{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T05:24:17Z","timestamp":1749878657355},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Softw."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/ms.2021.3129978","type":"journal-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T20:50:22Z","timestamp":1637614222000},"page":"31-42","source":"Crossref","is-referenced-by-count":4,"title":["Engineering Mobile Apps for Disaster Management: The Case of COVID-19 Apps in the Google Play Store"],"prefix":"10.1109","volume":"39","author":[{"given":"Ivano","family":"Malavolta","sequence":"first","affiliation":[{"name":"Vrije Universiteit"}]},{"given":"Taher A.","family":"Ghaleb","sequence":"additional","affiliation":[{"name":"University of Ottawa"}]},{"given":"Istvan","family":"David","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Montr&#x00E9;al and Vrije Universiteit"}]},{"given":"Jasper van","family":"Rooijen","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Marielle","family":"Stoelinga","sequence":"additional","affiliation":[{"name":"University of Twente and Radboud University"}]}],"member":"263","reference":[{"key":"refS1","article-title":"An exploratory characterization of bugs in COVID-19 software projects","author":"rahman","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00042"},{"key":"refS3","article-title":"Vetting security and privacy of global COVID-19 contact tracing applications","author":"sun","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106257"},{"key":"refS2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09934-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974911"},{"key":"refS5","article-title":"Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs","author":"cho","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2019.00023"},{"key":"refS4","article-title":"Apps gone rogue: Maintaining personal privacy in an epidemic","author":"raskar","year":"2020"},{"key":"refS7","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3029311"},{"key":"refS6","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09943-x"},{"key":"refS9","doi-asserted-by":"publisher","DOI":"10.1126\/science.abd9006"},{"key":"refS8","doi-asserted-by":"publisher","DOI":"10.1145\/3417113.3422186"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-020-05971-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024180"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.10.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00021"},{"key":"ref7","author":"salath\u00e9","year":"2020","journal-title":"COVID-19 response What data is necessary for digital proximity tracing?"},{"key":"ref2","year":"0","journal-title":"Requirements for coronavirus disease 2019 (COVID-19) apps"},{"key":"ref9","first-page":"1","article-title":"A study of Android application security","author":"enck","year":"0","journal-title":"Proc 20th USENIX Conf Security (SEC&#x2019;11)"},{"key":"ref1","year":"2021","journal-title":"Considerations for implementing and adjusting public health and social measures in the context of COVID-19 Interim guidance"}],"container-title":["IEEE Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/52\/9758577\/09623374.pdf?arnumber=9623374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T21:57:08Z","timestamp":1653947828000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9623374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":22,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/ms.2021.3129978","relation":{},"ISSN":["0740-7459","1937-4194"],"issn-type":[{"value":"0740-7459","type":"print"},{"value":"1937-4194","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5]]}}}