{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:07:21Z","timestamp":1737176841705,"version":"3.33.0"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825600","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"3051-3060","source":"Crossref","is-referenced-by-count":0,"title":["Unveiling Real-World Company Hidden Communication Patterns: Comparing Informal Large-Scale Email Network and Formal Structure"],"prefix":"10.1109","author":[{"given":"Leonardo","family":"Di Perna","sequence":"first","affiliation":[{"name":"Politecnico di Milano,DEIB,Milan,Italy"}]},{"given":"Matteo","family":"Bianchi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano,DEIB,Milan,Italy"}]},{"given":"Matteo","family":"Matteucci","sequence":"additional","affiliation":[{"name":"Politecnico di Milano,DEIB,Milan,Italy"}]},{"given":"Marco","family":"Brambilla","sequence":"additional","affiliation":[{"name":"Politecnico di Milano,DEIB,Milan,Italy"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-030-48993-9_8"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1093\/oso\/9780199249145.001.0001"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TCSS.2021.3070321"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.socnet.2009.11.002"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1080\/09585192.2016.1244699"},{"issue":"4","key":"ref6","article-title":"In search of hr intelligence: Evidence-based hr analytics practices in high performing companies","volume":"36","author":"Falletta","year":"2014","journal-title":"People & Strategy"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1186\/1472-6963-9-81"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1097\/JOM.0000000000001672"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1186\/s41469-020-00076-x"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/1935826.1935914"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.2307\/41166121"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1287\/orsc.1100.0573"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1177\/0001839212461439"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1287\/orsc.1120.0806"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/IV.2005.30"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.4324\/9781351128346"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1108\/9781787141124"},{"key":"ref18","volume-title":"Driving results through social networks: How top organizations leverage networks for performance and growth","volume":"35","author":"Cross","year":"2009"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.jik.2023.100438"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.3182\/20130911-3-BR-3021.00094"},{"issue":"1","key":"ref21","first-page":"22","article-title":"Matter over mind? e-mail data and the measurement of social networks","volume":"31","author":"Quintane","year":"2011","journal-title":"Connections"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.35808\/ersj\/2530"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.socnet.2020.12.001"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1177\/0013164405282471"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.2307\/2393472"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1002\/hrdq.1104"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.leaqua.2018.03.001"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.4324\/9781315192598-2"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.tsc.2018.03.007"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.chb.2009.08.005"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1177\/0165551519849519"},{"year":"2009","author":"Cohen","article-title":"Enron email dataset","key":"ref32"},{"key":"ref33","first-page":"3","article-title":"Exploration of communication networks from the enron email corpus","volume-title":"SIAM International Conference on Data Mining: Workshop on Link Analysis, Counterterrorism and Security","author":"Diesner"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.chb.2017.02.017"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.3390\/socsci8110306"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.jbusres.2020.04.025"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-94-017-0115-0_5"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.5465\/19416520.2014.885252"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1287\/orsc.1090.0421"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.3390\/app10051699"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-642-16318-0_18"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.dss.2008.07.002"},{"issue":"12","key":"ref43","first-page":"768","article-title":"Analyzing the impacts of informal organizations on formal routines in a networked organization","volume":"4","author":"Sarlak","year":"2014","journal-title":"Journal of Asian Scientific Research"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.ijinfomgt.2018.09.009"},{"issue":"0621303","key":"ref45","article-title":"Strategies for cleaning organizational emails with an application to enron email dataset","volume-title":"5th Conf. of North American Association for Computational Social and Organizational Science","author":"Zhou"},{"key":"ref46","article-title":"Cluster validity in clustering methods","volume-title":"PhD thesis","author":"Zhao","year":"2012"},{"issue":"11","key":"ref47","first-page":"1129","article-title":"Graph drawing by force-directed placement","volume":"21","author":"Fruchterman","year":"1991","journal-title":"Software: Practice and experience"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1609\/icwsm.v3i1.13937"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1038\/s41598-019-41695-z"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1073\/pnas.0706851105"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825600.pdf?arnumber=10825600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:47:30Z","timestamp":1737100050000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825600","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}