{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T04:45:16Z","timestamp":1648874716041},"reference-count":0,"publisher":"International Academy Publishing (IAP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.5.6.593-599","type":"journal-article","created":{"date-parts":[[2010,6,16]],"date-time":"2010-06-16T12:20:48Z","timestamp":1276690848000},"source":"Crossref","is-referenced-by-count":0,"title":["A Historical Review of Computer User\u2019s Illegal Behavior Based on Containment Theory"],"prefix":"10.17706","volume":"5","author":[{"given":"Chi-Chao","family":"Lu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wen-Yuan","family":"Jen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7163","published-online":{"date-parts":[[2010,6,1]]},"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:19:31Z","timestamp":1442330371000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.academypublisher.com\/ojs\/index.php\/jsw\/article\/view\/2951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,1]]},"references-count":0,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2010,6,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.5.6.593-599","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2010,6,1]]}}}