{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T22:26:57Z","timestamp":1769639217338,"version":"3.49.0"},"reference-count":84,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s13198-021-01329-y","type":"journal-article","created":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T06:02:36Z","timestamp":1631685756000},"page":"1132-1145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Open-source software migration under sanctions conditions"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6060-3370","authenticated-orcid":false,"given":"Mohammad Hossein","family":"Ronaghi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,15]]},"reference":[{"key":"1329_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejpoleco.2018.06.002","author":"SK Afesorgbor","year":"2018","unstructured":"Afesorgbor SK (2018) The impact of economic sanctions on international trade: how do threatened sanctions compare with imposed sanctions? Eur J Polit Econ. https:\/\/doi.org\/10.1016\/j.ejpoleco.2018.06.002","journal-title":"Eur J Polit Econ"},{"issue":"4","key":"1329_CR2","doi-asserted-by":"publisher","first-page":"665","DOI":"10.2307\/3250951","volume":"24","author":"R Agarwal","year":"2000","unstructured":"Agarwal R, Karahanna E (2000) Time flies when you\u2019re having fun: cognitive absorption and beliefs about information technology usage. MIS Q 24(4):665\u2013694. https:\/\/doi.org\/10.2307\/3250951","journal-title":"MIS Q"},{"key":"1329_CR3","unstructured":"Alencar AF (2007) A pedagogia da migra\u00e7\u00e3o de software propriet\u00e1rio para o livre: uma perspectiva freireana. Thesis (Master in Education), Universidade de S\u00e3o Paulo, S\u00e3o Paulo"},{"key":"1329_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01524-7","author":"TA Alrawashdeh","year":"2019","unstructured":"Alrawashdeh TA, Elbes MA, Almomani A, ElQirem F, Tamimi A (2019) User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-019-01524-7","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"1329_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.2307\/20650295","volume":"33","author":"CM Angst","year":"2009","unstructured":"Angst CM, Agarwal R (2009) Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Q 33(2):339\u2013370. https:\/\/doi.org\/10.2307\/20650295","journal-title":"MIS Q"},{"key":"1329_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.yebeh.2019.04.011","volume":"95","author":"A Asadi-Pooya","year":"2019","unstructured":"Asadi-Pooya A, Azizim Alamiri R, Badv R, Yarali B, Asadollahi M, Homayoun M, Sharifi S (2019) Impacts of the international economic sanctions on Iranian patients with epilepsy. Epilepsy Behav 95:166\u2013168. https:\/\/doi.org\/10.1016\/j.yebeh.2019.04.011","journal-title":"Epilepsy Behav"},{"key":"1329_CR7","unstructured":"Bacon LD (1999) Using LISREL and PLS to measure customer satisfaction. In: Seventh annual sawtooth software conference, La Jolla CA"},{"issue":"1","key":"1329_CR8","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1080\/03050629.2013.751298","volume":"39","author":"NA Bapat","year":"2013","unstructured":"Bapat NA, Heinrich T, Kobayashi Y, Morgan T (2013) Determinants of sanctions effectiveness: sensitivity analysis using new data. Int Interact 39(1):79\u201398. https:\/\/doi.org\/10.1080\/03050629.2013.751298","journal-title":"Int Interact"},{"key":"1329_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-818366-3.00003-4","author":"F Batarseh","year":"2020","unstructured":"Batarseh F, Kumar A, Eisenberg S (2020) The history and future prospects of open data and open source software. Data Democracy. https:\/\/doi.org\/10.1016\/B978-0-12-818366-3.00003-4","journal-title":"Data Democracy"},{"issue":"3","key":"1329_CR10","doi-asserted-by":"publisher","first-page":"493","DOI":"10.2307\/25148693","volume":"29","author":"A Beaudry","year":"2005","unstructured":"Beaudry A, Pinsonneault A (2005) Understanding user responses to information technology: a coping model of user adaptation. MIS Q 29(3):493\u2013524. https:\/\/doi.org\/10.2307\/25148693","journal-title":"MIS Q"},{"key":"1329_CR11","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2019.1611490","author":"R Bharathi","year":"2019","unstructured":"Bharathi R, Selvarani R (2019) A machine learning approach for quantifying the design error propagation in safety critical software system. IETE J Res. https:\/\/doi.org\/10.1080\/03772063.2019.1611490","journal-title":"IETE J Res"},{"key":"1329_CR85","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1086\/346244","volume":"29","author":"LE Bolton","year":"2003","unstructured":"Bolton LE, Warlp L, Alba JW (2003) Customer perceptions of price (un)fairness. J Consum Res 29:474\u2013491. https:\/\/doi.org\/10.1086\/346244","journal-title":"J Consum Res"},{"issue":"6","key":"1329_CR12","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1111\/1468-2346.12449","volume":"91","author":"M Brzoska","year":"2015","unstructured":"Brzoska M (2015) International sanctions before and beyond UN sanctions. Int Aff 91(6):133\u20131349. https:\/\/doi.org\/10.1111\/1468-2346.12449","journal-title":"Int Aff"},{"key":"1329_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-018-0321-0","author":"P Chahal","year":"2018","unstructured":"Chahal P, Tomer M, Kumar S (2018) Semantic similarity between web documents using ontology. J Inst Eng India Ser B. https:\/\/doi.org\/10.1007\/s40031-018-0321-0","journal-title":"J Inst Eng India Ser B"},{"key":"1329_CR14","volume-title":"Economic sanctions: panacea or peacebuilding in a post-cold war world?","author":"D Cortright","year":"2018","unstructured":"Cortright D, Lopez GA (2018) Economic sanctions: panacea or peacebuilding in a post-cold war world? Routledge, Abingdon"},{"issue":"2","key":"1329_CR15","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1108\/08876040510591411","volume":"19","author":"JM Curran","year":"2005","unstructured":"Curran JM, Meuter ML (2005) Self-service technology adoption: comparing three technologies. J Serv Market 19(2):103\u2013113. https:\/\/doi.org\/10.1108\/08876040510591411","journal-title":"J Serv Market"},{"issue":"2","key":"1329_CR16","doi-asserted-by":"publisher","first-page":"155","DOI":"10.22146\/gamaijb.5576","volume":"7","author":"LI Darsono","year":"2005","unstructured":"Darsono LI (2005) Examining information technology acceptance by individual professionals. Gadjah Mada Int J Bus 7(2):155\u2013178. https:\/\/doi.org\/10.22146\/gamaijb.5576","journal-title":"Gadjah Mada Int J Bus"},{"issue":"3","key":"1329_CR17","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F Davis","year":"1989","unstructured":"Davis F (1989) Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Q 13(3):319\u2013340. https:\/\/doi.org\/10.2307\/249008","journal-title":"MIS Q"},{"issue":"14","key":"1329_CR18","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","volume":"22","author":"F Davis","year":"1992","unstructured":"Davis F, Bagozzi RP, Warshaw PR (1992) Extrinsic and intrinsic motivation to use computers in the workplace. J Appl Soc Psychol 22(14):1111\u20131132. https:\/\/doi.org\/10.1111\/j.1559-1816.1992.tb00945.x","journal-title":"J Appl Soc Psychol"},{"key":"1329_CR19","first-page":"102","volume-title":"Evaluation of a migration to open-source software","author":"A Dudley-Sponaugle","year":"2017","unstructured":"Dudley-Sponaugle A, Hong S, Wang Y (2017) The social and economical impact of OSS in developing countries. In: Rossi B, Russo B, Succi G (eds) Evaluation of a migration to open-source software. IGI Global, Pennsylvania, pp 102\u2013114"},{"key":"1329_CR20","unstructured":"Erturk E (2012) A case study in open source software security and privacy: android adware. https:\/\/www.researchgate.net\/publication\/261348136"},{"issue":"5\u20136","key":"1329_CR21","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1080\/03772063.1991.11436997","volume":"37","author":"DM Fiete","year":"1991","unstructured":"Fiete DM, Ray KS (1991) Recognition and position determination of partially occluded object for a computer vision system. IETE J Res 37(5\u20136):419\u2013442. https:\/\/doi.org\/10.1080\/03772063.1991.11436997","journal-title":"IETE J Res"},{"key":"1329_CR22","volume-title":"Belief, attitude, intention, and behavior: an introduction to theory and research","author":"M Fishbein","year":"1975","unstructured":"Fishbein M, Ajzen I (1975) Belief, attitude, intention, and behavior: an introduction to theory and research. Addison-Wesley, Reading"},{"issue":"3","key":"1329_CR23","doi-asserted-by":"publisher","first-page":"587","DOI":"10.2307\/25148740","volume":"30","author":"B Fitzgerald","year":"2006","unstructured":"Fitzgerald B (2006) The transformation of open source software. MIS Q 30(3):587\u2013598. https:\/\/doi.org\/10.2307\/25148740","journal-title":"MIS Q"},{"issue":"2","key":"1329_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1590\/S1676-56482005000200005","volume":"4","author":"H Freitas","year":"2005","unstructured":"Freitas H, Santos S, Luciano EM (2005) Dificuldades para o uso da tecnologia da informa\u00e7\u00e3o. RAE-Eletr\u00f4nica 4(2):20. https:\/\/doi.org\/10.1590\/S1676-56482005000200005","journal-title":"RAE-Eletr\u00f4nica"},{"key":"1329_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02197-3","author":"N Gavrilovi\u0107","year":"2020","unstructured":"Gavrilovi\u0107 N, Mishra A (2020) Software architecture of the internet of things (IoT) for smart city, healthcare and agriculture: analysis and improvement directions. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02197-3","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"7","key":"1329_CR26","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1287\/mnsc.1060.0550","volume":"52","author":"R Grewal","year":"2006","unstructured":"Grewal R, Lilien GL, Mallapragada G (2006) Location, location, location: how network embeddedness affects project success in open source systems. Manag Sci 52(7):1043\u20131056","journal-title":"Manag Sci"},{"issue":"5","key":"1329_CR27","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/S0167-4048(02)00516-3","volume":"21","author":"M Hansen","year":"2002","unstructured":"Hansen M, K\u00f6hntopp K, Pfitzmann A (2002) The Open Source approach\u2014opportunities and limitations with respect to security and privacy. Comput Secur 21(5):461\u2013471. https:\/\/doi.org\/10.1016\/S0167-4048(02)00516-3","journal-title":"Comput Secur"},{"key":"1329_CR28","volume-title":"Economic sanctions and international law","year":"2019","unstructured":"Happold M, Eden P (eds) (2019) Economic sanctions and international law. Bloomsbury Publishing, London"},{"key":"1329_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.hitech.2017.10.008","author":"LA Joia","year":"2017","unstructured":"Joia LA, Vinhais LC (2017) From closed source to open source software: analysis of the migration process to Open Office. J High Technol Manag Res. https:\/\/doi.org\/10.1016\/j.hitech.2017.10.008","journal-title":"J High Technol Manag Res"},{"issue":"2","key":"1329_CR30","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.hitech.2014.07.007","volume":"25","author":"LA Joia","year":"2014","unstructured":"Joia LA, Gradvohl D, Gaete L (2014) Antecedents of resistance to enterprise systems: the IT leadership perspective. J High Technol Manag Res 25(2):188\u2013200. https:\/\/doi.org\/10.1016\/j.hitech.2014.07.007","journal-title":"J High Technol Manag Res"},{"key":"1329_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2019.100872","volume":"36","author":"E Katsamakas","year":"2019","unstructured":"Katsamakas E, Xin M (2019) Open source adoption strategy. Electron Commer Res Appl 36:100872. https:\/\/doi.org\/10.1016\/j.elerap.2019.100872","journal-title":"Electron Commer Res Appl"},{"issue":"3","key":"1329_CR32","doi-asserted-by":"publisher","first-page":"567","DOI":"10.2307\/20650309","volume":"33","author":"H Kim","year":"2009","unstructured":"Kim H, Kankanhalli A (2009) Investigating user resistance to information systems implementation: a status quo bias perspective. MIS Q 33(3):567\u2013582. https:\/\/doi.org\/10.2307\/20650309","journal-title":"MIS Q"},{"issue":"1","key":"1329_CR33","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.dss.2005.05.009","volume":"43","author":"HW Kim","year":"2007","unstructured":"Kim HW, Chan HC, Gupta S (2007) Value-based adoption of mobile internet: an empirical investigation. Decis Support Syst 43(1):111\u2013126. https:\/\/doi.org\/10.1016\/j.dss.2005.05.009","journal-title":"Decis Support Syst"},{"issue":"10","key":"1329_CR34","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1080\/14783363.2017.1310708","volume":"28","author":"Y Kim","year":"2017","unstructured":"Kim Y, Park Y, Choi J (2017) A study on the adoption of IoT smart home service: using value-based adoption model. Total Qual Manag 28(10):1149\u20131165. https:\/\/doi.org\/10.1080\/14783363.2017.1310708","journal-title":"Total Qual Manag"},{"issue":"3","key":"1329_CR35","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1080\/09636419708429314","volume":"6","author":"J Kirshner","year":"1997","unstructured":"Kirshner J (1997) The micro foundations of economic sanctions. Secur Stud 6(3):32\u201364. https:\/\/doi.org\/10.1080\/09636419708429314","journal-title":"Secur Stud"},{"issue":"21","key":"1329_CR36","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MS.2004.1259224","volume":"1","author":"N Kshetri","year":"2004","unstructured":"Kshetri N (2004) Economics of linux adoption in developing countries. IEEE Softw 1(21):74\u201381","journal-title":"IEEE Softw"},{"issue":"1","key":"1329_CR37","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1300\/J098v08n01_06","volume":"8","author":"N Kshetri","year":"2007","unstructured":"Kshetri N, Schiopu A (2007) Government policy, continental collaboration and the diffusion of open source software in China, Japan, and South Korea. J Asia-Pac Bus 8(1):61\u201377. https:\/\/doi.org\/10.1300\/J098v08n01_06","journal-title":"J Asia-Pac Bus"},{"issue":"1","key":"1329_CR38","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1023\/A:1010130911805","volume":"1","author":"T Lasri","year":"2000","unstructured":"Lasri T, Glay D, Achra\u00f5\u00c8t L, Mamouni A, Leroy Y (2000) Microwave methods and systems for nondestructive control. Subsurf Sens Technol Appl 1(1):141\u2013161","journal-title":"Subsurf Sens Technol Appl"},{"issue":"10","key":"1329_CR39","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1080\/10941665.2019.1655076","volume":"24","author":"C Lau","year":"2019","unstructured":"Lau C, Chui CF, Au N (2019) Examination of the adoption of augmented reality: a VAM approach. Asia Pac J Tour Res 24(10):1005\u20131020. https:\/\/doi.org\/10.1080\/10941665.2019.1655076","journal-title":"Asia Pac J Tour Res"},{"key":"1329_CR84","doi-asserted-by":"publisher","unstructured":"Lin T, Lee C, Lin JC (2010) Determinants of Enterprise 2.0 adoption: a value-based adoption model approach, In: 2010 International conference on information society, London, pp. 12\u201318. https:\/\/doi.org\/10.1109\/i-Society16502.2010.6018756","DOI":"10.1109\/i-Society16502.2010.6018756"},{"key":"1329_CR40","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.dss.2012.04.004","volume":"54","author":"TC Lin","year":"2012","unstructured":"Lin TC, Wu S, Hsu SC, Chou YC (2012) The integration of value-based adoption and expectation-confirmation models: an example of IPTV continuance intention. Decis Support Syst 54:63\u201375. https:\/\/doi.org\/10.1016\/j.dss.2012.04.004","journal-title":"Decis Support Syst"},{"key":"1329_CR42","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1057\/ejis.2010.60","volume":"20","author":"RD Macredie","year":"2011","unstructured":"Macredie RD, Mijinyawa K (2011) A theory-grounded framework of Open Source Software adoption in SMEs. Eur J Inf Syst 20:237\u2013250. https:\/\/doi.org\/10.1057\/ejis.2010.60","journal-title":"Eur J Inf Syst"},{"key":"1329_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0265-z","author":"O Marey","year":"2015","unstructured":"Marey O, Bentahar J, Khosroshahi E, Sultan K, Dssouli R (2015) Decision making under subjective uncertainty in argumentation-based agent negotiation. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-015-0265-z","journal-title":"J Ambient Intell Human Comput"},{"issue":"4","key":"1329_CR44","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1016\/j.jss.2011.11.010","volume":"85","author":"V Midha","year":"2012","unstructured":"Midha V, Palvia P (2012) Factors affecting the success of open source software. J Syst Softw 85(4):895\u2013905","journal-title":"J Syst Softw"},{"issue":"3","key":"1329_CR45","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1080\/08874417.2010.11645410","volume":"50","author":"V Midha","year":"2010","unstructured":"Midha V, Singh R, Palvia P, Kshetri N (2010) Improving open source software maintenance. J Comput Inf Syst 50(3):81\u201390. https:\/\/doi.org\/10.1080\/08874417.2010.11645410","journal-title":"J Comput Inf Syst"},{"key":"1329_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02370-8","author":"S Mishra","year":"2020","unstructured":"Mishra S, Sharma S, Alowaidi M (2020) Analysis of security issues of cloud-based web applications. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02370-8","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"1329_CR47","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1080\/07421222.1999.11518240","volume":"16","author":"R Montealegre","year":"1999","unstructured":"Montealegre R (1999) A temporal model of institutional intervention for information technology adoption in less-developed countries. J Manag Inf Syst 16(1):207\u2013232","journal-title":"J Manag Inf Syst"},{"key":"1329_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02428-7","author":"V Moorthy","year":"2020","unstructured":"Moorthy V, Venkataraman R, Gururajan R (2020) Bayesian trust analysis of flooding attacks in distributed software defined networking nodes. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02428-7","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1329_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.05.002","volume":"58","author":"S Muwanguzi","year":"2019","unstructured":"Muwanguzi S, Musambira G (2019) The adoption of open source software in Uganda: analyzing stakeholders and their underlying interests. Technol Soc 58:101138. https:\/\/doi.org\/10.1016\/j.techsoc.2019.05.002","journal-title":"Technol Soc"},{"issue":"3","key":"1329_CR50","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1145\/1666420.1666457","volume":"53","author":"D Nagy","year":"2010","unstructured":"Nagy D, Yassin AM, Bhattacherjee A (2010) Organizational adoption of open source software: barriers and remedies. Commun ACM 53(3):148\u2013151. https:\/\/doi.org\/10.1145\/1666420.1666457","journal-title":"Commun ACM"},{"issue":"2","key":"1329_CR51","doi-asserted-by":"publisher","first-page":"196","DOI":"10.2307\/249478","volume":"20","author":"SR Nidumolu","year":"1996","unstructured":"Nidumolu SR, Goodman SE, Vogel DR, Danowitz AK (1996) Information technology for local administration support: the governorates project in Egypt. MIS Q 20(2):196\u2013224","journal-title":"MIS Q"},{"issue":"1","key":"1329_CR52","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/13594320500451247","volume":"15","author":"S Oreg","year":"2006","unstructured":"Oreg S (2006) Personality, context, and resistance to organizational change. Eur J Work Organ Psy 15(1):73\u2013101. https:\/\/doi.org\/10.1080\/13594320500451247","journal-title":"Eur J Work Organ Psy"},{"key":"1329_CR53","doi-asserted-by":"publisher","unstructured":"Pontika N, Knoth P, Cancellieri M, Pearce S (2015) Fostering open science to research using a taxonomy and an eLearning portal. In: Proceedings of the 15th international conference on knowledge technologies and data-driven business, vol 11. https:\/\/doi.org\/10.1145\/2809563.2809571","DOI":"10.1145\/2809563.2809571"},{"issue":"11","key":"1329_CR83","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1080\/13683500.2017.1307329","volume":"21","author":"S Pratt","year":"2018","unstructured":"Pratt S, Alizadeh V (2018) The economic impact of the lifting of sanctions on tourism in Iran: a computable general equilibrium analysis. Current Issues Tourism 21(11):1221\u20131238. https:\/\/doi.org\/10.1080\/13683500.2017.1307329","journal-title":"Current Issues Tourism"},{"key":"1329_CR54","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1016\/j.jbusres.2010.11.023","volume":"64","author":"WG Qu","year":"2011","unstructured":"Qu WG, Yang Z, Wang Z (2011) Multi-level framework of open source software adoption. J Bus Res 64:997\u20131003. https:\/\/doi.org\/10.1016\/j.jbusres.2010.11.023","journal-title":"J Bus Res"},{"issue":"1","key":"1329_CR55","first-page":"208","volume":"14","author":"S Ram","year":"1987","unstructured":"Ram S (1987) A model of innovation resistance. Adv Consum Res 14(1):208\u2013212","journal-title":"Adv Consum Res"},{"issue":"2\u20133","key":"1329_CR56","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/03772063.2006.11416448","volume":"52","author":"A Ramya","year":"2006","unstructured":"Ramya A, Vaidehi V, Ramesh C, Srinivasan R, Swetha B (2006) Software design of CDMA based MAC scheme for microsatellite. IETE J Res 52(2\u20133):113\u2013119. https:\/\/doi.org\/10.1080\/03772063.2006.11416448","journal-title":"IETE J Res"},{"key":"1329_CR57","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ijinfomgt.2018.11.015","volume":"46","author":"M Rashid","year":"2019","unstructured":"Rashid M, Clarke P, O\u2019Connor R (2019) A systematic examination of knowledge loss in open source software projects. Int J Inf Manag 46:104\u2013123. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.11.015","journal-title":"Int J Inf Manag"},{"key":"1329_CR58","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.147","author":"D Riehle","year":"2007","unstructured":"Riehle D (2007) The Economic Motivation of Open Source Software: Stakeholder Perspectives. IEEE Computer Society. https:\/\/doi.org\/10.1109\/MC.2007.147","journal-title":"IEEE Computer Society"},{"key":"1329_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.inpa.2020.10.004","author":"MH Ronaghi","year":"2020","unstructured":"Ronaghi MH (2020) A blockchain maturity model in agricultural supply chain. Inf Process Agric. https:\/\/doi.org\/10.1016\/j.inpa.2020.10.004","journal-title":"Inf Process Agric"},{"key":"1329_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101415","author":"MH Ronaghi","year":"2020","unstructured":"Ronaghi MH, Forouharfar A (2020) A contextualized study of the usage of the Internet of things (IoTs) in smart farming in a typical Middle Eastern country within the context of Unified Theory of Acceptance and Use of Technology model (UTAUT). Technol Soc. https:\/\/doi.org\/10.1016\/j.techsoc.2020.101415","journal-title":"Technol Soc"},{"key":"1329_CR61","unstructured":"Sen AK (2018) A brief history of sanctions on Iran, Atlantic Council. www.atlanticcouncil.org"},{"key":"1329_CR62","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01455-3","author":"Y Seo","year":"2019","unstructured":"Seo Y, Huh J (2019) GUI-based software modularization through module clustering in edge computing based IoT environments. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-019-01455-3","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1329_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jdmm.2019.100381","author":"S Seyfi","year":"2019","unstructured":"Seyfi S, Hall CM (2019) Sanctions and tourism: conceptualization and implications for destination, marketing and management. J Destin Market Manag. https:\/\/doi.org\/10.1016\/j.jdmm.2019.100381","journal-title":"J Destin Market Manag"},{"key":"1329_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2015.11.001","author":"M Shaikh","year":"2015","unstructured":"Shaikh M (2015) Negotiating open source software adoption in the UK public sector. Gov Inf Q. https:\/\/doi.org\/10.1016\/j.giq.2015.11.001","journal-title":"Gov Inf Q"},{"key":"1329_CR82","unstructured":"Shamghli F (2012) Sanctions against Iran and their effects on the global shipping industry. Lund University. http:\/\/lup.lub.lu.se\/student-papers\/record\/2520391"},{"key":"1329_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.01.003","volume":"58","author":"A Shuhaiber","year":"2019","unstructured":"Shuhaiber A, Mashal I (2019) Understanding users\u2019 acceptance of smart homes. Technol Soc 58:101110. https:\/\/doi.org\/10.1016\/j.techsoc.2019.01.003","journal-title":"Technol Soc"},{"key":"1329_CR66","doi-asserted-by":"publisher","DOI":"10.1080\/19331680903103033","volume-title":"Hacking capitalism: the free and open source software movement","author":"J S\u00f6derberg","year":"2015","unstructured":"S\u00f6derberg J (2015) Hacking capitalism: the free and open source software movement, vol 9. Routledge, Abingdon. https:\/\/doi.org\/10.1080\/19331680903103033"},{"key":"1329_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.101324","author":"K Sohn","year":"2019","unstructured":"Sohn K, Kwon O (2019) Technology acceptance theories and factors influencing artificial intelligence-based intelligent products. Telematics Inform. https:\/\/doi.org\/10.1016\/j.tele.2019.101324","journal-title":"Telematics Inform"},{"issue":"1","key":"1329_CR68","doi-asserted-by":"publisher","first-page":"1950012-1","DOI":"10.1142\/S0219649219500126","volume":"18","author":"B Sohrabi","year":"2019","unstructured":"Sohrabi B, Raeesi Vanani I, Gooyavar A, Naderi N (2019a) Predicting the readmission of heart failure patients through data analytics. J Inf Knowl Manag 18(1):1950012-1-1950012\u201320. https:\/\/doi.org\/10.1142\/S0219649219500126","journal-title":"J Inf Knowl Manag"},{"issue":"3","key":"1329_CR69","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1108\/IJPHM-11-2017-0066","volume":"13","author":"B Sohrabi","year":"2019","unstructured":"Sohrabi B, Raeesi Vanani I, Nikaein N, Kakavand S (2019b) A predictive analytics of physicians prescription and pharmacies sales correlation using data mining. Int J Pharm Healthcare Market 13(3):346\u2013363. https:\/\/doi.org\/10.1108\/IJPHM-11-2017-0066","journal-title":"Int J Pharm Healthcare Market"},{"key":"1329_CR70","unstructured":"Stallman R (2007) Why open source misses the point of free software. Free Software Foundation. https:\/\/www.gnu.org\/philosophy\/\/po\/open-source-misses-the-point.hr-en.html"},{"key":"1329_CR71","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11220-020-00295-2","volume":"21","author":"PP Tasgaonkar","year":"2020","unstructured":"Tasgaonkar PP, Garg R, Garg PK (2020) Vehicle detection and traffic estimation with sensors technologies for intelligent transportation systems. Sens Imaging 21:29. https:\/\/doi.org\/10.1007\/s11220-020-00295-2","journal-title":"Sens Imaging"},{"key":"1329_CR72","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-021-00560-2","author":"A Tyagi","year":"2021","unstructured":"Tyagi A, Shah U (2021) Modeling the direction and volume of trade flows in global crisis, COVID-19. J Inst Eng India Ser B. https:\/\/doi.org\/10.1007\/s40031-021-00560-2","journal-title":"J Inst Eng India Ser B"},{"issue":"3","key":"1329_CR73","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Mooris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425\u2013478. https:\/\/doi.org\/10.2307\/30036540","journal-title":"MIS Q"},{"issue":"4","key":"1329_CR74","doi-asserted-by":"publisher","first-page":"46","DOI":"10.2307\/1252286","volume":"62","author":"GB Voss","year":"1998","unstructured":"Voss GB, Parasuraman A, Grewal D (1998) The roles of price, performance, and expectations in determining satisfaction in service exchanges. J Market 62(4):46\u201361. https:\/\/doi.org\/10.2307\/1252286","journal-title":"J Market"},{"issue":"4","key":"1329_CR75","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1016\/j.ijhm.2009.11.001","volume":"29","author":"HY Wang","year":"2010","unstructured":"Wang HY, Wang SH (2010) Predicting mobile hotel reservation adoption: insight from a perceived value standpoint. Int J Hosp Manag 29(4):598\u2013608. https:\/\/doi.org\/10.1016\/j.ijhm.2009.11.001","journal-title":"Int J Hosp Manag"},{"issue":"5","key":"1329_CR76","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.ijinfomgt.2005.06.002","volume":"25","author":"T Waring","year":"2005","unstructured":"Waring T, Maddocks P (2005) Open Source Software implementation in the UK public sector: evidence from the field and implications for the future. Int J Inf Manag 25(5):411\u2013428. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2005.06.002","journal-title":"Int J Inf Manag"},{"key":"1329_CR77","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-319-16507-3_3","volume-title":"Structural equation models: from paths to networks","author":"JC Westland","year":"2015","unstructured":"Westland JC (2015) Partial least squares path analysis. In: Westland JC (ed) Structural equation models: from paths to networks. Springer, Cham, pp 23\u201346"},{"issue":"2","key":"1329_CR78","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.tele.2015.08.007","volume":"33","author":"H Yang","year":"2016","unstructured":"Yang H, Yu J, Zo H, Choi M (2016) User acceptance of wearable devices: an extended perspective of perceived value. Telematics Inform 33(2):256\u2013269. https:\/\/doi.org\/10.1016\/j.tele.2015.08.007","journal-title":"Telematics Inform"},{"issue":"4","key":"1329_CR79","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.tele.2015.11.004","volume":"34","author":"J Yu","year":"2017","unstructured":"Yu J, Lee H, Ha I, Zo H (2017) User acceptance of media tablets: an empirical examination of perceived value. Telematics Inform 34(4):206\u2013223. https:\/\/doi.org\/10.1016\/j.tele.2015.11.004","journal-title":"Telematics Inform"},{"issue":"4","key":"1329_CR80","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.ajsl.2019.12.003","volume":"35","author":"S Zarbi","year":"2019","unstructured":"Zarbi S, Shin S, Shin Y (2019) An analysis by window DEA on the influence of international sanction to the efficiency of Iranian container ports. Asian J Ship Logist 35(4):163\u2013171. https:\/\/doi.org\/10.1016\/j.ajsl.2019.12.003","journal-title":"Asian J Ship Logist"},{"key":"1329_CR81","doi-asserted-by":"publisher","first-page":"2","DOI":"10.2307\/1251446","volume":"52","author":"VA Zeithaml","year":"1988","unstructured":"Zeithaml VA (1988) Consumer perceptions of price, quality, and value: a means\u2013end model and synthesis of evidence. J Market 52:2\u201322. https:\/\/doi.org\/10.2307\/1251446","journal-title":"J Market"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01329-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-021-01329-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01329-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T06:42:07Z","timestamp":1673246527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-021-01329-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":84,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1329"],"URL":"https:\/\/doi.org\/10.1007\/s13198-021-01329-y","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,15]]},"assertion":[{"value":"23 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}