{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T18:58:59Z","timestamp":1777143539434,"version":"3.51.4"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100000155","name":"Social Sciences and Humanities Research Council of Canada","doi-asserted-by":"publisher","award":["eQulaity Partnership Grant"],"award-info":[{"award-number":["eQulaity Partnership Grant"]}],"id":[{"id":"10.13039\/501100000155","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10676-018-9492-2","type":"journal-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T07:21:41Z","timestamp":1543821701000},"page":"167-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":182,"title":["Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6449-5303","authenticated-orcid":false,"given":"Priscilla M.","family":"Regan","sequence":"first","affiliation":[]},{"given":"Jolene","family":"Jesse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"9492_CR1","unstructured":"Alarcon, A., Zeide, E., Rosenblat, A., Wikelius, K., boyd, d., Gangadharan, S. P., & Yu, C. (2014). Data & Civil Rights: Education primer, produced for Data & Civil Rights Conference. Accessed March 15, 2016, from http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2542268 ."},{"issue":"2","key":"9492_CR2","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1177\/1478210316652008","volume":"15","author":"M Baltodano","year":"2017","unstructured":"Baltodano, M. (2017). The power brokers of neoliberalism: Philanthrocapitalists and public education. Policy Futures in Education, 15(2), 141\u2013156.","journal-title":"Policy Futures in Education"},{"key":"9492_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1017\/CBO9781107590205.004","volume-title":"Privacy, big data, and the public good: Frameworks for engagement","author":"S Barocas","year":"2014","unstructured":"Barocas, S., & Nissenbaum, H. (2014). Big data\u2019s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (p.\u00a044). New York: Cambridge University Press."},{"key":"9492_CR4","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas, S., & Selbst, A. D. (2016). Big data\u2019s disparate impact. California Law Review 104, 671\u2013732.","journal-title":"California Law Review"},{"key":"9492_CR5","doi-asserted-by":"crossref","DOI":"10.7591\/9781501722134","volume-title":"Regulating privacy: Data protection and public policy in Europe and the United States","author":"CJ Bennett","year":"1992","unstructured":"Bennett, C. J. (1992). Regulating privacy: Data protection and public policy in Europe and the United States. Ithaca: Cornell University Press."},{"key":"9492_CR6","unstructured":"Bienkowski, M. (2017). Implications of privacy concerns for using student data for research: Panel summary. Workshop on Big Data in Education. Accessed March 4, 2018, from https:\/\/naeducation.org\/wp-content\/uploads\/2017\/05\/Bienkowski-FINAL.pdf ."},{"key":"9492_CR7","unstructured":"Bienkowski, M., Feng, M., & Means, B. (2012). Enhancing teaching and learning through educational analytics and data mining. Center for Technology and Learning, SRI International. Accessed March 1, 2018, from https:\/\/tech.ed.gov\/wp-content\/uploads\/2014\/03\/edm-la-brief.pdf ."},{"key":"9492_CR8","unstructured":"Bogle, A. (2014). What the failure of InBloom means for the student-data industry. Slate Future Tense Blog. Accessed March 8, 2016, from http:\/\/www.slate.com\/blogs\/future_tense\/2014\/04\/24\/what_the_failure_of_inbloom_means_for_the_student_data_industry.html ."},{"key":"9492_CR9","unstructured":"Boninger, F., Molnar, A., & Murray, K. (2017). Asleep at the Switch: Schoolhouse commercialism, student privacy, and the failure of policymaking. National Education Policy Center: Report on Schoolhouse Commercialization Trends. Accessed February 1, 2018, from http:\/\/nepc.colorado.edu\/files\/publications\/RB%20Trends%202017_2.pdf ."},{"key":"9492_CR10","unstructured":"Bulger, M. (2016). Personalized learning: The conversations we\u2019re not having, Working Paper 07.22.2016. Data and Society Research Institute. Accessed February 3, 2018, from https:\/\/datasociety.net\/pubs\/ecl\/PersonalizedLearning_primer_2016.pdf ."},{"key":"9492_CR11","doi-asserted-by":"crossref","unstructured":"Bulger, M., McCormick, P., & Pitcan, M. (2017). The legacy of inBloom, Working Paper 02.02.2017. Data and Society Research Institute. Accessed February 3, 2018, from https:\/\/datasociety.net\/pubs\/ecl\/InBloom_feb_2017.pdf .","DOI":"10.69985\/KLUL2611"},{"key":"9492_CR12","unstructured":"Burris, C. C., & Garrity, D. T. (2008). Detracking for excellence and equity,\u201d see especially Chap. 2 \u201cWhat Tracking is and How to Start Dismantling It.\u201d Accessed March 15, 2016, from http:\/\/www.ascd.org\/publications\/books\/108013\/chapters\/What-Tracking-Is-and-How-to-Start-Dismantling-It.aspx ."},{"key":"9492_CR13","unstructured":"Campolo, A., Sanfilippo, M., Whittaker, M., & Crawford, K. (2017). AI Now 2017 Report. Accessed March 3, 2018, from https:\/\/ainowinstitute.org\/AI_Now_2017_Report.pdf ."},{"key":"9492_CR14","first-page":"101","volume":"89","author":"DK Citron","year":"2014","unstructured":"Citron, D. K., & Pasquale, F. (2014). The scored society: Due process for automated predictions. Washington Law Review, 89, 101\u2013133.","journal-title":"Washington Law Review"},{"key":"9492_CR15","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.2307\/1229517","volume":"52","author":"JE Cohen","year":"2000","unstructured":"Cohen, J. E. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52, 1373\u20131438.","journal-title":"Stanford Law Review"},{"key":"9492_CR16","first-page":"93","volume":"55","author":"K Crawford","year":"2014","unstructured":"Crawford, K., & Schultz, J. (2014). Big data and due process: Toward a framework to redress predictive privacy harms. Boston College Law Review, 55, 93\u2013128.","journal-title":"Boston College Law Review"},{"key":"9492_CR17","unstructured":"Data Quality Campaign. (2015). State student data privacy legislation: What happened in 2015, and what is next? Accessed February 15, 2016, from https:\/\/2pido73em67o3eytaq1cp8au-wpengine.netdna-ssl.com\/wp-content\/uploads\/2016\/03\/DQC-Student-Data-Laws-2015-Sept23.pdf ."},{"key":"9492_CR18","unstructured":"Data Quality Campaign. (2017). Education data legislation review: 2017 state activity. Accessed January 28, 2018, from https:\/\/2pido73em67o3eytaq1cp8au-wpengine.netdna-ssl.com\/wp-content\/uploads\/2017\/09\/DQC-Legislative-summary-0926017.pdf ."},{"issue":"9","key":"9492_CR19","first-page":"S6","volume":"35","author":"MR Davis","year":"2015","unstructured":"Davis, M. R. (2015). Lessons learned from security breaches. Education Week, 35(9), S6\u2013S7.","journal-title":"Education Week"},{"issue":"17","key":"9492_CR20","first-page":"1","volume":"36","author":"L Doran","year":"2017","unstructured":"Doran, L. (2017). Ransomware attacks force school districts to shore up\u2013or pay up. Education Week, 36(17), 1\u201310.","journal-title":"Education Week"},{"key":"9492_CR21","unstructured":"Effrem, K. R. (2018). 6 Key takeaways from Congress\u2019 hearing on protecting student data. The National Pulse. Accessed August 15, 2018, from https:\/\/thenationalpulse.com\/commentary\/6-key-takeaways-congress-hearing-protecting-student-data\/ ."},{"key":"9492_CR22","first-page":"829","volume":"14","author":"W English","year":"2016","unstructured":"English, W. (2016). Two cheers for nudging. Georgetown Journal of Law and Public Policy, 14, 829\u2013840.","journal-title":"Georgetown Journal of Law and Public Policy"},{"key":"9492_CR23","volume-title":"Protecting privacy in surveillance societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States","author":"D Flaherty","year":"1989","unstructured":"Flaherty, D. (1989). Protecting privacy in surveillance societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill: University of North Carolina Press."},{"key":"9492_CR24","unstructured":"Future of Privacy Forum and Software & Information Industry Association. (2018). K-12 school service provider pledge to safeguard student privacy. Accessed August 20, 2018, from https:\/\/studentprivacypledge.org\/privacy-pledge\/ ."},{"key":"9492_CR25","first-page":"199","volume":"6","author":"RM Gellman","year":"1993","unstructured":"Gellman, R. M. (1993). Fragmented, incomplete, and discontinuous: The failure of federal privacy regulatory proposals and institutions. Software Law Journal, 6, 199.","journal-title":"Software Law Journal"},{"key":"9492_CR26","first-page":"81","volume":"66","author":"W Hartzog","year":"2013","unstructured":"Hartzog, W., & Selinger, E. (2013a). Big data in small hands. Stanford Law Review Online, 66, 81\u201388.","journal-title":"Stanford Law Review Online"},{"key":"9492_CR27","unstructured":"Hartzog, W., & Selinger, E. (2013b). Obscurity: A better way to think about your data than privacy, Atlantic. Accessed January 10, 2016, from http:\/\/www.theatlantic.com\/technology\/archive\/2013\/01\/obscurity-a-better-way-to-think-about-your-data-than-privacy\/267283\/ ."},{"key":"9492_CR28","unstructured":"Herold, B. (2014). InBloom to shut down amid growing data-privacy concerns, Education Week. Accessed March 8, 2016, from http:\/\/blogs.edweek.org\/edweek\/DigitalEducation\/2014\/04\/inbloom_to_shut_down_amid_growing_data_privacy_concerns.html ."},{"key":"9492_CR29","unstructured":"Herold, B. (2017). Personalized learning: Modest gains, big challenges, RAND study finds, Education Week. https:\/\/blogs.edweek.org\/edweek\/DigitalEducation\/2017\/07\/personalized_learning_research_implementation_RAND.html . Accessed 10 February 2018."},{"key":"9492_CR30","unstructured":"Horn, M. B., & Staker, H. (2011). The rise of K-12 blended learning. Innosight Institute. Accessed January 20, 2018, from https:\/\/www.christenseninstitute.org\/publications\/the-rise-of-k-12-blended-learning\/ ."},{"key":"9492_CR31","unstructured":"Horn, M. B., Staker, H., & Christensen, C. (2013). Is K-12 blended learning disruptive? An introduction to the theory of hybrids. Accessed January 20, 2018, from https:\/\/www.christenseninstitute.org\/publications\/hybrids\/ ."},{"key":"9492_CR32","first-page":"807","volume":"14","author":"JT Kelly","year":"2016","unstructured":"Kelly, J. T. (2016). Non-paternalist nudges. Georgetown Journal of Law and Public Policy, 14, 807\u2013816.","journal-title":"Georgetown Journal of Law and Public Policy"},{"key":"9492_CR33","first-page":"65","volume":"66","author":"I Kerr","year":"2013","unstructured":"Kerr, I., & Earle, J. (2013). Prediction, preemption, presumption: How big data threatens big picture privacy. Stanford Law Review Online, 66, 65\u201372.","journal-title":"Stanford Law Review Online"},{"key":"9492_CR34","unstructured":"Kohli, S. (2014). Modern-day segregation in public schools, The Atlantic. Accessed March 1, 2016, from http:\/\/www.theatlantic.com\/education\/archive\/2014\/11\/modern-day-segregation-in-public-schools\/382846\/ ."},{"key":"9492_CR35","first-page":"55","volume":"66","author":"J Lerman","year":"2013","unstructured":"Lerman, J. (2013). Big data and its exclusions. Stanford Law Review Online, 66, 55\u201363.","journal-title":"Stanford Law Review Online"},{"key":"9492_CR36","first-page":"663","volume":"14","author":"J Lichtenberg","year":"2016","unstructured":"Lichtenberg, J. (2016). For your own good: Informing, nudging, coercing. Georgetown Journal of Law and Public Policy, 14, 663\u2013682.","journal-title":"Georgetown Journal of Law and Public Policy"},{"key":"9492_CR37","unstructured":"Loveless, T. (2013). The resurgence of ability grouping and persistence of tracking, (Part II of the 2013 Brown Center Report on American Education), Brookings Report. Accessed March 3, 2016, from http:\/\/www.brookings.edu\/research\/reports\/2013\/03\/18-tracking-ability-grouping-loveless ."},{"key":"9492_CR38","unstructured":"Mirel, J. (2006). The traditional high school: Historical debates over its nature and function, Education Next (Winter) Vol\u00a06, No. 1, pp.\u00a014\u201321. http:\/\/eric.ed.gov\/?id=EJ763310 . Accessed 1 March 2016."},{"key":"9492_CR39","unstructured":"National Academy of Education Workshop Summary. (2017). Big data in education: Balancing the benefits of educational research and student privacy. Accessed February 23, 2018, from http:\/\/naeducation.org\/wp-content\/uploads\/2017\/05\/NAEd_BD_Booklet_FINAL_051717_3.pdf ."},{"key":"9492_CR40","unstructured":"National Association of State Boards of Education. (2015). Comparison of 2015 Federal Education Data Privacy Bills. Accessed August 15, 2018, from http:\/\/www.nasbe.org\/wp-content\/uploads\/2015-Federal-Education-Data-Privacy-Bills-Comparison-2015.07.22-Public.pdf ."},{"key":"9492_CR41","unstructured":"New, J. (2016). Building a data-driven education system in the United States. Center for Data Innovation. Accessed August 15, 2018, from http:\/\/www2.datainnovation.org\/2016-data-driven-education.pdf ."},{"key":"9492_CR42","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1017\/CBO9781107590205.006","volume-title":"Privacy, big data, and the public good: Frameworks for engagement","author":"P Ohm","year":"2014","unstructured":"Ohm, P. (2014). General principles for data use and analysis. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp.\u00a096\u2013111). New York: Cambridge University Press."},{"key":"9492_CR43","unstructured":"Organization for Economic Cooperation and Development (OECD). (2015). Students, computers and learning: Making the connection. Programme for International Student Assessment, OECD Publishing. Accessed August 16, 2018, from https:\/\/read.oecd-ilibrary.org\/education\/students-computers-and-learning_9789264239555-en#page1 ."},{"key":"9492_CR44","unstructured":"Pane, J. F., Steiner, E. D., Baird, M. D., Hamilton, L. S., & Pane, J. D. (2017). Informing progress: Insights on personalized learning implementation and effects. RAND Report. Accessed February 13, 2018, from https:\/\/www.rand.org\/pubs\/research_reports\/RR2042.html ."},{"key":"9492_CR45","volume-title":"The filter bubble: How the new personalized web is changing what we read and how we think","author":"E Pariser","year":"2011","unstructured":"Pariser, E. (2011). The filter bubble: How the new personalized web is changing what we read and how we think. New York: Penguin Books."},{"key":"9492_CR46","unstructured":"President\u2019s Council of Advisors on Science and Technology. (2014). Big data and privacy: A technological perspective. Accessed December 10, 2015, from http:\/\/www.whitehouse.gov\/sites\/default\/files\/microsites\/ostp\/PCAST\/pcast_big_data_and_privacy_-_may_2014.pdf ."},{"key":"9492_CR65","volume-title":"Legislating privacy: Technology, social values, and public policy","author":"PM Regan","year":"1995","unstructured":"Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill: University of North Carolina Press."},{"key":"9492_CR66","volume-title":"Analytics, policy and governance","author":"PM Regan","year":"2017","unstructured":"Regan, P. M. (2017). Big data and privacy. In J. Bachner, K. W. Hill, & B. Ginsberg (Eds.), Analytics, policy and governance. New Haven: Yale University Press."},{"key":"9492_CR68","unstructured":"Regan, P. M., & Bailey, J. (2018). Big data, privacy and education applications. In Presented at Surveillance Studies Network Conference, June 2018. Denmark: Aarhus University."},{"key":"9492_CR67","unstructured":"Regan, P. M., & Khwaja, E. T. (2017). Ethical implementation of big data in education: Policy and practices in the US and Canada. In Presented at the Law and Society Association Annual Conference, June 2017, Mexico City."},{"key":"9492_CR47","doi-asserted-by":"crossref","unstructured":"Roberts-Mahoney, H., Means, A. J., & Garrison, M. J. (2016). Netflixing human capital development: Personalized learning technology and the corporatization of K-12 education, Journal of Education Policy 1\u201316.","DOI":"10.1080\/02680939.2015.1132774"},{"key":"9492_CR48","unstructured":"Roscorla, T. (2016). 3 Student Data Privacy Bills that Congress Could Act On, Government Technology: Center for Digital Education. Accessed August 15, 2018, from http:\/\/www.govtech.com\/education\/k-12\/3-Student-Data-Privacy-Bills-That-Congress-Could-Act-On.html ."},{"issue":"2","key":"9492_CR49","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1093\/idpl\/ips036","volume":"3","author":"IS Rubinstein","year":"2013","unstructured":"Rubinstein, I. S. (2013). Big Data: The end of privacy or a new beginning? International Data Privacy Law, 3(2), 74\u201387.","journal-title":"International Data Privacy Law"},{"key":"9492_CR50","first-page":"815","volume":"32","author":"PM Schwartz","year":"2000","unstructured":"Schwartz, P. M. (2000). Internet privacy and the state. Connecticut Law Review, 32, 815.","journal-title":"Connecticut Law Review"},{"issue":"7","key":"9492_CR51","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.2307\/4093335","volume":"117","author":"PM Schwartz","year":"2004","unstructured":"Schwartz, P. M. (2004). Property, privacy, and personal data. Harvard Law Review, 117(7), 2055\u20132128.","journal-title":"Harvard Law Review"},{"key":"9492_CR52","unstructured":"Singer, N. (2013). Deciding Who Sees Students\u2019 Data, The New York Times. Accessed February 16, 2016, from http:\/\/www.nytimes.com\/2013\/10\/06\/business\/deciding-who-sees-students-data.html ."},{"key":"9492_CR53","unstructured":"Singer, N. (2014). InBloom student data repository to close. The New York Times Bit Blog. http:\/\/bits.blogs.nytimes.com\/2014\/04\/21\/inbloom-student-data-repository-to-close\/?_r=0 . Accessed 8 March 2016."},{"key":"9492_CR54","volume-title":"Understanding privacy","author":"D Solove","year":"2008","unstructured":"Solove, D. (2008). Understanding privacy. Cambridge: Harvard University Press."},{"key":"9492_CR55","unstructured":"Strauss, V. (2013). The bottom line on student tracking, The Washington Post. Accessed March 8, 2016, from https:\/\/www.washingtonpost.com\/news\/answer-sheet\/wp\/2013\/06\/10\/the-bottom-line-on-student-tracking\/ ."},{"issue":"2","key":"9492_CR56","first-page":"413","volume":"32","author":"CR Sunstein","year":"2015","unstructured":"Sunstein, C. R. (2015). The ethics of nudging. Yale Journal on Regulation, 32(2), 413\u2013450.","journal-title":"Yale Journal on Regulation"},{"key":"9492_CR57","unstructured":"Sweeney, L. (2000). Uniqueness of simple demographics in the US population (Laboratory for International Data Privacy, Working Paper LIDAP-WP4). Accessed December 10, 2015, from http:\/\/dataprivacylab.org\/projects\/identifiability\/index.html ."},{"key":"9492_CR58","unstructured":"Sweeney, L., Abu, A., & Winn, J. (2013). Identifying participants in the personal genome project by name, Harvard University Data Privacy Lab, White Paper 1021-1 (April 24). Accessed December 10, 2015, from http:\/\/dataprivacylab.org\/projects\/pgp\/1021-1.pdf ."},{"issue":"5","key":"9492_CR59","first-page":"239","volume":"11","author":"O Tene","year":"2013","unstructured":"Tene, O., & Polonetsky, J. (2013). Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239\u2013273,253.","journal-title":"Northwestern Journal of Technology and Intellectual Property"},{"key":"9492_CR60","unstructured":"Tucker, M. (2015). Student tracking vs academic pathways: Different\u2026 or the same? Education Week (October 15). Accessed March 8, 2016, from http:\/\/blogs.edweek.org\/edweek\/top_performers\/2015\/10\/tracking_vs_pathways_differentor_the_same.html ."},{"key":"9492_CR61","unstructured":"West, D. M. (2012). Big data for education: Data mining, data analytics, and web dashboards, Governance Studies at Brookings (September). Accessed March 5, 2016, from http:\/\/www.brookings.edu\/~\/media\/research\/files\/papers\/2012\/9\/04-education-technology-west\/04-education-technology-west.pdf ."},{"key":"9492_CR62","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin, A. (1967). Privacy and freedom. New York: Atheneum."},{"key":"9492_CR63","first-page":"101","volume":"8","author":"E Zeide","year":"2016","unstructured":"Zeide, E. (2016). Student privacy principles for the age of big data: Moving beyond FERPA and FIPPS. Drexel Law Review, 8, 101\u2013160.","journal-title":"Drexel Law Review"},{"key":"9492_CR64","first-page":"494","volume":"41","author":"E Zeide","year":"2017","unstructured":"Zeide, E. (2017). The limits of education purpose limitations. University of Miami Law Review, 41, 494\u2013527.","journal-title":"University of Miami Law Review"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9492-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9492-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9492-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:24:27Z","timestamp":1775291067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9492-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["9492"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9492-2","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"3 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}