Pub Date : 2020-04-23DOI: 10.1093/he/9780198830559.003.0024
I. Lloyd
Any product can have defects – or at least fail to meet the expectations of a purchaser. A range of statutory provisions confer rights on a party acquiring goods if these are not of satisfactory quality. Software and what is referred to as “digital content” is covered by these provisions although their application gives rise to a number of difficulties. Unlike most physical products where defects will be found in one or a small number of the items, every digital work will be an exact copy of the original. If one product is considered faulty, the same fate may await all of the others. In most instances software is licenced rather than sold. It is commonplace for a licence to seek to restrict or exclude liabilities that might otherwise arise. The question may then be whether the terms of the licence are enforceable. In many instances they may be brought to the customer’s attention after the contract for supply has been concluded. The use of “click-wrap” licences where a user has to click on a box indication acceptance of contractual terms prior to using the software may assist but questions of time will again be very significant.
{"title":"24. Contractual issues","authors":"I. Lloyd","doi":"10.1093/he/9780198830559.003.0024","DOIUrl":"https://doi.org/10.1093/he/9780198830559.003.0024","url":null,"abstract":"Any product can have defects – or at least fail to meet the expectations of a purchaser. A range of statutory provisions confer rights on a party acquiring goods if these are not of satisfactory quality. Software and what is referred to as “digital content” is covered by these provisions although their application gives rise to a number of difficulties. Unlike most physical products where defects will be found in one or a small number of the items, every digital work will be an exact copy of the original. If one product is considered faulty, the same fate may await all of the others. In most instances software is licenced rather than sold. It is commonplace for a licence to seek to restrict or exclude liabilities that might otherwise arise. The question may then be whether the terms of the licence are enforceable. In many instances they may be brought to the customer’s attention after the contract for supply has been concluded. The use of “click-wrap” licences where a user has to click on a box indication acceptance of contractual terms prior to using the software may assist but questions of time will again be very significant.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"3 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84350177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-28DOI: 10.1080/13600834.2020.1741156
Alex B. Makulilo
ABSTRACT The ability of the Tanzanian government to carry out systematic access to personal data held by private sector entities has significantly expanded in the last ten years. This is due to adoption of new legislation as well as amendment of existing ones with the view of giving law enforcement and intelligence agencies enormous powers to access private sector data without authorisation of an independent oversight institution such as court. Also, this development is due to the government ever increasing use of modern technologies to ease access of data as demonstrated by the recent acquisition of Telecommunications Traffic Monitoring System which has the capabilities of intercepting communication data as well as content of such communication. The aim of this article is to analyse laws and practices of systematic government access to private sector data in Tanzania and suggest areas where law reforms are necessary.
{"title":"Analysis of the regime of systematic government access to private sector data in Tanzania","authors":"Alex B. Makulilo","doi":"10.1080/13600834.2020.1741156","DOIUrl":"https://doi.org/10.1080/13600834.2020.1741156","url":null,"abstract":"ABSTRACT The ability of the Tanzanian government to carry out systematic access to personal data held by private sector entities has significantly expanded in the last ten years. This is due to adoption of new legislation as well as amendment of existing ones with the view of giving law enforcement and intelligence agencies enormous powers to access private sector data without authorisation of an independent oversight institution such as court. Also, this development is due to the government ever increasing use of modern technologies to ease access of data as demonstrated by the recent acquisition of Telecommunications Traffic Monitoring System which has the capabilities of intercepting communication data as well as content of such communication. The aim of this article is to analyse laws and practices of systematic government access to private sector data in Tanzania and suggest areas where law reforms are necessary.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"250 - 278"},"PeriodicalIF":1.5,"publicationDate":"2020-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1741156","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44228876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-02DOI: 10.1080/13600834.2020.1732055
A. Omotubora, S. Basu
ABSTRACT In recent years, research within and outside the European Union (EU) has focused on the expanding scope of personal data. The analysis provided has primarily supported the conclusions that in time, personal data will become so ubiquitous that the EU data protection law would become meaningless, unreasonable, or even discredited and ignored. Notwithstanding these criticisms, EU law is promoted as the ‘gold standard' for data protection laws and the law, including its definition of personal data, is being rapidly adopted by many non-EU countries. The objective of this article is to analyse the concept of personal data under EU law and to explore its continued relevance within a data protection framework that is rapidly globalised and in which technology is continuously evolving. The article argues that far from reflecting a universal notion of data protection, the EU law and particularly its definition of personal data reflects a perception of privacy that is peculiarly European. It further argues that recent developments in technology call for a re-examination of the concept of personal data and a more critical approach by countries with nascent data protection regimes. The article proposes the ‘objective risk of contextual harm’ as a new approach for formulating an alternative definition of personal data. It concludes that this approach better articulates the construction of data protection as a social good and a mechanism for (consumer) protection.
{"title":"Next generation privacy","authors":"A. Omotubora, S. Basu","doi":"10.1080/13600834.2020.1732055","DOIUrl":"https://doi.org/10.1080/13600834.2020.1732055","url":null,"abstract":"ABSTRACT In recent years, research within and outside the European Union (EU) has focused on the expanding scope of personal data. The analysis provided has primarily supported the conclusions that in time, personal data will become so ubiquitous that the EU data protection law would become meaningless, unreasonable, or even discredited and ignored. Notwithstanding these criticisms, EU law is promoted as the ‘gold standard' for data protection laws and the law, including its definition of personal data, is being rapidly adopted by many non-EU countries. The objective of this article is to analyse the concept of personal data under EU law and to explore its continued relevance within a data protection framework that is rapidly globalised and in which technology is continuously evolving. The article argues that far from reflecting a universal notion of data protection, the EU law and particularly its definition of personal data reflects a perception of privacy that is peculiarly European. It further argues that recent developments in technology call for a re-examination of the concept of personal data and a more critical approach by countries with nascent data protection regimes. The article proposes the ‘objective risk of contextual harm’ as a new approach for formulating an alternative definition of personal data. It concludes that this approach better articulates the construction of data protection as a social good and a mechanism for (consumer) protection.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"151 - 173"},"PeriodicalIF":1.5,"publicationDate":"2020-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1732055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47445543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1080/13600834.2020.1735057
A. Al-Ameen
ABSTRACT Copyright laws, policies and enforcement mechanisms would be considered weak if infringers reign free. The vulnerability of internet copyrighted materials is dire in the internet age mainly because of the ease of engaging in illegal copying, sharing, downloading, and streaming of copyright materials. Considering this concern, it is reassuring to note that the Nigerian Copyright Commission is awake to the prospects and challenges within this internet access subsector as it recently forwarded a Copyright bill to the legislative chambers. The Bill aims to modernise Nigeria's copyright law by paying more attention to the internet, an area of strategic importance to the Nigerian economy. This paper analyses the Bill and also seeks to explore the potential paths that may be taken by Nigeria in the application of its modernised copyright law.
{"title":"Copyright in the era of internet adversity: pre-empting a new dawn for Nigeria","authors":"A. Al-Ameen","doi":"10.1080/13600834.2020.1735057","DOIUrl":"https://doi.org/10.1080/13600834.2020.1735057","url":null,"abstract":"ABSTRACT Copyright laws, policies and enforcement mechanisms would be considered weak if infringers reign free. The vulnerability of internet copyrighted materials is dire in the internet age mainly because of the ease of engaging in illegal copying, sharing, downloading, and streaming of copyright materials. Considering this concern, it is reassuring to note that the Nigerian Copyright Commission is awake to the prospects and challenges within this internet access subsector as it recently forwarded a Copyright bill to the legislative chambers. The Bill aims to modernise Nigeria's copyright law by paying more attention to the internet, an area of strategic importance to the Nigerian economy. This paper analyses the Bill and also seeks to explore the potential paths that may be taken by Nigeria in the application of its modernised copyright law.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"174 - 193"},"PeriodicalIF":1.5,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1735057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42524517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-26DOI: 10.1080/13600834.2020.1732037
Grzegorz Tylec, Joanna Szegda
ABSTRACT The main goal of this paper is to answer the question whether virtual cemeteries are becoming a new element of the death and funeral ritual and because of that cause legal conflicts. The article is based on the literature review, social observation and analysis of the virtual cemeteries. Also, the formal dogmatic approach was used to analyze whether this phenomena can lead to legal conflicts. The analysis discover that virtual mourning practices help the users to cope with mourning and grief after the death of a loved one, they supplement the commemoration of the dead in the real world and assist with carrying out funeral rituals. It also discovered that the application of legal regulations concerning traditional graves to virtual ones does not always give satisfactory results, although it does show a direction in which the legislators should go if they want to regulate this issue.
{"title":"A virtual grave: legal regulations of a new virtual social phenomenon","authors":"Grzegorz Tylec, Joanna Szegda","doi":"10.1080/13600834.2020.1732037","DOIUrl":"https://doi.org/10.1080/13600834.2020.1732037","url":null,"abstract":"ABSTRACT The main goal of this paper is to answer the question whether virtual cemeteries are becoming a new element of the death and funeral ritual and because of that cause legal conflicts. The article is based on the literature review, social observation and analysis of the virtual cemeteries. Also, the formal dogmatic approach was used to analyze whether this phenomena can lead to legal conflicts. The analysis discover that virtual mourning practices help the users to cope with mourning and grief after the death of a loved one, they supplement the commemoration of the dead in the real world and assist with carrying out funeral rituals. It also discovered that the application of legal regulations concerning traditional graves to virtual ones does not always give satisfactory results, although it does show a direction in which the legislators should go if they want to regulate this issue.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"135 - 150"},"PeriodicalIF":1.5,"publicationDate":"2020-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1732037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44882582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-26DOI: 10.1080/13600834.2020.1735060
T. Dowdeswell, N. Goltz
ABSTRACT This paper examines the regulation of technology platform companies providing a platform for user-generated media content while playing an increasingly dominant role in the global flow of news and information. In doing so, platform companies play a crucial role in modern civic life, by deciding which content will reach users, engage the public's attention, and be deemed credible. It is therefore crucial that we choose means of regulation that foster democratic values and robust civic engagement. In this paper we focus on the regulation of ‘computational propaganda', including misinformation and ‘fake news', the rise of synthetic media and so-called ‘deep fakes', and novel forms of algorithmic injustice, such as the manipulation of search engine results and their effect on elections. We argue that many existing regulations fall short in that they adopt an approach that views regulation as a battle between two competing powers, or ‘empires’ – that of the regulatory state versus the big tech companies. Accordingly, they approach regulation as a means of redistributing power between these two players, while discounting the end user, and they often involve unjustified restrictions of free speech through the imposition of content controls.
{"title":"The clash of empires: regulating technological threats to civil society","authors":"T. Dowdeswell, N. Goltz","doi":"10.1080/13600834.2020.1735060","DOIUrl":"https://doi.org/10.1080/13600834.2020.1735060","url":null,"abstract":"ABSTRACT This paper examines the regulation of technology platform companies providing a platform for user-generated media content while playing an increasingly dominant role in the global flow of news and information. In doing so, platform companies play a crucial role in modern civic life, by deciding which content will reach users, engage the public's attention, and be deemed credible. It is therefore crucial that we choose means of regulation that foster democratic values and robust civic engagement. In this paper we focus on the regulation of ‘computational propaganda', including misinformation and ‘fake news', the rise of synthetic media and so-called ‘deep fakes', and novel forms of algorithmic injustice, such as the manipulation of search engine results and their effect on elections. We argue that many existing regulations fall short in that they adopt an approach that views regulation as a battle between two competing powers, or ‘empires’ – that of the regulatory state versus the big tech companies. Accordingly, they approach regulation as a means of redistributing power between these two players, while discounting the end user, and they often involve unjustified restrictions of free speech through the imposition of content controls.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"194 - 217"},"PeriodicalIF":1.5,"publicationDate":"2020-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1735060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49154328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-23DOI: 10.1080/13600834.2020.1732035
Vitaliy Kalyatin, Erik Valdes-Martines
ABSTRACT This article considers the problems and obstacles associated with international recognition of the Artist’s Resale Right. After examining economic, legal and social aspects of that right together with the current legal situation within the main countries that have so far rejected it, the authors conclude that there is no significant barrier to introducing it throughout the world.
{"title":"Droit de suite convention: to be or not to be?","authors":"Vitaliy Kalyatin, Erik Valdes-Martines","doi":"10.1080/13600834.2020.1732035","DOIUrl":"https://doi.org/10.1080/13600834.2020.1732035","url":null,"abstract":"ABSTRACT This article considers the problems and obstacles associated with international recognition of the Artist’s Resale Right. After examining economic, legal and social aspects of that right together with the current legal situation within the main countries that have so far rejected it, the authors conclude that there is no significant barrier to introducing it throughout the world.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"121 - 134"},"PeriodicalIF":1.5,"publicationDate":"2020-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1732035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42286031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-07DOI: 10.1080/13600834.2020.1726021
L. Trakman, Robert Walters, B. Zeller
ABSTRACT A serious dilemma for regulators of the Internet is to ensure that data providers secure the informed consent of digital consumers before accessing and transmitting their personal data. An economic dilemma for Internet regulators is to recognize the economic costs to data providers of informing data consumers about the nature and consequences of consenting to the use of their personal data, while preventing data users from eroding the privacy of those consumers. In issue, too, is a self-management model in which consent to the use of personal data is managed by data subjects and data users, even if the latter dictate the terms of that usage. A further issue relates to the external regulation that oversee how data is managed. This includes a primary framework with which data users must comply. This article will address these issues in the dynamic and evolving sector of data protection across the global economy. It will argue for greater legal consistency and harmonization in the law governing consent to the use of personal data, in defining the nature of that consent, and in devising a regulatory framework that takes account of the cognitive capacities and behaviour of data consumers.
{"title":"Digital consent and data protection law – Europe and Asia-Pacific experience","authors":"L. Trakman, Robert Walters, B. Zeller","doi":"10.1080/13600834.2020.1726021","DOIUrl":"https://doi.org/10.1080/13600834.2020.1726021","url":null,"abstract":"ABSTRACT A serious dilemma for regulators of the Internet is to ensure that data providers secure the informed consent of digital consumers before accessing and transmitting their personal data. An economic dilemma for Internet regulators is to recognize the economic costs to data providers of informing data consumers about the nature and consequences of consenting to the use of their personal data, while preventing data users from eroding the privacy of those consumers. In issue, too, is a self-management model in which consent to the use of personal data is managed by data subjects and data users, even if the latter dictate the terms of that usage. A further issue relates to the external regulation that oversee how data is managed. This includes a primary framework with which data users must comply. This article will address these issues in the dynamic and evolving sector of data protection across the global economy. It will argue for greater legal consistency and harmonization in the law governing consent to the use of personal data, in defining the nature of that consent, and in devising a regulatory framework that takes account of the cognitive capacities and behaviour of data consumers.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"218 - 249"},"PeriodicalIF":1.5,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1726021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42465971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-02DOI: 10.1080/13600834.2020.1726020
T. Randolph Beard, George S. Ford, Michael L. Stern
ABSTRACT In this article, we shed light on the optimal design of Commission rules and practices for addressing interference disputes. Since spectrum licenses produce no benefits without large and mostly sunk investments in communications networks, our focus is on investment incentives. We argue that the regulator’s optimal interference policy would necessarily deal with different license holders differently when their sunk network investments vary. Our economic model dictates that license holders who have made little or no sunk investment in capital to generate benefits from their license would receive little relief under an optimal rule. On the other hand, those licensees with substantial sunk network investments would receive far more expansive treatment by the regulator.
{"title":"Interference, sunk investment, and the repurposing of radio spectrum","authors":"T. Randolph Beard, George S. Ford, Michael L. Stern","doi":"10.1080/13600834.2020.1726020","DOIUrl":"https://doi.org/10.1080/13600834.2020.1726020","url":null,"abstract":"ABSTRACT In this article, we shed light on the optimal design of Commission rules and practices for addressing interference disputes. Since spectrum licenses produce no benefits without large and mostly sunk investments in communications networks, our focus is on investment incentives. We argue that the regulator’s optimal interference policy would necessarily deal with different license holders differently when their sunk network investments vary. Our economic model dictates that license holders who have made little or no sunk investment in capital to generate benefits from their license would receive little relief under an optimal rule. On the other hand, those licensees with substantial sunk network investments would receive far more expansive treatment by the regulator.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"100 - 82"},"PeriodicalIF":1.5,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1726020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41698178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-02DOI: 10.1080/13600834.2020.1705034
Ubena John
ABSTRACT Legal and non-legal commenters across the world have criticised the promulgation of the Tanzanian Electronic and Postal Communications (Online Content) Regulations of 2018. The Regulations regulate inter alia online content, online content service providers, online content hosts, and users by imposing certain obligations, including the moderation of content. One of the criticisms raised by various commentators is that the law restricts access to information and freedom of expression. This article examines the purpose and content of the Electronic and Postal Communications (Online Content) Regulations,to determine whether they conform to the law-making standards: legality, legitimacy, legal certainty; and the international standards of fundamental rights. In the end, this article recommends areas that may need revision.
{"title":"The bolts and nuts of online content regulation in Tanzania","authors":"Ubena John","doi":"10.1080/13600834.2020.1705034","DOIUrl":"https://doi.org/10.1080/13600834.2020.1705034","url":null,"abstract":"ABSTRACT Legal and non-legal commenters across the world have criticised the promulgation of the Tanzanian Electronic and Postal Communications (Online Content) Regulations of 2018. The Regulations regulate inter alia online content, online content service providers, online content hosts, and users by imposing certain obligations, including the moderation of content. One of the criticisms raised by various commentators is that the law restricts access to information and freedom of expression. This article examines the purpose and content of the Electronic and Postal Communications (Online Content) Regulations,to determine whether they conform to the law-making standards: legality, legitimacy, legal certainty; and the international standards of fundamental rights. In the end, this article recommends areas that may need revision.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"45 - 65"},"PeriodicalIF":1.5,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1705034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45027152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}