{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:28:48Z","timestamp":1725758928210},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578775","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"7-9","source":"Crossref","is-referenced-by-count":1,"title":["Flexible creation of indicators of scientific and technological emergence: Emerging phenomena and big data"],"prefix":"10.1109","author":[{"given":"Olga","family":"Babko-Malaya","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Hunter","sequence":"additional","affiliation":[]},{"given":"Andy","family":"Seidel","sequence":"additional","affiliation":[]},{"given":"Fotis","family":"Barlos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Applied actant-network theory: Toward the automated detection of technoscientific emergence from full-text publications and patents","author":"brock","year":"2012","journal-title":"AAAI Fall Symposium on Social Networks and Social Contagion"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SOCIETY.2013.18"},{"key":"1","article-title":"2013 \"characterizing communities of practice in emerging science and technology fields","author":"babko-malaya","year":"2013","journal-title":"Society"},{"key":"6","article-title":"Identifying emerging research fields with practical applications via analysis of scientific and technical documents","author":"thomas","year":"2013","journal-title":"Proceedings of ISSI 2013"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199256044.001.0001","author":"latour","year":"2005","journal-title":"Reassembling the Social An Introduction to Actornetwork-theory"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1207\/s15327000em0101_4"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578775.pdf?arnumber=6578775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T11:23:07Z","timestamp":1715944987000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578775","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}