{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:28:33Z","timestamp":1774949313179,"version":"3.50.1"},"reference-count":30,"publisher":"Informa UK Limited","issue":"8","funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"publisher","award":["1001\/PMEDIA\/816288"],"award-info":[{"award-number":["1001\/PMEDIA\/816288"]}],"id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2016,8,2]]},"DOI":"10.1080\/0144929x.2016.1186735","type":"journal-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T04:50:20Z","timestamp":1464843020000},"page":"644-653","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":22,"title":["Predicting user preferences of environment design: a perceptual mechanism of user interface customisation"],"prefix":"10.1080","volume":"35","author":[{"given":"Hosam","family":"Al-Samarraie","sequence":"first","affiliation":[]},{"given":"Samer Muthana","family":"Sarsam","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Guesgen","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(99)00016-8"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2013.01.009"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0187-z"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1177\/1473871611415988"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.1996.tb02114.x"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35377-2_28"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2008.00122.x"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v033.i01"},{"key":"CIT0015","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldberg David E.","year":"1990"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.brainres.2011.06.026"},{"key":"CIT1017","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0473-2"},{"key":"CIT0019","volume-title":"Data Mining: Practical Machine Learning and Techniques","author":"Ian H. Witten","year":"2011","edition":"3"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2014.12.008"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-1887-4_23"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1038\/nature12198"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1486-9"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1037721"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"CIT0028","volume-title":"R.(1993) C4. 5: Programs for Machine Learning","author":"Quinlan J","year":"1993"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2011.12.010"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1037\/a0026473"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2011.08.014"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2013.11.018"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35377-2_36"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/135467898394139"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2012.11.004"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1080\/13506280902771278"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.07.038"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.11.035"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2016.1186735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,11]],"date-time":"2016-12-11T17:17:09Z","timestamp":1481476629000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2016.1186735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,2]]},"references-count":30,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2016,6,2]]},"published-print":{"date-parts":[[2016,8,2]]}},"alternative-id":["10.1080\/0144929X.2016.1186735"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2016.1186735","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}