{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:45:21Z","timestamp":1772304321458,"version":"3.50.1"},"reference-count":37,"publisher":"Informa UK Limited","issue":"7","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71471008"],"award-info":[{"award-number":["71471008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2018,8,9]]},"DOI":"10.1080\/17517575.2017.1293300","type":"journal-article","created":{"date-parts":[[2017,2,18]],"date-time":"2017-02-18T03:33:10Z","timestamp":1487388790000},"page":"888-909","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":20,"title":["Research on emergency dissemination models for social media based on information entropy"],"prefix":"10.1080","volume":"12","author":[{"given":"Siqing","family":"Shan","sequence":"first","affiliation":[{"name":"Department of Information System, School of Economics and Management, Beihang University, Beijing, China"}]},{"given":"Xiao","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Information System, School of Economics and Management, Beihang University, Beijing, China"}]}],"member":"301","published-online":{"date-parts":[[2017,2,18]]},"reference":[{"key":"CIT0001","author":"Adrien G.","year":"2013","journal-title":"arXiv:1302.5235v2, ERIC Laboratory Report RI-ERIC-13\/001, 1 Mar 2013"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1501158"},{"key":"CIT0003","volume-title":"Elements of Information Theory","author":"Cover T. M.","year":"2012"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.001"},{"issue":"1","key":"CIT0005","first-page":"27","volume":"27","author":"Deanne B.","year":"2012","journal-title":"The Australian Journal of Emergency Management"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1002\/nav.v58.6"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1111\/insr.2010.78.issue-3"},{"issue":"3","key":"CIT0008","first-page":"178","volume":"9","author":"Fiona D.","year":"2004","journal-title":"Information Research"},{"key":"CIT0009","first-page":"7","volume":"12","author":"Fu Y.","year":"2007","journal-title":"Journal of Intelligence"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.5210\/ojphi.v5i1.4543"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187906"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.04.008"},{"issue":"2","key":"CIT0013","first-page":"160","volume":"19","author":"Hong H.","year":"2009","journal-title":"China Safety Science Journal"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.087"},{"issue":"1","key":"CIT0016","first-page":"189","volume":"37","author":"Li D.","year":"2014","journal-title":"Chinese Journal of Computers"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.4018\/IJISCRAM"},{"key":"CIT0019","first-page":"75","volume":"6","author":"Liu C. L.","year":"2012","journal-title":"Information Studies\uff1aTheory and Application"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9488(2007)133:1(43)"},{"key":"CIT0021","volume-title":"Big Data: The Next Frontier For Innovation, Competition, and Productivity","author":"Manyika J.","year":"2011"},{"key":"CIT0022","volume-title":"Emergency Dissemination Rule Modeling Research Which Based on the Virtual Community","author":"Mao Z.","year":"2013"},{"issue":"1","key":"CIT0023","first-page":"20","volume":"27","author":"Mel T.","year":"2012","journal-title":"The Australian Journal of Emergency Management"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.3390\/e17063989"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.09.014"},{"issue":"1","key":"CIT0026","first-page":"40","volume":"27","author":"Neil D.","year":"2012","journal-title":"The Australian Journal of Emergency Management"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.6.1248-1254"},{"issue":"2","key":"CIT0029","first-page":"275","volume":"40","author":"Qiu Y. F.","year":"2014","journal-title":"Computer Engineering"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290408"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.04.022"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.347-350"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2013.4527"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.tecto.2011.05.001"},{"key":"CIT0036","first-page":"151","volume":"17","author":"Yan Q.","year":"2007","journal-title":"Chinese Journal of Management Science"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.001"},{"key":"CIT0038","unstructured":"Ying, T., 2011. \u201cResearch on Water Pollution Incidents Effective Dissemination of Three Gorges Dam Area\u201d, Huazhong University of Science and Technology, Master Thesis, Wuhan China."},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-6672(10)60134-1"},{"key":"CIT0040","doi-asserted-by":"crossref","unstructured":"Zachary, T. F. 2015. \u201cAgnotology and Information.\u201d Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community, November 6\u201310, 2015, St. Louis, MO, USA. doi:10.1002\/pra2.2015.1450520100123","DOI":"10.1002\/pra2.2015.1450520100123"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/573014"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2017.1293300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,6]],"date-time":"2018-08-06T15:50:14Z","timestamp":1533570614000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2017.1293300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,18]]},"references-count":37,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,8,3]]},"published-print":{"date-parts":[[2018,8,9]]}},"alternative-id":["10.1080\/17517575.2017.1293300"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2017.1293300","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}