{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:10:52Z","timestamp":1730214652764,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/dictap.2012.6215348","type":"proceedings-article","created":{"date-parts":[[2012,6,21]],"date-time":"2012-06-21T12:17:03Z","timestamp":1340281023000},"page":"183-188","source":"Crossref","is-referenced-by-count":1,"title":["A study on the use of &amp;#x201C;Yams&amp;#x201D; for enterprise knowledge sharing"],"prefix":"10.1109","author":[{"given":"Angela Lee Siew","family":"Hoong","sequence":"first","affiliation":[]},{"given":"Tong Ming","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Soo Kar","family":"Leow","sequence":"additional","affiliation":[]},{"given":"Justin Lim Renn","family":"Aun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Text Mining","year":"2011","key":"3"},{"journal-title":"Evolution of Analysis - Microsoft's NetScan and Project Aura","year":"2007","author":"mailvaganam","key":"2"},{"journal-title":"Social Media Intelligence Taking Monitoring to Task","year":"2011","key":"10"},{"journal-title":"Effective Pattern Discovery for Text Mining","year":"2010","author":"zhong","key":"1"},{"key":"7","first-page":"13","author":"zeng","year":"2010","journal-title":"Social Media Analytics and Intelligence"},{"journal-title":"How to Use Yammer and Why You Should Be Using It at Your Business","year":"2011","author":"blair","key":"6"},{"key":"5","first-page":"50","article-title":"KM2.0: Business Knowledge Sharing in the Web 2.0 Age","volume":"2","author":"hideo","year":"2007","journal-title":"NEC Technical Journal"},{"key":"4","first-page":"47","article-title":"From Web 2.0 to Conversational Knowledge Management: Towards Collaborative Intelligence","volume":"2","author":"lee","year":"2007","journal-title":"Journal of Entrepreneurship Research"},{"key":"9","first-page":"79","author":"wang","year":"2007","journal-title":"Social Computing from Social Informatics to Social Intelligence"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.63"},{"journal-title":"Unlock the Value of Social Media Data","year":"2011","key":"11"}],"event":{"name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","start":{"date-parts":[[2012,5,16]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2012,5,18]]}},"container-title":["2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209061\/6215333\/06215348.pdf?arnumber=6215348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:21:49Z","timestamp":1490109709000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6215348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/dictap.2012.6215348","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}