{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:20:56Z","timestamp":1768587656407,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10796-022-10247-8","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T08:03:55Z","timestamp":1643616235000},"page":"1667-1682","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["User Privacy, Surveillance and Public Health during COVID-19 \u2013 An Examination of Twitterverse"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8225-7157","authenticated-orcid":false,"given":"Paras","family":"Bhatt","sequence":"first","affiliation":[]},{"given":"Naga","family":"Vemprala","sequence":"additional","affiliation":[]},{"given":"Rohit","family":"Valecha","sequence":"additional","affiliation":[]},{"given":"Govind","family":"Hariharan","sequence":"additional","affiliation":[]},{"given":"H. Raghav","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"10247_CR1","doi-asserted-by":"crossref","unstructured":"Abedin, B., & Babar, A. (2018). Institutional vs. non-institutional use of social media during emergency response: A case of twitter in 2014 Australian bush fire. Information Systems Frontiers, 20(4), 729\u2013740.","DOI":"10.1007\/s10796-017-9789-4"},{"key":"10247_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, N., Michelin, R. A., Xue, W., Ruj, S., Malaney, R., Kanhere, S. S., . . . Jha, S. K. (2020). A survey of covid-19 contact tracing apps. IEEE Access, 8, 134577-134601.","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"10247_CR3","doi-asserted-by":"crossref","unstructured":"Aiello, L. M., Petkos, G., Martin, C., Corney, D., Papadopoulos, S., Skraba, R., . . . Jaimes, A. (2013). Sensing trending topics in Twitter. IEEE Transactions on Multimedia, 15(6), 1268-1282.","DOI":"10.1109\/TMM.2013.2265080"},{"key":"10247_CR4","doi-asserted-by":"crossref","unstructured":"Choudrie, J., Patil, S., Kotecha, K., Matta, N., & Pappas, I. (2021). Applying and understanding an advanced, novel deep learning approach: A Covid 19, text based, emotions analysis study. Information Systems Frontiers, 1\u201335.","DOI":"10.1007\/s10796-021-10152-6"},{"key":"10247_CR5","doi-asserted-by":"crossref","unstructured":"Bachura, E., Valecha, R., Chen, R., & Rao, H.R. (2022). The OPM data breach: An investigation of shared emotional reactions on Twitter. MIS Quarterly, forthcoming.","DOI":"10.25300\/MISQ\/2022\/15596"},{"issue":"5","key":"10247_CR6","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1111\/ijcs.12576","volume":"44","author":"R Bandara","year":"2020","unstructured":"Bandara, R., Fernando, M., & Akter, S. (2020). Addressing privacy predicaments in the digital marketplace: A power-relations perspective. International Journal of Consumer Studies, 44(5), 423\u2013434.","journal-title":"International Journal of Consumer Studies"},{"key":"10247_CR7","unstructured":"Bhatt, P., Vemprala, N., Valecha, R., & Rao, H. R. (2020) Life vs. livelihood\u2013user privacy during COVID-19 virus communication. IFIP 8.11\/11.13 Dewald Roode Information Security Research Workshop."},{"issue":"4","key":"10247_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2133806.2133826","volume":"55","author":"DM Blei","year":"2012","unstructured":"Blei, D. M. (2012). Probabilistic topic models. Communications of the ACM, 55(4), 77\u201384.","journal-title":"Communications of the ACM"},{"key":"10247_CR9","doi-asserted-by":"crossref","unstructured":"B\u00fcscher, M., Perng, S.-Y., & Liegl, M. (2019). Privacy, security, and liberty: Ict in crises Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications (pp. 199\u2013217): IGI Global.","DOI":"10.4018\/978-1-5225-7113-1.ch012"},{"key":"10247_CR10","doi-asserted-by":"publisher","unstructured":"Calvo, R. A., Deterding, S., & Ryan, R. M. (2020). Health surveillance during covid-19 pandemic. British Medical Journal, 369. https:\/\/doi.org\/10.1136\/bmj.m1373.","DOI":"10.1136\/bmj.m1373"},{"key":"10247_CR11","doi-asserted-by":"crossref","unstructured":"Chakrabarti, S. (2001). Integrating the document object model with hyperlinks for enhanced topic distillation and information extraction. Paper presented at the Proceedings of the 10th international conference on World Wide Web.","DOI":"10.1145\/371920.372054"},{"key":"10247_CR12","doi-asserted-by":"crossref","unstructured":"Chakrabarti, S., Joshi, M., & Tawde, V. (2001). Enhanced topic distillation using text, markup tags, and hyperlinks. Paper presented at the Proceedings of the 24th annual international ACM SIGIR conference on Research and development in information retrieval.","DOI":"10.1145\/383952.383990"},{"key":"10247_CR13","unstructured":"Chatfield, A., & Brajawidagda, U. (2012). Twitter tsunami early warning network: a social network analysis of Twitter information flows. Paper presented at the 23rd Australasian conference on information systems, Geelong, Australia."},{"key":"10247_CR14","doi-asserted-by":"crossref","unstructured":"De Araujo, J. F. F. E., & Tejedo-Romero, F. (2016). Local government transparency index: determinants of municipalities\u2019 rankings. International Journal of Public Sector Management.","DOI":"10.1108\/IJPSM-11-2015-0199"},{"issue":"2","key":"10247_CR15","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TEM.2005.844927","volume":"52","author":"JB Earp","year":"2005","unstructured":"Earp, J. B., Ant\u00f3n, A. I., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52(2), 227\u2013237.","journal-title":"IEEE Transactions on Engineering Management"},{"key":"10247_CR16","doi-asserted-by":"crossref","unstructured":"Farrahi, K., Emonet, R., & Cebrian, M. (2014). Epidemic contact tracing via communication traces. PloS one, 9(5), e95133.","DOI":"10.1371\/journal.pone.0095133"},{"key":"10247_CR17","doi-asserted-by":"crossref","unstructured":"Greenhalgh, T., Wherton, J., Shaw, S., & Morrison, C. (2020). Video consultations for covid-19: British Medical Journal Publishing Group.","DOI":"10.1136\/bmj.m998"},{"issue":"6","key":"10247_CR18","first-page":"16","volume":"14","author":"R Herold","year":"2006","unstructured":"Herold, R. (2006). Addressing privacy issues during disaster recovery. Information Security Journal, 14(6), 16.","journal-title":"Information Security Journal"},{"key":"10247_CR19","unstructured":"HHS.gov. (2020, April 9). OCR Announces Notification of Enforcement Discretion for Community-Based Testing Sites During the COVID-19 Nationwide Public Health Emergency. Retrieved from https:\/\/www.hhs.gov\/about\/news\/2020\/04\/09\/ocr-announces-notification-enforcement-discretion-community-based-testing-sites-during-covid-19.html Accessed on 2021, March 15"},{"issue":"1","key":"10247_CR20","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1111\/1468-5973.12143","volume":"25","author":"JS Hiller","year":"2017","unstructured":"Hiller, J. S., & Russell, R. S. (2017). Privacy in crises: The NIST privacy framework. Journal of Contingencies and Crisis Management, 25(1), 31\u201338.","journal-title":"Journal of Contingencies and Crisis Management"},{"issue":"3","key":"10247_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1177\/002224299606000304","volume":"60","author":"DL Hoffman","year":"1996","unstructured":"Hoffman, D. L., & Novak, T. P. (1996). Marketing in hypermedia computer-mediated environments: Conceptual foundations. Journal of Marketing, 60(3), 50\u201368.","journal-title":"Journal of Marketing"},{"key":"10247_CR22","doi-asserted-by":"crossref","unstructured":"House, T., & Keeling, M. J. (2010). The impact of contact tracing in clustered populations. PLoS computational biology, 6(3), e1000721.","DOI":"10.1371\/journal.pcbi.1000721"},{"key":"10247_CR23","unstructured":"Househ, M. (2012). Re-examining Perceptions on Healthcare Privacy-Moving from a Punitive Model to an Awareness Model. Paper presented at the International Conference on Health Informatics."},{"issue":"1","key":"10247_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-016-0059-y","volume":"3","author":"P Jain","year":"2016","unstructured":"Jain, P., Gyanchandani, M., & Khare, N. (2016). Big data privacy: A technological perspective and review. Journal of Big Data, 3(1), 1\u201325.","journal-title":"Journal of Big Data"},{"issue":"1\u20132","key":"10247_CR25","first-page":"3","volume":"26","author":"M Janssen","year":"2015","unstructured":"Janssen, M., & van den Hoven, J. (2015). Big and Open Linked Data (BOLD) in government: A challenge to transparency and privacy? Journal of Organizational Computing and Electronic Commerce, 26(1\u20132), 3\u201313.","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"key":"10247_CR26","unstructured":"John Hopkins School of Public Health. (2021, Feb 2). Variants, Vaccines and What They Mean For COVID-19 Testing. Retrieved from https:\/\/www.jhsph.edu\/covid-19\/articles\/variants-vaccines-and-what-they-mean-for-covid19-testing.html Accessed on 2021, March 15"},{"issue":"3","key":"10247_CR27","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10796-017-9810-y","volume":"20","author":"KK Kapoor","year":"2018","unstructured":"Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., & Nerur, S. (2018). Advances in social media research: Past, present and future. Information Systems Frontiers, 20(3), 531\u2013558.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"10247_CR28","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.dss.2005.05.009","volume":"43","author":"H-W Kim","year":"2007","unstructured":"Kim, H.-W., Chan, H. C., & Gupta, S. (2007). Value-based adoption of mobile internet: An empirical investigation. Decision Support Systems, 43(1), 111\u2013126.","journal-title":"Decision Support Systems"},{"issue":"1","key":"10247_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10796-020-09984-5","volume":"22","author":"JK Lee","year":"2020","unstructured":"Lee, J. K., Chang, Y., Kwon, H. Y., & Kim, B. (2020). Reconciliation of privacy with preventive cybersecurity: The bright internet approach. Information Systems Frontiers, 22(1), 45\u201357.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"10247_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.17705\/jais1.00484","volume":"19","author":"JK Lee","year":"2018","unstructured":"Lee, J. K., Cho, D., & Lim, G. G. (2018). Design and validation of the bright internet. Journal of the Association for Information Systems, 19(2), 3.","journal-title":"Journal of the Association for Information Systems"},{"key":"10247_CR31","doi-asserted-by":"crossref","unstructured":"Liu, R., Gupta, S., & Patel, P. (2021). The Application of the Principles of Responsible AI on Social Media Marketing for Digital Health. Information Systems Frontiers, 1\u201325.","DOI":"10.1007\/s10796-021-10191-z"},{"key":"10247_CR32","doi-asserted-by":"crossref","unstructured":"Lyon, D. (2010). Surveillance, power and everyday life Emerging digital spaces in contemporary society (pp. 107\u2013120): Springer.","DOI":"10.1057\/9780230299047_18"},{"issue":"12","key":"10247_CR33","doi-asserted-by":"publisher","first-page":"e2031756","DOI":"10.1001\/jamanetworkopen.2020.31756","volume":"3","author":"ZJ Madewell","year":"2020","unstructured":"Madewell, Z. J., Yang, Y., Longini, I. M., Halloran, M. E., & Dean, N. E. (2020). Household Transmission of SARS-CoV-2: A Systematic Review and Meta-analysis. JAMA Network Open, 3(12), e2031756\u2013e2031756.","journal-title":"JAMA Network Open"},{"issue":"4","key":"10247_CR34","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"key":"10247_CR35","unstructured":"Medicare applications raise anxiety for seniors in pandemic. (2020, April 29). Retrieved from https:\/\/www.modernhealthcare.com\/medicare\/medicare-applications-raise-anxiety-seniors-pandemic Accessed on 2021, March 15"},{"key":"10247_CR36","doi-asserted-by":"crossref","unstructured":"Mendon, S., Dutta, P., Behl, A., & Lessmann, S. (2021). A Hybrid approach of machine learning and lexicons to sentiment analysis: enhanced insights from twitter data of natural disasters. Information Systems Frontiers, 1\u201324.","DOI":"10.1007\/s10796-021-10107-x"},{"key":"10247_CR37","unstructured":"Mercer. (2020, April 06). COVID-19 raises HIPAA privacy, security issues. Retrieved from https:\/\/www.mercer.com\/our-thinking\/law-and-policy-group\/COVID-19-raises-hipaa-privacy-security-issues.html Accessed on 2021, March 15"},{"issue":"1","key":"10247_CR38","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10796-010-9275-8","volume":"13","author":"O Oh","year":"2011","unstructured":"Oh, O., Agrawal, M., & Rao, H. R. (2011). Information control and terrorism: Tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers, 13(1), 33\u201343.","journal-title":"Information Systems Frontiers"},{"key":"10247_CR39","doi-asserted-by":"crossref","unstructured":"Petronio, S., & Venetis, M. K. (2017). Communication privacy management theory and health and risk messaging. In Oxford Research Encyclopedia of Communication.","DOI":"10.1093\/acrefore\/9780190228613.013.513"},{"issue":"1","key":"10247_CR40","first-page":"1","volume":"91","author":"ME Roberts","year":"2019","unstructured":"Roberts, M. E., Stewart, B. M., & Tingley, D. (2019). Stm: An R package for structural topic models. Journal of Statistical Software, 91(1), 1\u201340.","journal-title":"Journal of Statistical Software"},{"key":"10247_CR41","first-page":"1","volume":"2010","author":"L Palen","year":"2010","unstructured":"Palen, L., Anderson, K. M., Mark, G., Martin, J., Sicker, D., Palmer, M., & Grunwald, D. (2010). A vision for technology-mediated support for public participation & assistance in mass emergencies & disasters. ACM-BCS Visions of Computer Science, 2010, 1\u201312.","journal-title":"ACM-BCS Visions of Computer Science"},{"key":"10247_CR42","doi-asserted-by":"crossref","unstructured":"Palen, L., & Dourish, P. (2003). Unpacking\" privacy\" for a networked world. Paper presented at the Proceedings of the SIGCHI conference on Human factors in computing systems.","DOI":"10.1145\/642611.642635"},{"key":"10247_CR43","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ijhcs.2017.10.003","volume":"110","author":"C Prince","year":"2018","unstructured":"Prince, C. (2018). Do consumers want to control their personal data? Empirical evidence. International Journal of Human-Computer Studies, 110, 21\u201332.","journal-title":"International Journal of Human-Computer Studies"},{"key":"10247_CR44","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.05.004","volume":"42","author":"JR Ragini","year":"2018","unstructured":"Ragini, J. R., Anand, P. R., & Bhaskar, V. (2018). Big data analytics for disaster response and recovery through sentiment analysis. International Journal of Information Management, 42, 13\u201324.","journal-title":"International Journal of Information Management"},{"key":"10247_CR45","doi-asserted-by":"crossref","unstructured":"Rao, H. R., Vemprala, N., Akello, P., & Valecha, R. (2020). Retweets of officials\u2019 alarming vs reassuring messages during the COVID-19 pandemic: Implications for crisis management. International Journal of Information Management, 55, 102187.","DOI":"10.1016\/j.ijinfomgt.2020.102187"},{"issue":"8","key":"10247_CR46","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.jagp.2017.04.009","volume":"25","author":"L Rosenfeld","year":"2017","unstructured":"Rosenfeld, L., Torous, J., & Vahia, I. V. (2017). Data security and privacy in apps for dementia: An analysis of existing privacy policies. The American Journal of Geriatric Psychiatry, 25(8), 873\u2013877.","journal-title":"The American Journal of Geriatric Psychiatry"},{"issue":"6","key":"10247_CR47","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2009","unstructured":"Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., & Rao, J. (2009). Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6), 401\u2013412.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2","key":"10247_CR48","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1023\/A:1025001627419","volume":"46","author":"R Sarathy","year":"2003","unstructured":"Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111\u2013126.","journal-title":"Journal of Business Ethics"},{"key":"10247_CR49","doi-asserted-by":"crossref","unstructured":"Saura, J. R., Ribeiro-Soriano, D., & Palacios-Marqu\u00e9s, D. (2021). From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets. International Journal of Information Management, 102331.","DOI":"10.1016\/j.ijinfomgt.2021.102331"},{"issue":"9","key":"10247_CR50","doi-asserted-by":"publisher","first-page":"1393","DOI":"10.2105\/AJPH.2020.305746","volume":"110","author":"D Schillinger","year":"2020","unstructured":"Schillinger, D., Chittamuru, D., & Ram\u00edrez, A. S. (2020). From \u201cinfodemics\u201d to health promotion: A novel framework for the role of social media in public health. American Journal of Public Health, 110(9), 1393\u20131396.","journal-title":"American Journal of Public Health"},{"key":"10247_CR51","doi-asserted-by":"crossref","unstructured":"Signorini, A., Segre, A. M., & Polgreen, P. M. (2011). The use of Twitter to track levels of disease activity and public concern in the US during the influenza A H1N1 pandemic. PloS one, 6(5), e19467.","DOI":"10.1371\/journal.pone.0019467"},{"issue":"5","key":"10247_CR52","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1177\/1357633X20916567","volume":"26","author":"AC Smith","year":"2020","unstructured":"Smith, A. C., Thomas, E., Snoswell, C. L., Haydon, H., Mehrotra, A., Clemensen, J., & Caffery, L. J. (2020). Telehealth for global emergencies: Implications for coronavirus disease 2019 (COVID-19). Journal of Telemedicine and Telecare, 26(5), 309\u2013313.","journal-title":"Journal of Telemedicine and Telecare"},{"key":"10247_CR53","volume-title":"Understanding privacy","author":"DJ Solove","year":"2008","unstructured":"Solove, D. J. (2008). Understanding privacy. Harvard University Press."},{"key":"10247_CR54","doi-asserted-by":"crossref","unstructured":"Son, J., Lee, J., Oh, O., Lee, H. K., & Woo, J. (2020). Using a Heuristic-Systematic Model to assess the Twitter user profile\u2019s impact on disaster tweet credibility. International Journal of Information Management, 54, 102176.","DOI":"10.1016\/j.ijinfomgt.2020.102176"},{"key":"10247_CR55","doi-asserted-by":"crossref","unstructured":"Tan, S., Li, Y., Sun, H., Guan, Z., Yan, X., Bu, J., . . . He, X. (2013). Interpreting the public sentiment variations on twitter. IEEE transactions on knowledge and data engineering, 26(5), 1158-1170.","DOI":"10.1109\/TKDE.2013.116"},{"key":"10247_CR56","unstructured":"The New York Times. (2021, Feb 4). Coming Soon: The \u2018Vaccine Passport\u2019. Retrieved from https:\/\/www.nytimes.com\/2021\/02\/04\/travel\/coronavirus-vaccine-passports.html Accessed on 2021, March 15"},{"key":"10247_CR57","doi-asserted-by":"crossref","unstructured":"Trocin, C., Mikalef, P., Papamitsiou, Z., & Conboy, K. (2021). Responsible AI for digital health: a synthesis and a research agenda. Information Systems Frontiers, 1\u201319.","DOI":"10.1007\/s10796-021-10146-4"},{"key":"10247_CR58","doi-asserted-by":"crossref","unstructured":"Vemprala, N., & Dietrich, G. (2019). A social network analysis (SNA) study on data breach concerns over social media. Paper presented at the Proceedings of the 52nd hawaii international conference on system sciences.","DOI":"10.24251\/HICSS.2019.862"},{"issue":"2","key":"10247_CR59","doi-asserted-by":"publisher","first-page":"378","DOI":"10.15760\/comminfolit.2017.11.2.9","volume":"11","author":"CL Wissinger","year":"2017","unstructured":"Wissinger, C. L. (2017). Privacy Literacy: From Theory to Practice. Communications in Information Literacy, 11(2), 378\u2013389.","journal-title":"Communications in Information Literacy"},{"key":"10247_CR60","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.elerap.2017.12.003","volume":"27","author":"L Zhou","year":"2018","unstructured":"Zhou, L., Zhang, D., Yang, C. C., & Wang, Y. (2018). Harnessing social media for health information management. Electronic Commerce Research and Applications, 27, 139\u2013151.","journal-title":"Electronic Commerce Research and Applications"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10247-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10247-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10247-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T08:17:53Z","timestamp":1696234673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10247-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":60,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["10247"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10247-8","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,31]]},"assertion":[{"value":"4 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interests"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}