{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:22:39Z","timestamp":1771230159911,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:00:00Z","timestamp":1489708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s10796-017-9745-3","type":"journal-article","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T03:14:08Z","timestamp":1489720448000},"page":"261-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Enterprise security investment through time when facing different types of vulnerabilities"],"prefix":"10.1007","volume":"21","author":[{"given":"Yosra","family":"Miaoui","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Boudriga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"9745_CR1","doi-asserted-by":"crossref","unstructured":"Alhazmi, O.H., & Malaiya, Y.K. (2005a). Modeling the vulnerability discovery process. In Proceedings of 16th IEEE International Symposium on Software Reliability Engineering (ISSRE\u201d05) (pp. 129\u2013138). Washington, DC: IEEE Computer Society.","DOI":"10.1109\/ISSRE.2005.30"},{"key":"9745_CR2","unstructured":"Alhazmi, O.H., & Malaiya, Y.K. (2005b). Quantitative vulnerability assessment of systems software, Proceedings of the IEEE Reliability and Maintainability Symposium (RAMS?05) (pp. 615\u2013620). Alexandria, VA, USA."},{"key":"9745_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TR.2008.916872","volume":"57","author":"OH Alhazmi","year":"2008","unstructured":"Alhazmi, O.H., & Malaiya, Y.K. (2008). Application of vulnerability discovery models to major operating systems. IEEE Transactions on Reliability, 57, 14\u201322.","journal-title":"IEEE Transactions on Reliability"},{"key":"9745_CR4","unstructured":"Anderson, R. (2002). Security in open versus closed systems the dance of boltzmann, coase and moore, Proceedings of on open source software: economics, law and policy (pp. 20\u201321). Toulouse, France."},{"key":"9745_CR5","unstructured":"Arrow, K.J. (1965). Aspects of the Theory of Risk Bearing: Yrjo Jahnssonin Saatio."},{"key":"9745_CR6","unstructured":"Bedrijfsrevisoren, D., Muynck, J.D., & Portesi, S. (2015). Cyber security information sharing: An overview of regulatory and non-regulatory approaches, tech. rep., The European Union Agency for Network and Information Security (ENISA)."},{"key":"9745_CR7","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1042091.1042094","volume":"48","author":"LD Bodin","year":"2005","unstructured":"Bodin, L.D., Gordon, L.A., & Loeb, M.P. (2005). Evaluating information security investments using analytical hierarchy process. Communications of the ACM, 48, 78\u201383.","journal-title":"Communications of the ACM"},{"key":"9745_CR8","unstructured":"Bohme, R., & Moore, T. (2009). The iterated weakest link - a model of adaptive security investment, Proceedings of the 8th Workshop on the Economics of Information Security (WEIS), (London)."},{"key":"9745_CR9","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1287\/moor.20.4.937","volume":"20","author":"S Browne","year":"1995","unstructured":"Browne, S. (1995). Optimal investment policies for a firm with a random risk process: Exponential utility and minimizing the probability of ruin. Mathematics of Operations Research, 20, 937\u2013958.","journal-title":"Mathematics of Operations Research"},{"key":"9745_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MS.2003.1159029","volume":"20","author":"BR Brykczynski","year":"2003","unstructured":"Brykczynski, B.R., & Small, R.A. (2003). Reducing internet-based intrusions: Effective security patch management. IEEE Software, 20, 50\u201357 .","journal-title":"IEEE Software"},{"key":"9745_CR11","unstructured":"Cavusoglu, H., Cavusoglu, H., & Zhang, J. (2006). Economics of security patch management, The fifth Workshop on the Economics of Information Security (WEIS 2006), The fifth Workshop on the Economics of Information Security , (Cambridge, England)."},{"issue":"2","key":"9745_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.2753\/MIS0742-1222250211","volume":"25","author":"H Cavusoglu","year":"2008","unstructured":"Cavusoglu, H., Raghunathan, S., & Yue, W.T. (2008). Decision-theoretical and game-theoretical approaches to it security investment. Journal of Management Information Systems, 25(2), 281\u2013304.","journal-title":"Journal of Management Information Systems"},{"key":"9745_CR13","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.jebo.2012.12.023","volume":"87","author":"G Charness","year":"2013","unstructured":"Charness, G., Gneezy, U., & Imas, A. (2013). Experimental methods: Eliciting risk preferences. Journal of Economic Behavior & Organization, 87, 43\u201351.","journal-title":"Journal of Economic Behavior & Organization"},{"issue":"5","key":"9745_CR14","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s10796-011-9338-5","volume":"14","author":"BA Cumbie","year":"2012","unstructured":"Cumbie, B.A., & Sankar, C.S. (2012). Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process. Information Systems Frontiers, 14(5), 1079\u20131094.","journal-title":"Information Systems Frontiers"},{"key":"9745_CR15","unstructured":"C. for Strategic and international Studies (2014). Net losses: Estimating the global cost of cybercrime. Available at http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-economic-impact-cybercrime2.pdf ."},{"key":"9745_CR16","unstructured":"Damodaran, A. (2007). Strategic Risk Taking: A Framework for Risk Management, Pearson Business."},{"key":"9745_CR17","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10796-012-9348-y","volume":"16","author":"F Fang","year":"2014","unstructured":"Fang, F., Parameswaran, M., Zhao, X., & Whinston, A.B. (2014). An economic mechanism to manage operational security risks for inter-organizational information systems. Information Systems Frontiers, 16, 399\u2013416.","journal-title":"Information Systems Frontiers"},{"key":"9745_CR18","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-16934-2_46","volume-title":"On the move to meaningful internet systems: OTM 2010, ch. Using real option thinking to improve decision making in security investment","author":"VNL Franqueira","year":"2010","unstructured":"Franqueira, V.N.L., Houmb, S.H., & Daneva, M. (2010). On the move to meaningful internet systems: OTM 2010, ch. Using real option thinking to improve decision making in security investment, (pp. 619\u2013638). Berlin: Springer."},{"key":"9745_CR19","first-page":"79","volume-title":"Economics of Information Security and Privacy, ch. Modeling the Security Ecosystem - The Dynamics of (In)Security","author":"S Frei","year":"2010","unstructured":"Frei, S., Schatzmann, D., Plattner, B., & Trammell, B. (2010). Economics of Information Security and Privacy, ch. Modeling the Security Ecosystem - The Dynamics of (In)Security, (pp. 79\u2013106). US: Springer."},{"key":"9745_CR20","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10796-013-9411-3","volume":"17","author":"X Gao","year":"2015","unstructured":"Gao, X., Zhong, W., & Mei, S. (2015). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, 17, 423\u2013438.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9745_CR21","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/isre.1050.0053","volume":"16","author":"E Gal-Or","year":"2005","unstructured":"Gal-Or, E., & Ghose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2), 186\u2013208.","journal-title":"Information Systems Research"},{"issue":"3","key":"9745_CR22","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1080\/10920277.1998.10595728","volume":"2","author":"HU Gerber","year":"1998","unstructured":"Gerber, H.U., & Pafumi, G. (1998). Utility functions: From risk theory to finance. North American Actuarial Journal, 2(3), 74\u2013100.","journal-title":"North American Actuarial Journal"},{"key":"9745_CR23","doi-asserted-by":"crossref","unstructured":"Gordon, L.A., & Loeb, M.P. (2002a). The economics of information security investment. ACM Transactions on Information and Systems Security, 5(4), 438\u2013457.","DOI":"10.1145\/581271.581274"},{"key":"9745_CR24","unstructured":"Gordon, L.A., & Loeb, M.P. (2002b). Return on information security investments: Myths vs. realities. Strategic Finance, 84(5), 26\u201331."},{"key":"9745_CR25","unstructured":"Gordon, L.A., Loeb, M.P., & Lucyshyn, W. (2003a). Inormation security expenditures and real option:approach-and-see approach. Computer Security Journal, 14(2), 1\u20137."},{"key":"9745_CR26","doi-asserted-by":"crossref","unstructured":"Gordon, L.A., Loeb, M.P., & Lucyshyn, W. (2003b). Sharing information on computer systems security: an economic analysis. Journal of Accounting and Public Policy, 22(6), 461\u2013485.","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"key":"9745_CR27","volume-title":"Proceedings of the 17th International World Wide Web Conference, (Beijing, China)","author":"J Grossklags","year":"2008","unstructured":"Grossklags, J., Christin, N., & Chuang, J. (2008). Secure or insure? a game-theoretic analysis of information security games, Proceedings of the 17th International World Wide Web Conference, (Beijing, China)."},{"issue":"5","key":"9745_CR28","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/s10796-006-9011-6","volume":"8","author":"K Hausken","year":"2006","unstructured":"Hausken, K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338\u2013349.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"9745_CR29","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.jaccpubpol.2007.10.001","volume":"26","author":"K Hausken","year":"2007","unstructured":"Hausken, K. (2007). Information sharing among firms and cyber attack. Journal of Accounting and Public Policy, 26(6), 639\u2013 688.","journal-title":"Journal of Accounting and Public Policy"},{"issue":"2","key":"9745_CR30","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s10796-012-9390-9","volume":"16","author":"K Hausken","year":"2014","unstructured":"Hausken, K. (2014). Returns to information security investment: Endogenizing the expected loss. Information Systems Frontiers, 16(2), 329\u2013336.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9745_CR31","doi-asserted-by":"publisher","first-page":"245","DOI":"10.4301\/S1807-17752015000200004","volume":"12","author":"K Hausken","year":"2015","unstructured":"Hausken, K. (2015). A strategic analysis of information sharing among cyber attackers. Journal of Information Systems and Technology Management, 12(2), 245\u2013270.","journal-title":"Journal of Information Systems and Technology Management"},{"issue":"5","key":"9745_CR32","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s10796-013-9417-x","volume":"15","author":"M Hertel","year":"2013","unstructured":"Hertel, M., & Wiesent, J. (2013). Investments in information systems: a contribution towards sustainability. Information Systems Frontiers, 15(5), 815\u2013829.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9745_CR33","first-page":"24","volume":"7","author":"MC Holmes","year":"2006","unstructured":"Holmes, M.C., & Neubecker, D. (2006). The impact of the sarbanes-oxley act 2002 on the information systems of public companies. Issues in Information Systems, 7(2), 24\u201328.","journal-title":"Issues in Information Systems"},{"key":"9745_CR34","unstructured":"Hoo, K.J.S. (2000). How much is enough? a risk management approach to computer security. PhD thesis: Stanford University."},{"key":"9745_CR35","volume-title":"Proceedings of the International Conference on Information Systems, (Shanghai)","author":"J Hua","year":"2011","unstructured":"Hua, J. (2011). Optimal is security investment: Cyber terrorism vs. common hacking, Proceedings of the International Conference on Information Systems, (Shanghai)."},{"issue":"1","key":"9745_CR36","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ijpe.2012.06.022","volume":"141","author":"CD Huang","year":"2013","unstructured":"Huang, C.D., & Behara, R.S. (2013). Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. International Journal of Production Economics, 141(1), 255\u2013268.","journal-title":"International Journal of Production Economics"},{"key":"9745_CR37","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1016\/j.ijpe.2008.04.002","volume":"114","author":"CD Huang","year":"2008","unstructured":"Huang, C.D., Hu, Q., & Behara, R.S. (2008). An economic analysis of the optimal information security investment in the case of a risk-averse firm. International Journal of Production Economics, 114, 793\u2013804.","journal-title":"International Journal of Production Economics"},{"key":"9745_CR38","first-page":"211","volume-title":"Economics of Information Security and Privacy, ch. Optimal Timing of Information Security Investment: A Real Options Approach","author":"K ichi Tatsumi","year":"2010","unstructured":"ichi Tatsumi, K., & Goto, M. (2010). Economics of Information Security and Privacy, ch. Optimal Timing of Information Security Investment: A Real Options Approach, (pp. 211\u2013228). US: Springer."},{"key":"9745_CR39","unstructured":"Jian, H. (2009). Optimal investment in IS security: a game theoretical approach. PhD thesis: Morgan State University."},{"key":"9745_CR40","first-page":"549","volume":"19","author":"L Jiang","year":"2010","unstructured":"Jiang, L., Anantharam, V., & Walrand, J. (2010). How bad are selfish investments in network security?. How Bad Are Selfish Investments in Network Security?, 19, 549\u2013560.","journal-title":"How Bad Are Selfish Investments in Network Security?"},{"issue":"2","key":"9745_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12785\/ijlms\/010201","volume":"1","author":"H Joh","year":"2013","unstructured":"Joh, H. (2013). Modeling security vulnerabilities in learning management systems. International Journal of Learning Management Systems, 1(2), 1\u201312.","journal-title":"International Journal of Learning Management Systems"},{"key":"9745_CR42","volume-title":"Proceedings of International Conference on Software Engineering Advances (ICSEA\u201907)","author":"J Li","year":"2007","unstructured":"Li, J., & Su, X. (2007). Making cost effective security decision with real option thinking, Proceedings of International Conference on Software Engineering Advances (ICSEA\u201907). France: Cap Esterel."},{"key":"9745_CR43","volume-title":"Proceedings of International Business Information Management Association (IBIMA), (Milan, Italy)","author":"Y Miaoui","year":"2014","unstructured":"Miaoui, Y., Boudriga, N., & Abaoub, E. (2014). Optimal investment for securing enterprise information systems, Proceedings of International Business Information Management Association (IBIMA), (Milan, Italy)."},{"key":"9745_CR44","doi-asserted-by":"crossref","unstructured":"Miaoui, Y., Boudriga, N., & Abaoub, E. (2015a). Economics of privacy : A model for protecting against cyber data disclosure attacks, Proceedings of 3rd Information Systems International Conference (ISICO), (Surabaya, Indonesia).","DOI":"10.1016\/j.procs.2015.12.165"},{"key":"9745_CR45","unstructured":"Miaoui, Y., Boudriga, N., & Abaoub, E. (2015b). Insurance versus investigation driven approach for the computation of optimal security investment, Proceedings of 19th Pacific Asia Conference on Information Systems (PACIS), (Singapore)."},{"key":"9745_CR46","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/S0167-6687(02)00154-3","volume":"31","author":"F Menoncin","year":"2002","unstructured":"Menoncin, F. (2002). Optimal portfolio and background risk: an exact and an approximate solution. Insurance Mathematics and Economics, 31, 249\u2013265.","journal-title":"Insurance Mathematics and Economics"},{"key":"9745_CR47","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10479-008-0381-7","volume":"176","author":"J Meyer","year":"2010","unstructured":"Meyer, J. (2010). Representing risk preferences in expected utility based decision models. Annals of Operations Research, 176, 179\u2013190.","journal-title":"Annals of Operations Research"},{"issue":"4","key":"9745_CR48","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4236\/jsea.2013.64A003","volume":"6","author":"H Okamura","year":"2013","unstructured":"Okamura, H., Tokuzane, M., & Dohi, T. (2013). Quantitative security evaluation for software system from vulnerability database. Journal of Software Engineering and Applications, 6(4), 15\u201323.","journal-title":"Journal of Software Engineering and Applications"},{"issue":"2","key":"9745_CR49","first-page":"158","volume":"37","author":"JF Outreville","year":"2014","unstructured":"Outreville, J.F. (2014). Risk aversion, risk behavior, and demand for insurance: a survey. Journal of Insurance Issues, 37(2), 158\u2013186.","journal-title":"Journal of Insurance Issues"},{"key":"9745_CR50","doi-asserted-by":"crossref","unstructured":"Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., & Smeraldi, F. (2014). Cybersecurity games and investments: a decision support approach, vol. 8840. Springer International Publishing.","DOI":"10.1007\/978-3-319-12601-2_15"},{"key":"9745_CR51","doi-asserted-by":"publisher","first-page":"122","DOI":"10.2307\/1913738","volume":"32","author":"JW Pratt","year":"1964","unstructured":"Pratt, J.W. (1964). Risk aversion in the small and in the large. Econometrica, 32, 122\u2013136.","journal-title":"Econometrica"},{"key":"9745_CR52","unstructured":"PricewaterhouseCoopers (2016). Turnaround and transformation in cybersecurity: Key findings from the global state of information security survey. Available at: http:\/\/press.pwc.com\/Multimedia\/image\/turnaround-and-transformation-in-cybersecurity\/a\/B174C2B4-8B52-4458-A029-0372337D54A3 ."},{"key":"9745_CR53","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.cose.2004.09.004","volume":"23","author":"S Purser","year":"2004","unstructured":"Purser, S. (2004). Improving the roi of the security management process. Computers & Security, 23, 542\u2013546.","journal-title":"Computers & Security"},{"key":"9745_CR54","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1287\/isre.1080.0174","volume":"20","author":"S Ransbotham","year":"2009","unstructured":"Ransbotham, S., & Mitra, S. (2009). Choice and chance: a conceptual model of paths to information security compromise. Information Systems Research, 20, 121\u2013139.","journal-title":"Information Systems Research"},{"key":"9745_CR55","volume-title":"An empirical analysis of exploitation attempts based on vulnerabilities in open source software","author":"S Ransbotham","year":"2010","unstructured":"Ransbotham, S. (2010). An empirical analysis of exploitation attempts based on vulnerabilities in open source software. Cambridge: Harvard University."},{"key":"9745_CR56","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2005.17","volume":"3","author":"E Rescorla","year":"2005","unstructured":"Rescorla, E. (2005). Is finding security holes a good idea?. Security and Privacy, 3, 14\u201319.","journal-title":"Security and Privacy"},{"key":"9745_CR57","unstructured":"Schatz, D., & Bashroush, R. (2016). Economic valuation for information security investment: a systematic literature review. Information Systems Frontiers, 1\u201324."},{"key":"9745_CR58","unstructured":"Schilling, A., & Werners, B. (2015). Optimal information security expenditures considering budget constraints, Proceedings of 19th Pacific Asia Conference on Information Systems (PACIS), (Singapore)."},{"key":"9745_CR59","unstructured":"Schryen (2009). Security of open source and closed source software: An empirical comparison of published vulnerabilities, Proceedings of 15th Americas Conference on Information Systems. San Francisco, California."},{"key":"9745_CR60","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1145\/1941487.1941516","volume":"54","author":"G Schryen","year":"2011","unstructured":"Schryen, G. (2011). Is open source security a myth?. Communications of the ACM, 54, 130\u2013140.","journal-title":"Communications of the ACM"},{"key":"9745_CR61","doi-asserted-by":"crossref","unstructured":"Ullrich, C. (2013a). Valuation of it investments using real options theory. Business and Information Systems Engineering, 5(5), 331\u2013341.","DOI":"10.1007\/s12599-013-0286-0"},{"key":"9745_CR62","doi-asserted-by":"crossref","unstructured":"Ullrich, C. (2013b). Valuation of it investments using real options theory. Business & Information Systems Engineering, 5, 331\u2013341.","DOI":"10.1007\/s12599-013-0286-0"},{"key":"9745_CR63","volume-title":"Proceedings of Fifth International Conference on Business Intelligence and Financial Engineering, (Lanzhou and Tunhuang, China)","author":"J Wang","year":"2012","unstructured":"Wang, J., Ding, B., Ren, Y., & Zheng, J. (2012). Valuing information security investment: A real options approach, Proceedings of Fifth International Conference on Business Intelligence and Financial Engineering, (Lanzhou and Tunhuang, China)."},{"issue":"1","key":"9745_CR64","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.cose.2010.10.007","volume":"30","author":"S-W Woo","year":"2011","unstructured":"Woo, S.-W., Joh, H., Alhazmi, O.H., & Malaiya, Y.K. (2011). Modeling vulnerability discovery process in apache and iis http servers. Computers & Security, 30(1), 50\u201362.","journal-title":"Computers & Security"},{"key":"9745_CR65","first-page":"194","volume":"24","author":"S Zhang","year":"2015","unstructured":"Zhang, S., Ou, X., & Caragea, D. (2015). Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective, 24, 194\u2013206.","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"1","key":"9745_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/00137910601159722","volume":"52","author":"J Zhuang","year":"2007","unstructured":"Zhuang, J., Bier, V.M., & Gupta, A. (2007). Subsidies in interdependent security with heterogeneous discount rates. The Engineering Economist, 52(1), 1\u201319.","journal-title":"The Engineering Economist"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9745-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9745-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9745-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:19:18Z","timestamp":1750119558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9745-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,17]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9745"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9745-3","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,17]]},"assertion":[{"value":"17 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}