Individuals are increasingly using personal Internet of Things (IoT) devices that digitize their day-to-day lives. Those devices, however, often require substantial personal information to generate their intended benefits. For example, fitness technologies collect health, sleep, personal, and a vast array of other information ubiquitously, creating possible privacy issues for the users when fitness technology platform providers store or share their information, whether users know this or not. To explore the role of privacy perceptions in the context of continued use of fitness technologies, this study collected data from 212 fitness tracker users. We find empirical support for the importance of privacy perceptions in a user's intention to continue to use their fitness tracker. More specifically, consistent with privacy calculus research, privacy concern is negatively related to willingness to disclose information while perceived benefit is positively related to it. As an extension to calculus variables, users' expectations towards the data sharing practices of organizations also influences their willingness to disclose information. Importantly, willingness to disclose information has a direct effect on continued use intentions but also moderates the relationship between perceived benefit and users' intentions to continue using a fitness tracker. We discuss the implications of these findings for research and practice.
{"title":"Privacy Maintenance in Self-Digitization","authors":"F. Bélanger, Robert E. Crossler, John Correia","doi":"10.1145/3462766.3462769","DOIUrl":"https://doi.org/10.1145/3462766.3462769","url":null,"abstract":"Individuals are increasingly using personal Internet of Things (IoT) devices that digitize their day-to-day lives. Those devices, however, often require substantial personal information to generate their intended benefits. For example, fitness technologies collect health, sleep, personal, and a vast array of other information ubiquitously, creating possible privacy issues for the users when fitness technology platform providers store or share their information, whether users know this or not. To explore the role of privacy perceptions in the context of continued use of fitness technologies, this study collected data from 212 fitness tracker users. We find empirical support for the importance of privacy perceptions in a user's intention to continue to use their fitness tracker. More specifically, consistent with privacy calculus research, privacy concern is negatively related to willingness to disclose information while perceived benefit is positively related to it. As an extension to calculus variables, users' expectations towards the data sharing practices of organizations also influences their willingness to disclose information. Importantly, willingness to disclose information has a direct effect on continued use intentions but also moderates the relationship between perceived benefit and users' intentions to continue using a fitness tracker. We discuss the implications of these findings for research and practice.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"38 1","pages":"7 - 24"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82154862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I have been editing for a while. Long enough to have witnessed the evolution from pre-digital journals to the post-digital pure play. I negotiated and obtained the first online review system for this fine journal, back in 2006 when I was building my first proposal to edit The DATA BASE for Advances in Information Systems. I felt at the time that I might be a tad late coming to the digital field, seeing that the association I belonged to had already launched two digital pure-play publications which appeared to be destined for notice.
我做编辑有一段时间了。足够长的时间来见证从前数字期刊到后数字纯游戏的演变。早在2006年,当我为编辑《信息系统进展数据库》(the DATA BASE for Advances in Information Systems)撰写第一份提案时,我就为这本优秀的期刊谈判并获得了第一个在线评审系统。当时我觉得我进入数字领域可能有点晚了,因为我所属的协会已经推出了两本似乎注定要引起注意的纯数字出版物。
{"title":"A Famine of Riches in Scholarly Publication","authors":"T. Stafford","doi":"10.1145/3462766.3462768","DOIUrl":"https://doi.org/10.1145/3462766.3462768","url":null,"abstract":"I have been editing for a while. Long enough to have witnessed the evolution from pre-digital journals to the post-digital pure play. I negotiated and obtained the first online review system for this fine journal, back in 2006 when I was building my first proposal to edit The DATA BASE for Advances in Information Systems. I felt at the time that I might be a tad late coming to the digital field, seeing that the association I belonged to had already launched two digital pure-play publications which appeared to be destined for notice.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"26 1","pages":"5 - 6"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73405633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benjamin Yeo, A. Serenko, Prashant C. Palvia, O. Sato, Hiroshi Sasaki, Jie Yu, Yue Guo
The purpose of this study is to explore the drivers of job satisfaction of IT workers in the East Asian context, particularly in Taiwan, Japan, and China. Using data collected from IT workers, decision tree inductions were employed to identify the predictors of job satisfaction. Results indicate that the level of education has no effect on job satisfaction. Overall, higher uncertainty avoidance results in lower job satisfaction, and more experienced IT workers appear to be more satisfied. In Taiwan, longer serving IT workers, who are likely to hold more senior positions and spend more time on the job, are more satisfied with their jobs. Similarly, in Japan, older IT workers are more satisfied. In China, job satisfaction of IT workers differs across job roles and industries. It is recommended that management practices and policies in Taiwan focus on bridging gaps between longer serving and newer IT workers in terms of their ability to handle ambiguous work situations; whereas in Japan, these should focus on providing work flexibility and stress management programs to allow room for family support. In China, these should be tailored to specific job roles and industries in view of their different experiences with job satisfaction determinants.
{"title":"Job Satisfaction of IT Workers in East Asia","authors":"Benjamin Yeo, A. Serenko, Prashant C. Palvia, O. Sato, Hiroshi Sasaki, Jie Yu, Yue Guo","doi":"10.1145/3462766.3462772","DOIUrl":"https://doi.org/10.1145/3462766.3462772","url":null,"abstract":"The purpose of this study is to explore the drivers of job satisfaction of IT workers in the East Asian context, particularly in Taiwan, Japan, and China. Using data collected from IT workers, decision tree inductions were employed to identify the predictors of job satisfaction. Results indicate that the level of education has no effect on job satisfaction. Overall, higher uncertainty avoidance results in lower job satisfaction, and more experienced IT workers appear to be more satisfied. In Taiwan, longer serving IT workers, who are likely to hold more senior positions and spend more time on the job, are more satisfied with their jobs. Similarly, in Japan, older IT workers are more satisfied. In China, job satisfaction of IT workers differs across job roles and industries. It is recommended that management practices and policies in Taiwan focus on bridging gaps between longer serving and newer IT workers in terms of their ability to handle ambiguous work situations; whereas in Japan, these should focus on providing work flexibility and stress management programs to allow room for family support. In China, these should be tailored to specific job roles and industries in view of their different experiences with job satisfaction determinants.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"37 1","pages":"94 - 126"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85338793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.
{"title":"Protection Motivation Theory in Information Systems Security Research","authors":"Steffi Haag, M. Siponen, Fufan Liu","doi":"10.1145/3462766.3462770","DOIUrl":"https://doi.org/10.1145/3462766.3462770","url":null,"abstract":"Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"54 1","pages":"25 - 67"},"PeriodicalIF":2.8,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74585487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Extant information systems security research identified and examined a variety of individual as well as organizational factors influencing information security behaviors, but rarely offered sufficient theoretical insight into the interaction of the individual factors with the organizational context in impacting information security behaviors. To fill this gap, this study proposes a theoretical framework that builds on the concepts of organizational culture and sensemaking to show that: 1) information security behaviors are outcomes of sensemaking; and 2) sensemaking is enabled as well as constrained by organizational culture. This study further epitomizes that information security diagnosing, solving, and performing behaviors emerge as outcomes of sensemaking about information security during the organization's interactions with technology. Theoretical and pragmatic contributions of this framework and future research directions are also demonstrated.
{"title":"Toward a Unified View of Dynamic Information Security Behaviors","authors":"Canchu Lin, X. Luo","doi":"10.1145/3447934.3447940","DOIUrl":"https://doi.org/10.1145/3447934.3447940","url":null,"abstract":"Extant information systems security research identified and examined a variety of individual as well as organizational factors influencing information security behaviors, but rarely offered sufficient theoretical insight into the interaction of the individual factors with the organizational context in impacting information security behaviors. To fill this gap, this study proposes a theoretical framework that builds on the concepts of organizational culture and sensemaking to show that: 1) information security behaviors are outcomes of sensemaking; and 2) sensemaking is enabled as well as constrained by organizational culture. This study further epitomizes that information security diagnosing, solving, and performing behaviors emerge as outcomes of sensemaking about information security during the organization's interactions with technology. Theoretical and pragmatic contributions of this framework and future research directions are also demonstrated.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"60 1","pages":"65 - 90"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85861900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As we closed out a memorable 2020 and look to the New Year, we might say that not much good has come out of this year. But as a Monty Python fan, I love the ditty from The Life of Brian movie, "Always Look on the Bright Side of Life." While the pandemic has taken much, it has also provided opportunities to explore new ways of learning, working, and being in community. For me, the pandemic has highlighted a fact I think we have all long suspected: the current journal peer review process is broken-it's unsustainable.
{"title":"No Good Deed Goes Unpunished","authors":"Deborah J. Armstrong","doi":"10.1145/3447934.3447936","DOIUrl":"https://doi.org/10.1145/3447934.3447936","url":null,"abstract":"As we closed out a memorable 2020 and look to the New Year, we might say that not much good has come out of this year. But as a Monty Python fan, I love the ditty from The Life of Brian movie, \"Always Look on the Bright Side of Life.\" While the pandemic has taken much, it has also provided opportunities to explore new ways of learning, working, and being in community. For me, the pandemic has highlighted a fact I think we have all long suspected: the current journal peer review process is broken-it's unsustainable.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"31 1","pages":"8 - 9"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80240568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gary F. Templeton, Michael Brian Pope, Laurie L. Burney
The Two-Step normality transformation has been shown to reliably transform continuous variables toward normality. The procedure offers researchers a capable alternative to more prominent methods, such as winsorization, ranking, and power transformations. We demonstrate its utility in the context of the Productivity Paradox literature stream, which is renowned for inconsistent results. This paper demonstrates that the Two-Step normality transformation, which has not been used in Productivity Paradox research, may produce greater goodness-of-fit and affect theoretical understandings on the topic. We use a classic Productivity Paradox dataset to show that compared to the prominent normality transformations, the Two-Step produces unique findings, including 1) regression coefficients more closely resembling the original data, 2) different effect sizes and significance levels, and 3) strengthening evidence for fundamental theories in Productivity Paradox literature. We demonstrate results that challenge uncertainties about the relationship between IT investment and firm performance. Our results imply that the Two-Step procedure should be considered a viable transformation option in future information systems research.
{"title":"The Usefulness of the Two-Step Normality Transformation in Retesting Existing Theories","authors":"Gary F. Templeton, Michael Brian Pope, Laurie L. Burney","doi":"10.1145/3447934.3447939","DOIUrl":"https://doi.org/10.1145/3447934.3447939","url":null,"abstract":"The Two-Step normality transformation has been shown to reliably transform continuous variables toward normality. The procedure offers researchers a capable alternative to more prominent methods, such as winsorization, ranking, and power transformations. We demonstrate its utility in the context of the Productivity Paradox literature stream, which is renowned for inconsistent results. This paper demonstrates that the Two-Step normality transformation, which has not been used in Productivity Paradox research, may produce greater goodness-of-fit and affect theoretical understandings on the topic. We use a classic Productivity Paradox dataset to show that compared to the prominent normality transformations, the Two-Step produces unique findings, including 1) regression coefficients more closely resembling the original data, 2) different effect sizes and significance levels, and 3) strengthening evidence for fundamental theories in Productivity Paradox literature. We demonstrate results that challenge uncertainties about the relationship between IT investment and firm performance. Our results imply that the Two-Step procedure should be considered a viable transformation option in future information systems research.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"38 1","pages":"53 - 64"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73288324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The online-to-offline (O2O) business model is rapidly growing among organizations, yet current knowledge on O2O adoption is predominantly individual focused, with little research on organizational adoption and the factors driving adoption. To address this gap, underpinned by the diffusion of innovation (DOI) theory, this study collected qualitative data (24 semistructured interviews), which were analyzed using content analysis techniques. We found that offline service quality and social network prosperity are some of the factors driving O2O adoption. Surprisingly, inefficient offline marketing was also found to drive O2O adoption, which indicates new challenges posed by the growing online business environment. We found that not all factors can be categorically classified as facilitating or impeding adoption, as some factors (such as operational challenges and costs) could play dichotomous roles of facilitating or impeding in the context of peculiar circumstances. For example, we found cost to be an impeding factor, yet the results also indicated the benefits of cost reduction resulting from O2O adoption, thereby rendering cost a contentious issue. This study extends the application of DOI theory to the O2O adoption stage, and identifies a number of new factors associated with internal/external organizational characteristics, as postulated in the DOI. Managerial implications are discussed.
{"title":"Examining the Adoption of Onlineto- Offline (O2O)","authors":"Jiwat Ram, A. Manoharan, Siyao Sun","doi":"10.1145/3447934.3447937","DOIUrl":"https://doi.org/10.1145/3447934.3447937","url":null,"abstract":"The online-to-offline (O2O) business model is rapidly growing among organizations, yet current knowledge on O2O adoption is predominantly individual focused, with little research on organizational adoption and the factors driving adoption. To address this gap, underpinned by the diffusion of innovation (DOI) theory, this study collected qualitative data (24 semistructured interviews), which were analyzed using content analysis techniques. We found that offline service quality and social network prosperity are some of the factors driving O2O adoption. Surprisingly, inefficient offline marketing was also found to drive O2O adoption, which indicates new challenges posed by the growing online business environment. We found that not all factors can be categorically classified as facilitating or impeding adoption, as some factors (such as operational challenges and costs) could play dichotomous roles of facilitating or impeding in the context of peculiar circumstances. For example, we found cost to be an impeding factor, yet the results also indicated the benefits of cost reduction resulting from O2O adoption, thereby rendering cost a contentious issue. This study extends the application of DOI theory to the O2O adoption stage, and identifies a number of new factors associated with internal/external organizational characteristics, as postulated in the DOI. Managerial implications are discussed.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"97 1","pages":"10 - 26"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89251289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. James, Jennifer L. Ziegelmayer, Arianna Schuler Scott, Grace Fox
Android access notifications are presented to users to obtain permission to access data and services on smartphones. The number of 'unsafe' apps in the Android marketplaces underscores the importance of understanding what factors influence whether users engage in more effortful systematic processing of access notifications. We propose a multiple-motive heuristic-systematic model to examine how different motives impact users' processing modes. We find that the need to be accurate in making decisions (accuracy), the desire to defend preferred positions (defense), and social pressure from others (impression) influence how users process Android access notifications, and they do so in different ways.
{"title":"A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications","authors":"T. James, Jennifer L. Ziegelmayer, Arianna Schuler Scott, Grace Fox","doi":"10.1145/3447934.3447941","DOIUrl":"https://doi.org/10.1145/3447934.3447941","url":null,"abstract":"Android access notifications are presented to users to obtain permission to access data and services on smartphones. The number of 'unsafe' apps in the Android marketplaces underscores the importance of understanding what factors influence whether users engage in more effortful systematic processing of access notifications. We propose a multiple-motive heuristic-systematic model to examine how different motives impact users' processing modes. We find that the need to be accurate in making decisions (accuracy), the desire to defend preferred positions (defense), and social pressure from others (impression) influence how users process Android access notifications, and they do so in different ways.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"23 1","pages":"91 - 122"},"PeriodicalIF":2.8,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81741670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Horst Treiblmaier, M. Swan, Primavera De Filippi, Mary C Lacity, T. Hardjono, Henry Kim
Distributed ledger technology, frequently designated as 'blockchain,' is evolving from its hype phase toward greater maturity and long-term value creation. Although many academic communities were initially slow to grasp the technology's numerous potential implications, meanwhile a substantial amount of research is dedicated to investigating the development and impact of blockchain and related technologies. As undertaken, most research projects take a specific homogenous perspective, such as a technical or business viewpoint. To date, blockchain research studies are largely missing a bridge between and across academic disciplines. Given the manifold implications of blockchain technology, a fruitful crossdisciplinary exchange is therefore needed. In this paper, we bring together researchers with varying expertise to provide a vision into what may be next in terms of concepts, applications, and research agendas. We consider business, economic, societal, legal, technical, and philosophical viewpoints and propose multiple research questions as well as hypotheses arising from these diverse viewpoints. Simultaneously, we challenge various academic communities to tackle some of the most crucial issues of current blockchain research and to develop a solid foundation for future exploration.
{"title":"What's Next in Blockchain Research?","authors":"Horst Treiblmaier, M. Swan, Primavera De Filippi, Mary C Lacity, T. Hardjono, Henry Kim","doi":"10.1145/3447934.3447938","DOIUrl":"https://doi.org/10.1145/3447934.3447938","url":null,"abstract":"Distributed ledger technology, frequently designated as 'blockchain,' is evolving from its hype phase toward greater maturity and long-term value creation. Although many academic communities were initially slow to grasp the technology's numerous potential implications, meanwhile a substantial amount of research is dedicated to investigating the development and impact of blockchain and related technologies. As undertaken, most research projects take a specific homogenous perspective, such as a technical or business viewpoint. To date, blockchain research studies are largely missing a bridge between and across academic disciplines. Given the manifold implications of blockchain technology, a fruitful crossdisciplinary exchange is therefore needed. In this paper, we bring together researchers with varying expertise to provide a vision into what may be next in terms of concepts, applications, and research agendas. We consider business, economic, societal, legal, technical, and philosophical viewpoints and propose multiple research questions as well as hypotheses arising from these diverse viewpoints. Simultaneously, we challenge various academic communities to tackle some of the most crucial issues of current blockchain research and to develop a solid foundation for future exploration.","PeriodicalId":46842,"journal":{"name":"Data Base for Advances in Information Systems","volume":"332 1","pages":"27 - 52"},"PeriodicalIF":2.8,"publicationDate":"2021-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80535263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}