{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:12:31Z","timestamp":1726103551159},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030627423"},{"type":"electronic","value":"9783030627430"}],"license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62743-0_104","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:02:58Z","timestamp":1604383378000},"page":"731-736","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancement of Risk Prevention Ability of Students Funding Subjects in the Age of All Media"],"prefix":"10.1007","author":[{"given":"Yun","family":"Lu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"104_CR1","first-page":"97","volume":"5","author":"L Wang","year":"2019","unstructured":"Wang, L.: On the education of university students\u2019 values in the new media age. J. Party School Jinan Municipal Committee CPC 5, 97 (2019). (in Chinese)","journal-title":"J. Party School Jinan Municipal Committee CPC"},{"key":"104_CR2","first-page":"11","volume":"26","author":"M Zhao","year":"2019","unstructured":"Zhao, M., Yang, Z.: A study on the model of ideological and political education on the internet of border colleges and universities in the perspective of \u201cgreat ideology\u201d. Western China Qual. Educ. 26, 11 (2019). (in Chinese)","journal-title":"Western China Qual. Educ."},{"unstructured":"Liang, Q., Bao, N.: Reflection on dilemma of ideological and political discourse in the age of all media. J. China Univ. Min. Technol. (Soc. Sci.) 6, 57 (2019). (in Chinese)","key":"104_CR3"},{"unstructured":"Meng, L., Ma, A., Guo, L., Ma, Y., Li, J.: Risk analysis and resolution on the financial aid to the poor college students. J. Hebei Normal Univ. Sci. Technol. (Soc. Sci.) 11(1), 87\u201391 (2012). (in Chinese)","key":"104_CR4"},{"key":"104_CR5","first-page":"96","volume":"2","author":"H He","year":"2017","unstructured":"He, H.: Integrity risks and prevention and control of college student funding. J. Tongling Voc. Tech. College 2, 96\u201398 (2017). (in Chinese)","journal-title":"J. Tongling Voc. Tech. College"},{"key":"104_CR6","first-page":"56","volume":"1","author":"X Song","year":"2018","unstructured":"Song, X.: Targeted financial aid: the path choice of financial risk management in universities from the perspective of educational equity. J. Jiujiang Voc. Tech. College 1, 56\u201359 (2018). (in Chinese)","journal-title":"J. Jiujiang Voc. Tech. College"}],"container-title":["Advances in Intelligent Systems and Computing","The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62743-0_104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:46:04Z","timestamp":1604385964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62743-0_104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"ISBN":["9783030627423","9783030627430"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62743-0_104","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spiot2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}