{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T20:46:06Z","timestamp":1648845966045},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T00:00:00Z","timestamp":1403136000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11227-014-1220-z","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T07:56:23Z","timestamp":1403164583000},"page":"2020-2034","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ICT use level and performance evaluation on the social network environment: Korea case study"],"prefix":"10.1007","volume":"71","author":[{"given":"Kyuhwan","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sungpyo","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Hangbae","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,19]]},"reference":[{"issue":"1","key":"1220_CR1","first-page":"33","volume":"3","author":"B Akuegwu","year":"2011","unstructured":"Akuegwu B, Ntukidem E, Ntukidem P, Jaja G (2011) Information and communications technology (ICT) facilities utilization for quality instructional service delivery among university lecturers in Nigeria. Rev High Educ Africa 3(1):33\u201353","journal-title":"Rev High Educ Africa"},{"key":"1220_CR2","doi-asserted-by":"crossref","unstructured":"Al-Mutairi MS, Mohammed LA (2011) Cases on ICT utilization, practice and solutions:tools for managing day-to-day issues. IGI Global","DOI":"10.4018\/978-1-60960-015-0"},{"issue":"3","key":"1220_CR3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/1961189.1961194","volume":"2","author":"F Bonchi","year":"2011","unstructured":"Bonchi F, Castillo C, Gionis A, Jaimes A (2011) Social network analysis and mining for business applications. ACM Trans Intell Syst Technol 2(3):22","journal-title":"ACM Trans Intell Syst Technol"},{"key":"1220_CR4","unstructured":"Deise MV, Wright A, Nowikow C (2000) Executive\u2019s guide to e-business: from tactics to strategy. Wiley, New York"},{"key":"1220_CR5","unstructured":"Dijst M (2009) ICT and social networks: towards a situational perspective on the interaction between corporeal and connected presence. The expanding sphere of travel behaviour research, pp 45\u201375"},{"key":"1220_CR6","doi-asserted-by":"crossref","unstructured":"Isari D, Pontiggia A, Virili F (2011) Working together in organizations using social network sites: a laboratory experiment on microblog use for problem-solving. Soc Sci Res Netw 1875924:1\u201326","DOI":"10.2139\/ssrn.1875924"},{"issue":"1","key":"1220_CR7","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11227-009-0323-4","volume":"54","author":"F Kawsar","year":"2010","unstructured":"Kawsar F, Nakajima T, Park JH, Yeo SS (2010) Design and implementation of a framework for building distributed smart object systems. J Supercomput 54(1):4\u201328","journal-title":"J Supercomput"},{"issue":"8","key":"1220_CR8","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1007\/s00779-012-0604-4","volume":"17","author":"SC Kim","year":"2013","unstructured":"Kim SC, Jeong YS, Park SO (2013) RFID-based indoor location tracking to ensure the safety of the elderly in smart home environments. Pers Ubiquitous Comput 17(8):1699\u20131707","journal-title":"Pers Ubiquitous Comput"},{"issue":"2","key":"1220_CR9","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.chb.2009.04.011","volume":"26","author":"O Kwon","year":"2010","unstructured":"Kwon O, Wen Y (2010) An empirical study of the factors affecting social network service use. Comput Hum Behav 26(2):254\u2013263","journal-title":"Comput Hum Behav"},{"key":"1220_CR10","unstructured":"Lau KH, Huang H (2013) Adoption and utilization of ICT in the Chinese third-party logistics industry. Manag Sci Logist Oper Res 13:221\u2013241"},{"key":"1220_CR11","unstructured":"Mohsen K, Eng T (2013) Enhancing inter functional coordination and marketing performance: utilization of the motivation\/ability\/opportunity framework. EBS Working Papers"},{"issue":"6","key":"1220_CR12","first-page":"75","volume":"73","author":"JF Rayport","year":"1995","unstructured":"Rayport JF, Sviokla JJ (1995) Exploiting the virtual value chain. Harv Bus Rev 73(6):75\u201385","journal-title":"Harv Bus Rev"},{"key":"1220_CR13","unstructured":"Scupola A, Tuunainen V (2011) Open innovation and role of ICT in business-to-business services: empirical evidence from facility management services"},{"issue":"1","key":"1220_CR14","first-page":"83","volume":"13","author":"S Tomic Rotim","year":"2013","unstructured":"Tomic Rotim S, Dobsa J, Krakar Z (2013) Using decision trees for identification of most relevant indicators for effective ICT utilization. Cybern Inf Technol 13(1):83\u201394","journal-title":"Cybern Inf Technol"},{"key":"1220_CR15","first-page":"73","volume":"35","author":"N Venkatraman","year":"1994","unstructured":"Venkatraman N (1994) IT-enabled business transformation: from automation to business scope redefinition. Sloan Manag Rev 35:73\u201373","journal-title":"Sloan Manag Rev"},{"issue":"1","key":"1220_CR16","doi-asserted-by":"crossref","first-page":"255","DOI":"10.18848\/1447-9524\/CGP\/v08i01\/50481","volume":"8","author":"S Yamamoto","year":"2008","unstructured":"Yamamoto S, Kanbe M (2008) Knowledge creation by enterprise SNS. Int J Knowl Cult Change Manag 8(1):255\u2013264","journal-title":"Int J Knowl Cult Change Manag"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1220-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1220-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1220-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:40:34Z","timestamp":1559385634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1220-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,19]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["1220"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1220-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,19]]}}}