Current online review systems widely suffer from rating biases. Biased ratings can lead to violations of customer trust and failures of business intelligence. Hence, both practitioners and researchers have directed massive efforts toward curbing rating biases. In this paper, we investigate bandwagon bias, the rating distortion resulting from individuals posting ratings shifted toward the displayed average rating, and propose a bias warning approach to mitigate this bias. Drawing on the flexible correction model, the theory of valuation in behavioral economics, and previous warning research, we design an effective warning strategy in two steps. First, we start with the risk-alert warning strategy, which prior research has widely employed, and rationalize its deficiencies by synthesizing theoretical analysis and extant empirical evidence. Second, considering the deficiencies, we identify a supplementary content design factor—the ranking task—and construct a risk-alert-with-ranking-task warning strategy. We then empirically test the effects of the two warning strategies on individual ratings in cases in which bandwagon bias either occurs or does not occur in individuals’ initial assessments. The results of four controlled experiments indicate that (1) the risk-alert strategy can reduce bandwagon bias in individual ratings but will elicit unwanted rating distortions when bandwagon bias does not occur in individuals’ initial assessments, and (2) the risk-alert-with-ranking-task strategy can mitigate bandwagon bias while avoiding the unwanted rating distortions above and can thus function as an effective warning strategy. Our research contributes to the literature by proposing an effective debiasing solution for bandwagon bias and a bias warning approach for online rating debiasing, which can help increase rating informativeness on online platforms.
{"title":"A Warning Approach to Mitigating Bandwagon Bias in Online Ratings: Theoretical Analysis and Experimental Investigations","authors":"Dingyu Wu, Xunhua Guo, Yuejun Wang, Guoqing Chen","doi":"10.17705/1jais.00817","DOIUrl":"https://doi.org/10.17705/1jais.00817","url":null,"abstract":"Current online review systems widely suffer from rating biases. Biased ratings can lead to violations of customer trust and failures of business intelligence. Hence, both practitioners and researchers have directed massive efforts toward curbing rating biases. In this paper, we investigate bandwagon bias, the rating distortion resulting from individuals posting ratings shifted toward the displayed average rating, and propose a bias warning approach to mitigate this bias. Drawing on the flexible correction model, the theory of valuation in behavioral economics, and previous warning research, we design an effective warning strategy in two steps. First, we start with the risk-alert warning strategy, which prior research has widely employed, and rationalize its deficiencies by synthesizing theoretical analysis and extant empirical evidence. Second, considering the deficiencies, we identify a supplementary content design factor—the ranking task—and construct a risk-alert-with-ranking-task warning strategy. We then empirically test the effects of the two warning strategies on individual ratings in cases in which bandwagon bias either occurs or does not occur in individuals’ initial assessments. The results of four controlled experiments indicate that (1) the risk-alert strategy can reduce bandwagon bias in individual ratings but will elicit unwanted rating distortions when bandwagon bias does not occur in individuals’ initial assessments, and (2) the risk-alert-with-ranking-task strategy can mitigate bandwagon bias while avoiding the unwanted rating distortions above and can thus function as an effective warning strategy. Our research contributes to the literature by proposing an effective debiasing solution for bandwagon bias and a bias warning approach for online rating debiasing, which can help increase rating informativeness on online platforms.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"54 1","pages":"2"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73830812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital transformation has become a dominant phenomenon of interest among information systems scholars. To account for this phenomenon, it is imperative to develop a theoretical understanding of its processes and objects. We adapt a seminal organizational theory that conceptualizes organizations as interpretation systems to a possible future of organizations. We theorize digital transformation as a progressive replacement of humans by digital technologies in performing an organization’s fundamental activities underpinning the processes of scanning, interpretation, and learning that encompass an organization’s interaction with its environment. As a result, organizations cease to be human interpretation systems and instead turn into digital enactment systems, where digital technologies, instead of humans, nearly autonomously create and act upon information. We illustrate this digital transformation theory using the example of high-frequency trading. This transformation redefines the relationship among organizations, information, and the environment, changing the role of humans and reshaping strategic decision-making. Thus conceived, digital transformation offers a concrete way of theorizing and accounts for deep implications on the nature of organizations and organizing in the digital age.
{"title":"Organizations as Digital Enactment Systems: A Theory of Replacement of Humans by Digital Technologies in Organizational Scanning, Interpretation, and Learning","authors":"Ioanna Constantiou, Mayur Joshi, Marta Stelmaszak","doi":"10.17705/1jais.00833","DOIUrl":"https://doi.org/10.17705/1jais.00833","url":null,"abstract":"Digital transformation has become a dominant phenomenon of interest among information systems scholars. To account for this phenomenon, it is imperative to develop a theoretical understanding of its processes and objects. We adapt a seminal organizational theory that conceptualizes organizations as interpretation systems to a possible future of organizations. We theorize digital transformation as a progressive replacement of humans by digital technologies in performing an organization’s fundamental activities underpinning the processes of scanning, interpretation, and learning that encompass an organization’s interaction with its environment. As a result, organizations cease to be human interpretation systems and instead turn into digital enactment systems, where digital technologies, instead of humans, nearly autonomously create and act upon information. We illustrate this digital transformation theory using the example of high-frequency trading. This transformation redefines the relationship among organizations, information, and the environment, changing the role of humans and reshaping strategic decision-making. Thus conceived, digital transformation offers a concrete way of theorizing and accounts for deep implications on the nature of organizations and organizing in the digital age.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135448376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Envisioning Digital Transformation: Advancing Theoretical Diversity","authors":"Frantz Rowe, M. Lynne Markus","doi":"10.17705/1jais.00850","DOIUrl":"https://doi.org/10.17705/1jais.00850","url":null,"abstract":"<jats:p />","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135448621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With societal challenges, including but not limited to human development, equity, social justice, and climate change, societal-level digital transformation (SDT) is of imminent relevance and theoretical interest. While building on local-level efforts, societal-level transformation is a nonlinear extension of the local level. Unfortunately, academic discourse on digital transformation has largely left SDT unaccounted for. Drawing on more than 25 years of intensive, interventionist research engagement with the digital transformation of public healthcare information management and delivery in more than 80 countries in the Global South, we contribute to theorizing SDT in the form of a design theory consisting of six interconnected design principles. These design principles articulate the interplay and tensions of accommodating over time increased diversity and flexibility in digital solutions, while simultaneously connecting local, national, and regional/ global efforts.
{"title":"Design Theory for Societal Digital Transformation: The Case of Digital Global Health","authors":"Jørn Braa, Sundeep Sahay, Eric Monteiro","doi":"10.17705/1jais.00816","DOIUrl":"https://doi.org/10.17705/1jais.00816","url":null,"abstract":"With societal challenges, including but not limited to human development, equity, social justice, and climate change, societal-level digital transformation (SDT) is of imminent relevance and theoretical interest. While building on local-level efforts, societal-level transformation is a nonlinear extension of the local level. Unfortunately, academic discourse on digital transformation has largely left SDT unaccounted for. Drawing on more than 25 years of intensive, interventionist research engagement with the digital transformation of public healthcare information management and delivery in more than 80 countries in the Global South, we contribute to theorizing SDT in the form of a design theory consisting of six interconnected design principles. These design principles articulate the interplay and tensions of accommodating over time increased diversity and flexibility in digital solutions, while simultaneously connecting local, national, and regional/ global efforts.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135448627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Practical Guide for Successful Revisions and Engagements with Reviewers","authors":"Min-Seok Pang, J. Thatcher","doi":"10.17705/1jais.00797","DOIUrl":"https://doi.org/10.17705/1jais.00797","url":null,"abstract":"<jats:p />","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"74 1","pages":"11"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80761504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Regardless of what security professionals do to motivate personal users to adopt security technologies volitionally, the end result seems to be the same—low adoption rates. To increase these rates, we propose activating their positive psychological capital (PsyCap), which consists of hope, self-efficacy, resilience, and optimism (i.e., their “HERO within”). We propose that greater PsyCap toward a security technology is associated with greater adoption rates (and intentions thereof) because positivity increases motivation. We further posit that PsyCap both moderates and is moderated by other constructs. We suggest that personal users’ conditioned fear from the security threat moderates the effect of PsyCap on adoption intentions because some fear is necessary to activate their positive PsyCap to form their behavioral intentions to adopt security technologies. We further hypothesize that PsyCap moderates the effect of adoption intentions on actual adoption rates because activating an individual’s HERO within encourages individuals to exert the effort necessary to translate their intentions into actual adoption. Finally, we theorize that enhancing fear appeal messages with appeals to an individual’s HERO has a greater effect on volitional adoption rates relative to messages without these PsyCap-related appeals. To support our hypotheses, we conducted two experiments using the volitional adoption of a password manager application and a two-factor authentication (2FA) service. We found differential support for our hypotheses across the two security technologies, which suggests technology characteristics might mitigate the impact of PsyCap on volitional adoption decisions.
{"title":"Positively Fearful: Activating the Individual's HERO Within to Explain Volitional Security Technology Adoption","authors":"Thomas Mattson, Salvatore Aurigemma, J. Ren","doi":"10.17705/1jais.00793","DOIUrl":"https://doi.org/10.17705/1jais.00793","url":null,"abstract":"Regardless of what security professionals do to motivate personal users to adopt security technologies volitionally, the end result seems to be the same—low adoption rates. To increase these rates, we propose activating their positive psychological capital (PsyCap), which consists of hope, self-efficacy, resilience, and optimism (i.e., their “HERO within”). We propose that greater PsyCap toward a security technology is associated with greater adoption rates (and intentions thereof) because positivity increases motivation. We further posit that PsyCap both moderates and is moderated by other constructs. We suggest that personal users’ conditioned fear from the security threat moderates the effect of PsyCap on adoption intentions because some fear is necessary to activate their positive PsyCap to form their behavioral intentions to adopt security technologies. We further hypothesize that PsyCap moderates the effect of adoption intentions on actual adoption rates because activating an individual’s HERO within encourages individuals to exert the effort necessary to translate their intentions into actual adoption. Finally, we theorize that enhancing fear appeal messages with appeals to an individual’s HERO has a greater effect on volitional adoption rates relative to messages without these PsyCap-related appeals. To support our hypotheses, we conducted two experiments using the volitional adoption of a password manager application and a two-factor authentication (2FA) service. We found differential support for our hypotheses across the two security technologies, which suggests technology characteristics might mitigate the impact of PsyCap on volitional adoption decisions.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"7 1","pages":"8"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75069587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Transparency—the observability of activities, behaviors, and performance—is often treated as a panacea for modern management. Yet there is a conundrum in the literature, with some studies suggesting that transparency may benefit group creativity and others suggesting that privacy may do so. A similar conundrum exists regarding the effects of different social capital types—structural holes vs. network cohesion—on group creativity. Enterprise social media (ESM) provide a unique opportunity to solve these conundrums by allowing groups to be “transparent” (non-group members can observe and/or participate in group activities) or “private” (group members and activities are hidden from the community) and enabling groups to develop distinct social capital structures. Using data from 28,083 written interactions produced by 109 transparent and 106 private groups in an ESM of a multinational design firm, we found strong support for our contingency hypotheses that both transparent and private groups may produce high levels of creative dialogues, yet in different forms. Specifically, expansion-focused creative dialogues— those focused on combining or expanding existing concepts—emerge in transparent groups, but only when the group’s social capital is characterized by structural holes. Conversely, we found that reframingfocused dialogues—those focused on challenging and rethinking—emerge in private groups but only when the group’s social capital is characterized by network cohesion. Theoretically, these findings can help to solve the conundrums in the literature on group creativity and shed light on the role of ESM use in this context. Practically, our findings offer a critical reflection o contemporary initiatives for increasing transparency, whether through physical design or digital transformation.
{"title":"Living in a Fishbowl or Not: The Role of Transparency and Privacy in Creative Dialogues on Enterprise Social Media","authors":"W. V. Osch, Burcu Bulgurcu, Yuyang Liang","doi":"10.17705/1jais.00802","DOIUrl":"https://doi.org/10.17705/1jais.00802","url":null,"abstract":"Transparency—the observability of activities, behaviors, and performance—is often treated as a panacea for modern management. Yet there is a conundrum in the literature, with some studies suggesting that transparency may benefit group creativity and others suggesting that privacy may do so. A similar conundrum exists regarding the effects of different social capital types—structural holes vs. network cohesion—on group creativity. Enterprise social media (ESM) provide a unique opportunity to solve these conundrums by allowing groups to be “transparent” (non-group members can observe and/or participate in group activities) or “private” (group members and activities are hidden from the community) and enabling groups to develop distinct social capital structures. Using data from 28,083 written interactions produced by 109 transparent and 106 private groups in an ESM of a multinational design firm, we found strong support for our contingency hypotheses that both transparent and private groups may produce high levels of creative dialogues, yet in different forms. Specifically, expansion-focused creative dialogues— those focused on combining or expanding existing concepts—emerge in transparent groups, but only when the group’s social capital is characterized by structural holes. Conversely, we found that reframingfocused dialogues—those focused on challenging and rethinking—emerge in private groups but only when the group’s social capital is characterized by network cohesion. Theoretically, these findings can help to solve the conundrums in the literature on group creativity and shed light on the role of ESM use in this context. Practically, our findings offer a critical reflection o contemporary initiatives for increasing transparency, whether through physical design or digital transformation.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"187 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86250915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Literature has shown that business-information technology (IT) alignment can exert both positive and negative influences on organizational agility, giving rise to the IT alignment-agility paradox. To better understand this paradox at a more granular level, we conceptualize the sensing and responding dimensions of organizational agility as two independent constructs and suggest a nonlinear analytical approach. Based on configurational and contextual perspectives, this study investigates how intellectual and social alignment and organizational and environmental elements combine into multiple configurations to affect sensing and responding capabilities. Fuzzy-set qualitative comparative analysis (fsQCA) is used to analyze the survey data from 135 dyads of business and IT executives from the Chinese shipbuilding industry. Results show that different equifinal pathways can be used to achieve high sensing and responding capabilities, in which intellectual and social alignment play heterogeneous roles depending on the specific contexts. This study extends the ITenabled agility literature by deepening our understanding of the effects of multidimensional IT alignment on multidimensional organizational agility and providing new insights into the IT alignment-agility paradox.
{"title":"Effects of Intellectual and Social Alignment on Organizational Agility: A Configurational Theory Approach","authors":"Hao Hu, Nianxin Wang, Huigang Liang","doi":"10.17705/1jais.00780","DOIUrl":"https://doi.org/10.17705/1jais.00780","url":null,"abstract":"Literature has shown that business-information technology (IT) alignment can exert both positive and negative influences on organizational agility, giving rise to the IT alignment-agility paradox. To better understand this paradox at a more granular level, we conceptualize the sensing and responding dimensions of organizational agility as two independent constructs and suggest a nonlinear analytical approach. Based on configurational and contextual perspectives, this study investigates how intellectual and social alignment and organizational and environmental elements combine into multiple configurations to affect sensing and responding capabilities. Fuzzy-set qualitative comparative analysis (fsQCA) is used to analyze the survey data from 135 dyads of business and IT executives from the Chinese shipbuilding industry. Results show that different equifinal pathways can be used to achieve high sensing and responding capabilities, in which intellectual and social alignment play heterogeneous roles depending on the specific contexts. This study extends the ITenabled agility literature by deepening our understanding of the effects of multidimensional IT alignment on multidimensional organizational agility and providing new insights into the IT alignment-agility paradox.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"1 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84788910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abayomi Baiyere, R. Galliers, H. Salmela, Tommi J. Tapanainen
{"title":"The Backstory of \"Digital Agility Theory\"","authors":"Abayomi Baiyere, R. Galliers, H. Salmela, Tommi J. Tapanainen","doi":"10.17705/1jais.00818","DOIUrl":"https://doi.org/10.17705/1jais.00818","url":null,"abstract":"<jats:p />","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"30 1","pages":"10"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81600884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Individuals who have experienced harm (also known as victims) by people, organizations, or adverse events sometimes use social media to share their experiences with others, search for information, and find social support. While some observers offer support and engage in inclusion toward victims on social media, other observers blame victims for their plight and participate in revictimization and exclusion. Victim blaming, which can lead to social exclusion, disproportionately impacts those in society who are already at risk for exclusion and may perpetuate existing racial, ethnic, gender, and economic inequalities. This research provides a theoretical framework to identify reasons why observers engage in such wide-ranging responses to victims on social media. Specifically, we consider social inclusion and exclusion at the confluence of a social phenomenon (victim blaming), a theory (just world theory), and an information technology artifact (social media) among a specific type of actor (observers). Our theoretical framework of social media inclusion and exclusion is informed by just world theory and considers how social media functionalities can promote social media inclusion or exclusion. We also offer research questions to stimulate future research related to social media inclusion, social media exclusion, and just world theory.
{"title":"Is it Your Fault? Framing Social Media Inclusion and Exclusion Using Just World Theory","authors":"S. Petter, Laurie Giddens","doi":"10.17705/1jais.00813","DOIUrl":"https://doi.org/10.17705/1jais.00813","url":null,"abstract":"Individuals who have experienced harm (also known as victims) by people, organizations, or adverse events sometimes use social media to share their experiences with others, search for information, and find social support. While some observers offer support and engage in inclusion toward victims on social media, other observers blame victims for their plight and participate in revictimization and exclusion. Victim blaming, which can lead to social exclusion, disproportionately impacts those in society who are already at risk for exclusion and may perpetuate existing racial, ethnic, gender, and economic inequalities. This research provides a theoretical framework to identify reasons why observers engage in such wide-ranging responses to victims on social media. Specifically, we consider social inclusion and exclusion at the confluence of a social phenomenon (victim blaming), a theory (just world theory), and an information technology artifact (social media) among a specific type of actor (observers). Our theoretical framework of social media inclusion and exclusion is informed by just world theory and considers how social media functionalities can promote social media inclusion or exclusion. We also offer research questions to stimulate future research related to social media inclusion, social media exclusion, and just world theory.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"416 1","pages":"8"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79453868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}