Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994385
D. Goodhue, Eleanor T. Loiacono-Mello
There has been a quiet debate about the proper way to design a questionnaire when multiple questions measure each construct. Two general arguments favor intermixing the questions randomly with those of other constructs; one argument favors grouping together questions that measure a single construct. This study tests these arguments using two different versions of a Web quality instrument. One version has questions grouped and labeled, and the other has questions randomly intermixed. Six hundred and three undergraduate students filled out questionnaires, half in each condition. Several different analyses suggest that the grouped question treatment has higher calculated Cronbach's alpha reliabilities than intermixed questions, but is actually less reliable.
{"title":"Randomizing survey question order vs. grouping questions by construct: an empirical test of the impact on apparent reliabilities and links to related constructs","authors":"D. Goodhue, Eleanor T. Loiacono-Mello","doi":"10.1109/HICSS.2002.994385","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994385","url":null,"abstract":"There has been a quiet debate about the proper way to design a questionnaire when multiple questions measure each construct. Two general arguments favor intermixing the questions randomly with those of other constructs; one argument favors grouping together questions that measure a single construct. This study tests these arguments using two different versions of a Web quality instrument. One version has questions grouped and labeled, and the other has questions randomly intermixed. Six hundred and three undergraduate students filled out questionnaires, half in each condition. Several different analyses suggest that the grouped question treatment has higher calculated Cronbach's alpha reliabilities than intermixed questions, but is actually less reliable.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128994752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994090
Hoyoung Kim, Jinwoo Kim, Yeonsoo Lee, Minhee Chae, Youngwan Choi
Mobile Internet, which is a combination of the Internet with mobile devices, is becoming increasingly popular. Mobile Internet is primarily different from stationary Internet in that it may be used in various contexts, whereas stationary Internet is mostly used in predetermined environments. However, it is far from clear in what places and situations mobile Internet has been used and what the impact of the contexts has been on the ease of use. This paper proposes a framework for studying the use context relevant to mobile Internet. It then presents the results of an empirical study of the use context and service usability for mobile Internet using monitoring methods. The results indicate that the use contexts of mobile Internet are concentrated rather than being widely diverse. Moreover, the different contexts present unique usability problems. The paper concludes by discussing the theoretical and practical implications of the results.
{"title":"An empirical study of the use contexts and usability problems in mobile Internet","authors":"Hoyoung Kim, Jinwoo Kim, Yeonsoo Lee, Minhee Chae, Youngwan Choi","doi":"10.1109/HICSS.2002.994090","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994090","url":null,"abstract":"Mobile Internet, which is a combination of the Internet with mobile devices, is becoming increasingly popular. Mobile Internet is primarily different from stationary Internet in that it may be used in various contexts, whereas stationary Internet is mostly used in predetermined environments. However, it is far from clear in what places and situations mobile Internet has been used and what the impact of the contexts has been on the ease of use. This paper proposes a framework for studying the use context relevant to mobile Internet. It then presents the results of an empirical study of the use context and service usability for mobile Internet using monitoring methods. The results indicate that the use contexts of mobile Internet are concentrated rather than being widely diverse. Moreover, the different contexts present unique usability problems. The paper concludes by discussing the theoretical and practical implications of the results.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124687725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994104
M. Iding, B. Auernheimer, M. Crosby, B. Klemm
This paper is are overview of central issues for effective evaluation of Web-based instructional materials. It describes relevant issues from the perspectives of practitioners in the fields of computer science, educational psychology, and teacher education. In addition, it describes educator concerns, reviews relevant aspects of HCI, usability, and educational research, and provides an overview of usability evaluation.
{"title":"Guidelines for designing evaluations of Web-based instructional materials","authors":"M. Iding, B. Auernheimer, M. Crosby, B. Klemm","doi":"10.1109/HICSS.2002.994104","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994104","url":null,"abstract":"This paper is are overview of central issues for effective evaluation of Web-based instructional materials. It describes relevant issues from the perspectives of practitioners in the fields of computer science, educational psychology, and teacher education. In addition, it describes educator concerns, reviews relevant aspects of HCI, usability, and educational research, and provides an overview of usability evaluation.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.993860
P. Lowry, J. Nunamaker
Collaborative writing (CW) in policy agenda setting and grant development is an important aspect of community development. However, solutions need to be found to better deal with distributed CW. The paper establishes a basis for improving distributed CW for policy agenda setting, and similar efforts, by using an Internet-based collaborative tool. This work utilizes key research to better understand the constructs and potential outcomes of CW. Findings include that using Collaboratus for distributed CW can provide significant improvements over traditional methods, potentially benefiting those involved in distributed rural community development initiatives and similar efforts.
{"title":"Synchronous, distributed collaborative writing for policy agenda setting using Collaboratus, an Internet-based collaboration tool","authors":"P. Lowry, J. Nunamaker","doi":"10.1109/HICSS.2002.993860","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993860","url":null,"abstract":"Collaborative writing (CW) in policy agenda setting and grant development is an important aspect of community development. However, solutions need to be found to better deal with distributed CW. The paper establishes a basis for improving distributed CW for policy agenda setting, and similar efforts, by using an Internet-based collaborative tool. This work utilizes key research to better understand the constructs and potential outcomes of CW. Findings include that using Collaboratus for distributed CW can provide significant improvements over traditional methods, potentially benefiting those involved in distributed rural community development initiatives and similar efforts.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123156003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994366
Batya Friedman, D. Howe, E. Felten
Reports on one of the first efforts to apply value-sensitive design (VSD) to a large-scale real-world software system. We sought to improve informed consent in Web-based interactions through the development of new technical mechanisms for cookie management. We describe our VSD methodology, explicate criteria for informed consent in online interactions and summarize how current browsers fall short with respect to those criteria. Next, we identify four goals for the redesign of current browsers. These goals, in turn, initiate an iterative design process that lies at the heart of the VSD methodology wherein we move among the design and implementation of new technical mechanisms, formative evaluation and the design goals coupled with the criteria for informed consent online. Key mechanisms include peripheral awareness of cookies and just-in-time interventions. At various phases in the design process, we implement our design improvements in the Mozilla browser (the open source for Netscape Navigator).
{"title":"Informed consent in the Mozilla browser: implementing value-sensitive design","authors":"Batya Friedman, D. Howe, E. Felten","doi":"10.1109/HICSS.2002.994366","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994366","url":null,"abstract":"Reports on one of the first efforts to apply value-sensitive design (VSD) to a large-scale real-world software system. We sought to improve informed consent in Web-based interactions through the development of new technical mechanisms for cookie management. We describe our VSD methodology, explicate criteria for informed consent in online interactions and summarize how current browsers fall short with respect to those criteria. Next, we identify four goals for the redesign of current browsers. These goals, in turn, initiate an iterative design process that lies at the heart of the VSD methodology wherein we move among the design and implementation of new technical mechanisms, formative evaluation and the design goals coupled with the criteria for informed consent online. Key mechanisms include peripheral awareness of cookies and just-in-time interventions. At various phases in the design process, we implement our design improvements in the Mozilla browser (the open source for Netscape Navigator).","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"615 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994389
P. Beckman, Å. Forsman
The standard method for measuring the "value" of a researcher is to sum the total number of articles they have published in peer-reviewed journals. The research described proposes the use of "degrees-of-separation" (DOS) as another dimension that considers collaboration along which we might assess the value of a researcher: The average DOS value for one node in a graph is the average of the number of steps in each of its shortest paths to each other node. The graph node with the smallest average DOS value is the node that is, on average, "most closely connected" to the rest of the nodes. When applied to academic research, an author can be considered a node, connected to other nodes through co-authored articles. The experiment described in the article uses DOS to rank and compare with earlier rankings, those MIS researchers previously judged to be highly productive.
{"title":"Kevin Bacon, degrees-of-separation, and MIS research","authors":"P. Beckman, Å. Forsman","doi":"10.1109/HICSS.2002.994389","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994389","url":null,"abstract":"The standard method for measuring the \"value\" of a researcher is to sum the total number of articles they have published in peer-reviewed journals. The research described proposes the use of \"degrees-of-separation\" (DOS) as another dimension that considers collaboration along which we might assess the value of a researcher: The average DOS value for one node in a graph is the average of the number of steps in each of its shortest paths to each other node. The graph node with the smallest average DOS value is the node that is, on average, \"most closely connected\" to the rest of the nodes. When applied to academic research, an author can be considered a node, connected to other nodes through co-authored articles. The experiment described in the article uses DOS to rank and compare with earlier rankings, those MIS researchers previously judged to be highly productive.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994515
Sean Landis, V. Vasudevan
Jini has made considerable inroads as an enterprise computing platform, but it hasn't fulfilled its promise as an ubiquitous computing platform for thin clients. A roadblock has been that full participation in a Jini community requires devices to support a fully capable Java virtual machine, something that is a challenge for mobile devices (e.g., cellphones). The Jini Surrogate specification aims to provide a service gateway that enables limited Java devices to hook into a Jini network, eliminating the need for Jini on the device. The paper describes the Jini Surrogate Architecture, its benefits in enabling wireless access to Jini services, and the implementation and performance issues uncovered in implementing surrogate-based services. The paper discusses several application architectures that can leverage the surrogate approach. These include exporting enterprise services from the wired Internet to the wireless Internet, and enabling a thin-client mobile agent platform that implements migratory services. These application architectures are being further explored as part of the Arches project.
{"title":"Reaching out to the cell phone with Jini","authors":"Sean Landis, V. Vasudevan","doi":"10.1109/HICSS.2002.994515","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994515","url":null,"abstract":"Jini has made considerable inroads as an enterprise computing platform, but it hasn't fulfilled its promise as an ubiquitous computing platform for thin clients. A roadblock has been that full participation in a Jini community requires devices to support a fully capable Java virtual machine, something that is a challenge for mobile devices (e.g., cellphones). The Jini Surrogate specification aims to provide a service gateway that enables limited Java devices to hook into a Jini network, eliminating the need for Jini on the device. The paper describes the Jini Surrogate Architecture, its benefits in enabling wireless access to Jini services, and the implementation and performance issues uncovered in implementing surrogate-based services. The paper discusses several application architectures that can leverage the surrogate approach. These include exporting enterprise services from the wired Internet to the wireless Internet, and enabling a thin-client mobile agent platform that implements migratory services. These application architectures are being further explored as part of the Arches project.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994132
C. LeRouge, Monica J. Garfield, A. Hevner
Video conferencing is used increasingly in many telemedicine applications, including medical personnel education, peer consultation, patient education, and direct patient care. Advances in technology and changes in medical care delivery have enhanced the ability to develop effective telemedicine video conferencing systems. Measures of effectiveness for technology systems rely on identified requirements,for system quality. In this research, we propose a comprehensive model of quality attributes for telemedicine video conferencing systems. The quality attribute model is developed from an extensive literature review, direct observations of telemedicine encounters, and structured interviews with telemedicine experts. The model contains four quality attribute groups: Technical, Usability, Physical Environment, and Human Element. Interview citations are used to justify the importance of these individual quality attributes. Both researchers and practitioners can make use of the model to understand, design, and evaluate telemedicine video conferencing systems.
{"title":"Quality attributes in telemedicine video conferencing","authors":"C. LeRouge, Monica J. Garfield, A. Hevner","doi":"10.1109/HICSS.2002.994132","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994132","url":null,"abstract":"Video conferencing is used increasingly in many telemedicine applications, including medical personnel education, peer consultation, patient education, and direct patient care. Advances in technology and changes in medical care delivery have enhanced the ability to develop effective telemedicine video conferencing systems. Measures of effectiveness for technology systems rely on identified requirements,for system quality. In this research, we propose a comprehensive model of quality attributes for telemedicine video conferencing systems. The quality attribute model is developed from an extensive literature review, direct observations of telemedicine encounters, and structured interviews with telemedicine experts. The model contains four quality attribute groups: Technical, Usability, Physical Environment, and Human Element. Interview citations are used to justify the importance of these individual quality attributes. Both researchers and practitioners can make use of the model to understand, design, and evaluate telemedicine video conferencing systems.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131374465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994532
Wooyoung Kim, S. Graupner, Akhil Sahai
Peer-to-peer computing (P2P) draws growing interest as a new distributed computing paradigm for its potential to harness "edge" computers (e.g., PCs) and make their under-utilized resources available to each other. P2P based e-commerce on the Internet is of particular interest because of P2P's cost effectiveness and redundancy-induced dependability. Beneath the promising benefits lie daunting challenges of supporting security, reliability, resilience, and scalability. In particular, scalable discovery and secure transaction are of paramount importance due to the sheer size and the laissez,faire nature of the Internet. E-Speak is an e-services infrastructure where services advertise, discover, and interoperate each other in a dynamic and secure way. The E-Speak security adopts a multi-layered approach and builds a range of protection mechanisms on top of the Public Key Infrastructure. The E-Speak advertising services have a dynamic pluggable architecture and implement a scalable wide-area discovery based on distributed queries. We argue that E-Speak may be used as the common secure, scalable infrastructure for different multiple P2P applications.
{"title":"A secure platform for peer-to-peer computing in the Internet","authors":"Wooyoung Kim, S. Graupner, Akhil Sahai","doi":"10.1109/HICSS.2002.994532","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994532","url":null,"abstract":"Peer-to-peer computing (P2P) draws growing interest as a new distributed computing paradigm for its potential to harness \"edge\" computers (e.g., PCs) and make their under-utilized resources available to each other. P2P based e-commerce on the Internet is of particular interest because of P2P's cost effectiveness and redundancy-induced dependability. Beneath the promising benefits lie daunting challenges of supporting security, reliability, resilience, and scalability. In particular, scalable discovery and secure transaction are of paramount importance due to the sheer size and the laissez,faire nature of the Internet. E-Speak is an e-services infrastructure where services advertise, discover, and interoperate each other in a dynamic and secure way. The E-Speak security adopts a multi-layered approach and builds a range of protection mechanisms on top of the Public Key Infrastructure. The E-Speak advertising services have a dynamic pluggable architecture and implement a scalable wide-area discovery based on distributed queries. We argue that E-Speak may be used as the common secure, scalable infrastructure for different multiple P2P applications.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-01-07DOI: 10.1109/HICSS.2002.994001
P. Gmytrasiewicz, Matthew Summers, Dhruva Gopal
The aim of our research is to understand and automate the mechanisms by which language can emerge among artificial, knowledge-based and rational agents. We want to design and implement agents that, upon encountering other agent(s) with which they do not share an agent communication language, are able to initiate creation of, and further are able to evolve and enrich, a mutually understandable communication language. Our research is supported by the principled methodology of designing rational, socially competent artificial agents based on Bayesian probability and decision theories, and on the research in linguistics and cognitive psychology that addresses the issues of function, mechanisms, development, and evolutionary history of natural languages. In our work, we express some of the key insights obtained in linguistics and cognitive science in formal terms of decision theory and game-theoretic. mechanism design. We propose that the evolution of an agent communication language can be accomplished by the mechanism of negotiation, developed in economics and game theory, and automated in recent work in artificial intelligence. Negotiation is suitable because it can be mapped to settings in which rational interacting agents could use communication for their mutual, yet selfish, benefits. The agents can make mutually beneficial agreements that will allow efficient communication, but they have a conflict of interest about which language constructs to use each would prefer a communication language that is easier and less costly to use from their own individual perspective.
{"title":"Toward automated evolution of agent communication languages","authors":"P. Gmytrasiewicz, Matthew Summers, Dhruva Gopal","doi":"10.1109/HICSS.2002.994001","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994001","url":null,"abstract":"The aim of our research is to understand and automate the mechanisms by which language can emerge among artificial, knowledge-based and rational agents. We want to design and implement agents that, upon encountering other agent(s) with which they do not share an agent communication language, are able to initiate creation of, and further are able to evolve and enrich, a mutually understandable communication language. Our research is supported by the principled methodology of designing rational, socially competent artificial agents based on Bayesian probability and decision theories, and on the research in linguistics and cognitive psychology that addresses the issues of function, mechanisms, development, and evolutionary history of natural languages. In our work, we express some of the key insights obtained in linguistics and cognitive science in formal terms of decision theory and game-theoretic. mechanism design. We propose that the evolution of an agent communication language can be accomplished by the mechanism of negotiation, developed in economics and game theory, and automated in recent work in artificial intelligence. Negotiation is suitable because it can be mapped to settings in which rational interacting agents could use communication for their mutual, yet selfish, benefits. The agents can make mutually beneficial agreements that will allow efficient communication, but they have a conflict of interest about which language constructs to use each would prefer a communication language that is easier and less costly to use from their own individual perspective.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}