{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:24:52Z","timestamp":1773455092265,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T00:00:00Z","timestamp":1530230400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10916-018-1002-x","type":"journal-article","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T00:42:14Z","timestamp":1530232934000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Evaluating the Privacy Policies of Mobile Personal Health Records for Pregnancy Monitoring"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0415-2285","authenticated-orcid":false,"given":"Mariam","family":"Bachiri","sequence":"first","affiliation":[]},{"given":"Ali","family":"Idri","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Luis","family":"Fern\u00e1ndez-Alem\u00e1n","sequence":"additional","affiliation":[]},{"given":"Ambrosio","family":"Toval","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,29]]},"reference":[{"key":"1002_CR1","first-page":"12","volume":"17799","author":"P Hung","year":"2005","unstructured":"Hung, P., Towards a privacy access control model for e-healthcare services. Third Annu. Conf. Privacy, Secur. Trust. 17799:12\u201314, 2005.","journal-title":"Third Annu. Conf. Privacy, Secur. Trust."},{"issue":"8","key":"1002_CR2","first-page":"539","volume":"22","author":"JS Ancker","year":"2016","unstructured":"Ancker, J. S., Hafeez, B., and Kaushal, R., Socioeconomic disparities in adoption of personal health records over time. Am. J. Manag. Care. 22(8):539\u2013540, 2016.","journal-title":"Am. J. Manag. Care."},{"issue":"3","key":"1002_CR3","doi-asserted-by":"publisher","first-page":"e73","DOI":"10.2196\/jmir.4973","volume":"18","author":"EW Ford","year":"2016","unstructured":"Ford, E. W., Hesse, B. W., and Huerta, T. R., Personal health record use in the United States: Forecasting Future Adoption Levels. J. Med. Internet Res. 18(3):e73, 2016.","journal-title":"J. Med. Internet Res."},{"issue":"6","key":"1002_CR4","doi-asserted-by":"publisher","first-page":"9990","DOI":"10.1007\/s10916-013-9990-z","volume":"37","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n, J. L., Seva-Llor, C. L., Toval, A., Ouhbi, S., and Fern\u00e1ndez-Luque, L., Free web-based personal health records: An analysis of functionality. J. Med. Syst. 37(6):9990, 2013.","journal-title":"J. Med. Syst."},{"key":"1002_CR5","doi-asserted-by":"crossref","first-page":"5453","DOI":"10.1109\/IEMBS.2006.260060","volume":"1","author":"M Meingast","year":"2006","unstructured":"Meingast, M., Roosta, T., and Sastry, S., Security and privacy issues with health care information technology. Conf. Proc. IEEE Eng. Med. Biol. Soc. 1:5453\u20135458, 2006.","journal-title":"Conf. Proc. IEEE Eng. Med. Biol. Soc."},{"issue":"1","key":"1002_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1136\/amiajnl-2012-001509","volume":"20","author":"BA Malin","year":"2013","unstructured":"Malin, B. A., El Emam, K., and O\u2019Keefe, C. M., Biomedical data privacy: problems, perspectives, and recent advances. J. Am. Med. Informatics Assoc. 20(1):2\u20136, 2013.","journal-title":"J. Am. Med. Informatics Assoc."},{"issue":"5","key":"1002_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s10916-015-0228-0","volume":"39","author":"S Ouhbi","year":"2015","unstructured":"Ouhbi, S., Fern\u00e1ndez-Alem\u00e1n, J. L., Toval, A., Idri, A., and Pozo, J. R., Free blood donation mobile applications. J. Med. Syst. 39(5):52, 2015.","journal-title":"J. Med. Syst."},{"key":"1002_CR8","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-56148-6_14","volume":"1","author":"L Sardi","year":"2017","unstructured":"Sardi, L., Idri, A., and Fern\u00e1ndez-Alem\u00e1n, J. L., Gamified mobile blood donation applications. Int. Conf. Bioinform. Biomed. Eng. 1:165\u2013176, 2017.","journal-title":"Int. Conf. Bioinform. Biomed. Eng."},{"key":"1002_CR9","first-page":"262","volume":"1","author":"A Idri","year":"2017","unstructured":"Idri, A., Bachiri, M., Fernandez-Aleman, J. L., and Toval, A., ISO\/IEC 25010 based evaluation of free mobile personal health records for pregnancy monitoring. Proc. - Int. Comput. Softw. Appl. Conf. 1:262\u2013267, 2017.","journal-title":"Proc. - Int. Comput. Softw. Appl. Conf."},{"issue":"1","key":"1002_CR10","doi-asserted-by":"publisher","first-page":"e89","DOI":"10.2196\/mhealth.3017","volume":"2","author":"N Bouri","year":"2014","unstructured":"Bouri, N., and Ravi, S., Going mobile: How mobile personal health records can improve health care during emergencies. JMIR Mhealth Uhealth. 2(1):e89, 2014.","journal-title":"JMIR Mhealth Uhealth."},{"key":"1002_CR11","doi-asserted-by":"crossref","unstructured":"Ouhbi, S., Idri, A., Fernandez-Aleman, J. L., and Toval, A., Mobile personal health records for cardiovascular patients. In: 2015 Third World Conf. Complex Syst., pp. 1\u20136, 2015.","DOI":"10.1109\/ICoCS.2015.7483226"},{"issue":"10","key":"1002_CR12","doi-asserted-by":"publisher","first-page":"e145","DOI":"10.2337\/dc17-0853","volume":"40","author":"S Chavez","year":"2017","unstructured":"Chavez, S. et al., Mobile apps for the management of diabetes. Diabetes Care. 40(10):e145\u2013e146, 2017.","journal-title":"Diabetes Care."},{"key":"1002_CR13","unstructured":"Liu, L. S., Shih, P. C., and Hayes, G. R., Barriers to the adoption and use of personal health record systems. In: Proc. 2011 iConference - iConference \u201811, pp. 363\u2013370, 2011."},{"key":"1002_CR14","first-page":"4956","volume":"2014","author":"BC Zapata","year":"2014","unstructured":"Zapata, B. C., Hern\u00e1ndez Ni\u00f1irola, A., Fern\u00e1ndez-Alem\u00e1n, J. L., and Toval, A., Assessing the privacy policies in mobile personal health records. IEEE Eng. Med. Biol. Soc. 2014:4956\u20134959, 2014.","journal-title":"IEEE Eng. Med. Biol. Soc."},{"issue":"1","key":"1002_CR15","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10916-014-0181-3","volume":"39","author":"B Martinez-P\u00e9rez","year":"2015","unstructured":"Martinez-P\u00e9rez, B., de la Torre-Diez, I., and Lopez-Coronado, M., Privacy and security in mobile health apps: A Review and Recommendations. J. Med. Syst. 39(1):181, 2015.","journal-title":"J. Med. Syst."},{"issue":"6","key":"1002_CR16","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/S0020-7489(00)00111-5","volume":"38","author":"H Leino-Kilpi","year":"2001","unstructured":"Leino-Kilpi, H. et al., Privacy:a review of the literature. Int. J. Nurs. Stud. 38(6):663\u2013671, 2001.","journal-title":"Int. J. Nurs. Stud."},{"issue":"2","key":"1002_CR17","doi-asserted-by":"publisher","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haas","year":"2011","unstructured":"Haas, S., Wohlgemuth, S., Echizen, I., Sonehara, N., and M\u00fcller, G., Aspects of privacy for electronic health records. Int. J. Med. Inform. 80(2):e26\u2013e31, 2011.","journal-title":"Int. J. Med. Inform."},{"key":"1002_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cmpb.2016.06.008","volume":"134","author":"M Bachiri","year":"2016","unstructured":"Bachiri, M., Idri, A., Fern\u00e1ndez-Alem\u00e1n, J. L., and Toval, A., Mobile personal health records for pregnancy monitoring functionalities: Analysis and potential. Comput. Methods Programs Biomed. 134:121\u2013135, 2016.","journal-title":"Comput. Methods Programs Biomed."},{"issue":"1","key":"1002_CR19","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/S1701-2163(16)32711-6","volume":"30","author":"E Shaw","year":"2008","unstructured":"Shaw, E. et al., Access to web-based personalized antenatal health records for pregnant women: a randomized controlled trial. J. Obstet. Gynaecol. Can. 30(1):38\u201343, 2008.","journal-title":"J. Obstet. Gynaecol. Can."},{"issue":"2","key":"1002_CR20","doi-asserted-by":"publisher","first-page":"73","DOI":"10.4258\/hir.2016.22.2.73","volume":"22","author":"Y Lee","year":"2016","unstructured":"Lee, Y., and Moon, M., Utilization and content evaluation of mobile applications for pregnancy, birth, and child care. Healthc. Inform. Res. 22(2):73\u201380, 2016.","journal-title":"Healthc. Inform. Res."},{"issue":"1","key":"1002_CR21","doi-asserted-by":"publisher","first-page":"e8","DOI":"10.2196\/mhealth.3672","volume":"3","author":"T Dehling","year":"2015","unstructured":"Dehling, T., Gao, F., Schneider, S., and Sunyaev, A., Exploring the far side of mobile health: Information Security and Privacy of Mobile Health Apps on iOS and Android. JMIR mHealth uHealth. 3(1):e8, 2015.","journal-title":"JMIR mHealth uHealth."},{"key":"1002_CR22","unstructured":"Adhikari, R., Richards, D., and Scott, K., Security and privacy issues related to the use of mobile health apps. In: 25th Australas. Conf. Inf. Syst. (ACIS 2014), no. Schulke 2013, pp. 1\u201311, 2014."},{"issue":"4","key":"1002_CR23","first-page":"1","volume":"14","author":"IC Se\u00f1or","year":"2012","unstructured":"Se\u00f1or, I. C., Fern\u00e1ndez-Alem\u00e1n, J. L., and Toval, A., Are personal health records safe? A review of free web-accessible personal health record privacy policies. J. Med. Internet Res. 14(4):1\u201313, 2012.","journal-title":"J. Med. Internet Res."},{"key":"1002_CR24","unstructured":"Healthcare Mobile App Development and mHealth Apps, 2017. Available: \n                    https:\/\/medium.com\/@Adoriasoft_Com\/healthcare-mobile-app-development-and-mhealth-apps-in-2017-eb307d4cad36\n                    \n                  . [Accessed: 24-Sep-2017]."},{"key":"1002_CR25","unstructured":"Privacy Policy Guidance, 2017. Available: \n                    https:\/\/developers.google.com\/actions\/policies\/privacy-policy-guide\n                    \n                  . [Accessed: 24-Sep-2017]."},{"key":"1002_CR26","unstructured":"App Store Review Guidelines, 2017. Available: \n                    https:\/\/developer.apple.com\/app-store\/review\/guidelines\/#health-and-health-research\n                    \n                  . [Accessed: 24-Sep-2017]."},{"key":"1002_CR27","unstructured":"International Organization for Standardization, 2011. ISO\/TS 13606\u20134:2009: Health informatics -- Electronic Health Record Communication -- Part 4: Security. Available: \n                    https:\/\/www.iso.org\/standard\/50121.html\n                    \n                  . [Accessed: 29-Oct-2017]."},{"key":"1002_CR28","unstructured":"Yee, G., and Korba, L. Personal privacy policies. In: Vacca, J. R, (Ed.), Computer and Information Security Handbook. Amsterdam: Morgan Kaufmann, pp. 487\u2013505, 2009."},{"key":"1002_CR29","volume-title":"Sociological Methods: A Sourcebook","author":"NK Denzin","year":"2006","unstructured":"Denzin, N. K., Sociological Methods: A Sourcebook. New Brunswick, NJ: Aldine Transaction, 2006."},{"issue":"1","key":"1002_CR30","first-page":"143","volume":"36","author":"S Arora","year":"2014","unstructured":"Arora, S., Yttri, J., and Nilsen, W., Privacy and Security in Mobile Health (mHealth) Research. Alcohol Res. Curr. Rev. 36(1):143\u2013152, 2014.","journal-title":"Curr. Rev."},{"key":"1002_CR31","doi-asserted-by":"crossref","unstructured":"Zubaydi, F., Saleh, A., Aloul, F., and Sagahyroon, A., Security of mobile health (mHealth) systems. In: 2015 IEEE 15th Int. Conf. Bioinforma. Bioeng. BIBE 2015, 2015.","DOI":"10.1109\/BIBE.2015.7367689"},{"key":"1002_CR32","unstructured":"WebMD - Better information. Better health, 2018. Available: \n                    https:\/\/www.webmd.com\n                    \n                  . [Accessed: 04-Jun-2018]."},{"key":"1002_CR33","unstructured":"WebMD Privacy policy, 2017. Available: \n                    http:\/\/www.webmd.com\/about-webmd-policies\/about-privacy-policy\n                    \n                  . [Accessed: 01-Aug-2017]."},{"key":"1002_CR34","unstructured":"The commitment to reliable health and medical information on the internet, 2017. Available: \n                    http:\/\/www.hon.ch\/HONcode\/Patients\/Visitor\/visitor.html\n                    \n                  . [Accessed: 25-Sep-2017]."},{"key":"1002_CR35","unstructured":"Health On the Net Foundation, 2018. Available: \n                    https:\/\/www.hon.ch\/HONcode\/Patients\/Visitor\/visitor.html\n                    \n                  . [Accessed: 04-Jun-2018]."},{"issue":"4","key":"1002_CR36","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1089\/tmj.2011.0180","volume":"18","author":"DD Luxton","year":"2012","unstructured":"Luxton, D. D., Kayl, R. A., and Mishkind, M. C., mHealth data security: The Need for HIPAA-Compliant Standardization. Telemed. e-Health. 18(4):284\u2013288, 2012.","journal-title":"Telemed. e-Health."},{"key":"1002_CR37","unstructured":"2018 reform of EU data protection rules, 2018. Available: \n                    https:\/\/ec.europa.eu\/commission\/priorities\/justice-and-fundamental-rights\/data-protection\/2018-reform-eu-data-protection-rules_en#abouttheregulationanddataprotection\n                    \n                  . [Accessed: 05-Jun-2018]."},{"key":"1002_CR38","first-page":"2840","volume":"1","author":"I Carri\u00f3n","year":"2011","unstructured":"Carri\u00f3n, I., Fern\u00e1ndez-Alem\u00e1n, J. L., Jayne, C., Palmer-Brown, D., Toval, A., and Carrillo-De-Gea, J. M., Evaluation and neuronal network-based classification of the PHRs privacy policies. Proc. Annu. Hawaii Int. Conf. Syst. Sci. 1:2840\u20132849, 2011.","journal-title":"Proc. Annu. Hawaii Int. Conf. Syst. Sci."},{"issue":"1","key":"1002_CR39","first-page":"35","volume":"13","author":"BC Zapata","year":"2014","unstructured":"Zapata, B. C., Ni\u00f1irola, A. H., Fern\u00e1ndez-Alem\u00e1n, J. L., and Toval, A., Seguridad y privacidad en carpetas personales de salud para android e iOS. RISTI - Rev. Iber. Sist. e Tecnol. Inf. 13(1):35\u201350, 2014.","journal-title":"RISTI - Rev. Iber. Sist. e Tecnol. Inf."},{"issue":"6","key":"1002_CR40","doi-asserted-by":"publisher","first-page":"3893","DOI":"10.1007\/s10916-012-9861-z","volume":"36","author":"N Huba","year":"2012","unstructured":"Huba, N., and Zhang, Y., Designing patient-centered personal health records (PHRs): Health care professionals\u2019 perspective on patient-generated data. J. Med. Syst. 36(6):3893\u20133905, 2012.","journal-title":"J. Med. Syst."},{"key":"1002_CR41","unstructured":"Apple HealthKit, 2017. Available: \n                    https:\/\/developer.apple.com\/documentation\/healthkit\n                    \n                  . [Accessed: 01-Sep-2017]."},{"issue":"1","key":"1002_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2379776.2379779","volume":"45","author":"S Avancha","year":"2012","unstructured":"Avancha, S., Baxi, A., and Kotz, D., Privacy in mobile technology for personal healthcare. ACM Comput. Surv. 45(1):1\u201354, 2012.","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"1002_CR43","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10916-006-9019-y","volume":"30","author":"KT Win","year":"2006","unstructured":"Win, K. T., Susilo, W., and Mu, Y., Personal health record systems and their security protection. J. Med. Syst. 30(4):309\u2013315, 2006.","journal-title":"J. Med. Syst."},{"issue":"3","key":"1002_CR44","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n, J. L., Se\u00f1or, I. C., Lozoya, P. A. O., and Toval, A., Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inform. 46(3):541\u2013562, 2013.","journal-title":"J. Biomed. Inform."},{"key":"1002_CR45","unstructured":"Apple Health App, 2017. Available: \n                    https:\/\/www.apple.com\/ios\/health\/\n                    \n                  . [Accessed: 20-Sep-2017]."},{"issue":"3","key":"1002_CR46","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.1109\/TIE.2017.2739683","volume":"65","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Zhang, Y., Tang, S., and Luo, H., Privacy protection for E-Health systems by means of dynamic authentication and three-factor key agreement. IEEE Trans. Ind. Electron. 65(3):2795\u20132805, 2018.","journal-title":"IEEE Trans. Ind. Electron."},{"key":"1002_CR47","unstructured":"Model Privacy Notice (MPN), 2017. Available: \n                    https:\/\/www.healthit.gov\/policy-researchers-implementers\/model-privacy-notice-mpn\n                    \n                  . [Accessed: 12-Dec-2017]."},{"key":"1002_CR48","unstructured":"About the PHR Model Privacy Notice, 2011. Available: \n                    https:\/\/www.healthit.gov\/sites\/default\/files\/phr-model-privacy-notice-backgrounder-final.pdf\n                    \n                  . [Accessed: 12-Dec-2017]."},{"key":"1002_CR49","unstructured":"2016 Model Privacy Notice, 2016. Available: \n                    https:\/\/www.healthit.gov\/sites\/default\/files\/2016_model_privacy_notice.pdf\n                    \n                  . [Accessed: 12-Dec-2017]."},{"issue":"3","key":"1002_CR50","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1053\/apnr.2002.34181","volume":"15","author":"PW Stone","year":"2002","unstructured":"Stone, P. W., Popping the (PICO) question in research and evidence-based practice. Appl. Nurs. Res. 15(3):197\u2013198, 2002.","journal-title":"Appl. Nurs. Res."},{"key":"1002_CR51","unstructured":"Wetherall, D., et al., Privacy revelations for web and mobile apps. In: Proc. 13th USENIX Conf. Hot Top. Oper. Syst., pp. 21\u201321, 2011."},{"key":"1002_CR52","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.cmpb.2017.03.014","volume":"144","author":"S Ouhbi","year":"2017","unstructured":"Ouhbi, S., Fern\u00e1ndez-Alem\u00e1n, J. L., Carrillo-de-Gea, J. M., Toval, A., and Idri, A., E-health internationalization requirements for audit purposes. Comput. Methods Programs Biomed. 144:49\u201360, 2017.","journal-title":"Comput. Methods Programs Biomed."},{"issue":"3","key":"1002_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0902-0","volume":"42","author":"B Cruz Zapata","year":"2018","unstructured":"Cruz Zapata, B., Fern\u00e1ndez-Alem\u00e1n, J. L., Toval, A., and Idri, A., Reusable Software usability specifications for mHealth applications. J. Med. Syst. 42(3):1\u20139, 2018.","journal-title":"J. Med. Syst."},{"issue":"1","key":"1002_CR54","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1177\/193229681300700130","volume":"7","author":"O El-Gayar","year":"2013","unstructured":"El-Gayar, O., Timsina, P., Nawar, N., and Eid, W., Mobile applications for diabetes self-management: Status and potential. J. Diabetes Sci. Technol. 7(1):247\u2013262, 2013.","journal-title":"J. Diabetes Sci. Technol."},{"key":"1002_CR55","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.ijmedinf.2016.09.005","volume":"97","author":"I Kadi","year":"2017","unstructured":"Kadi, I., Idri, A., and Fernandez-Aleman, J. L., Knowledge discovery in cardiology: A systematic literature review. Int. J. Med. Inform. 97:12\u201332, 2017.","journal-title":"Int. J. Med. Inform."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-1002-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1002-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1002-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T19:07:47Z","timestamp":1561748867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-1002-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,29]]},"references-count":55,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["1002"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-1002-x","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,29]]},"assertion":[{"value":"28 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"All the authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"144"}}