{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:27:46Z","timestamp":1754155666814,"version":"3.41.2"},"reference-count":80,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T00:00:00Z","timestamp":1586390400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2021,1,22]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this study is to propose a data-driven perspective to analyze enterprise information system (EIS) feature use for understanding what and how the system features are actually used in the organization.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>An empirical study was conducted by analyzing information system (IS) log data collected from a well-known shipbuilding manufacturer in China. The multiple analytical approach employed in this study includes social network analysis, association rules learning and human dynamics.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>This study first classified IS users into 41 core users and 325 general users. Then 24 core modules and 54 general modules were identified by social network analysis, and the correlation between them was analyzed. Finally, we found that the IS use time intervals for different user groups followed a power-law distribution, and IS use displayed strong burstiness and weak memory.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This study proposes a data-driven perspective to investigate how the system features are actually used in the organization. This study contributes to the literature and opens a new avenue for future IS use research. Furthermore, this study informs managers how to diagnose, maintain and optimize the implemented IS in order to maximize IS benefits.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-05-2019-0254","type":"journal-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T12:15:10Z","timestamp":1586434510000},"page":"375-398","source":"Crossref","is-referenced-by-count":3,"title":["Analyzing enterprise information system\u2019s feature use: a data-driven perspective"],"prefix":"10.1108","volume":"34","author":[{"given":"Yu","family":"Jia","sequence":"first","affiliation":[]},{"given":"Shilun","family":"Ge","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0461-6318","authenticated-orcid":false,"given":"Nianxin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,4,9]]},"reference":[{"issue":"3","key":"key2021070512425589500_ref001","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1287\/orsc.8.3.289","article-title":"Social network effects on the extent of innovation diffusion: a computer simulation","volume":"8","year":"1997","journal-title":"Organization Science"},{"issue":"5461","key":"key2021070512425589500_ref002","doi-asserted-by":"crossref","first-page":"2115","DOI":"10.1126\/science.287.5461.2115a","article-title":"Power-law distribution of the world wide web","volume":"287","year":"2000","journal-title":"Science"},{"first-page":"487","article-title":"Fast algorithms for mining association rules","year":"1994","key":"key2021070512425589500_ref003"},{"first-page":"207","article-title":"Mining association rules between sets of items in large databases","year":"1993","key":"key2021070512425589500_ref004"},{"issue":"4","key":"key2021070512425589500_ref005","doi-asserted-by":"crossref","first-page":"512","DOI":"10.5465\/amr.2001.5393887","article-title":"Taking time to integrate temporal research","volume":"26","year":"2001","journal-title":"Academy of Management Review"},{"issue":"5","key":"key2021070512425589500_ref006","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.jbusres.2012.08.021","article-title":"Use of precedent and antecedent information in strategic cost management","volume":"66","year":"2013","journal-title":"Journal of Business Research"},{"issue":"12","key":"key2021070512425589500_ref007","first-page":"334","article-title":"Investigating the relationship between business analysts' competency and IS requirements elicitation: a thematic-analysis approach","volume":"42","year":"2018","journal-title":"Communications of the Association for Information Systems"},{"issue":"7","key":"key2021070512425589500_ref008","doi-asserted-by":"crossref","first-page":"361","DOI":"10.17705\/1jais.00367","article-title":"Enhanced use of IT: a new perspective on post-adoption","volume":"15","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"key2021070512425589500_ref009","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1287\/mnsc.2014.2111","article-title":"Adaptation to information technology: a holistic nomological network from implementation to job outcomes","volume":"62","year":"2016","journal-title":"Management Science"},{"issue":"3","key":"key2021070512425589500_ref010","first-page":"1","article-title":"Mention effect in information diffusion on a micro-blogging network","volume":"13","year":"2018","journal-title":"PloS One"},{"issue":"5439","key":"key2021070512425589500_ref011","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","year":"1999","journal-title":"Science"},{"issue":"7039","key":"key2021070512425589500_ref012","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1038\/nature03459","article-title":"The origin of bursts and heavy tails in human dynamics","volume":"435","year":"2005","journal-title":"Nature"},{"issue":"2","key":"key2021070512425589500_ref013","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1287\/isre.1070.0122","article-title":"Information system use-related activity: an expanded behavioral conceptualization of individual-level information system use","volume":"18","year":"2007","journal-title":"Information Systems Research"},{"issue":"11","key":"key2021070512425589500_ref014","doi-asserted-by":"crossref","first-page":"3747","DOI":"10.1073\/pnas.0400087101","article-title":"The architecture of complex weighted networks","volume":"101","year":"2004","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"4","key":"key2021070512425589500_ref015","doi-asserted-by":"crossref","first-page":"211","DOI":"10.17705\/1jais.00126","article-title":"Quo vadis TAM?","volume":"8","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"key2021070512425589500_ref016","doi-asserted-by":"crossref","first-page":"144","DOI":"10.17705\/1jais.00391","article-title":"IT feature use over time and its impact on individual task performance","volume":"16","year":"2015","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"key2021070512425589500_ref017","doi-asserted-by":"crossref","first-page":"229","DOI":"10.2307\/25148634","article-title":"Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test","volume":"28","year":"2004","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2021070512425589500_ref018","doi-asserted-by":"crossref","first-page":"351","DOI":"10.2307\/3250921","article-title":"Understanding information systems continuance: an expectation-confirmation model","volume":"25","year":"2001","journal-title":"MIS Quarterly"},{"key":"key2021070512425589500_ref019","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1038\/nature08631","article-title":"Common ecology quantifies human insurgency","volume":"462","year":"2009","journal-title":"Nature"},{"issue":"1","key":"key2021070512425589500_ref020","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1287\/orsc.1040.0103","article-title":"Enacting integrated information technology: a human agency perspective","volume":"16","year":"2005","journal-title":"Organization Science"},{"issue":"2","key":"key2021070512425589500_ref021","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","article-title":"A faster algorithm for betweenness centrality","volume":"25","year":"2001","journal-title":"Journal of Mathematical Sociology"},{"issue":"4","key":"key2021070512425589500_ref022","doi-asserted-by":"crossref","first-page":"657","DOI":"10.2307\/25148815","article-title":"Toward a deeper understanding of system usage in organizations: a multilevel perspective","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2021070512425589500_ref023","first-page":"632","article-title":"From use to effective use: a representation theory perspective","volume":"24","year":"2012","journal-title":"Information Systems Research"},{"issue":"3","key":"key2021070512425589500_ref024","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1287\/isre.1060.0096","article-title":"Reconceptualizing system usage: an approach and empirical test","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"key":"key2021070512425589500_ref025","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.dss.2013.10.012","article-title":"The impact of advanced analytics and data accuracy on operational performance: a contingent resource based theory (RBT) perspective","volume":"59","year":"2014","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2021070512425589500_ref026","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.2307\/41703503","article-title":"Business intelligence and analytics: from big data to big impact","volume":"36","year":"2012","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021070512425589500_ref027","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1108\/IMDS-04-2016-0141","article-title":"Analysing customer behaviour in mobile app usage","volume":"117","year":"2017","journal-title":"Industrial Management and Data Systems"},{"issue":"5","key":"key2021070512425589500_ref028","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1057\/ejis.2011.58","article-title":"Information systems as a discipline in the making: comparing EJIS and MISQ between 1995 and 2008","volume":"21","year":"2012","journal-title":"European Journal of Information Systems"},{"issue":"41","key":"key2021070512425589500_ref029","doi-asserted-by":"crossref","first-page":"15649","DOI":"10.1073\/pnas.0803685105","article-title":"Robust dynamic classes revealed by measuring the response function of a social system","volume":"105","year":"2008","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"8","key":"key2021070512425589500_ref030","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: a comparison of two theoretical models","volume":"35","year":"1989","journal-title":"Management Science"},{"issue":"4","key":"key2021070512425589500_ref031","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","article-title":"The Delone and Mclean model of information systems success: a ten-year update","volume":"19","year":"2003","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2021070512425589500_ref032","first-page":"352","article-title":"Enterprise systems use: towards a structurational analysis of enterprise systems induced organizational transformation","volume":"19","year":"2007","journal-title":"Communications of the Association for Information Systems"},{"issue":"3","key":"key2021070512425589500_ref033","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1287\/mnsc.49.3.273.12736","article-title":"Performance impacts of information technology: is actual usage the missing link?","volume":"49","year":"2003","journal-title":"Management Science"},{"issue":"4","key":"key2021070512425589500_ref034","doi-asserted-by":"crossref","first-page":"685","DOI":"10.2307\/3094828","article-title":"Disrupted routines: team learning and new technology implementation in hospitals","volume":"46","year":"2001","journal-title":"Administrative Science Quarterly"},{"issue":"3","key":"key2021070512425589500_ref035","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","article-title":"Centrality in social networks conceptual clarification","volume":"1","year":"1978","journal-title":"Social Networks"},{"key":"key2021070512425589500_ref036","unstructured":"Gartner. (2018), \u201cForecast alert: IT spending, worldwide, 1Q18 update\u201d, available at: www.gartner.com\/en\/doc\/3870395-forecast-alert-it-spending-worldwide-1q18-update."},{"issue":"4","key":"key2021070512425589500_ref037","doi-asserted-by":"crossref","first-page":"48002","DOI":"10.1209\/0295-5075\/81\/48002","article-title":"Burstiness and memory in complex systems","volume":"81","year":"2008","journal-title":"Europhysics Letters"},{"issue":"2","key":"key2021070512425589500_ref038","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1287\/orsc.5.2.272","article-title":"Distinguishing between the forest and the trees: media, features, and methodology in electronic communication research","volume":"5","year":"1994","journal-title":"Organization Science"},{"issue":"3","key":"key2021070512425589500_ref039","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1057\/palgrave.ejis.3000663","article-title":"Explaining employees' extended use of complex information systems","volume":"16","year":"2007","journal-title":"European Journal of Information Systems"},{"issue":"11","key":"key2021070512425589500_ref040","doi-asserted-by":"crossref","first-page":"2018","DOI":"10.1287\/mnsc.1110.1398","article-title":"Extracting business value from IT: a sensemaking perspective of post-adoptive use","volume":"57","year":"2011","journal-title":"Management Science"},{"issue":"3","key":"key2021070512425589500_ref041","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/25148694","article-title":"A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems","volume":"29","year":"2005","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2021070512425589500_ref042","doi-asserted-by":"crossref","first-page":"1600","DOI":"10.1073\/pnas.1220433110","article-title":"Calling patterns in human communication dynamics","volume":"110","year":"2013","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"3","key":"key2021070512425589500_ref043","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.ijinfomgt.2014.02.002","article-title":"Data quality management, data usage experience and acquisition intention of big data analytics","volume":"34","year":"2014","journal-title":"International Journal of Information Management"},{"issue":"3","key":"key2021070512425589500_ref044","doi-asserted-by":"crossref","first-page":"749","DOI":"10.25300\/MISQ\/2013\/37.3.04","article-title":"When does technology use enable network change in organizations? A comparative study of feature use and shared affordances","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2021070512425589500_ref045","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1287\/isre.1120.0456","article-title":"Motivational differences across post-acceptance information system usage behaviors: an investigation in the business intelligence systems context","volume":"24","year":"2013","journal-title":"Information Systems Research"},{"issue":"1","key":"key2021070512425589500_ref046","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021070512425589500_ref047","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1080\/07421222.2015.1029402","article-title":"Employees' exploration of complex systems: an integrative view","volume":"32","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2021070512425589500_ref048","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","article-title":"How habit limits the predictive power of intention: the case of information systems continuance","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2021070512425589500_ref049","first-page":"384","article-title":"Understanding diverse usage patterns from large-scale appstore-service profiles","volume":"44","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"47","key":"key2021070512425589500_ref050","doi-asserted-by":"crossref","first-page":"18153","DOI":"10.1073\/pnas.0800332105","article-title":"A poissonian explanation for heavy tails in e-mail communication","volume":"105","year":"2008","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"2","key":"key2021070512425589500_ref051","doi-asserted-by":"crossref","first-page":"505","DOI":"10.2307\/23044054","article-title":"Capturing bottom-up information technology use processes: a complex adaptive systems model","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2021070512425589500_ref052","first-page":"1281","article-title":"Collective information systems use: a typological theory","volume":"42","year":"2018","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021070512425589500_ref053","article-title":"Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality","volume":"64","year":"2001","journal-title":"Physical Review E"},{"issue":"5","key":"key2021070512425589500_ref054","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/00107510500052444","article-title":"Power laws, Pareto distributions and Zipf's law","volume":"46","year":"2005","journal-title":"Contemporary Physics"},{"issue":"2","key":"key2021070512425589500_ref055","doi-asserted-by":"crossref","first-page":"61","DOI":"10.17705\/1jais.00222","article-title":"Social networks and information systems: ongoing and future research streams","volume":"11","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"key2021070512425589500_ref056","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.socnet.2010.03.006","article-title":"Node centrality in weighted networks: generalizing degree and shortest paths","volume":"32","year":"2010","journal-title":"Social Networks"},{"issue":"4","key":"key2021070512425589500_ref057","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1287\/orsc.11.4.404.14600","article-title":"Using technology and constituting structures: a practice lens for studying technology in organizations","volume":"11","year":"2000","journal-title":"Organization Science"},{"issue":"3","key":"key2021070512425589500_ref058","doi-asserted-by":"crossref","first-page":"433","DOI":"10.2307\/20650303","article-title":"Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2021070512425589500_ref059","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.25300\/MISQ\/2013\/37.4.08","article-title":"An investigation of information systems use patterns: technological events as triggers, the effect of time, and consequences for performance","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021070512425589500_ref060","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.eswa.2010.06.060","article-title":"Multi objective association rule mining with genetic algorithm without specifying minimum support and minimum confidence","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"issue":"7","key":"key2021070512425589500_ref061","article-title":"Multidimensional human dynamics in mobile phone communications","volume":"9","year":"2014","journal-title":"PloS One"},{"issue":"2","key":"key2021070512425589500_ref062","article-title":"Human activity in the web","volume":"80","year":"2009","journal-title":"Physical Review E"},{"issue":"2","key":"key2021070512425589500_ref063","doi-asserted-by":"crossref","first-page":"225","DOI":"10.2307\/25148729","article-title":"Firm performance impacts of digitally enabled supply chain integration capabilities","volume":"30","year":"2006","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021070512425589500_ref064","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.chb.2012.06.004","article-title":"D2snet: dynamics of diffusion and dynamic human behaviour in social networks","volume":"29","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"8","key":"key2021070512425589500_ref065","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1287\/mnsc.41.8.1328","article-title":"Measuring system usage: implications for IS theory testing","volume":"41","year":"1995","journal-title":"Management Science"},{"issue":"2","key":"key2021070512425589500_ref067","doi-asserted-by":"crossref","first-page":"453","DOI":"10.2307\/41703463","article-title":"Understanding user revisions when using information system features: adaptive system use and triggers","volume":"36","year":"2012","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2021070512425589500_ref066","first-page":"398","article-title":"Revisiting the impact of system use on task performance: an exploitative-explorative system use framework","volume":"20","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"key2021070512425589500_ref068","doi-asserted-by":"crossref","first-page":"917","DOI":"10.25300\/MISQ\/2017\/41.3.11","article-title":"Explaining post-implementation employee system use and job performance: impacts of the content and source of social network ties","volume":"41","year":"2017","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021070512425589500_ref069","first-page":"473","article-title":"Support structures and their impacts on employee outcomes: a longitudinal field study of an enterprise system implementation","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021070512425589500_ref070","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1287\/mnsc.42.1.85","article-title":"Empirical evaluation of the revised technology acceptance model","volume":"42","year":"1996","journal-title":"Management Science"},{"issue":"1","key":"key2021070512425589500_ref071","article-title":"Predictability of conversation partners","volume":"1","year":"2011","journal-title":"Physical Review X"},{"issue":"1","key":"key2021070512425589500_ref072","first-page":"1235","article-title":"Information systems success research: the \u201c20-year update?\u201d panel report from PACIS, 2011","volume":"34","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"issue":"4","key":"key2021070512425589500_ref073","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1287\/isre.2017.0708","article-title":"Direct and indirect information system use: a multimethod exploration of social power antecedents in healthcare","volume":"28","year":"2017","journal-title":"Information Systems Research"},{"issue":"3","key":"key2021070512425589500_ref074","article-title":"Modeling bursts and heavy tails in human dynamics","volume":"73","year":"2006","journal-title":"Physical Review E"},{"issue":"6","key":"key2021070512425589500_ref075","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1057\/ejis.2013.15","article-title":"The longitudinal impact of enterprise system users' pre-adoption expectations and organizational support on post-adoption proficient usage","volume":"23","year":"2014","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"key2021070512425589500_ref076","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A theoretical extension of the technology acceptance model: four longitudinal field studies","volume":"46","year":"2000","journal-title":"Management Science"},{"issue":"3","key":"key2021070512425589500_ref077","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","year":"2003","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2021070512425589500_ref078","doi-asserted-by":"crossref","first-page":"483","DOI":"10.2307\/25148853","article-title":"Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation","volume":"32","year":"2008","journal-title":"MIS Quarterly"},{"issue":"7","key":"key2021070512425589500_ref079","first-page":"953","article-title":"The impact of goal-congruent feature additions on core IS feature use: when more is less and less is more","volume":"20","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"issue":"6","key":"key2021070512425589500_ref080","article-title":"Statistical property and model for the inter-event time of terrorism attacks","volume":"27","year":"2010","journal-title":"Chinese Physics Letters"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-05-2019-0254\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-05-2019-0254\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:54:49Z","timestamp":1753394089000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/34\/1\/375-398\/446125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,9]]},"references-count":80,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,4,9]]},"published-print":{"date-parts":[[2021,1,22]]}},"alternative-id":["10.1108\/ITP-05-2019-0254"],"URL":"https:\/\/doi.org\/10.1108\/itp-05-2019-0254","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2020,4,9]]}}}