{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:28:05Z","timestamp":1732037285640},"reference-count":96,"publisher":"Oxford University Press (OUP)","issue":"2","license":[{"start":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T00:00:00Z","timestamp":1505088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/501100003130","name":"FWO","doi-asserted-by":"publisher","award":["12Q9815N"],"id":[{"id":"10.13039\/501100003130","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6,1]]},"DOI":"10.1093\/llc\/fqx049","type":"journal-article","created":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T11:57:30Z","timestamp":1518004650000},"page":"391-424","source":"Crossref","is-referenced-by-count":17,"title":["The rationale of the born-digital dossier g\u00e9n\u00e9tique: Digital forensics and the writing process: With examples from the Thomas Kling Archive"],"prefix":"10.1093","volume":"33","author":[{"given":"Thorsten","family":"Ries","sequence":"first","affiliation":[{"name":"Ghent University, Belgium"}]}],"member":"286","published-online":{"date-parts":[[2017,9,11]]},"reference":[{"key":"key\n\t\t\t\t20180516035552_fqx049-B1","author":"Andreasen","year":"2016"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B2","author":"Bednar","year":"2011"},{"issue":"3","key":"key\n\t\t\t\t20180516035552_fqx049-B3","first-page":"article 1","article-title":"Solid state drives: the beginning of the end for current practice in digital forensic recovery?","volume":"5","author":"Bell","year":"2010","journal-title":"Journal of Digital Forensics, Security and Law"},{"issue":"7\u20138","key":"key\n\t\t\t\t20180516035552_fqx049-B4","first-page":"903","article-title":"The digital signature dilemma","volume":"61","author":"Blanchette","year":"2006","journal-title":"Annals of Telecommunications"},{"issue":"6","key":"key\n\t\t\t\t20180516035552_fqx049-B5","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1002\/asi.21542","article-title":"A material history of bits","volume":"62","author":"Blanchette","year":"2011","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B6","doi-asserted-by":"crossref","volume-title":"Burdens of Proof. Cryptographic Culture and Evidence Law in the Age of Electronic Documents","author":"Blanchette","year":"2012","DOI":"10.7551\/mitpress\/9780262017510.001.0001"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B7","doi-asserted-by":"crossref","volume-title":"The Fluid Text: A Theory of Revision and Editing for Book and Screen","author":"Bryant","year":"2002","DOI":"10.3998\/mpub.12024"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B8","author":"bwFLA","year":"1992-2016"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B9","author":"Carrier","year":"2003"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B10","first-page":"61","article-title":"A comprehensive approach to born-digital archives","volume":"72","author":"Carroll","year":"2011","journal-title":"Archivaria"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B11","volume-title":"Windows forensic analysis toolkit. Advanced analysis techniques for windows 8","author":"Carvey","year":"2014","edition":"4th ed"},{"issue":"1","key":"key\n\t\t\t\t20180516035552_fqx049-B12","first-page":"7","article-title":"Putting the science in digital forensics","volume":"6","author":"Cohen","year":"2011","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B92","first-page":"17","article-title":"Postdramatic methods of adaptation in the age of digital collaborative writing","author":"Crombez","year":"2017","journal-title":"DSH 32.1"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B13","author":"Dahlstr\u00f6m","year":"2000"},{"issue":"1","key":"key\n\t\t\t\t20180516035552_fqx049-B14","article-title":"Performative materiality and theoretical approaches to interface","volume":"7","author":"Drucker","year":"2013","journal-title":"Digital Humanities Quarterly"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B15","first-page":"39","article-title":"From digital diplomatics to digital records forensics","volume":"68","author":"Duranti","year":"2009","journal-title":"Archivaria"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B16","author":"Duranti","year":"2010"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B17","first-page":"53","volume-title":"Von der \u00dcbernahme zur Benutzung. Aktuelle Entwicklungen in der digitalen Archivierung. 18. Tagung des Arbeitskreises Archivierung von Unterlagen aus digitalen Systemen on 11-12 March 2014 in Weimar","author":"Enge","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B18","author":"Fried","year":"2007"},{"issue":"1","key":"key\n\t\t\t\t20180516035552_fqx049-B19","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.diin.2011.04.001","article-title":"Forensic investigation of OOXML format documents","volume":"8","author":"Fu","year":"2011","journal-title":"Digital Investigation"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B20","doi-asserted-by":"crossref","first-page":"S95","DOI":"10.1016\/j.diin.2015.05.001","article-title":"Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb","volume":"14","author":"Garfinkel","year":"2015","journal-title":"Digital Investigation"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B21","doi-asserted-by":"crossref","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","article-title":"Digital forensics research: the next 10 years","volume":"7","author":"Garfinkel","year":"2010","journal-title":"Digital Investigation"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B22","doi-asserted-by":"crossref","first-page":"S2","DOI":"10.1016\/j.diin.2009.06.016","article-title":"Bringing science to digital forensics with standardized forensic corpora","volume":"6","author":"Garfinkel","year":"2009","journal-title":"Digital Investigation"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B23","volume-title":"Antlitz. Catalog to Christoph Gesing\u2019s exhibitions at Churches St. Agnes, St. Theodor, Katholisches Bildungswerk Cologne","author":"Gesing","year":"2004"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B24","doi-asserted-by":"crossref","volume-title":"Always Already New. Media, History, and the Data of Culture","author":"Gitelman","year":"2006","DOI":"10.7551\/mitpress\/1208.001.0001"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B25","author":"Gubanov","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B26","volume-title":"System ohne General. Schreibszenen im digitalen Zeitalter","author":"Guiriato","year":"2006"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B28","doi-asserted-by":"crossref","first-page":"160","DOI":"10.3406\/item.2006.1396","article-title":"Le g\u00e9n\u00e9ticien et l'ordinateur. Les trac\u00e9s manuscrits \u00e0 l'\u00e8re num\u00e9rique","volume":"27","author":"Hay","year":"2006","journal-title":"Genesis"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B29","doi-asserted-by":"crossref","volume-title":"My Mother Was a Computer. Digital Subjects and Literary Texts","author":"Hayles","year":"2005","DOI":"10.7208\/chicago\/9780226321493.001.0001"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B93","volume-title":"The pattern on the stone. The simple ideas that make computers work","author":"Hillis","year":"1999"},{"issue":"1)","key":"key\n\t\t\t\t20180516035552_fqx049-B27","doi-asserted-by":"crossref","first-page":"151","DOI":"10.14361\/dcs-2015-0110","article-title":"Signs o\u2019 the times, The software of philology and a philology of software","volume":"1","author":"Hiller","year":"2015","journal-title":"Digital Culture and Society"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B30","first-page":"113","volume-title":"Das Gellen der Tinte. Zum Werk Thomas Klings","author":"Hummelt","year":"2012"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B31","author":"iMal website"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B32","author":"John","year":"2012"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B33","author":"John","year":"2014"},{"issue":"3)","key":"key\n\t\t\t\t20180516035552_fqx049-B34","first-page":"51","article-title":"A study of forensic imaging in the absence of write-blockers","volume":"9","author":"Kesser","year":"2014","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B35","volume-title":"brennstabm","author":"Kling","year":"1991"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B36","volume-title":"nacht. sicht. ger\u00e4t","author":"Kling","year":"1993"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B37","volume-title":"Fernhandel","author":"Kling","year":"1999"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B38","volume-title":"Fernhandel. Gedichte","author":"Kling","year":"1999"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B39","volume-title":"Sondagen","author":"Kling","year":"2002"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B40","volume-title":"Auswertung der Flugdaten","author":"Kling","year":"2005"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B41","doi-asserted-by":"crossref","first-page":"S111","DOI":"10.1016\/j.diin.2011.05.013","article-title":"Empirical analysis of solid state disk data retention when used with contemporary operating systems","volume":"8","author":"King","year":"2011","journal-title":"Digital Investigation"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B42","first-page":"257","volume-title":"The Cambridge Companion to Textual Scholarship","author":"Kirschenbaum","year":"2013"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B43","volume-title":"Mechanisms. New Media and the Forensic Imagination","author":"Kirschenbaum","year":"2008"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B44","volume-title":"LABS lectures","author":"Kirschenbaum","year":"2011"},{"issue":"1","key":"key\n\t\t\t\t20180516035552_fqx049-B45","article-title":"The .txtual condition: digital humanities, born-digital archives, and the future literary","volume":"7","author":"Kirschenbaum","year":"2013","journal-title":"Digital Humanities Quarterly"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B46","author":"Kirschenbaum","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B47","doi-asserted-by":"crossref","volume-title":"Track Changes. A Literary History of Word Processing","author":"Kirschenbaum","year":"2016","DOI":"10.4159\/9780674969469"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B48","volume-title":"Bitstreams. The Future of Digital Literary Heritage","author":"Kirschenbaum","year":"2016"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B49","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/BF03396370","article-title":"Literatur, Edition und Reprographie","volume":"65","author":"Kittler","year":"1991","journal-title":"Deutsche Vierteljahrsschrift f\u00fcr Literaturwissenschaft und Geistesgeschichte"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B50","volume-title":"den sprachn das sentimentale abkn\u00f6pfn. Widmungen zum 50. Geburtstag von Thomas Kling","author":"Kruse","year":"2007"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B51","doi-asserted-by":"crossref","first-page":"159","DOI":"10.3406\/item.2006.1395","article-title":"Le g\u00e9n\u00e9ticien et l'ordinateur. Pr\u00e9sentation","volume":"27","author":"Lebrave","year":"2006","journal-title":"Genesis"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B52","doi-asserted-by":"crossref","first-page":"137","DOI":"10.4000\/genesis.633","article-title":"Computer forensics: la critique g\u00e9n\u00e9tique et l'\u00e9criture num\u00e9rique","volume":"33","author":"Lebrave","year":"2011","journal-title":"Genesis"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B53","author":"Lee","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B54","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-1-4614-0757-7_4","volume-title":"Digital Image Forensics: There is More to a Picture than Meets the Eye","author":"Li","year":"2013"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B55","first-page":"17","volume-title":"Reference and Access. Innovative Practices in Archives and Special Collections","author":"Light","year":"2014"},{"issue":"3","key":"key\n\t\t\t\t20180516035552_fqx049-B56","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1080\/09670882.2013.808873","article-title":"New departures in textual and genetic criticism","volume":"21","author":"Mara","year":"2013","journal-title":"Irish Studies Review"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B57","first-page":"233","volume-title":"Was ist Textkritik? Zur Geschichte und Relevanz eines Zentralbegriffs der Editionswissenschaft","author":"Mathijsen","year":"2009"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B58","volume-title":"Libvshadow. Library and tools to access the Volume Shadow Snapshot (VSS) format","author":"Metz","year":"2011"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B59","author":"Modern Language Association of America","year":"1995"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B60","author":"Owens","year":"2013"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B61","doi-asserted-by":"crossref","first-page":"S2","DOI":"10.1016\/j.diin.2008.05.015","article-title":"Detecting file fragmentation point using sequential hypothesis testing","volume":"5","author":"Pal","year":"2008","journal-title":"Digital Investigation"},{"issue":"4","key":"key\n\t\t\t\t20180516035552_fqx049-B62","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1093\/llc\/fqr033","article-title":"A rationale of digital documentary editions","volume":"26","author":"Pierazzo","year":"2011","journal-title":"Literary and Linguistic Computing"},{"issue":"1","key":"key\n\t\t\t\t20180516035552_fqx049-B63","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.diin.2013.02.003","article-title":"Dropbox analysis: data remnants on user machines","volume":"10","author":"Quick","year":"2013","journal-title":"Digital Investigation"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B64","volume-title":"Born Digital: Guidance for Donors, Dealers, and Archival Repositories","author":"Redwine","year":"2013"},{"issue":"2","key":"key\n\t\t\t\t20180516035552_fqx049-B66","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1017\/S0040557411000421","article-title":"\u201cLast Modified January 1996\u201d. The Digital History of RENT","volume":"52","author":"Reside","year":"2011","journal-title":"Theatre Survey"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B65","author":"Reside","year":"2011"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B67","author":"Reside","year":"2012"},{"issue":"1","key":"key\n\t\t\t\t20180516035552_fqx049-B94","doi-asserted-by":"crossref","first-page":"68","DOI":"10.5860\/rbm.15.1.416","article-title":"File Not Found: Rarity in an Age of Digital Plenty","volume":"15","author":"Reside","year":"2014","journal-title":"RBM: A Journal of Rare Book, Manuscripts, and Cultural History"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B68","first-page":"1","article-title":"Schicksal der Handschrift, Schicksal der Druckschrift. Notizen zur \u201cTextgenese\u201d","volume":"5","author":"Reu\u00df","year":"1999","journal-title":"Text.kritische Beitr\u00e4ge"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B69","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1515\/9783110223163.0.149","article-title":"\"die ger\u00e4te kl\u00fcger als ihre besitzer\u201d. Philologische Durchblicke hinter die Schreibszene des Graphical User Interface. \u00dcberlegungen zur digitalen Quellenphilologie, mit einer textgenetischen Studie zu Michael Speiers ausfahrt st. nazaire","volume":"24","author":"Ries","year":"2010","journal-title":"Editio"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B70","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1515\/9783110231311.159","volume-title":"Materialit\u00e4t in der Editionswissenschaft","author":"Ries","year":"2010"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B71","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1515\/9783110470307-005","volume-title":"Textgenese und digitales Edieren. Wolfgang Koeppens \u00bbJugend\u00ab im Kontext der Editionsphilologie","author":"Ries","year":"2016"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B72","author":"Rockmore","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B73","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.diin.2016.05.001","article-title":"Cloud forensics-Tool development studies & future outlook","volume":"18","author":"Roussev","year":"2016","journal-title":"Digital Investigation"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B74","volume-title":"Digitale Editionsformen. Zum Umgang mit der \u00dcberlieferung unter den Bedingungen des Medienwandels, 2nd of 3 vol.: Befunde, Theorie, Methodik","author":"Sahle","year":"2013"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B75","doi-asserted-by":"crossref","first-page":"19","DOI":"10.11647\/OBP.0095.02","volume-title":"Digital Scholarly Editing. Theories and Practices","author":"Sahle","year":"2016"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B76","volume-title":"Scholarly Editing in the Computer Age: Theory and Practice","author":"Shillingsburg","year":"1986"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B77","doi-asserted-by":"crossref","DOI":"10.3998\/mpub.10431","volume-title":"Scholarly Editing in the Computer Age: Theory and Practice","author":"Shillingsburg","year":"1996","edition":"3rd edn"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B78","author":"Somers","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B79","volume-title":"Portable Media. Schreibszenen in Bewegung zwischen Peripatetik und Mobiltelefon","author":"Stingelin","year":"2009"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B80","author":"Testdisk","year":"2015"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B81","first-page":"57","volume-title":"Thomas Kling. Double Exposure. Catalogue to the exhibition Thomas Kling. Double Exposure at Kunst- und Museumsbibliothek K\u00f6ln 21 Jan to 5 March 2017","author":"Therstappen","year":"2017"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B82","author":"Thomas","year":"2007"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B83","doi-asserted-by":"crossref","volume-title":"Der lange Weg in die Gegenwartsliteratur. Studien zur Geschichte des literarischen Feldes in Deutschland von 1960 bis 2000","author":"Tommek","year":"2015","DOI":"10.1515\/9783110359084"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B84","doi-asserted-by":"crossref","volume-title":"Textual Awareness. A Genetic Study of Late Manuscripts by Joyce, Proust, & Mann","author":"Van Hulle","year":"2004","DOI":"10.3998\/mpub.17739"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B85","author":"Van Hulle","year":"2011"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B95","author":"Vauthier","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B96","author":"Vauthier","year":"2014"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B86","author":"Weber","year":"2016"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B87","article-title":"Thomas Kling. Das brennende Archiv. Unver\u00f6ffentlichte Gedichte, Briefe, Handschriften und Photos aus dem Nachlass sowie zu Lebzeiten entlegen publizierte Gedichte, Essays und Gespr\u00e4che","volume":"76","author":"Wehr","year":"2011","journal-title":"Schreibheft Zeitschrift f\u00fcr Literatur"},{"issue":"1","key":"key\n\t\t\t\t20180516035552_fqx049-B88","doi-asserted-by":"crossref","first-page":"100","DOI":"10.5130\/csr.v20i1.3835","article-title":"Peter Carey's laptop","volume":"20","author":"Wilken","year":"2014","journal-title":"Cultural Studies Review"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B89","first-page":"19","volume-title":"Thomas Kling. Double Exposure. Catalogue to the exhibition Thomas Kling. Double Exposure at Kunst- und Museumsbibliothek K\u00f6ln 21 Jan to 5 March 2017","author":"Wix","year":"2017"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B90","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/978-3-540-89862-7_21","article-title":"Overwriting hard drive data: the great wiping controversy","volume":"5352","author":"Wright","year":"2008","journal-title":"Lecture Notes on Computer Science (LNCS)"},{"key":"key\n\t\t\t\t20180516035552_fqx049-B91","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.diin.2014.12.003","article-title":"Descrambling data on solid-state disks by reverse-engineering the firmware","volume":"12","author":"Zhang","year":"2015","journal-title":"Digital Investigation"}],"container-title":["Digital Scholarship in the Humanities"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/dsh\/article-pdf\/33\/2\/391\/24812171\/fqx049.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T22:03:29Z","timestamp":1693519409000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/dsh\/article\/33\/2\/391\/4111188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,11]]},"references-count":96,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,9,11]]},"published-print":{"date-parts":[[2018,6,1]]}},"URL":"https:\/\/doi.org\/10.1093\/llc\/fqx049","relation":{},"ISSN":["2055-7671","2055-768X"],"issn-type":[{"value":"2055-7671","type":"print"},{"value":"2055-768X","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,6]]},"published":{"date-parts":[[2017,9,11]]}}}