{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:30:50Z","timestamp":1742967050379,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":18,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400773073"},{"type":"electronic","value":"9789400773080"}],"license":[{"start":{"date-parts":[[2013,8,25]],"date-time":"2013-08-25T00:00:00Z","timestamp":1377388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,8,25]],"date-time":"2013-08-25T00:00:00Z","timestamp":1377388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-007-7308-0_21","type":"book-chapter","created":{"date-parts":[[2013,8,24]],"date-time":"2013-08-24T05:03:05Z","timestamp":1377320585000},"page":"205-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Preventing Domestic Violence Via Education in Cloud Computing Service"],"prefix":"10.1007","author":[{"given":"Chih","family":"Lin","sequence":"first","affiliation":[]},{"given":"Pei Chi","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Satnam","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,25]]},"reference":[{"issue":"2","key":"21_CR1","first-page":"219","volume":"23","author":"JL Kurt","year":"1995","unstructured":"Kurt JL (1995) Stalking as a variant of domestic violence. J Ame Acad Psychiatry Law Online 23(2):219\u2013230","journal-title":"J Ame Acad Psychiatry Law Online"},{"key":"21_CR2","unstructured":"Southworth C, Dawson S, Fraser C, Tucker S (2005) A high-tech twist on abuse: technology, intimate partner stalking, and advocacy, violence against women online resources, The NNEDV Fund 2003"},{"key":"21_CR3","unstructured":"Food and Agriculture Organization (FAO) (2011) Why gender? Rome. http:\/\/www.fao.org\/gender\/gender-home\/genger-why\/why-gender\/en\/"},{"key":"21_CR4","unstructured":"United Nations Children\u2019s Fund (UNICEF) (2012) Progress for children: a report card on adolescents, Division of Communication, New York"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1186\/1471-2458-12-467","volume":"12","author":"D Rapp","year":"2012","unstructured":"Rapp D, Zoch B, Khan MMH, Pollmann T, Kr\u00e4mer A (2012) Association between gap in spousal education and domestic violence in India and Bangladesh. BioMed Central Public Health 12:467","journal-title":"BioMed Central Public Health"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1186\/1471-2458-11-109","volume":"11","author":"T Abramsky","year":"2011","unstructured":"Abramsky T, Watts CH, Garcia-Moreno C, Devries K, Kiss L, Ellsberg M, Jansen HAFM, Heise L (2011) What factors are associated with recent intimate partner violence? findings from the WHO multi-country study on women\u2019s health and domestic violence. BioMed Cent Public Health 11:109","journal-title":"BioMed Cent Public Health"},{"key":"21_CR7","unstructured":"UNESCO Institute for Information Technologies in Education (2010) IITE policy brief : cloud computing in education, institute for information technologies in education, united nations educational, scientific and cultural organization (UNESCO), Moscow, Russian Federation"},{"key":"21_CR8","unstructured":"Shomali AH, Ab. Aziz K (2011) Cloud computing in malaysia: a review of potential risks and benefits. The 16th international business information management association conference"},{"key":"21_CR9","unstructured":"Weber AS (2011) Research program for next gen e-learning in MENA region. The 7th international scientific conference elearning and software for education, Bucharest, April 2011, pp. 28\u221229"},{"key":"21_CR10","unstructured":"Aziz NAA, Aziz KA, Paul A, Yusof AM, Noor NSM (2012) Students with attention deficit hyperactive disorder via cloud computing: its advantages. ICACT2012, Feb 19\u201322. ISBN 978-89-5519-163-9"},{"issue":"1","key":"21_CR11","first-page":"5","volume":"2","author":"DG Dutton","year":"2013","unstructured":"Dutton DG, White KR (2013) Male victims of domestic violence. New Male Studies Int J 2(1):5\u201317","journal-title":"New Male Studies Int J"},{"key":"21_CR12","unstructured":"Food and Agriculture Organization (FAO) (2012) Training guide: gender and climate change research in agriculture and food security for rural development, the cgiar research program on climate change, agriculture and food security (CCAFS), FAO, Rome"},{"issue":"1","key":"21_CR13","first-page":"48","volume":"21","author":"A Bhuiya","year":"2003","unstructured":"Bhuiya A, Sharmin T, Hanifi SMA (2003) Nature of domestic violence against women in a rural area of Bangladesh. J Health Popul Nutr 21(1):48\u201354","journal-title":"J Health Popul Nutr"},{"key":"21_CR14","volume-title":"Moving to the cloud: an introduction to cloud computing in government","author":"DC Wyld","year":"2009","unstructured":"Wyld DC (2009) Moving to the cloud: an introduction to cloud computing in government. IBM Center for The Business of Government, Washington"},{"key":"21_CR15","volume-title":"The 2009 horizon report","author":"L Johnson","year":"2009","unstructured":"Johnson L, Levine A, Smith R (2009) The 2009 horizon report. The New Media Consortium, Ausin"},{"issue":"6","key":"21_CR16","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/j.amepre.2011.02.014","volume":"40","author":"JD Piette","year":"2011","unstructured":"Piette JD, Mendoza-Avelares MO, Ganser M, Mohamed M, Marinec N, Krishnan S (2011) A preliminary study of a cloud-computing model for chronic illness self-care support in an underdeveloped country. Am J Prev Med 40(6):629\u2013632","journal-title":"Am J Prev Med"},{"key":"21_CR17","first-page":"9","volume":"2012","author":"JF Wang","year":"2012","unstructured":"Wang JF, Chen BW, Fan WK, Li CH (2012) Emotion-aware assistive system for humanistic care based on the orange computing concept. Appl Comput Intell Soft Comput 2012:9","journal-title":"Appl Comput Intell Soft Comput"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.avb.2005.02.001","volume":"10","author":"DG Dutton","year":"2005","unstructured":"Dutton DG, Nicholls TL (2005) The gender paradigm in domestic violence research and theory: part 1\u2014the conflict of theory and data. Aggress Viol Behav 10:680\u2013714","journal-title":"Aggress Viol Behav"}],"container-title":["Springer Proceedings in Complexity","The 2nd International Workshop on Learning Technology for Education in Cloud"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-7308-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T17:18:53Z","timestamp":1675963133000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-7308-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,25]]},"ISBN":["9789400773073","9789400773080"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-7308-0_21","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"type":"print","value":"2213-8684"},{"type":"electronic","value":"2213-8692"}],"subject":[],"published":{"date-parts":[[2013,8,25]]},"assertion":[{"value":"25 August 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}