{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,24]],"date-time":"2024-03-24T05:05:35Z","timestamp":1711256735519},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2008,4,11]],"date-time":"2008-04-11T00:00:00Z","timestamp":1207872000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1007\/s00779-008-0200-9","type":"journal-article","created":{"date-parts":[[2008,4,10]],"date-time":"2008-04-10T06:08:04Z","timestamp":1207807684000},"page":"527-542","source":"Crossref","is-referenced-by-count":39,"title":["Designing for privacy and self-presentation in social awareness"],"prefix":"10.1007","volume":"12","author":[{"given":"Mika","family":"Raento","sequence":"first","affiliation":[]},{"given":"Antti","family":"Oulasvirta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,4,11]]},"reference":[{"key":"200_CR1","doi-asserted-by":"crossref","unstructured":"Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone\u2019s Contact Book to Support Mobile Awareness and Collaboration. In: Proceedings of the 7th international conference on human computer interaction with mobile devices and services, MOBILEHCI\u201905. ACM, pp 167\u2013174","DOI":"10.1145\/1085777.1085805"},{"key":"200_CR2","doi-asserted-by":"crossref","unstructured":"Dourish P, Bellotti V (1992) Awareness and coordination in shared workspaces. In: CSCW \u201892: proceedings of the 1992 ACM conference on Computer-supported cooperative work. ACM Press, New York, pp 107\u2013114","DOI":"10.1145\/143457.143468"},{"key":"200_CR3","doi-asserted-by":"crossref","unstructured":"Langheinrich M (2001) Privacy by Design\u2014Principles of Privacy-Aware Ubiquitous Systems. In: Abowd GD, Brumitt B, Shafer SA (eds) Proceedings of the third international conference on ubiquitous computing (UbiComp 2001), vol 2201. Lecture Notes in Computer Science. Springer, Atlanta, pp 273\u2013291","DOI":"10.1007\/3-540-45427-6_23"},{"key":"200_CR4","doi-asserted-by":"crossref","unstructured":"Smith I, Consolvo S, Lamarca A, Hightower J, Scott J, Sohn T, Hughes J, Iachello G, Abowd GD (2005) Social disclosure of place: from location technology to communication practices. In: Gellersen HW, Want R, Schmidt A (eds) Pervasive computing: third international conference, PERVASIVE 2005, Munich, Germany, May 8\u201313, 2005. Proceedings, vol 3468. Lecture Notes in Computer Science. Springer, Berlin, pp 134\u2013151","DOI":"10.1007\/11428572_9"},{"issue":"6","key":"200_CR5","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S Lederer","year":"2004","unstructured":"Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Comput 8(6):440\u2013454","journal-title":"Personal Ubiquitous Comput"},{"key":"200_CR6","unstructured":"W3C (2005) Platform for Privacy Preferences (P3P) Project, online, http:\/\/www.w3.org\/P3P\/ , referenced Jun 2006"},{"key":"200_CR7","doi-asserted-by":"crossref","unstructured":"Palen L, Dourish P (2003) Unpacking \u201cprivacy\u201d for a networked world. In: CHI \u201803: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 129\u2013136","DOI":"10.1145\/642611.642635"},{"key":"200_CR8","unstructured":"Aoki PA, Woodruff A (2005) Making space for stories: ambiguity in the design of personal communication systems. In: CHI \u201805: Proceeding of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 181\u2013190"},{"key":"200_CR9","first-page":"108","volume":"14","author":"I Altman","year":"1981","unstructured":"Altman I, Vinsel A, Brown BB (1981) Dialectic conceptions in social psychology: an application to social penetration and privacy regulation. Adv Exp Soc Psychol 14:108\u2013161","journal-title":"Adv Exp Soc Psychol"},{"issue":"2","key":"200_CR10","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/1540-4560.00071","volume":"59","author":"ST Margulis","year":"2003","unstructured":"Margulis ST (2003) On the status and contribution of Westin\u2019s and Altman\u2019s Theories of Privacy. J Soc Issues 59(2):411\u2013429","journal-title":"J Soc Issues"},{"key":"200_CR11","doi-asserted-by":"crossref","unstructured":"Petronio S (2002) Boundaries of privacy, dialectics of disclosure. State University of New York Press","DOI":"10.1353\/book4588"},{"key":"200_CR12","unstructured":"Goffman E (1990) The presentation of self in everyday life. Penguin Books, London, Reprinted, original 1959 Anchor Books"},{"key":"200_CR13","unstructured":"Raento M, Oulasvirta A (2005) Privacy management for social awareness applications. In: Proceedings of the workshop on context awareness for proactive systems, CAPS 2005. Helsinki University Press, pp 105\u2013114"},{"key":"200_CR14","first-page":"5","volume-title":"Interaction Ritual, chapter On Face-Work","author":"E Goffman","year":"1967","unstructured":"Goffman E (1967) Interaction Ritual, chapter On Face-Work. Pantheon Books, New York, pp 5\u201345"},{"key":"200_CR15","doi-asserted-by":"crossref","unstructured":"Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: MobiSys \u201804: Proceedings of the 2nd international conference on Mobile systems, applications, and services. ACM Press, New York, pp 177\u2013189","DOI":"10.1145\/990064.990087"},{"key":"200_CR16","doi-asserted-by":"crossref","unstructured":"Nardi BA, Whittaker S, Bradner E (2000) Interaction and outeraction: instant messaging in action. In: CSCW \u201800: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 79\u201388","DOI":"10.1145\/358916.358975"},{"key":"200_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4899-3523-6_1","volume-title":"Self-disclosure. Theory, Research and Therapy","author":"JH Berg","year":"1987","unstructured":"Berg JH, Derlega VJ (1987) Themes in study of self-disclosure. In: Derlega VJ, Berg JH (eds) Self-disclosure. Theory, Research and Therapy. Plenum Press, New York, pp 1\u20138"},{"issue":"1","key":"200_CR18","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1177\/0265407500171003","volume":"17","author":"JR Vittengl","year":"2002","unstructured":"Vittengl JR, Holt CS (2002) Getting acquainted: the relationship of self-disclosure and social attraction to positive affect. J Soc Pers Relat 17(1):53\u201366","journal-title":"J Soc Pers Relat"},{"key":"200_CR19","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1006\/jado.1993.1035","volume":"16","author":"JB Miller","year":"1993","unstructured":"Miller JB, Stubblefield A (1993) Parental disclosure from the perspective of late adolescent. J Adolesc 16:439\u2013455","journal-title":"J Adolesc"},{"key":"200_CR20","doi-asserted-by":"crossref","unstructured":"Leary MR, Kowalski RM (1990) Impression Management: a literature review and a two-component model. Psychol Bull 107(1)","DOI":"10.1037\/0033-2909.107.1.34"},{"issue":"5","key":"200_CR21","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1037\/0022-3514.70.5.979","volume":"70","author":"BM DePaulo","year":"1996","unstructured":"DePaulo BM, Kashy DA, Kirkendol SE, Wyer MM (1996) Lying in everyday life. J Personal Soc Psychol 70(5):979\u2013995","journal-title":"J Personal Soc Psychol"},{"key":"200_CR22","unstructured":"GEOPRIV Working Group Archives (2003) Geopriv and actively lying. Mailing list exchange, online, http:\/\/ecotroph.net\/~anewton\/hypermail\/geopriv\/0309\/0846.html , referenced June 2006"},{"key":"200_CR23","unstructured":"Berger PL, Luckman T (1966) The social construction of reality: a treatise in the sociology of knowledge. Garden City, New York"},{"key":"200_CR24","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1348\/014466604X15733","volume":"44","author":"C Antaki","year":"2005","unstructured":"Antaki C, Barnes R, Leudar I (2005) Self-disclosure as a situated interactional practice. Br J Soc Psychol 44:181\u2013199","journal-title":"Br J Soc Psychol"},{"key":"200_CR25","doi-asserted-by":"crossref","unstructured":"Consolvo S, Smith IE, Matthews T, LaMarca A, Tabert J, Powledge P (2005) Location disclosure to social relations: why, when, and what people want to share. In: CHI \u201805: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 81\u201390","DOI":"10.1145\/1054972.1054985"},{"key":"200_CR26","first-page":"43","volume-title":"Syntax and semantics, Speech Acts","author":"H Grice","year":"1975","unstructured":"Grice H (1975) Logic and conversation. In: Cole P, Morgan JL (eds) Syntax and semantics, Speech Acts, vol 3. Academic Press, New York, pp 43\u201358"},{"key":"200_CR27","first-page":"75","volume-title":"Studies in social interaction","author":"EA Schegloff","year":"1972","unstructured":"Schegloff EA (1972) Notes on a conversational practice: formulating place. In: Sudnow D (ed) Studies in social interaction. The Free Press, New York, pp 75\u2013119"},{"key":"200_CR28","unstructured":"Oulasvirta A, Petit R, Raento M, Tiitta S (2006) On how users interpret and act upon mobile awareness cues. Human\u2013Computer interaction (in press)"},{"issue":"2","key":"200_CR29","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MPRV.2005.29","volume":"4","author":"M Raento","year":"2005","unstructured":"Raento M, Oulasvirta A, Petit R, Toivonen H (2005) ContextPhone, a prototyping platform for context-aware mobile applications. IEEE Pervasive Comput 4(2):51\u201359","journal-title":"IEEE Pervasive Comput"},{"key":"200_CR30","unstructured":"Bardram JE, Hansen TR (2003) The AWARE architecture: supporting context-mediated social awareness in mobile cooperation. In: Proceedings of the CSCW03. ACM Press, New York, pp 192\u2013201"},{"key":"200_CR31","doi-asserted-by":"crossref","unstructured":"Milewski AE, Smith TM (2000) Providing presence cues to telephone users. In: CSCW \u201800: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 89\u201396","DOI":"10.1145\/358916.358978"},{"key":"200_CR32","volume-title":"Perpetual contact: mobile communication, private talk, public performance","year":"2002","unstructured":"Katz J, Aakhus M (eds) (2002) Perpetual contact: mobile communication, private talk, public performance. Cambridge University Press, Cambridge"},{"key":"200_CR33","volume-title":"The mobile connection: the cell phones impact on society","author":"R Ling","year":"2004","unstructured":"Ling R (2004) The mobile connection: the cell phones impact on society. Morgan Kaufmann, San Francisco"},{"key":"200_CR34","doi-asserted-by":"crossref","unstructured":"Laasonen K, Raento M, Toivonen H (2004) Adaptive on-device location recognition. In: Proceedings of the 2nd international conference on pervasive computing (Pervasive 2004), vol 3001, Lecture Notes in Computer Science. Springer, Berlin, pp 287\u2013304","DOI":"10.1007\/978-3-540-24646-6_21"},{"key":"200_CR35","doi-asserted-by":"crossref","unstructured":"Prinz W (1999) NESSIE: an awareness environment for cooperative settings. In: Proceedings of the sixth European conference on computer supported cooperative work\u2014ECSCW99. Kluwer, Dordrecht, pp 391\u2013410","DOI":"10.1007\/978-94-011-4441-4_21"},{"issue":"3","key":"200_CR36","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0022-1031(75)80025-4","volume":"11","author":"Z Rubin","year":"1975","unstructured":"Rubin Z (1975) Disclosing oneself to a stranger: reciprocity and its limits. J Exp Soc Psychol 11(3):233\u2013260","journal-title":"J Exp Soc Psychol"},{"key":"200_CR37","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/S0065-2601(00)80006-4","volume":"32","author":"N Ambady","year":"2000","unstructured":"Ambady N, Bernieri F, Richeson JA (2000) Toward a histology of social behavior: judgmental accuracy from thin slices of the behavioral stream. Adv Exp Soc Psychol 32:201\u2013271","journal-title":"Adv Exp Soc Psychol"},{"key":"200_CR38","doi-asserted-by":"crossref","unstructured":"McEwan G, Greenberg S (2005) Supporting social worlds with the community bar. In: GROUP \u201805 Proceedings of the 2005 international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 21\u201330","DOI":"10.1145\/1099203.1099207"},{"issue":"4","key":"200_CR39","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1145\/1121112.1121114","volume":"12","author":"M Wiberg","year":"2005","unstructured":"Wiberg M, Whittaker S (2005) Managing availability: supporting lightweight negotiations to handle interruptions. ACM Trans Comput Hum Interact 12(4):356\u2013387","journal-title":"ACM Trans Comput Hum Interact"},{"issue":"4","key":"200_CR40","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1207\/S15327965PLI1104_01","volume":"11","author":"EL Deci","year":"2000","unstructured":"Deci EL, Ryan RM (2000) The \u201cWhat\u201d and \u201cWhy\u201d of goal pursuits: Human needs and the self-determination of behavior. Psychol Inq 11(4):227\u2013268","journal-title":"Psychol Inq"},{"key":"200_CR41","unstructured":"Sloane L (1992) Orwellian dream come true: a badge that pinpoints you. The New York Times, September 12"},{"key":"200_CR42","doi-asserted-by":"crossref","unstructured":"Lee A, Girgensohn A, Schlueter K (1997) Nynex portholes: initial user reactions and redesign implications. In: GROUP \u201897 Proceedings of the international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 385\u2013394","DOI":"10.1145\/266838.267359"},{"key":"200_CR43","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MC.2004.149","volume":"37","author":"WG Griswold","year":"2004","unstructured":"Griswold WG, Shanahan P, Brown SW, Boyer R, Ratto M, Shapiro RB, Truong TM (2004) ActiveCampus: experiments in community-oriented ubiquitous computing. Computer 37:73\u201381","journal-title":"Computer"},{"key":"200_CR44","unstructured":"Barkhuus L, Dey AK (2003) Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: Interact 2003. ACM Press, Zurich, pp 709\u2013712"},{"key":"200_CR45","unstructured":"Oulasvirta A, Tamminen S, Roto V, Kuorelahti J (2005) Interaction in 4-s bursts: the fragmented nature of attention in mobile HCI. In: Proceedings of the 2005 conference on human factors in computing systems (CHI 2005). ACM Press, New York, pp 919\u2013928"},{"key":"200_CR46","doi-asserted-by":"crossref","unstructured":"Palen L (1999) Social, individual and technological issues for groupware calendar systems. In: Proceedings of the SIGCHI conference on Human factors in computing systems ACM Press, New York, pp 17\u201324","DOI":"10.1145\/302979.302982"},{"key":"200_CR47","unstructured":"Zaner M, Chung EK, Savage T (2003) 3 and the Net Generation: Designing for Inner Circles of Friends. In: Proceedings of the workshop on intimate ubiquitous computing at UbiComp 2003. Intel Corporation, online, http:\/\/berkeley.intel-research.net\/paulos\/lab\/ubicomp03\/Workshop\/index.html , referenced June 2006"},{"issue":"1","key":"200_CR48","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/019722496129693","volume":"12","author":"DJ Phillips","year":"1996","unstructured":"Phillips DJ (1996) Defending the boundaries: identifying and countering threats in a usenet newsgroup. Inf Soc 12(1):39\u201362","journal-title":"Inf Soc"},{"key":"200_CR49","doi-asserted-by":"crossref","unstructured":"Smith CB (1997) Conduct control on usenet. J Comput Mediat Commun 2(4)","DOI":"10.1111\/j.1083-6101.1997.tb00197.x"},{"key":"200_CR50","first-page":"99","volume-title":"Wireless world: social, cultural and interactional aspects of wireless technology","author":"A Weilenmann","year":"2001","unstructured":"Weilenmann A, Larsson C (2001) Local use and sharing of mobile phones. In: Brown B, Green N, Harper R (eds) Wireless world: social, cultural and interactional aspects of wireless technology. Springer, London, pp 99\u2013115"},{"key":"200_CR51","unstructured":"The European Commission (1995) Directive 95\/46\/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Commun (L 281):31\u201350"},{"key":"200_CR52","unstructured":"IETF Secretariat (2005) SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE), online http:\/\/www.ietf.org\/html.charters\/simple-charter.html , referenced May 2005"},{"key":"200_CR53","doi-asserted-by":"crossref","unstructured":"Saint-Andre P (ed) (2004) IETF. RFC 3920. Extensible messaging and presence protocol (XMPP): Core, October","DOI":"10.17487\/rfc3920"},{"key":"200_CR54","doi-asserted-by":"crossref","unstructured":"Peterson J (2004) A presence architecture for the distribution of GEOPRIV Location Objects","DOI":"10.17487\/rfc4079"},{"key":"200_CR55","doi-asserted-by":"crossref","unstructured":"Saint-Andre P (ed) (2004) IETF. RFC 3921. Extensible messaging and presence protocol (XMPP): instant messaging and presence","DOI":"10.17487\/rfc3921"},{"key":"200_CR56","unstructured":"Symbian Ltd (2006) How has Symbian Signed evolved with Symbian OS v9? online, https:\/\/www.symbiansigned.com\/How_has_Symbian_Signed_evolved_with_Symbian_OS_v9.pdf , referenced June 2006"},{"key":"200_CR57","volume-title":"Applied cryptography","author":"B Schneier","year":"1995","unstructured":"Schneier B (1995) Applied cryptography, 2nd edn. Wiley, London","edition":"2nd"},{"key":"200_CR58","unstructured":"Burkholder P (2002) SSL Man-in-the-Middle Attacks. Technical report, February 2002. online, http:\/\/www.sans.org\/rr\/whitepapers\/threats\/480.php, referenced Jun 2006"},{"key":"200_CR59","doi-asserted-by":"crossref","unstructured":"Tang JC, Yankelovich N, Begole J, Van Kleek M, Li F, Bhalodia J (2001) ConNexus to awarenex: extending awareness to mobile users. In: CHI \u201801: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 221\u2013228","DOI":"10.1145\/365024.365105"},{"issue":"1\u20132","key":"200_CR60","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BF01305316","volume":"3","author":"LE Holmquist","year":"1999","unstructured":"Holmquist LE, Falk J, Wigstr\u00f6m J (1999) Supporting group collaboration with interpersonal awareness devices. Pers Technol 3(1\u20132):13\u201321","journal-title":"Pers Technol"},{"key":"200_CR61","doi-asserted-by":"crossref","unstructured":"Marmasse N, Schmandt C, Spectre D (2004) WatchMe: Communication and Awareness Between Members of a Closely-Knit Group. In: Davies N, Mynatt E, Siio I (eds) UbiComp 2004: Ubiquitous Computing: 6th International Conference Nottingham, UK, September 7\u201310, 2004 Proceedings, vol 3205. Springer, Berling, pp 214\u2013231","DOI":"10.1007\/978-3-540-30119-6_13"},{"key":"200_CR62","doi-asserted-by":"crossref","unstructured":"Burak A, Sharon T (2004) Usage patterns of FriendZone: mobile location-based community services. In: MUM \u201804: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia. ACM Press, New York, pp 93\u2013100","DOI":"10.1145\/1052380.1052394"},{"key":"200_CR63","doi-asserted-by":"crossref","unstructured":"Isaacs EA, Tang JC, Morris T (1996) Piazza: a desktop environment supporting impromptu and planned interactions. In: CSCW \u201896: Proceedings of the 1996 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 315\u2013324","DOI":"10.1145\/240080.240316"},{"key":"200_CR64","doi-asserted-by":"crossref","unstructured":"Davis M, Van House N, Towle J, King S, Ahern S, Burgener C, Perkel D, Finn M, Viswanathan V, Rothenberg M (2005) MMM2: mobile media metadata for media sharing. In: CHI \u201805: CHI \u201805 extended abstracts on Human factors in computing systems. ACM Press, New York, pp 1335\u20131338","DOI":"10.1145\/1056808.1056910"},{"key":"200_CR65","doi-asserted-by":"crossref","unstructured":"Counts S, Fellheimer E (2004) Supporting social presence through lightweight photo sharing on and off the desktop. In: CHI \u201804: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 599\u2013606","DOI":"10.1145\/985692.985768"},{"key":"200_CR66","doi-asserted-by":"crossref","unstructured":"Rantanen M, Oulasvirta A, Blom J, Tiitta S, M\u00e4ntyl\u00e4 M (2004) InfoRadar: Group and public messaging in mobile context. In: Proceedings of NordiCHI04\u2019. ACM Press, New York, pp 131\u2013140","DOI":"10.1145\/1028014.1028035"},{"key":"200_CR67","doi-asserted-by":"crossref","unstructured":"Persson P, Espinoza F, Fagerberg P, Sandin A, C\u00f6ster R (2003) GeoNotes: a location-based information system for public spaces. In: Designing information spaces: the social navigation approach. Springer, London, pp 151\u2013173","DOI":"10.1007\/978-1-4471-0035-5_7"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-008-0200-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-008-0200-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-008-0200-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T19:26:01Z","timestamp":1708802761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-008-0200-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,11]]},"references-count":67,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["200"],"URL":"http:\/\/dx.doi.org\/10.1007\/s00779-008-0200-9","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,4,11]]}}}