{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:39:46Z","timestamp":1773931186066,"version":"3.50.1"},"reference-count":49,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Secure data distribution is critical for data accountability. Surveillance caused privacy breaching incidents have already questioned existing personal data collection techniques. Organizations assemble a huge amount of personally identifiable information (PII) for data-driven market analysis and prediction. However, the limitation of data tracking tools restricts the detection of exact data breaching points. Blockchain technology, an \u2018immutable\u2019 distributed ledger, can be leveraged to establish a transparent data auditing platform. However, Art. 42 and Art. 25 of general data protection regulation (GDPR) demands \u2018right to forget\u2019 and \u2018right to erase\u2019 of personal information, which goes against the immutability of blockchain technology. This paper proposes a GDPR complied decentralized and trusted PII sharing and tracking scheme. Proposed blockchain based personally identifiable information management system (BcPIIMS) demonstrates data movement among GDPR entities (user, controller and processor). Considering GDPR limitations, BcPIIMS used off-the-chain data storing architecture. A prototype was created to validate the proposed architecture using multichain. The use of off-the-chain storage reduces individual block size. Additionally, private blockchain also limits personal data leaking by collecting fast approval from restricted peers. This study presents personal data sharing, deleting, modifying and tracking features to verify the privacy of proposed blockchain based personally identifiable information management system.<\/jats:p>","DOI":"10.1515\/comp-2019-0005","type":"journal-article","created":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T14:32:47Z","timestamp":1555425167000},"page":"80-91","source":"Crossref","is-referenced-by-count":52,"title":["Privacy-aware blockchain for personal data sharing and tracking"],"prefix":"10.1515","volume":"9","author":[{"given":"Md Mehedi Hassan","family":"Onik","sequence":"first","affiliation":[{"name":"Department of Computer Engineering , Inje University , Gimhae 50834 , Korea ;"}]},{"given":"Chul-Soo","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering , Inje University , Gimhae 50834 , Korea ;"}]},{"given":"Nam-Yong","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics , Inje University , Gimhae 50834 , Korea ;"}]},{"given":"Jinhong","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Healthcare and IT , Inje University , Gimhae 50834 , Korea ;"}]}],"member":"374","published-online":{"date-parts":[[2019,4,15]]},"reference":[{"key":"2022042707443485883_j_comp-2019-0005_ref_001_w2aab3b7b4b1b6b1ab1ab1Aa","unstructured":"[1] Number of social media users worldwide 2010-2021, Statista, https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/ [Accessed: 06-Mar-2019]"},{"key":"2022042707443485883_j_comp-2019-0005_ref_002_w2aab3b7b4b1b6b1ab1ab2Aa","unstructured":"[2] Cadwalladr C., Graham-Harrison E., Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, The Guardian, 17 Mar 2018"},{"key":"2022042707443485883_j_comp-2019-0005_ref_003_w2aab3b7b4b1b6b1ab1ab3Aa","unstructured":"[3] Zou Y., Mhaidli A. H., McCall A., Schaub F., \u201cI\u2019ve got nothing to lose\u201d: Consumers\u2019 risk perceptions and protective actions after the equifax data breach, In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 2018, 197\u2013216"},{"key":"2022042707443485883_j_comp-2019-0005_ref_004_w2aab3b7b4b1b6b1ab1ab4Aa","unstructured":"[4] First Half 2017 Breach Level Index Report: Identity Theft and Poor Internal Security Practices Take a Toll, https:\/\/www.gemalto.com\/press\/pages\/first-half-2017-breach-level-index-report-identity-theft-and-poor-internal-security-practices-take-a-toll.aspx [Accessed: 06-Mar-2019]"},{"key":"2022042707443485883_j_comp-2019-0005_ref_005_w2aab3b7b4b1b6b1ab1ab5Aa","unstructured":"[5] Kumar V., Reinartz W., Customer privacy concerns and privacy protective responses, In: Customer Relationship Management: Concept, Strategy, and Tools, Third Edition, Springer Texts in Business and Economics, 2018, 285\u201330910.1007\/978-3-662-55381-7_14"},{"key":"2022042707443485883_j_comp-2019-0005_ref_006_w2aab3b7b4b1b6b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] Sweeney L., k-anonymity: a model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5), 557\u201357010.1142\/S0218488502001648","DOI":"10.1142\/S0218488502001648"},{"key":"2022042707443485883_j_comp-2019-0005_ref_007_w2aab3b7b4b1b6b1ab1ab7Aa","unstructured":"[7] Ahmed M., Ullah A. S. S. M. B., False data injection attacks in healthcare, In: Boo Y., Stirling D., Chi L., Liu L., Ong KL.,Williams G. (Eds.), Data Mining, AusDM 2017, Communications in Computer and Information Science, Springer, Singapore, 2017, 845, 192\u201320210.1007\/978-981-13-0292-3_12"},{"key":"2022042707443485883_j_comp-2019-0005_ref_008_w2aab3b7b4b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] Miraz M. H., Ali M., Applications of Blockchain Technology beyond Cryptocurrency, Annals of Emerging Technologies in Computing (AETiC), 2018, 2(1), 1\u2013610.33166\/AETiC.2018.01.001","DOI":"10.33166\/AETiC.2018.01.001"},{"key":"2022042707443485883_j_comp-2019-0005_ref_009_w2aab3b7b4b1b6b1ab1ab9Aa","doi-asserted-by":"crossref","unstructured":"[9] Miraz M. H., Donald D. C., Application of Blockchain in Booking and Registration Systems of Securities Exchanges, In: International Conference on Computing, Electronics & Communications Engineering (iCCECE), IEEE, 2018, 35\u20134010.1109\/iCCECOME.2018.8658726","DOI":"10.1109\/iCCECOME.2018.8658726"},{"key":"2022042707443485883_j_comp-2019-0005_ref_010_w2aab3b7b4b1b6b1ab1ac10Aa","doi-asserted-by":"crossref","unstructured":"[10] Onik M. M. H., Miraz M. H., Kim C.-S., A Recruitment and Human ResourceManagement Technique using Blockchain Technology for Industry 4.0, In: Proceedings of the Smart Cities Symposium (SCS-2018), 2018, 11\u20131610.1049\/cp.2018.1371","DOI":"10.1049\/cp.2018.1371"},{"key":"2022042707443485883_j_comp-2019-0005_ref_011_w2aab3b7b4b1b6b1ab1ac11Aa","unstructured":"[11] Onik M. M. H., Ahmed M., Blockchain in the Era of Industry 4.0, In: Ahmed M., Pathan A. S. K. (Eds.), Data Analytics, CRC Press, 2018, 259\u2013298"},{"key":"2022042707443485883_j_comp-2019-0005_ref_012_w2aab3b7b4b1b6b1ab1ac12Aa","doi-asserted-by":"crossref","unstructured":"[12] Joshi K. P., Gupta A., Mittal S., Pearce C., Joshi A., Finin T., Semantic approach to automatingmanagement of big data privacy policies, In: 2016 IEEE International Conference on Big Data (Big Data), 2016, 482\u201349110.1109\/BigData.2016.7840639","DOI":"10.1109\/BigData.2016.7840639"},{"key":"2022042707443485883_j_comp-2019-0005_ref_013_w2aab3b7b4b1b6b1ab1ac13Aa","doi-asserted-by":"crossref","unstructured":"[13] Benhamouda F., Halevi S., Halevi T., Supporting private data on Hyperledger Fabric with secure multiparty computation, In: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, 357\u201336310.1109\/IC2E.2018.00069","DOI":"10.1109\/IC2E.2018.00069"},{"key":"2022042707443485883_j_comp-2019-0005_ref_014_w2aab3b7b4b1b6b1ab1ac14Aa","doi-asserted-by":"crossref","unstructured":"[14] Bahri L., Carminati B., Ferrari E., Decentralized privacy preserving services for online social networks, Online Social Networks and Media, 2018, 6, 18\u20132510.1016\/j.osnem.2018.02.001","DOI":"10.1016\/j.osnem.2018.02.001"},{"key":"2022042707443485883_j_comp-2019-0005_ref_015_w2aab3b7b4b1b6b1ab1ac15Aa","doi-asserted-by":"crossref","unstructured":"[15] Zyskind G., Nathan O., Decentralizing privacy: Using blockchain to protect personal data, In: Security and Privacy Workshops (SPW), IEEE, 2015, 180\u201318410.1109\/SPW.2015.27","DOI":"10.1109\/SPW.2015.27"},{"key":"2022042707443485883_j_comp-2019-0005_ref_016_w2aab3b7b4b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] Chen L., Hoang D. B., Novel data protection model in healthcare cloud, In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), 2011, 550\u2013 55510.1109\/HPCC.2011.148","DOI":"10.1109\/HPCC.2011.148"},{"key":"2022042707443485883_j_comp-2019-0005_ref_017_w2aab3b7b4b1b6b1ab1ac17Aa","unstructured":"[17] EUGDPR \u2013 Information Portal, https:\/\/eugdpr.org\/ [Accessed: 06-Mar-2019]"},{"key":"2022042707443485883_j_comp-2019-0005_ref_018_w2aab3b7b4b1b6b1ab1ac18Aa","doi-asserted-by":"crossref","unstructured":"[18] Sucasas V., Mantas G., Althunibat S., Oliveira L., Antonopoulos A., Otung I., Rodriguez J., A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications, Computers & Security, 74, 258\u201327410.1016\/j.cose.2018.01.014","DOI":"10.1016\/j.cose.2018.01.014"},{"key":"2022042707443485883_j_comp-2019-0005_ref_019_w2aab3b7b4b1b6b1ab1ac19Aa","doi-asserted-by":"crossref","unstructured":"[19] Weing\u00e4rtner R., Westphall C. M., A design towards personally identifiable information control and awareness in openid connect identity providers, In: 2017 IEEE International Conference on Computer and Information Technology (CIT), 2017, 37\u20134610.1109\/CIT.2017.30","DOI":"10.1109\/CIT.2017.30"},{"key":"2022042707443485883_j_comp-2019-0005_ref_020_w2aab3b7b4b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] Kshetri N., Big data\u2019s impact on privacy, security and consumer welfar, Telecommunications Policy, 2014, 38(11), 1134\u2013114510.1016\/j.telpol.2014.10.002","DOI":"10.1016\/j.telpol.2014.10.002"},{"key":"2022042707443485883_j_comp-2019-0005_ref_021_w2aab3b7b4b1b6b1ab1ac21Aa","doi-asserted-by":"crossref","unstructured":"[21] Caron X., Bosua R., Maynard S. B., Ahmad A., The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective, Computer Law&Security Review, 2016, 32(1), 4\u20131510.1016\/j.clsr.2015.12.001","DOI":"10.1016\/j.clsr.2015.12.001"},{"key":"2022042707443485883_j_comp-2019-0005_ref_022_w2aab3b7b4b1b6b1ab1ac22Aa","unstructured":"[22] Simpson J. J., The Supreme court of Canada rules on when lenders may share personal information without violating federal privacy legislation, Banking & Finance Law Review, 2017, 32(2), 417"},{"key":"2022042707443485883_j_comp-2019-0005_ref_023_w2aab3b7b4b1b6b1ab1ac23Aa","unstructured":"[23] Humphreys E., Implementing the ISO\/IEC 27001 information security management system standard, Artech House, Inc., 2007"},{"key":"2022042707443485883_j_comp-2019-0005_ref_024_w2aab3b7b4b1b6b1ab1ac24Aa","unstructured":"[24] Pfitzmann A., Hansen M., Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology, Version v0.31, Feb. 15, 2008"},{"key":"2022042707443485883_j_comp-2019-0005_ref_025_w2aab3b7b4b1b6b1ab1ac25Aa","unstructured":"[25] McCallister E., Guide to protecting the confidentiality of personally identifiable information, Diane Publishing, 201010.6028\/NIST.SP.800-122"},{"key":"2022042707443485883_j_comp-2019-0005_ref_026_w2aab3b7b4b1b6b1ab1ac26Aa","doi-asserted-by":"crossref","unstructured":"[26] Murphy R. S., Property rights in personal information: An economic defense of privacy, In: Barendt E. (Eds.), Privacy, Routledge, 2017, 43\u20137910.4324\/9781315246024-4","DOI":"10.4324\/9781315246024-4"},{"key":"2022042707443485883_j_comp-2019-0005_ref_027_w2aab3b7b4b1b6b1ab1ac27Aa","doi-asserted-by":"crossref","unstructured":"[27] Schaar P., Privacy by design, Identity in the Information Society, 2010, 3(2), 267\u201327410.1007\/s12394-010-0055-x","DOI":"10.1007\/s12394-010-0055-x"},{"key":"2022042707443485883_j_comp-2019-0005_ref_028_w2aab3b7b4b1b6b1ab1ac28Aa","doi-asserted-by":"crossref","unstructured":"[28] Pose C., Raja U., Crossler R. E., Burns A. J., Taking stock of organisations\u2019 protection of privacy: categorising and assessing threats to personally identifiable information in the USA, European Journal of Information Systems, 2017, 26(6), 585\u201360410.1057\/s41303-017-0065-y","DOI":"10.1057\/s41303-017-0065-y"},{"key":"2022042707443485883_j_comp-2019-0005_ref_029_w2aab3b7b4b1b6b1ab1ac29Aa","unstructured":"[29] Butler D. A., Rodrick S., Australian media law, Thomson Reuters (Professional) Australia Limited, 2015"},{"key":"2022042707443485883_j_comp-2019-0005_ref_030_w2aab3b7b4b1b6b1ab1ac30Aa","unstructured":"[30] Onik M. M. H., Al-Zaben N., Yang J., Kim C. S., Privacy of Things (PoT): personally identifiable information monitoring system for smart homes, In: Proceedings of Symposiumof the Korean Institute of Communications and Information Sciences (KICS), 2018, 256\u2013257"},{"key":"2022042707443485883_j_comp-2019-0005_ref_031_w2aab3b7b4b1b6b1ab1ac31Aa","doi-asserted-by":"crossref","unstructured":"[31] Razaghpanah A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., Gill P., Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem, In: Procedings of the Network and Distributed Systems Security (NDSS) Symposium 2018, 18-21 February 2018, San Diego, CA, USA10.14722\/ndss.2018.23353","DOI":"10.14722\/ndss.2018.23353"},{"key":"2022042707443485883_j_comp-2019-0005_ref_032_w2aab3b7b4b1b6b1ab1ac32Aa","doi-asserted-by":"crossref","unstructured":"[32] Sui P., Li X., Bai Y., A study of enhancing privacy for intelligent transportation systems: k-correlation privacy model against moving preference attacks for location trajectory data, IEEE Access, 2017, 5, 24555\u20132456710.1109\/ACCESS.2017.2767641","DOI":"10.1109\/ACCESS.2017.2767641"},{"key":"2022042707443485883_j_comp-2019-0005_ref_033_w2aab3b7b4b1b6b1ab1ac33Aa","unstructured":"[33] Karegar F., Lindegren D., Pettersson J. S., Fischer-H\u00fcbner S., User evaluations of an app interface for cloud-based identity management, In: Paspallis N., Raspopoulos M., Barry C., Lang M., Linger H., Schneider C. (Eds.), Advances in Information Systems Development, Lecture Notes in Information Systems and Organisation, Springer, 2018, 26, 205\u201322310.1007\/978-3-319-74817-7_13"},{"key":"2022042707443485883_j_comp-2019-0005_ref_034_w2aab3b7b4b1b6b1ab1ac34Aa","doi-asserted-by":"crossref","unstructured":"[34] Murmann P., Fischer-H\u00fcbner S., Tools for achieving usable ex post transparency: a survey, IEEE Access, 2017, 5, 22965\u20132299110.1109\/ACCESS.2017.2765539","DOI":"10.1109\/ACCESS.2017.2765539"},{"key":"2022042707443485883_j_comp-2019-0005_ref_035_w2aab3b7b4b1b6b1ab1ac35Aa","unstructured":"[35] Murmann P., Usable transparency for enhancing privacy in mobile health apps, In: MobileHCI 2018, 2018, 440\u201344210.1145\/3236112.3236184"},{"key":"2022042707443485883_j_comp-2019-0005_ref_036_w2aab3b7b4b1b6b1ab1ac36Aa","doi-asserted-by":"crossref","unstructured":"[36] Onik M. M. H., Al-Zaben N., Phan Hoo H., Kim C. S., MUXER \u2013 A new equipment for energy saving in Ethernet, Technologies, 2017, 5(4), 7410.3390\/technologies5040074","DOI":"10.3390\/technologies5040074"},{"key":"2022042707443485883_j_comp-2019-0005_ref_037_w2aab3b7b4b1b6b1ab1ac37Aa","unstructured":"[37] Nakamoto S., Bitcoin: A peer-to-peer electronic cash system, http:\/\/bitcoin.org\/bitcoin.pdf. [Accessed: 06-Mar-2019]"},{"key":"2022042707443485883_j_comp-2019-0005_ref_038_w2aab3b7b4b1b6b1ab1ac38Aa","doi-asserted-by":"crossref","unstructured":"[38] Zheng Z., Xie S., Dai H., Chen X., Wang H., An overview of blockchain technology: Architecture, consensus, and future trends, In: 2017 IEEE International Congress on Big Data (Big-Data Congress), 2017, 557\u201356410.1109\/BigDataCongress.2017.85","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"2022042707443485883_j_comp-2019-0005_ref_039_w2aab3b7b4b1b6b1ab1ac39Aa","doi-asserted-by":"crossref","unstructured":"[39] Liang X., Shetty S., Tosh D., Kamhoua C., Kwiat K., Njilla L., Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability, In: Proceedings of the 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, 2017, 468\u201347710.1109\/CCGRID.2017.8","DOI":"10.1109\/CCGRID.2017.8"},{"key":"2022042707443485883_j_comp-2019-0005_ref_040_w2aab3b7b4b1b6b1ab1ac40Aa","doi-asserted-by":"crossref","unstructured":"[40] Zhu L.,Wu Y., Gai K., Choo K. K. R., Controllable and trustworthy blockchain-based cloud data management, Future Generation Computer Systems, 2019, 91, 527\u201353510.1016\/j.future.2018.09.019","DOI":"10.1016\/j.future.2018.09.019"},{"key":"2022042707443485883_j_comp-2019-0005_ref_041_w2aab3b7b4b1b6b1ab1ac41Aa","doi-asserted-by":"crossref","unstructured":"[41] Yin S., Bao J., Zhang Y., Huang X., M2M security technology of CPS based on blockchains, Symmetry, 2017, 9(9), 19310.3390\/sym9090193","DOI":"10.3390\/sym9090193"},{"key":"2022042707443485883_j_comp-2019-0005_ref_042_w2aab3b7b4b1b6b1ab1ac42Aa","unstructured":"[42] Carey P., Data protection: a practical guide to UK and EU law, Oxford University Press, Inc., 2018"},{"key":"2022042707443485883_j_comp-2019-0005_ref_043_w2aab3b7b4b1b6b1ab1ac43Aa","unstructured":"[43] Voss W. G., European Union data privacy law reform: General data protection regulation, privacy shield, and the right to delisting, Business Lawyer, 2017, 72(1), 221\u2013233"},{"key":"2022042707443485883_j_comp-2019-0005_ref_044_w2aab3b7b4b1b6b1ab1ac44Aa","unstructured":"[44] EUGDPR \u2013 Information Portal, https:\/\/gdpr-info.eu\/art-4-gdpr\/ [Accessed: 06-Mar-2019]"},{"key":"2022042707443485883_j_comp-2019-0005_ref_045_w2aab3b7b4b1b6b1ab1ac45Aa","unstructured":"[45] Wirth C., Kolain M., Privacy by blockchain design: a blockchainenabled GDPR-compliant approach for handling personal data, Reports of the European Society for Socially Embedded Technologies, 2018, 2(6), (https:\/\/hdl.handle.net\/20.500.12015\/3159)"},{"key":"2022042707443485883_j_comp-2019-0005_ref_046_w2aab3b7b4b1b6b1ab1ac46Aa","doi-asserted-by":"crossref","unstructured":"[46] Ferrari V., EU blockchain observatory and forum workshop on GDPR, data policy and compliance, Institute for Information Law, Research Paper No. 2018-04, Available at SSRN: https:\/\/ssrn.com\/abstract=3247494 or http:\/\/dx.doi.org\/10.2139\/ssrn.324749410.2139\/ssrn.3247494","DOI":"10.2139\/ssrn.3247494"},{"key":"2022042707443485883_j_comp-2019-0005_ref_047_w2aab3b7b4b1b6b1ab1ac47Aa","unstructured":"[47] De Filippi P. D. F., Blockchain and the Law: The Rule of Code, Harvard University Press, 201810.2307\/j.ctv2867sp"},{"key":"2022042707443485883_j_comp-2019-0005_ref_048_w2aab3b7b4b1b6b1ab1ac48Aa","doi-asserted-by":"crossref","unstructured":"[48] Yermack D., Corporate governance and blockchains, Review of Finance, 2017, 21(1), 7\u20133110.1093\/rof\/rfw074","DOI":"10.1093\/rof\/rfw074"},{"key":"2022042707443485883_j_comp-2019-0005_ref_049_w2aab3b7b4b1b6b1ab1ac49Aa","unstructured":"[49] Off-chain (Alpha 3) Multichain 2.0, https:\/\/www.multichain.com\/blog\/2018\/06\/scaling-blockchains-off-chain-data\/ [Accessed: 06-Mar-2019]"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/comp\/9\/1\/article-p80.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0005\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0005\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T02:26:55Z","timestamp":1663295215000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0005\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":49,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,9,26]]},"published-print":{"date-parts":[[2019,1,1]]}},"alternative-id":["10.1515\/comp-2019-0005"],"URL":"https:\/\/doi.org\/10.1515\/comp-2019-0005","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,1]]}}}