{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:58:22Z","timestamp":1775199502604,"version":"3.50.1"},"reference-count":80,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11,22]]},"abstract":"<jats:p>Value sensitive design is a theoretically grounded approach to the design of technology that accounts for human values in a principled and systematic manner throughout the design process. In this article we provide a survey of 14 value sensitive design methods: (1) direct and indirect stakeholder analysis; (2) value source analysis; (3) co-evolution of technology and social structure; (4) value scenario; (5) value sketch; (6) value-oriented semi-structured interview; (7) scalable information dimensions; (8) value-oriented coding manual; (9) value-oriented mockup, prototype, or field deployment; (10) ethnographically informed inquiry regarding values and technology; (11) model of informed consent online; (12) value dams and flows; (13) value sensitive action-reflection model; and (14) Envisioning Cards TM. Each of these methods is honed to the investigation of values in technology, serving such purposes as stakeholder identification and legitimation, value representation and elicitation, and values analysis. While presented individually, the methods are intended to be integrated in a robust value sensitive design process. The survey article begins with a brief summary of value sensitive design methodology and theoretical constructs. We next provide an overview of the 14 methods. Then, we turn to a broader discussion of value sensitive design practice, focussing on some methodological strategies and heuristics to support skillful value sensitive design practice. Following the broad discussion of practice, we illustrate one method in action\u2014value scenarios\u2014providing details on its range of purposes and contexts. We conclude with reflections on core characteristics of value sensitive design methodology, and heuristics for innovation.<\/jats:p>","DOI":"10.1561\/1100000015","type":"journal-article","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T04:35:56Z","timestamp":1511325356000},"page":"63-125","source":"Crossref","is-referenced-by-count":271,"title":["A Survey of Value Sensitive Design Methods"],"prefix":"10.1561","volume":"11","author":[{"given":"Batya","family":"Friedman","sequence":"first","affiliation":[{"name":"The Information School University of Washington ,","place":["USA"]}]},{"given":"David G.","family":"Hendry","sequence":"additional","affiliation":[{"name":"The Information School University of Washington ,","place":["USA"]}]},{"given":"Alan","family":"Borning","sequence":"additional","affiliation":[{"name":"Paul G. Allen School of Computer Science & Engineering University of Washington ,","place":["USA"]}]}],"member":"140","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"2026040213565108400_ref001","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/2901790.2901873","volume-title":"Proceedings of the 2016 ACM Conference on Designing Interactive Systems","author":"Abokhodair","year":"2016"},{"key":"2026040213565108400_ref002","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1958824.1958836","volume-title":"Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work","author":"Alsheikh","year":"2011"},{"key":"2026040213565108400_ref003","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1145\/2207676.2208560","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Borning","year":"2012"},{"key":"2026040213565108400_ref004","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/1-4020-4023-7_23","volume-title":"ECSCW 2005","author":"Borning","year":"2005"},{"key":"2026040213565108400_ref005","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5249.001.0001","volume-title":"Participatory IT design: Designing for business and workplace realities","author":"B\u00f8dker","year":"2004"},{"issue":"4","key":"2026040213565108400_ref006","first-page":"25","article-title":"Achieving the goal of a global computing code of ethics through an international-localisation hybrid","volume":"10","author":"Burmeister","year":"2013","journal-title":"The International Journal of Communication Ethics"},{"issue":"3","key":"2026040213565108400_ref007","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s10676-016-9404-2","article-title":"The development of assistive dementia technology that accounts for the values of those affected by its use","volume":"18","author":"Burmeister","year":"2016","journal-title":"Ethics and Information Technology"},{"key":"2026040213565108400_ref008","volume-title":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences","author":"Carroll","year":"1999"},{"key":"2026040213565108400_ref009","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4398.001.0001","volume-title":"Making use: scenario-based design of human-computer interactions","author":"Carroll","year":"2000"},{"key":"2026040213565108400_ref010","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1145\/1518701.1519041","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Cockton","year":"2009"},{"issue":"3","key":"2026040213565108400_ref011","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1177\/1468794106065007","article-title":"Graphic elicitation: using research diagrams as interview stimuli","volume":"6","author":"Crilly","year":"2006","journal-title":"Qualitative Research"},{"key":"2026040213565108400_ref012","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/1837110.1837130","volume-title":"Proceedings of the Sixth Symposium on Usable Privacy and Security","author":"Czeskis","year":"2010"},{"key":"2026040213565108400_ref013","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.2008.145","article-title":"Engaging and informing citizens with household indicators","volume-title":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences","author":"Davis","year":"2008"},{"key":"2026040213565108400_ref014","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-94-007-6994-6_3-1","volume-title":"Handbook of Ethics, Values, and Technological Design","author":"Davis","year":"2014"},{"issue":"2","key":"2026040213565108400_ref015","doi-asserted-by":"crossref","first-page":"279","DOI":"10.25300\/MISQ\/2016\/40.2.01","article-title":"The Duality of Empowerment and Marginalization in Microtask Crowdsourcing: Giving Voice to the Less Powerful Through Value Sensitive Design","volume":"40","author":"Deng","year":"2016","journal-title":"MIS Quarterly"},{"key":"2026040213565108400_ref016","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1145\/1753326.1753462","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Denning","year":"2010"},{"issue":"3","key":"2026040213565108400_ref017","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1145\/2874239.2874279","article-title":"Implementing an Ethical Approach to Big Data Analytics in Assistive Robotics for Elderly with Dementia","volume":"45","author":"Felzmann","year":"2016","journal-title":"SIGCAS Comput. Soc."},{"key":"2026040213565108400_ref018","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-1-4471-6720-4_13","volume-title":"Designing Socially Embedded Technologies in the Real-World","author":"Fitzpatrick","year":"2015"},{"issue":"4","key":"2026040213565108400_ref019","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1207\/s15327051hci0404_1","article-title":"Out of Scandinavia: Alternative approaches to software design and system development","volume":"4","author":"Floyd","year":"1989","journal-title":"Human\u2013Computer Interaction"},{"key":"2026040213565108400_ref020","first-page":"2","volume-title":"Proceedings of the Agile Development Conference","author":"Freeman-Benson","year":"2003"},{"key":"2026040213565108400_ref021","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1145\/1357054.1357113","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Freier","year":"2008"},{"key":"2026040213565108400_ref022","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.2002.994366","article-title":"Informed consent in the Mozilla browser: implementing value-sensitive design","volume-title":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","author":"Friedman","year":"2002"},{"key":"2026040213565108400_ref023","volume-title":"Coding manual for \u2018the watcher and the watched: Social judgments about privacy in a public place\u2019","author":"Friedman","year":"2005"},{"key":"2026040213565108400_ref024","first-page":"495","volume-title":"Designing Secure Systems that People Can Use","author":"Friedman","year":"2005"},{"issue":"3","key":"2026040213565108400_ref025","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/S0747-5632(97)00013-7","article-title":"Social Judgments and technological innovation: Adolescents\u2019 understanding of property, privacy, and electronic information","volume":"13","author":"Friedman","year":"1997","journal-title":"Computers in Human Behavior"},{"key":"2026040213565108400_ref026","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1145\/2207676.2208562","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Friedman","year":"2012"},{"key":"2026040213565108400_ref027","doi-asserted-by":"crossref","volume-title":"Value Sensitive Design: Theory, Method, and Practice","author":"Friedman","DOI":"10.7551\/mitpress\/7585.001.0001"},{"key":"2026040213565108400_ref028","volume-title":"Informed consent online: A conceptual model and design principles","author":"Friedman","year":"2000"},{"key":"2026040213565108400_ref029","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1145\/506443.506577","volume-title":"CHI \u201902 Extended Abstracts on Human Factors in Computing Systems","author":"Friedman","year":"2002"},{"key":"2026040213565108400_ref030","first-page":"348","volume-title":"Human-computer interaction in management information systems: Foundations","author":"Friedman","year":"2006"},{"issue":"2","key":"2026040213565108400_ref031","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1207\/s15327051hci2102_3","article-title":"The watcher and the watched: Social judgments about privacy in a public place","volume":"21","author":"Friedman","year":"2006","journal-title":"Human\u2013Computer Interaction"},{"key":"2026040213565108400_ref032","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/11853565_12","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"Friedman","year":"2006"},{"issue":"6","key":"2026040213565108400_ref033","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.ijhcs.2007.12.005","article-title":"Office Window of the Future?-Field-based Analyses of a New Use of a Large Display","volume":"66","author":"Friedman","year":"2008","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"2026040213565108400_ref034","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/1463160.1463176","volume-title":"Proceedings of the 5th Nordic Conference on Human-computer Interaction: Building Bridges","author":"Friedman","year":"2008"},{"key":"2026040213565108400_ref035","volume-title":"Envisioning cards","author":"Friedman","year":"2011"},{"key":"2026040213565108400_ref036","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-319-16101-3_23","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"Harbers","year":"2015"},{"key":"2026040213565108400_ref037","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/978-94-007-6970-0_35","volume-title":"Handbook of Ethics, Values, and Technological Design","author":"Huldtgren","year":"2015"},{"key":"2026040213565108400_ref038","volume-title":"Coding manual for children\u2019s interactions with aibo, the robotic dog \u2014 the preschool study","author":"Kahn","year":"2003"},{"key":"2026040213565108400_ref039","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3604.001.0001","volume-title":"The human relationship with nature: Development and culture","author":"Kahn","year":"1999"},{"key":"2026040213565108400_ref040","volume-title":"Coding manual for \u2018The distant gardener: What conversations in the Telegarden reveal about the user experience of human-telerobotic interaction\u2019","author":"Kahn","year":"2005"},{"issue":"2","key":"2026040213565108400_ref041","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.jenvp.2007.10.008","article-title":"A plasma display window?\u2014The shifting baseline problem in a technologically mediated natural world","volume":"28","author":"Kahn","year":"2008","journal-title":"Journal of Environmental Psychology"},{"issue":"3","key":"2026040213565108400_ref042","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1075\/is.7.3.13kah","article-title":"Robotic pets in the lives of preschool children","volume":"7","author":"Kahn","year":"2006","journal-title":"Interaction Studies"},{"issue":"5","key":"2026040213565108400_ref043","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2008176.2008191","article-title":"Envisioning persuasion profiles: Challenges for public policy and ethical practice","volume":"18","author":"Kaptein","year":"2011","journal-title":"interactions"},{"key":"2026040213565108400_ref044","volume-title":"The image of the city","author":"Lynch","year":"1960"},{"key":"2026040213565108400_ref045","unstructured":"Method\n          . Oxford English Dictionary, December2001. Def. 2a. Accessed July06, 2017. URL www.oed.com."},{"key":"2026040213565108400_ref046","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1145\/1316624.1316668","volume-title":"Proceedings of the 2007 International ACM Conference on Supporting Group Work","author":"Miller","year":"2007"},{"key":"2026040213565108400_ref047","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/365024.365034","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Millett","year":"2001"},{"issue":"4","key":"2026040213565108400_ref048","doi-asserted-by":"crossref","first-page":"853","DOI":"10.2307\/259247","article-title":"Toward a theory of stakeholder identification and salience: Defining the principle of who and what really counts","volume":"22","author":"Mitchell","year":"1997","journal-title":"The Academy of Management Review"},{"key":"2026040213565108400_ref049","first-page":"1051","volume-title":"The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications","author":"Muller","year":"2003"},{"key":"2026040213565108400_ref050","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2037556.2037558","volume-title":"Proceedings of the 12th Annual International Digital Government Research Conference","author":"Munson","year":"2011"},{"key":"2026040213565108400_ref051","volume-title":"Information ecologies: using technology with heart","author":"Nardi","year":"1999"},{"issue":"11","key":"2026040213565108400_ref052","doi-asserted-by":"crossref","first-page":"2254","DOI":"10.1002\/asi.22726","article-title":"Sustainable information practice: An ethnographic investigation","volume":"63","author":"Nathan","year":"2012","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"2026040213565108400_ref053","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1145\/1240866.1241046","volume-title":"CHI \u201907 Extended Abstracts on Human Factors in Computing Systems","author":"Nathan","year":"2007"},{"key":"2026040213565108400_ref054","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1394445.1394446","volume-title":"Proceedings of the Seventh ACM Conference on Designing Interactive Systems","author":"Nathan","year":"2008"},{"issue":"3","key":"2026040213565108400_ref055","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/2.910905","article-title":"How computer systems embody values","volume":"34","author":"Nissenbaum","year":"2001","journal-title":"Computer"},{"issue":"3","key":"2026040213565108400_ref056","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s11948-014-9552-x","article-title":"A Review of Contemporary Work on the Ethics of Ambient Assisted Living Technologies for People with Dementia","volume":"21","author":"Novitzky","year":"2015","journal-title":"Science and Engineering Ethics"},{"issue":"4","key":"2026040213565108400_ref057","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1287\/orsc.11.4.404.14600","article-title":"Using technology and constituting structures: A practice lens for studying technology in organizations","volume":"11","author":"Orlikowski","year":"2000","journal-title":"Organization Science"},{"issue":"4","key":"2026040213565108400_ref058","doi-asserted-by":"crossref","first-page":"383","DOI":"10.4017\/gt.2015.13.4.002.00","article-title":"Ethical telehealth design for users with dementia","volume":"13","author":"Pakrasi","year":"2015","journal-title":"Gerontechnology"},{"key":"2026040213565108400_ref059","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.ijhcs.2015.04.001","article-title":"A value-oriented and culturally informed approach to the design of interactive systems","volume":"80","author":"Pereira","year":"2015","journal-title":"International Journal of Human-Computer Studies"},{"key":"2026040213565108400_ref060","volume-title":"The child\u2019s conception of the world","author":"Piaget","year":"1929\/1960"},{"key":"2026040213565108400_ref061","first-page":"298","volume-title":"Proceedings of the Nordic Design Research Conference","author":"Sanders","year":"2011"},{"issue":"6","key":"2026040213565108400_ref062","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.ijhcs.2010.02.002","article-title":"Who Will Watch (over) Me? Humane Monitoring in Dementia Care","volume":"68","author":"Schikhof","year":"2010","journal-title":"Int. J. Hum.-Comput. Stud."},{"issue":"3","key":"2026040213565108400_ref063","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1177\/0162243912436985","article-title":"Value Levers: Building Ethics into Design","volume":"38","author":"Shilton","year":"2012","journal-title":"Science, Technology, & Human Values"},{"key":"2026040213565108400_ref064","volume-title":"Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS 2016)","author":"Snyder","year":"2016"},{"key":"2026040213565108400_ref065","unstructured":"D. B.\n              Solomon\n            \n          . Employee and Organization Security Value Alignment Through Value Sensitive Security Policy Design. Ph.D. Dissertation, Nova Southeastern University, 2014. URL http:\/\/nsuworks.nova.edu\/gscis_etd\/4."},{"key":"2026040213565108400_ref066","doi-asserted-by":"crossref","DOI":"10.1201\/b19060","volume-title":"Ethical IT Innovation: A Value-Based System Design Approach","author":"Spiekermann","year":"2015"},{"issue":"6","key":"2026040213565108400_ref067","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/j.jalz.2015.11.003","article-title":"Information and communication technology solutions for outdoor navigation in dementia","volume":"12","author":"Teipel","year":"2016","journal-title":"Alzheimer\u2019s & Dementia"},{"key":"2026040213565108400_ref068","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-94-007-7762-0_20","volume-title":"Philosophy and Engineering: Reflections on Practice, Principles and Process","author":"van de Poel","year":"2013"},{"key":"2026040213565108400_ref069","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1002\/9781118551424.ch4","volume-title":"Responsible Innovation","author":"van den Hoven","year":"2013"},{"key":"2026040213565108400_ref070","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-007-6970-0","volume-title":"Handbook of ethics, values and technological design","author":"van den Hoven","year":"2015"},{"key":"2026040213565108400_ref071","volume-title":"Informatics in the Future: Proceedings of the 11th European Computer Science Summit (ECSS 2015)","author":"van den Hoven","year":"2015"},{"issue":"2","key":"2026040213565108400_ref072","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11948-011-011-9343-6","article-title":"Designing Robots for Care: Care Centered Value-Sensitive Design","volume":"19","author":"van Wynsberghe","year":"2013","journal-title":"Science and Engineering Ethics"},{"key":"2026040213565108400_ref073","volume-title":"Healthcare Robots: Ethics, Design and Implementation","author":"van Wynsberghe","year":"2015"},{"issue":"1","key":"2026040213565108400_ref074","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/0144929X.2011.553749","article-title":"Exploring the use of design pattern maps for aligning new technical support to new clinical team meeting routines","volume":"32","author":"Walldius","year":"2013","journal-title":"Behaviour & Information Technology"},{"key":"2026040213565108400_ref075","doi-asserted-by":"crossref","unstructured":"Kari Edison\n              Watkins\n            , BrianFerris, YegorMalinovskiy, and AlanBorning. Beyond context-sensitive solutions: Using value-sensitive design to identify needed transit information tools. In Steven L.Jones Jr., editor, Urban Public Transportation Systems 2013: Proceedings of the Third International Conference, pages 296\u2013308. American Society of Civil Engineers, 2013. URL 10.1061\/9780784413210.026.","DOI":"10.1061\/9780784413210.026"},{"issue":"5","key":"2026040213565108400_ref076","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1093\/iwc\/iwx008","article-title":"Extending Value Sensitive Design to Off-the-Shelf Technology: Lessons Learned from a Local Intercultural Computer Club","volume":"29","author":"Weibert","year":"2017","journal-title":"Interacting with Computers"},{"issue":"11","key":"2026040213565108400_ref077","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1002\/asi.21146","article-title":"Stabilizing homeless young people with information and place","volume":"60","author":"Woelfer","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"2026040213565108400_ref078","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1145\/1978942.1979191","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Woelfer","year":"2011"},{"key":"2026040213565108400_ref079","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1145\/2470654.2470715","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Yoo","year":"2013"},{"key":"2026040213565108400_ref080","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.1145\/2470654.2481349","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Yoo","year":"2013"}],"container-title":["Foundations and Trends\u00ae in Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/fthci\/article-pdf\/11\/2\/63\/10902844\/1100000015en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/fthci\/article-pdf\/11\/2\/63\/10902844\/1100000015en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T17:57:06Z","timestamp":1775152626000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/fthci\/article\/11\/2\/63\/1320879\/A-Survey-of-Value-Sensitive-Design-Methods"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,22]]},"references-count":80,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,11,22]]}},"URL":"https:\/\/doi.org\/10.1561\/1100000015","relation":{},"ISSN":["1551-3955","1551-3963"],"issn-type":[{"value":"1551-3955","type":"print"},{"value":"1551-3963","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,22]]}}}