{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T13:12:01Z","timestamp":1770037921662,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,1,9]],"date-time":"2016-01-09T00:00:00Z","timestamp":1452297600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10796-015-9620-z","type":"journal-article","created":{"date-parts":[[2016,1,9]],"date-time":"2016-01-09T05:43:28Z","timestamp":1452318208000},"page":"1133-1148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance"],"prefix":"10.1007","volume":"19","author":[{"given":"Tung-Hsien","family":"Wu","sequence":"first","affiliation":[]},{"given":"Shi-Ming","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Shaio Yan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"David C.","family":"Yen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,9]]},"reference":[{"issue":"8","key":"9620_CR1","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1108\/02686900610703750","volume":"21","author":"MJ Abdolmohammadi","year":"2006","unstructured":"Abdolmohammadi, M. J., Burnaby, P., & Hass, S. (2006). A review of prior common body of knowledge (CBOK) studies in internal auditing and an overview of the global CBOK 2006. Managerial Auditing Journal, 21(8), 811\u2013821.","journal-title":"Managerial Auditing Journal"},{"key":"9620_CR2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.15208\/beh.2010.14","volume":"02","author":"SZ Abidin","year":"2010","unstructured":"Abidin, S. Z., & Ismail, R. (2010). Impact of workers\u2019 competence on their performance in the Malaysian private service sector. Business and Economic Horizons, 02, 25\u201336.","journal-title":"Business and Economic Horizons"},{"issue":"2","key":"9620_CR3","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1108\/02686901311284522","volume":"28","author":"A Ahmi","year":"2012","unstructured":"Ahmi, A., & Kent, S. (2012). The utilisation of generalized audit software (GAS) by external auditors. Managerial Auditing Journal, 28(2), 88\u2013113.","journal-title":"Managerial Auditing Journal"},{"key":"9620_CR4","volume-title":"Self-efficacy: The exercise of control","author":"A Bandura","year":"1997","unstructured":"Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman."},{"issue":"4","key":"9620_CR5","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.accinf.2003.05.001","volume":"4","author":"JC Bedard","year":"2003","unstructured":"Bedard, J. C., Jackson, C., Ettredge, M. L., & Johnstone, K. M. (2003). The effect of training on auditors\u2019 acceptance of an electronic work system. International Journal of Accounting Information Systems, 4(4), 227\u2013250.","journal-title":"International Journal of Accounting Information Systems"},{"issue":"2","key":"9620_CR6","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.accinf.2011.01.001","volume":"12","author":"DY Chan","year":"2011","unstructured":"Chan, D. Y., & Vasarhelyi, M. A. (2011). Innovation and practice of continuous auditing. International Journal of Accounting Information Systems, 12(2), 152\u2013160.","journal-title":"International Journal of Accounting Information Systems"},{"key":"9620_CR7","series-title":"11","volume-title":"Internal audit: Efficiency through automation","author":"D Coderre","year":"2009","unstructured":"Coderre, D. (2009). Internal audit: Efficiency through automation (11). New Jersey: Wiley."},{"key":"9620_CR8","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"DR Compeau","year":"1995","unstructured":"Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: development of a measure and initial test. MIS Quarterly, 19, 189\u2013211.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9620_CR9","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.ijproman.2004.06.005","volume":"23","author":"L Crawford","year":"2005","unstructured":"Crawford, L. (2005). Senior management perceptions of project management competence. International Journal of Project Management, 23(1), 7\u201316.","journal-title":"International Journal of Project Management"},{"issue":"2","key":"9620_CR10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.2308\/jis.2005.19.2.7","volume":"19","author":"RS Debreceny","year":"2005","unstructured":"Debreceny, R. S., Gray, G. L., Ng, J. J. J., Lee, K. S. P., & Yau, W. F. (2005). Embedded audit modules in enterprise resource planning systems: implementation and functionality. Journal of Information Systems, 19(2), 7\u201327.","journal-title":"Journal of Information Systems"},{"issue":"2","key":"9620_CR11","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1111\/j.1468-2419.2009.00320.x","volume":"13","author":"JP Downey","year":"2009","unstructured":"Downey, J. P., & Zeltmann, S. (2009). The role of competence level in the self-efficacy\u2013skills relationship: an empirical examination of the skill acquisition process and its implications for information technology training. International Journal of Training and Development, 13(2), 96\u2013110.","journal-title":"International Journal of Training and Development"},{"issue":"1","key":"9620_CR12","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10796-014-9500-y","volume":"17","author":"YK Dwivedi","year":"2015","unstructured":"Dwivedi, Y. K., Wastell, D., Laumer, S., Henriksen, H. Z., Myers, M. D., Bunker, D., & Srivastava, S. C. (2015). Research on information systems failures and successes: status update and future directions. Information Systems Frontiers, 17(1), 143\u2013157.","journal-title":"Information Systems Frontiers"},{"key":"9620_CR13","doi-asserted-by":"crossref","first-page":"382","DOI":"10.2307\/3150980","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: algebra and statistics. Journal of Marketing Research, 18, 382\u2013388.","journal-title":"Journal of Marketing Research"},{"key":"9620_CR14","first-page":"36","volume":"3","author":"DM Goldberg","year":"2011","unstructured":"Goldberg, D. M. (2011). General auditing for IT auditors. ISACA Journal, 3, 36.","journal-title":"ISACA Journal"},{"key":"9620_CR15","first-page":"194","volume":"23","author":"AA Gramling","year":"2004","unstructured":"Gramling, A. A., Maletta, M. J., Schneider, A., & Church, B. K. (2004). The role of the internal audit function in corporate governance: a synthesis of the extant internal auditing literature and directions for future research. Journal of Accounting Literature, 23, 194.","journal-title":"Journal of Accounting Literature"},{"issue":"2","key":"9620_CR16","doi-asserted-by":"crossref","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","volume":"19","author":"JF Hair","year":"2011","unstructured":"Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139\u2013152.","journal-title":"Journal of Marketing Theory and Practice"},{"key":"9620_CR17","volume-title":"Information technology auditing and assurance","author":"JA Hall","year":"2010","unstructured":"Hall, J. A. (2010). Information technology auditing and assurance. Ohio: South-Western."},{"issue":"2","key":"9620_CR18","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10796-012-9390-9","volume":"16","author":"K Hausken","year":"2014","unstructured":"Hausken, K. (2014). Returns to information security investment: endogenizing the expected loss. Information Systems Frontiers, 16(2), 329\u2013336.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"9620_CR19","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1287\/mnsc.38.6.757","volume":"38","author":"JC Henderson","year":"1992","unstructured":"Henderson, J. C., & Lee, S. (1992). Managing I\/S design teams: a control theories perspective. Management Science, 38(6), 757\u2013777.","journal-title":"Management Science"},{"issue":"1","key":"9620_CR20","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1002\/hrm.20092","volume":"45","author":"M Hoegl","year":"2006","unstructured":"Hoegl, M., & Parboteeah, P. (2006). Autonomy and teamwork in innovative projects. Human Resource Management, 45(1), 67\u201379.","journal-title":"Human Resource Management"},{"issue":"4","key":"9620_CR21","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1504\/IJSS.2008.020054","volume":"4","author":"SM Huang","year":"2008","unstructured":"Huang, S. M., Hung, Y. C., & Tsao, H. H. (2008). Examining the determinants of computer-assisted audit techniques acceptance from internal auditors\u2019 viewpoints. International Journal of Services and Standards, 4(4), 377\u2013392.","journal-title":"International Journal of Services and Standards"},{"issue":"4","key":"9620_CR22","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1016\/j.dss.2010.08.015","volume":"50","author":"SM Huang","year":"2011","unstructured":"Huang, S. M., Hung, W. H., Yen, D. C., Chang, I. C., & Jiang, D. (2011). Building the evaluation model of the IT general control for CPAs under enterprise risk management. Decision Support Systems, 50(4), 692\u2013701.","journal-title":"Decision Support Systems"},{"issue":"5","key":"9620_CR23","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s10796-014-9487-4","volume":"17","author":"SY Huang","year":"2015","unstructured":"Huang, S. Y., Lee, C. H., Chiu, A. A., & Yen, D. C. (2015). How business process reengineering affects information technology investment and employee performance under different performance measurement. Information Systems Frontiers, 17(5), 1133\u20131144.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"9620_CR24","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1287\/isre.11.4.402.11869","volume":"11","author":"RD Johnson","year":"2000","unstructured":"Johnson, R. D., & Marakas, G. M. (2000). Research report: the role of behavioral modeling in computer skills acquisition: toward refinement of the model. Information Systems Research, 11(4), 402\u2013417.","journal-title":"Information Systems Research"},{"issue":"3","key":"9620_CR25","first-page":"2012","volume":"9","author":"T Kayworth","year":"2010","unstructured":"Kayworth, T., & Whitten, D. (2010). Effective information security requires a balance of social and technology factors. MIS Quarterly Executive, 9(3), 2012\u201352.","journal-title":"MIS Quarterly Executive"},{"issue":"1","key":"9620_CR26","doi-asserted-by":"crossref","first-page":"47","DOI":"10.3194\/1935-8156-5.1.47","volume":"5","author":"GS Kearns","year":"2010","unstructured":"Kearns, G. S. (2010). Measuring AIS course outcomes: the relationship between knowledge\/skills and interest\/enjoyment. AIS Educator Journal, 5(1), 47\u201369.","journal-title":"AIS Educator Journal"},{"issue":"4","key":"9620_CR27","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.giq.2010.10.008","volume":"28","author":"KJ Knapp","year":"2011","unstructured":"Knapp, K. J., Denney, G. D., & Barner, M. E. (2011). Key issues in data center security: an investigation of government audit reports. Government Information Quarterly, 28(4), 533\u2013541.","journal-title":"Government Information Quarterly"},{"issue":"3","key":"9620_CR28","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1177\/0149206305280789","volume":"32","author":"AR Levenson","year":"2006","unstructured":"Levenson, A. R., Van der Stede, W. A., & Cohen, S. G. (2006). Measuring the relationship between managerial competencies and performance. Journal of Management, 32(3), 360\u2013380.","journal-title":"Journal of Management"},{"key":"9620_CR29","doi-asserted-by":"crossref","unstructured":"Lawshe, C. H. (1975). A quantitative approach to content validity.\u00a0Personnel psychology, 28(4), 563\u2013575.","DOI":"10.1111\/j.1744-6570.1975.tb01393.x"},{"issue":"4","key":"9620_CR30","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1037\/0021-9010.88.4.587","volume":"88","author":"K Lewis","year":"2003","unstructured":"Lewis, K. (2003). Measuring transactive memory systems in the field: scale development and validation. Journal of Applied Psychology, 88(4), 587.","journal-title":"Journal of Applied Psychology"},{"issue":"7","key":"9620_CR31","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1016\/j.ijproman.2010.09.004","volume":"29","author":"Y Li","year":"2011","unstructured":"Li, Y., Yang, M. H., Klein, G., & Chen, H. G. (2011). The role of team problem solving competency in information system development projects. International Journal of Project Management, 29(7), 911\u2013922.","journal-title":"International Journal of Project Management"},{"issue":"3","key":"9620_CR32","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.2308\/accr.2010.85.3.1001","volume":"85","author":"A Masli","year":"2010","unstructured":"Masli, A., Peters, G. F., Richardson, V. J., & Sanchez, J. M. (2010). Examining the potential benefits of internal control monitoring technology. The Accounting Review, 85(3), 1001\u20131034.","journal-title":"The Accounting Review"},{"issue":"3","key":"9620_CR33","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1177\/0149206308316061","volume":"34","author":"J Mathieu","year":"2008","unstructured":"Mathieu, J., Maynard, M. T., Rapp, T., & Gilson, L. (2008). Team effectiveness 1997\u20132007: a review of recent advancements and a glimpse into the future. Journal of Management, 34(3), 410\u2013476.","journal-title":"Journal of Management"},{"issue":"1","key":"9620_CR34","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1048-9843(99)00041-7","volume":"11","author":"MD Mumford","year":"2000","unstructured":"Mumford, M. D., Zaccaro, S. J., Harding, F. D., Jacobs, T. O., & Fleishman, E. A. (2000). Leadership skills for a changing world: solving complex social problems. The Leadership Quarterly, 11(1), 11\u201335.","journal-title":"The Leadership Quarterly"},{"issue":"5","key":"9620_CR35","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1007\/s10796-015-9570-5","volume":"17","author":"HV Nath","year":"2015","unstructured":"Nath, H. V., & Mehtre, B. M. (2015). Analysis of a multistage attack embedded in a video file. Information Systems Frontiers, 17(5), 1029\u20131037.","journal-title":"Information Systems Frontiers"},{"key":"9620_CR36","unstructured":"National Center for O*NET Development (2013). Skills. O*NET OnLine.. Retrieved March 26, 2013, from \nhttp:\/\/www.onetonline.org\/find\/descriptor\/browse\/Skills\/"},{"key":"9620_CR37","volume-title":"Educational psychology: Developing learners","author":"JE Ormrod","year":"2006","unstructured":"Ormrod, J. E. (2006). Educational psychology: Developing learners (5th ed.). Upper Saddle River: Pearson\/Merrill Prentice Hall.","edition":"5"},{"issue":"7","key":"9620_CR38","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1108\/02686900410549411","volume":"19","author":"KN Palmer","year":"2004","unstructured":"Palmer, K. N., Ziegenfuss, D. E., & Pinsker, R. E. (2004). International knowledge, skills, and abilities of auditors\/accountants: evidence from recent competency studies. Managerial Auditing Journal, 19(7), 889\u2013896.","journal-title":"Managerial Auditing Journal"},{"key":"9620_CR39","doi-asserted-by":"crossref","unstructured":"Pangalos, G., & Katos, V. (2010). Information assurance and forensic readiness. Next Generation Society. Technological and Legal Issues, 181\u2013188.","DOI":"10.1007\/978-3-642-11631-5_17"},{"key":"9620_CR40","unstructured":"Papazafeiropoulou, A., & Spanaki, K. (2015). Understanding governance, risk and compliance information systems (GRC IS): the experts view. Information Systems Frontiers, online, 1\u201313."},{"issue":"4","key":"9620_CR41","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/s10796-012-9361-1","volume":"16","author":"P Poba-Nzaou","year":"2014","unstructured":"Poba-Nzaou, P., Uwizeyemungu, S., Raymond, L., & Par\u00e9, G. (2014). Motivations underlying the adoption of ERP systems in healthcare organizations: insights from online stories. Information Systems Frontiers, 16(4), 591\u2013605.","journal-title":"Information Systems Frontiers"},{"key":"9620_CR42","unstructured":"PricewaterhouseCoopers (2004). Integrity-Driven Performance. A New Strategy for Success Through Integrated Governance, Risk and Compliance Management, retrieved on March 26, 2013 at \nhttp:\/\/www.grc-resource.com\/resources\/pwc_integritydrivenperformance.pdf"},{"issue":"5","key":"9620_CR43","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1007\/s10796-013-9422-0","volume":"15","author":"SY Ryoo","year":"2013","unstructured":"Ryoo, S. Y., & Koo, C. (2013). Green practices-IS alignment and environmental performance: the mediating effects of coordination. Information Systems Frontiers, 15(5), 799\u2013814.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9620_CR44","first-page":"83","volume":"14","author":"PH Siegel","year":"2010","unstructured":"Siegel, P. H., & Miller, J. R. (2010). An international comparison of social interaction attributes of internal auditors: an analysis using the Firo-B. Academy of Accounting and Financial Studies Journal, 14(1), 83.","journal-title":"Academy of Accounting and Financial Studies Journal"},{"key":"9620_CR45","volume-title":"The software project manager\u2019s bridge to agility","author":"M Sliger","year":"2008","unstructured":"Sliger, M., & Broderick, S. (2008). The software project manager\u2019s bridge to agility. New Jersey: Addison-Wesley Professional."},{"key":"9620_CR46","volume-title":"Competence at work models for superior performance","author":"LM Spencer","year":"1993","unstructured":"Spencer, L. M., & Spencer, P. S. M. (1993). Competence at work models for superior performance. New York: Wiley."},{"issue":"1","key":"9620_CR47","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.accinf.2011.11.001","volume":"13","author":"D Stoel","year":"2012","unstructured":"Stoel, D., Havelka, D., & Merhout, J. W. (2012). An analysis of attributes that impact information technology audit quality: a study of IT and financial audit practitioners. International Journal of Accounting Information Systems, 13(1), 60\u201379.","journal-title":"International Journal of Accounting Information Systems"},{"key":"9620_CR48","first-page":"59","volume":"17","author":"CM Sun","year":"2012","unstructured":"Sun, C. M. (2012). From CAATTs adoption to continuous auditing systems implementation: an analysis based on organizational routines theories. MIS REVIEW: An International Journal, 17, 59\u201385.","journal-title":"MIS REVIEW: An International Journal"},{"issue":"5","key":"9620_CR49","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1007\/s10796-015-9587-9","volume":"17","author":"Y Sun","year":"2015","unstructured":"Sun, Y., & Upadhyaya, S. (2015). Secure and privacy preserving data processing support for active authentication. Information Systems Frontiers, 17(5), 1007\u20131015.","journal-title":"Information Systems Frontiers"},{"key":"9620_CR50","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/2786776","volume":"56","author":"I Tallman","year":"1993","unstructured":"Tallman, I., Leik, R. K., Gray, L. N., & Stafford, M. C. (1993). A theory of problem-solving behavior. Social Psychology Quarterly, 56, 157\u2013177.","journal-title":"Social Psychology Quarterly"},{"key":"9620_CR51","unstructured":"The IIA Research Foundation (IIARF) (2011). \u201cImperatives for Change: The IIA\u2019s Global Internal Audit Survey in Action\u201d, The Institute of Internal Auditors. \nhttp:\/\/www.theiia.org\/bookstore\/product\/imperatives-for-change-the-iias-global-internalaudit-survey-in-action-1557.cfm"},{"key":"9620_CR52","volume-title":"Continuous auditing: Implications for assurance, monitoring, and risk assessment","author":"The Institute of Internal Auditors","year":"2006","unstructured":"The Institute of Internal Auditors. (2006). Continuous auditing: Implications for assurance, monitoring, and risk assessment. Florida: GTAG # 3, IIA."},{"key":"9620_CR53","unstructured":"The Institute of Internal Auditors (2011). Data analysis technologies. GTAG # 16., IIA, 2011."},{"key":"9620_CR54","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.accinf.2012.06.011","volume":"13","author":"MA Vasarhelyi","year":"2012","unstructured":"Vasarhelyi, M. A., Alles, M., Kuenkaikaew, S., & Littley, J. (2012). The acceptance and adoption of continuous auditing by internal auditors: a micro analysis. International Journal of Accounting Information Systems, 13, 267\u2013281.","journal-title":"International Journal of Accounting Information Systems"},{"issue":"4","key":"9620_CR55","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.jengtecman.2004.09.001","volume":"21","author":"Y Wang","year":"2004","unstructured":"Wang, Y., Lo, H. P., & Yang, Y. (2004). The constituents of core competencies and firm performance: evidence from high-technology firms in China. Journal of Engineering and Technology Management, 21(4), 249\u2013280.","journal-title":"Journal of Engineering and Technology Management"},{"issue":"4","key":"9620_CR56","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1007\/s10796-013-9472-3","volume":"17","author":"V Weerakkody","year":"2013","unstructured":"Weerakkody, V., Irani, Z., Lee, H., Osman, I., & Hindi, N. (2013). E-government implementation: a bird\u2019s eye view of issues relating to costs, opportunities, benefits and risks. Information Systems Frontiers, 17(4), 889\u2013915.","journal-title":"Information Systems Frontiers"},{"key":"9620_CR57","unstructured":"Xu, W., Ou, P., & Fan, W. (2015). Antecedents of ERP assimilation and its impact on ERP value: a TOE-based model and empirical test. Information Systems Frontiers, online, 1\u201318."},{"key":"9620_CR58","doi-asserted-by":"crossref","unstructured":"Yang, L. (2011). Study on the improvement of the internal audit work in IT environment. In 2011 Fourth International Symposium on Knowledge Acquisition and Modeling (pp. 233\u2013236). IEEE.","DOI":"10.1109\/KAM.2011.69"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-015-9620-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-015-9620-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-015-9620-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-015-9620-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:36:29Z","timestamp":1559262989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-015-9620-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,9]]},"references-count":58,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["9620"],"URL":"https:\/\/doi.org\/10.1007\/s10796-015-9620-z","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,9]]}}}