{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:02:17Z","timestamp":1756461737336,"version":"3.40.3"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030519704"},{"type":"electronic","value":"9783030519711"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51971-1_22","type":"book-chapter","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T17:03:00Z","timestamp":1596906180000},"page":"268-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Schoolteacher Preference of Cyber-Safety Awareness Delivery Methods: A South African Study"],"prefix":"10.1007","author":[{"given":"Kagisho","family":"Mabitle","sequence":"first","affiliation":[]},{"given":"Elmarie","family":"Kritzinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"issue":"3","key":"22_CR1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014)","journal-title":"Behav. Inf. Technol."},{"issue":"3","key":"22_CR2","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1016\/j.chb.2012.12.018","volume":"29","author":"NAG Arachchilage","year":"2013","unstructured":"Arachchilage, N.A.G., Love, S.: A Game design framework for avoiding phishing attacks. Comput. Hum. Behav. 29(3), 706\u2013714 (2013)","journal-title":"Comput. Hum. Behav."},{"key":"22_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10639-019-09880-9","volume":"24","author":"SA Asongu","year":"2019","unstructured":"Asongu, S.A., Odhiambo, N.M.: Enhancing ICT for quality education in sub-Saharan Africa. Educ. Inf. Technol. 24, 1\u201317 (2019)","journal-title":"Educ. Inf. Technol."},{"issue":"12","key":"22_CR4","first-page":"53","volume":"37","author":"S Brownfield","year":"1983","unstructured":"Brownfield, S., Vik, G.: Teaching basic skills with computer games. Train. Dev. J. 37(12), 53\u201356 (1983)","journal-title":"Train. Dev. J."},{"issue":"4","key":"22_CR5","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1080\/0144341042000228834","volume":"24","author":"S Cassidy","year":"2004","unstructured":"Cassidy, S.: Learning styles: an overview of theories, models, and measures. Educ. Psychol. 24(4), 419\u2013444 (2004)","journal-title":"Educ. Psychol."},{"issue":"6","key":"22_CR6","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1016\/j.ipm.2016.04.009","volume":"52","author":"M Chakraborty","year":"2016","unstructured":"Chakraborty, M., Pal, S., Pramanik, R., Chowdary, C.R.: Recent developments in social spam detection and combating techniques: a survey. Inf. Process. Manag. 52(6), 1053\u20131073 (2016)","journal-title":"Inf. Process. Manag."},{"issue":"2","key":"22_CR7","doi-asserted-by":"crossref","first-page":"231","DOI":"10.2307\/1318816","volume":"24","author":"CD Childers","year":"1996","unstructured":"Childers, C.D.: Using crossword puzzles as an aid to studying sociological concepts. Teach. Sociol. 24(2), 231\u2013235 (1996)","journal-title":"Teach. Sociol."},{"key":"22_CR8","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1016\/j.chb.2016.09.021","volume":"65","author":"\u00d6 \u00c7ikr\u0131kci","year":"2016","unstructured":"\u00c7ikr\u0131kci, \u00d6.: The effect of Internet use on well-being: meta-analysis. Comput. Hum. Behav. 65, 560\u2013566 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"22_CR9","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1207\/s15328023top1002_10","volume":"10","author":"EK Crossman","year":"1983","unstructured":"Crossman, E.K., Crossman, S.M.: The crossword puzzle as a teaching tool. Teach. Psychol. 10(2), 98\u201399 (1983)","journal-title":"Teach. Psychol."},{"key":"22_CR10","unstructured":"Dale, E.A.: Audiovisual Methods in Teaching, 3rd edn. Holt, Rinehart & Winston, New York (1969)"},{"key":"22_CR11","unstructured":"De Lange, M., Von Solms, R.: An e-Safety educational framework in South Africa. In: Proceedings of the Southern Africa Telecommunication Networks and Applications Conference (SATNAC), Western Cape, South Africa (2012)"},{"key":"22_CR12","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.diin.2015.02.001","volume":"3","author":"A Feizollah","year":"2015","unstructured":"Feizollah, A., Anuar, N.B., Salleh, R., Wahid, A., Wahab, A.: A review on feature selection in mobile malware detection. Digit. Invest. 3, 22\u201337 (2015)","journal-title":"Digit. Invest."},{"issue":"2","key":"22_CR13","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1080\/00219266.2003.9655856","volume":"37","author":"S Franklin","year":"2003","unstructured":"Franklin, S., Peat, M., Lewis, A.: Non-traditional interventions to stimulate discussion: the use of games and puzzles. J. Biol. Educ. 37(2), 79\u201384 (2003)","journal-title":"J. Biol. Educ."},{"key":"22_CR14","volume-title":"ICT for Transport: Opportunities and Threats","author":"M Givoni","year":"2015","unstructured":"Givoni, M., Thomopoulos, N.: ICT for Transport: Opportunities and Threats. Edward Elgar Publishing, Cheltenham (2015)"},{"key":"22_CR15","volume-title":"Totally Wired: What Teens and Tweens are Really Doing Online","author":"A Goodstein","year":"2007","unstructured":"Goodstein, A.: Totally Wired: What Teens and Tweens are Really Doing Online. St Martin\u2019s Press, New York (2007)"},{"issue":"1","key":"22_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2015.tb00505.x","volume":"70","author":"I Govender","year":"2015","unstructured":"Govender, I., Skea, B.: Teachers\u2019 understanding of E-Safety: an exploratory case in KZN South Africa. Electron. J. Inf. Syst. Dev. Ctries. 70(1), 1\u201317 (2015)","journal-title":"Electron. J. Inf. Syst. Dev. Ctries."},{"issue":"3","key":"22_CR17","first-page":"47","volume":"20","author":"M Griffiths","year":"2002","unstructured":"Griffiths, M.: The educational benefits of video games. Educ. Health 20(3), 47\u201351 (2002)","journal-title":"Educ. Health"},{"issue":"4","key":"22_CR18","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1097\/YCO.0b013e32832bd7e0","volume":"22","author":"SSA Guan","year":"2009","unstructured":"Guan, S.S.A., Subrahmanyam, K.: Youth internet use: risks and opportunities. Curr. Opinion Psychiatry 22(4), 351\u2013356 (2009)","journal-title":"Curr. Opinion Psychiatry"},{"issue":"1","key":"22_CR19","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.telpol.2018.03.010","volume":"43","author":"GG Haftu","year":"2019","unstructured":"Haftu, G.G.: Information communications technology and economic growth in Sub-Saharan Africa: a panel data approach. Telecommun. Policy 43(1), 88\u201399 (2019)","journal-title":"Telecommun. Policy"},{"issue":"3","key":"22_CR20","first-page":"1","volume":"33","author":"R Hanewald","year":"2008","unstructured":"Hanewald, R.: Confronting the pedagogical challenge of cyber-safety. Aust. J. Teach. Educ. 33(3), 1\u201316 (2008)","journal-title":"Aust. J. Teach. Educ."},{"issue":"1","key":"22_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S1386-5056(02)00030-8","volume":"66","author":"R Haux","year":"2002","unstructured":"Haux, R., Ammenwerth, E., Herzog, W., Knaup, P.: Health care in the information society. A prognosis for the year 2013. Int. J. Med. Inf. 66(1), 3\u201321 (2002)","journal-title":"Int. J. Med. Inf."},{"key":"22_CR22","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cosust.2017.12.001","volume":"31","author":"ST Herrero","year":"2018","unstructured":"Herrero, S.T., Nicholls, L., Strengers, Y.: Smart home technologies in everyday life: do they address key energy challenges in households? Curr. Opin. Environ. Sustain. 31, 65\u201370 (2018)","journal-title":"Curr. Opin. Environ. Sustain."},{"issue":"1","key":"22_CR23","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1504\/IJMP.2013.052320","volume":"6","author":"B Hynes","year":"2013","unstructured":"Hynes, B.: At the heart or on the periphery: the role of information communications technology (ICT) in small firms. Int. J. Manag. Pract. 6(1), 24\u201339 (2013)","journal-title":"Int. J. Manag. Pract."},{"key":"22_CR24","doi-asserted-by":"crossref","first-page":"16892","DOI":"10.1109\/ACCESS.2019.2895879","volume":"7","author":"AA Islam","year":"2019","unstructured":"Islam, A.A., Mok, M.M.C., Gu, X., Spector, J., Hai-Leng, C.: ICT in higher education: an exploration of practices in Malaysian universities. IEEE Access 7, 16892\u201316908 (2019)","journal-title":"IEEE Access"},{"key":"22_CR25","unstructured":"Joubert, R.: The mobile web: an untapped opportunity for publishers (2008). http:\/\/www.bizcommunity.com\/Article\/196\/15\/30508.html. Accessed 7 May 2018"},{"issue":"1","key":"22_CR26","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1089\/cpb.1998.1.11","volume":"1","author":"JJ Kandell","year":"1998","unstructured":"Kandell, J.J.: Internet addiction on campus: the vulnerability of college students. Cyberpsychol. Behav. 1(1), 11\u201317 (1998)","journal-title":"Cyberpsychol. Behav."},{"key":"22_CR27","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.anucene.2017.05.006","volume":"108","author":"KN Kim","year":"2017","unstructured":"Kim, K.N., Yim, M.S., Schneider, E.: A study of insider threat in nuclear security analysis using game theoretic modelling. Ann. Nucl. Energy 108, 301\u2013309 (2017)","journal-title":"Ann. Nucl. Energy"},{"key":"22_CR28","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1361-3723(16)30037-9","volume":"4","author":"S Kouttis","year":"2016","unstructured":"Kouttis, S.: Improving security knowledge, skills and safety. Comput. Fraud Secur. 4, 12\u201314 (2016)","journal-title":"Comput. Fraud Secur."},{"issue":"1","key":"22_CR29","first-page":"1","volume":"28","author":"E Kritzinger","year":"2016","unstructured":"Kritzinger, E.: Short-term initiatives for enhancing cyber-safety within South African schools. S. Afr. Comput. J. 28(1), 1\u201317 (2016)","journal-title":"S. Afr. Comput. J."},{"key":"22_CR30","first-page":"1","volume":"14","author":"E Kritzinger","year":"2017","unstructured":"Kritzinger, E.: Cultivating a cyber-safety culture among school learners in South Africa. Afr. Educ. Rev. 14, 1\u201320 (2017)","journal-title":"Afr. Educ. Rev."},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Kruger, H.A., Flowerday, S., Drevin, L., Steyn, T.: An assessment of the role of cultural factors in information security awareness. In: Information Security South Africa (ISSA), pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/ISSA.2011.6027505"},{"issue":"2","key":"22_CR32","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.dss.2011.09.002","volume":"52","author":"F Lai","year":"2012","unstructured":"Lai, F., Li, D., Hsieh, C.T.: Fighting identity theft: the coping perspective. Decis. Support Syst. 52(2), 353\u2013363 (2012)","journal-title":"Decis. Support Syst."},{"key":"22_CR33","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1016\/j.chb.2005.10.005","volume":"23","author":"Q Li","year":"2007","unstructured":"Li, Q.: New bottle but old wine: a research of cyberbullying in schools. Comput. Hum. Behav. 23, 1777\u20131791 (2007)","journal-title":"Comput. Hum. Behav."},{"key":"22_CR34","volume-title":"Risks and Safety on the Internet: The Perspective of European Children. EU Kids Online Full Findings","author":"S Livingstone","year":"2011","unstructured":"Livingstone, S., Haddon, L., G\u00f6rzig, A., \u00d3lafsson, K.: Risks and Safety on the Internet: The Perspective of European Children. EU Kids Online Full Findings. LSE, London (2011)"},{"issue":"2","key":"22_CR35","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1080\/03057640220147568","volume":"32","author":"A McFarlane","year":"2002","unstructured":"McFarlane, A., Sakellariou, S.: The role of ICT in science education. Camb. J. Educ. 32(2), 219\u2013232 (2002)","journal-title":"Camb. J. Educ."},{"issue":"18","key":"22_CR36","first-page":"B29","volume":"53","author":"SC McQuade","year":"2007","unstructured":"McQuade, S.C.: We must educate young people about cybercrime before they start college. Chron. High. Educ. 53(18), B29\u2013B31 (2007)","journal-title":"Chron. High. Educ."},{"issue":"6","key":"22_CR37","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1080\/09540121.2018.1563283","volume":"31","author":"P Mogoba","year":"2019","unstructured":"Mogoba, P., Phillips, T.K., Myer, L., Ndlovu, L., Were, M.C., Clouse, K.: Smartphone usage and preferences among postpartum HIV-positive women in South Africa. AIDS Care 31(6), 723\u2013729 (2019)","journal-title":"AIDS Care"},{"key":"22_CR38","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.enbuild.2016.05.064","volume":"127","author":"AJ Mor\u00e1n","year":"2016","unstructured":"Mor\u00e1n, A.J., Profaizer, P., Zapater, M.H., Valdavida, M.A., Bribi\u00e1n, I.Z.: Information and communications technologies (ICTs) for energy efficiency in buildings: review and analysis of results from EU pilot projects. Energy Build. 127, 128\u2013137 (2016)","journal-title":"Energy Build."},{"key":"22_CR39","doi-asserted-by":"crossref","DOI":"10.4135\/9781483350516","volume-title":"Responding to Cyber Bullying: An Action Tool for School Leaders","author":"J Myers","year":"2011","unstructured":"Myers, J., McCaw, D., Hemphill, L.: Responding to Cyber Bullying: An Action Tool for School Leaders. Sage Publications, Thousand Oaks (2011)"},{"issue":"2","key":"22_CR40","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1007\/s10639-018-9803-6","volume":"24","author":"S Nath","year":"2019","unstructured":"Nath, S.: ICT integration in Fiji schools: a case of in-service teachers. Educ. Inf. Technol. 24(2), 963\u2013972 (2019)","journal-title":"Educ. Inf. Technol."},{"key":"22_CR41","unstructured":"Newman, E.: Media selection and active learning: design practices of designers-by-assignment within the academic library. Doctoral dissertation, Capella University (2015)"},{"issue":"2","key":"22_CR42","first-page":"283","volume":"6","author":"S Perren","year":"2012","unstructured":"Perren, S., Corcoran, L., Cowie, H., Dehue, F., Mc Guckin, C., Sevcikova, A., Tsatsou, P., V\u00f6llink, T.: Tackling cyberbullying: review of empirical evidence regarding successful responses by students, parents, and schools. Int. J. Confl. Violence 6(2), 283\u2013292 (2012)","journal-title":"Int. J. Confl. Violence"},{"key":"22_CR43","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.geoforum.2015.06.002","volume":"64","author":"G Porter","year":"2015","unstructured":"Porter, G., Hampshire, K., Abane, A., Munthali, A., Robson, E., Bango, A., de Lannoy, A., Gunguluza, N., Tanle, A., Owusu, S., Milner, J.: Intergenerational relations and the power of the cell phone: perspectives on young people\u2019s phone usage in sub-Saharan Africa. Geoforum 64, 37\u201346 (2015)","journal-title":"Geoforum"},{"issue":"4","key":"22_CR44","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1016\/j.chb.2013.02.014","volume":"29","author":"AK Przybylski","year":"2013","unstructured":"Przybylski, A.K., Murayama, K., DeHaan, C.R., Gladwell, V.: Motivational, emotional, and behavioral correlates of fear of missing out. Comput. Hum. Behav. 29(4), 1841\u20131848 (2013)","journal-title":"Comput. Hum. Behav."},{"key":"22_CR45","unstructured":"Reuters: American youth trail peers in Internet usage (2008). http:\/\/www.pcmag.com\/article2\/0,2817,2335412,00.asp. Accessed 15 Oct 2019"},{"issue":"7","key":"22_CR46","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.cose.2008.07.008","volume":"27","author":"Y Rezgui","year":"2008","unstructured":"Rezgui, Y., Marks, A.: Information security awareness in higher education: an exploratory study. Comput. Secur. 27(7), 241\u2013253 (2008)","journal-title":"Comput. Secur."},{"issue":"1","key":"22_CR47","first-page":"17","volume":"7","author":"KE Ricci","year":"1994","unstructured":"Ricci, K.E.: The use of computer-based videogames in knowledge acquisition and retention. J. Interact. Instr. Dev. 7(1), 17\u201322 (1994)","journal-title":"J. Interact. Instr. Dev."},{"key":"22_CR48","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.sbspro.2017.02.007","volume":"237","author":"K Romero-Ruiz","year":"2017","unstructured":"Romero-Ruiz, K., Echeverri-S\u00e1nchez, L., Pe\u00f1a-Plata, J., V\u00e1squez-Giraldo, S., Aguilera-Cardona, M., Herazo-Avenda\u00f1o, C., Valencia-Arias, A., Bran-Piedrahita, L.: Information and communication technologies impact on family relationship. Procedia-Soc. Behav. Sci. 237, 30\u201337 (2017)","journal-title":"Procedia-Soc. Behav. Sci."},{"issue":"2","key":"22_CR49","doi-asserted-by":"crossref","first-page":"93","DOI":"10.29329\/ijpe.2018.139.7","volume":"14","author":"A Semerci","year":"2018","unstructured":"Semerci, A., Aydin, M.K.: Examining high school teachers\u2019 attitudes towards ICT use in education. Int. J. Progress. Educ. 14(2), 93\u2013105 (2018)","journal-title":"Int. J. Progress. Educ."},{"key":"22_CR50","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.chb.2014.09.008","volume":"41","author":"DS Strassberg","year":"2014","unstructured":"Strassberg, D.S., Rullo, J.E., Mackaronis, J.E.: The sending and receiving of sexually explicit cell phone photos (\u201cSexting\u201d) while in high school: one college\u2019s students\u2019 retrospective reports. Comput. Hum. Behav. 41, 177\u2013183 (2014)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"22_CR51","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/10528008.1999.11488655","volume":"9","author":"J Strauss","year":"1999","unstructured":"Strauss, J., Frost, R.D.: Selecting instructional technology media for the marketing classroom. Mark. Educ. Rev. 9(1), 11\u201320 (1999)","journal-title":"Mark. Educ. Rev."},{"key":"22_CR52","unstructured":"Sykiotou, A.P.: Trafficking in human beings: internet recruitment. Misuse of the Internet for the recruitment of victims of trafficking in human beings, DG of Human Rights and Legal Affairs, Council of Europe (2007)"},{"key":"22_CR53","unstructured":"Telecom Regulatory Authority of India: The Indian telecom services performance indicators April - June 2007, TRAI, New Delhi, India (2007)"},{"issue":"4","key":"22_CR54","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1177\/001872086500700405","volume":"7","author":"RW Walker","year":"1965","unstructured":"Walker, R.W.: An evaluation of training methods and their characteristics. Hum. Factors 7(4), 347\u2013354 (1965)","journal-title":"Hum. Factors"},{"issue":"1","key":"22_CR55","doi-asserted-by":"crossref","first-page":"198","DOI":"10.3200\/CTCH.54.1.198-201","volume":"54","author":"RS Weisskirch","year":"2006","unstructured":"Weisskirch, R.S.: An analysis of instructor-created crossword puzzles for student review. Coll. Teach. 54(1), 198\u2013201 (2006)","journal-title":"Coll. Teach."},{"issue":"50","key":"22_CR56","first-page":"1","volume":"800","author":"M Wilson","year":"2003","unstructured":"Wilson, M., Hash, J.: Building an information technology security awareness and training program. NIST Spec. Publ. 800(50), 1\u201339 (2003)","journal-title":"NIST Spec. Publ."},{"issue":"1","key":"22_CR57","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s12564-018-9568-z","volume":"20","author":"D Wu","year":"2019","unstructured":"Wu, D., Li, C.-C., Zhou, W.-T., Tsai, C.-C., Lu, C.: Relationship between ICT supporting conditions and ICT application in Chinese urban and rural basic education. Asia Pac. Educ. Rev. 20(1), 147\u2013157 (2019)","journal-title":"Asia Pac. Educ. Rev."}],"container-title":["Advances in Intelligent Systems and Computing","Artificial Intelligence and Bioinspired Computational Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51971-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T08:31:01Z","timestamp":1667723461000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51971-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519704","9783030519711"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51971-1_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}