{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T02:48:49Z","timestamp":1776998929731,"version":"3.51.4"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T00:00:00Z","timestamp":1537833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T00:00:00Z","timestamp":1537833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,2,15]]},"DOI":"10.1007\/s11036-018-1132-x","type":"journal-article","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T14:39:44Z","timestamp":1537886384000},"page":"47-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Innovative Citizen\u2019s Services through Public Cloud in Pakistan: User\u2019s Privacy Concerns and Impacts on Adoption"],"prefix":"10.1007","volume":"24","author":[{"given":"Umar","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3941-4617","authenticated-orcid":false,"given":"Amjad","family":"Mehmood","sequence":"additional","affiliation":[]},{"given":"Muhammad Faran","family":"Majeed","sequence":"additional","affiliation":[]},{"given":"Siraj","family":"Muhammad","sequence":"additional","affiliation":[]},{"given":"Muhammad Kamal","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]},{"given":"Khalid Mahmood","family":"Malik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,25]]},"reference":[{"key":"1132_CR1","doi-asserted-by":"crossref","unstructured":"Mukerji M (2013) Introduction. In: ICTs and development, Springer, pp. 1\u201311","DOI":"10.1057\/9781137005540_1"},{"issue":"1","key":"1132_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/13600860410001674779","volume":"18","author":"S Basu","year":"2004","unstructured":"Basu S (2004) E-government and developing countries: an overview. International Review of Law, Computers, & Technology 18(1):109\u2013132","journal-title":"International Review of Law, Computers, & Technology"},{"key":"1132_CR3","unstructured":"Harris JG, Alter AE (2010) Cloudrise: rewards and risks at the dawn of cloud computing. 20"},{"key":"1132_CR4","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.compeleceng.2017.07.007","volume":"63","author":"MM Umar","year":"2017","unstructured":"Umar MM, Mehmood A, Song H, Choo K-KR (2017) I-marks: an iris code embedding system for ownership identification of multimedia content. Comput Electr Eng 63:209\u2013219","journal-title":"Comput Electr Eng"},{"issue":"3","key":"1132_CR5","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1002\/itdj.20125","volume":"15","author":"S Alshawi","year":"2009","unstructured":"Alshawi S, Alalwany H (2009) E-government evaluation: Citizen\u2019s perspective in developing countries. Inf Technol Dev 15(3):193\u2013208","journal-title":"Inf Technol Dev"},{"key":"1132_CR6","doi-asserted-by":"crossref","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 425\u2013478","DOI":"10.2307\/30036540"},{"key":"1132_CR7","first-page":"8","volume":"6","author":"M Alshehri","year":"2012","unstructured":"Alshehri M, Drew S, Alfarraj O (2012) A comprehensive analysis of E-government services adoption in Saudi Arabia: obstacles and challenges. High Educ 6:8\u20132","journal-title":"High Educ"},{"key":"1132_CR8","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.1016\/j.proeng.2011.08.537","volume":"15","author":"D Suna","year":"2011","unstructured":"Suna D, Changb G, Suna L, Wanga X (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering 15:2852\u20132856","journal-title":"Procedia Engineering"},{"issue":"7","key":"1132_CR9","first-page":"7","volume":"3","author":"R Khan","year":"2012","unstructured":"Khan R, Mehmood A (2012) Realization of interoperability & portability among open clouds by using agents mobility & intelligence. International Journal of Multidisciplinary Sciences and Engineering 3(7):7\u201311","journal-title":"International Journal of Multidisciplinary Sciences and Engineering"},{"issue":"2","key":"1132_CR10","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.giq.2006.06.005","volume":"24","author":"R Heeks","year":"2007","unstructured":"Heeks R, Bailur S (2007) Analyzing E-government research: perspectives, philosophies, theories, methods, and practice. Gov Inf Q 24(2):243\u2013265","journal-title":"Gov Inf Q"},{"issue":"7","key":"1132_CR11","first-page":"20","volume":"13","author":"A Mehmood","year":"2015","unstructured":"Mehmood A, Roman M, Umar MM, Song H (2015) Cloud computing security: a survey. International Journal of Computer Science and Information Security 13(7):20","journal-title":"International Journal of Computer Science and Information Security"},{"issue":"6","key":"1132_CR12","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.3390\/s18061787","volume":"18","author":"A Mehmood","year":"2018","unstructured":"Mehmood A, Alrajeh N, Mukherjee M, Abdullah S, Song H (2018) A survey on proactive, active and passive fault diagnosis protocols for wsns: network operation perspective. Sensors (Basel, Switzerland) 18(6):1787","journal-title":"Sensors (Basel, Switzerland)"},{"key":"1132_CR13","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.chb.2016.09.041","volume":"66","author":"M Kurfal","year":"2017","unstructured":"Kurfal M, Arifolu A, Tokdemir G, Pain Y (2017) Adoption of E-government Services in Turkey. Comput Hum Behav 66:168\u2013178. https:\/\/doi.org\/10.1016\/j.chb.2016.09.041","journal-title":"Comput Hum Behav"},{"key":"1132_CR14","doi-asserted-by":"publisher","first-page":"11349","DOI":"10.1109\/ACCESS.2018.2794519","volume":"6","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Mehmood A, Shu L, Huo Z, Zhang Y, Mukherjee M (2018) A survey on fault diagnosis in wireless sensor networks. IEEE Access 6:11349\u201311364","journal-title":"IEEE Access"},{"issue":"2","key":"1132_CR15","first-page":"138","volume":"4","author":"S Sang","year":"2010","unstructured":"Sang S, Lee J, Lee J (2010) E-government adoption in Cambodia: a partial least squares approach, trans- forming government: people. Process and Policy 4(2):138\u2013157","journal-title":"Process and Policy"},{"key":"1132_CR16","doi-asserted-by":"crossref","unstructured":"Mehmood A, Ahmed SH, Sarkar M (2017) Cyber-physical systems in vehicular communications, in: Handbook of Research on Advanced Trends in Microwave and Communication Engineering, IGI Global, pp. 477\u2013 497","DOI":"10.4018\/978-1-5225-0773-4.ch015"},{"key":"1132_CR17","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/ACCESS.2018.2792941","volume":"6","author":"S Arshad","year":"2018","unstructured":"Arshad S, Shah MA, Wahid A, Mehmood A, Song H, Yu H (2018) Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access 6:4321\u20134339","journal-title":"IEEE Access"},{"issue":"2","key":"1132_CR18","first-page":"134","volume":"2","author":"MK Sharma","year":"2011","unstructured":"Sharma MK, Thapliyal MP (2011) G-cloud: (E-governance in cloud). International Journal Engg TechSci 2(2):134\u2013137","journal-title":"International Journal Engg TechSci"},{"key":"1132_CR19","unstructured":"Huang M, Zhang Y, Jing W, Mehmood A (2017) Wireless Internet: 9th International Conference, WICON 2016, Haikou, China, December 19-20, 2016, Proceedings, Vol. 214, Springer"},{"issue":"4","key":"1132_CR20","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1016\/j.giq.2013.05.010","volume":"30","author":"TD Susanto","year":"2013","unstructured":"Susanto TD, Goodwin R (2013) User acceptance of SMS-based e-government services: differences between adopters and non-adopters. Gov Inf Q 30(4):486\u2013497","journal-title":"Gov Inf Q"},{"key":"1132_CR21","doi-asserted-by":"crossref","unstructured":"Majeed MF, Esichaikul V, No ME (2013) Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of E-government, in: International Conference on Advances in Information Technology, Springer, pp. 141\u2013149","DOI":"10.1007\/978-3-319-03783-7_13"},{"issue":"1-2","key":"1132_CR22","first-page":"1","volume":"28","author":"A Mehmood","year":"2015","unstructured":"Mehmood A, Mauri JL, Noman M, Song H (2015) Improvement of the wireless sensor network lifetime using leach with vice-cluster head. Ad Hoc & Sensor Wireless Networks 28(1-2):1\u201317","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"issue":"1","key":"1132_CR23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1111\/j.1365-2575.2005.00185.x","volume":"15","author":"MJ Moon","year":"2005","unstructured":"Moon MJ, Norris DF (2005) Does managerial orientation matter? The adoption of reinventing government and E-government at the municipal level. Inf Syst J 15(1):43\u201360","journal-title":"Inf Syst J"},{"issue":"3","key":"1132_CR24","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.giq.2007.01.002","volume":"24","author":"M Yildiz","year":"2007","unstructured":"Yildiz M (2007) E-government research: reviewing the literature, limitations, and ways forward. Gov Inf Q 24(3):646\u2013665","journal-title":"Gov Inf Q"},{"issue":"2","key":"1132_CR25","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.giq.2010.07.007","volume":"28","author":"J Lee","year":"2011","unstructured":"Lee J, Kim HJ, Ahn MJ (2011) The willingness of e-government service adoption by business users: the role of offline service quality and Trust in Technology. Gov Inf Q 28(2):222\u2013230","journal-title":"Gov Inf Q"},{"issue":"5","key":"1132_CR26","first-page":"310","volume":"7","author":"N Qaiser","year":"2010","unstructured":"Qaiser N, Khan HGA (2010) E-government challenges in public sector. Int J Comput Sci 7(5):310\u2013317","journal-title":"Int J Comput Sci"},{"key":"1132_CR27","doi-asserted-by":"publisher","first-page":"4452","DOI":"10.1109\/ACCESS.2017.2732727","volume":"6","author":"A Mehmood","year":"2018","unstructured":"Mehmood A, Khanan A, Mohamed AHH, Mahfooz S, Song H, Abdullah S (2018) Antsc: an intelligent naive bayesian probabilistic estimation practice for traffic flow to form stable clustering in vanet. IEEE Access 6:4452\u20134461","journal-title":"IEEE Access"},{"key":"1132_CR28","doi-asserted-by":"crossref","unstructured":"Mehmood A, Mukherjee M, Ahmed SH, Song H, Malik KM (2018) Nbc-maids: Na\u00a8\u0131ve bayesian classifi- cation technique in multi-agent system-enriched ids for securing iot against ddos attacks, J Supercomput 1\u201315","DOI":"10.1007\/s11227-018-2413-7"},{"issue":"6","key":"1132_CR29","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1080\/0951192X.2014.902105","volume":"30","author":"L Ren","year":"2017","unstructured":"Ren L, Zhang L, Wang L, Tao F, Chai X (2017) Cloud manufacturing: key characteristics and applications. Int J Comput Integr Manuf 30(6):501\u2013515","journal-title":"Int J Comput Integr Manuf"},{"issue":"5","key":"1132_CR30","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.3233\/JIFS-169088","volume":"31","author":"J Zhou","year":"2016","unstructured":"Zhou J, Yang J, Song H, Ahmed SH, Mehmood A, Lv H (2016) An online marking system conducive to learning. J Intell Fuzzy Syst 31(5):2463\u20132471","journal-title":"J Intell Fuzzy Syst"},{"issue":"7","key":"1132_CR31","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.3390\/s18071983","volume":"18","author":"A Aldegheishem","year":"2018","unstructured":"Aldegheishem A, Yasmeen H, Maryam H, Shah MA, Mehmood A, Alrajeh N, Song H (2018) Smart road traffic accidents reduction strategy based on intelligent transportation systems (tars). Sensors 18(7):1983","journal-title":"Sensors"},{"key":"1132_CR32","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T, et al (2011) The NIST Definition of Cloud Computing, Tech. rep., National Institute of Standards & Technology","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"1","key":"1132_CR33","first-page":"1","volume":"1","author":"DC Wyld","year":"2009","unstructured":"Wyld DC (2009) The utility of cloud computing as a new pricing and consumption model for information technology. International Journal of Database Management Systems (IJDMS) 1(1):1\u201320","journal-title":"International Journal of Database Management Systems (IJDMS)"},{"key":"1132_CR34","doi-asserted-by":"crossref","unstructured":"Khan F, Zhang B, Khan S, Chen S (2011) Technological Leap Frogging E-government through Cloud Com- puting. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC- BNMT), pp. 201\u2013206","DOI":"10.1109\/ICBNMT.2011.6155925"},{"key":"1132_CR35","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta A, De Donato W, Persico V, Pescap\u00e9 A (2016) Integration of cloud computing and internet of things: a survey. Futur Gener Comput Syst 56:684\u2013700","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"1132_CR36","doi-asserted-by":"crossref","first-page":"112","DOI":"10.58729\/1941-6679.1283","volume":"26","author":"M Attaran","year":"2017","unstructured":"Attaran M (2017) Cloud computing technology: leveraging the power of the internet to improve business performance. Journal of International Technology and Information Management 26(1):112\u2013137","journal-title":"Journal of International Technology and Information Management"},{"issue":"6","key":"1132_CR37","first-page":"295","volume":"19","author":"E Orakwue","year":"2010","unstructured":"Orakwue E (2010) Private clouds: secure managed services. Information Security Journal: A Global Perspective 19(6):295\u2013298","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"6","key":"1132_CR38","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MIC.2010.136","volume":"14","author":"P Hofmann","year":"2010","unstructured":"Hofmann P, Woods D (2010) Cloud computing: the limits of public clouds for business applications. IEEE Internet Comput 14(6):90\u201393","journal-title":"IEEE Internet Comput"},{"key":"1132_CR39","unstructured":"P. G\u00e9czy, N. Izumi, K. Hasida, Cloudsourcing: Managing Cloud Adoption, Tech. rep. (2011)"},{"key":"1132_CR40","volume-title":"Cloud security: a comprehensive guide to secure cloud computing","author":"RL Krutz","year":"2010","unstructured":"Krutz RL, Vines RD (2010) Cloud security: a comprehensive guide to secure cloud computing. Wiley Publishing, Hoboken"},{"issue":"5","key":"1132_CR41","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MIC.2009.119","volume":"13","author":"B Sotomayor","year":"2009","unstructured":"Sotomayor B, Montero RS, Llorente IM, Foster I (2009) Virtual infrastructure Management in Private and Hybrid Clouds. IEEE Internet Comput 13(5):14\u201322","journal-title":"IEEE Internet Comput"},{"key":"1132_CR42","unstructured":"Montano DE, Kasprzyk D (2015) Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health behavior: Theory, Research and Practice 95\u2013124"},{"key":"1132_CR43","doi-asserted-by":"crossref","unstructured":"Francescato G, Weidemann S, Anderson JR (2018) Evaluating the built environment from the users Perspective: implications of attitudinal models of satisfaction. In: Building performance evaluation, Springer, pp. 87\u201397","DOI":"10.1007\/978-3-319-56862-1_7"},{"key":"1132_CR44","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.ijinfomgt.2018.07.005","volume":"43","author":"P de Camargo Fiorini","year":"2018","unstructured":"de Camargo Fiorini P, Seles BMRP, Jabbour CJC, Mariano EB, de Sousa Jabbour ABL (2018) Management theory and big data literature: from a review to a research agenda. Int J Inf Manag 43:112\u2013129","journal-title":"Int J Inf Manag"},{"issue":"2-3","key":"1132_CR45","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1504\/IJISD.2017.083290","volume":"11","author":"T Hariguna","year":"2017","unstructured":"Hariguna T, Lai M, Hung C, Chen S (2017) Understanding information system quality on public E-government service intention: an empirical study. International Journal of Innovation and Sustainable Development 11(2-3):271\u2013290","journal-title":"International Journal of Innovation and Sustainable Development"},{"key":"1132_CR46","doi-asserted-by":"crossref","unstructured":"Carter L, Belanger F (2004) Citizen adoption of electronic government initiatives. In: proceedings of the 37th annual Hawaii international conference on system sciences, IEEE","DOI":"10.1109\/HICSS.2004.1265306"},{"issue":"1","key":"1132_CR47","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.tele.2017.09.017","volume":"35","author":"N Alkhater","year":"2018","unstructured":"Alkhater N, Walters R, Wills G (2018) An empirical study of factors influencing cloud adoption among private sector Organisations. Telematics Inform 35(1):38\u201354","journal-title":"Telematics Inform"},{"key":"1132_CR48","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh V, Thong JYL, Xu X (2012) Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q 36:157\u2013178","journal-title":"MIS Q"},{"issue":"1","key":"1132_CR49","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.giq.2004.10.003","volume":"22","author":"CG Reddick","year":"2005","unstructured":"Reddick CG (2005) Citizen interaction with E-government: from the streets to servers? Government Information Quarterly 22(1):38\u201357","journal-title":"Government Information Quarterly"},{"issue":"3","key":"1132_CR50","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/asi.23699","volume":"68","author":"LM Maruping","year":"2017","unstructured":"Maruping LM, Bala H, Venkatesh V, Brown SA (2017) Going beyond intention: integrating behavioral expectation into the unified theory of acceptance and use of technology. J Assoc Inf Sci Technol 68(3):623\u2013637","journal-title":"J Assoc Inf Sci Technol"},{"key":"1132_CR51","doi-asserted-by":"crossref","unstructured":"Harby FA, Qahwaji R, Kamala M (2012) End-users acceptance of biometrics authentication to secure E- commerce within the context of Saudi culture: applying the UTAUT model, globalization, Technology Diffusion and Gender Disparity: Social Impacts of ICTs 225\u2013246","DOI":"10.4018\/978-1-4666-0020-1.ch019"},{"key":"1132_CR52","unstructured":"Van SC, Shim JT, Johnson R, Jiang JJ (2006) Concern for Information Privacy and Online Consumer Purchasing, Tech. rep."},{"issue":"2","key":"1132_CR53","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1108\/TG-09-2013-0033","volume":"8","author":"A Tsohou","year":"2014","unstructured":"Tsohou A, Lee H, Irani Z (2014) Innovative public governance through cloud computing: information privacy, business models and performance measurement challenges. Transforming Government: People, Process and Policy 8(2):251\u2013282","journal-title":"Transforming Government: People, Process and Policy"},{"issue":"1","key":"1132_CR54","first-page":"1","volume":"1","author":"MA Moqbel","year":"2015","unstructured":"Moqbel MA, Bartelt VL (2015) Consumer acceptance of personal cloud: integrating trust and risk with the technology acceptance model. AIS Transactions on Replication Research 1(1):1\u20135","journal-title":"AIS Transactions on Replication Research"},{"key":"1132_CR55","doi-asserted-by":"crossref","unstructured":"AlAwadhi S, Morris A (2008) The use of the UTAUT model in the adoption of E-government Services in Kuwait. In: proceedings of the 41st annual Hawaii international conference on system sciences, IEEE, pp. 219\u2013219","DOI":"10.1109\/HICSS.2008.452"},{"issue":"3-4","key":"1132_CR56","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1080\/10572317.2000.10762529","volume":"32","author":"SP Foster","year":"2000","unstructured":"Foster SP (2000) The digital divide: some reflections. The International Information & Library Review 32(3-4):437\u2013451","journal-title":"The International Information & Library Review"},{"issue":"2","key":"1132_CR57","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1080\/1475939X.2018.1429950","volume":"27","author":"O McGarr","year":"2018","unstructured":"McGarr O, Gavaldon G (2018) Exploring Spanish pre-service teachers talk in relation to ICT: balancing different expectations between the university and practicum school. Technol Pedagog Educ 27(2):199\u2013209","journal-title":"Technol Pedagog Educ"},{"key":"1132_CR58","doi-asserted-by":"crossref","unstructured":"Angelopoulos K, Diamantopoulou V, Mouratidis H, Pavlidis M, Salnitri M, Giorgini P, Ruiz JF (2017) A holistic approach for privacy protection in E-government. In: proceedings of the 12th international conference on availability, Reliability and Security, ACM, p. 17","DOI":"10.1145\/3098954.3098960"},{"key":"1132_CR59","volume-title":"Research methods for business: a skill building approach","author":"U Sekaran","year":"2006","unstructured":"Sekaran U, Bougie R (2006) Research methods for business: a skill building approach. John Wiley & Sons, Hoboken"},{"issue":"3","key":"1132_CR60","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1080\/10580530.2016.1188570","volume":"33","author":"M Rehman","year":"2016","unstructured":"Rehman M, Kamal MM, Esichaikul V (2016) Adoption of E-government Services in Pakistan: a comparative study between online and offline users. Inf Syst Manag 33(3):248\u2013267","journal-title":"Inf Syst Manag"},{"key":"1132_CR61","doi-asserted-by":"publisher","DOI":"10.4324\/9781410606266","volume-title":"Applied multiple regression\/correlation analysis for the behavioral sciences","author":"P Cohen","year":"2014","unstructured":"Cohen P, West SG, Aiken LS (2014) Applied multiple regression\/correlation analysis for the behavioral sciences. Psychology Press, Hove"},{"key":"1132_CR62","volume-title":"Marketing research: methodological foundations","author":"GA Churchill","year":"2006","unstructured":"Churchill GA, Iacobucci D (2006) Marketing research: methodological foundations. Dryden Press, New York"},{"key":"1132_CR63","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jpsychores.2016.12.015","volume":"94","author":"A Schmitt","year":"2017","unstructured":"Schmitt A, Reimer A, Hermanns N, Kulzer B, Ehrmann D, Krichbaum M, Huber J, Haak T (2017) Depres- Sion is linked to Hyperglycaemia via suboptimal diabetes self-management: a cross-sectional mediation analysis. Journal of Pychosomatic Research 94:17\u201323","journal-title":"Journal of Pychosomatic Research"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-018-1132-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1132-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1132-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T11:05:52Z","timestamp":1693911952000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-018-1132-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,25]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2,15]]}},"alternative-id":["1132"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1132-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,25]]},"assertion":[{"value":"25 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}