{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:21:38Z","timestamp":1773739298385,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-03981-4","type":"journal-article","created":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T05:02:58Z","timestamp":1627016578000},"page":"3325-3354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A model of digital identity for better information security in e-learning systems"],"prefix":"10.1007","volume":"78","author":[{"given":"Dragan","family":"Kora\u0107","sequence":"first","affiliation":[]},{"given":"Boris","family":"Damjanovi\u0107","sequence":"additional","affiliation":[]},{"given":"Dejan","family":"Simi\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,23]]},"reference":[{"key":"3981_CR1","unstructured":"Cole J, Foster H (2008) Using Moodle-Teaching with the popular open source course management system. O.R. Media, United Sates of America"},{"issue":"7","key":"3981_CR2","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.im.2011.06.003","volume":"56","author":"M Wang","year":"2011","unstructured":"Wang M, Vogel D, Ran W (2011) Creating a performance-oriented e-learning environment: A design science approach. Information & Management 56(7):260\u2013269","journal-title":"Information & Management"},{"issue":"1","key":"3981_CR3","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.compedu.2008.06.011","volume":"52","author":"RH Shaw","year":"2009","unstructured":"Shaw RH, Chen CC, Harris A, Huang HJ (2009) The impact of information richness on information security awareness training effectiveness. Comput Educ 52(1):92\u2013100","journal-title":"Comput Educ"},{"key":"3981_CR4","first-page":"377","volume":"47","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman S, Alazab M, Vinayakumar R (2019) A hybrid deep learning image-based analysis for effective malware detection. J Inf Secur Appl 47:377\u2013389","journal-title":"J Inf Secur Appl"},{"key":"3981_CR5","doi-asserted-by":"crossref","first-page":"3339","DOI":"10.1007\/s11227-020-03396-7","volume":"77","author":"YS Jeong","year":"2021","unstructured":"Jeong YS, Ahn BT (2021) An efficient management scheme of blockchain-based cloud user information using probabilistic weighting. J Supercomput 77:3339\u20133358","journal-title":"J Supercomput"},{"key":"3981_CR6","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.jisa.2017.11.001","volume":"40","author":"NS Safa","year":"2018","unstructured":"Safa NS, Maple C, Watson T, Von Solms R (2018) Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications 40:247\u2013257","journal-title":"Journal of Information Security and Applications"},{"key":"3981_CR7","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.cose.2019.05.011","volume":"85","author":"D Kora\u0107","year":"2019","unstructured":"Kora\u0107 D, Simi\u0107 D (2019) Fishbone Model and Universal Authentication Framework for Evaluation of Multifactor Authentication in Mobile Environment. Comput Secur 85:313\u2013332","journal-title":"Comput Secur"},{"issue":"2","key":"3981_CR8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1108\/03055720010803998","volume":"31","author":"SM Furnell","year":"2001","unstructured":"Furnell SM, Karweni T (2001) Security issues in online distance learning. Vine 31(2):28\u201335","journal-title":"Vine"},{"key":"3981_CR9","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.patrec.2017.03.027","volume":"113","author":"G Fenu","year":"2018","unstructured":"Fenu G, Marras M, Boratto L (2018) A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recogn Lett 113:83\u201392","journal-title":"Pattern Recogn Lett"},{"key":"3981_CR10","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell S (2017) AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Comput Secur 65:121\u2013134","journal-title":"Comput Secur"},{"issue":"3","key":"3981_CR11","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2014","unstructured":"Meng W, Wong DS, Furnell S, Zhou J (2014) Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials 17(3):1268\u20131293","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"3981_CR12","doi-asserted-by":"crossref","unstructured":"Ray S, Biswas GP (2011) Design of mobile-PKI for using mobile phones in various applications. In: Proceedings of IEEE International Conference on Recent Trends in Information Systems. IEEE, pp 297\u2013302","DOI":"10.1109\/ReTIS.2011.6146885"},{"key":"3981_CR13","doi-asserted-by":"crossref","unstructured":"Miguel J, Caball\u00e9 S, Xhafa F (2017) Security for e-learning. In: Intelligent data analysis for e-learning: enhancing security and trustworthiness in online learning systems. Academic Press, pp 7\u201323","DOI":"10.1016\/B978-0-12-804535-0.00002-2"},{"issue":"4","key":"3981_CR14","first-page":"93","volume":"19","author":"D Kora\u0107","year":"2017","unstructured":"Kora\u0107 D, Simic D (2017) Design of Fuzzy Expert System for Evaluation of Contemporary User Authentication Methods Intended for Mobile Devices. Journal of Control Engineering and Applied Informatics 19(4):93\u2013100","journal-title":"Journal of Control Engineering and Applied Informatics"},{"key":"3981_CR15","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.cose.2017.10.015","volume":"73","author":"R Bitton","year":"2018","unstructured":"Bitton R, Finkelshtein A, Sidi L, Puzis R, Rokach L, Shabtai A (2018) Taxonomy of mobile users\u2019 security awareness. Comput Secur 73:266\u2013293","journal-title":"Comput Secur"},{"key":"3981_CR16","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.cose.2018.03.008","volume":"77","author":"SF Verkijika","year":"2018","unstructured":"Verkijika SF (2018) Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret. Comput Secur 77:860\u2013870","journal-title":"Comput Secur"},{"key":"3981_CR17","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s11227-013-0967-y","volume":"66","author":"AN Khan","year":"2013","unstructured":"Khan AN, Mat Kiah ML, Madani SA et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66:1687\u20131706","journal-title":"J Supercomput"},{"key":"3981_CR18","doi-asserted-by":"crossref","unstructured":"Alotaibi M, Furnell S, Clarke N (2016) Information security policies: a review of challenges and influencing factors. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, pp 352\u2013358","DOI":"10.1109\/ICITST.2016.7856729"},{"issue":"4","key":"3981_CR19","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1002\/j.2168-9830.2012.tb01125.x","volume":"101","author":"BM Capobianco","year":"2012","unstructured":"Capobianco BM, French BF, Diefes-Du HA (2012) Engineering identity development among pre-adolescent learners. J Eng Educ 101(4):698\u2013716","journal-title":"J Eng Educ"},{"issue":"7","key":"3981_CR20","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/3213764","volume":"61","author":"J Dykstra","year":"2018","unstructured":"Dykstra J, Spafford EH (2018) The case for disappearing cyber security. Commun ACM 61(7):40\u201342","journal-title":"Commun ACM"},{"key":"3981_CR21","doi-asserted-by":"crossref","unstructured":"Albeshri A, Caelli W (2010) Mutual protection in a cloud computing environment. In: 12th IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, pp 641\u2013646","DOI":"10.1109\/HPCC.2010.87"},{"key":"3981_CR22","unstructured":"Rubin N (2017) Moodle\u2013Remote Code Execution. https:\/\/netanelrub.in\/2017\/03\/20\/moodle-remote-code-execution\/. Accessed 3 Jan 2020"},{"key":"3981_CR23","unstructured":"Moodle (2019). http:\/\/moodle.org\/stats. Accessed 3 Jan 2020"},{"key":"3981_CR24","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.cose.2018.05.015","volume":"78","author":"E Walt","year":"2018","unstructured":"Walt E, Eloff JHP, Grobler J (2018) Cyber-security: Identity deception detection on social media platforms. Comput Secur 78:76\u201389","journal-title":"Comput Secur"},{"key":"3981_CR25","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.future.2019.03.024","volume":"97","author":"NS Safa","year":"2019","unstructured":"Safa NS, Maple C, Furnell S, Azad MA, Muhammad Perera C, Dabbagh M, Sookhak M (2019) A deterrence and prevention-based model to mitigate information security insider threats in organisations. Futur Gener Comput Syst 97:587\u2013597","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"3981_CR26","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s12394-010-0069-4","volume":"3","author":"H Gomi","year":"2010","unstructured":"Gomi H (2010) A persistent data tracking mechanism for user-centric identity governance. Identity in the Information Society 3(3):639\u2013656","journal-title":"Identity in the Information Society"},{"key":"3981_CR27","doi-asserted-by":"crossref","unstructured":"Beres Y, Baldwin A, Mont M, Shiu S (2007) On identity assurance in the presence of federated identity management systems. In: Proceeding DIM '07 proceedings of the 2007 ACM workshop on digital identity management. ACM, pp 27\u201335","DOI":"10.1145\/1314403.1314409"},{"issue":"4","key":"3981_CR28","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s10550-006-0004-2","volume":"23","author":"K Bosworth","year":"2005","unstructured":"Bosworth K, Gonzalez MG, Jaweed S, Wright T (2005) Entities, identifiers and credentials \u2013 what does it all mean? BT Technol J 23(4):25\u201336","journal-title":"BT Technol J"},{"key":"3981_CR29","volume-title":"Identity Management: Concepts, technologies, and systems","author":"E Bertino","year":"2010","unstructured":"Bertino E, Takahashi K (2010) Identity Management: Concepts, technologies, and systems. Artech House Inc, London"},{"key":"3981_CR30","volume-title":"Digital Identity","author":"P Windley","year":"2005","unstructured":"Windley P (2005) Digital Identity. O\u2019Reilly Media Inc, United States of America"},{"issue":"10","key":"3981_CR31","doi-asserted-by":"crossref","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Khan MK, Lu X et al (2016) A privacy preserving three-factor authentication protocol for e-Health clouds. J Supercomput 72(10):3826\u20133849","journal-title":"J Supercomput"},{"key":"3981_CR32","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.compedu.2019.03.002","volume":"135","author":"KJ Cunningham","year":"2019","unstructured":"Cunningham KJ (2019) How language choices in feedback change with technology: Engagement in text and screencast feedback on ESL writing. Comput Educ 135:91\u201399","journal-title":"Comput Educ"},{"key":"3981_CR33","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.compedu.2018.06.004","volume":"125","author":"RM Filius","year":"2018","unstructured":"Filius RM, de Kleijn RAM, Uijl SG, Prins FJ, van Rijen HVM, Grobbe DE (2018) Strengthening dialogic peer feedback aiming for deep learning in SPOCs. Comput Educ 125:86\u2013100","journal-title":"Comput Educ"},{"key":"3981_CR34","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s13384-013-0135-7","volume":"41","author":"AD Rowe","year":"2014","unstructured":"Rowe AD, Fitness J, Wood LN (2014) The role and functionality of emotions in feedback at university: A qualitative study. Aust Educ Res 41:283\u2013309","journal-title":"Aust Educ Res"},{"key":"3981_CR35","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1108\/09513541111136630","volume":"25","author":"A Rowe","year":"2011","unstructured":"Rowe A (2011) The personal dimension in teaching: Why students value feedback. Int J Educ Manag 25:343\u2013360","journal-title":"Int J Educ Manag"},{"key":"3981_CR36","doi-asserted-by":"crossref","unstructured":"Alotaibi F, Furnell S, Stengel I, Papadaki M (2017) Gamifying cyber security awareness via mobile training apps. In: CERC 2017 Collaborative European Research Conference Proceedings. CEUR Workshop Proceedings, pp 236\u2013238","DOI":"10.23919\/ICITST.2017.8356361"},{"key":"#cr-split#-3981_CR37.1","doi-asserted-by":"crossref","unstructured":"Shepherd LA, Archibald J, Ferguson RI (2017) Assessing the impact of affective feedback on end-user security awareness. In: Tryfonas T","DOI":"10.1007\/978-3-319-58460-7_10"},{"key":"#cr-split#-3981_CR37.2","unstructured":"(ed) Human aspects of information security, privacy and trust, HAS 2017, Lecture notes in computer science, vol 10292. Springer, Cham"},{"issue":"4","key":"3981_CR38","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1007\/s10796-018-9891-2","volume":"21","author":"Y Xu","year":"2019","unstructured":"Xu Y, Yin D, Zhou D (2019) Investigating Users\u2019 Tagging Behavior in Online Academic Community Based on Growth Model: Difference between Active and Inactive Users. Inf Syst Front 21(4):761\u2013772","journal-title":"Inf Syst Front"},{"key":"3981_CR39","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.im.2018.07.005","volume":"56","author":"KK Kima","year":"2019","unstructured":"Kima KK, Lee AR, Lee UK (2019) Impact of anonymity on roles of personal and group identities in online communities. Information & Management 56:109\u2013121","journal-title":"Information & Management"},{"issue":"6","key":"3981_CR40","doi-asserted-by":"crossref","first-page":"3038","DOI":"10.1016\/j.chb.2006.09.001","volume":"23","author":"K Christopherson","year":"2007","unstructured":"Christopherson K (2007) The positive and negative implications of anonymity in Internet social interactions: \u2018on the Internet. Nobody Knows You\u2019re a Dog\u2019, Computers in Human Behavior 23(6):3038\u20133056","journal-title":"Nobody Knows You\u2019re a Dog\u2019, Computers in Human Behavior"},{"key":"3981_CR41","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1146\/annurev.soc.34.040507.134725","volume":"36","author":"TJ Owens","year":"2010","unstructured":"Owens TJ, Robinson DT, Smith-Lovin L (2010) Three faces of identity. Ann Rev Sociol 36:477\u2013499","journal-title":"Ann Rev Sociol"},{"key":"3981_CR42","doi-asserted-by":"crossref","first-page":"4302","DOI":"10.1007\/s11227-017-2011-0","volume":"73","author":"MC Mih\u0103escu","year":"2017","unstructured":"Mih\u0103escu MC, Popescu P\u015e, Popescu E (2017) Data analysis on social media traces for detection of \u201cspam\u201d and \u201cdon\u2019t care\u201d learners. J Supercomput 73:4302\u20134323","journal-title":"J Supercomput"},{"key":"3981_CR43","unstructured":"Kora\u0107 D, Simi\u0107 D (2014) Digital identity in identity management models. In: Proceeding of the 2014 International Conference on ICT Conference and Exibition, Aran\u0111elovac, InfoTech 2014"},{"issue":"3","key":"3981_CR44","first-page":"102355","volume":"48","author":"H Jia","year":"2019","unstructured":"Jia H, Chen Y, Li Y, Yan X, Liu F, Luo X, Wang B (2019) Attributes revocation through ciphertext puncturation. J Inf Secur Appl 48(3):102355","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"3981_CR45","first-page":"25","volume":"19","author":"TL Taylor","year":"2003","unstructured":"Taylor TL (2003) Intentional bodies: Virtual environments and the designers who shape them. Int J Eng Educ 19(1):25\u201334","journal-title":"Int J Eng Educ"},{"key":"3981_CR46","unstructured":"Koole M (2010) The web of identity: selfhood and belonging in online learning networks. Proceedings of the 7th International Conference on Networked Learning 2010. Seventh International Conference on Networked Learning 2010, pp 241\u2013248"},{"key":"3981_CR47","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/S1361-3723(19)30018-1","volume":"2","author":"JM Esparza","year":"2019","unstructured":"Esparza JM (2019) Understanding the credential theft lifecycle. Computer Fraud & Security 2:6\u20139","journal-title":"Computer Fraud & Security"},{"key":"3981_CR48","doi-asserted-by":"crossref","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","volume":"76","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76:9493\u20139532","journal-title":"J Supercomput"},{"key":"3981_CR49","doi-asserted-by":"crossref","first-page":"3359","DOI":"10.1007\/s11227-020-03395-8","volume":"77","author":"Y Chen","year":"2021","unstructured":"Chen Y, Chen J (2021) A secure three-factor-based authentication with key agreement protocol for e-Health clouds. J Supercomput 77:3359\u20133380","journal-title":"J Supercomput"},{"key":"3981_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03720-9","author":"C Dhasarathan","year":"2021","unstructured":"Dhasarathan C, Kumar M, Srivastava AK et al (2021) A bio-inspired privacy-preserving framework for healthcare systems. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-03720-9","journal-title":"J Supercomput"},{"key":"3981_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03594-3","author":"A Akremi","year":"2021","unstructured":"Akremi A, Rouached M (2021) A comprehensive and holistic knowledge model for cloud privacy protection. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03594-3","journal-title":"J Supercomput"},{"key":"3981_CR52","doi-asserted-by":"crossref","first-page":"4015","DOI":"10.1007\/s11227-015-1496-7","volume":"71","author":"Rh Shi","year":"2015","unstructured":"Shi Rh, Zhong H, Zhang S (2015) Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J Supercomput 71:4015\u20134018","journal-title":"J Supercomput"},{"issue":"2","key":"3981_CR53","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3745\/JIPS.2009.5.2.041","volume":"5","author":"R Jafri","year":"2009","unstructured":"Jafri R, Arabnia H (2009) A survey of face recognition techniques. J Inf Process Syst 5(2):41\u201368","journal-title":"J Inf Process Syst"},{"key":"3981_CR54","doi-asserted-by":"crossref","unstructured":"Ueda H, Nakamura M (2017) Deployment of multilanguage security awareness education online course by federated moodle in Japan. In: Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual, vol 2. IEEE, pp 49\u201352","DOI":"10.1109\/COMPSAC.2017.100"},{"key":"3981_CR55","doi-asserted-by":"crossref","unstructured":"Hernandez JCG, Chavez MAL (2008) Moodle security vulnerabilities. In: 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control. IEEE, pp 352\u2013357","DOI":"10.1109\/ICEEE.2008.4723399"},{"key":"3981_CR56","doi-asserted-by":"crossref","unstructured":"Kora\u0107 D, Damjanovi\u0107 B, Simi\u0107 D (2020) Information security in M-learning systems: challenges and threats of using cookies. In: 19th International symposium infoteh-Jahorina 2020, pp 1\u20136","DOI":"10.1109\/INFOTEH48170.2020.9066344"},{"issue":"2","key":"3981_CR57","first-page":"129","volume":"13","author":"M Manzo","year":"2017","unstructured":"Manzo M (2017) A model for users behavior analysis and forecasting in Moodle. J e-Learn Knowl Soc 13(2):129\u2013139","journal-title":"J e-Learn Knowl Soc"},{"issue":"3","key":"3981_CR58","first-page":"222","volume":"17","author":"SD Fournier-Bonilla","year":"2001","unstructured":"Fournier-Bonilla SD, Watson K, Malave\u00e2 C, Froyd J (2001) Managing curricula change in engineering at Texas A&M University. Int J Eng Educ 17(3):222\u2013235","journal-title":"Int J Eng Educ"},{"issue":"4","key":"3981_CR59","first-page":"903","volume":"39","author":"D Kora\u0107","year":"2018","unstructured":"Kora\u0107 D, Cica D (2018) A mathematical model for evaluation of intelligence products value. J Inf Optim Sci 39(4):903\u2013926","journal-title":"J Inf Optim Sci"},{"issue":"6","key":"3981_CR60","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1007\/s10956-016-9632-6","volume":"25","author":"D Reider","year":"2016","unstructured":"Reider D, Knestis K, Malyn-Smith J (2016) How Does Identity Shape the Experiences of Women of Color Engineering Students? J Sci Educ Technol 25(6):847\u2013858","journal-title":"J Sci Educ Technol"}],"updated-by":[{"DOI":"10.1007\/s11227-021-04006-w","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T00:00:00Z","timestamp":1628640000000}}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03981-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03981-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03981-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T08:14:46Z","timestamp":1644221686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03981-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,23]]},"references-count":61,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3981"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03981-4","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11227-021-04006-w","asserted-by":"object"}]},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,23]]},"assertion":[{"value":"28 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2021","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11227-021-04006-w","URL":"https:\/\/doi.org\/10.1007\/s11227-021-04006-w","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}