{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T13:51:24Z","timestamp":1648907484704},"reference-count":10,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1989,1,1]],"date-time":"1989-01-01T00:00:00Z","timestamp":599616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Operations Research"],"published-print":{"date-parts":[[1989,1]]},"DOI":"10.1016\/0305-0548(89)90022-1","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T12:15:45Z","timestamp":1056975345000},"page":"207-216","source":"Crossref","is-referenced-by-count":1,"title":["A pooled computer center as a risk management tool"],"prefix":"10.1016","volume":"16","author":[{"given":"A.","family":"Ariav","sequence":"first","affiliation":[]},{"given":"Y.","family":"Kahane","sequence":"additional","affiliation":[]},{"given":"C.S.","family":"Tapiero","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0305-0548(89)90022-1_BIB1","first-page":"19","article-title":"EDP contingency planning \u2014how to survive a disaster","volume":"69","author":"Krauss","year":"1980","journal-title":"Mgmt Rev."},{"key":"10.1016\/0305-0548(89)90022-1_BIB2","series-title":"All About Disaster Recovery","author":"Datapro Research Corporation","year":"1983"},{"key":"10.1016\/0305-0548(89)90022-1_BIB3","article-title":"Insurance premiums and default risk in mutual insurance","author":"Tapiero","year":"1987","journal-title":"Scand. Actuarial J."},{"key":"10.1016\/0305-0548(89)90022-1_BIB4","first-page":"9","article-title":"Disaster recovery operation research","volume":"18","author":"Reed","year":"1980","journal-title":"Data Mgmt"},{"key":"10.1016\/0305-0548(89)90022-1_BIB5","first-page":"66","article-title":"Corporate Risk Control","author":"McDonald","year":"1966"},{"key":"10.1016\/0305-0548(89)90022-1_BIB6","first-page":"10","article-title":"Developing a contingency plan","volume":"18","author":"Dentay","year":"1980","journal-title":"Data Mgmt"},{"key":"10.1016\/0305-0548(89)90022-1_BIB7","first-page":"15","article-title":"A first recovery site corporation evolves","volume":"18","author":"Sulliven","year":"1980","journal-title":"Data Mgmt"},{"key":"10.1016\/0305-0548(89)90022-1_BIB8","article-title":"Computer security","author":"Allen","year":"1972","journal-title":"Data Mgmt"},{"key":"10.1016\/0305-0548(89)90022-1_BIB9","first-page":"51","article-title":"Computers and Profits: Quantifying Financial Benefits of Information","author":"Kleijman","year":"1980"},{"key":"10.1016\/0305-0548(89)90022-1_BIB10","first-page":"30","article-title":"The Economics of Computers","author":"Sharpe","year":"1969"}],"container-title":["Computers &amp; Operations Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0305054889900221?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0305054889900221?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T12:58:32Z","timestamp":1552913912000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0305054889900221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,1]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1989,1]]}},"alternative-id":["0305054889900221"],"URL":"https:\/\/doi.org\/10.1016\/0305-0548(89)90022-1","relation":{},"ISSN":["0305-0548"],"issn-type":[{"value":"0305-0548","type":"print"}],"subject":[],"published":{"date-parts":[[1989,1]]}}}