{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T01:01:30Z","timestamp":1701997290928},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,6,11]],"date-time":"2013-06-11T00:00:00Z","timestamp":1370908800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s10799-013-0164-y","type":"journal-article","created":{"date-parts":[[2013,6,10]],"date-time":"2013-06-10T03:29:13Z","timestamp":1370834953000},"page":"269-282","source":"Crossref","is-referenced-by-count":22,"title":["The effects and moderators of cyber-loafing controls: an empirical study of Chinese public servants"],"prefix":"10.1007","volume":"14","author":[{"given":"Jijie","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jun","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,11]]},"reference":[{"key":"164_CR1","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1002\/job.161","volume":"23","author":"VKG Lim","year":"2002","unstructured":"Lim VKG (2002) The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. J Organ Behav 23:675\u2013694","journal-title":"J Organ Behav"},{"issue":"1","key":"164_CR2","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/502269.502300","volume":"45","author":"VKG Lim","year":"2002","unstructured":"Lim VKG, Teo TSH, Loo GL (2002) How do I loaf here? Let me count the ways. Commun ACM 45(1):66\u201370","journal-title":"Commun ACM"},{"issue":"3","key":"164_CR3","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1089\/cpb.2007.0146","volume":"11","author":"RK Garrett","year":"2008","unstructured":"Garrett RK, Danziger JN (2008) On cyberslacking: workplace status and personal Internet use at work. CyberPsychol Behav 11(3):287\u2013292","journal-title":"CyberPsychol Behav"},{"issue":"4","key":"164_CR4","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1111\/j.1083-6101.2008.00425.x","volume":"13","author":"RK Garrett","year":"2008","unstructured":"Garrett RK, Danziger JN (2008) Disaffection or expected outcomes: understanding personal Internet use during work. J Comput Mediat Commun 13(4):937\u2013958","journal-title":"J Comput Mediat Commun"},{"key":"164_CR5","unstructured":"Salary.com. The 2008 Wasting Time at Work Survey Reveals a Record Number of People Waste Time at Work 2009 [cited 2009 September 16]; Available from: http:\/\/www.salary.com\/Articles\/ArticleDetail.asp?part=par1083"},{"key":"164_CR6","unstructured":"8e6 Technologies, 2008 Personal Internet Use Survey: United States and United Kingdom. 2008"},{"key":"164_CR7","unstructured":"Sinha A (2008) Websense survey\u2014email and IM top the productivity loss, Porn Usage goes up, in Indian IT Industry. 2008"},{"key":"164_CR8","unstructured":"Chinese office workers world\u2019s worst in cyberslacking (2005) Auguest 18, 2005 [cited; Available from: http:\/\/english.people.com.cn\/200508\/18\/eng20050818_203246.html"},{"key":"164_CR9","unstructured":"Web@Work Survey 2006 (2006) [cited 2011 September 16]; Available from: http:\/\/www.securitymanagement.com\/archive\/library\/websense_technofile0906.pdf"},{"key":"164_CR10","unstructured":"Oswalt B, Elliott-Howard F, Austin SF (2003) Cyberslacking\u2014Legal and ethical issues facing IT managers, in Annual conference of the international association for computer information systems. Las Vegas, NV"},{"issue":"2","key":"164_CR11","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1108\/02635570510583280","volume":"105","author":"CB Foltz","year":"2005","unstructured":"Foltz CB, Cronan TP, Jones TW (2005) Have you met your organization\u2019s comptuer usage policy? Ind Manag Data Syst 105(2):137\u2013146","journal-title":"Ind Manag Data Syst"},{"issue":"3","key":"164_CR12","first-page":"383","volume":"20","author":"CA Henle","year":"2008","unstructured":"Henle CA, Blanchard AL (2008) The interaction of work stressors and organizational sanctions on cyberloafing. J Manag Issues 20(3):383\u2013400","journal-title":"J Manag Issues"},{"key":"164_CR13","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.chb.2009.03.005","volume":"25","author":"CA Henle","year":"2009","unstructured":"Henle CA, Kohut G, Booth R (2009) Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: an empirical test of justice theory. Comput Hum Behav 25:902\u2013910","journal-title":"Comput Hum Behav"},{"issue":"2","key":"164_CR14","first-page":"49","volume":"50","author":"Q Liao","year":"2008","unstructured":"Liao Q, Luo X, Gurung A, Li L (2008) Workplace management and employee misuse: does punishment matter? J Comput Inform Syst 50(2):49\u201359","journal-title":"J Comput Inform Syst"},{"issue":"3","key":"164_CR15","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1089\/cpb.2006.9.325","volume":"9","author":"M Anandarajan","year":"2006","unstructured":"Anandarajan M, Paravastu N, Caiib BC, Simmers CA (2006) Perceptions of personal Web usage in the workplace: a Q-methodology approach. Cyber Psychol Behav 9(3):325\u2013335","journal-title":"Cyber Psychol Behav"},{"key":"164_CR16","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.hrmr.2009.03.012","volume":"20","author":"TG Weatherbee","year":"2009","unstructured":"Weatherbee TG (2009) Counterproductive use of technology at work: information & communications technologies and cyberdeviancy. Hum Resour Manag Rev 20:35\u201344","journal-title":"Hum Resour Manag Rev"},{"key":"164_CR17","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1016\/j.jvb.2005.10.005","volume":"68","author":"PE Spector","year":"2005","unstructured":"Spector PE, Penney L, Bruursema K, Goh A, Kessler S (2005) The dimensionality of counterproductivity: are all counterproductive behaviours created equal? J Vocat Behav 68:446\u2013460","journal-title":"J Vocat Behav"},{"issue":"4","key":"164_CR18","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1145\/1498765.1498799","volume":"52","author":"G-W Bock","year":"2009","unstructured":"Bock G-W, Ho SL (2009) Non-work related computing (NWRC). Commun ACM 52(4):124\u2013128","journal-title":"Commun ACM"},{"key":"164_CR19","unstructured":"Lim VKG, Chen DJQ (2009) Cyberloafing at the workplace: gain or drain on work? Behav Inf Technol, 11"},{"key":"164_CR20","doi-asserted-by":"crossref","first-page":"5, 1751","DOI":"10.1016\/j.chb.2011.03.002","volume":"27","author":"J Vitak","year":"2011","unstructured":"Vitak J, Crouse J, LaRose R (2011) Personal internet use at work: understanding cyberslacking. Comput Hum Behav 27:5, 1751","journal-title":"Comput Hum Behav"},{"issue":"2","key":"164_CR21","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1089\/cpb.2005.8.143","volume":"8","author":"WJ Everton","year":"2005","unstructured":"Everton WJ, Mastrangelo PM, Jolton JA (2005) Personality correlates of employees\u2019 personal use of work computers. CyberPsychol Behav 8(2):143\u2013153","journal-title":"CyberPsychol Behav"},{"issue":"1","key":"164_CR22","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1108\/02635570810844106","volume":"108","author":"JV Chen","year":"2008","unstructured":"Chen JV, Chen CC, Yang H (2008) An empirical evaluation of key factors contributing to internet abuse in the workplace. Ind Manag Data Syst 108(1):87\u2013106","journal-title":"Ind Manag Data Syst"},{"key":"164_CR23","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1080\/01639625.1991.9967872","volume":"12","author":"RC Hollinger","year":"1991","unstructured":"Hollinger RC (1991) Neutralizing in the workplace: an empirical analysis of property theft and production deviance. Deviant Behav 12:169\u2013202","journal-title":"Deviant Behav"},{"key":"164_CR24","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1177\/002242788101800206","volume":"18","author":"WW Minor","year":"1981","unstructured":"Minor WW (1981) Techniques of neutralization: a reconceptualization and empirical examination. J Res Crime Delinq 18:295\u2013318","journal-title":"J Res Crime Delinq"},{"key":"164_CR25","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1016\/j.im.2004.12.002","volume":"42","author":"VKG Lim","year":"2005","unstructured":"Lim VKG, Teo TSH (2005) Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore. An exploratory study. Inf Manag 42:1081\u20131093","journal-title":"Inf Manag"},{"key":"164_CR26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.im.2008.01.004","volume":"45","author":"LG Pee","year":"2008","unstructured":"Pee LG, Woon IMY, Kankanhalli A (2008) Explaining non-work-related computing in the workplace: a comparison of alternative models. Inf Manag 45:120\u2013130","journal-title":"Inf Manag"},{"issue":"2","key":"164_CR27","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1108\/09685220210424104","volume":"10","author":"J Lee","year":"2002","unstructured":"Lee J, Yonghuwa L (2002) A holistic model of computer abuse within organizations. Inf Manag ComputSecur 10(2):57\u201363","journal-title":"Inf Manag ComputSecur"},{"issue":"4","key":"164_CR28","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1108\/10662240610690052","volume":"16","author":"PZM Lara de","year":"2006","unstructured":"de Lara PZM, Tacoronte DV, Ding JMT (2006) Do current anti-cyberloafing disciplinary practices have a replica in research findings?: a study of the effects of coercive strategies on workplace Internet misuse. Internet Res 16(4):450\u2013467","journal-title":"Internet Res"},{"key":"164_CR29","unstructured":"American Management Association (2007) Electronic monitoring and surveillance Survey. AMA\/ePolicy Institute Research"},{"issue":"3","key":"164_CR30","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.ijinfomgt.2010.06.001","volume":"31","author":"NF Dohertya","year":"2011","unstructured":"Dohertya NF, Anastasakisa L, Fulfordb H (2011) Reinforcing the security of corporate information resources: a critical review of the role of the acceptable use policy. Int J Inf Manag 31(3):201\u2013209","journal-title":"Int J Inf Manag"},{"issue":"6","key":"164_CR31","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1037\/0022-3514.58.6.1062","volume":"58","author":"A Baumgardner","year":"1990","unstructured":"Baumgardner A (1990) To know oneself is to like oneself: self-certainty and self-affect. J Pers Soc Psychol 58(6):1062\u20131072","journal-title":"J Pers Soc Psychol"},{"key":"164_CR32","doi-asserted-by":"crossref","DOI":"10.4135\/9781452231549","volume-title":"Job satisfaction: application, assessment, cause, and consequences","author":"PE Spector","year":"1997","unstructured":"Spector PE (1997) Job satisfaction: application, assessment, cause, and consequences. Sage Publications, Inc., London"},{"issue":"1","key":"164_CR33","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/502269.502302","volume":"45","author":"K Siau","year":"2002","unstructured":"Siau K, Nah FF-H, Teng L (2002) Acceptable internet use policy. Commun ACM 45(1):75\u201379","journal-title":"Commun ACM"},{"issue":"1","key":"164_CR34","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/502269.502303","volume":"45","author":"A Urbaczewski","year":"2002","unstructured":"Urbaczewski A, Jessup LM (2002) Does electronic monitoring of employee internet usage work? Commun ACM 45(1):80\u201383","journal-title":"Commun ACM"},{"issue":"4","key":"164_CR35","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/S0747-5632(00)00018-2","volume":"16","author":"J Stanton","year":"2000","unstructured":"Stanton J, Weiss E (2000) Electronic monitoring in their own words: an exploratory study of employees\u2019 experiences with new types of surveillance. Comput Hum Behav 16(4):423\u2013440","journal-title":"Comput Hum Behav"},{"issue":"7","key":"164_CR36","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.im.2006.08.008","volume":"43","author":"GS Alder","year":"2006","unstructured":"Alder GS, Noel TW, Ambrose ML (2006) Clarifying the effects of Internet monitoring on job attitudes: the mediating role of employee trust. Inf Manag 43(7):894\u2013903","journal-title":"Inf Manag"},{"key":"164_CR37","unstructured":"Coopersmith S (1967) The antecedents of self-esteem. Freeman"},{"key":"164_CR38","first-page":"352","volume-title":"Self and identity development","author":"S Harter","year":"1990","unstructured":"Harter S (1990) Self and identity development. The developing adolescent, At the threshold, pp 352\u2013387"},{"key":"164_CR39","unstructured":"Dettinger S, Hart G (2007) The relationship between self-esteem and indirect aggression in the workplace. J Psychiatr Psychol 1(1)"},{"key":"164_CR40","volume-title":"Self-esteem at work","author":"J Brockner","year":"1988","unstructured":"Brockner J (1988) Self-esteem at work. Lexington, Lexington, MA"},{"key":"164_CR41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1037\/h0024237","volume":"51","author":"AK Korman","year":"1967","unstructured":"Korman AK (1967) Self-esteem as a moderator of the relationship between self-perceived abilities and vocational choice. J Appl Psychol 51:65\u201367","journal-title":"J Appl Psychol"},{"key":"164_CR42","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1037\/h0028656","volume":"54","author":"AK Korman","year":"1970","unstructured":"Korman AK (1970) Toward an hypothesis of work behavior. J Appl Psychol 54:31\u201341","journal-title":"J Appl Psychol"},{"issue":"3","key":"164_CR43","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1037\/0022-3514.68.3.518","volume":"68","author":"MR Leary","year":"1995","unstructured":"Leary MR, Tambor ES, Terdal SQ, Downs DL (1995) Self-esteem as an interpersonal monitor: the sociometer hypothesis. J Pers Soc Psychol 68(3):518\u2013530","journal-title":"J Pers Soc Psychol"},{"key":"164_CR44","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-5887-2","volume-title":"Attention and self-regulation: a control theory approach to human behavior","author":"CS Carver","year":"1981","unstructured":"Carver CS, Scheier MF (1981) Attention and self-regulation: a control theory approach to human behavior. Springer, New York"},{"key":"164_CR45","first-page":"1297","volume":"1","author":"E Locke","year":"1976","unstructured":"Locke E (1976) The nature and causes of job satisfaction. Handb ind organ psychol 1:1297\u20131343","journal-title":"Handb ind organ psychol"},{"issue":"6","key":"164_CR46","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1007\/BF00929796","volume":"13","author":"PE Spector","year":"1985","unstructured":"Spector PE (1985) Measurement of human service staff satisfaction: development of the job satisfaction survey. Am J Commun Psychol 13(6):693\u2013713","journal-title":"Am J Commun Psychol"},{"issue":"2","key":"164_CR47","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.jvb.2007.04.007","volume":"71","author":"NA Bowling","year":"2007","unstructured":"Bowling NA (2007) Is the job satisfaction-job performance relationship spurious? A meta-analytic examination. J Vocat Behav 71(2):167\u2013185","journal-title":"J Vocat Behav"},{"key":"164_CR48","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1037\/0021-9010.90.6.1241","volume":"90","author":"RS Dalal","year":"2005","unstructured":"Dalal RS (2005) A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. J Appl Psychol 90:1241\u20131255","journal-title":"J Appl Psychol"},{"key":"164_CR49","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1037\/0021-9010.91.1.126","volume":"91","author":"TA Judge","year":"2006","unstructured":"Judge TA, Scott BA, Ilies R (2006) Hostility, job attitudes, and workplace deviance: test of a multi-level model. J Appl Psychol 91:126\u2013138","journal-title":"J Appl Psychol"},{"key":"164_CR50","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1037\/0033-2909.127.3.376","volume":"127","author":"TA Judge","year":"2001","unstructured":"Judge TA, Thoresen CJ, Bono JE, Patton GK (2001) The job satisfaction\u2014Job performance relationship: a qualitative and quantitative review. Psychol Bull 127:376\u2013407","journal-title":"Psychol Bull"},{"key":"164_CR51","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1111\/j.1744-6570.2006.00048.x","volume":"59","author":"M Mount","year":"2006","unstructured":"Mount M, Ilies R, Johnson E (2006) Relationship of personality traits and counterproductive work behaviors: the mediating effects of job satisfaction. Pers Psychol 59:591\u2013622","journal-title":"Pers Psychol"},{"issue":"1","key":"164_CR52","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1037\/0021-9010.87.1.52","volume":"87","author":"JA LePine","year":"2002","unstructured":"LePine JA, Erez A, Johnson DE (2002) The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis. J Appl Psychol 87(1):52","journal-title":"J Appl Psychol"},{"issue":"4","key":"164_CR53","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1111\/j.1744-6570.1995.tb01781.x","volume":"48","author":"DW Organ","year":"1995","unstructured":"Organ DW, Ryan K (1995) A meta-analytic review of attitudinal and dispositional predictors of organizational citizenship behavior. Pers Psychol 48(4):775\u2013802","journal-title":"Pers Psychol"},{"key":"164_CR54","doi-asserted-by":"crossref","first-page":"53","DOI":"10.5465\/amr.1979.4289183","volume":"25","author":"S Gould","year":"1979","unstructured":"Gould S (1979) An equity-exchange model of organizational involvement. Acad Manag Rev 25:53\u201362","journal-title":"Acad Manag Rev"},{"key":"164_CR55","doi-asserted-by":"crossref","first-page":"161","DOI":"10.2307\/2092623","volume":"25","author":"AW Gouldner","year":"1960","unstructured":"Gouldner AW (1960) The norm of reciprocity: a preliminary statement. Am Sociol Rev 25:161\u2013178","journal-title":"Am Sociol Rev"},{"key":"164_CR56","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1016\/j.dss.2009.12.005","volume":"48","author":"H Li","year":"2010","unstructured":"Li H, Zhang J, Sarathy R (2010) Understanding compliance with internet use policy from the perspective of rational choice theory. Decis Support Syst 48:635\u2013645","journal-title":"Decis Support Syst"},{"key":"164_CR57","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s10551-007-9432-2","volume":"80","author":"GS Alder","year":"2008","unstructured":"Alder GS, Schminkee M, Noel TW, Kuenzi M (2008) Employee reactions to Internet monitoring: the moderating role of ethical orientation. J Bus Ethics 80:481\u2013498","journal-title":"J Bus Ethics"},{"key":"164_CR58","unstructured":"China, The Internet in China, in The Internet in China. 2010, Information Office of the State Council of the People\u2019s Republic of China: Beijing"},{"key":"164_CR59","unstructured":"www.henan.gov.cn (2006) Henan publishes ten disciplines; Public servants\u2019 chatting online during work time is prohibited. [cited 2012 January 8th, 2012]; Available from: http:\/\/www.henan.gov.cn\/hdjl\/system\/2006\/12\/25\/010016206.shtml"},{"key":"164_CR60","unstructured":"www.chinanews.com (2011) Ningbo city monitors public servants\u2019 online activities during work time. Browsing non-work related websites is prohibited. [cited 2012 January 08, 2012]; Available from: http:\/\/www.chinanews.com\/sh\/2011\/01-13\/2787143.shtml"},{"issue":"1","key":"164_CR61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0378-7206(01)00075-1","volume":"39","author":"M Chang","year":"2001","unstructured":"Chang M, Cheung W (2001) Determinants of the intention to use Internet\/WWW at work: a confirmatory study. Inf Manag 39(1):1\u201314","journal-title":"Inf Manag"},{"issue":"2","key":"164_CR62","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1086\/267089","volume":"26","author":"M Rosenberg","year":"1962","unstructured":"Rosenberg M (1962) Self-esteem and concern with public affairs. Public Opin Q 26(2):201\u2013211","journal-title":"Public Opin Q"},{"key":"164_CR63","unstructured":"Nunnally J, Bernstein I (1994) Psychometric theory, McGraw-Hill New York. p 736"},{"key":"164_CR64","unstructured":"Hair JF, Tatham RL, Anderson RE, Black W (1998) Multivariate data analysis, Prentice Hall"},{"key":"164_CR65","unstructured":"Aiken LS, West SG (1991) Multiple regression: testing and interpreting interactions"},{"issue":"3","key":"164_CR66","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1037\/0033-2909.102.3.414","volume":"102","author":"LJ Cronbach","year":"1987","unstructured":"Cronbach LJ (1987) Statistical tests for moderator variables: flaws in analyses recently proposed. Psychol Bull 102(3):414\u2013417","journal-title":"Psychol Bull"},{"issue":"4","key":"164_CR67","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1006\/ijhc.2000.0400","volume":"53","author":"L Armstrong","year":"2000","unstructured":"Armstrong L, Phillips JG, Saling LL (2000) Potential determinants of heavier internet usage. Int J Hum Comput Stud 53(4):537\u2013550","journal-title":"Int J Hum Comput Stud"},{"key":"164_CR68","doi-asserted-by":"crossref","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, 425\u2013478","DOI":"10.2307\/30036540"},{"issue":"3","key":"164_CR69","doi-asserted-by":"crossref","first-page":"483","DOI":"10.2307\/25148853","volume":"32","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh V, Brown SA, Maruping LM, Bala H (2008) Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation. MIS Quarterly 32(3):483\u2013502","journal-title":"Mis Quarterly"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-013-0164-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-013-0164-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-013-0164-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T15:31:09Z","timestamp":1645716669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-013-0164-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,11]]},"references-count":69,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["164"],"URL":"https:\/\/doi.org\/10.1007\/s10799-013-0164-y","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,11]]}}}