{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:39:02Z","timestamp":1743057542906,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242640"},{"type":"electronic","value":"9783030242657"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24265-7_41","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"477-486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of Security Portrait Big Data Application System"],"prefix":"10.1007","author":[{"given":"Yin","family":"Hui","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"1","key":"41_CR1","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1177\/0002716217746652","volume":"675","author":"J Lane","year":"2018","unstructured":"Lane, J.: Building an infrastructure to support the use of government administrative data for program performance and social science research. Ann. Am. Acad. Polit. Soc. Sci. 675(1), 240\u2013252 (2018)","journal-title":"Ann. Am. Acad. Polit. Soc. Sci."},{"issue":"12","key":"41_CR2","doi-asserted-by":"publisher","first-page":"127","DOI":"10.3991\/ijet.v12i12.7967","volume":"12","author":"L Lin","year":"2017","unstructured":"Lin, L.: Application of data mining in library-based personalized learning. Int. J. Emerg. Technol. Learn. 12(12), 127\u2013133 (2017)","journal-title":"Int. J. Emerg. Technol. Learn."},{"unstructured":"Hong, Y., Ruiqi, Z.: Data analysis framework of user information search behavior and its key technologies. Libr. Sci. Res., 39\u201346 (2016)","key":"41_CR3"},{"key":"41_CR4","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-81-322-2494-5_2","volume-title":"Big Data","author":"B Ramesh","year":"2015","unstructured":"Ramesh, B.: Big data architecture. In: Mohanty, H., Bhuyan, P., Chenthati, D. (eds.) Big Data. SBD, vol. 11, pp. 29\u201359. Springer, New Delhi (2015). \nhttps:\/\/doi.org\/10.1007\/978-81-322-2494-5_2"},{"issue":"3","key":"41_CR5","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.tele.2013.11.008","volume":"31","author":"E Park","year":"2014","unstructured":"Park, E., Kim, K.: An integrated adoption model of mobile cloud services. Telematics Inform. 31(3), 376\u2013385 (2014)","journal-title":"Telematics Inform."},{"issue":"4","key":"41_CR6","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1016\/j.ijinfomgt.2013.03.005","volume":"33","author":"O Turel","year":"2013","unstructured":"Turel, O., Connelly, E.: Too busy to help: antecedents and outcomes of interactional justice in web-based service encounters. Int. J. Inf. Manag. 33(4), 674\u2013683 (2013)","journal-title":"Int. J. Inf. Manag."},{"issue":"1","key":"41_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1108\/ITP-11-2015-0272","volume":"30","author":"X Dong","year":"2017","unstructured":"Dong, X., Chang, Y., Wang, Y.: Understanding usage of Internet of Things (IOT) systems in China: cognitive experience and affect experience as moderator. Inf. Technol. People 30(1), 117\u2013138 (2017)","journal-title":"Inf. Technol. People"},{"issue":"8","key":"41_CR8","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/j.telpol.2014.10.001","volume":"39","author":"H Shin","year":"2015","unstructured":"Shin, H.: Effect of the customer experience on satisfaction with smartphones: assessing smart satisfaction index with partial least squares. Telecommun. Policy 39(8), 627\u2013641 (2015)","journal-title":"Telecommun. Policy"},{"issue":"6","key":"41_CR9","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1016\/j.im.2016.12.008","volume":"54","author":"SJ Bae","year":"2017","unstructured":"Bae, S.J., Lee, H., Suh, E.K.: Shared experience in pretrip and experience sharing in posttrip: a survey of Airbnb users. Inf. Manag. 54(6), 714\u2013727 (2017)","journal-title":"Inf. Manag."},{"issue":"3","key":"41_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.jsis.2016.05.002","volume":"25","author":"PB Lowry","year":"2016","unstructured":"Lowry, P.B., Wilson, D.: Creating agile organizations through IT: the influence of internal IT service perceptions on IT service quality and IT agility. J. Strateg. Inf. Syst. 25(3), 211\u2013226 (2016)","journal-title":"J. Strateg. Inf. Syst."},{"issue":"2","key":"41_CR11","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1108\/AJIM-12-2013-0154","volume":"67","author":"M Park","year":"2015","unstructured":"Park, M.: Human multiple information task behavior on the web. Aslib J. Inf. Manag. 67(2), 118\u2013135 (2015)","journal-title":"Aslib J. Inf. Manag."},{"issue":"2","key":"41_CR12","first-page":"285","volume":"055","author":"X Wenjia","year":"2018","unstructured":"Wenjia, X., Shijun, X., Vasily, S.: A cryptograph domain image retrieval method based on Paillier homomorphic block encryption. CMC Comput. Mater. Continua 055(2), 285\u2013295 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"issue":"2","key":"41_CR13","first-page":"331","volume":"55","author":"T Zhenjun","year":"2018","unstructured":"Zhenjun, T., et al.: Robust image hashing via random Gabor filtering and DWT. CMC Comput. Mater. Continua 55(2), 331\u2013344 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"issue":"1","key":"41_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.32604\/cmc.2018.03675","volume":"57","author":"W Xiang","year":"2018","unstructured":"Xiang, W., Chen, X., Qingqi, P., Youyang, Q.: Expression preserved face privacy protection based on multi-mode discriminant analysis. CMC Comput. Mater. Continua 57(1), 107\u2013121 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"issue":"3","key":"41_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.32604\/cmc.2018.03720","volume":"57","author":"L Guoyuan","year":"2018","unstructured":"Guoyuan, L., Bowen, L., Pengcheng, X., Min, L., Wei, B.: Phishing detection with image retrieval based on improved text on correlation descriptor. CMC Comput. Mater. Continua 57(3), 533\u2013547 (2018)","journal-title":"CMC Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24265-7_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T16:23:53Z","timestamp":1594311833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24265-7_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242640","9783030242657"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24265-7_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}