{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:45:43Z","timestamp":1743108343713,"version":"3.40.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031359941"},{"type":"electronic","value":"9783031359958"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35995-8_36","type":"book-chapter","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T07:02:24Z","timestamp":1687935744000},"page":"509-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Excessive Internet Use in the Organizational Context: A Proposition of the New Instrument to Measure Cyberloafing at Work"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5044-4070","authenticated-orcid":false,"given":"Beata","family":"Bajcar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6604-7763","authenticated-orcid":false,"given":"Jolanta","family":"Babiak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,26]]},"reference":[{"issue":"5","key":"36_CR1","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1002\/job.161","volume":"23","author":"VKG Lim","year":"2002","unstructured":"Lim, V.K.G.: The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. J. Organ. Behav. 23(5), 675\u2013694 (2002)","journal-title":"J. Organ. Behav."},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1016\/j.chb.2014.04.006","volume":"36","author":"K Askew","year":"2014","unstructured":"Askew, K., Buckner, J.E., Taing, M.U., Ilie, A., Bauer, J.A., Coovert, M.D.: Explaining cyberloafing: the role of the theory of planned behavior. Comput. Hum. Behav. 36, 510\u2013519 (2014)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"36_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1108\/INTR-06-2020-0332","volume":"32","author":"A Tandon","year":"2022","unstructured":"Tandon, A., Kaur, P., Ruparel, N., Islam, J.U., Dhir, A.: Cyberloafing and cyberslacking in the workplace: systematic literature review of past achievements and future promises. Internet Res. 32(1), 55\u201389 (2022)","journal-title":"Internet Res."},{"doi-asserted-by":"crossref","unstructured":"Lim, V.K.G., Teo, T.S.H.: Cyberloafing: a review and research agenda. Appl. Psychol. (2022)","key":"36_CR4","DOI":"10.1111\/apps.12452"},{"issue":"6","key":"36_CR5","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1089\/cpb.2006.9.730","volume":"9","author":"PM Mastrangelo","year":"2006","unstructured":"Mastrangelo, P.M., Everton, W., Jolton, J.A.: Personal use of work computers: distraction versus destruction. Cyberpsychol. Behav. 9(6), 730\u2013741 (2006)","journal-title":"Cyberpsychol. Behav."},{"doi-asserted-by":"crossref","unstructured":"Andreassen, C.S., Torsheim, T., Pallesen, S.: Use of online social network sites for personal purposes at work: does it impair self-reported performance? Compr. Psychol. 3(1), Article 18 (2014)","key":"36_CR6","DOI":"10.2466\/01.21.CP.3.18"},{"issue":"4","key":"36_CR7","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1177\/1534484317725438","volume":"16","author":"S Kim","year":"2017","unstructured":"Kim, S., Christensen, A.L.: The dark and bright sides of personal use of technology at work: a job demands\u2013resources model. Hum. Resour. Dev. Rev. 16(4), 425\u2013447 (2017)","journal-title":"Hum. Resour. Dev. Rev."},{"unstructured":"Conner, C.: Wasting time at work: the epidemic continues. Forbes, 31 July 2015. https:\/\/www.forbes.com","key":"36_CR8"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.chb.2019.07.013","volume":"101","author":"SA Andel","year":"2019","unstructured":"Andel, S.A., Kessler, S.R., Pindek, S., Kleinman, G., Spector, P.E.: Is cyberloafing more complex than we originally thought? Cyberloafing as a coping response to workplace aggression exposure. Comput. Hum. Behav. 101, 124\u2013130 (2019)","journal-title":"Comput. Hum. Behav."},{"doi-asserted-by":"crossref","unstructured":"Giordano, C., Mercado, B.K.: Cyberloafing: Investigating the importance and implications of new and known predictors. Collabra Psychol. 9(1), 1\u201318 (2023)","key":"36_CR10","DOI":"10.1525\/collabra.57391"},{"issue":"8","key":"36_CR11","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.im.2004.12.002","volume":"42","author":"VK Lim","year":"2005","unstructured":"Lim, V.K., Teo, T.S.: Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore. Inf. Manag. 42(8), 1081\u20131093 (2005)","journal-title":"Inf. Manag."},{"issue":"1","key":"36_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1089\/109493104322820165","volume":"7","author":"P Mahatanankoon","year":"2004","unstructured":"Mahatanankoon, P., Anandarajan, M., Igbaria, M.: Development of a measure of personal web usage in the workplace. Cyberpsychol. Behav. 7(1), 93\u2013104 (2004)","journal-title":"Cyberpsychol. Behav."},{"doi-asserted-by":"crossref","unstructured":"Anandarajan, M., Devine, P., Simmers, C.A.: A multidimensional sealing approach to personal web usage in the workplace. In: Anandarajan, M., Simmers, C.A. (eds.) Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management, pp. 61\u201379. Information Science Publishing, Hershey, PA (2004)","key":"36_CR13","DOI":"10.4018\/978-1-59140-148-3.ch004"},{"issue":"1","key":"36_CR14","first-page":"9","volume":"35","author":"G Blau","year":"2006","unstructured":"Blau, G., Yang, Y., Ward-Cook, K.: Testing a measure of cyberloafing. J. Allied Health 35(1), 9\u201317 (2006)","journal-title":"J. Allied Health"},{"issue":"3","key":"36_CR15","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1016\/j.chb.2007.03.008","volume":"24","author":"AL Blanchard","year":"2008","unstructured":"Blanchard, A.L., Henle, C.A.: Correlates of different forms of cyberloafing: the role of norms and external locus of control. Comput. Hum. Behav. 24(3), 1067\u20131084 (2008)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"36_CR16","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1111\/j.1468-005X.2011.00272.x","volume":"26","author":"BL Coker","year":"2011","unstructured":"Coker, B.L.: Freedom to surf: the positive effects of workplace Internet leisure browsing. N. Technol. Work. Employ. 26(3), 238\u2013247 (2011)","journal-title":"N. Technol. Work. Employ."},{"issue":"10","key":"36_CR17","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1089\/cyber.2010.0136","volume":"14","author":"M Anandarajan","year":"2011","unstructured":"Anandarajan, M., Simmers, C.A., D\u2019Ovidio, R.: Exploring the underlying structure of personal web usage in the workplace. Cyberpsychol. Behav. Soc. Netw. 14(10), 577\u2013583 (2011)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"issue":"5","key":"36_CR18","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1016\/j.chb.2011.03.002","volume":"27","author":"J Vitak","year":"2011","unstructured":"Vitak, J., Crouse, J., LaRose, R.: Personal Internet use at work: understanding cyberslacking. Comput. Hum. Behav. 27(5), 1751\u20131759 (2011)","journal-title":"Comput. Hum. Behav."},{"key":"36_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.chb.2016.03.069","volume":"62","author":"A Aghaz","year":"2016","unstructured":"Aghaz, A., Sheikh, A.: Cyberloafing and job burnout: an investigation in the knowledge-intensive sector. Comput. Hum. Behav. 62, 51\u201360 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"36_CR20","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1016\/j.chb.2015.11.002","volume":"55","author":"Y Akbulut","year":"2016","unstructured":"Akbulut, Y., Dursun, \u00d6.\u00d6., D\u00f6nmez, O., \u015eahin, Y.L.: In search of a measure to investigate cyberloafing in educational settings. Comput. Hum. Behav. 55, 616\u2013625 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"36_CR21","first-page":"409","volume":"26","author":"KY Koay","year":"2018","unstructured":"Koay, K.Y.: Assessing cyberloafing behaviour among university students: a validation of the cyberloafing scale. Pertanika J. Soc. Sci. Humanit. 26(1), 409\u2013424 (2018)","journal-title":"Pertanika J. Soc. Sci. Humanit."},{"key":"36_CR22","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.590545","volume":"12","author":"MD \u015eahin","year":"2021","unstructured":"\u015eahin, M.D.: Effect of item order on certain psychometric properties: a demonstration on a cyberloafing scale. Front. Psychol. 12, 590545 (2021)","journal-title":"Front. Psychol."},{"doi-asserted-by":"crossref","unstructured":"Koay, K.-Y., Soh, P.C.-H.: Does cyberloafing really harm employees\u2019 work performance?: An overview. In: Xu, J., Cooke, F.L., Gen, M., Ahmed, S.E. (eds.) Proceedings of the Twelfth International Conference on Management Science and Engineering Management. Lecture Notes on Multidisciplinary Industrial Engineering, pp. 901\u2013912. Springer International Publishing, Cham (2018)","key":"36_CR23","DOI":"10.1007\/978-3-319-93351-1_71"},{"issue":"3","key":"36_CR24","first-page":"383","volume":"20","author":"CA Henle","year":"2008","unstructured":"Henle, C.A., Blanchard, A.L.: The interaction of work stressors and organizational sanctions on cyberloafing. J. Manag. Issues 20(3), 383\u2013400 (2008)","journal-title":"J. Manag. Issues"},{"issue":"4","key":"36_CR25","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1111\/emre.12407","volume":"17","author":"PG Hensel","year":"2020","unstructured":"Hensel, P.G., Kacprzak, A.: Job overload, organizational commitment, and motivation as antecedents of cyberloafing: evidence from employee monitoring software. Eur. Manag. Rev. 17(4), 931\u2013942 (2020)","journal-title":"Eur. Manag. Rev."},{"issue":"4","key":"36_CR26","doi-asserted-by":"publisher","first-page":"4731","DOI":"10.1007\/s10639-021-10496-1","volume":"26","author":"H Elrehail","year":"2021","unstructured":"Elrehail, H., Rehman, S.U., Chaudhry, N.I., Alzghoul, A.: Nexus among cyberloafing behavior, job demands and job resources: a mediated-moderated model. Educ. Inf. Technol. 26(4), 4731\u20134749 (2021)","journal-title":"Educ. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Varghese, L., Barber, L.K.: A preliminary study exploring moderating effects of role stressors on the relationship between big five personality traits and workplace cyberloafing. Cyberpsychology 11(4),  Article 4 (2017)","key":"36_CR27","DOI":"10.5817\/CP2017-4-4"},{"issue":"3","key":"36_CR28","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1108\/02683940710733115","volume":"22","author":"AB Bakker","year":"2007","unstructured":"Bakker, A.B., Demerouti, E.: The job demands-resources model: state of the art. J. Manag. Psychol. 22(3), 309\u2013328 (2007)","journal-title":"J. Manag. Psychol."},{"unstructured":"Bajcar, B., Babiak, J.: Job characteristics and cyberloafing among Polish IT professionals: mediating role of work stress. In: Soliman, K.S. (ed.) Proceedings of the 36th International Business Information Management Association Conference, pp. 6565\u20136578. (IBIMA), King of Prussia, PA (2020)","key":"36_CR29"},{"issue":"4","key":"36_CR30","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1111\/jcc4.12085","volume":"19","author":"CS Andreassen","year":"2014","unstructured":"Andreassen, C.S., Torsheim, T., Pallesen, S.: Predictors of use of social network sites at work - a specific type of cyberloafing. J. Comput.-Mediat. Commun. 19(4), 906\u2013921 (2014)","journal-title":"J. Comput.-Mediat. Commun."},{"key":"36_CR31","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.chb.2018.04.040","volume":"86","author":"S Pindek","year":"2018","unstructured":"Pindek, S., Krajcevska, A., Spector, P.E.: Cyberloafing as a coping mechanism: dealing with workplace boredom. Comput. Hum. Behav. 86, 147\u2013152 (2018)","journal-title":"Comput. Hum. Behav."},{"doi-asserted-by":"crossref","unstructured":"Hobfoll, S.E.: Conservation of resources. A new attempt at conceptualizing stress. Am. Psychol. 44(3), 513\u2013524 (1989)","key":"36_CR32","DOI":"10.1037\/0003-066X.44.3.513"},{"issue":"2","key":"36_CR33","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1108\/INTR-03-2020-0165","volume":"31","author":"PK Lim","year":"2021","unstructured":"Lim, P.K., Koay, K.Y., Chong, W.Y.: The effects of abusive supervision, emotional exhaustion and organizational commitment on cyberloafing: a moderated-mediation examination. Internet Res. 31(2), 497\u2013518 (2021)","journal-title":"Internet Res."},{"issue":"4","key":"36_CR34","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1080\/01449290903353054","volume":"31","author":"VK Lim","year":"2012","unstructured":"Lim, V.K., Chen, D.J.: Cyberloafing at the workplace: gain or drain on work? Behav. Inf. Technol. 31(4), 343\u2013353 (2012)","journal-title":"Behav. Inf. Technol."},{"issue":"4","key":"36_CR35","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1002\/hrdq.21432","volume":"32","author":"J Zhu","year":"2021","unstructured":"Zhu, J., Wei, H., Li, H., Osburn, H.: The paradoxical effect of responsible leadership on employee cyberloafing: a moderated mediation model. Hum. Resour. Dev. Q. 32(4), 597\u2013624 (2021)","journal-title":"Hum. Resour. Dev. Q."},{"doi-asserted-by":"crossref","unstructured":"Koay, K.Y., Soh, P.C.-H., Chew, K.W.: Antecedents and consequences of cyberloafing: evidence from the Malaysian ICT industry. First Monday 22(3), 1\u201316 (2017)","key":"36_CR36","DOI":"10.5210\/fm.v22i3.7302"},{"unstructured":"Weissenfeld, K., Abramova, O., Krasnova, H. (eds.): Antecedents for cyberloafing \u2013 a literature review. In: 14th International Conference on Wirtschaftsinformatik, pp. 1687\u20131701, Siegen (2019)","key":"36_CR37"},{"unstructured":"Zakrzewski, C.: The key to getting workers to stop wasting time online. Wall Street Journal (2016). http:\/\/www.wsj.com\/articles\/the-key-to-getting-workers-to-stop-wasting-time-online-1457921545","key":"36_CR38"},{"issue":"5","key":"36_CR39","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1108\/CDI-08-2017-0142","volume":"22","author":"BK Mercado","year":"2017","unstructured":"Mercado, B.K., Giordano, C., Dilchert, S.: A meta-analytic investigation of cyberloafing. Career Dev. Int. 22(5), 546\u2013564 (2017)","journal-title":"Career Dev. Int."},{"unstructured":"Askew, K.: The relationship between cyberloafing and task performance and an examination of the theory of planned behavior as a model of cyberloafing. Unpublished doctoral dissertation, University of South Florida, Tampa (2012)","key":"36_CR40"},{"issue":"4","key":"36_CR41","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1145\/1498765.1498799","volume":"52","author":"G-W Bock","year":"2009","unstructured":"Bock, G.-W., Ho, S.L.: Non-work related computing (NWRC). Commun. ACM 52(4), 124\u2013128 (2009)","journal-title":"Commun. ACM"},{"issue":"5","key":"36_CR42","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1108\/17515631011080704","volume":"11","author":"T Ramayah","year":"2010","unstructured":"Ramayah, T.: Personal web usage and work inefficiency. Bus. Strategy Ser. 11(5), 295\u2013301 (2010)","journal-title":"Bus. Strategy Ser."},{"issue":"4","key":"36_CR43","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1108\/IntR-05-2017-0191","volume":"29","author":"J Mohammad","year":"2019","unstructured":"Mohammad, J., Quoquab, F., Halimah, S., Thurasamy, R.: Workplace Internet leisure and employees\u2019 productivity. Internet Res. 29(4), 725\u2013748 (2019)","journal-title":"Internet Res."},{"issue":"2","key":"36_CR44","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1080\/08959285.2013.765878","volume":"26","author":"BLS Coker","year":"2013","unstructured":"Coker, B.L.S.: Workplace Internet leisure browsing. Hum. Perform. 26(2), 114\u2013125 (2013)","journal-title":"Hum. Perform."},{"issue":"5","key":"36_CR45","first-page":"1509","volume":"8","author":"R Sao","year":"2020","unstructured":"Sao, R., Chandak, S., Patel, B., Bhadade, P.: Cyberloafing: effects on employee job performance and behavior. Int. J. Recent Technol. Eng. 8(5), 1509\u20131515 (2020)","journal-title":"Int. J. Recent Technol. Eng."},{"issue":"4","key":"36_CR46","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s10551-022-05038-9","volume":"183","author":"Z She","year":"2023","unstructured":"She, Z., Li, Q.: When too little or too much hurts: evidence for a curvilinear relationship between cyberloafing and task performance in public organizations. J. Bus. Ethics 183(4), 1141\u20131158 (2023)","journal-title":"J. Bus. Ethics"},{"issue":"3","key":"36_CR47","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1037\/0033-2909.127.3.376","volume":"127","author":"TA Judge","year":"2001","unstructured":"Judge, T.A., Thoresen, C.J., Bono, J.E., Patton, G.K.: The job satisfaction-job performance relationship: a qualitative and quantitative review. Psychol. Bull. 127(3), 376\u2013407 (2001)","journal-title":"Psychol. Bull."},{"issue":"1","key":"36_CR48","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/502269.502297","volume":"45","author":"JM Stanton","year":"2002","unstructured":"Stanton, J.M.: Company profile of the frequent internet user. Commun. ACM 45(1), 55\u201359 (2002)","journal-title":"Commun. ACM"},{"issue":"8","key":"36_CR49","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1080\/0144929X.2020.1723702","volume":"40","author":"F Farivar","year":"2021","unstructured":"Farivar, F., Richardson, J.: Workplace digitalisation and work-nonwork satisfaction: the role of spillover social media. Behav. Inf. Technol. 40(8), 747\u2013758 (2021)","journal-title":"Behav. Inf. Technol."},{"issue":"4","key":"36_CR50","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1108\/17537981111190042","volume":"4","author":"LC Messarra","year":"2011","unstructured":"Messarra, L.C., Karkoulian, S., McCarthy, R.: To restrict or not to restrict personal internet usage on the job. Educ. Bus. Soc. Contemp. Middle Eastern Issues 4(4), 253\u2013266 (2011)","journal-title":"Educ. Bus. Soc. Contemp. Middle Eastern Issues"},{"issue":"4","key":"36_CR51","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1111\/j.1083-6101.2008.00425.x","volume":"13","author":"RK Garrett","year":"2008","unstructured":"Garrett, R.K., Danziger, J.N.: Disaffection or expected outcomes: understanding personal Internet use during work. J. Comput. Mediat. Commun. 13(4), 937\u2013958 (2008)","journal-title":"J. Comput. Mediat. Commun."},{"key":"36_CR52","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.chb.2014.02.015","volume":"34","author":"TA O\u2019Neill","year":"2014","unstructured":"O\u2019Neill, T.A., Hambley, L.A., Bercovich, A.: Prediction of cyberslacking when employees are working away from the office. Comput. Hum. Behav. 34, 291\u2013298 (2014)","journal-title":"Comput. Hum. Behav."},{"unstructured":"Galletta, D., Polak, P.: An empirical investigation of antecedents of Internet abuse in the workplace. SIGHCI 2003 Proc. 14, 47\u201351 (2003)","key":"36_CR53"},{"doi-asserted-by":"crossref","unstructured":"Oravec, J.C.: Cyberloafing and constructive recreation. In: Khosrow-Pour, M. (ed.) Encyclopedia of Information Science and Technology, pp. 4316\u20134325. IGI Global, Hershey, PA (2018)","key":"36_CR54","DOI":"10.4018\/978-1-5225-2255-3.ch374"},{"issue":"3 Suppl","key":"36_CR55","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1177\/1403494809349858","volume":"38","author":"JH Pejtersen","year":"2010","unstructured":"Pejtersen, J.H., Kristensen, T.S., Borg, V., Bjorner, J.B.: The second version of the Copenhagen psychosocial questionnaire. Scand. J. Public Health 38(3 Suppl), 8\u201324 (2010)","journal-title":"Scand. J. Public Health"},{"doi-asserted-by":"crossref","unstructured":"Byrne, B.M.: Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming. Routledge, New York (2016)","key":"36_CR56","DOI":"10.4324\/9781315757421"},{"doi-asserted-by":"crossref","unstructured":"Jiang, H., Siponen, M., Tsohou, A.: Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance. Eur. J. Inf. Syst. 32(2), 331\u2013345 (2023)","key":"36_CR57","DOI":"10.1080\/0960085X.2021.1963193"},{"unstructured":"Global internet habits: Phone usage and social media still most popular. Brussels Times, 10 September 2022. https:\/\/www.brusselstimes.com","key":"36_CR58"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35995-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T14:06:48Z","timestamp":1691071608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35995-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031359941","9783031359958"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35995-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"530","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"188","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}