{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T20:09:24Z","timestamp":1778875764867,"version":"3.51.4"},"reference-count":64,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2013,9,23]],"date-time":"2013-09-23T00:00:00Z","timestamp":1379894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 As social networking is becoming more popular, social software has achieved an important position in the internet business industry. For social software to be successful, it is crucial to understand how users form their continuous usage intentions toward social software. This paper aims to discuss these issues.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 Drawing upon socio-technical and social cognitive perspectives, this study proposes a theory-based model that investigates the interaction effects between social (i.e. perceived user base and relationship commitment) and technical (i.e. perceived system quality) factors of social software, in addition to their direct effects on continuous usage intentions. To empirically validate the proposed research model, a structural equation modelling technique was used.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 The results of our model test indicate that all relevant social and technical factors are significant determinants of continuous usage intention. Moreover relationship commitment exhibits a positive interaction effect with perceived system quality on continuous usage intention, while perceived user base does not.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>\u2013 Service designers or providers of social software should make an effort to nurture social relationships among users, expand users' social networks, and reinforce users' relationship commitment to their friends.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 Given the lack of investigations into socio-technical interactions in prior social software studies, the theoretical perspectives and empirical findings of this study are useful to both academics and practitioners. The findings also raise new implications regarding the various types of interactions (e.g. enhancing or suppressing) between the social and technical factors around social software.<\/jats:p><\/jats:sec>","DOI":"10.1108\/oir-08-2011-0144","type":"journal-article","created":{"date-parts":[[2013,9,24]],"date-time":"2013-09-24T18:12:14Z","timestamp":1380046334000},"page":"692-710","source":"Crossref","is-referenced-by-count":36,"title":["A study of the continuous usage intention of social software in the context of instant messaging"],"prefix":"10.1108","volume":"37","author":[{"given":"Jinwon","family":"Hong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"One-Ki","family":"(Daniel) Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Woojong","family":"Suh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022020520341167300_b1","unstructured":"Alexa (2012), \u201cSite information\u201d, available at: www.alexa.com\/siteinfo (accessed 3 June 2012). \u201cSite information\u201d, available at: www.alexa.com\/siteinfo (accessed 3 June 2012)."},{"key":"key2022020520341167300_b2","unstructured":"Baer, J. (2010), \u201c6 lessons learned from the demise of MySpace\u201d, available at: www.convinceandconvert.com\/facebook\/6-lessons-learned-from-the-demise-of-myspace\/ (accessed 3 June 2012)."},{"key":"key2022020520341167300_b3","unstructured":"Bandura, A. (1986), Social Foundations of Thought and Action: A Social Cognitive Theory, Prentice Hall, Englewood Cliffs, NJ."},{"key":"key2022020520341167300_b4","doi-asserted-by":"crossref","unstructured":"Bostrom, R.P. and Heinen, J.S. (1977), \u201cMIS problems and failures: a socio-technical perspective part I: the causes\u201d, MIS Quarterly, Vol. 1 No. 3, pp. 17-32.","DOI":"10.2307\/248710"},{"key":"key2022020520341167300_b5","unstructured":"Branch, L. (2009), \u201cInstant messaging market, 2008-2012\u201d, available at: www.radicati.com\/wp\/wp-content\/uploads\/2009\/01\/im-market-exec-summary.pdf (accessed 1 September 2009)."},{"key":"key2022020520341167300_b6","doi-asserted-by":"crossref","unstructured":"Campbell, K.E. and Lee, B.A. (1992), \u201cSources of personal neighbor networks: social integration, need, or time?\u201d, Social Forces, Vol. 70 No. 4, pp. 1077-1100.","DOI":"10.2307\/2580202"},{"key":"key2022020520341167300_b7","doi-asserted-by":"crossref","unstructured":"Casalo, L. , Flavian, C. and Guinaliu, M. (2007), \u201cThe impact of participation in virtual brand communities on consumer trust and loyalty: the case of free software\u201d, Online Information Review, Vol. 31 No. 6, pp. 775-792.","DOI":"10.1108\/14684520710841766"},{"key":"key2022020520341167300_b8","doi-asserted-by":"crossref","unstructured":"Cervone, D. (2004), \u201cThe architecture of personality\u201d, Psychological Review, Vol. 111 No. 1, pp. 183-204.","DOI":"10.1037\/0033-295X.111.1.183"},{"key":"key2022020520341167300_b9","doi-asserted-by":"crossref","unstructured":"Cheng, H.K. and Tang, Q.C. (2010), \u201cFree trial no free trial: optimal software product design with network effects\u201d, European Journal of Operational Research, Vol. 205 No. 2, pp. 437-447.","DOI":"10.1016\/j.ejor.2010.01.014"},{"key":"key2022020520341167300_b10","unstructured":"Chin, W.W. (1998), \u201cThe partial least squares approach to structural equation modeling\u201d, in Marcoulides, G.A. (Ed.), Modern Methods for Business Research, Lawrence Erlbaum, London, pp. 295-336."},{"key":"key2022020520341167300_b11","doi-asserted-by":"crossref","unstructured":"Chin, W.W. , Marcolin, B.L. and Newsted, P.R. (2003), \u201cA partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study\u201d, Information Systems Research, Vol. 14 No. 2, pp. 189-217.","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"key2022020520341167300_b12","doi-asserted-by":"crossref","unstructured":"Choi, S.Y. , Kang, Y.S. and Lee, H. (2008), \u201cThe effects of socio-technical enablers on knowledge sharing: an exploratory examination\u201d, Journal of Information Science, Vol. 34 No. 5, pp. 742-754.","DOI":"10.1177\/0165551507087710"},{"key":"key2022020520341167300_b13","doi-asserted-by":"crossref","unstructured":"Conner, K.R. (1995), \u201cObtaining strategic advantage from being imitated: when can encouraging \u201cclones\u201d pay?\u201d, Management Science, Vol. 41 No. 2, pp. 209-225.","DOI":"10.1287\/mnsc.41.2.209"},{"key":"key2022020520341167300_b14","unstructured":"Cutler, K.-M. (2012), \u201cThe reality of the global messaging app market: it's really freaking fragmented\u201d, available at: http:\/\/techcrunch.com\/2012\/12\/04\/global-messaging-market\/ (accessed 7 February 2013)."},{"key":"key2022020520341167300_b15","unstructured":"Dron, J. (2007), \u201cDesigning the undesignable: social software and control\u201d, Educational Technology & Society, Vol. 10 No. 3, pp. 60-71."},{"key":"key2022020520341167300_b16","unstructured":"Farkas, M.G. (2007), Social Software in Libraries: Building Collaboration, Communication, and Community Online, Information Today, Medford, NJ."},{"key":"key2022020520341167300_b17","doi-asserted-by":"crossref","unstructured":"Fornell, C. and Larcker, D.F. (1981), \u201cEvaluating structural equation models with unobservable variables and measurement error\u201d, Journal of Marketing Research, Vol. 18 No. 1, pp. 39-50.","DOI":"10.1177\/002224378101800104"},{"key":"key2022020520341167300_b18","doi-asserted-by":"crossref","unstructured":"Gupta, S. and Kim, H.-W. (2007), \u201cDeveloping the commitment to virtual community: the balanced effects of cognition and affect\u201d, Information Resources Management Journal, Vol. 20 No. 1, pp. 28-45.","DOI":"10.4018\/irmj.2007010103"},{"key":"key2022020520341167300_b19","doi-asserted-by":"crossref","unstructured":"Henseler, J. , Ringle, C.M. and Sinkovics, R.R. (2009), \u201cThe use of partial least square path modeling in international marketing\u201d, Advances in International Marketing, Vol. 20, pp. 277-319.","DOI":"10.1108\/S1474-7979(2009)0000020014"},{"key":"key2022020520341167300_b20","doi-asserted-by":"crossref","unstructured":"Hiltz, S.R. and Johnson, K. (1990), \u201cUser satisfaction with computer-mediated communication systems\u201d, Management Science, Vol. 36 No. 6, pp. 739-764.","DOI":"10.1287\/mnsc.36.6.739"},{"key":"key2022020520341167300_b21","unstructured":"Hong, S. , Kim, J. and Lee, H. (2008), \u201cAntecedents of use-continuance in information systems: toward an integrative view\u201d, Journal of Computer Information Systems, Vol. 48 No. 3, pp. 61-73."},{"key":"key2022020520341167300_b22","doi-asserted-by":"crossref","unstructured":"Howard, J.A. (1994), \u201cA social cognitive conception of social structure\u201d, Social Psychology Quarterly, Vol. 57 No. 3, pp. 210-227.","DOI":"10.2307\/2786877"},{"key":"key2022020520341167300_b23","doi-asserted-by":"crossref","unstructured":"Huang, A.H. and Yen, D.C. (2003), \u201cUsefulness of instant messaging among young users: social vs. work perspective\u201d, Human Systems Management, Vol. 22 No. 2, pp. 63-72.","DOI":"10.3233\/HSM-2003-22202"},{"key":"key2022020520341167300_b24","doi-asserted-by":"crossref","unstructured":"Jin, X.-L. , Lee, M.K.O. and Cheung, C.M.K. (2010), \u201cPredicting continuance in online communities: model development and empirical test\u201d, Behavior & Information Technology, Vol. 29 No. 4, pp. 383-394.","DOI":"10.1080\/01449290903398190"},{"key":"key2022020520341167300_b25","doi-asserted-by":"crossref","unstructured":"Kang, S. (1998), \u201cInformation technology acceptance: evolving with the changes in the network environment\u201d, in Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences \u2013 Volume 1, IEEE, Los Alamitos, CA, pp. 413-424.","DOI":"10.1109\/HICSS.1998.653126"},{"key":"key2022020520341167300_b26","doi-asserted-by":"crossref","unstructured":"Kim, G.S. , Park, S.-B. and Oh, J. (2008), \u201cAn examination of factors influencing consumer adoption of Short Message Service (SMS)\u201d, Psychology & Marketing, Vol. 25 No. 8, pp. 769-786.","DOI":"10.1002\/mar.20238"},{"key":"key2022020520341167300_b27","unstructured":"Klamma, R. , Chatti, M.A. , Duval, E. , Hummel, H. , Hvannberg, E.T. , Kravcik, M. , Law, E. , Naeve, A. and Scott, P. (2007), \u201cSocial software for life-long learning\u201d, Journal of Educational Technology & Society, Vol. 10 No. 3, pp. 72-83."},{"key":"key2022020520341167300_b28","unstructured":"Korea Communications Commission and National Internet Development Agency of Korea (2008), Survey on the Internet Usage, Seoul."},{"key":"key2022020520341167300_b29","doi-asserted-by":"crossref","unstructured":"Kuan, H.-H. , Bock, G.-W. and Vathanophas, V. (2008), \u201cComparing the effects of website quality on customer initial purchase and continued purchase at e-commerce websites\u201d, Behaviour & Information Technology, Vol. 27 No. 1, pp. 3-16.","DOI":"10.1080\/01449290600801959"},{"key":"key2022020520341167300_b30","unstructured":"LaRose, R. (2009), \u201cSocial cognitive theories of media selection\u201d, in Hartmann, T. (Ed.), Media Choice: A Theoretical and Empirical Overview, Routledge, New York, NY, pp. 10-31."},{"key":"key2022020520341167300_b31","unstructured":"Leavitt, H.J. (1976), \u201cApplied organization change in industry: structural, technical, and human approaches\u201d, in Brophy, P. (Ed.), Reader in Operations Research for Libraries, Information Handling Services, Information Handling Services, Englewood, CO, pp. 50-60."},{"key":"key2022020520341167300_b32","unstructured":"Lee, B.-H. (2009), \u201cA Gifticon success story: sending a surprise present through a cell phone message\u201d, Dong-A Business Review, Vol. 40, pp. 90-93."},{"key":"key2022020520341167300_b33","doi-asserted-by":"crossref","unstructured":"Lee, C.S. and Ma, L. (2012), \u201cNews sharing in social media: the effect of gratifications and prior experience\u201d, Computers in Human Behavior, Vol. 28 No. 2, pp. 331-339.","DOI":"10.1016\/j.chb.2011.10.002"},{"key":"key2022020520341167300_b34","doi-asserted-by":"crossref","unstructured":"Lee, D. , Kim, H.S. and Kim, J.K. (2012), \u201cThe role of self-construal in consumers' electronic word of mouth (eWOM) in social networking sites: a social cognitive approach\u201d, Computers in Human Behavior, Vol. 28 No. 3, pp. 1054-1062.","DOI":"10.1016\/j.chb.2012.01.009"},{"key":"key2022020520341167300_b35","doi-asserted-by":"crossref","unstructured":"Lee, M.K.O. , Cheung, C.M.K. , Lim, K.H. and Sia, C.L. (2006), \u201cUnderstanding customer knowledge sharing in web-based discussion boards: an exploratory study\u201d, Internet Research, Vol. 16 No. 3, pp. 289-303.","DOI":"10.1108\/10662240610673709"},{"key":"key2022020520341167300_b36","doi-asserted-by":"crossref","unstructured":"LeRouge, C. , Hevner, A.R. and Collins, R.W. (2007), \u201cIt's more than just use: an exploration of telemedicine use quality\u201d, Decision Support Systems, Vol. 43 No. 4, pp. 1287-1304.","DOI":"10.1016\/j.dss.2006.02.007"},{"key":"key2022020520341167300_b37","doi-asserted-by":"crossref","unstructured":"Li, H. , Chau, P.Y.K. and Lou, H. (2005), \u201cUnderstanding individual adoption of instant messaging: an empirical investment\u201d, Journal of the Association for Information Systems, Vol. 6 No. 4, pp. 102-129.","DOI":"10.17705\/1jais.00066"},{"key":"key2022020520341167300_b38","doi-asserted-by":"crossref","unstructured":"Liao, C.-H. and Tsou, C.-W. (2009), \u201cUser acceptance of computer-mediated communication: the SkypeOut case \u201c\u201d, Expert Systems with Applications, Vol. 36 No. 3, pp. 4595-4603.","DOI":"10.1016\/j.eswa.2008.05.015"},{"key":"key2022020520341167300_b39","doi-asserted-by":"crossref","unstructured":"Lin, H.-F. (2007), \u201cMeasuring online learning systems success: applying the updated DeLone and McLean model\u201d, Cyber Psychology & Behavior, Vol. 10 No. 6, pp. 817-820.","DOI":"10.1089\/cpb.2007.9948"},{"key":"key2022020520341167300_b40","doi-asserted-by":"crossref","unstructured":"Lin, H.-F. and Lee, G.-G. (2006a), \u201cDeterminants of success for online communities: an empirical study\u201d, Behaviour & Information Technology, Vol. 25 No. 6, pp. 479-488.","DOI":"10.1080\/01449290500330422"},{"key":"key2022020520341167300_b41","doi-asserted-by":"crossref","unstructured":"Lin, H.-F. and Lee, G.-G. (2006b), \u201cEffects of socio-technical factors on organizational intention to encourage knowledge sharing\u201d, Management Decision, Vol. 44 No. 1, pp. 74-88.","DOI":"10.1108\/00251740610641472"},{"key":"key2022020520341167300_b42","doi-asserted-by":"crossref","unstructured":"Liu, C. and Arnett, K.P. (2000), \u201cExploring the factors associated with web site success in the context of electronic commerce\u201d, Information & Management, Vol. 38 No. 1, pp. 23-33.","DOI":"10.1016\/S0378-7206(00)00049-5"},{"key":"key2022020520341167300_b43","doi-asserted-by":"crossref","unstructured":"Lu, H.-P. and Lee, M.-R. (2010), \u201cDemographic differences and the antecedents of blog stickiness\u201d, Online Information Review, Vol. 34 No. 1, pp. 21-38.","DOI":"10.1108\/14684521011024100"},{"key":"key2022020520341167300_b44","doi-asserted-by":"crossref","unstructured":"Moraga, A. , Calero, C. and Piattini, M. (2006), \u201cComparing different quality models for portals\u201d, Online Information Review, Vol. 30 No. 5, pp. 555-568.","DOI":"10.1108\/14684520610706424"},{"key":"key2022020520341167300_b45","doi-asserted-by":"crossref","unstructured":"Mukherji, N. , Rajagopalan, B. and Tanniru, M. (2006), \u201cA decision support model for optimal timing of investments in information technology upgrades\u201d, Decision Support Systems, Vol. 42 No. 3, pp. 1684-1696.","DOI":"10.1016\/j.dss.2006.02.013"},{"key":"key2022020520341167300_b46","doi-asserted-by":"crossref","unstructured":"Mumford, E. (2006), \u201cThe story of socio-technical design: reflections on its successes, failures and potential\u201d, Information Systems Journal, Vol. 16 No. 4, pp. 317-342.","DOI":"10.1111\/j.1365-2575.2006.00221.x"},{"key":"key2022020520341167300_b47","unstructured":"Nunnally, J.C. and Bernstein, I.H. (1994), Psychometric Theory, McGraw-Hill, New York, NY."},{"key":"key2022020520341167300_b48","doi-asserted-by":"crossref","unstructured":"Parameswaran, M. and Whinston, A.B. (2007), \u201cSocial computing: an overview\u201d, Communications of the Association for Information Systems, Vol. 19 No. 37, pp. 762-780.","DOI":"10.17705\/1CAIS.01937"},{"key":"key2022020520341167300_b49","doi-asserted-by":"crossref","unstructured":"Prasad, A. , Venkatesh, R. and Mahajan, V. (2010), \u201cOptimal bundling of technological products with network externality\u201d, Management Science, Vol. 56 No. 12, pp. 2224-2236.","DOI":"10.1287\/mnsc.1100.1259"},{"key":"key2022020520341167300_b50","unstructured":"Radicati, S. (2013), \u201cInstant messaging market, 2012-2016\u201d, available at: www.radicati.com\/wp\/wp-content\/uploads\/2012\/08\/Instant-Messaging-Market-2012-2016-Executive-Summary.pdf (accessed 6 February 2013)."},{"key":"key2022020520341167300_b51","unstructured":"Rankey.com (2010), \u201cMost visited websites in South Korea\u201d, available at: www.rankey.com\/rank\/rank_site_cate.php?cat3_id=1550 (accessed 16 March 2010)."},{"key":"key2022020520341167300_b52","unstructured":"Ringle, C.M. , Wende, S. and Will, A. (2005), SmartPLS 2.0 (M3) Beta, Hamburg University of Technology Institute for Human Resource Management and Organizations, Hamburg."},{"key":"key2022020520341167300_b53","unstructured":"Rogers, E.M. (2003), Diffusion of Innovations, Free Press, New York, NY."},{"key":"key2022020520341167300_b54","doi-asserted-by":"crossref","unstructured":"Rusbult, C.E. , Martz, J.M. and Agnew, C.R. (1998), \u201cThe investment model scale: measuring commitment level, satisfaction level, quality of alternatives, and investment size\u201d, Personal Relationships, Vol. 5 No. 4, pp. 357-387.","DOI":"10.1111\/j.1475-6811.1998.tb00177.x"},{"key":"key2022020520341167300_b55","unstructured":"SK Marketing & Company (2009), \u201cGifticon\u201d, available at: www.skmnc.co.kr\/ (accessed 14 June 2011)."},{"key":"key2022020520341167300_b56","doi-asserted-by":"crossref","unstructured":"Sledgianowski, D. and Kulviwat, S. (2009), \u201cUsing social network sites: the effects of playfulness, critical mass and trust in a hedonic context\u201d, Journal of Computer Information Systems, Vol. 49 No. 4, pp. 74-83.","DOI":"10.1080\/08874417.2009.11645342"},{"key":"key2022020520341167300_b57","unstructured":"Tancer, B. (2007), \u201cMySpace v. Facebook: competing addictions\u201d, Time Magazine, 24 October."},{"key":"key2022020520341167300_b58","doi-asserted-by":"crossref","unstructured":"Vaughn, K.I. (1980), \u201cDoes it matter that costs are subjective?\u201d, Southern Economic Journal, Vol. 46 No. 3, pp. 702-715.","DOI":"10.2307\/1057140"},{"key":"key2022020520341167300_b59","doi-asserted-by":"crossref","unstructured":"Wade, M. and Hulland, J. (2004), \u201cThe resource-based view and information systems research: review, extension, and suggestions for future research\u201d, MIS Quarterly, Vol. 28 No. 1, pp. 107-142.","DOI":"10.2307\/25148626"},{"key":"key2022020520341167300_b60","unstructured":"Wang, C.-C. , Hsu, Y. and Fang, W. (2005), \u201cAcceptance of technology with network externalities: an empirical study of internet instant messaging services\u201d, Journal of Information Technology Theory and Application, Vol. 6 No. 4, pp. 15-28."},{"key":"key2022020520341167300_b61","doi-asserted-by":"crossref","unstructured":"Wang, S.-M. and Lin, J.C.-C. (2011), \u201cThe effect of social influence on bloggers' usage intention\u201d, Online Information Review, Vol. 35 No. 1, pp. 50-65.","DOI":"10.1108\/14684521111113588"},{"key":"key2022020520341167300_b62","doi-asserted-by":"crossref","unstructured":"Whitworth, B. and Moor, A.D. (2003), \u201cLegitimate by design: towards trusted socio-technical systems\u201d, Behavior & Information Technology, Vol. 22 No. 1, pp. 31-51.","DOI":"10.1080\/01449290301783"},{"key":"key2022020520341167300_b63","unstructured":"Wunker, S. (2011), \u201cFour morals from MySpace's fall\u201d, Forbes, 25 July."},{"key":"key2022020520341167300_b64","unstructured":"Yen, Y.-R. (2009), \u201cAn empirical analysis of relationship commitment and trust in virtual programmer community\u201d, International Journal of Computers, Vol. 1 No. 3, pp. 171-180."}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/OIR-08-2011-0144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-08-2011-0144\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-08-2011-0144\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:43:30Z","timestamp":1753397010000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/37\/5\/692-710\/313873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,23]]},"references-count":64,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,9,23]]}},"alternative-id":["10.1108\/OIR-08-2011-0144"],"URL":"https:\/\/doi.org\/10.1108\/oir-08-2011-0144","relation":{},"ISSN":["1468-4527"],"issn-type":[{"value":"1468-4527","type":"print"}],"subject":[],"published":{"date-parts":[[2013,9,23]]}}}