven requirements engi- neering. Software, IEEE 33(1):48\u201354","journal-title":"Software, IEEE"},{"key":"9721_CR29","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.asoc.2014.11.023","volume":"27","author":"R Malhotra","year":"2015","unstructured":"Malhotra R (2015) A systematic review of machine learning techniques for software fault pre- diction. Appl Soft Comput 27:504\u2013518","journal-title":"Appl Soft Comput"},{"key":"9721_CR30","doi-asserted-by":"crossref","unstructured":"Mani S, Catherine R, Sinha VS, Dubey A (2012) Ausum: approach for unsupervised bug report summarization. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering. ACM, p 11","DOI":"10.1145\/2393596.2393607"},{"key":"9721_CR31","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3115\/v1\/P14-5010","volume-title":"Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations","author":"C Manning","year":"2014","unstructured":"Manning C, Surdeanu M, Bauer J, Finkel J, Bethard S, McClosky D (2014) The Stanford corenlp natural language processing toolkit. In: Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations, pp 55\u201360"},{"issue":"9","key":"9721_CR32","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1109\/TSE.2016.2630689","volume":"43","author":"W Martin","year":"2017","unstructured":"Martin W, Sarro F, Jia Y, Zhang Y, Harman M (2017) A survey of app store analysis for software engineering. IEEE Trans Softw Eng 43(9):817\u2013847","journal-title":"IEEE Trans Softw Eng"},{"key":"9721_CR33","doi-asserted-by":"crossref","unstructured":"Menzies T, Bird C, Zimmermann T, Schulte W, Kocaganeli E (2011) The inductive software engineering manifesto: principles for industrial data mining. In: Proceedings of the international workshop on machine learning Technologies in Software Engineering. ACM, pp 19\u201326","DOI":"10.1145\/2070821.2070824"},{"key":"9721_CR34","volume-title":"Proceedings of the 2004 conference on empirical methods in natural language processing","author":"R Mihalcea","year":"2004","unstructured":"Mihalcea R, Tarau P (2004) Textrank: bringing order into text. In: Proceedings of the 2004 conference on empirical methods in natural language processing"},{"key":"9721_CR35","doi-asserted-by":"crossref","unstructured":"Mohit B (2014) Named entity recognition. In: Natural language processing of semitic languages. Springer, pp 221\u2013245","DOI":"10.1007\/978-3-642-45358-8_7"},{"key":"9721_CR36","doi-asserted-by":"crossref","unstructured":"Montgomery L, Damian D (2017) What do support analysts know about their customers? On the study and prediction of support ticket escalations in large software organizations. In: Requirements engineering conference (RE), 2017 IEEE 25th international. IEEE, pp 362\u2013371","DOI":"10.1109\/RE.2017.61"},{"key":"9721_CR37","doi-asserted-by":"crossref","unstructured":"Montgomery L, Reading E, Damian D (2017) Ecrits\u2014visualizing support ticket escalation risk. In: Requirements engineering conference (RE), 2017 IEEE 25th international. IEEE, pp 452\u2013455","DOI":"10.1109\/RE.2017.62"},{"key":"9721_CR38","doi-asserted-by":"crossref","unstructured":"Moreno L, Bavota G, Di Penta M, Oliveto R, Marcus A, Canfora G (2014) Automatic generation of release notes. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering. ACM, pp 484\u2013495","DOI":"10.1145\/2635868.2635870"},{"key":"9721_CR39","doi-asserted-by":"crossref","unstructured":"Murray, Carenini G (2008) Summarizing spoken and written conversations. In: Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, pp 773\u2013782","DOI":"10.3115\/1613715.1613813"},{"key":"9721_CR40","doi-asserted-by":"crossref","unstructured":"Nayebi M, Ruhe G (2014) Analytical open innovation for value-optimized service portfolio planning. In: International conference of software business. Springer, pp 273\u2013288","DOI":"10.1007\/978-3-319-08738-2_19"},{"key":"9721_CR41","unstructured":"Nayebi M, Ruhe G, Mota RC, Mufti M (2015) Analytics for software project management\u2013where are we and where do we go? In: Automated Software Engineering Workshop (ASEW), 2015 30th IEEE\/ACM International Conference on. IEEE, pp 18\u201321"},{"key":"9721_CR42","doi-asserted-by":"crossref","unstructured":"Nayebi M, Marbouti M, Quapp R, Maurer F, Ruhe G (2017) Crowdsourced exploration of mobile app features: a case study of the fort mcmurray wildfire. In: Proceedings of the 39th international conference on software engineering: software engineering in society track. IEEE Press, pp 57\u201366","DOI":"10.1109\/ICSE-SEIS.2017.8"},{"key":"9721_CR43","doi-asserted-by":"crossref","unstructured":"Nayebi M, Kabeer S, Ruhe G, Carlson C, Chew F (2018) Hybrid labels are the new measure!. IEEE Software, 35(1):54\u201357.","DOI":"10.1109\/MS.2017.4541048"},{"issue":"5","key":"9721_CR44","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11390-016-1671-1","volume":"31","author":"N Nazar","year":"2016","unstructured":"Nazar N, Hu Y, Jiang H (2016) Summarizing software artifacts: a literature review. J Comput Sci Technol 31(5):883\u2013909","journal-title":"J Comput Sci Technol"},{"issue":"8","key":"9721_CR45","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"FL Peng","year":"2005","unstructured":"Peng FL, Ding C (2005) Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans Pattern Anal Mach Intell 27(8):1226\u20131238","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9721_CR46","first-page":"133","volume-title":"Proceed- ings of the first instructional conference on machine learning","author":"Ramos","year":"2003","unstructured":"Ramos et al (2003) Using tf-idf to determine word relevance in document queries. In: Proceed- ings of the first instructional conference on machine learning, vol 242, pp 133\u2013142"},{"key":"9721_CR47","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1145\/1806799.1806872","volume-title":"Proceedings of the 32Nd ACM\/IEEE International Conference on Software Engineering - Volume 1, ICSE \u201810","author":"S Rastkar","year":"2010","unstructured":"Rastkar S, Murphy GC, Murray G (2010) Summarizing software artifacts: a case study of bug reports. In: Proceedings of the 32Nd ACM\/IEEE International Conference on Software Engineering - Volume 1, ICSE \u201810. ACM, New York, pp 505\u2013514"},{"issue":"4","key":"9721_CR48","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TSE.2013.2297712","volume":"40","author":"S Rastkar","year":"2014","unstructured":"Rastkar S, Murphy GC, Murray G (2014) Automatic summarization of bug reports. IEEE Trans Softw Eng 40(4):366\u2013380","journal-title":"IEEE Trans Softw Eng"},{"key":"9721_CR49","first-page":"41","volume-title":"IJCAI 2001 workshop on empirical methods in artificial intelligence","author":"Rish","year":"2001","unstructured":"Rish et al (2001) An empirical study of the naive bayes classifier. In: IJCAI 2001 workshop on empirical methods in artificial intelligence, vol 3. IBM, New York, pp 41\u201346"},{"key":"9721_CR50","doi-asserted-by":"crossref","unstructured":"Robillard MP, Maalej W, Walker RJ, Zimmermann T (2014) Recommendation systems in software engineering. Springer Science & Business","DOI":"10.1007\/978-3-642-45135-5"},{"issue":"1","key":"9721_CR51","first-page":"97","volume":"24","author":"H Sch\u00fctze","year":"1998","unstructured":"Sch\u00fctze H (1998) Automatic word sense discrimination. Computational linguistics 24(1):97\u2013123","journal-title":"Computational linguistics"},{"key":"9721_CR52","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.knosys.2014.04.033","volume":"66","author":"VS Sheng","year":"2014","unstructured":"Sheng VS, Gu B, Fang W, Wu J (2014) Cost-sensitive learning for defect escalation. Knowl-Based Syst 66:146\u2013155","journal-title":"Knowl-Based Syst"},{"key":"9721_CR53","unstructured":"Singhal S, Bhattacharya A (2019) Abstractive text summarization. home.iitk.ac.in\/~soumye\/cs498a\/report.pdf"},{"key":"9721_CR54","doi-asserted-by":"crossref","unstructured":"Sorbo D, Panichella S, Alexandru CV, Shimagaki J, Visaggio CA, Canfora G, Gall HC (2016) What would users change in my app? Summarizing app reviews for recom- mending software changes. In: Proceedings of the 2016 24th ACM SIGSOFT international symposium on foundations of software engineering. ACM, pp 499\u2013510","DOI":"10.1145\/2950290.2950299"},{"key":"9721_CR55","first-page":"93","volume-title":"Proc. ISIM","author":"Steinberger","year":"2004","unstructured":"Steinberger, Jezek K (2004) Using latent semantic analysis in text summarization and summary evaluation. In: Proc. ISIM, vol 4, pp 93\u2013100"},{"issue":"6","key":"9721_CR56","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1016\/j.ipm.2007.01.023","volume":"43","author":"HS Vanderwende","year":"2007","unstructured":"Vanderwende HS, Brockett C, Nenkova A (2007) Beyond sumbasic: task-focused summarization with sentence simplification and lexical expansion. Inf Process Manag 43(6):1606\u20131618","journal-title":"Inf Process Manag"},{"key":"9721_CR57","doi-asserted-by":"crossref","unstructured":"Wallach HM (2006) Topic modeling: beyond bag-of-words. In: Proceedings of the 23rd inter- national conference on machine learning. ACM, pp 977\u2013984","DOI":"10.1145\/1143844.1143967"},{"key":"9721_CR58","doi-asserted-by":"crossref","unstructured":"Williams G, Mahmoud A (2017) Mining twitter feeds for software user requirements. In: Requirements engineering conference (RE), 2017 IEEE 25th International. IEEE, pp 1\u201310","DOI":"10.1109\/RE.2017.14"},{"issue":"1\u20133","key":"9721_CR59","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold S, Esbensen K, Geladi P (1987) Principal component analysis. Chemom Intell Lab Syst 2(1\u20133):37\u201352","journal-title":"Chemom Intell Lab Syst"},{"issue":"2","key":"9721_CR60","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert DH (1992) Stacked generalization. Neural Netw 5(2):241\u2013259","journal-title":"Neural Netw"},{"issue":"3","key":"9721_CR61","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/TSE.2016.2576454","volume":"43","author":"X Xia","year":"2017","unstructured":"Xia X, Lo D, Ding Y, Al-Kofahi JM, Nguyen TN, Wang X (2017) Improving automated bug triaging with specialized topic model. IEEE Trans Softw Eng 43(3):272\u2013297","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9721_CR62","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCI.2018.2840738","volume":"13","author":"T Young","year":"2018","unstructured":"Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intell Mag 13(3):55\u201375","journal-title":"IEEE Comput Intell Mag"},{"issue":"Oct","key":"9721_CR63","first-page":"1205","volume":"5","author":"Yu","year":"2004","unstructured":"Yu, Liu H (2004) Efficient feature selection via analysis of relevance and redundancy. J Mach Learn Res 5(Oct):1205\u20131224","journal-title":"J Mach Learn Res"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09721-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-019-09721-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09721-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T12:15:18Z","timestamp":1663503318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-019-09721-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,21]]},"references-count":63,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9721"],"URL":"https:\/\/doi.org\/10.1007\/s10664-019-09721-w","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,21]]},"assertion":[{"value":"21 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}