{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T05:17:08Z","timestamp":1768713428629,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71502029"],"award-info":[{"award-number":["71502029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcss.2018.2862461","type":"journal-article","created":{"date-parts":[[2018,8,22]],"date-time":"2018-08-22T18:42:08Z","timestamp":1534963328000},"page":"676-686","source":"Crossref","is-referenced-by-count":15,"title":["Design Optimization of Food Safety Monitoring System With Social Network Analysis"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5892-0390","authenticated-orcid":false,"given":"Lixing","family":"Wang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1504\/IJOR.2007.014168"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5711\/morj.8.1.5"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1108\/IJOPM-02-2014-0051"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.208701"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2009.09.023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2014.03.005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-015-0260-6"},{"key":"ref36","first-page":"35","article-title":"The weighted key player problem for social network analysis","volume":"20","author":"mcguire","year":"2015","journal-title":"Mil Oper Res"},{"key":"ref35","first-page":"241","article-title":"The key player problem","author":"borgatti","year":"2003","journal-title":"Dynamic Social Network Modeling and Analysis Workshop Summary and Papers"},{"key":"ref34","author":"minieka","year":"1978","journal-title":"Optimization Algorithms for Networks and Graphs"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0260-8774(02)00301-1"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.chb.2015.11.008","article-title":"Introducing a procedure for developing a novel centrality measure (Sociability Centrality) for social networks using TOPSIS method and genetic algorithm","volume":"56","author":"kermani","year":"2016","journal-title":"Comput Hum Behav"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2008.01.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2015.07.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2011.06.007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2010.06.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfoodeng.2013.09.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2011.06.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2013.12.012"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.omega.2013.08.006","article-title":"Competitive supply chain network design: An overview of classifications, models, solution techniques and applications","volume":"45","author":"farahani","year":"2014","journal-title":"Omega"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.jom.2014.10.006","article-title":"Supply network disruption and resilience: A network structural perspective","volume":"33","author":"kim","year":"2015","journal-title":"J Oper Manage"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2627811"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.aaspro.2010.09.036"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2668843"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S2095-3119(15)61112-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-493X.2009.03166.x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2015.12.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.11.027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2010.11.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2012.06.038"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7084-x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/00070701211213474"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfoodeng.2015.11.009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2013.09.025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5267\/j.uscm.2013.05.003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2012.10.004"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/srep41600"},{"key":"ref24","author":"scott","year":"2000","journal-title":"Social Network Analysis A Handbook"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2520477"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2015.07.045"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"4398","DOI":"10.1016\/j.vaccine.2015.07.035","article-title":"Safety monitoring in the vaccine adverse event reporting system (VAERS)","volume":"33","author":"shimabukuro","year":"2015","journal-title":"Vaccine"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.10.015"},{"key":"ref43","first-page":"605","article-title":"Analysis of algorithm for reachable matrix of ISM","volume":"4","author":"he","year":"2012","journal-title":"Adv Inf Sci Serv Sci"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2307451"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/8464016\/08444438.pdf?arnumber=8444438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:25:14Z","timestamp":1643196314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8444438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":45,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2018.2862461","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}