{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:49Z","timestamp":1777854529179,"version":"3.51.4"},"reference-count":52,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2021,6,27]],"date-time":"2021-06-27T00:00:00Z","timestamp":1624752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:p>Due to the frequent occurrence of public emergency events and the extensive use of social media in recent years, the public is more and more involved in the communication of public emergencies. As important members of the public, the rapid and massive information sharing of social media users makes them play an increasingly crucial role in the emergency processing. Hence, it is necessary to analyse information behaviours of social media users in emergency events. This article mined the information behaviours of users in multiple events to reflect the public\u2019s behaviour preferences, aiming to provide information support for emergency handling. Specifically, we collected the user-generated contents related to emergency events, and then analysed the user-generated contents from multiple dimensions to obtain the corresponding information behaviours. Finally, based on the comparative analysis of four events, the information behaviour preferences of the public during emergencies were obtained. The experimental results indicate that the public\u2019s behaviours in emergencies are related to their own interests and economic status, and curiosity about the details of events is the consistent appeal of the public.<\/jats:p>","DOI":"10.1177\/01655515211027789","type":"journal-article","created":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:49:45Z","timestamp":1624841385000},"page":"871-886","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting the public\u2019s information behaviour preferences in multiple emergency events"],"prefix":"10.1177","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6019-4228","authenticated-orcid":false,"given":"Qingqing","family":"Zhou","sequence":"first","affiliation":[{"name":"Department of Network and New Media, Nanjing Normal University, Nanjing, China"}]}],"member":"179","published-online":{"date-parts":[[2021,6,27]]},"reference":[{"key":"bibr1-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1717-y"},{"key":"bibr2-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.05.023"},{"key":"bibr3-01655515211027789","first-page":"151","volume-title":"IEEE international conference on big knowledge","author":"Xue B"},{"key":"bibr4-01655515211027789","volume-title":"IOP conference series earth and environmental science","author":"Mei JY"},{"key":"bibr5-01655515211027789","first-page":"41","volume":"35","author":"Fiedrich F","year":"2000","journal-title":"Safety Ence"},{"key":"bibr6-01655515211027789","first-page":"486","volume-title":"Proceedings of the 2006 winter simulation conference","author":"Fiedrich F"},{"key":"bibr7-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2012.08.015"},{"key":"bibr8-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2012.08.008"},{"key":"bibr9-01655515211027789","first-page":"4263","volume":"2","author":"Anhorn J","year":"2015","journal-title":"Natural Hazard Earth Syst Ences"},{"key":"bibr10-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-015-1940-2"},{"key":"bibr11-01655515211027789","first-page":"9","volume":"15","author":"Sutton H","year":"2019","journal-title":"Campus Secur Report"},{"key":"bibr12-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.18"},{"key":"bibr13-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/933\/1\/012009"},{"key":"bibr14-01655515211027789","first-page":"1","volume-title":"IEEE international conference on smart computing","author":"Nalluru G"},{"key":"bibr15-01655515211027789","first-page":"103413","volume":"2020","author":"Song M","year":"2020","journal-title":"Microprocess Microsyst"},{"key":"bibr16-01655515211027789","first-page":"195","volume-title":"10th international conference on electronics information and emergency communication","author":"Liu D"},{"key":"bibr17-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6623108"},{"key":"bibr18-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1504\/IJEM.2009.031564"},{"key":"bibr19-01655515211027789","doi-asserted-by":"publisher","DOI":"10.5465\/ambpp.2015.13411abstract"},{"key":"bibr20-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2016.06.010"},{"key":"bibr21-01655515211027789","first-page":"1","volume-title":"Australasian conference on information systems","author":"Mirbabaie M"},{"key":"bibr22-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-05-2020-0134"},{"key":"bibr23-01655515211027789","first-page":"847","volume-title":"4th international Asia conference on industrial engineering and management innovation","author":"Xie HJ"},{"key":"bibr24-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2885127"},{"key":"bibr25-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04919-2"},{"key":"bibr26-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.252"},{"key":"bibr27-01655515211027789","first-page":"615","volume":"1","author":"Owens ME","year":"2020","journal-title":"J Politic Inst Politic Econ"},{"key":"bibr28-01655515211027789","first-page":"44","volume-title":"International conference on web-age information management","author":"Ma Y"},{"key":"bibr29-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1108\/IDD-10-2019-0074"},{"key":"bibr30-01655515211027789","first-page":"1073","volume":"14","author":"Gali P","year":"2020","journal-title":"Policing"},{"key":"bibr31-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1080\/15325024.2020.1769300"},{"key":"bibr32-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013933"},{"key":"bibr33-01655515211027789","first-page":"828","volume-title":"10th international conference on natural computation","author":"Wang Z"},{"key":"bibr34-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-04-2016-0100"},{"key":"bibr35-01655515211027789","first-page":"11","volume-title":"2018 Chinese intelligent systems conference","author":"Li Z"},{"key":"bibr36-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.11.010"},{"key":"bibr37-01655515211027789","first-page":"1","volume-title":"International conference on advances in social networks analysis and mining, virtual","author":"Kwan SL"},{"key":"bibr38-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/0895-4356(88)90031-5"},{"key":"bibr39-01655515211027789","first-page":"412","volume":"4","author":"Yang Y","year":"1997","journal-title":"Adv Inform Sci Service Sci"},{"key":"bibr40-01655515211027789","volume-title":"Introduction to modern information retrieval","author":"Salton G","year":"1983"},{"key":"bibr41-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"bibr42-01655515211027789","doi-asserted-by":"publisher","DOI":"10.4018\/JDM.2020010101"},{"key":"bibr43-01655515211027789","first-page":"856","volume":"23","author":"Hoffman MD","year":"2010","journal-title":"Adv Neural Inform Proces Syst"},{"key":"bibr44-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2021.102101"},{"key":"bibr45-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1108\/EL-02-2019-0021"},{"key":"bibr46-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1177\/0165551510396975"},{"key":"bibr47-01655515211027789","unstructured":"Bashar MA, Nayak R, Balasubramaniam T. Topic, sentiment and impact analysis: COVID19 information seeking on social media, 2020, ArXiv, https:\/\/arxiv.org\/abs\/2008.12435"},{"key":"bibr48-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1007\/s10900-007-9078-0"},{"key":"bibr49-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.healthpol.2009.11.009"},{"key":"bibr50-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2021.102905"},{"key":"bibr51-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1521\/psyc.2005.68.2.115"},{"key":"bibr52-01655515211027789","doi-asserted-by":"publisher","DOI":"10.1108\/EL-12-2019-0276"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211027789","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01655515211027789","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211027789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:22Z","timestamp":1777504162000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01655515211027789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,27]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["10.1177\/01655515211027789"],"URL":"https:\/\/doi.org\/10.1177\/01655515211027789","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,27]]}}}