This article sets out findings from research exploring approaches to innovation at makerspaces in Egypt, Tunisia, and Morocco. Based on interviews with individuals involved in makerspaces in each country—seven spaces in Egypt, two in Tunisia, and one in Morocco—we provide findings on the origins and general characteristics of the spaces, as well as findings on five core themes that emerged from the interviews: knowledge-sharing; innovation and product development; openness, collaboration, and innovation ownership; attitudes towards intellectual property (IP); and scaling.
{"title":"Innovation Practices at Makerspaces in Egypt, Tunisia and Morocco","authors":"Nagham ElHoussamy, Nagla Rizk","doi":"10.23962/10539/30357","DOIUrl":"https://doi.org/10.23962/10539/30357","url":null,"abstract":"This article sets out findings from research exploring approaches to innovation at makerspaces in Egypt, Tunisia, and Morocco. Based on interviews with individuals involved in makerspaces in each country—seven spaces in Egypt, two in Tunisia, and one in Morocco—we provide findings on the origins and general characteristics of the spaces, as well as findings on five core themes that emerged from the interviews: knowledge-sharing; innovation and product development; openness, collaboration, and innovation ownership; attitudes towards intellectual property (IP); and scaling.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42982385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This study explores the current state and dynamics of the global Indigenous data sovereignty movement—the movement pressing for Indigenous peoples to have full control over the collection and governance of data relating to their lived realities. The article outlines the movement’s place within the broader push for Indigenous self-determination; examines its links to big data, open data, intellectual property rights, and access and benefit-sharing; details a pioneering assertion of data sovereignty by Canada’s First Nations; outlines relevant UN and international civil society processes; and examines the nascent movement in Africa. The study identifies a fundamental tension between the objectives of Indigenous data sovereignty and those of the open data movement, which does not directly cater for Indigenous peoples’ full control over their data. The study also identifies the need for African Indigenous peoples to become more fully integrated into the global Indigenous data sovereignty movement.
{"title":"Indigenous Peoples, Data Sovereignty, and Self-Determination: Current Realities and Imperatives","authors":"Chidi Oguamanam","doi":"10.23962/10539/30360","DOIUrl":"https://doi.org/10.23962/10539/30360","url":null,"abstract":"Abstract This study explores the current state and dynamics of the global Indigenous data sovereignty movement—the movement pressing for Indigenous peoples to have full control over the collection and governance of data relating to their lived realities. The article outlines the movement’s place within the broader push for Indigenous self-determination; examines its links to big data, open data, intellectual property rights, and access and benefit-sharing; details a pioneering assertion of data sovereignty by Canada’s First Nations; outlines relevant UN and international civil society processes; and examines the nascent movement in Africa. The study identifies a fundamental tension between the objectives of Indigenous data sovereignty and those of the open data movement, which does not directly cater for Indigenous peoples’ full control over their data. The study also identifies the need for African Indigenous peoples to become more fully integrated into the global Indigenous data sovereignty movement.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48206503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social media has become a major factor within the operations and functions of radio stations. This study used a social media maturity model (SMMM), developed from available literature, to assess the social media maturity of a South Africa community radio station, Rhodes Music Radio (RMR). The study found that RMR had a level 3 rating on a 5-level maturity scale, indicating that it was quite, but not yet fully, mature in its social media use. In addition to outlining the research and its findings, this article makes recommendations for how the station could increase the maturity of its social media use.
{"title":"Assessing the Social Media Maturity of a Community Radio Station: The Case of Rhodes Music Radio in South Africa","authors":"Mudiwa A. Gavaza, N. Pearse","doi":"10.23962/10539/28661","DOIUrl":"https://doi.org/10.23962/10539/28661","url":null,"abstract":"Social media has become a major factor within the operations and functions of radio stations. This study used a social media maturity model (SMMM), developed from available literature, to assess the social media maturity of a South Africa community radio station, Rhodes Music Radio (RMR). The study found that RMR had a level 3 rating on a 5-level maturity scale, indicating that it was quite, but not yet fully, mature in its social media use. In addition to outlining the research and its findings, this article makes recommendations for how the station could increase the maturity of its social media use.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49154322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article identifies a data governance model that could help reduce dataset access inequities currently experienced by smallholder farmers in both developed-world and developing-world settings. Agricultural data is globally recognised for its importance in addressing food insecurity, with such data generated and used by a value chain of contributors, collectors, and users. Guided by the modified institutional analysis and development (IAD) framework, our study considered the features of agricultural data as a “knowledge commons” resource. The study also looked at existing data collection modalities practiced by John Deere, Plantwise and Abalobi, and at the open data distribution modalities available under the Creative Commons and the Open Data Commons licensing frameworks. The study found that an “agricultural data commons” model could give greater agency to the smallholder farmers who contribute data. A model open data licence could be used by data collectors, supported by a certification mark and a dedicated public interest organisation. These features could engender an agricultural data commons that would be advantageous to the three key stakeholders in agricultural data: data contributors, who need engagement, privacy, control, and benefit-sharing; small and medium-sized-enterprise (SME) data collectors, who need sophisticated legal tools and an ability to brand their participation in opening data; and data users, who need open access.
{"title":"A Proposed “Agricultural Data Commons” in Support of Food Security","authors":"J. Baarbé, M. Blom, J. de Beer","doi":"10.23962/10539/27534","DOIUrl":"https://doi.org/10.23962/10539/27534","url":null,"abstract":"This article identifies a data governance model that could help reduce dataset access inequities currently experienced by smallholder farmers in both developed-world and developing-world settings. Agricultural data is globally recognised for its importance in addressing food insecurity, with such data generated and used by a value chain of contributors, collectors, and users. Guided by the modified institutional analysis and development (IAD) framework, our study considered the features of agricultural data as a “knowledge commons” resource. The study also looked at existing data collection modalities practiced by John Deere, Plantwise and Abalobi, and at the open data distribution modalities available under the Creative Commons and the Open Data Commons licensing frameworks. The study found that an “agricultural data commons” model could give greater agency to the smallholder farmers who contribute data. A model open data licence could be used by data collectors, supported by a certification mark and a dedicated public interest organisation. These features could engender an agricultural data commons that would be advantageous to the three key stakeholders in agricultural data: data contributors, who need engagement, privacy, control, and benefit-sharing; small and medium-sized-enterprise (SME) data collectors, who need sophisticated legal tools and an ability to brand their participation in opening data; and data users, who need open access.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42688390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article examines the asymmetry that currently exists in South Africa in the regulatory treatment of customer data usage by mobile network operators (MNOs) and over-the-top (OTT) service providers. MNOs and OTTs must receive customer “consent”, in terms of the Protection of Personal Information Act (POPI Act) and its Regulations, before sharing the customer’s “personal information” with a third party. But MNOs have an additional requirement to meet, in terms of the Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA), which is not applicable to OTTs: a requirement whereby a customer must provide “written authorisation” to an MNO before the MNO can share “communication-related information which relates to the customer con cerned” with a third party. In this article, I examine and analyse provisions of the POPI Act, POPI Act Regulations, RICA, other relevant legislation, court decisions, records of a Parliamentary hearing, the standard terms and conditions and privacy policies of two South African MNOs (Vodacom and MTN), and two international OTT service providers (Google and Facebook). Based on the analysis, I argue that the unequal regulatory treatment between the MNOs and OTTs, if allowed to persist, threatens to undermine the growth of key elements of South Africa’s digital economy.
{"title":"Asymmetry in South Africa’s Regulation of Customer Data Protection: Unequal Treatment between Mobile Network Operators (MNOs) and Over-the-Top (OTT) Service Providers","authors":"Stanley Shanapinda","doi":"10.23962/10539/27536","DOIUrl":"https://doi.org/10.23962/10539/27536","url":null,"abstract":"This article examines the asymmetry that currently exists in South Africa in the regulatory treatment of customer data usage by mobile network operators (MNOs) and over-the-top (OTT) service providers. MNOs and OTTs must receive customer “consent”, in terms of the Protection of Personal Information Act (POPI Act) and its Regulations, before sharing the customer’s “personal information” with a third party. But MNOs have an additional requirement to meet, in terms of the Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA), which is not applicable to OTTs: a requirement whereby a customer must provide “written authorisation” to an MNO before the MNO can share “communication-related information which relates to the customer con cerned” with a third party. In this article, I examine and analyse provisions of the POPI Act, POPI Act Regulations, RICA, other relevant legislation, court decisions, records of a Parliamentary hearing, the standard terms and conditions and privacy policies of two South African MNOs (Vodacom and MTN), and two international OTT service providers (Google and Facebook). Based on the analysis, I argue that the unequal regulatory treatment between the MNOs and OTTs, if allowed to persist, threatens to undermine the growth of key elements of South Africa’s digital economy.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42152274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kenya’s Copyright (Amendment) Bill, 2017, is nearing its final stage of consideration by Parliament. In this article, we provide a review of the Bill’s provisions in respect of its treatment of internet intermediaries, specifically internet service providers (ISPs). We seek to establish the impact that the intermediary liability provisions in the Bill could have on ISPs’ operations if the Bill is passed into law in its present form. We applaud the Bill’s provision for a “safe harbours” regime, whereby ISPs would incur no liability, or limited liability, for certain specific intermediary actions. However, we also note that the framing of the Bill’s notice-and-takedown provisions would require quasi-judicial skills on the part of ISPs, which may not be appropriate. We conclude by providing recommendations for how legislators could address the weaknesses in the Bill’s treatment of ISPs.
{"title":"Treatment of Kenya’s Internet Service Providers (ISPs) under the Kenya Copyright (Amendment) Bill, 2017","authors":"J. Walubengo, Mercy Mutemi","doi":"10.23962/10539/27532","DOIUrl":"https://doi.org/10.23962/10539/27532","url":null,"abstract":"Kenya’s Copyright (Amendment) Bill, 2017, is nearing its final stage of consideration by Parliament. In this article, we provide a review of the Bill’s provisions in respect of its treatment of internet intermediaries, specifically internet service providers (ISPs). We seek to establish the impact that the intermediary liability provisions in the Bill could have on ISPs’ operations if the Bill is passed into law in its present form. We applaud the Bill’s provision for a “safe harbours” regime, whereby ISPs would incur no liability, or limited liability, for certain specific intermediary actions. However, we also note that the framing of the Bill’s notice-and-takedown provisions would require quasi-judicial skills on the part of ISPs, which may not be appropriate. We conclude by providing recommendations for how legislators could address the weaknesses in the Bill’s treatment of ISPs.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48581688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book Review: Telecommunications Law and Regulation in Nigeria","authors":"P. Obutte","doi":"10.23962/10539/27530","DOIUrl":"https://doi.org/10.23962/10539/27530","url":null,"abstract":"","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41451274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The World Intellectual Property Organisation (WIPO) has, for nearly two decades, engaged in formulating the nature and content of a text-based legal instrument or instruments for the effective protection of genetic resources (GRs), traditional knowledge (TK), and traditional cultural expressions (TCEs, also known as folklore) within or relating to the international intellectual property (IP) system. This task has been the job of WIPO’s Intergovernmental Committee on Intellectual Property and Genetic Resources, Traditional Knowledge and Folklore (IGC), established in 2000. In this article, I explore the context and rationales for, and evolution of, one of the IGC’s evolving contributions: development of a tiered or differentiated approach to the protection of TK and TCEs. The article discusses and analyses the empirical ramifications and challenges of the tiered approach — alternatively referred to as differentiated approach — with reference to examples of forms of TK and TCE in Africa, North America and Australia. I conclude that the approach is a work in progress, still evolving, which provides a useful broad policy framework at the international level while, at the same time, its details are contingent on many considerations better addressed at national and local levels.
{"title":"Towards a Tiered or Differentiated Approach to Protection of Traditional Knowledge (TK) and Traditional Cultural Expressions (TCEs) in Relation to the Intellectual Property System","authors":"Chidi Oguamanam","doi":"10.2139/ssrn.3412293","DOIUrl":"https://doi.org/10.2139/ssrn.3412293","url":null,"abstract":"The World Intellectual Property Organisation (WIPO) has, for nearly two decades, engaged in formulating the nature and content of a text-based legal instrument or instruments for the effective protection of genetic resources (GRs), traditional knowledge (TK), and traditional cultural expressions (TCEs, also known as folklore) within or relating to the international intellectual property (IP) system. This task has been the job of WIPO’s Intergovernmental Committee on Intellectual Property and Genetic Resources, Traditional Knowledge and Folklore (IGC), established in 2000. In this article, I explore the context and rationales for, and evolution of, one of the IGC’s evolving contributions: development of a tiered or differentiated approach to the protection of TK and TCEs. The article discusses and analyses the empirical ramifications and challenges of the tiered approach — alternatively referred to as differentiated approach — with reference to examples of forms of TK and TCE in Africa, North America and Australia. I conclude that the approach is a work in progress, still evolving, which provides a useful broad policy framework at the international level while, at the same time, its details are contingent on many considerations better addressed at national and local levels.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47036831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The performance of Nigeria’s tertiary education sector has been undermined on numerous occasions by labour conflicts. While these labour disputes are widely reported in the media, there has been only minimal scholarly examination of the discourses that predominate in the media during these conflicts. Using the critical discourse analysis (CDA) and conceptual metaphor (CM) frameworks, this study examined the discursive features of a labour conflict in 2013 between the Academic Staff Union of Universities (ASUU) and the Federal Government of Nigeria (FGN). Statements by ASUU and FGN officials and their supporters, as published by Nigerian print and online news sources during the dispute, were purposively sampled, along with media outlets’ editorial statements and readers’ online comments. It was found that the labour dispute was discursively and metaphorically constructed in militaristic terms, as a conflict between two enemies engaged in a kind of battle or war. It was also found that both ASUU and the FGN engaged in propagandistic discourses in line with their militaristic discursive constructions, and that the two sides propagated disparaging discourses in respect of each other’s motivations and behaviours. It was also found that certain readers reproduced elements of the prevailing discourses in their online comments on media coverage of the strike.
{"title":"The Role of Discursive Constructions in Nigeria’s ASUU-FGN Labour Conflict of 2013","authors":"Samuel Alaba Akinwotu","doi":"10.23962/10539/27531","DOIUrl":"https://doi.org/10.23962/10539/27531","url":null,"abstract":"The performance of Nigeria’s tertiary education sector has been undermined on numerous occasions by labour conflicts. While these labour disputes are widely reported in the media, there has been only minimal scholarly examination of the discourses that predominate in the media during these conflicts. Using the critical discourse analysis (CDA) and conceptual metaphor (CM) frameworks, this study examined the discursive features of a labour conflict in 2013 between the Academic Staff Union of Universities (ASUU) and the Federal Government of Nigeria (FGN). Statements by ASUU and FGN officials and their supporters, as published by Nigerian print and online news sources during the dispute, were purposively sampled, along with media outlets’ editorial statements and readers’ online comments. It was found that the labour dispute was discursively and metaphorically constructed in militaristic terms, as a conflict between two enemies engaged in a kind of battle or war. It was also found that both ASUU and the FGN engaged in propagandistic discourses in line with their militaristic discursive constructions, and that the two sides propagated disparaging discourses in respect of each other’s motivations and behaviours. It was also found that certain readers reproduced elements of the prevailing discourses in their online comments on media coverage of the strike.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41378580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Mbanaso, Lucienne Abrahams, Oghenevovwero Zion Apene
African countries are at high risk with respect to cybersecurity breaches and are experiencing substantial financial losses. Amongst the top cybersecurity frameworks, many focus on guidelines with respect to detection, protection and response, but few offer formal frameworks for measuring actual cybersecurity resilience. This article presents the conceptual design for a cybersecurity resilience maturity measurement (CRMM) framework to be applied in organisations, notably for critical information infrastructure (CII), as part of cyber risk management treatment. The main thrusts of the framework are to establish, through assessment in terms of quantitative measures, which cybersecurity controls exist in an organisation, how effective and efficient these controls are with respect to cybersecurity resilience, and steps that need to be taken to improve resilience maturity. The CRMM framework we outline is conceptualised as being applicable both preand post-cyber attack. Drawing on the NIST cybersecurity framework (NIST CSF) and other relevant frameworks, the CRMM approach conceptualised in this article would be able to depict an organisation’s cybersecurity practices and gauge the organisation’s cybersecurity maturity at regular intervals. This CRMM approach is grounded in the idea that, by quantifying an organisation’s current practices against established baseline security controls and global best practices, the resulting status measurement can provide the appropriate basis for managing cyber risk in a consistent and proportionate fashion. The CRMM framework defines four cybersecurity resilience quadrants (CRQs), which depict four different degrees of organisational preparedness, in terms of both risk and resilience.
{"title":"Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework","authors":"U. Mbanaso, Lucienne Abrahams, Oghenevovwero Zion Apene","doi":"10.23962/10539/27535","DOIUrl":"https://doi.org/10.23962/10539/27535","url":null,"abstract":"African countries are at high risk with respect to cybersecurity breaches and are experiencing substantial financial losses. Amongst the top cybersecurity frameworks, many focus on guidelines with respect to detection, protection and response, but few offer formal frameworks for measuring actual cybersecurity resilience. This article presents the conceptual design for a cybersecurity resilience maturity measurement (CRMM) framework to be applied in organisations, notably for critical information infrastructure (CII), as part of cyber risk management treatment. The main thrusts of the framework are to establish, through assessment in terms of quantitative measures, which cybersecurity controls exist in an organisation, how effective and efficient these controls are with respect to cybersecurity resilience, and steps that need to be taken to improve resilience maturity. The CRMM framework we outline is conceptualised as being applicable both preand post-cyber attack. Drawing on the NIST cybersecurity framework (NIST CSF) and other relevant frameworks, the CRMM approach conceptualised in this article would be able to depict an organisation’s cybersecurity practices and gauge the organisation’s cybersecurity maturity at regular intervals. This CRMM approach is grounded in the idea that, by quantifying an organisation’s current practices against established baseline security controls and global best practices, the resulting status measurement can provide the appropriate basis for managing cyber risk in a consistent and proportionate fashion. The CRMM framework defines four cybersecurity resilience quadrants (CRQs), which depict four different degrees of organisational preparedness, in terms of both risk and resilience.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45503861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}