{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:32:05Z","timestamp":1770597125725,"version":"3.49.0"},"reference-count":89,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T00:00:00Z","timestamp":1544486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["LHT"],"published-print":{"date-parts":[[2018,12,11]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Public safety issues are highly concerned by the state and public. As an emerging network technology and industrial mode, Internet of Things (IoT) has great application prospect because of its architecture advantages and technical features, and has drawn wide attention from all walks of life. With the development of IoT, especially the putting forward of concept of public safety IoT, IoT has been a certain degree of application in the field of public safety. Because of that, public safety regulatory technology is improved. The paper aims to discuss this issue.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>By summarizing scholars\u2019 research results, this paper analyzes the application of IoT in public safety regulation, points out the challenges in application, and then puts forward some suggestions, pointing out IoT development prospects in the area of public safety regulation.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The application of IoT in the field of public safety from the perspective of IoT architecture and the perspective of the main technologies of IoT is paid attention. And this market that IoT added to other services in the public sector would generate $4.6 trillion of net profit globally in the next decade. Therefore, government leaders and public safety organizations should start exploring the full potential that IoT could offer to public safety.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The research will develop the theory of IOT, which is valuable to strengthen the IOT technology innovation and the application extension. The application of IOT in public safety will enhance the ability to supervise the public safety and guarantee the safe social condition for people\u2019s life. So it is valuable in theory and in practice.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/lht-12-2017-0275","type":"journal-article","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T07:06:07Z","timestamp":1544425567000},"page":"133-144","source":"Crossref","is-referenced-by-count":25,"title":["Internet of Things applications in public safety management: a survey"],"prefix":"10.1108","volume":"38","author":[{"given":"Ying","family":"Ma","sequence":"first","affiliation":[]},{"given":"Chen","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Ping","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Changbin","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"7","key":"key2020040611353377600_ref001","first-page":"97","article-title":"That \u2018Internet of Things\u2019 thing","volume":"22","year":"2009","journal-title":"RFID Journal"},{"key":"key2020040611353377600_ref002","first-page":"17","article-title":"Internet-of-Things in motion: a cooperative data muling model for public safety","year":"2016"},{"issue":"2","key":"key2020040611353377600_ref003","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TII.2014.2300338","article-title":"Internet of Things for enterprise systems of modern manufacturing","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"key2020040611353377600_ref004","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jii.2018.02.004","article-title":"Real-time force monitoring of smart grippers for Internet of Things (IoT) applications","volume":"11","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"key":"key2020040611353377600_ref005","article-title":"Internet of everything: a $4.6 trillion public-sector opportunity","year":"2013"},{"key":"key2020040611353377600_ref006","article-title":"The \u2018only\u2019 Coke Machine on the internet","author":"Carnegie Mellon University","year":"1982"},{"key":"key2020040611353377600_ref007","first-page":"1","article-title":"Web services for the Internet of Things through CoAP and EXI","year":"2011"},{"issue":"3","key":"key2020040611353377600_ref008","article-title":"Applications of cyber-physical system: a literature review","volume":"2","year":"2017","journal-title":"Journal of Industrial Integration and Management"},{"issue":"6","key":"key2020040611353377600_ref009","first-page":"53","article-title":"Discussions on the technologies and applications of Internet of Things for public safety monitoring","volume":"04","year":"2010","journal-title":"Information and Communications Technologies"},{"key":"key2020040611353377600_ref010","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jii.2018.04.001","article-title":"Industrial IoT in 5G environment towards smart manufacturing","volume":"10","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"key":"key2020040611353377600_ref011","article-title":"Communicating with public safety answering points via character based messages","year":"2004"},{"key":"key2020040611353377600_ref012","doi-asserted-by":"crossref","unstructured":"Cirani, S., Picone, M. and Veltri, L. (2015), \u201cmjCoAP: an open-source lightweight Java CoAP Library for Internet of Things applications\u201d, in Podnar \u017darko, I., Pripu\u017ei\u0107, K. and Serrano, M. (Eds), Interoperability and Open-Source Solutions for the Internet of Things: Lecture Notes in Computer Science, Springer, Cham, pp. 118-133.","DOI":"10.1007\/978-3-319-16546-2_10"},{"key":"key2020040611353377600_ref013","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.jii.2017.02.003","article-title":"Industrial Internet of Things monitoring solution for advanced predictive maintenance applications","volume":"7","year":"2017","journal-title":"Journal of Industrial Information Integration"},{"issue":"1","key":"key2020040611353377600_ref014","first-page":"87","article-title":"Internet of Things based systems for food safety management","volume":"19","year":"2015","journal-title":"Informatica Economica"},{"issue":"2","key":"key2020040611353377600_ref015","first-page":"748","article-title":"Research on urban public safety emergency management early warning system based on technologies for the Internet of Things","volume":"45","year":"2012","journal-title":"Procedia Engineering"},{"issue":"2","key":"key2020040611353377600_ref016","doi-asserted-by":"publisher","first-page":"1596","DOI":"10.1109\/TII.2014.2302638","article-title":"An integrated system for regional environmental monitoring and management based on Internet of Things","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"key2020040611353377600_ref017","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s10796-013-9466-1","article-title":"An integrated information system for snowmelt flood early-warning based on Internet of Things","volume":"17","year":"2015","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"key2020040611353377600_ref018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5120\/19787-1571","article-title":"A review on Internet of Things (IoT)","volume":"113","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"key2020040611353377600_ref019","first-page":"158","article-title":"Key-value store implementations for Arduino microcontrollers","year":"2015"},{"key":"key2020040611353377600_ref020","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/S0377-2217(99)00377-X","article-title":"Mathematical modeling of China\u2019s state-owned enterprises\u2019 contract system","volume":"124","year":"2000","journal-title":"European Journal of Operational Research"},{"key":"key2020040611353377600_ref021","first-page":"296","article-title":"Application of Internet of Things to the monitoring system for food quality safety","year":"2013"},{"key":"key2020040611353377600_ref022","article-title":"Enhanced logistical information in fire combat post 911","year":"2003"},{"key":"key2020040611353377600_ref023","article-title":"An ad hoc distributed systems approach for industrial wireless sensor network management","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"issue":"7","key":"key2020040611353377600_ref024","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): a vision, architectural elements, and future directions","volume":"29","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"key2020040611353377600_ref025","volume-title":"Government Emergency Management Practices","year":"2004"},{"key":"key2020040611353377600_ref026","article-title":"On the legal regulation of Internet of Things","volume":"16","year":"2017","journal-title":"Law Review"},{"key":"key2020040611353377600_ref027","first-page":"483","article-title":"Descriptive models for Internet of Things","year":"2010"},{"issue":"2","key":"key2020040611353377600_ref028","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/JIOT.2013.2296516","article-title":"An information framework for creating a smart city through Internet of Things","volume":"1","year":"2014","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611353377600_ref029","first-page":"709","article-title":"RFID as an enabler of the Internet of Things: issues of security and privacy","year":"2011"},{"issue":"3","key":"key2020040611353377600_ref030","article-title":"A review of cyber-physical system research relevant to the emerging IT trends: industry 4.0, IoT, big data, and cloud computing","volume":"2","year":"2017","journal-title":"Journal of Industrial Integration and Management"},{"issue":"5","key":"key2020040611353377600_ref031","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.ijinfomgt.2010.02.008","article-title":"Understanding users\u2019 behaviors regarding supply chain technology: determinants impacting the adoption and implementation of RFID technology in South Korea","volume":"30","year":"2010","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2020040611353377600_ref032","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/23270012.2016.1259967","article-title":"Shifting paradigm to service-dominant logic via Internet-of-Things with applications in the elevators industry","volume":"4","year":"2017","journal-title":"Journal of Management Analytics"},{"key":"key2020040611353377600_ref033","first-page":"55","article-title":"Internet of Things leads the innovation of public safety management: status quo, advantages and prospects","volume":"1","year":"2015","journal-title":"Qingdao Municipal Party School: Qingdao Institute of Public Administration"},{"issue":"1","key":"key2020040611353377600_ref034","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.ijpe.2013.05.022","article-title":"The path to made-in-China: how it was done and future prospects","volume":"146","year":"2013","journal-title":"International Journal of Production Economics"},{"issue":"C","key":"key2020040611353377600_ref035","first-page":"66","article-title":"China\u2019s manufacturing locus in 2025: with a comparison of \u2018made-in-China 2025\u2019 and \u2018Industry 4.0\u2019","volume":"135","year":"2018","journal-title":"Technological Forecasting and Social Change"},{"issue":"1","key":"key2020040611353377600_ref036","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ijpe.2013.09.006","article-title":"Manufacturing practices in China","volume":"146","year":"2013","journal-title":"International Journal of Production Economics"},{"key":"key2020040611353377600_ref037","volume-title":"Securing the Internet of Things","year":"2017"},{"issue":"2","key":"key2020040611353377600_ref038","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The Internet of Things: a survey","volume":"17","year":"2015","journal-title":"Information Systems Frontiers"},{"key":"key2020040611353377600_ref039","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jii.2018.01.005","article-title":"5G Internet of Things: a survey","volume":"10","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"key":"key2020040611353377600_ref040","volume-title":"Introduction to Internet of Things: IoT Framework and Industry Blueprint","year":"2011"},{"issue":"6","key":"key2020040611353377600_ref041","first-page":"20","article-title":"Research on security issues related to Internet of Things","volume":"29","year":"2014","journal-title":"Law Forum"},{"key":"key2020040611353377600_ref042","doi-asserted-by":"crossref","first-page":"583","DOI":"10.4028\/www.scientific.net\/AMR.684.583","article-title":"Development of an Internet of civil infrastructure framework","volume":"684","year":"2013","journal-title":"Advanced Materials Research"},{"issue":"1","key":"key2020040611353377600_ref043","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/23270012.2016.1214540","article-title":"Traversing knowledge networks: an algorithmic historiography of extant literature on the Internet of Things (IoT)","volume":"4","year":"2017","journal-title":"Journal of Management Analytics"},{"key":"key2020040611353377600_ref044","first-page":"6","article-title":"Europcom \u2013 an ultra-wideband (UWB)-based ad hoc network for emergency applications","year":"2008"},{"key":"key2020040611353377600_ref045","article-title":"Dynamic context networks of wireless sensors and RFID tags","year":"2007"},{"issue":"4","key":"key2020040611353377600_ref046","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2018.1516523","article-title":"Blockchain and the related issues: a review of current research topics","volume":"5","year":"2018","journal-title":"Journal of Management Analytics"},{"key":"key2020040611353377600_ref047","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847","article-title":"Internet of Things (IoT) cybersecurity research: a review of current research topics","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"key2020040611353377600_ref048","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1080\/17517570601092184","article-title":"Flood decision support system on agent grid: method and implementation","volume":"1","year":"2007","journal-title":"Enterprise Information Systems"},{"key":"key2020040611353377600_ref049","article-title":"The Internet of Things: mapping the value beyond the Hype","year":"2015"},{"key":"key2020040611353377600_ref050","unstructured":"Meyers, M., Niechc, C. and Eggers, W.D. (2015), \u201cAnticipate, sense, and respond connected government and the Internet of Things, a GovLab report in the Deloitte future of government series\u201d, Deloitte University Press."},{"issue":"1","key":"key2020040611353377600_ref051","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCOM.2006.1580929","article-title":"Public safety","volume":"44","year":"2006","journal-title":"IEEE Communications Magazine"},{"key":"key2020040611353377600_ref052","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.jii.2018.02.001","article-title":"Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base","volume":"10","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"key":"key2020040611353377600_ref053","first-page":"1","article-title":"Internet of Things in support of public safety networks: opportunities and challenges","volume":"2","year":"2016","journal-title":"Wireless Public Safety Networks"},{"key":"key2020040611353377600_ref054","first-page":"111","article-title":"Internet of Things on the challenges of public safety management and countermeasures","volume":"2","year":"2017","journal-title":"Youth"},{"key":"key2020040611353377600_ref055","first-page":"1","article-title":"BlinkToSCoAP: an end-to-end security framework for the Internet of Things","year":"2015"},{"key":"key2020040611353377600_ref056","article-title":"ETC: Bill Joy\u2019s six webs","year":"2005","journal-title":"MIT Technology Review"},{"issue":"1","key":"key2020040611353377600_ref057","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIC.2008.25","article-title":"Wireless mesh networks for public safety and crisis management applications","volume":"12","year":"2008","journal-title":"IEEE Internet Computing"},{"key":"key2020040611353377600_ref058","first-page":"374","article-title":"Cloud computing for Internet of Things and sensing based applications","year":"2012"},{"key":"key2020040611353377600_ref059","first-page":"248","article-title":"Using augmented reality and Internet of Things to improve accessibility of people with motor disabilities in the context of smart cities","volume":"76","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"key2020040611353377600_ref060","first-page":"932","article-title":"An internet based RFID library management system","year":"2013"},{"issue":"8","key":"key2020040611353377600_ref061","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1108\/01409170710773706","article-title":"Is RFID right for your organization or application?","volume":"30","year":"2007","journal-title":"Management Research News"},{"issue":"1","key":"key2020040611353377600_ref062","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2005.12.003","article-title":"Radio frequency identification (RFID)","volume":"25","year":"2006","journal-title":"Computers & Security"},{"issue":"10","key":"key2020040611353377600_ref063","first-page":"1483","article-title":"A new method suitable for wireless sensor network location","volume":"28","year":"2006","journal-title":"Systems Engineering and Electronics"},{"key":"key2020040611353377600_ref064","first-page":"1","article-title":"The visions, technologies, applications and security issues of Internet of Things","year":"2011"},{"key":"key2020040611353377600_ref065","first-page":"8","article-title":"Drop the phone and talk to the physical world: programming the Internet of Things with Erlang","year":"2012"},{"key":"key2020040611353377600_ref066","first-page":"1184","article-title":"The research on the development of smart library","volume":"571","year":"2014","journal-title":"Applied Mechanics and Materials"},{"key":"key2020040611353377600_ref067","article-title":"China\u2019s Internet of Things industry development status and industry chain analysis","year":"2010"},{"issue":"1","key":"key2020040611353377600_ref068","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/TII.2013.2250510","article-title":"Data cleaning for RFID and WSN Integration","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"key2020040611353377600_ref069","first-page":"334","article-title":"Introduction: advances in IoT research and applications","volume":"26","year":"2016","journal-title":"Internet Research"},{"issue":"6","key":"key2020040611353377600_ref070","first-page":"65","article-title":"The application of remote sensing technology in monitoring the water quality of Taihu Lake","volume":"21","year":"2000","journal-title":"Chinese Journal of Environmental Science"},{"issue":"1","key":"key2020040611353377600_ref071","first-page":"37","article-title":"Research on Internet of Things","volume":"37","year":"2010","journal-title":"Journal of Liaoning University (Natural Science Edition)"},{"issue":"2","key":"key2020040611353377600_ref072","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2006.315852","article-title":"A survey of security issues in wireless sensor networks","volume":"8","year":"2006","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"3","key":"key2020040611353377600_ref073","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/329124.329126","article-title":"The computer for the 21st century","volume":"3","year":"1999","journal-title":"Mobile Computing and Communications Review"},{"issue":"2","key":"key2020040611353377600_ref074","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","article-title":"The Internet of Things: a survey of topics and trends","volume":"17","year":"2015","journal-title":"Information Systems Frontiers"},{"issue":"5","key":"key2020040611353377600_ref075","first-page":"526","article-title":"Review of the application and challenges of Internet of Things","volume":"22","year":"2010","journal-title":"Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition)"},{"issue":"2","key":"key2020040611353377600_ref076","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/TII.2014.2306382","article-title":"Ubiquitous data accessing method in IoT-based information system for emergency medical services","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"key2020040611353377600_ref077","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TII.2011.2167156","article-title":"Enterprise systems: state-of-the-art and future trends","volume":"7","year":"2011","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"key2020040611353377600_ref078","article-title":"Big data for cyber physical systems in industry 4.0: a survey","year":"2018","journal-title":"Enterprise Information Systems"},{"issue":"4","key":"key2020040611353377600_ref079","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: a survey","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"8","key":"key2020040611353377600_ref080","doi-asserted-by":"crossref","first-page":"2941","DOI":"10.1080\/00207543.2018.1444806","article-title":"Industry 4.0: state of the art and future trends","volume":"56","year":"2018","journal-title":"International Journal of Production Research"},{"issue":"2","key":"key2020040611353377600_ref081","first-page":"1","article-title":"Internet of Things development","volume":"12","year":"2010","journal-title":"Journal of Nanjing University of Posts and Telecommunications: Social Sciences Edition"},{"key":"key2020040611353377600_ref082","doi-asserted-by":"crossref","first-page":"1690","DOI":"10.4028\/www.scientific.net\/AMM.496-500.1690","article-title":"Design of library lighting energy saving system based on Internet of Things","volume":"496-500","year":"2014","journal-title":"Applied Mechanics and Materials"},{"key":"key2020040611353377600_ref083","first-page":"1715","article-title":"A security framework for Internet of Things based on 4\u2009G communication","year":"2012"},{"issue":"8","key":"key2020040611353377600_ref084","first-page":"48","article-title":"Application of RFID technology in coal mine safety production","volume":"37","year":"2006","journal-title":"Coal Mine Safety"},{"key":"key2020040611353377600_ref085","first-page":"520","article-title":"Forest fire detection system based on wireless sensor network","year":"2009"},{"key":"key2020040611353377600_ref086","first-page":"63","article-title":"Design and implementation of emergency management system based on WSID network","volume":"8","year":"2009","journal-title":"Communications Technology"},{"issue":"11","key":"key2020040611353377600_ref087","first-page":"2","article-title":"Investigation of technical thought and application strategy for the Internet of Things","volume":"31","year":"2010","journal-title":"Journal on Communications"},{"issue":"11","key":"key2020040611353377600_ref088","first-page":"164","article-title":"Study and prospect on the application of Internet of Things in perceiving safety","volume":"20","year":"2010","journal-title":"China Safety Science Journal"},{"issue":"11","key":"key2020040611353377600_ref089","first-page":"164","article-title":"Study and prospect on the application of Internet of Things in perceiving safety","volume":"20","year":"2010","journal-title":"China Safety Science Journal"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-12-2017-0275\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-12-2017-0275\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:15:35Z","timestamp":1753395335000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/38\/1\/133-144\/259493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,11]]},"references-count":89,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12,11]]}},"alternative-id":["10.1108\/LHT-12-2017-0275"],"URL":"https:\/\/doi.org\/10.1108\/lht-12-2017-0275","relation":{},"ISSN":["0737-8831"],"issn-type":[{"value":"0737-8831","type":"print"}],"subject":[],"published":{"date-parts":[[2018,12,11]]}}}