{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:42:31Z","timestamp":1778154151373,"version":"3.51.4"},"reference-count":80,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2020,6,13]],"date-time":"2020-06-13T00:00:00Z","timestamp":1592006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2020,6,13]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A quantitative method research design has been used in this study. This study was conducted throughout Malaysia with a total of 250 valid questionnaires obtained from managers and executives from the Multimedia Super Corridor (MSC)-status companies. Structural equation modelling (SEM) using partial least square was used to analyse the data and to test all nine hypotheses developed in this study.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Findings from this study indicate that operational agility (OA) is significantly related to ISM practices in MSC-status companies. The validation of the structural model of nine hypotheses developed for this study has demonstrated satisfactory results, exhibited six significant direct relationships and three insignificant relationships.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>This study has addressed the needs for a comprehensive, coherent and empirically tested ISM practices and organisational agility framework. The current theoretical framework used in this study emphasised on the ISM\u2013organisational agility dimensions that are predominantly important to ascertain high level of ISM practices and perceived agility level among the information technology (IT) business companies in Malaysia. With the application of SEM for powerful analysis, the empirical-based framework established in this study was validated by the empirical findings, thus contributing significantly to the field of information security (InfoSec).<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This study has filled the research gap between different constructs of ISM practices and OA. The model put forth in this study contributes in several ways to the InfoSec research community. The recognition of InfoSec practices that could facilitate organisational agility in the IT industry in Malaysia is vital and contributes to more value creation for the organisations.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-02-2020-0020","type":"journal-article","created":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T08:31:39Z","timestamp":1591950699000},"page":"681-700","source":"Crossref","is-referenced-by-count":18,"title":["The impact of information security management practices on organisational agility"],"prefix":"10.1108","volume":"28","author":[{"given":"Muhamad Khairulnizam","family":"Zaini","sequence":"first","affiliation":[]},{"given":"Mohamad Noorman","family":"Masrek","sequence":"additional","affiliation":[]},{"given":"Mad Khir Johari","family":"Abdullah Sani","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"3","key":"key2020110313134891100_ref001","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","article-title":"User preference of cyber security awareness delivery methods","volume":"33","year":"2014","journal-title":"Behaviour and Information Technology"},{"issue":"5","key":"key2020110313134891100_ref02a","first-page":"47","article-title":"A unified approach to information security compliance","volume":"41","year":"2006","journal-title":"EDUCAUSE Review"},{"key":"key2020110313134891100_ref002","unstructured":"Alshaikh, M. (2018), \u201cInformation security management practices in organisations (unpublished\u201d, doctoral dissertation). University of Melbourne, Melbourne."},{"issue":"1","key":"key2020110313134891100_ref003","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSP.2007.11","article-title":"Is information security under control?: investigating quality in information security management","volume":"5","year":"2007","journal-title":"IEEE Security and Privacy Magazine"},{"key":"key2020110313134891100_ref004","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory\/Albert Bandura","year":"1986"},{"issue":"7\/8","key":"key2020110313134891100_ref005","first-page":"341","article-title":"Building and leveraging information in dynamic environments: the role of IT infrastructure flexibility as enabler of organisational responsiveness and competitive advantage","volume":"47","year":"2010","journal-title":"Information and Management"},{"key":"key2020110313134891100_ref006","article-title":"Implementing information security management systems","volume-title":"Advances in Information Security Management and Small Systems Security. IFIP International Federation for Information Processing","year":"2001"},{"issue":"4","key":"key2020110313134891100_ref007","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2307\/249019","article-title":"MIS problems and failures: a socio-technical perspective, part II: the application of socio-technical theory","volume":"1","year":"1977","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2020110313134891100_ref008","first-page":"326","article-title":"IT capability and organisational performance: the roles of business process agility and environmental factors","volume":"23","year":"2013","journal-title":"European Journal of Information Systems"},{"key":"key2020110313134891100_ref009","unstructured":"De Lange, J., Von Solms, R. and Gerber, M. (2016), \u201cInformation security management in local government\u201d, Paper presented at the 2016 IST-Africa Week Conference, Durban, South Africa, p. 50."},{"issue":"2","key":"key2020110313134891100_ref010","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1509\/jmkr.38.2.269.18845","article-title":"Index construction with formative indicators: an alternative to scale development","volume":"38","year":"2001","journal-title":"Journal of Marketing Research"},{"issue":"12","key":"key2020110313134891100_ref011","first-page":"1","article-title":"Impact of organizational culture values on organizational agility","volume":"9","year":"2017","journal-title":"Sustainability, MDPI, Open Access Journal"},{"issue":"2","key":"key2020110313134891100_ref012","first-page":"17","article-title":"IT security review: privacy, protection, access control, assurance and system security","volume":"2","year":"2007","journal-title":"International Journal of Multimedia and Ubiquitous Engineering"},{"issue":"8","key":"key2020110313134891100_ref013","doi-asserted-by":"crossref","first-page":"440","DOI":"10.17705\/1jais.00135","article-title":"Gaining agility through IT personnel capabilities: the mediating role of IT infrastructure capabilities","volume":"8","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"key2020110313134891100_ref014","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"key2020110313134891100_ref015","volume-title":"Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2017"},{"issue":"2","key":"key2020110313134891100_ref016","doi-asserted-by":"crossref","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-SEM: indeed a silver bullet","volume":"19","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"1\/2","key":"key2020110313134891100_ref017","first-page":"1","article-title":"Corrigendum to editorial partial least squares structural equation modeling: Rigorous applications","volume":"46","year":"2014","journal-title":"Long Range Planning"},{"issue":"3","key":"key2020110313134891100_ref018","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1108\/09685221111153546","article-title":"Impacts of organisational capabilities in informationsecurity","volume":"19","year":"2011","journal-title":"Information Management and Computer Security"},{"issue":"4","key":"key2020110313134891100_ref019","first-page":"27","article-title":"A process framework for information security management","volume":"4","year":"2016","journal-title":"International Journal of Information Systems and Project Management"},{"key":"key2020110313134891100_ref020","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/S1474-7979(2009)0000020014","article-title":"The use of partial least squares path modeling in international marketing","volume":"20","year":"2009","journal-title":"Advances in International Marketing"},{"issue":"5","key":"key2020110313134891100_ref021","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1108\/09685220310500153","article-title":"An integrated system theory of information security management","volume":"11","year":"2003","journal-title":"Information Management and Computer Security"},{"key":"key2020110313134891100_ref022","unstructured":"Horne, C.A., Ahmad, A. and Maynard, S.B. (2016), \u201cA theory on information security\u201d, Paper presented at the 27th Australasian Conference on Information Systems, Wollongong, pp. 1-13."},{"key":"key2020110313134891100_ref023","unstructured":"IDC Malaysia (2019), \u201cTop 10 ICT predictions to drive Malaysian digital economy\u201d, available at: www.digitalnewsasia.com\/digital-economy\/idc-unveils-top-10-ict-predictions-drive-malaysian-digital-economy"},{"key":"key2020110313134891100_ref025a","unstructured":"ISO.org (2013), \u201cISO\/IEC 27002:2005 \u2013 Information Technology \u2013 Security Techniques \u2013 Code of Practice for Information Security Management\u201d, available at: www.iso.org\/iso\/catalogue_detail?csnumber=50297 (accessed 28 January 2015)."},{"key":"key2020110313134891100_ref024","first-page":"1","author":"ISO\/IEC 27001","year":"2013"},{"key":"key2020110313134891100_ref025","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1016\/j.procs.2016.04.227","article-title":"Comparative study of information security risk assessment models for cloud computing systems","volume":"83","year":"2016","journal-title":"Procedia Computer Science"},{"key":"key2020110313134891100_ref026","article-title":"The insider threat in cloud computing. Critical information infrastructure security. CRITIS 2011","volume-title":"Lecture Notes in Computer Science","year":"2013"},{"key":"key2020110313134891100_ref027","unstructured":"Khan, F.S., Kim, J.H., Moore, R.L. and Mathiassen, L. (2019), \u201cData breach risks and resolutions: a literature synthesis\u201d, Paper presented at the Americas Conference on Information Systems, Cancun, Mexico."},{"issue":"3","key":"key2020110313134891100_ref028","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1177\/001316447003000308","article-title":"Determining sample size for research activities","volume":"30","year":"1970","journal-title":"Educational and Psychological Measurement"},{"key":"key2020110313134891100_ref027a","first-page":"1537","article-title":"Information security considerations for higher learning institutions","year":"2010"},{"issue":"2","key":"key2020110313134891100_ref029","article-title":"Security controls for employees\u2019 satisfaction: perspective of controls framework","volume":"9","year":"2019","journal-title":"SAGE Open"},{"key":"key2020110313134891100_ref030","doi-asserted-by":"crossref","first-page":"931","DOI":"10.2307\/41409967","article-title":"Understanding the link between information technology capability and organisational agility: an empirical examination","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"key":"key2020110313134891100_ref031","first-page":"1","article-title":"Strategic information systems security: definition and theoretical model","year":"2013","journal-title":"Americas Conference on Information Systems"},{"issue":"32","key":"key2020110313134891100_ref033","article-title":"ISO 17799: Best practices in information security management","volume":"15","year":"2005","journal-title":"Communication of the Association for Information Systems"},{"issue":"3","key":"key2020110313134891100_ref032","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1108\/09685220810893207","article-title":"Information security management objectives and practices: a parsimonious framework","volume":"16","year":"2008","journal-title":"Information Management and Computer Security"},{"key":"key2020110313134891100_ref037a","unstructured":"MDEC (2019), Malaysia Digital Economy Corporation, available at: https:\/\/mdec.my\/what-we-offer\/msc-malaysia\/"},{"key":"key2020110313134891100_ref034","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.cose.2014.09.003","article-title":"Implementing information security best practices on software lifecycle processes","volume":"48","year":"2015","journal-title":"Computers and Security"},{"key":"key2020110313134891100_ref035","unstructured":"Mycert (2019), available at: www.mycert.org.my\/statistics_2019.php (accessed 20 October 2019)."},{"key":"key2020110313134891100_ref036","unstructured":"Naseer, H., Maynard, S. and Ahmad, A. (2016), \u201cBusiness analytics in information security risk management: the contingent effect on security performance\u201d, Paper presented at the 24th European Conference on Information Systems, Istanbul, Turkey, pp. 1-11."},{"issue":"4","key":"key2020110313134891100_ref037","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1108\/JEIM-10-2018-0233","article-title":"Paving the path toward strategic agility","volume":"32","year":"2019","journal-title":"Journal of Enterprise Information Management"},{"key":"key2020110313134891100_ref042a","article-title":"NIST special publication 800-12, an introduction to information security","author":"NIST","year":"2017"},{"issue":"C","key":"key2020110313134891100_ref038","first-page":"26","article-title":"An information security control assessment methodology for organizations\u2019 financial information","volume":"18","year":"2015","journal-title":"International Journal of Accounting Information Systems"},{"issue":"2","key":"key2020110313134891100_ref039","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1177\/0972150917713545","article-title":"Modelling the relationship between information technology infrastructure and organizational agility: a study in the context of India","volume":"19","year":"2018","journal-title":"Global Business Review"},{"key":"key2020110313134891100_ref040","volume-title":"Gartner Top 10 Strategic Technology Trends for 2018","year":"2017"},{"key":"key2020110313134891100_ref046a","volume-title":"The Theory of the Growth of the Firm","year":"1959"},{"issue":"1","key":"key2020110313134891100_ref041","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.jsis.2017.10.002","article-title":"The role of IT application orchestration capability in improving agility and performance","volume":"27","year":"2018","journal-title":"The Journal of Strategic Information Systems"},{"issue":"8","key":"key2020110313134891100_ref042","doi-asserted-by":"crossref","first-page":"116","DOI":"10.5539\/ijbm.v11n8p116","article-title":"The relation of information security management system efficiency with organisational agility case study: Isfahan Mobarakeh steel company","volume":"11","year":"2016","journal-title":"International Journal of Business and Management"},{"key":"key2020110313134891100_ref043","volume-title":"Partial Least Squares Structural Equation Modeling (PLS-SEM) Using SmartPLS 3.0: An Updated and Practical Guide to Statistical Analysis","year":"2016"},{"issue":"8","key":"key2020110313134891100_ref044","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","article-title":"Self-efficacy in information security: its influence on end users\u2019 information security practice behavior","volume":"28","year":"2009","journal-title":"Computers and Security"},{"issue":"5","key":"key2020110313134891100_ref045","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/j.jbusres.2011.02.009","article-title":"Investigating firm\u2019s customer agility and firm performance: the importance of aligning sense and respond capabilities","volume":"65","year":"2012","journal-title":"Journal of Business Research"},{"key":"key2020110313134891100_ref046","first-page":"556","article-title":"Towards a strategic theory of the firm. Alternative theories of the firm","volume":"26","year":"1984","journal-title":"Competitive Strategic Management"},{"key":"key2020110313134891100_ref047","first-page":"1","article-title":"Human aspects of information security in organisations","volume":"56","year":"2016","journal-title":"Computer Fraud and Security"},{"key":"key2020110313134891100_ref048","doi-asserted-by":"crossref","first-page":"237","DOI":"10.2307\/30036530","article-title":"Shaping agility through digital options: reconceptualizing the role of information technology in contemporary firms","volume":"27","year":"2003","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020110313134891100_ref049","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10799-007-0028-4","article-title":"Realizing business value of agile IT applications: antecedents in the supply chain networks","volume":"9","year":"2008","journal-title":"Information Technology and Management"},{"issue":"1\/2","key":"key2020110313134891100_ref050","first-page":"7","article-title":"A methodology for achieving agility in manufacturing organisations: an introduction","volume":"62","year":"1999","journal-title":"International Journal of Production Economics"},{"issue":"1","key":"key2020110313134891100_ref051","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1216218.1216224","article-title":"A review of information security issues and respective contributions","volume":"38","year":"2007","journal-title":"Acm Sigmis Database: The Database for Advances in Information Systems"},{"key":"key2020110313134891100_ref052","unstructured":"Siregar, S. and Chang, K.C. (2019), \u201cCybersecurity agility: antecedents and effects on security incident management effectiveness\u201d, Paper presented at the Pacific Asia Conference on Information Systems, PACIS, Xi\u2019an, China."},{"key":"key2020110313134891100_ref053","article-title":"How to thrive in turbulent markets","volume":"87","year":"2009","journal-title":"Harvard Business Review"},{"key":"key2020110313134891100_ref060a","first-page":"227","article-title":"A process-oriented perspective on the alignment of information technology and business strategy","volume":"24","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"key2020110313134891100_ref054","doi-asserted-by":"crossref","first-page":"463","DOI":"10.2307\/23044052","article-title":"Competing perspectives on the link between strategic information technology alignment and organizational agility: insights from a mediation model","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020110313134891100_ref055","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.jsis.2018.12.002","article-title":"Information technology and the search for organizational agility: a systematic review with future research possibilities","volume":"28","year":"2019","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"key2020110313134891100_ref056","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1525\/cmr.2016.58.4.13","article-title":"Dynamic capabilities and organizational agility: risk, uncertainty, and strategy in the innovation economy","volume":"58","year":"2016","journal-title":"California Management Review"},{"issue":"7","key":"key2020110313134891100_ref057","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1002\/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z","article-title":"Dynamic capabilities and strategic management","volume":"18","year":"1997","journal-title":"Strategic Management Journal"},{"key":"key2020110313134891100_ref058","first-page":"167","article-title":"Enterprise systems and organisational agility: a review of the literature and conceptual framework","volume":"31","year":"2012","journal-title":"Communications of the Association for Information Systems"},{"key":"key2020110313134891100_ref059","article-title":"Analyzing information security awareness through networks of association","volume-title":"Trust, Privacy and Security in Digital Business. TrustBus 2010. Lecture Notes in Computer Science","year":"2010"},{"key":"key2020110313134891100_ref060","first-page":"1","volume-title":"Critical Success Factors Analysis on Effective Information Security Management: A Literature Review: 20th Proceedings of the Americas Conference on Information Systems","year":"2014"},{"issue":"2","key":"key2020110313134891100_ref061","first-page":"5","article-title":"Structural equation modeling in information systems research using partial least squares","volume":"11","year":"2010","journal-title":"Journal of Information Technology Theory and Application"},{"issue":"8","key":"key2020110313134891100_ref062","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1080\/09537325.2011.604155","article-title":"Implementing international standards for information security management in China and Europe: a comparative multi-case study","volume":"23","year":"2011","journal-title":"Technology Analysis and Strategic Management"},{"issue":"1","key":"key2020110313134891100_ref063","first-page":"79","article-title":"The impact of IT management processes on enterprise agility","volume":"12","year":"2012","journal-title":"Communications of the IIMA"},{"issue":"2","key":"key2020110313134891100_ref064","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.indmarman.2010.06.039","article-title":"Making sense of a market information system for superior performance: the roles of organizational responsiveness and innovation strategy","volume":"40","year":"2011","journal-title":"Industrial Marketing Management"},{"key":"key2020110313134891100_ref065","unstructured":"Weishaupl, E., Yasasin, E. and Schryen, G. (2015), \u201cA multi-theoretical literature review on information security investments using the resource-based view and the organizational learning theory\u201d, Paper presented at the International Conference on Information Systems: Exploring the Information Frontier, ICIS, Fort Worth, TX."},{"issue":"2","key":"key2020110313134891100_ref066","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1002\/smj.4250050207","article-title":"The Resource-Based view of the firm","volume":"5","year":"1984","journal-title":"Strategic Management Journal"},{"key":"key2020110313134891100_ref067","unstructured":"Yousif, M. and Pessi, K. (2016), \u201cIT agility research review: Thematic analysis and categorization of literature\u201d, Paper presented at the 20th Pacific Asia Conference on Information Systems, Chiayi, Taiwan, pp. 16-25."},{"issue":"1\/2","key":"key2020110313134891100_ref068","first-page":"33","article-title":"Agile manufacturing: the drivers, concepts and attributes","volume":"62","year":"1999","journal-title":"International Journal of Production Economics"},{"issue":"6","key":"key2020110313134891100_ref069","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1016\/j.im.2004.09.001","article-title":"The relationship between information technology acceptance and organisational agility in Malaysia","volume":"42","year":"2005","journal-title":"Information and Management"},{"key":"key2020110313134891100_ref070","first-page":"24","article-title":"Radio frequency identification technology utilization and organisational agility","volume":"52","year":"2011","journal-title":"Journal of Computer Information Systems"},{"key":"key2020110313134891100_ref071","unstructured":"Frenkel, K. (2017), \u201cSecurity or agility? An unnecessary choice\u201d, available at: www.cioinsight.com\/security\/slideshows\/security-or-agility-an-unnecessary-choice.html"},{"issue":"1\/2","key":"key2020110313134891100_ref072","article-title":"Partial least squares structural equation modeling: rigorous applications, better results and higher acceptance","volume":"46","year":"2013","journal-title":"Long Range Planning"},{"key":"key2020110313134891100_ref073","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2016"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2020-0020\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2020-0020\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:41Z","timestamp":1753406561000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/28\/5\/681-700\/110943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,13]]},"references-count":80,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,6,13]]}},"alternative-id":["10.1108\/ICS-02-2020-0020"],"URL":"https:\/\/doi.org\/10.1108\/ics-02-2020-0020","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2020,6,13]]}}}