{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T11:41:22Z","timestamp":1777290082070,"version":"3.51.4"},"reference-count":80,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2019,11,7]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>User profiling with big data raises significant issues regarding privacy. Privacy studies typically focus on individual privacy; however, in the era of big data analytics, users are also targeted as members of specific groups, thus challenging their collective privacy with unidentified implications. Overall, this paper aims to argue that in the age of big data, there is a need to consider the collective aspects of privacy as well and to develop new ways of calculating privacy risks and identify privacy threats that emerge.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Focusing on a collective level, the authors conducted an extensive literature review related to information privacy and concepts of social identity. They also examined numerous automated data-driven profiling techniques analyzing at the same time the involved privacy issues for groups.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This paper identifies privacy threats for collective entities that stem from data-driven profiling, and it argues that privacy-preserving mechanisms are required to protect the privacy interests of groups as entities, independently of the interests of their individual members. Moreover, this paper concludes that collective privacy threats may be different from threats for individuals when they are not members of a group.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Although research evidence indicates that in the age of big data privacy as a collective issue is becoming increasingly important, the pluralist character of privacy has not yet been adequately explored. This paper contributes to filling this gap and provides new insights with regard to threats for group privacy and their impact on collective entities and society.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-04-2019-0048","type":"journal-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T10:05:32Z","timestamp":1573121132000},"page":"183-197","source":"Crossref","is-referenced-by-count":9,"title":["Automated data-driven profiling: threats for group privacy"],"prefix":"10.1108","volume":"28","author":[{"given":"Paola","family":"Mavriki","sequence":"first","affiliation":[]},{"given":"Maria","family":"Karyda","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022100513442240300_ref001","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.ins.2017.09.022","article-title":"Community extraction and visualization in social networks applied to Twitter","volume":"424","year":"2018","journal-title":"Information Sciences"},{"issue":"4","key":"key2022100513442240300_ref002","doi-asserted-by":"crossref","first-page":"311","DOI":"10.2307\/2786994","article-title":"Self-consciousness and social identity: self-regulation as a group member","volume":"52","year":"1989","journal-title":"Social Psychology Quarterly"},{"issue":"7","key":"key2022100513442240300_ref003","first-page":"684","article-title":"Analysis of tourist behaviour based on the tracking data collected using a mobile communication instrument","volume":"41","year":"2007","journal-title":"Transportation Research Part A: Policy and Practice"},{"issue":"12","key":"key2022100513442240300_ref004","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1016\/j.comcom.2012.04.019","article-title":"GLP: a cryptographic approach for group location privacy","volume":"35","year":"2012","journal-title":"Computer Communications"},{"issue":"1\/2","key":"key2022100513442240300_ref005","first-page":"225","article-title":"Market segmentation and product differentiation in political campaigns: a technical feature perspective","volume":"19","year":"2003","journal-title":"Journal of Marketing Management"},{"issue":"4","key":"key2022100513442240300_ref006","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1177\/1461444815614001","article-title":"Big data analytics and the limits of privacy self-management","volume":"19","year":"2017","journal-title":"New Media and Society"},{"key":"key2022100513442240300_ref007","volume-title":"Individual and Group Privacy (PPR)","year":"1978"},{"key":"key2022100513442240300_ref008","unstructured":"Boyd, D. and Crawford, K. (2011), \u201cSix provocations for big data\u201d, SSRN Scholarly Paper No. ID 1926431, Social Science Research Network, Rochester, New York, NY, available at: https:\/\/papers.ssrn.com\/abstract=1926431 (accessed 12 May 2018)."},{"issue":"3","key":"key2022100513442240300_ref009","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.clsr.2017.03.002","article-title":"Big data and security policies: towards a framework for regulating the phases of analytics and use of big data","volume":"33","year":"2017","journal-title":"Computer Law and Security Review"},{"key":"key2022100513442240300_ref010","first-page":"1131","article-title":"The boundaries of privacy harm","volume":"86","year":"2011","journal-title":"Indiana Law Journal"},{"issue":"4","key":"key2022100513442240300_ref011","article-title":"Business intelligence and analytics: from big data to big impact","volume":"36","year":"2012","journal-title":"MIS Quarterly"},{"key":"key2022100513442240300_ref012","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1145\/2393347.2393439","article-title":"Discovering informative social subgraphs and predicting pairwise relationships from group photos","volume-title":"Proceedings of the 20th ACM International Conference on Multimedia","year":"2012"},{"key":"key2022100513442240300_ref013","article-title":"Introduction to dataveillance and information privacy, and definitions of terms","volume-title":"Roger Clarke\u2019s Dataveillance and Information Privacy Pages","year":"1999"},{"key":"key2022100513442240300_ref014","volume-title":"The Media and the Public: \u201cThem\u201d and \u201cUs\u201d in Media Discourse","year":"2015"},{"key":"key2022100513442240300_ref015","first-page":"3","article-title":"Data dilemmas in the information society: introduction and overview","volume-title":"Discrimination and Privacy in the Information Society","year":"2013"},{"key":"key2022100513442240300_ref016","first-page":"36","article-title":"Political marketing and segmentation in aging democracies","volume-title":"Routledge Handbook of Political Marketing","year":"2012"},{"issue":"2","key":"key2022100513442240300_ref017","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.clsr.2016.02.006","article-title":"The new general data protection regulation: still a sound system for the protection of individuals?","volume":"32","year":"2016","journal-title":"Computer Law and Security Review"},{"key":"key2022100513442240300_ref018","volume-title":"Universal Human Rights in Theory and Practice","year":"2013"},{"issue":"7321","key":"key2022100513442240300_ref019","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1136\/bmj.323.7321.1103","article-title":"Ethical issues in qualitative research on internet communities","volume":"323","year":"2001","journal-title":"BMJ"},{"key":"key2022100513442240300_ref020","first-page":"3","article-title":"Seven types of privacy","volume-title":"European Data Protection: Coming of Age","year":"2013"},{"key":"key2022100513442240300_ref021","first-page":"621","article-title":"Guilt by expressive association: political profiling, surveillance and the privacy of groups","volume":"46","year":"2004","journal-title":"Arizona Law Review"},{"issue":"4","key":"key2022100513442240300_ref022","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s10676-006-0001-7","article-title":"The ontological interpretation of informational privacy","volume":"7","year":"2005","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"key2022100513442240300_ref023","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13347-014-0157-8","article-title":"Open data, data protection, and group privacy","volume":"27","year":"2014","journal-title":"Philosophy and Technology"},{"issue":"1","key":"key2022100513442240300_ref024","doi-asserted-by":"crossref","first-page":"57","DOI":"10.31269\/triplec.v12i1.552","article-title":"Social media and the public sphere","volume":"12","year":"2014","journal-title":"TripleC: Communication, Capitalism and Critique. Open Access Journal for a Global Sustainable Information Society"},{"key":"key2022100513442240300_ref025","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.procs.2017.08.171","article-title":"Topical cohesion of communities on twitter","volume":"112","year":"2017","journal-title":"Procedia Computer Science"},{"key":"key2022100513442240300_ref026","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1016\/j.pmcj.2016.04.004","article-title":"Personalization and context-awareness in social local search: state-of-the-art and future research challenges","volume":"38","year":"2017","journal-title":"Pervasive and Mobile Computing"},{"key":"key2022100513442240300_ref027","unstructured":"Goodman, E. Labo, S. Tambini, D. and Moore, M. (2017), \u201cThe new political campaigning\u201d, Monograph, March, available at: http:\/\/blogs.lse.ac.uk\/mediapolicyproject\/policy-briefs\/ (accessed 29 January 2018)."},{"key":"key2022100513442240300_ref028","unstructured":"Granickas, K. (2015), \u201cEthical and responsible use of open government data\u201d, European Public Sector Information Platform Topic Report, Vol. 2."},{"issue":"2","key":"key2022100513442240300_ref029","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1017\/S0841820900002952","article-title":"Two views of collective rights","volume":"4","year":"1991","journal-title":"Canadian Journal of Law and Jurisprudence"},{"key":"key2022100513442240300_ref030","first-page":"25","article-title":"Personalization vs privacy in big data analysis","year":"2014","journal-title":"International Journal of Big Data"},{"key":"key2022100513442240300_ref031","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/978-3-319-46608-8_10","article-title":"Genetic classes and genetic categories: protecting genetic groups through data protection law","volume-title":"Group Privacy","year":"2017"},{"key":"key2022100513442240300_ref032","first-page":"25","article-title":"A discussion of privacy challenges in user profiling with big data techniques: the eexcess use case","volume-title":"presented at the 2013 IEEE International Congress on Big Data","year":"2013"},{"issue":"1","key":"key2022100513442240300_ref033","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s12394-008-0003-1","article-title":"Profiling and the rule of law","volume":"1","year":"2008","journal-title":"Identity in the Information Society"},{"issue":"3","key":"key2022100513442240300_ref034","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1177\/1046496404263424","article-title":"The social identity perspective: intergroup relations, self-conception, and small groups","volume":"35","year":"2004","journal-title":"Small Group Research"},{"issue":"1","key":"key2022100513442240300_ref035","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s11023-016-9391-4","article-title":"Rafael Capurro, Michael Eldred and Daniel Nagel: digital whoness: identity, privacy and freedom in the cyberworld","volume":"27","year":"2017","journal-title":"Minds and Machines"},{"key":"key2022100513442240300_ref036","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199760107.013.002","article-title":"From group identity to political cohesion and commitment","volume-title":"The Oxford Handbook of Political Psychology","year":"2013","edition":"2 ed"},{"key":"key2022100513442240300_ref037","first-page":"55","article-title":"Reply: direct and indirect profiling in the light of virtual persons","volume-title":"Profiling the European Citizen: Cross Disciplinary Perspectives","year":"2008"},{"key":"key2022100513442240300_ref038","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.chb.2014.05.015","article-title":"Organizational balancing of website interactivity and control: an examination of ideological groups and the duality of goals","volume":"38","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2022100513442240300_ref039","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.bdr.2015.01.006","article-title":"Significance and challenges of big data research","volume":"2","year":"2015","journal-title":"Big Data Research"},{"issue":"1","key":"key2022100513442240300_ref040","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1353\/hrq.1999.0009","article-title":"Human rights, group rights, and peoples\u2019 rights","volume":"21","year":"1999","journal-title":"Human Rights Quarterly"},{"key":"key2022100513442240300_ref041","doi-asserted-by":"crossref","unstructured":"Jones, P. (2017), \u201cGroup rights and group oppression*\u201d, Theories of Rights, 15 May, available at: https:\/\/doi.org\/10.4324\/9781315236308-17","DOI":"10.4324\/9781315236308-17"},{"key":"key2022100513442240300_ref042","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-319-46608-8_3","article-title":"Group privacy in the age of big data","volume-title":"Group Privacy","year":"2017"},{"issue":"4\/5","key":"key2022100513442240300_ref043","first-page":"375","article-title":"Local groups online: political learning and participation","volume":"16","year":"2007","journal-title":"Computer Supported Cooperative Work (CSCW)"},{"key":"key2022100513442240300_ref044","first-page":"27","article-title":"Sustainable harvesting of the big data potential","volume-title":"Exploring the Boundaries of Big Data","year":"2016"},{"issue":"4","key":"key2022100513442240300_ref045","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1111\/jcc4.12075","article-title":"Can our group survive? An investigation of the evolution of mixed\u2010mode groups","volume":"19","year":"2014","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"5","key":"key2022100513442240300_ref046","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1177\/0967010614544204","article-title":"The new profiling: algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European union","volume":"45","year":"2014","journal-title":"Security Dialogue"},{"key":"key2022100513442240300_ref047","doi-asserted-by":"crossref","first-page":"15132","DOI":"10.1109\/ACCESS.2018.2806881","article-title":"A survey on big data market: pricing, trading and protection","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"2","key":"key2022100513442240300_ref048","doi-asserted-by":"crossref","first-page":"e56221","DOI":"10.1371\/journal.pone.0056221","article-title":"Health-related hot topic detection in online communities using text clustering","volume":"8","year":"2013","journal-title":"Plos One"},{"key":"key2022100513442240300_ref049","article-title":"Ebola: a big data disaster-privacy, property, and the law of disaster experimentation","year":"2016"},{"issue":"3","key":"key2022100513442240300_ref050","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1080\/01972243.2016.1153010","article-title":"Big data privacy: the datafication of personal information","volume":"32","year":"2016","journal-title":"The Information Society"},{"issue":"2","key":"key2022100513442240300_ref051","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.clsr.2016.01.014","article-title":"Personal data for decisional purposes in the age of analytics: from an individual to a collective dimension of data protection","volume":"32","year":"2016","journal-title":"Computer Law and Security Review"},{"key":"key2022100513442240300_ref052","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/978-3-319-46608-8_8","article-title":"From group privacy to collective privacy: towards a new dimension of privacy and data protection in the big data era","volume-title":"Group Privacy","year":"2017"},{"key":"key2022100513442240300_ref053","first-page":"33","article-title":"Using personalization technologies for political purposes: privacy implications","volume-title":"International Conference on E-Democracy","year":"2017"},{"issue":"3","key":"key2022100513442240300_ref054","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1086\/jar.53.3.3630956","article-title":"Pluralist approaches to human rights","volume":"53","year":"1997","journal-title":"Journal of Anthropological Research"},{"key":"key2022100513442240300_ref055","article-title":"Social media profiling: a panopticon or omniopticon tool?","volume-title":"Proceeding of the 6th Conference of the Surveillance Studies Network","year":"2014"},{"issue":"4","key":"key2022100513442240300_ref056","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s13347-017-0253-7","article-title":"From individual to group privacy in big data analytics","volume":"30","year":"2017","journal-title":"Philosophy and Technology"},{"issue":"2","key":"key2022100513442240300_ref057","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1257\/jep.28.2.51","article-title":"Political campaigns and big data","volume":"28","year":"2014","journal-title":"Journal of Economic Perspectives"},{"issue":"2","key":"key2022100513442240300_ref058","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1111\/1467-9760.00049","article-title":"Homogeneity\u2019 and constitutional democracy: coping with identity conflicts through group rights","volume":"6","year":"1998","journal-title":"Journal of Political Philosophy"},{"issue":"4","key":"key2022100513442240300_ref059","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.jksuci.2017.06.001","article-title":"Big data technologies: a survey","volume":"30","year":"2018","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"key2022100513442240300_ref060","first-page":"1577","article-title":"Ease and ethics of user profiling in black mirror","volume-title":"Companion Proceedings of the The Web Conference 2018","year":"2018"},{"key":"key2022100513442240300_ref061","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-30146-4_1","article-title":"Introduction to big data","volume-title":"Big Data Applications and Use Cases","year":"2016"},{"key":"key2022100513442240300_ref062","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-3-319-46608-8_4","article-title":"Beyond \u2018do no harm\u2019 and individual consent: reckoning with the emerging ethical challenges of civil society\u2019s use of data","volume-title":"Group Privacy","year":"2017"},{"issue":"6","key":"key2022100513442240300_ref063","article-title":"Individualism vs. group rights: the legacy of brown","volume":"93","year":"1984","journal-title":"Yale Law Journal"},{"key":"key2022100513442240300_ref064","first-page":"1","article-title":"Voter targeting online in comparative perspectives: political party websites in the 2008\/2009 and 2013 Austrian and German election campaigns","year":"2016","journal-title":"Journal of Political Marketing"},{"issue":"1\/3","key":"key2022100513442240300_ref065","first-page":"100","article-title":"Big data life cycle: security issues, challenges, threat and security model","volume":"7","year":"2017","journal-title":"International Journal of Engineering and Technology"},{"issue":"1","key":"key2022100513442240300_ref066","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.clsr.2010.11.009","article-title":"The limits of privacy in automated profiling and data mining","volume":"27","year":"2011","journal-title":"Computer Law and Security Review"},{"issue":"10","key":"key2022100513442240300_ref067","doi-asserted-by":"crossref","first-page":"1794","DOI":"10.1080\/01419870.2012.659271","article-title":"Moving ethnography online: researching Brazilian migrants\u2019 online togetherness","volume":"35","year":"2012","journal-title":"Ethnic and Racial Studies"},{"key":"key2022100513442240300_ref068","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.jbusres.2016.08.001","article-title":"Critical analysis of big data challenges and analytical methods","volume":"70","year":"2017","journal-title":"Journal of Business Research"},{"key":"key2022100513442240300_ref069","first-page":"1264","article-title":"Reconstructing electronic surveillance law","volume":"72","year":"2003","journal-title":"The George Washington Law Review"},{"key":"key2022100513442240300_ref070","unstructured":"Solove, D.J. (2005), \u201cA taxonomy of privacy\u201d, SSRN Scholarly Paper No. ID 667622, Social Science Research Network, Rochester, New York, NY, available at: https:\/\/papers.ssrn.com\/abstract=667622 (accessed 11 September 2017)."},{"key":"key2022100513442240300_ref071","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-1-4419-7988-9_9","article-title":"Group identities: the social identity perspective","volume-title":"Handbook of Identity Theory and Research","year":"2011"},{"key":"key2022100513442240300_ref072","unstructured":"Spencer, S.B. (2015), \u201cPrivacy, predictive analytics, and electronic commerce regulation\u201d, SSRN Scholarly Paper No. ID 2678325, Social Science Research Network, Rochester, New York, NY, available at: https:\/\/papers.ssrn.com\/abstract=2678325 (accessed 14 May 2018)."},{"key":"key2022100513442240300_ref073","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.datak.2017.01.001","article-title":"Big data technologies and management: what conceptual modeling can do","volume":"108","year":"2017","journal-title":"Data and Knowledge Engineering"},{"key":"key2022100513442240300_ref074","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-319-46608-8_2","article-title":"Safety in numbers? Group privacy and big data analytics in the developing world","volume-title":"Group Privacy","year":"2017"},{"key":"key2022100513442240300_ref075","volume-title":"Group Privacy: New Challenges of Data Technologies","year":"2016"},{"key":"key2022100513442240300_ref076","volume-title":"Exploring the Boundaries of Big Data","year":"2016"},{"key":"key2022100513442240300_ref077","unstructured":"Wall, D.S. and Williams, M.L. (2007), \u201cPolicing diversity in the digital age: maintaining order in virtual communities\u201d, SSRN Scholarly Paper No. ID 1012702, Social Science Research Network, Rochester, New York, NY, available at: https:\/\/papers.ssrn.com\/abstract=1012702 (accessed 24 February 2019)."},{"issue":"2","key":"key2022100513442240300_ref078","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1111\/1540-4560.00072","article-title":"Social and political dimensions of privacy","volume":"59","year":"2003","journal-title":"Journal of Social Issues"},{"key":"key2022100513442240300_ref079","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.neunet.2014.05.009","article-title":"Community-aware user profile enrichment in folksonomy","volume":"58","year":"2014","journal-title":"Neural Networks"},{"issue":"4","key":"key2022100513442240300_ref080","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.im.2017.11.003","article-title":"Health information privacy concerns, antecedents, and information disclosure intention in online health communities","volume":"55","year":"2018","journal-title":"Information and Management"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2019-0048\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2019-0048\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:51Z","timestamp":1753406571000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/28\/2\/183-197\/104983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"references-count":80,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,11,7]]}},"alternative-id":["10.1108\/ICS-04-2019-0048"],"URL":"https:\/\/doi.org\/10.1108\/ics-04-2019-0048","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,7]]}}}