{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:30:39Z","timestamp":1761597039680,"version":"3.41.2"},"reference-count":46,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T00:00:00Z","timestamp":1185840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Documentation"],"published-print":{"date-parts":[[2007,7,31]]},"DOI":"10.1108\/00220410710759011","type":"journal-article","created":{"date-parts":[[2007,7,21]],"date-time":"2007-07-21T07:02:36Z","timestamp":1185001356000},"page":"558-589","source":"Crossref","is-referenced-by-count":14,"title":["Web intelligence analyses of digital libraries"],"prefix":"10.1108","volume":"63","author":[{"given":"Alesia","family":"Zuccala","sequence":"first","affiliation":[]},{"given":"Mike","family":"Thelwall","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Oppenheim","sequence":"additional","affiliation":[]},{"given":"Rajveen","family":"Dhiensa","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b1","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-003-0071-7"},{"key":"b2","doi-asserted-by":"publisher","DOI":"10.1145\/1065385.1065424"},{"key":"b5","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-004-0087-7"},{"key":"b6","doi-asserted-by":"crossref","unstructured":"Bar\u2010Ilan, J. (2005), \u201cWhat do we know about links and linking? A framework for studying links in academic environments\u201d,Information Processing & Management, Vol. 41 No. 3, pp. 1973\u201086.","DOI":"10.1016\/j.ipm.2004.02.005"},{"key":"b9","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20077"},{"key":"b10","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-003-0070-8"},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1045\/june2002-bollen"},{"key":"b13","doi-asserted-by":"crossref","unstructured":"Borgman, C.L. and Furner, J. (2002), \u201cScholarly communication and bibliometrics\u201d,Annual Review of Information Science and Technology, Vol. 36, pp. 3\u201072.","DOI":"10.1002\/aris.1440360102"},{"key":"b14","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20154"},{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"b18","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(98)00068-5"},{"key":"b19","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1547>3.0.CO;2-E"},{"key":"b22","doi-asserted-by":"crossref","unstructured":"Fox, E. and Urs, S. (2002), \u201cDigital libraries\u201d,Annual Review of Information Science and Technology, Vol. 36, pp. 503\u201089.","DOI":"10.1002\/aris.1440360113"},{"key":"b23","doi-asserted-by":"publisher","DOI":"10.1108\/00220410310698239"},{"key":"b24","doi-asserted-by":"publisher","DOI":"10.1177\/01655515030295002"},{"key":"b25","doi-asserted-by":"publisher","DOI":"10.1087\/095315103322422053"},{"key":"b26","unstructured":"Harnad, S. and Brody, T. (2004), \u201cComparing the impact of open access (OA) vs non\u2010OA articles in the same journals\u201d,D\u2010Lib Magazine, Vol. 10 No. 6, available at: www.dlib.org\/dlib\/june04\/harnad\/06harnad.html."},{"key":"b28","doi-asserted-by":"publisher","DOI":"10.1007\/s007999900022"},{"key":"b29","doi-asserted-by":"publisher","DOI":"10.6017\/ital.v24i2.3365"},{"key":"b30","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(2000)51:4<324::AID-ASI3>3.0.CO;2-B"},{"key":"b31","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)51:10<887::AID-ASI20>3.0.CO;2-1"},{"key":"b32","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"b33","doi-asserted-by":"crossref","unstructured":"Lau, K.\u2010N., Lee, K.\u2010H., Ho, Y. and Lam, P.\u2010Y. (2004), \u201cMining the web for business intelligence: homepage analysis in the internet era\u201d,Database Marketing & Customer Strategy Mangement, Vol. 12 No. 1, pp. 1741\u20102439.","DOI":"10.1057\/palgrave.dbm.3240241"},{"key":"b39","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-004-0088-6"},{"key":"b36","doi-asserted-by":"crossref","unstructured":"Marks, J.T., Hussell, J.A.T., McMahon, T.M. and Luce, R.E. (2005), \u201cActiveGraph: a digital library visualization tool\u201d,International Journal on Digital Libraries, Vol. 5 No. 1, pp. 57\u201069.","DOI":"10.1007\/s00799-004-0110-z"},{"key":"b37","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20037"},{"key":"b43","doi-asserted-by":"publisher","DOI":"10.1108\/14684529910334074"},{"key":"b44","unstructured":"Nicholas, D., Huntington, P., Lievesley, N. and Wasti, A. (2000), \u201cEvaluating consumer website logs: a case study ofThe Times\/The Sunday Timeswebsite\u201d,Journal of Information Science, Vol. 51 No. 5, pp. 144\u201054."},{"key":"b45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2005.03.019"},{"key":"b46","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2005.12.005"},{"key":"b72","unstructured":"Papatheodorou, C., Kapidakis, S., Sfakakis, M. and Vassiliou, A. (2003), \u201cMining user communities in digital libraries\u201d,Information Technology and Libraries, Vol. 22 No. 4, pp. 152\u20107."},{"key":"b48","doi-asserted-by":"publisher","DOI":"10.1108\/eb047884"},{"key":"b49","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-004-0099-3"},{"key":"b50","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630240406"},{"key":"b51","doi-asserted-by":"crossref","unstructured":"Spink, A. and Jensen, B.J. (2004),Web Search: Public Searching of the Web, Dordrecht.","DOI":"10.1007\/1-4020-2269-7"},{"key":"b52","doi-asserted-by":"publisher","DOI":"10.1087\/095315104323159649"},{"key":"b54","doi-asserted-by":"publisher","DOI":"10.1023\/B:SCIE.0000034388.70594.cc"},{"key":"b55","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(03)57001-2"},{"key":"b56","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000007055"},{"key":"b57","unstructured":"Thelwall, M. (2003), \u201cWhat is this link doing here? Beginning a fine\u2010grained process of identifying reasons for academic hyperlink creation\u201d,Information Research, Vol. 8 No. 3, paper no. 151, available at: http:\/\/informationr.net\/ir\/8\u20103\/paper151.html."},{"key":"b59","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10243"},{"key":"b62","doi-asserted-by":"publisher","DOI":"10.1023\/B:SCIE.0000045122.93018.2a"},{"key":"b63","unstructured":"Vaughan, L. (2004b), \u201cWeb hyperlinks reflect business performance: a study of US and Chinese IT companies\u201d,Canadian Journal of Information and Library Science, Vol. 28 No. 1, pp. 17\u201031."},{"key":"b68","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630320302"},{"key":"b71","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20468"},{"key":"frg2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<433::AID-ASI11>3.0.CO;2-Q"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220410710759011","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/00220410710759011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:49Z","timestamp":1753400269000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/63\/4\/558-589\/213729"}},"subtitle":["A case study of the National electronic Library for Health (NeLH)"],"short-title":[],"issued":{"date-parts":[[2007,7,31]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,7,31]]}},"alternative-id":["10.1108\/00220410710759011"],"URL":"https:\/\/doi.org\/10.1108\/00220410710759011","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2007,7,31]]}}}