{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T15:17:56Z","timestamp":1770477476855,"version":"3.49.0"},"reference-count":180,"publisher":"Informa UK Limited","issue":"3-4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1080\/08839510490279852","type":"journal-article","created":{"date-parts":[[2004,4,12]],"date-time":"2004-04-12T15:45:11Z","timestamp":1081784711000},"page":"185-229","source":"Crossref","is-referenced-by-count":9,"title":["ARTIFICIAL INTELLIGENCE AND FORMALISMS FOR LEGAL EVIDENCE: AN INTRODUCTION"],"prefix":"10.1080","volume":"18","author":[{"given":"EPHRAIM","family":"NISSAN","sequence":"first","affiliation":[]},{"given":"ANTONIO A.","family":"MARTINO","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","volume-title":"Statistics and the Evaluation of Evidence for Forensic Scientists","author":"Aitken C. G. G.","year":"1995"},{"key":"CIT0002","first-page":"51","volume-title":"Deontic Logic, Computational Linguistics and Legal Information Systems","author":"Alchourr\u00f3n E.","year":"1982"},{"key":"CIT0003","first-page":"175","volume-title":"Automated Analysis of Legal Texts: Logic, Informatics, Law","author":"Alchourr\u00f3n E.","year":"1986"},{"key":"CIT0004","first-page":"43","volume-title":"Deontic Logic in Computer Science: Normative System Specification","author":"Alchourr\u00f3n E.","year":"1993"},{"key":"CIT0005","first-page":"9","volume-title":"Expert Systems in Law","author":"Alchourr\u00f3n C. E.","year":"1992"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9337.1990.tb00050.x"},{"key":"CIT0007","volume-title":"Allen and Redmayne (1997): 254-275 (lead article), 354-360 (references)","author":"Allen R. J.","year":"1997"},{"key":"CIT0008","unstructured":""},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017941929299"},{"key":"CIT0010","first-page":"253","volume-title":"The International Journal of Evidence and Proof","author":"Allen R.","year":"1997"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2000.875161"},{"key":"CIT0012","volume-title":"Analysis of Evidence: How to Do Things With Facts","author":"Anderson T.","year":"1991"},{"key":"CIT0013","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1007\/978-94-009-6259-0_11","volume-title":"Handbook of Philosophical Logic, Vol. 2: Extensions of Classical Logic","author":"\u00c5qvist L.","year":"1984"},{"key":"CIT0014","volume-title":"Introduction to Deontic Logic and the Theory of Normative Systems","author":"\u00c5qvist L.","year":"1987"},{"key":"CIT0015","first-page":"67","volume-title":"Expert Systems in Law","author":"\u00c5qvist L.","year":"1992"},{"key":"CIT0016","first-page":"515","volume":"20","author":"Asaro C.","year":"2001","journal-title":"Computing and Informatics"},{"key":"CIT0017","volume-title":"Modeling Legal Argument: Reasoning with Cases and Hypotheticals","author":"Ashley K. D.","year":"1990"},{"key":"CIT0018","volume-title":"Jurimetrics","author":"Baade H. W.","year":"1963"},{"key":"CIT0019","volume-title":"A Short Account of the History of Mathematics","author":"Ball W. W. R.","year":"1908","edition":"4"},{"key":"CIT0020","volume-title":"Artificial Believers: The Ascription of Belief","author":"Ballim A.","year":"1991"},{"key":"CIT0021","first-page":"581","volume":"20","author":"Ballim A.","year":"2001","journal-title":"Computing and Informatics"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017993913369"},{"key":"CIT0023","first-page":"55","volume-title":"Artificial Social Systems: Fourth European Workshop on Modelling Autonomous Agents in a Multi-Agent World","author":"Bates J.","year":"1992"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008242417011"},{"key":"CIT0025","volume-title":"Reconstructing Reality in the Courtroom: Justice and Judgment in American Culture","author":"Bennett W.","year":"1981"},{"key":"CIT0026","volume-title":"Rationale of Judicial Evidence: Specially Applied to English Practice","author":"Bentham J.","year":"1827"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/BF00118481"},{"key":"CIT0028","volume-title":"Death, Decay and Reconstruction: Approaches to Archaeology and Forensic Science","author":"Boddington A.","year":"1987"},{"key":"CIT0029","first-page":"9","volume":"4","author":"Bolding P. O.","year":"1960","journal-title":"Scandinavian Studies in Law"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1145\/261618.261645"},{"key":"CIT0031","volume-title":"Handbook of Psychology in Legal Contexts","author":"Bull R.","year":"1995"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1994.9990145"},{"key":"CIT0033","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-94-009-8484-4_2","volume-title":"New Studies in Deontic Logic","author":"Casta\u00f1eda H.-N.","year":"1981"},{"key":"CIT0034","first-page":"107","volume-title":"Expert Systems in Law","author":"Casta\u00f1eda H.-N.","year":"1992"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1007\/BF02403764"},{"key":"CIT0036","unstructured":""},{"key":"CIT0037","unstructured":""},{"key":"CIT0038","unstructured":""},{"key":"CIT0039","unstructured":""},{"key":"CIT0040","unstructured":""},{"key":"CIT0041","first-page":"99","author":"Conte R.","year":"1999","journal-title":"Intelligent Agents V"},{"key":"CIT0042","volume-title":"Human Osteology in Archaeology and Forensic Science","author":"Cox M.","year":"2000"},{"key":"CIT0043","unstructured":""},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1080\/088395198117550"},{"key":"CIT0045","volume-title":"Statistics and the Law","author":"DeGroot M. H.","year":"1996"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511570643"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302863"},{"key":"CIT0048","unstructured":""},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1080\/13600830123621"},{"key":"CIT0050","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3697.001.0001","volume-title":"In-Depth Understanding: A Computer Model of Integrated Processing of Narrative Comprehension","author":"Dyer M. G.","year":"1983"},{"key":"CIT0051","first-page":"87","volume-title":"Discursive Psychology in Practice","author":"Edwards D.","year":"1995"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009648511019"},{"key":"CIT0053","first-page":"8","author":"Ekel\u00f6f P. O.","year":"1964","journal-title":"Scandinavian Studies in Law"},{"key":"CIT0054","first-page":"213","volume":"2","author":"Fakher-Eldeen F.","year":"1993","journal-title":"Informatica e Diritto"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1007\/BF00118492"},{"key":"CIT0056","doi-asserted-by":"crossref","DOI":"10.1177\/1365712797001special02","volume-title":"Answering the Bayesioskeptical challenge","author":"Friedman R. D.","year":"1997"},{"key":"CIT0057","unstructured":""},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1080\/13600830124112"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009643701045"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1080\/13600830120040804"},{"key":"CIT0061","volume-title":"Decision Making in the Supreme Court of India: A Jurimetric Study","author":"Gupta V. K.","year":"1995"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1007\/BF01424340"},{"key":"CIT0063","volume-title":"The Foundations of Decision Logic","author":"Hallden S.","year":"1980"},{"key":"CIT0064","volume-title":"Israel Law Review","author":"Harnon E.","year":"1997"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511752896"},{"key":"CIT0066","first-page":"555","volume":"20","author":"Holmstr\u00f6m-Hintikka G.","year":"2001","journal-title":"Computing and Informatics"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1007\/BF01531262"},{"key":"CIT0068","first-page":"46","volume":"4","author":"Hunter D.","year":"1993","journal-title":"Journal of Law and Information Science"},{"key":"CIT0069","volume-title":"Studies in Crime: An Introduction to Forensic Archaeology","author":"Hunter J. R.","year":"1995"},{"key":"CIT0070","first-page":"23","volume-title":"Narrative in Culture: The Uses of Storytelling in the Sciences, Philosophy and Literature","author":"Jackson B. S.","year":"1990"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1080\/09695958.1994.9960365"},{"key":"CIT0072","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1111\/j.2044-8333.1996.tb00305.x","volume":"1","author":"Jackson B. S.","year":"1996","journal-title":"Legal and Criminological Psychology"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1007\/BF00118478"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511530128"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302849"},{"key":"CIT0076","volume-title":"A Probabilistic Analysis of the Sacco and Vanzetti Evidence","author":"Kadane J.","year":"1996"},{"key":"CIT0077","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511803475","volume-title":"Choices, Values, and Frames","author":"Kahneman D.","year":"2000"},{"key":"CIT0078","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809477","volume-title":"Judgment Under Uncertainty: Heuristics and Biases","author":"Kahneman D.","year":"1982"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1007\/BF00118494"},{"key":"CIT0080","first-page":"297","volume":"10","author":"Kuflik T.","year":"1991","journal-title":"Computers and Artificial Intelligence"},{"key":"CIT0081","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226922614.001.0001","volume-title":"Torture and the Law of Proof: Europe and England in the Ancien R\u00e9gime","author":"Langbein J. H.","year":"1977"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1080\/09540099008915676"},{"key":"CIT0083","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7908-1811-6","volume-title":"Propositional, Probabilistic and Evidential Reasoning: Integrating Numeric and Symbolic Approaches","author":"Liu W.","year":"2001"},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.1007\/BF00872529"},{"key":"CIT0085","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7908-1792-8","volume-title":"The Dynamics of Judicial Proof: Computation, Logic, and Common Sense","author":"MacCrimmons M.","year":"2002"},{"key":"CIT0086","volume-title":"Formalising Trust as a Computational Concept","author":"Marsh S.","year":"1994"},{"key":"CIT0087","first-page":"39","volume-title":"Deontic Logic, Computational Linguistics and Legal Information Systems","author":"Martino A. A.","year":"1982"},{"key":"CIT0088","volume-title":"Expert Systems in Law","author":"Martino A. A.","year":"1992"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit\/2.2.154"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017985728390"},{"key":"CIT0091","volume-title":"Information and Communications Technology Law","author":"Martino A. A.","year":"1998"},{"key":"CIT0092","volume-title":"Artificial Intelligence and Law","author":"Martino A. A.","year":"2001"},{"key":"CIT0093","volume-title":"Computing and Informatics","author":"Martino A. A.","year":"2001"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.1080\/13600830123217"},{"key":"CIT0095","doi-asserted-by":"crossref","first-page":"125","DOI":"10.3233\/FI-1994-21128","volume":"21","author":"McCarty L. T.","year":"1994","journal-title":"Fundamenta Informaticae"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.38.5.550"},{"key":"CIT0097","volume-title":"Psychology and Law: Truthfulness, Accuracy and Credibility","author":"Memon A.","year":"1998"},{"key":"CIT0098","first-page":"3","volume-title":"Deontic Logic in Computer Science","author":"Meyer J.-J. Ch.","year":"1993"},{"key":"CIT0099","unstructured":""},{"key":"CIT0100","unstructured":""},{"key":"CIT0101","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1999)50:2<151::AID-ASI6>3.0.CO;2-I"},{"key":"CIT0102","volume-title":"Introduction to Environmental Forensics","author":"Murphy B. L.","year":"2002"},{"key":"CIT0103","doi-asserted-by":"publisher","DOI":"10.2307\/1141469"},{"key":"CIT0104","unstructured":""},{"key":"CIT0105","unstructured":""},{"key":"CIT0106","volume":"17","author":"Nissan E.","year":"1998","journal-title":"Computers and Artificial Intelligence"},{"key":"CIT0107","first-page":"392","volume":"17","author":"Nissan E.","year":"1998","journal-title":"Computers and Artificial Intelligence"},{"key":"CIT0108","first-page":"98","volume":"17","author":"Nissan E.","year":"1998","journal-title":"Computers and Artificial Intelligence"},{"key":"CIT0109","unstructured":""},{"key":"CIT0110","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017918122669"},{"key":"CIT0111","doi-asserted-by":"publisher","DOI":"10.1080\/13600830120074708"},{"key":"CIT0112","doi-asserted-by":"publisher","DOI":"10.1080\/13600830124262"},{"key":"CIT0113","first-page":"625","volume":"20","author":"Nissan E.","year":"2001","journal-title":"Computing and Informatics"},{"key":"CIT0114","first-page":"241","volume":"8","author":"Nissan E.","year":"2001","journal-title":"International Journal of Computing Anticipatory Systems"},{"key":"CIT0115","first-page":"247","volume-title":"Information and Communications Technology Law","author":"Nissan E.","year":"2001"},{"key":"CIT0116","first-page":"254","volume-title":"Information and Communications Technology Law","author":"Nissan E.","year":"2001"},{"key":"CIT0117","first-page":"219","volume-title":"Artificial Intelligence and Law","author":"Nissan E.","year":"2001"},{"key":"CIT0118","first-page":"258","volume-title":"Information and Communations Technology Law","author":"Nissan E.","year":"2001"},{"key":"CIT0119","unstructured":"Nissan, E. 2001j.Review ofComplex Cases: Perspectives on the Netherlands Criminal Justice SystemInformation and Communications Technology LawEdited by: Malsch, M. and Nijboer, J. F. 262\u2013264."},{"key":"CIT0120","unstructured":""},{"key":"CIT0121","first-page":"105","volume":"12","author":"Nissan E.","year":"2002","journal-title":"International Journal of Computing Anticipatory Systems"},{"key":"CIT0122","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302842"},{"key":"CIT0123","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302847"},{"key":"CIT0124","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302856"},{"key":"CIT0125","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302861"},{"key":"CIT0126","volume":"34","author":"Nissan E.","year":"2003","journal-title":"Cybernetics and Systems"},{"key":"CIT0127","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302854"},{"key":"CIT0128","first-page":"571","volume-title":"Cybernetics and Systems","author":"Nissan E.","year":"2003"},{"key":"CIT0129","first-page":"551","volume-title":"Cybernetics and Systems","author":"Nissan E.","year":"2003"},{"key":"CIT0130","unstructured":""},{"key":"CIT0131","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302858"},{"key":"CIT0132","volume-title":"Cybernetics and Systems","author":"Nissan E.","year":"2003"},{"key":"CIT0133","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/3-540-63614-5_32","volume-title":"Foundations of Intelligent Systems: Proceedings of the 10th International Symposium (ISMIS'97)","author":"Nissan E.","year":"1997"},{"key":"CIT0134","unstructured":""},{"key":"CIT0135","unstructured":""},{"key":"CIT0136","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302843"},{"key":"CIT0137","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780198267973.001.0001","volume-title":"Tort Liability Under Uncertainty","author":"Porat A.","year":"2001"},{"key":"CIT0138","doi-asserted-by":"publisher","DOI":"10.1007\/BF00118496"},{"key":"CIT0139","doi-asserted-by":"publisher","DOI":"10.1093\/ojls\/19.4.659"},{"key":"CIT0140","unstructured":""},{"key":"CIT0141","doi-asserted-by":"publisher","DOI":"10.1007\/BF00123994"},{"key":"CIT0142","doi-asserted-by":"publisher","DOI":"10.1080\/088395199117414"},{"key":"CIT0143","volume-title":"Interpreting Evidence: Evaluating Forensic Science in the Courtroom","author":"Robertson B.","year":"1995"},{"key":"CIT0144","volume-title":"Quae singula non prosunt collecta iuvant: la teoria della prova indiziaria nell'et\u00e0 medievale e moderna","author":"Rosoni I.","year":"1995"},{"key":"CIT0145","unstructured":""},{"key":"CIT0146","unstructured":""},{"key":"CIT0147","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008236719573"},{"key":"CIT0148","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017941304013"},{"key":"CIT0149","volume":"1999","author":"Schweighofer E.","year":"1999","journal-title":"The Journal of Information, Law and Technology"},{"key":"CIT0150","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1403.001.0001","volume-title":"The Art of Causal Conjecture","author":"Shafer G.","year":"1996"},{"key":"CIT0151","first-page":"215","volume-title":"Artificial Intelligence and Law","author":"Shimony S. E.","year":"2001"},{"key":"CIT0152","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017995916308"},{"key":"CIT0153","volume-title":"Institut National Polytechnique de Grenoble","author":"Sichman J. S.","year":"1995"},{"key":"CIT0154","unstructured":""},{"key":"CIT0155","unstructured":""},{"key":"CIT0156","doi-asserted-by":"publisher","DOI":"10.1007\/BF00118477"},{"key":"CIT0157","volume-title":"A Dynamic theory of epistemic states Causation in Decision, Belief Change, and Statistics","author":"Spohn W.","year":"1988"},{"key":"CIT0158","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1017\/S0021223700015405","volume":"31","author":"Stein A.","year":"1997","journal-title":"Israel Law Review"},{"key":"CIT0159","doi-asserted-by":"publisher","DOI":"10.1080\/13600830124950"},{"key":"CIT0160","volume-title":"Evidence","author":"Reay R.","year":"1999"},{"key":"CIT0161","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00057046"},{"key":"CIT0162","doi-asserted-by":"publisher","DOI":"10.1080\/0269993024400002"},{"key":"CIT0163","volume-title":"Applied Artificial Intelligence","author":"Thagard P.","year":"2004"},{"key":"CIT0164","unstructured":""},{"key":"CIT0165","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-009-2931-9","volume-title":"Probability and Inference in the Law of Evidence: The Uses and Limits of Bayesianism","author":"Tillers P.","year":"1988"},{"key":"CIT0166","unstructured":""},{"key":"CIT0167","doi-asserted-by":"publisher","DOI":"10.1002\/int.4550040304"},{"key":"CIT0168","volume-title":"The Uses of Argument","author":"Toulmin S.","year":"1958"},{"key":"CIT0169","volume-title":"Theories of Evidence: Bentham and Wigmore","author":"Twining W.","year":"1985"},{"key":"CIT0170","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1017\/S0021223700015363","volume":"31","author":"Twining W.","year":"1997","journal-title":"Israel Law Review"},{"key":"CIT0171","volume-title":"Frontiers of Judicial Research (Shambaugh Conference on Judicial Research, University of Iowa, October 1967)","author":"Ulmer S.","year":"1969"},{"key":"CIT0172","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008256030548"},{"key":"CIT0173","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017909820851"},{"key":"CIT0174","volume-title":"Computer Power and Human Reason: From Judgment to Calculation","author":"Weizenbaum J.","year":"1976"},{"key":"CIT0175","volume-title":"The Science of Judicial Proof as Given by Logic, Psychology, and General Experience, and Illustrated Judicial Trials","author":"Wigmore J. H.","year":"1937","edition":"3"},{"key":"CIT0176","doi-asserted-by":"publisher","DOI":"10.1080\/01969720302844"},{"key":"CIT0177","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.1998.9965792"},{"key":"CIT0178","doi-asserted-by":"publisher","DOI":"10.1080\/713673368"},{"key":"CIT0179","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1093\/lpr\/1.1.37","volume":"1","author":"Zeleznikow J.","year":"2002","journal-title":"Law, Probability and Risk: A Journal for Reasoning Under Uncertainty"},{"key":"CIT0180","unstructured":""}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839510490279852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T23:34:29Z","timestamp":1585697669000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08839510490279852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":180,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["10.1080\/08839510490279852"],"URL":"https:\/\/doi.org\/10.1080\/08839510490279852","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}