{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T23:16:26Z","timestamp":1772234186078,"version":"3.50.1"},"reference-count":56,"publisher":"Informa UK Limited","issue":"9","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,9,2]]},"DOI":"10.1080\/0144929x.2019.1625440","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T08:14:26Z","timestamp":1559895266000},"page":"986-1001","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":37,"title":["Sentiment mining in a collaborative learning environment: capitalising on big data"],"prefix":"10.1080","volume":"38","author":[{"given":"R. K.","family":"Jena","sequence":"first","affiliation":[{"name":"Institute of Management Technology, Nagpur, India"}]}],"member":"301","published-online":{"date-parts":[[2019,6,7]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1287\/opre.45.2.226"},{"key":"CIT0003","author":"Agnihotri R.","year":"2015","journal-title":"Industrial Marketing Management"},{"key":"CIT0004","first-page":"1","volume":"58","author":"Alaei Ali Reza","year":"2017","journal-title":"Journal of Travel Research"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.4172\/2151-6219.1000337"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2013.03.002"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-014-0549-4"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.12.033"},{"issue":"8","key":"CIT0011","first-page":"117","volume":"9","author":"Bhargavi P.","year":"2009","journal-title":"International Journal of Computer Science and Network Security"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.05.016"},{"issue":"2","key":"CIT0014","first-page":"3","volume":"13","author":"Calders Toon","year":"2012","journal-title":"Association for Computing Machinery\u2019s Special Interest Group on Knowledge Discovery and Data Mining"},{"key":"CIT0016","first-page":"1471","volume":"11","author":"Chang Yin-Wen","year":"2010","journal-title":"Journal of Machine Learning Research"},{"issue":"3","key":"CIT0017","first-page":"246","volume":"7","author":"chen X.","year":"2014","journal-title":"Ieeexplore Ieee Org"},{"key":"CIT0019","first-page":"653","volume":"10","author":"Cummins S.","year":"2010","journal-title":"Advanced Learning Technologies (ICALT)"},{"issue":"8","key":"CIT0024","first-page":"7431","volume":"3","author":"Dhawan Sanjeev","year":"2004","journal-title":"International Journal of Engineering and Computer Science"},{"issue":"4","key":"CIT0025","first-page":"23","volume":"2","author":"D\u2019mello Sidney","year":"2012","journal-title":"ACM Transactions on Interactive Intelligent Systems (TiiS)"},{"key":"CIT0027","first-page":"1233","volume":"3","author":"Fulse S.","year":"2014","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"CIT0030","first-page":"182","volume":"13","author":"Gokulakrishnan B.","year":"2012","journal-title":"Advances in Information and Communications Technology for Emerging Regions"},{"key":"CIT0031","first-page":"117","volume":"158","author":"Graesser Arthur","year":"2007","journal-title":"Frontiers in Artificial Intelligence and Application"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1007\/11774303_52"},{"issue":"11","key":"CIT0034","first-page":"477","volume":"6","author":"Hamzah Amir.","year":"2017","journal-title":"International Journal of Engineering Research & Technology"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.ausmj.2014.11.001"},{"issue":"11","key":"CIT0036","volume":"23","author":"Hasan Ali","year":"2018","journal-title":"Mathematical and Computational Applications"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.04.006"},{"key":"CIT0039","first-page":"3","volume":"2","author":"Inkpen Diana","year":"2009","journal-title":"Knowledge Engineering: Principle and Technique"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1186\/s40165-014-0010-2"},{"key":"CIT0041","first-page":"1032","volume":"6","author":"Kechaou Zied","year":"2011","journal-title":"Global Engineering Education Conference"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-06-2015-0238"},{"issue":"3","key":"CIT0045","first-page":"372","volume":"9","author":"Kumar Akshi","year":"2012","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2013.09.008"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2014.04.011"},{"key":"CIT0054","first-page":"271","volume":"1","author":"Mouthami K.","year":"2013","journal-title":"Information Communication and Embedded Systems (ICICES"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2014.2317187"},{"key":"CIT0058","first-page":"149","volume":"6","author":"Nirmal V. J.","year":"2015","journal-title":"International Journal of Fuzzy Mathematical Archive"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.05.024"},{"key":"CIT0062","first-page":"271","volume":"42","author":"Pang Bo","year":"2004","journal-title":"Annual Meeting on Association for Computational Linguistics"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1007\/s10015-016-0283-8"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1080\/02602930601127869"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.5120\/10489-5242"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.133"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.059"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.06.015"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.040"},{"key":"CIT0076","first-page":"398","volume-title":"New Trends in Software Methodologies, Tools and Techniques","author":"Sharef N. M.","year":"2014"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851311"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1080\/00986280701700391"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21416"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.10.019"},{"key":"CIT0084","first-page":"1","volume":"4","author":"Troussas C.","year":"2013","journal-title":"Information, Intelligence Systems and Applications"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1145\/944012.944013"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1016\/j.stueduc.2016.08.007"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.3390\/su10061921"},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-005-7880-9"},{"key":"CIT0095","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.003"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.075"},{"key":"CIT0099","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0191163"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2019.1625440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T01:18:18Z","timestamp":1566263898000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2019.1625440"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,7]]},"references-count":56,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,3,27]]},"published-print":{"date-parts":[[2019,9,2]]}},"alternative-id":["10.1080\/0144929X.2019.1625440"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2019.1625440","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,7]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-02-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}