{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:06:13Z","timestamp":1763017573959},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T00:00:00Z","timestamp":1442188800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s10796-015-9594-x","type":"journal-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T07:06:48Z","timestamp":1442214408000},"page":"253-263","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A study on the antecedents of healthcare information protection intention"],"prefix":"10.1007","volume":"18","author":[{"given":"Chang-Gyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hee-Jun","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,14]]},"reference":[{"key":"9594_CR1","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1287\/isre.1100.0327","volume":"21","author":"R. Agarwal","year":"2010","unstructured":"Agarwal, R., Gao, G. G., DesRoches, C., & Jha, A. K. (2010). Research commentary\u2014the digital transformation of healthcare: current status and the road ahead. Information Systems Research, 21, 796\u2013809.","journal-title":"Information Systems Research"},{"key":"9594_CR2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I. Ajzen","year":"1991","unstructured":"Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179\u2013211.","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"9594_CR3","unstructured":"Al-Omari, A., El-Gayar, O., & Deokar, A. (2012). Security policy compliance: User acceptance perspective, system science (HICSS), 2012 45th Hawaii international conference on. IEEE."},{"key":"9594_CR4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1287\/isre.1100.0335","volume":"22","author":"C.L. Anderson","year":"2011","unstructured":"Anderson, C. L., & Agarwal, R. (2011). The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22, 469\u2013490.","journal-title":"Information Systems Research"},{"key":"9594_CR5","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1016\/j.ijmedinf.2006.06.002","volume":"76","author":"E. B\u00f8nes","year":"2007","unstructured":"B\u00f8nes, E., Hasvold, P., Henriksen, E., & Stranden\u00e6s, T. (2007). Risk analysis of information security in a mobile instant messaging and presence system for healthcare. International Journal of Medical Informatics, 76, 677\u2013687.","journal-title":"International Journal of Medical Informatics"},{"key":"9594_CR6","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B. Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34, 523\u2013556.","journal-title":"MIS Quarterly"},{"key":"9594_CR7","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.ijinfomgt.2007.12.002","volume":"28","author":"D.H.J. Caro","year":"2008","unstructured":"Caro, D. H. J. (2008). Deconstructing symbiotic dyadic e-health networks: transnational and transgenic perspectives. International Journal of Information Management, 28, 94\u2013101.","journal-title":"International Journal of Information Management"},{"key":"9594_CR8","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/15536548.2005.10855772","volume":"1","author":"M. Chan","year":"2005","unstructured":"Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of Information Privacy and Security, 1, 18\u201341.","journal-title":"Journal of Information Privacy and Security"},{"key":"9594_CR9","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.im.2008.12.004","volume":"46","author":"I. Chang","year":"2009","unstructured":"Chang, I., Hwang, H. G., Hung, M. C., Kuo, K. M., & Yen, D. C. (2009). Factors affecting cross-hospital exchange of electronic medical records. Information & Management, 46, 109\u2013115.","journal-title":"Information & Management"},{"key":"9594_CR10","doi-asserted-by":"crossref","unstructured":"Colling R.L., & York T.W. 2010 Electronic security system integration. Hospital and Healthcare Security (Fifth Edition)","DOI":"10.1016\/B978-1-85617-613-2.00018-5"},{"key":"9594_CR11","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"D.R. Compeau","year":"1995","unstructured":"Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: development of a measure and initial test. MIS Quarterly, 19, 189\u2013211.","journal-title":"MIS Quarterly"},{"key":"9594_CR12","doi-asserted-by":"crossref","unstructured":"Crossler R.E. 2010. Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data. System Sciences (HICSS), 2010 43rd Hawaii international conference on. IEEE.","DOI":"10.1109\/HICSS.2010.311"},{"key":"9594_CR13","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10551-008-9909-7","volume":"89","author":"J. D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 59\u201371.","journal-title":"Journal of Business Ethics"},{"key":"9594_CR14","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J. D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20, 79\u201398.","journal-title":"Information Systems Research"},{"key":"9594_CR15","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/341852.341877","volume":"43","author":"G. Dhillon","year":"2000","unstructured":"Dhillon, G., & Backhouse, J. (2000). Technical opinion: information system security management in the new millennium. Communications of the ACM, 43, 125\u2013128.","journal-title":"Communications of the ACM"},{"key":"9594_CR16","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1080\/17517575.2010.541287","volume":"5","author":"L. Duan","year":"2011","unstructured":"Duan, L., Street, W. N., & Xu, E. (2011). Healthcare information systems: data mining methods in the creation of a clinical recommender system. Enterprise Information Systems, 5, 169\u2013181.","journal-title":"Enterprise Information Systems"},{"key":"9594_CR17","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1037\/h0053870","volume":"51","author":"W. Edwards","year":"1954","unstructured":"Edwards, W. (1954). The theory of decision making. Psychological Bulletin, 51, 380\u2013417.","journal-title":"Psychological Bulletin"},{"key":"9594_CR18","unstructured":"GE. 2012. \u201cCentricity Radiology Mobile Access.\u201d http:\/\/www3.gehealthcare.com\/en\/Products\/Categories\/Healthcare_IT\/Medical_Imaging_Informatics_-_RIS-PACS-CVIS\/Centricity_Radiology_Mobile_Access . Accessed Dec 2013."},{"key":"9594_CR19","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/07421222.1997.11518141","volume":"13","author":"R.D. Gopal","year":"1997","unstructured":"Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13, 29\u201348.","journal-title":"Journal of Management Information Systems"},{"key":"9594_CR20","unstructured":"GOVTECH. 2012. \u201cUtah CIO Steve Fletcher Resigns, State Promises Security Reforms.\u201d http:\/\/www.govtech.com\/policy-management\/Utah-CIO-Steve-Fletcher-Resigns-State-Promises-Security-Reforms.html Accessed Dec 2013."},{"key":"9594_CR21","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.ijmedinf.2003.12.011","volume":"73","author":"D. Gritzalis","year":"2004","unstructured":"Gritzalis, D., & Lambrinoudakis, C. (2004). A security architecture for interconnecting health information systems. International Journal of Medical Informatics, 73, 305\u2013310.","journal-title":"International Journal of Medical Informatics"},{"key":"9594_CR22","doi-asserted-by":"crossref","first-page":"257","DOI":"10.2307\/249656","volume":"20","author":"S.J. Harrington","year":"1996","unstructured":"Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20, 257\u2013278.","journal-title":"MIS Quarterly"},{"key":"9594_CR23","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10796-011-9316-y","volume":"14","author":"D.D. He","year":"2012","unstructured":"He, D. D., Yang, J., Compton, M., & Taylor, K. (2012). Authorization in cross-border eHealth systems. Information Systems Frontiers, 14, 43\u201355.","journal-title":"Information Systems Frontiers"},{"key":"9594_CR24","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T. Herath","year":"2009","unstructured":"Herath, T., & Rao, H. (2009). Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47, 154\u2013165.","journal-title":"Decision Support Systems"},{"key":"9594_CR25","unstructured":"HIMSS 2012. \u201cHIMSS Annual Security Survey Results.\u201d Accessed Dec 2013. http:\/\/www.himss.org\/ASP\/topics_FocusDynamic.asp?faid=280"},{"key":"9594_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0277-9536(95)00314-2","volume":"43","author":"N. Hupert","year":"1996","unstructured":"Hupert, N., Lawthers, A. G., Brennan, T. A., & Peterson, L. M. (1996). Processing the tort deterrent signal: a qualitative study. Social Science & Medicine, 43, 1\u201311.","journal-title":"Social Science & Medicine"},{"key":"9594_CR27","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0065-2458(03)61003-X","volume":"61","author":"A. Hurson","year":"2004","unstructured":"Hurson, A., Ploskonka, J., Jiao, Y., & Haridas, H. (2004). Security issues and solutions in distributed heterogeneous mobile database systems. Advances in Computers, 61, 107\u2013198.","journal-title":"Advances in Computers"},{"key":"9594_CR28","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P. Ifinedo","year":"2011","unstructured":"Ifinedo, P. (2011). Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31, 83\u201395.","journal-title":"Computers & Security"},{"key":"9594_CR29","unstructured":"ITRC. 2012. \u201c2012 ITRC Breach Report.\u201d http:\/\/www.idtheftcenter.org\/artman2\/publish\/lib_survey\/Breaches_2012.shtml . Accessed Dec 2013."},{"key":"9594_CR30","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/S0167-4048(02)00212-2","volume":"21","author":"L. Janczewski","year":"2002","unstructured":"Janczewski, L., & Xinli Shi, F. (2002). Development of information security baselines for healthcare information systems in New Zealand. Computers & Security, 21, 172\u2013192.","journal-title":"Computers & Security"},{"key":"9594_CR31","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"A.C. Johnston","year":"2010","unstructured":"Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34, 549\u2013566.","journal-title":"MIS Quarterly"},{"key":"9594_CR32","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","volume":"23","author":"A. Kankanhalli","year":"2003","unstructured":"Kankanhalli, A., Teo, H. H., Tan, B. C. Y., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23, 139\u2013154.","journal-title":"International Journal of Information Management"},{"key":"9594_CR33","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1108\/09685229910255179","volume":"7","author":"L.F. Kwok","year":"1999","unstructured":"Kwok, L. F., & Longley, D. (1999). Information security management and modeling. Information Management & Computer Security, 7, 30\u201339.","journal-title":"Information Management & Computer Security"},{"key":"9594_CR34","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/0378-7206(95)00002-E","volume":"28","author":"K.C.K. Law","year":"1995","unstructured":"Law, K. C. K., Ip, H. H. S., & Chan, S. L. (1995). An investigation of a cost-effective solution for multimedia medical information management. Information & Management, 28, 361\u2013376.","journal-title":"Information & Management"},{"key":"9594_CR35","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1016\/j.im.2003.08.008","volume":"41","author":"S.M. Lee","year":"2004","unstructured":"Lee, S. M., Lee, S. G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41, 707\u2013718.","journal-title":"Information & Management"},{"key":"9594_CR36","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.ijmedinf.2011.09.005","volume":"80","author":"M. Lluch","year":"2011","unstructured":"Lluch, M. (2011). Healthcare professionals\u2019 organisational barriers to health information technologies\u2014a literature review. International Journal of Medical Informatics, 80, 849\u2013862.","journal-title":"International Journal of Medical Informatics"},{"key":"9594_CR37","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.ijinfomgt.2003.12.011","volume":"24","author":"D.P. Lorence","year":"2004","unstructured":"Lorence, D. P., & Spink, A. (2004). Healthcare information systems outsourcing. International Journal of Information Management, 24, 131\u2013145.","journal-title":"International Journal of Information Management"},{"key":"9594_CR38","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","volume":"30","author":"S. Milne","year":"2006","unstructured":"Milne, S., Sheeran, P., & Orbell, S. (2006). Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30, 106\u2013143.","journal-title":"Journal of Applied Social Psychology"},{"key":"9594_CR39","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s10796-011-9296-y","volume":"14","author":"A. Mouttham","year":"2012","unstructured":"Mouttham, A., Kuziemsky, C., Langayan, D., Peyton, L., & Pereira, J. (2012). Interoperable support for collaborative, mobile, and accessible health care. Information Systems Frontiers, 14, 73\u201385.","journal-title":"Information Systems Frontiers"},{"key":"9594_CR40","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","volume":"46","author":"B.Y. Ng","year":"2009","unstructured":"Ng, B. Y., Kankanhalli, A., & Xu, Y. (2009). Studying users\u2019 computer security behavior: a health belief perspective. Decision Support Systems, 46, 815\u2013825.","journal-title":"Decision Support Systems"},{"key":"9594_CR41","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/s10796-012-9361-1","volume":"16","author":"P. Poba-Nzaou","year":"2014","unstructured":"Poba-Nzaou, P., Uwizeyemungu, S., Raymond, L., & Par\u00e9, G. (2014). Motivations underlying the adoption of ERP systems in healthcare organizations: insights from online stories. Information Systems Frontiers, 16, 591\u2013605.","journal-title":"Information Systems Frontiers"},{"key":"9594_CR42","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1037\/0022-3514.52.3.596","volume":"52","author":"P.A. Rippetoe","year":"1987","unstructured":"Rippetoe, P. A., & Rogers, R. W. (1987). Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. Journal of Personality and Social Psychology, 52, 596\u2013604.","journal-title":"Journal of Personality and Social Psychology"},{"key":"9594_CR43","unstructured":"Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychophysiology."},{"key":"9594_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9997-5","volume":"38","author":"Z. Siddiqui","year":"2014","unstructured":"Siddiqui, Z., Abdullah, A. H., Khan, M. K., & Alghamdi, A. S. (2014). Smart environment as a service: three factor cloud based user authentication for telecare medical information system. Journal of Medical Systems, 38, 1\u201314.","journal-title":"Journal of Medical Systems"},{"key":"9594_CR45","unstructured":"Siemens. 2012. \u201c http:\/\/syngo.via .\u201d http:\/\/healthcare.siemens.com\/medical-imaging-it\/clinical-imaging-applications\/syngovia . Accessed Dec 2013."},{"key":"9594_CR46","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"M.T. Siponen","year":"2000","unstructured":"Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8, 31\u201341.","journal-title":"Information Management & Computer Security"},{"key":"9594_CR47","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2307\/249307","volume":"14","author":"D.W. Straub Jr","year":"1990","unstructured":"Straub Jr., D. W., & Nance, W. D. (1990). Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly, 14, 45\u201360.","journal-title":"MIS Quarterly"},{"key":"9594_CR48","doi-asserted-by":"crossref","first-page":"441","DOI":"10.2307\/249551","volume":"22","author":"D.W. Straub","year":"1998","unstructured":"Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: security planning models for management decision making. Management Information Systems Quarterly, 22, 441\u2013470.","journal-title":"Management Information Systems Quarterly"},{"key":"9594_CR49","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/s10796-010-9280-y","volume":"14","author":"S.Y. Teoh","year":"2012","unstructured":"Teoh, S. Y., Pan, S. L., & Ramchand, A. M. (2012). Resource management activities in healthcare information systems: a process perspective. Information Systems Frontiers, 14, 585\u2013600.","journal-title":"Information Systems Frontiers"},{"key":"9594_CR50","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.cose.2005.05.002","volume":"24","author":"M. Theoharidou","year":"2005","unstructured":"Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24, 472\u2013484.","journal-title":"Computers & Security"},{"key":"9594_CR51","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A. Vance","year":"2012","unstructured":"Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49, 190\u2013198.","journal-title":"Information & Management"},{"key":"9594_CR52","first-page":"139","volume":"16","author":"F. Williams","year":"2008","unstructured":"Williams, F., & Boren, S. A. (2008). The role of the electronic medical record (EMR) in care delivery development in developing countries: a systematic review. Informatics in Primary Care, 16, 139\u2013145.","journal-title":"Informatics in Primary Care"},{"key":"9594_CR53","unstructured":"Woon, I., Tan, G.W., & Low, R. 2005 A protection motivation theory approach to home wireless security, ICIS 2005 proceedings"},{"key":"9594_CR54","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","volume":"24","author":"M. Workman","year":"2008","unstructured":"Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: a threat control model and empirical test. Computers in Human Behavior, 24, 2799\u20132816.","journal-title":"Computers in Human Behavior"},{"key":"9594_CR55","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.dss.2011.03.003","volume":"51","author":"I.L. Wu","year":"2011","unstructured":"Wu, I. L., Li, J. Y., & Fu, C. Y. (2011). The adoption of mobile healthcare by hospital\u2019s professionals: an integrative perspective. Decision Support Systems, 51, 587\u2013596.","journal-title":"Decision Support Systems"},{"key":"9594_CR56","doi-asserted-by":"crossref","first-page":"3507","DOI":"10.1007\/s10916-011-9789-8","volume":"36","author":"W. Yao","year":"2012","unstructured":"Yao, W., Chu, C.-H., & Li, Z. (2012). The adoption and implementation of RFID technologies in healthcare: a literature review. Journal of Medical Systems, 36, 3507\u20133525.","journal-title":"Journal of Medical Systems"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-015-9594-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-015-9594-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-015-9594-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T09:42:59Z","timestamp":1567158179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-015-9594-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,14]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["9594"],"URL":"https:\/\/doi.org\/10.1007\/s10796-015-9594-x","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,14]]}}}