{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T01:55:33Z","timestamp":1773366933207,"version":"3.50.1"},"reference-count":32,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1080\/0144929x.2017.1407824","type":"journal-article","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T17:11:37Z","timestamp":1512148297000},"page":"102-119","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":16,"title":["Internet of Things-based student performance evaluation framework"],"prefix":"10.1080","volume":"37","author":[{"given":"Prabal","family":"Verma","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, Guru Nanak Dev University, Gurdaspur, India"}]},{"given":"Sandeep K.","family":"Sood","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Guru Nanak Dev University, Gurdaspur, India"}]}],"member":"301","published-online":{"date-parts":[[2017,12]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.090911.111340"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2014.06.006"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.09.008"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/1052934.1052942"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0011596"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2198883"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.853838"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2007.02.006"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.09.091"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.028"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.90"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1004651"},{"key":"CIT0017","first-page":"1","author":"Jabbarifar T.","year":"2009","journal-title":"Procedings of 2nd International Conference of Teaching and Learning"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.019"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychsport.2006.03.009"},{"issue":"3","key":"CIT0021","first-page":"455","volume":"51","author":"Kolda T. G.","year":"2009","journal-title":"Society of Industrial and Applied Mathematics"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010515"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306331"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.2009.00976.x"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-007-9040-y"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"CIT0028","volume-title":"A Course in Game Theory","author":"Osborne M. J.","year":"2011"},{"issue":"10","key":"CIT0029","first-page":"1","volume":"5","author":"Rafiei M.","year":"2015","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1017\/S0950268812000842"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.08.001"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogdev.2012.07.002"},{"key":"CIT0033","first-page":"121","volume":"146","author":"Schlesinger M.","year":"2001","journal-title":"Ideal Library"},{"key":"CIT0034","first-page":"1","author":"Sheldon E.","year":"2003","journal-title":"Proceedings of Workshop on Modelling User Attributes and Affect"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogdev.2012.08.002"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.103013.00206"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2311513"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2017.1407824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T13:24:41Z","timestamp":1517318681000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2017.1407824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,12,21]]},"published-print":{"date-parts":[[2018,2]]}},"alternative-id":["10.1080\/0144929X.2017.1407824"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2017.1407824","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}