{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T12:30:40Z","timestamp":1772713840078,"version":"3.50.1"},"reference-count":50,"publisher":"Informa UK Limited","issue":"10","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71901083"],"award-info":[{"award-number":["71901083"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71932005"],"award-info":[{"award-number":["71932005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["and 71673074"],"award-info":[{"award-number":["and 71673074"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Laboratory","award":["2019KE0AB04"],"award-info":[{"award-number":["2019KE0AB04"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1080\/17517575.2021.1894354","type":"journal-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T01:05:31Z","timestamp":1614819931000},"page":"1635-1657","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Uncovering information diffusion patterns in different networks using the\n                    <i>L<\/i>\n                    -metric"],"prefix":"10.1080","volume":"15","author":[{"given":"Lingfei","family":"Li","sequence":"first","affiliation":[{"name":"Hangzhou Dianzi University","place":["Hangzhou, China"]}]},{"given":"Qing","family":"Zhou","sequence":"additional","affiliation":[{"name":"Hangzhou Dianzi University","place":["Hangzhou, China"]}]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[{"name":"Hangzhou Dianzi University","place":["Hangzhou, China"]}]},{"given":"Yuanchun","family":"Jiang","sequence":"additional","affiliation":[{"name":"Hefei University of Technology","place":["Hefei, China"]}]}],"member":"301","published-online":{"date-parts":[[2021,3,3]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/0963662518761733"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741672"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0908800106"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0152"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0646-6"},{"key":"e_1_3_3_8_1","first-page":"993","article-title":"Latent Dirichlet Allocation","volume":"3","author":"Blei D. M.","year":"2003","unstructured":"Blei, D. M., A. Y. Ng, and M. I. Jordan. 2003. \u201cLatent Dirichlet Allocation.\u201d Journal of Machine Learning Research 3 (Jan): 993\u20131022.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.056122"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_3_3_11_1","volume-title":"Paper presented at the Twenty-Sixth AAAI Conference on Artificial Intelligence, Toronto, Canada","author":"Chen W.","year":"2012","unstructured":"Chen, W., W. Lu, and N. Zhang. 2012. \u201cTime-critical Influence Maximization in Social Networks with Time-delayed Diffusion Process.\u201d Paper presented at the Twenty-Sixth AAAI Conference on Artificial Intelligence, Toronto, Canada."},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567997"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1108\/03090569410061178"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229058"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191590"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.3.08"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11871637_27"},{"key":"e_1_3_3_20_1","volume-title":"Paper presented at the AAAI, British Columbia","author":"Kimura M.","year":"2007","unstructured":"Kimura, M., K. Saito, and R. Nakano. 2007. \u201cExtracting Influential Nodes for Information Diffusion on a Social Network.\u201d Paper presented at the AAAI, British Columbia."},{"issue":"5","key":"e_1_3_3_21_1","first-page":"00430","article-title":"A Lesson from the Ice Bucket Challenge: Using Social Networks to Publicize Science","volume":"2014","author":"Koohy H.","year":"2014","unstructured":"Koohy, H., and B. Koohy. 2014. \u201cA Lesson from the Ice Bucket Challenge: Using Social Networks to Publicize Science.\u201d Frontiers in Genetics 2014 (5): 00430.","journal-title":"Frontiers in Genetics"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14021"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401948"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep15140"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2005.10129111"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.040"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-019-6747-8"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0708471105"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.106"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871467"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-33409-8"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1765023"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2014.1928"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2018.1526325"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.07.039"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature11459"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.87.925"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0126894"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1017\/nws.2014.3"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2017.1293300"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2158"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557108"},{"issue":"2","key":"e_1_3_3_44_1","first-page":"163","article-title":"Network Models of the Diffusion of Innovations","volume":"2","author":"Valente T. W.","year":"1995","unstructured":"Valente, T. W. 1995. \u201cNetwork Models of the Diffusion of Innovations.\u201d Computational and Mathematical Organization Theory 2 (2): 163\u2013164.","journal-title":"Computational and Mathematical Organization Theory"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.024"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183114400142"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.082090499"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep02522"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330971"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep10350"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.01.094"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2021.1894354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T11:38:48Z","timestamp":1772710728000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2021.1894354"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,3]]},"references-count":50,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,11,26]]}},"alternative-id":["10.1080\/17517575.2021.1894354"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2021.1894354","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-03-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}