{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:18:53Z","timestamp":1760984333807},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/passat\/socialcom.2011.202","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T19:31:28Z","timestamp":1325878288000},"page":"545-548","source":"Crossref","is-referenced-by-count":21,"title":["Groups in Academic Social Networking Services--An Exploration of Their Potential as a Platform for Multi-disciplinary Collaboration"],"prefix":"10.1109","author":[{"given":"Jung Sun","family":"Oh","sequence":"first","affiliation":[]},{"given":"Wei","family":"Jeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20511-8_37"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1177\/0306312705055535"},{"key":"1","article-title":"Science 2.0: Social networks and online applications for scholars","author":"codina","year":"2009","journal-title":"Hipertext net 7"},{"journal-title":"Mendeley com General Stats","year":"2008","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199807)49:9<776::AID-ASI3>3.0.CO;2-P"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00056-1"},{"key":"4","first-page":"143","article-title":"Challenges for research and practice in distributed group","author":"haythornthwaite","year":"2006","journal-title":"Interdisciplinary Collaboration"}],"event":{"name":"2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) \/ 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)","start":{"date-parts":[[2011,10,9]]},"location":"Boston, MA, USA","end":{"date-parts":[[2011,10,11]]}},"container-title":["2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112285\/6113084\/06113165.pdf?arnumber=6113165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:22:26Z","timestamp":1490116946000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6113165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/passat\/socialcom.2011.202","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}