{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:11:18Z","timestamp":1748751078026,"version":"3.41.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cscesm.2015.7331819","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:45Z","timestamp":1448318685000},"page":"7-12","source":"Crossref","is-referenced-by-count":1,"title":["Modeling communicational and informational content in Facebook with context specific methods"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Schick","sequence":"first","affiliation":[]},{"given":"Martin","family":"Kuboschek","sequence":"additional","affiliation":[]},{"given":"Wolfram-Manfred","family":"Lippe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772790"},{"journal-title":"Programming Language Concepts and Paradigms","year":"1990","author":"watt","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2011.01559.x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335369"},{"journal-title":"Understanding Social Networks Theories Concepts and Findings","year":"2012","author":"kadushin","key":"ref11"},{"key":"ref12","article-title":"Semantische Proze&#x00DF;modellierung auf der Grundlage Ereignisgesteuerter Proze&#x00DF;ketten (EPK)","volume":"89","author":"keller","year":"1992","journal-title":"Publications of the Institute of Business Informatics University of Saarland"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-009-0019-1"},{"key":"ref14","article-title":"Analysis of Communication Relations","author":"lin","year":"1975","journal-title":"Communication and Behavior"},{"journal-title":"Handbuch Organisation","year":"1975","author":"linnert","key":"ref15"},{"journal-title":"Funktionale und Applikative Programmierung","year":"2009","author":"lippe","key":"ref16"},{"journal-title":"Softcomputing mit Neuronalen Netzen Fuzzy-Logic und Evolution&#x00E4;ren Algorithmen","year":"2006","author":"lippe","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.049"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.istr.2011.09.005","volume":"16","author":"qi","year":"2011","journal-title":"Social networking searching and privacy issues Information Security Technical Report"},{"key":"ref4","article-title":"A Privacy Preservation Model for Facebook-Style Social Network Systems","author":"fong","year":"2009","journal-title":"European Symp Research in Computer Security (ESORICS)"},{"journal-title":"Time and Modality","year":"1957","author":"prior","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"journal-title":"Studying Complex Adaptive Systems","year":"2006","author":"holland","key":"ref8"},{"journal-title":"Structural Models in Anthropology","year":"1983","author":"hage","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/320434.320440"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.67"},{"key":"ref1","article-title":"Information Revelation and Privacy in Online Social Networks","author":"acquisti","year":"2005","journal-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES)"},{"journal-title":"Soziale Systeme Grundrib einer allgemeinen Theorie","year":"1987","author":"luhmann","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BESC.2014.7059513"},{"journal-title":"Communication in Organizations","year":"1976","author":"roger","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.4135\/9781529682557","author":"scott","year":"2013","journal-title":"Social Network Analysis"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753559"},{"journal-title":"Object-Oriented Systems Analysis Modeling the World in Data","year":"1988","author":"shlaer","key":"ref25"}],"event":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","start":{"date-parts":[[2015,9,21]]},"location":"Lodz, Poland","end":{"date-parts":[[2015,9,23]]}},"container-title":["2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7322102\/7331817\/07331819.pdf?arnumber=7331819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T13:52:38Z","timestamp":1748699558000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7331819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cscesm.2015.7331819","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}