{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T01:48:25Z","timestamp":1768873705712,"version":"3.49.0"},"reference-count":81,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T00:00:00Z","timestamp":1368144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5,10]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Since its introduction in 2006, messages posted to the microblogging system Twitter have provided a rich dataset for researchers, leading to the publication of over a thousand academic papers. This paper aims to identify this published work and to classify it in order to understand Twitter based research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Firstly the papers on Twitter were identified. Secondly, following a review of the literature, a classification of the dimensions of microblogging research was established. Thirdly, papers were qualitatively classified using open coded content analysis, based on the paper's title and abstract, in order to analyze method, subject, and approach.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The majority of published work relating to Twitter concentrates on aspects of the messages sent and details of the users. A variety of methodological approaches is used across a range of identified domains.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>This work reviewed the abstracts of all papers available via database search on the term \u201cTwitter\u201d and this has two major implications: the full papers are not considered and so works may be misclassified if their abstract is not clear; publications not indexed by the databases, such as book chapters, are not included. The study is focussed on microblogging, the applicability of the approach to other media is not considered.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>To date there has not been an overarching study to look at the methods and purpose of those using Twitter as a research subject. The paper's major contribution is to scope out papers published on Twitter until the close of 2011. The classification derived here will provide a framework within which researchers studying Twitter related topics will be able to position and ground their work.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-03-2012-0027","type":"journal-article","created":{"date-parts":[[2013,5,15]],"date-time":"2013-05-15T14:16:26Z","timestamp":1368627386000},"page":"384-410","source":"Crossref","is-referenced-by-count":144,"title":["What do people study when they study Twitter? Classifying Twitter related academic papers"],"prefix":"10.1108","volume":"69","author":[{"given":"Shirley A.","family":"Williams","sequence":"first","affiliation":[]},{"given":"Melissa M.","family":"Terras","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Warwick","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021320192749200_b1","doi-asserted-by":"crossref","unstructured":"Achrekar, H., Gandhe, A., Lazarus, R., Ssu\u2010Hsin, Y. and Benyuan, L. (2011), \u201cPredicting flu trends using Twitter data\u201d, Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference, pp. 702\u2010707.","DOI":"10.1109\/INFCOMW.2011.5928903"},{"key":"key2022021320192749200_b2","doi-asserted-by":"crossref","unstructured":"Arakawa, Y., Tagashira, S. and Fukuda, A. (2010), \u201cRelationship analysis between user's contexts and real input words through Twitter\u201d, Globecom Workshops, IEEE, pp. 1751\u20101755.","DOI":"10.1109\/GLOCOMW.2010.5700241"},{"key":"key2022021320192749200_b3","unstructured":"Assogba, Y. and Donath, J. (2009), \u201cMycrocosm: visual microblogging\u201d, 42nd Hawaii International Conference on System Sciences (HICSS), IEEE Computer Society, pp. 1\u201010."},{"key":"key2022021320192749200_b4","doi-asserted-by":"crossref","unstructured":"Atencio, C.A., Blake, D.T., Strata, F., Cheung, S.W., Merzenich, M.M. and Schreiner, C.E. (2007), \u201cFrequency\u2010modulation encoding in the primary auditory cortex of the awake owl monkey\u201d, J Neurophysiol, Vol. 98 No. 4, pp. 2182\u20102195.","DOI":"10.1152\/jn.00394.2007"},{"key":"key2022021320192749200_b5","unstructured":"Avello, D.G. (2011), \u201cAll liaisons are dangerous when all your friends are known to us\u201d, HT '11: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia, ACM, New York, NY, pp. 171\u2010180."},{"key":"key2022021320192749200_b6","unstructured":"Barnes, S.J. and Bohringer, M. (2011), \u201cModeling use continuance behavior in microblogging services: the case of Twitter\u201d, Journal of Computer Information Systems, Vol. 51 No. 4, pp. 1\u201010."},{"key":"key2022021320192749200_b7","doi-asserted-by":"crossref","unstructured":"Barnes, S.J., B\u00f6hringer, M., Kurze, C. and Stietzel, J. (2010), \u201cTowards an understanding of social software: the case of Arinia\u201d, 43rd Hawaii International Conference on System Sciences (HICSS), IEEE Computer Society, pp. 1\u20109.","DOI":"10.1109\/HICSS.2010.406"},{"key":"key2022021320192749200_b8","doi-asserted-by":"crossref","unstructured":"Bernstein, M.S., Suh, B., Hong, L., Chen, J., Kairam, S. and Chi, E.H. (2010), \u201cEddi: Interactive topic\u2010based browsing of social status streams\u201d, UIST 2010 \u2010 23rd ACM Symposium on User Interface Software and Technology, pp. 303\u2010312.","DOI":"10.1145\/1866029.1866077"},{"key":"key2022021320192749200_b9","doi-asserted-by":"crossref","unstructured":"Bollen, J., Mao, H. and Zeng, X. (2011), \u201cTwitter mood predicts the stock market\u201d, Journal of Computational Science, Vol. 2 No. 1, pp. 1\u20108.","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"key2022021320192749200_b10","doi-asserted-by":"crossref","unstructured":"boyd, D. and Ellison, N.B. (2007), \u201cSocial network sites: definition, history, and scholarship\u201d, Journal of Computer\u2010Mediated Communication, Vol. 13 No. 1, pp. 210\u2010230.","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"key2022021320192749200_b11","doi-asserted-by":"crossref","unstructured":"boyd, D., Golder, S. and Lotan, G. (2010), \u201cTweet, tweet, retweet: conversational aspects of retweeting on Twitter\u201d, 43rd Hawaii International Conference on System Sciences (HICSS), IEEE Computer Society, pp. 1\u201010.","DOI":"10.1109\/HICSS.2010.412"},{"key":"key2022021320192749200_b12","unstructured":"Buzzi, M.C., Buzzi, M., Leporini, B. and Akhter, F. (2010), \u201cIs Facebook really \u2018open\u2019 to all?\u201d, IEEE International Symposium onTechnology and Society (ISTAS), pp. 327\u2010336."},{"key":"key2022021320192749200_b13","doi-asserted-by":"crossref","unstructured":"Chen, C., Li, F., Ooi, B.C. and Wu, S. (2011), \u201cTI: An efficient indexing mechanism for real\u2010time search on tweets\u201d, Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 649\u2010660.","DOI":"10.1145\/1989323.1989391"},{"key":"key2022021320192749200_b14","doi-asserted-by":"crossref","unstructured":"Cheong, M. and Lee, V. (2010), \u201cDissecting Twitter: a review on current microblogging research and lessons from related fields\u201d, in Memon, N. and Alhajj, R. (Eds), From Sociology to Computing in Social Networks: Theory, Foundations and Applications, Springer\u2010Verlag, New York, NY, pp. 343\u2010362.","DOI":"10.1007\/978-3-7091-0294-7_18"},{"key":"key2022021320192749200_b15","unstructured":"Cheong, M. and Ray, S. (2011), \u201cA literature review of recent microblogging developments\u201d, report, Clayton School of Information Technology, Monash University, Caulfield East, available at: www.csse.monash.edu.au\/publications\/2011\/tr\u20102011\u2010263\u2010full.pdf (accessed 10 July 2012)."},{"key":"key2022021320192749200_b16","doi-asserted-by":"crossref","unstructured":"Corbin, J. and Strauss, A. (2008), Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, Sage Publications, Thousand Oaks, CA.","DOI":"10.4135\/9781452230153"},{"key":"key2022021320192749200_b17","unstructured":"Cormod, G., Krishnamurthy, B. and Willinger, W. (2010), \u201cA manifesto for modeling and measurement in social media\u201d, First Monday, Vol. 15 No. 9, available at: http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/viewArticle\/3072\/2601 (accessed 12 July 2012)."},{"key":"key2022021320192749200_b18","unstructured":"Dann, S. (2010), \u201cTwitter content classification\u201d, First Monday, Vol. 15 No. 12, available at: http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/viewArticle\/2745\/2681 (accessed 12 July 2012)."},{"key":"key2022021320192749200_b19","doi-asserted-by":"crossref","unstructured":"DeVoe, K.M. (2009), \u201cBursts of information: microblogging\u201d, The Reference Librarian, Vol. 50 No. 2, pp. 212\u2010214.","DOI":"10.1080\/02763870902762086"},{"key":"key2022021320192749200_b20","doi-asserted-by":"crossref","unstructured":"Dodds, P.S., Harris, K.D., Kloumann, I.M., Bliss, C.A. and Danforth, C.M. (2011), \u201cTemporal patterns of happiness and information in a global social network: hedonometrics and twitter\u201d, PLoS One, Vol. 6 No. 12, available at: http:\/\/www.plosone.org\/article\/info%3Adoi%2F10.1371%2Fjournal.pone.0026752 (accessed 12 July 2012).","DOI":"10.1371\/journal.pone.0026752"},{"key":"key2022021320192749200_b21","doi-asserted-by":"crossref","unstructured":"Dork, M., Gruen, D., Williamson, C. and Carpendale, S. (2010), \u201cA visual backchannel for large\u2010scale events\u201d, IEEE Transactions on Visualization and Computer Graphics, Vol. 16 No. 6, pp. 1129\u20101138.","DOI":"10.1109\/TVCG.2010.129"},{"key":"key2022021320192749200_b22","doi-asserted-by":"crossref","unstructured":"Ebner, M., Lienhardt, C., Rohs, M. and Meyer, I. (2010), \u201cMicroblogs in higher education \u2013 a chance to facilitate informal and process\u2010oriented learning?\u201d, Computers & Education, Vol. 55 No. 1, pp. 92\u2010100.","DOI":"10.1016\/j.compedu.2009.12.006"},{"key":"key2022021320192749200_b23","doi-asserted-by":"crossref","unstructured":"Ellis, D. (1989), \u201cA behavioural approach to information retrieval system design\u201d, Journal of Documentation, Vol. 45 No. 3, pp. 171\u2010212.","DOI":"10.1108\/eb026843"},{"key":"key2022021320192749200_b24","doi-asserted-by":"crossref","unstructured":"Ellis, D. and Haugan, M. (1997), \u201cModelling the information seeking patterns of engineers and research scientists in an industrial environment\u201d, Journal of Documentation, Vol. 53 No. 4, pp. 384\u2010403.","DOI":"10.1108\/EUM0000000007204"},{"key":"key2022021320192749200_b25","doi-asserted-by":"crossref","unstructured":"Ellison, N.B., Steinfield, C. and Lampe, C. (2007), \u201cThe benefits of Facebook \u2018friends:\u2019 social capital and college students' use of online social network sites\u201d, Journal of Computer\u2010Mediated Communication, Vol. 12 No. 4, pp. 1143\u20101168.","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"key2022021320192749200_b26","doi-asserted-by":"crossref","unstructured":"Erickson, I. (2007), \u201cUnderstanding socio\u2010locative practices\u201d, GROUP \u201807 Doctoral Consortium Papers, ACM, New York, NY.","DOI":"10.1145\/1329112.1329113"},{"key":"key2022021320192749200_b27","doi-asserted-by":"crossref","unstructured":"Erickson, I. (2008), \u201cThe translucence of Twitter\u201d, Proceedings of the Ethnographic Praxis in Industry Conference, American Anthropological Association, pp. 64\u201078.","DOI":"10.1111\/j.1559-8918.2008.tb00095.x"},{"key":"key2022021320192749200_b28","doi-asserted-by":"crossref","unstructured":"Ferguson, D.A. and Greer, C.F. (2011), \u201cLocal radio and microblogging: how radio stations in the US are using Twitter\u201d, Journal of Radio and Audio Media, Vol. 18 No. 1, pp. 33\u201046.","DOI":"10.1080\/19376529.2011.558867"},{"key":"key2022021320192749200_b29","doi-asserted-by":"crossref","unstructured":"Gelernter, J. and Mushegian, N. (2011), \u201cGeo\u2010parsing messages from microtext\u201d, Transactions in GIS, Vol. 15 No. 6, pp. 753\u2010773.","DOI":"10.1111\/j.1467-9671.2011.01294.x"},{"key":"key2022021320192749200_b30","doi-asserted-by":"crossref","unstructured":"Glaser, B.G. and Strauss, A. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine Publishing, Chicago, IL.","DOI":"10.1097\/00006199-196807000-00014"},{"key":"key2022021320192749200_b31","doi-asserted-by":"crossref","unstructured":"Goldstein, H. and Romero, J.J. (2009), \u201cIEEE Spectrum online: content is liberated!\u201d, Spectrum, IEEE, Vol. 46 No. 7.","DOI":"10.1109\/MSPEC.2009.5109431"},{"key":"key2022021320192749200_b32","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves, B., Perra, N. and Vespignani, A. (2011), \u201cModeling users' activity on twitter networks: validation of Dunbar's number\u201d, PLoS ONE, Vol. 6 No. 8, available at: www.plosone.org\/article\/info%3Adoi%2F10.1371%2Fjournal.pone.0022656 (accessed 12 July 2012).","DOI":"10.1371\/journal.pone.0022656"},{"key":"key2022021320192749200_b33","doi-asserted-by":"crossref","unstructured":"Green, R. (2000), \u201cLocating sources in humanities scholarship: the efficacy of following bibliographic references\u201d, The Library Quarterly, Vol. 70 No. 2, pp. 201\u2010229.","DOI":"10.1086\/630018"},{"key":"key2022021320192749200_b34","doi-asserted-by":"crossref","unstructured":"Guy, C., Paterson, A., Currie, H., Lee, A.J. and Cumming, G.P. (2010), \u201cTwittering on about social networking and babyfeeding matters\u201d, British Journal of Midwifery, Vol. 18 No. 10, pp. 620\u2010627.","DOI":"10.12968\/bjom.2010.18.10.78820"},{"key":"key2022021320192749200_b35","doi-asserted-by":"crossref","unstructured":"Hj\u00f8rland, B. (2002), \u201cDomain analysis in information science: eleven approaches \u2013 traditional as well as innovative\u201d, Journal of Documentation, Vol. 58 No. 4, pp. 422\u2010462.","DOI":"10.1108\/00220410210431136"},{"key":"key2022021320192749200_b36","doi-asserted-by":"crossref","unstructured":"Hj\u00f8rland, B. (2008), \u201cCore classification theory: a reply to Szostak\u201d, Journal of Documentation, Vol. 64 No. 3, pp. 333\u2010341.","DOI":"10.1108\/00220410810867560"},{"key":"key2022021320192749200_b37","unstructured":"Honeycutt, C. and Herring, S.C. (2009), \u201cBeyond microblogging: conversation and collaboration via Twitter\u201d, 42nd Hawaii International Conference on System Sciences (HICSS), IEEE Computer Society, pp. 1\u201010."},{"key":"key2022021320192749200_b38","doi-asserted-by":"crossref","unstructured":"Hughes, D.J., Rowe, M., Batey, M. and Lee, A. (2011), \u201cA tale of two sites: Twitter vs Facebook and the personality predictors of social media usage\u201d, Computers in Human Behavior, Vol. 28 No. 2, pp. 561\u2010569.","DOI":"10.1016\/j.chb.2011.11.001"},{"key":"key2022021320192749200_b39","unstructured":"Jacso, P. (2005), \u201cAs we may search \u2013 comparison of major features of the Web of Science, Scopus, and Google Scholar citation\u2010based and citation\u2010enhanced databases\u201d, Current Science, Vol. 89 No. 9, pp. 1537\u20101547."},{"key":"key2022021320192749200_b40","doi-asserted-by":"crossref","unstructured":"Java, A., Song, X., Finin, T. and Tseng, B. (2007), \u201cWhy we twitter: understanding microblogging usage and communities\u201d, Proceedings of the 9th WebKDD and 1st SNA\u2010KDD 2007 Workshop on Web Mining and Social Network Analysis \u2010 WebKDD\/SNA\u2010KDD '07, pp. 56\u201065.","DOI":"10.1145\/1348549.1348556"},{"key":"key2022021320192749200_b41","doi-asserted-by":"crossref","unstructured":"Karger, D.R. and Quan, D. (2005), \u201cWhat would it mean to blog on the semantic web?\u201d, Journal of Web Semantics: Science, Services and Agents on the World Wide Web, Vol. 3 Nos 2\u20103, pp. 147\u2010157.","DOI":"10.1016\/j.websem.2005.06.002"},{"key":"key2022021320192749200_b42","doi-asserted-by":"crossref","unstructured":"Khrabrov, A. and Cybenko, G. (2010), \u201cDiscovering influence in communication networks using dynamic graph analysis\u201d, Social Computing (SocialCom), 2010 IEEE Second International Conference on 20\u201022 August 2010, pp. 288\u2010294.","DOI":"10.1109\/SocialCom.2010.48"},{"key":"key2022021320192749200_b43","doi-asserted-by":"crossref","unstructured":"Kierkegaard, S. (2010), \u201cTwitter thou doeth?\u201d, Computer Law & Security Review, Vol. 26 No. 6, pp. 577\u2010594.","DOI":"10.1016\/j.clsr.2010.09.002"},{"key":"key2022021320192749200_b44","doi-asserted-by":"crossref","unstructured":"Kousha, K. and Thelwall, M. (2009), \u201cGoogle book search: citation analysis for social science and the humanities\u201d, Journal of the American Society for Information Science and Technology, Vol. 60 No. 8, pp. 1537\u20101549.","DOI":"10.1002\/asi.21085"},{"key":"key2022021320192749200_b45","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Gill, P. and Arlitt, M. (2008), \u201cA few chirps about Twitter\u201d, Proceedings of the 1st Workshop on Online Social Networks: WOSN'08, ACM, New York, NY, pp. 19\u201024.","DOI":"10.1145\/1397735.1397741"},{"key":"key2022021320192749200_b46","doi-asserted-by":"crossref","unstructured":"Levine\u2010Clark, M. and Gil, E. (2009), \u201cA comparative analysis of social sciences citation tools\u201d, Online Information Review, Vol. 33 No. 5, pp. 986\u2010996.","DOI":"10.1108\/14684520911001954"},{"key":"key2022021320192749200_b47","unstructured":"Li, G., Cao, J., Jiang, J., Li, Q. and Yao, L. (2011), \u201cBrand tweets: how to popularize the enterprise Micro\u2010blogs\u201d, Information Technology and Artificial Intelligence Conference (ITAIC), IEEE, New York, NY, pp. 136\u2010139."},{"key":"key2022021320192749200_b48","doi-asserted-by":"crossref","unstructured":"Lindgren, S. and Lundstrom, R. (2011), \u201cPirate culture and hacktivist mobilization: the cultural and social protocols of #WikiLeaks on Twitter\u201d, New Media & Society, Vol. 13 No. 6, pp. 999\u20101018.","DOI":"10.1177\/1461444811414833"},{"key":"key2022021320192749200_b49","doi-asserted-by":"crossref","unstructured":"McFedries, P. (2007), \u201cAll A Twitter\u201d, IEEE Spectrum, Vol. 44 No. 10, p. 84.","DOI":"10.1109\/MSPEC.2007.4337670"},{"key":"key2022021320192749200_b50","doi-asserted-by":"crossref","unstructured":"Mandavilli, A. (2011), \u201cTrial by Twitter\u201d, Nature, Vol. 469 No. 7330, pp. 286\u2010287.","DOI":"10.1038\/469286a"},{"key":"key2022021320192749200_b51","unstructured":"Marshall, C.C. and Shipman, F. (2011), \u201cAttitudes about institutional archiving of social media\u201d, Archiving 2011: Preservation Strategies and Imaging Technologies for Cultural Heritage Institutions and Memory Organizations, pp. 194\u2010198."},{"key":"key2022021320192749200_b52","doi-asserted-by":"crossref","unstructured":"Marwick, A.E. and boyd, D. (2010), \u201cI tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience\u201d, New Media & Society, Vol. 13 No. 1, pp. 114\u2010133.","DOI":"10.1177\/1461444810365313"},{"key":"key2022021320192749200_b53","doi-asserted-by":"crossref","unstructured":"Merchant, G. (2011), \u201cUnravelling the social network: theory and research\u201d, Learning, Media and Technology, Vol. 37 No. 1, pp. 4\u201019.","DOI":"10.1080\/17439884.2011.567992"},{"key":"key2022021320192749200_b54","doi-asserted-by":"crossref","unstructured":"Miller, K.J., Fullmer, S.L. and Walls, R.T. (1996), \u201cA dozen years of mainstreaming literature: a content analysis\u201d, Exceptionality: A Special Education Journal, Vol. 6 No. 2, pp. 99\u2010109.","DOI":"10.1207\/s15327035ex0602_3"},{"key":"key2022021320192749200_b55","doi-asserted-by":"crossref","unstructured":"Muralidharan, S., Rasmussen, L., Patterson, D. and Shin, J.\u2010H. (2011), \u201cHope for Haiti: an analysis of Facebook and Twitter usage during the earthquake relief efforts\u201d, Public Relations Review, Vol. 37 No. 2, pp. 175\u2010177.","DOI":"10.1016\/j.pubrev.2011.01.010"},{"key":"key2022021320192749200_b56","doi-asserted-by":"crossref","unstructured":"Naaman, M., Boase, J. and Lai, C.\u2010H. (2010), \u201cIs it really about me? Message content in social awareness streams\u201d, 2010 ACM Conference on Computer Supported Cooperative Work, pp. 189\u2010192.","DOI":"10.1145\/1718918.1718953"},{"key":"key2022021320192749200_b57","doi-asserted-by":"crossref","unstructured":"Naveed, N., Gottron, T., Kunegis, J. and Alhadi, A.C. (2011), \u201cBad news travel fast: a content\u2010based analysis of interestingness on Twitter\u201d, Proceedings of the ACM WebSci'11, available at: www.websci11.org\/fileadmin\/websci\/Papers\/50_paper.pdf (accessed 12 July 2012).","DOI":"10.1145\/2527031.2527052"},{"key":"key2022021320192749200_b58","unstructured":"Passant, A., Hastrup, T. and Boj, U. (2008), \u201cMicroblogging: a semantic and distributed approach\u201d, Proceedings of the 4th Workshop on Scripting for the Semantic Web, available at: http:\/\/hdl.handle.net\/10379\/539 (accessed 12 July 2012)."},{"key":"key2022021320192749200_b59","unstructured":"Petrovi, S., Osborne, M. and Lavrenko, V. (2010), \u201cThe Edinburgh Twitter corpus\u201d, Proceedings of the NAACL HLT 2010 Workshop on Computational Linguistics in a World of Social Media, available at: www.aclweb.org\/anthology\/W\/W10\/W10\u201005.pdf \u2010 page=37 (accessed 12 July 2012)."},{"key":"key2022021320192749200_b60","doi-asserted-by":"crossref","unstructured":"Robinson, L. (2009), \u201cInformation science: communication chain and domain analysis\u201d, Journal of Documentation, Vol. 65 No. 4, pp. 578\u2010591.","DOI":"10.1108\/00220410910970267"},{"key":"key2022021320192749200_b61","doi-asserted-by":"crossref","unstructured":"Ross, C., Terras, M., Warwick, C. and Welsh, A. (2011), \u201cEnabled backchannel: conference Twitter use by digital humanists\u201d, Journal of Documentation, Vol. 67 No. 2, pp. 214\u2010237.","DOI":"10.1108\/00220411111109449"},{"key":"key2022021320192749200_b62","unstructured":"Russell, M.A. (2011a), 21 Recipes for Mining Twitter, O'Reilly, Sebastopol, CA."},{"key":"key2022021320192749200_b63","unstructured":"Russell, M.A. (2011b), Mining the Social Web, O'Reilly, Sebastopol, CA."},{"key":"key2022021320192749200_b64","doi-asserted-by":"crossref","unstructured":"Sadikov, E., Medina, M., Leskovec, J. and Garcia\u2010Molina, H. (2011), \u201cCorrecting for missing data in information cascades\u201d, Proceedings of the 4th ACM International Conference on Web Search and Data Mining, WSDM, pp. 55\u201064.","DOI":"10.1145\/1935826.1935844"},{"key":"key2022021320192749200_b65","unstructured":"Sakak, T., Okazaki, M. and Matsuo, Y. (2010), \u201cEarthquake shakes twitter users: real\u2010time event detection by social sensors\u201d, 9th International Conference on World Wide Web, International World Wide Web Conference Committee (IW3C2), pp. 851\u2010860."},{"key":"key2022021320192749200_b66","unstructured":"Stemler, S. (2001), \u201cAn overview of content analysis\u201d, Practical Assessment, Research & Evaluation, Vol. 7 No. 17, available at: http:\/\/PAREonline.net\/getvn.asp?v=7&n=17 (accessed 12 July 2012)."},{"key":"key2022021320192749200_b67","doi-asserted-by":"crossref","unstructured":"Szostak, R. (2008), \u201cClassification, interdisciplinarity, and the study of science\u201d, Journal of Documentation, Vol. 64 No. 3, pp. 319\u2010332.","DOI":"10.1108\/00220410810867551"},{"key":"key2022021320192749200_b68","doi-asserted-by":"crossref","unstructured":"Szostak, R. (2011), \u201cComplex concepts into basic concepts\u201d, Journal of the American Society for Information Science and Technology, Vol. 62 No. 11, pp. 2247\u20102265.","DOI":"10.1002\/asi.21635"},{"key":"key2022021320192749200_b69","doi-asserted-by":"crossref","unstructured":"Talja, S. and Maula, H. (2003), \u201cReasons for the use and non\u2010use of electronic journals and databases: a domain analytic study in four scholarly disciplines\u201d, Journal of Documentation, Vol. 59 No. 6, pp. 673\u2010691.","DOI":"10.1108\/00220410310506312"},{"key":"key2022021320192749200_b70","unstructured":"Tennis, J.T. (2003), \u201cTwo axes of domains for domain analysis\u201d, Knowledge Organization, Vol. 30 Nos 3\/4, pp. 191\u2010195."},{"key":"key2022021320192749200_b71","doi-asserted-by":"crossref","unstructured":"Tenopir, C., King, D.W., Spencer, J. and Wu, L. (2009), \u201cVariations in article seeking and reading patterns of academics: what makes a difference?\u201d, Library & Information Science Research, Vol. 31 No. 3, pp. 139\u2010148.","DOI":"10.1016\/j.lisr.2009.02.002"},{"key":"key2022021320192749200_b72","doi-asserted-by":"crossref","unstructured":"Waters, R.D. and Jamal, J.Y. (2011), \u201cTweet, tweet, tweet: a content analysis of nonprofit organizations' Twitter updates\u201d, Public Relations Review, Vol. 37 No. 3, pp. 321\u2010324.","DOI":"10.1016\/j.pubrev.2011.03.002"},{"key":"key2022021320192749200_b73","doi-asserted-by":"crossref","unstructured":"Weinberger, S. (2011), \u201cSpies to use Twitter as crystal ball\u201d, Nature, Vol. 478 No. 7369, p. 301.","DOI":"10.1038\/478301a"},{"key":"key2022021320192749200_b74","doi-asserted-by":"crossref","unstructured":"Weller, M. (2011), The Digital Scholar, Bloomsburt Academic, London.","DOI":"10.5040\/9781849666275"},{"key":"key2022021320192749200_b75","unstructured":"Wenger, E., White, N. and Smith, J.D. (2009), Digital Habitats, CPsquare, Portland."},{"key":"key2022021320192749200_b76","doi-asserted-by":"crossref","unstructured":"Whitelaw, C., Agrawal, M., Rao, H.R. and Onook, O. (2011), \u201cUsing social media to study social pheonomena: an example using Twitter data\u201d, Wireless Telecommunications Symposium (WTS), 2011, pp. 1\u20103.","DOI":"10.1109\/WTS.2011.5960865"},{"key":"key2022021320192749200_b77","unstructured":"Wigand, F.D.L. (2010), \u201cTwitter takes wing in government: diffusion, roles, and management\u201d, Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities, Digital Government Society of North America, pp. 66\u201071."},{"key":"key2022021320192749200_b78","doi-asserted-by":"crossref","unstructured":"Wigley, S. and Lewis, B.K. (2012), \u201cRules of engagement: Practice what you tweet\u201d, Public Relations Review, Vol. 38 No. 1, pp. 165\u2010167.","DOI":"10.1016\/j.pubrev.2011.08.020"},{"key":"key2022021320192749200_b79","doi-asserted-by":"crossref","unstructured":"Yamasaki, S. (2011), \u201cA trust rating method for information providers over the social web service: a pragmatic protocol for trust among information explorers and information providers\u201d, Proceedings \u2013 11th IEEE\/IPSJ International Symposium on Applications and the Internet, SAINT, pp. 578\u2010582.","DOI":"10.1109\/SAINT.2011.110"},{"key":"key2022021320192749200_b80","doi-asserted-by":"crossref","unstructured":"Zhang, J., Qu, Y., Cody, J. and Wu, Y. (2010), \u201cA case study of micro\u2010blogging in the enterprise: use, value, and related issues\u201d, CHI 2010: Organizations and Communities, pp. 123\u2010132.","DOI":"10.1145\/1753326.1753346"},{"key":"key2022021320192749200_b81","doi-asserted-by":"crossref","unstructured":"Zhao, D. and Rosson, M.B. (2009), \u201cHow and why people Twitter: the role that micro\u2010blogging plays in informal communication at work\u201d, Proceedings of the ACM 2009 International Conference on Supporting Group Work \u2010 GROUP '09, pp. 243\u2010252.","DOI":"10.1145\/1531674.1531710"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JD-03-2012-0027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-03-2012-0027\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-03-2012-0027\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:33:28Z","timestamp":1753396408000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/69\/3\/384-410\/226249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,10]]},"references-count":81,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,5,10]]}},"alternative-id":["10.1108\/JD-03-2012-0027"],"URL":"https:\/\/doi.org\/10.1108\/jd-03-2012-0027","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2013,5,10]]}}}