{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T16:06:28Z","timestamp":1710432388942},"reference-count":58,"publisher":"IGI Global","issue":"6","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"abstract":"
To make a comprehensive literature review and identify the development trends, this study maps the intellectual structure of the research information management based on co-keyword analysis, the 2-tuple linguistic technique, and social network analysis. This study reveals the intellectual structure by analyzing the topological structure, conceptual structure, and strategic diagram. From the perspective of topological structure, the research of the information management field can be divided into three layers including the nucleus layer, middle layer, and marginal layer. In terms of the conceptual structure, the research of information management can be divided into four sub-fields including health information management, information systems, information technology, and information management application. The four subfields can be repartitioned into seven clusters by using a 2-tuple linguistic model, which means that the 2-tuple linguistic model can improve co-keyword analysis.<\/p>","DOI":"10.4018\/jgim.294577","type":"journal-article","created":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T17:07:57Z","timestamp":1639674477000},"page":"1-20","source":"Crossref","is-referenced-by-count":6,"title":["Exploring the Intellectual Structure and International Cooperation in Information Management"],"prefix":"10.4018","volume":"29","author":[{"given":"Huaige","family":"Zhang","sequence":"first","affiliation":[{"name":"Guangdong University of Finance and Economics, China"}]},{"given":"Xianpei","family":"Hong","sequence":"additional","affiliation":[{"name":"Guangdong University of Finance and Economics, China"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong Agricultural University, China"}]},{"given":"Yeming","family":"Gong","sequence":"additional","affiliation":[{"name":"EMLYON Business School, France"}]},{"given":"Shan","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]}],"member":"2432","reference":[{"key":"JGIM.294577-0","doi-asserted-by":"publisher","DOI":"10.1108\/LHT-06-2019-0116"},{"key":"JGIM.294577-1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.1255639"},{"key":"JGIM.294577-2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"JGIM.294577-3","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1110.0461"},{"key":"JGIM.294577-4","doi-asserted-by":"publisher","DOI":"10.1002\/for"},{"key":"JGIM.294577-5","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(00)00130-1"},{"key":"JGIM.294577-6","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.2.05"},{"key":"JGIM.294577-7","doi-asserted-by":"publisher","DOI":"10.1038\/35013024"},{"key":"JGIM.294577-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.07.003"},{"key":"JGIM.294577-9","doi-asserted-by":"publisher","DOI":"10.2307\/249479"},{"key":"JGIM.294577-10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0701175104"},{"key":"JGIM.294577-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.01.006"},{"key":"JGIM.294577-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2016.01.006"},{"key":"JGIM.294577-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.03.007"},{"key":"JGIM.294577-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2017.05.018"},{"key":"JGIM.294577-15","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocz032"},{"key":"JGIM.294577-16","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2020040108"},{"key":"JGIM.294577-17","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488500000381"},{"key":"JGIM.294577-18","doi-asserted-by":"publisher","DOI":"10.1109\/3477.915345"},{"key":"JGIM.294577-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2015.02.002"},{"key":"JGIM.294577-20","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2020010106"},{"key":"JGIM.294577-21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2013.2296516"},{"key":"JGIM.294577-22","doi-asserted-by":"publisher","DOI":"10.3390\/diagnostics10050327"},{"key":"JGIM.294577-23","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.1.06"},{"key":"JGIM.294577-24","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.3.02"},{"key":"JGIM.294577-25","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2020010104"},{"key":"JGIM.294577-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2017.07.156"},{"issue":"11","key":"JGIM.294577-27","first-page":"1","article-title":"Data-driven techniques in disaster information management.","volume":"50","author":"T.Li","year":"2017","journal-title":"ACM Computing Surveys"},{"key":"JGIM.294577-28","doi-asserted-by":"publisher","DOI":"10.1108\/LHS-11-2018-0057"},{"key":"JGIM.294577-29","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.2.03"},{"key":"JGIM.294577-30","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.2017.0753"},{"key":"JGIM.294577-31","doi-asserted-by":"publisher","DOI":"10.3390\/app11073062"},{"key":"JGIM.294577-32","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.11.3.278"},{"key":"JGIM.294577-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.04.025"},{"key":"JGIM.294577-34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2017.08.015"},{"key":"JGIM.294577-35","doi-asserted-by":"publisher","DOI":"10.1080\/09544820410001697154"},{"key":"JGIM.294577-36","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2002010104"},{"key":"JGIM.294577-37","article-title":"Using of Jaccard Coefficient for Keywords Similarity.","author":"S.Niwattanakul","year":"2013","journal-title":"Iaeng International Conference on Internet Computing & Web Services"},{"key":"JGIM.294577-38","doi-asserted-by":"publisher","DOI":"10.1177\/016555150202800601"},{"key":"JGIM.294577-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2016.06.006"},{"key":"JGIM.294577-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2016.12.003"},{"key":"JGIM.294577-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.025"},{"key":"JGIM.294577-42","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.6"},{"key":"JGIM.294577-43","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-014-1402-8"},{"key":"JGIM.294577-44","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1070.0249"},{"key":"JGIM.294577-45","doi-asserted-by":"publisher","DOI":"10.1002\/smj.2002"},{"key":"JGIM.294577-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"key":"JGIM.294577-47","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.2.14"},{"key":"JGIM.294577-48","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X16638386"},{"key":"JGIM.294577-49","doi-asserted-by":"publisher","DOI":"10.2307\/25750699"},{"key":"JGIM.294577-50","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(99)00089-5"},{"key":"JGIM.294577-51","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"JGIM.294577-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.11.067"},{"key":"JGIM.294577-53","doi-asserted-by":"publisher","DOI":"10.1177\/0272989X04263157"},{"key":"JGIM.294577-54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.031"},{"key":"JGIM.294577-55","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-014-0032-9"},{"key":"JGIM.294577-56","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.07"},{"key":"JGIM.294577-57","doi-asserted-by":"publisher","DOI":"10.1177\/1094428114562629"}],"container-title":["Journal of Global Information Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=294577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T16:33:20Z","timestamp":1678466000000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JGIM.294577"}},"subtitle":["A Bibliometric Overview Using 2-Tuple Linguistic Model"],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11]]}},"URL":"http:\/\/dx.doi.org\/10.4018\/jgim.294577","relation":{},"ISSN":["1062-7375","1533-7995"],"issn-type":[{"value":"1062-7375","type":"print"},{"value":"1533-7995","type":"electronic"}],"subject":["Information Systems and Management","Management Science and Operations Research","Strategy and Management","Computer Science Applications","Business and International Management"],"published":{"date-parts":[[2021,12,28]]}}}