{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:16:26Z","timestamp":1759961786215,"version":"3.37.3"},"reference-count":46,"publisher":"Informa UK Limited","issue":"2","funder":[{"DOI":"10.13039\/100011102","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["FP7-IP- 608142"],"award-info":[{"award-number":["FP7-IP- 608142"]}],"id":[{"id":"10.13039\/100011102","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,2,1]]},"DOI":"10.1080\/0144929x.2018.1519036","type":"journal-article","created":{"date-parts":[[2018,9,11]],"date-time":"2018-09-11T16:33:21Z","timestamp":1536683601000},"page":"198-215","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Sense-making strategies in explorative intelligence analysis of network evolutions"],"prefix":"10.1080","volume":"38","author":[{"given":"Johanna","family":"Doppler Haider","sequence":"first","affiliation":[{"name":"Institute of Visual Computing and Human-Centered Technology, Vienna University of Technology, Vienna, Austria"}]},{"given":"Bettina","family":"Gastecker","sequence":"additional","affiliation":[{"name":"Institute of Visual Computing and Human-Centered Technology, Vienna University of Technology, Vienna, Austria"}]},{"given":"Margit","family":"Pohl","sequence":"additional","affiliation":[{"name":"Institute of Visual Computing and Human-Centered Technology, Vienna University of Technology, Vienna, Austria"}]},{"given":"Patrick","family":"Seidler","sequence":"additional","affiliation":[{"name":"Computer Science, Middlesex University London, London, UK"}]},{"given":"Neesha","family":"Kodagoda","sequence":"additional","affiliation":[{"name":"Computer Science, Middlesex University London, London, UK"}]},{"given":"B. L. William","family":"Wong","sequence":"additional","affiliation":[{"name":"Computer Science, Middlesex University London, London, UK"}]}],"member":"301","published-online":{"date-parts":[[2018,9,11]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89900-6_4"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470724"},{"volume-title":"Multivariate Network Visualization: Dagstuhl Seminar #13201","year":"2014","author":"Archambault Daniel","key":"CIT0003"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12615"},{"key":"CIT0005","first-page":"83","volume-title":"EuroVis \u2013 STARs","author":"Beck Fabian","year":"2014"},{"volume-title":"Proceedings of the 6th International Conference on Information Visualization Theory and Applications","year":"2015","author":"Burch Michael","key":"CIT0006"},{"key":"CIT0007","unstructured":"Doppler Haider, Johanna, Isabel Dallinger, Margit Pohl, Patrick Seidler, Neesha Kodagoda, and B.\u00a0L.\u00a0William Wong. 2019. \u201cSensemaking Strategies vs. Quality of Insights: Investigating Analysis Processes of Multiple Tiles\u201d. Manuscript submitted for publication."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213601532"},{"key":"CIT0009","unstructured":"Felson, Marcus. 2006.The Ecosystem for Organized Crime. HEUNI Paper No. 26. Helsinki: European Institute for Crime Prevention and Control, affiliated with the United Nations."},{"volume-title":"10th IEEE Symposium on Information Visualization","year":"2004","author":"Ghoniem Mohammad","key":"CIT0010"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591053"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1179\/000870403235002042"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.160"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74800-7_24"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70582"},{"key":"CIT0016","volume-title":"Structured Analytic Techniques for Intelligence Analysis","author":"Heuer Richards J.","year":"2014","edition":"2"},{"volume-title":"Educating Intuition","year":"2001","author":"Hogarth Robin M.","key":"CIT0017"},{"key":"CIT0018","volume-title":"International Police Executive Symposium","volume":"39","author":"Johnson Jennifer A.","year":"2011"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500116"},{"volume-title":"Third\u00a0International Conference on Privacy, Security, Risk and Tust (PASSAT)\/ Social Computing (SocialCom)","year":"2011","author":"Khurana Udayan","key":"CIT0020"},{"volume-title":"Seeing What Others Don\u2019t \u2013 The Remarkable Ways We Gain Insights","year":"2013","author":"Klein Gary.","key":"CIT0021"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.75"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.100"},{"key":"CIT0024","first-page":"113","volume-title":"Expertise out of Context: Proceedings of the Sixth International Conference on Naturalistic Decision Making","author":"Klein Gary","year":"2007"},{"volume-title":"IEEE Conference on Visual Analytics Science and Technology (VAST)","year":"2014","author":"Ko Sungahnn","key":"CIT0025"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1177\/1555343416672782"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7485-2_8"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2001.963274"},{"volume-title":"Proceedings of International Conference on Intelligence Analysis","year":"2005","author":"Pirolli Peter","key":"CIT0029"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.07.006"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1145\/2669557.2669575"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-839X.2007.00240.x"},{"key":"CIT0033","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/VISSOFT.2014.30","volume-title":"2014 second IEEE working conference on software visualization (VISSOFT)","author":"Rufiange S\u00e9bastien","year":"2014"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2005.53"},{"key":"CIT0035","doi-asserted-by":"crossref","DOI":"10.4135\/9781529682571","volume-title":"Qualitative Content Analysis in Practice","author":"Schreier Margrit.","year":"2012"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00055"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.3390\/informatics3040020"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2005.02.002"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.179"},{"volume-title":"2016 European Intelligence and Security Informatics Conference (EISIC)","year":"2016","author":"Seidler Patrick","key":"CIT0040"},{"key":"CIT0041","unstructured":"UK: National Policing Improvement Agency on behalf of the Association of Chief Police Officers. 2008.Practice Advice on Analysis."},{"volume-title":"IEEE Pacific Visualization Symposium","year":"2015","author":"Wakita Ken","key":"CIT0042"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2010.516722"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.02.001"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1519036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T05:37:23Z","timestamp":1720589843000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1519036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,11]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2,1]]}},"alternative-id":["10.1080\/0144929X.2018.1519036"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1519036","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2018,9,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-04-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}