{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:30:52Z","timestamp":1767141052956,"version":"build-2238731810"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T00:00:00Z","timestamp":1450828800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10586-015-0516-y","type":"journal-article","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T01:15:06Z","timestamp":1450833306000},"page":"485-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Factors affecting the continuous use of cloud service: focused on security risks"],"prefix":"10.1007","volume":"19","author":[{"given":"Seong-Taek","family":"Park","sequence":"first","affiliation":[]},{"given":"Eun-Mi","family":"Park","sequence":"additional","affiliation":[]},{"given":"Joung-Hae","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Guozhong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,23]]},"reference":[{"key":"516_CR1","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10586-014-0368-x","volume":"18","author":"LG Cho","year":"2015","unstructured":"Cho, L.G., Park, M.C.: Technological-level evaluation using patent statistics: model and application in mobile communications. Clust. Comput. 18, 259\u2013268 (2015)","journal-title":"Clust. Comput."},{"key":"516_CR2","doi-asserted-by":"crossref","first-page":"2883","DOI":"10.1016\/j.mcm.2011.12.014","volume":"57","author":"M Jarschel","year":"2013","unstructured":"Jarschel, M., Schlosser, D., Scheuring, S.: Gaming in the clouds: QoE and the users perspective. Math. Comput. Model. 57, 2883\u20132894 (2013)","journal-title":"Math. Comput. Model."},{"issue":"1","key":"516_CR3","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.comnet.2014.01.008","volume":"68","author":"P Casas","year":"2014","unstructured":"Casas, P., Schatz, R.: Quality of experience in cloud services: survey and measurements. Comput. Netw. 68(1), 149\u2013165 (2014)","journal-title":"Comput. Netw."},{"issue":"4","key":"516_CR4","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s11280-011-0138-0","volume":"15","author":"K Yang","year":"2012","unstructured":"Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web. 15(4), 409\u2013428 (2012)","journal-title":"World Wide Web."},{"key":"516_CR5","unstructured":"RightScale: 2015 State of the Cloud Report: See the Latest Cloud Computing Trends. http:\/\/www.rightscale.com\/lp\/2015-state-of-the-cloud-report (2015). Accessed 25 August 2015"},{"key":"516_CR6","unstructured":"Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. In: Wireless Communications and Mobile Computing. http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/wcm.1203\/full (2011). Accessed 25 August 2015"},{"key":"516_CR7","doi-asserted-by":"crossref","unstructured":"Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: 2011 IEEE International Conference on Cloud Computing, pp. 541\u2013548. IEEE (2011)","DOI":"10.1109\/CLOUD.2011.59"},{"key":"516_CR8","doi-asserted-by":"crossref","unstructured":"Phaphoom, N., Oza, N., Wang, X., Abrahamsson. P.: Does cloud computing deliver the promised benefits for IT industry?. In: Proceedings of the WICSA\/ECSA 2012 Companion Volume, pp. 45\u201352. ACM. http:\/\/dx.doi.org\/10.1145\/2361999.2362007 (2012). Accessed 25 August 2015","DOI":"10.1145\/2361999.2362007"},{"issue":"4","key":"516_CR9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM. 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM."},{"issue":"1","key":"516_CR10","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2015","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing\u2014the business perspective. Decis. Support Syst. 51(1), 176\u2013189 (2015). doi: 10.1016\/j.dss.2010.12.006","journal-title":"Decis. Support Syst."},{"key":"516_CR11","doi-asserted-by":"crossref","unstructured":"Rafique, K., Tareen, A.W., Saeed, M., Wu, J.Z., Qureshi, S.S.: Cloud computing economics opportunities and challenges. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology. Shenzhen, 28\u201330, pp. 401-406 (2011) http:\/\/dx.doi.org\/10.1109\/ICBNMT.2011.6155965 (2011) Accessed 25 August 2015","DOI":"10.1109\/ICBNMT.2011.6155965"},{"issue":"10","key":"516_CR12","first-page":"34","volume":"26","author":"MA Goodburn","year":"2010","unstructured":"Goodburn, M.A., Hill, S.: The cloud transforms business. Financ. Exec. 26(10), 34\u201339 (2010)","journal-title":"Financ. Exec."},{"key":"516_CR13","unstructured":"Harris, J., Grandgenett, N., Hofer, M.: Testing a TPACK-based technology integration assessment rubric. In: Maddux, C.D. (ed.) Research Highlights in Technology and Teacher Education 2010, pp. 323\u2013331. Society for Information Technology & Teacher Education (SITE), Chesapeake (2010)"},{"key":"516_CR14","doi-asserted-by":"crossref","unstructured":"Jasti, H., Hanusa, B.H., Switzer, G.E., Granieri, R., Elnicki, M.: Residents\u2019 perceptions of a night float system. BMC Med. Educ. 2009 9(52) doi: 10.1186\/1472-6920-9-52 (2009). Accessed 25 August (2015)","DOI":"10.1186\/1472-6920-9-52"},{"key":"516_CR15","doi-asserted-by":"crossref","unstructured":"Mladenow, A., Fuchs, E., Dohmen, P., Strauss, C.: Value creation using clouds: analysis of value drivers for start-ups and small and medium sized enterprises in the textile industry. In: 26th International Conference on Advanced Information Networking and Applications Workshops 2012, pp. 1215\u20131220. IEEE (2012)","DOI":"10.1109\/WAINA.2012.210"},{"key":"516_CR16","unstructured":"Marko, K.: 2014 State of Storage. http:\/\/reports.informationweek.com\/abstract\/24\/12015\/Storage-Server\/Research:-2014-State-of-Storage (2014). Accessed 25 August (2015)"},{"key":"516_CR17","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1007\/s10586-013-0327-y","volume":"17","author":"AN Kang","year":"2014","unstructured":"Kang, A.N., Barolli, L., Park, J.H., Jeong, Y.S.: A strengthening plan for enterprise information security based on cloud computing. Clust. Comput. 17, 703\u2013710 (2014)","journal-title":"Clust. Comput."},{"key":"516_CR18","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. US Nat\u2019l Inst. of Science and Technology. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf (2011). Accessed 25 August 2015"},{"issue":"21","key":"516_CR19","doi-asserted-by":"crossref","first-page":"7905","DOI":"10.1016\/j.eswa.2015.06.025","volume":"42","author":"M Haghighat","year":"2015","unstructured":"Haghighat, M., Zonouz, S., Abdel-Mottaleb, M.: CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst. Appl. 42(21), 7905\u20137916 (2015)","journal-title":"Expert Syst. Appl."},{"key":"516_CR20","doi-asserted-by":"crossref","unstructured":"Hamadaqa, M., Tahvildari, L.: Cloud computing uncovered: a research landscape. In: Ali, H., Atif, M. (eds.) Advances in Computers, vol.86, pp. 41\u201385 (2012)","DOI":"10.1016\/B978-0-12-396535-6.00002-8"},{"key":"516_CR21","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/s10586-012-0233-8","volume":"17","author":"M Hussain","year":"2014","unstructured":"Hussain, M., Abdulsalam, H.M.: Software quality in the clouds: a cloud-based solution. Clust. Comput. 17, 389\u2013402 (2014)","journal-title":"Clust. Comput."},{"key":"516_CR22","unstructured":"Stamford, C.: Gartner Says Public Cloud Services Are Simultaneously Cannibalizing and Stimulating Demand for External IT Services Spending. http:\/\/www.gartner.com\/newsroom\/id\/2220715 (2014). Accessed 25 August (2015)"},{"key":"516_CR23","unstructured":"Ratansingham, P., Kumer, K.: Trading partner trust in electronic commerce participation. In: Proceeding of the 22nd International Conference on Information systems, pp. 544\u2013552 (2000)"},{"issue":"6","key":"516_CR24","first-page":"1771","volume":"32","author":"KK Kim","year":"2003","unstructured":"Kim, K.K., Lee, J.W., Kim, H.S.: Impact of trust and risk on internet banking adoption. Korean Manag. Rev. 32(6), 1771\u20131797 (2003)","journal-title":"Korean Manag. Rev."},{"issue":"4","key":"516_CR25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/07421222.1998.11518185","volume":"14","author":"SL Jarvenpaa","year":"1998","unstructured":"Jarvenpaa, S.L., Knoll, K., Leidner, D.E.: Is anybody out there? Antecedents of trust in global virtual teams. J. Manag. Inf. Syst. 14(4), 29\u201364 (1998)","journal-title":"J. Manag. Inf. Syst."},{"issue":"3","key":"516_CR26","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/S1567-4223(03)00025-5","volume":"2","author":"N Lim","year":"2003","unstructured":"Lim, N.: Consumer\u2019s Perceived Risk: Sources versus Consequences. Electron. Commer. Res. Appl. 2(3), 216\u2013228 (2003)","journal-title":"Electron. Commer. Res. Appl."},{"key":"516_CR27","unstructured":"Ahn, J.H., Choi, K.C., Sung, K.M., Lee, J.H.: A study on the impact of security risk on the usage of knowledge management system: focus on parameter of trust. In: International Conference on Information systems, vol.15"},{"issue":"2","key":"516_CR28","first-page":"149","volume":"15","author":"Y Hexin","year":"2014","unstructured":"Hexin, Y., Ahn, J.C.: An empirical analysis on the persistent usage of personal cloud service: a cast study of China. Proc. Korean Soc. Internet Inf. Conf. 15(2), 149\u2013150 (2014)","journal-title":"Proc. Korean Soc. Internet Inf. Conf."},{"issue":"1","key":"516_CR29","doi-asserted-by":"crossref","first-page":"15","DOI":"10.7838\/jsebs.2014.19.1.015","volume":"19","author":"CJ Jun","year":"2014","unstructured":"Jun, C.J., Lee, J.H., Jeon, I.S.: Research about factor affecting the continuous use of cloud storage service: user factor, system factor, psychological switching cost factor. J. Soc. e-Bus. Stud. 19(1), 15\u201342 (2014)","journal-title":"J. Soc. e-Bus. Stud."},{"issue":"12","key":"516_CR30","first-page":"155","volume":"11","author":"KK Seo","year":"2013","unstructured":"Seo, K.K.: Factor analysis of the cloud service adoption intension of Korean firms: applying the TAM and VAM. J. Digit Policy Manag. 11(12), 155\u2013160 (2013)","journal-title":"J. Digit Policy Manag."},{"issue":"3","key":"516_CR31","first-page":"1408","volume":"12","author":"CS Park","year":"2011","unstructured":"Park, C.S.: Study on security considerations in the cloud computing. J Korea Acad.-Ind. Co-op. Soc. 12(3), 1408\u20131416 (2011)","journal-title":"J Korea Acad.-Ind. Co-op. Soc."},{"key":"516_CR32","doi-asserted-by":"crossref","unstructured":"Siani, P., Azzedine, B.: Privacy, security and trust issues arising from cloud computing. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, pp. 693\u2013702 (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"key":"516_CR33","unstructured":"Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing. Gartner (2008)"},{"key":"516_CR34","unstructured":"Almond, C.: A Practical Guide to Cloud Computing Security What You Need to Know Now About Your Business and Cloud Security, pp. 6\u201327. Avanade Inc. (2009)"},{"issue":"3","key":"516_CR35","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"516_CR36","doi-asserted-by":"crossref","unstructured":"Foster, T., Zhao, Y., Lu, S.: Cloud computing resource management through a grid middleware: a case study with diet and eucalyptus. Cloud computing. In: IEEE International Conference, pp. 151\u2013154 (2009). Accessed 25 August (2015)","DOI":"10.1109\/CLOUD.2009.70"},{"key":"516_CR37","unstructured":"Tarrant, D., Brody, T., Carr, L.: From the desktop to the cloud: leveraging hybrid storage architectures in your repository. In: International Conference on Open Repositories. http:\/\/eprints.soton.ac.uk\/267084\/1\/or09.pdf (2009). Accessed 25 August (2015)"},{"key":"516_CR38","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709\u2013734 (1995)"},{"key":"516_CR39","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.im.2004.01.003","volume":"42","author":"C Liu","year":"2005","unstructured":"Liu, C., Marchewka, J.T., Lu, J., Yu, C.S.: Beyond concern\u2014a privacy-trust-behavioral intention model of electronic commerce. Inf. Manag. 42, 289\u2013304 (2005)","journal-title":"Inf. Manag."},{"key":"516_CR40","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.jbusres.2006.02.006","volume":"59","author":"MA Eastlick","year":"2006","unstructured":"Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59, 877\u2013886 (2006)","journal-title":"J. Bus. Res."},{"key":"516_CR41","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1016\/j.elerap.2011.07.003","volume":"10","author":"C Liao","year":"2011","unstructured":"Liao, C., Liu, C.C., Chen, K.: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model. Electron. Commer. Res. Appl. 10, 702\u2013715 (2011)","journal-title":"Electron. Commer. Res. Appl."},{"key":"516_CR42","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s10586-014-0356-1","volume":"18","author":"MJ Rho","year":"2015","unstructured":"Rho, M.J., Kim, H.S., Chung, K.Y., Choi, I.Y.: Factors influencing the acceptance of telemedicine for diabetes management. Clust. Comput. 18, 321\u2013331 (2015)","journal-title":"Clust. Comput."},{"key":"516_CR43","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Org. Behav. Hum. Decis. Process. 50, 179\u2013211 (1991)","journal-title":"Org. Behav. Hum. Decis. Process."},{"issue":"4","key":"516_CR44","first-page":"1","volume":"51","author":"S Barnes","year":"2011","unstructured":"Barnes, S., Bohringer, M.: Modeling user continuance behavior in microblogging services: the case of Twitter. J. Comput. Inf. Syst. 51(4), 1\u201310 (2011)","journal-title":"J. Comput. Inf. Syst."},{"issue":"4","key":"516_CR45","first-page":"68","volume":"14","author":"E Burtescu","year":"2010","unstructured":"Burtescu, E.: Reliability and security\u2014convergence or divergence. Inf. Econ. 14(4), 68\u201377 (2010)","journal-title":"Inf. Econ."},{"key":"516_CR46","volume-title":"Ontological Foundations of Information Systems","author":"R Weber","year":"1997","unstructured":"Weber, R.: Ontological Foundations of Information Systems. Buscombe Vicprint, Blackburn, Victoria (1997)"},{"issue":"4","key":"516_CR47","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1111\/j.1467-6494.1967.tb01454.x","volume":"35","author":"JB Rotter","year":"1967","unstructured":"Rotter, J.B.: A new scale for measurement of interpersonal trust. J. Personal. 35(4), 651\u2013665 (1967)","journal-title":"J. Personal."},{"key":"516_CR48","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF01923529","volume":"49","author":"M Wiliamson","year":"1993","unstructured":"Wiliamson, M.: Invaders, weeds and the risk from genetically modified organisms. Experientia 49, 219\u2013224 (1993)","journal-title":"Experientia"},{"issue":"3","key":"516_CR49","doi-asserted-by":"crossref","first-page":"393","DOI":"10.5465\/AMR.1998.926617","volume":"23","author":"D Rousseau","year":"1998","unstructured":"Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manag. Rev. 23(3), 393\u2013404 (1998)","journal-title":"Acad. Manag. Rev."},{"issue":"3","key":"516_CR50","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101\u2013134 (2003)","journal-title":"Int. J. Electron. Commer."},{"key":"516_CR51","doi-asserted-by":"crossref","unstructured":"Grazioli, S., Jarvenpaa, S.: Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers. IEEE Trans. Syst. Man Cybern. 30(4), 395\u2013410 (2000)","DOI":"10.1109\/3468.852434"},{"key":"516_CR52","unstructured":"John, W.R., James, F.R.: Cloud Computing: Implementation, Management and Security. CRC Press (2010)"},{"key":"516_CR53","doi-asserted-by":"crossref","unstructured":"Savola.: The Savola Group Annual Report 2010. http:\/\/www.savola.com\/SavolaE\/pdf\/Savola_Annual_Report_2010_E.pdf (2010). Accessed 25 August (2015)","DOI":"10.1109\/SECURWARE.2010.12"},{"issue":"3","key":"516_CR54","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived Usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"2","key":"516_CR55","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"45","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 45(2), 186\u2013204 (2000)","journal-title":"Manag. Sci."},{"key":"516_CR56","unstructured":"Hansmann, K.W., Ringle, C.M.: SmartPLS Manual. http:\/\/forum.smartpls.com\/viewtopic.php?f=2&t=1700 (2004). Accessed 25 August (2015)"},{"issue":"2","key":"516_CR57","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7","volume":"20","author":"J Hulland","year":"1999","unstructured":"Hulland, J.: Use of partial least squares (PLS) in strategic management research: a review of four recent studies. Strateg. Manag. J. 20(2), 195\u2013204 (1999)","journal-title":"Strateg. Manag. J."},{"key":"516_CR58","first-page":"52","volume-title":"Advanced Methods in Marketing Research","author":"C Fornell","year":"1994","unstructured":"Fornell, C., Cha, J.: Partial least squares. In: Bagozzi, R.P. (ed.) Advanced Methods in Marketing Research, pp. 52\u201378. Blackwell, Cambridge (1994)"},{"issue":"1","key":"516_CR59","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.: Structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39\u201350 (1981)","journal-title":"J. Mark. Res."}],"updated-by":[{"DOI":"10.1007\/s10586-016-0572-y","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000}}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0516-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-015-0516-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0516-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T18:33:14Z","timestamp":1748716394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-015-0516-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,23]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["516"],"URL":"https:\/\/doi.org\/10.1007\/s10586-015-0516-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,23]]}}}