{"id":4818,"identifier":"FK2/IGUYIG","persistentUrl":"https://doi.org/10.34820/FK2/IGUYIG","protocol":"doi","authority":"10.34820","publisher":"Telkom University Dataverse","publicationDate":"2022-03-30","storageIdentifier":"file://10.34820/FK2/IGUYIG","datasetVersion":{"id":192,"datasetId":4818,"datasetPersistentId":"doi:10.34820/FK2/IGUYIG","storageIdentifier":"file://10.34820/FK2/IGUYIG","versionNumber":1,"versionMinorNumber":0,"versionState":"RELEASED","UNF":"UNF:6:++yH9kWutMlCHz5CmDF8VA==","lastUpdateTime":"2022-03-30T12:57:40Z","releaseTime":"2022-03-30T12:57:40Z","createTime":"2022-03-30T12:56:59Z","license":"CC0","termsOfUse":"CC0 Waiver","fileAccessRequest":false,"metadataBlocks":{"citation":{"displayName":"Citation Metadata","fields":[{"typeName":"title","multiple":false,"typeClass":"primitive","value":"\"Data Hedging\""},{"typeName":"author","multiple":true,"typeClass":"compound","value":[{"authorName":{"typeName":"authorName","multiple":false,"typeClass":"primitive","value":"mahardika, dewa"}}]},{"typeName":"datasetContact","multiple":true,"typeClass":"compound","value":[{"datasetContactName":{"typeName":"datasetContactName","multiple":false,"typeClass":"primitive","value":"mahardika, dewa"},"datasetContactEmail":{"typeName":"datasetContactEmail","multiple":false,"typeClass":"primitive","value":"dewamahardika@telkomuniversity.ac.id"}}]},{"typeName":"dsDescription","multiple":true,"typeClass":"compound","value":[{"dsDescriptionValue":{"typeName":"dsDescriptionValue","multiple":false,"typeClass":"primitive","value":"Data Hedging"}}]},{"typeName":"subject","multiple":true,"typeClass":"controlledVocabulary","value":["Business and Management"]},{"typeName":"depositor","multiple":false,"typeClass":"primitive","value":"mahardika, dewa"},{"typeName":"dateOfDeposit","multiple":false,"typeClass":"primitive","value":"2022-03-30"}]}},"files":[{"label":"Research Data- Hedging Effectiveness.tab","restricted":false,"version":3,"datasetVersionId":192,"dataFile":{"id":4819,"persistentId":"doi:10.34820/FK2/IGUYIG/9TNLNX","pidURL":"https://doi.org/10.34820/FK2/IGUYIG/9TNLNX","filename":"Research Data- Hedging Effectiveness.tab","contentType":"text/tab-separated-values","filesize":7405,"storageIdentifier":"file://17fdae6697a-161e3ce6c844","originalFileFormat":"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet","originalFormatLabel":"MS Excel Spreadsheet","originalFileSize":15810,"originalFileName":"Research Data- Hedging Effectiveness.xlsx","UNF":"UNF:6:++yH9kWutMlCHz5CmDF8VA==","rootDataFileId":-1,"md5":"dba1a5bfb04f555a1e1d3ef568c70eea","checksum":{"type":"MD5","value":"dba1a5bfb04f555a1e1d3ef568c70eea"},"creationDate":"2022-03-30"}}],"citation":"mahardika, dewa, 2022, \"\"Data Hedging\"\", https://doi.org/10.34820/FK2/IGUYIG, Telkom University Dataverse, V1, UNF:6:++yH9kWutMlCHz5CmDF8VA== [fileUNF]"}}