{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:37:07Z","timestamp":1774449427250,"version":"3.50.1"},"reference-count":30,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2017,9,21]],"date-time":"2017-09-21T00:00:00Z","timestamp":1505952000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["EFOP-3.6.3-VEKOP-16"],"award-info":[{"award-number":["EFOP-3.6.3-VEKOP-16"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2018,1,2]]},"DOI":"10.1080\/24751839.2017.1375223","type":"journal-article","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T05:04:44Z","timestamp":1511327084000},"page":"68-90","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Information systems modelling based on graph-theoretic background"],"prefix":"10.1080","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5015-8883","authenticated-orcid":false,"given":"B.","family":"Moln\u00e1r","sequence":"first","affiliation":[{"name":"Information Systems Department, E\u00f6tv\u00f6s Lor\u00e1nd University, Budapest, Hungary"}]},{"given":"A.","family":"B\u00e9leczki","sequence":"additional","affiliation":[{"name":"Information Systems Department, E\u00f6tv\u00f6s Lor\u00e1nd University, Budapest, Hungary"}]},{"given":"A.","family":"Bencz\u00far","sequence":"additional","affiliation":[{"name":"Information Systems Department, E\u00f6tv\u00f6s Lor\u00e1nd University, Budapest, Hungary"}]}],"member":"301","published-online":{"date-parts":[[2017,9,21]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45446-2_20"},{"key":"CIT0002","volume-title":"The description logic handbook: Theory, implementation and applications","author":"Baader F.","year":"2003"},{"key":"CIT0004","volume-title":"Service-oriented modeling (SOA): Service analysis, design, and architecture","author":"Bell M.","year":"2008"},{"key":"CIT0005","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-16518-4","volume-title":"Schema matching and mapping","author":"Bellahs\u00e8ne Z.","year":"2011"},{"key":"CIT0006","volume-title":"TOGAF, the open group architecture framework","author":"Bent H. V. D.","year":"2008"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(03)00109-5"},{"key":"CIT0008","volume-title":"Planning and design of information systems","author":"Blokdijk A.","year":"1987"},{"key":"CIT0009","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-00080-0","volume-title":"Hypergraph theory: An introduction","author":"Bretto A.","year":"2013"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(00)00139-7"},{"key":"CIT0013","first-page":"3","volume":"32","author":"Cohn D.","year":"2009","journal-title":"IEEE Data Engineering Bulletin"},{"key":"CIT0014","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-38721-0","volume-title":"Ontology matching","author":"Euzenat J.","year":"2013"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(93)90045-P"},{"key":"CIT0018","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1007\/978-3-540-88873-4_17","volume-title":"On the move to meaningful internet systems: OTM 2008","author":"Hull R.","year":"2008"},{"key":"CIT0019","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1145\/1125451.1125626","volume-title":"CHI'06 extended abstracts on human factors in computing systems","author":"Indratmo I.","year":"2006"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16720-1_3"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1145\/278476.278490"},{"key":"CIT0024","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-30496-0","volume-title":"Hagenberg business process modelling method","author":"Kossak F.","year":"2016"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-2092-6"},{"key":"CIT0029","doi-asserted-by":"crossref","first-page":"261","DOI":"10.71352\/ac.42.261","volume":"42","author":"Moln\u00e1r B.","year":"2014","journal-title":"Annales Universitatis Scientiarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae: Sectio Mathematica"},{"key":"CIT0031","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-319-44159-7_10","volume-title":"International conference on electronic government and the information systems perspective","author":"Moln\u00e1r B.","year":"2016"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.4018\/ijwp.2013100105"},{"key":"CIT0033","author":"Moln\u00e1r B.","year":"2016","journal-title":"International Journal of Information Systems and Project Management"},{"key":"CIT0034","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-662-49381-6_28","volume-title":"Asian conference on intelligent information and database systems","author":"Moln\u00e1r B.","year":"2016"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(03)00044-7"},{"key":"CIT0038","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-48054-4_20","volume-title":"Advances in conceptual modeling, LNCS","volume":"1727","author":"Rossi G.","year":"1999"},{"key":"CIT0040","volume-title":"Taming the unpredictable: Real world adaptive case management: Case studies and practical guidance","author":"Swenson K.","year":"2011"},{"key":"CIT0041","volume-title":"Database systems: The complete book","author":"Ullman J. D.","year":"2009","edition":"2"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.07.003"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1007\/s11576-007-0064-z"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1147\/sj.263.0276"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/tandfonline.com\/doi\/pdf\/10.1080\/24751839.2017.1375223","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2017.1375223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T11:06:54Z","timestamp":1751022414000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2017.1375223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,21]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,9,26]]},"published-print":{"date-parts":[[2018,1,2]]}},"alternative-id":["10.1080\/24751839.2017.1375223"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2017.1375223","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}