{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:08:07Z","timestamp":1725822487927},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319197272"},{"type":"electronic","value":"9783319197289"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19728-9_34","type":"book-chapter","created":{"date-parts":[[2015,5,28]],"date-time":"2015-05-28T18:36:29Z","timestamp":1432838189000},"page":"405-415","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Health Policy Simulation Model of Smallpox and Ebola Haemorrhagic Fever"],"prefix":"10.1007","author":[{"given":"Setsuya","family":"Kurahashi","sequence":"first","affiliation":[]},{"given":"Takao","family":"Terano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,29]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Burke, D.S., et al.: Individual based computational modeling of smallpox epidemic control strategies. Acad. Emerg. Med.13(1), 1142\u20131149 (2006)","DOI":"10.1197\/j.aem.2006.07.017"},{"key":"34_CR2","unstructured":"Longini, I.M., et al.: Containing a large bioterrorist smallpox attack: a computer simulation approach. Int. J. Infect. Dis. 11(2), 98\u2013108 (2007)"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Gilbert, N. Agent-based models. No. 153. Sage (2008)","DOI":"10.4135\/9781412983259"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Easley, D., Kleinberg, J.: Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University Press (2010)","DOI":"10.1017\/CBO9780511761942"},{"issue":"1","key":"34_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.4091\/iken.21.33","volume":"21","author":"N Okabe","year":"2011","unstructured":"Okabe, N.: Risk and benefit of immunisation : infectious disease prevention with immunization. Iryo to Shakai 21(1), 33\u201340 (2011)","journal-title":"Iryo to Shakai"},{"key":"34_CR6","unstructured":"Epstein, J.M., et al.: Toward a containment strategy for smallpox bioterror: an individual-based computational approach (2002)"},{"key":"34_CR7","unstructured":"Epstein, J.M.: Generative social science: studies in agent-based computational modeling. Princeton University Press (2006)"},{"issue":"3","key":"34_CR8","doi-asserted-by":"publisher","first-page":"275","DOI":"10.4091\/iken.16.275","volume":"16","author":"Y Ohkusa","year":"2007","unstructured":"Ohkusa, Y.: An Evaluation of counter measures for smallpox outbreak using an individual based model and taking into consideration the limitation of human resources of public health workers. Iryo to Shakai 16(3), 275\u2013284 (2007)","journal-title":"Iryo to Shakai"},{"key":"34_CR9","unstructured":"Lofgren, E.T., Fefferman, N.H.: The untapped potential of virtual game worlds to shed light on real world epidemics. Lancet infect. dis. 7(9), 625\u2013629 (2007)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Kennedy-Clark, S., Thompson, K.: What do students learn when collaboratively using a computer game in the study of historical disease epidemics, and why?. games and culture, 1555412011431361 (2011)","DOI":"10.1177\/1555412011431361"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Manfredi, P., Alberto d\u2019Onofrio.: Modeling the interplay between human behavior and the spread of infectious diseases. Springer (2013)","DOI":"10.1007\/978-1-4614-5474-8"}],"container-title":["Smart Innovation, Systems and Technologies","Agent and Multi-Agent Systems: Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19728-9_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T19:26:26Z","timestamp":1584473186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19728-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319197272","9783319197289"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19728-9_34","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}