{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T23:26:00Z","timestamp":1778109960876,"version":"3.51.4"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/L015463\/1"],"award-info":[{"award-number":["EP\/L015463\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2022,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattacks. Emerging work in this area has considered the phenomenon from various perspectives including the technological, the psychological and the sociotechnical. We extend this work by specifically examining unintentional forms of insider threat and report the outcomes of a series of detailed Critical Decision Method (CDM) led interviews with those who have experienced various forms of unwitting cybersecurity breaches. We also articulate factors likely to contribute firmly in the context of everyday work-as-done. CDM\u2019s probing questions were used to elicit expert knowledge around how decision making occurred prior, during and post an unintentional cyber breach whilst participants were engaged in the delivery of cognitive tasks. Through the application of grounded theory to data, emerging results included themes of decision making, task factors, accidents and organisational factors. These results are utilised to inform an Epidemiological Triangle to represent the dynamic relationship between three vectors of exploit, user and the work environment that can in turn affect the resilience of cyber defences. We conclude by presenting a simple framework, which for the purposes of this work is a set of recommendations applicable in specific scenarios to reduce negative impact for understanding unintentional insider threats. We also suggest practical means to counteract such threats rooted in the lived experience of those who have fallen prey to them.<\/jats:p>","DOI":"10.1007\/s10111-021-00690-z","type":"journal-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T03:30:40Z","timestamp":1635391840000},"page":"393-421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3962-7305","authenticated-orcid":false,"given":"Neeshe","family":"Khan","sequence":"first","affiliation":[]},{"given":"Robert","family":"J. Houghton","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Sharples","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,28]]},"reference":[{"key":"690_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30066-X","author":"I Agrafiotis","year":"2015","unstructured":"Agrafiotis I, Nurse JCR, Buckley O, Legg P, Creese S, Goldsmith M (2015) Identifying attack patterns for insider threat detection. Comput Fraud Secur. https:\/\/doi.org\/10.1016\/S1361-3723(15)30066-X","journal-title":"Comput Fraud Secur"},{"key":"690_CR2","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2018.1554985","author":"U Ani","year":"2018","unstructured":"Ani U, Daniel N, Oladipo F, Adewumi S (2018) Securing industrial control system environments: the missing piece. J Cyber Secur Technol. https:\/\/doi.org\/10.1080\/23742917.2018.1554985","journal-title":"J Cyber Secur Technol"},{"issue":"3","key":"690_CR3","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.apergo.2012.10.011","volume":"44","author":"C Bearman","year":"2013","unstructured":"Bearman C, Bremner P (2013) A day in the life of a volunteer incident commander: errors, pressures and mitigating strategies. Appl Ergon 44(3):488\u2013495. https:\/\/doi.org\/10.1016\/j.apergo.2012.10.011","journal-title":"Appl Ergon"},{"key":"690_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.12.001","author":"A Bell","year":"2019","unstructured":"Bell A, Rogers M, Pearce J (2019) The insider threat: behavioral indicators and factors influencing likelihood of intervention. Int J Crit Infrastruct Prot. https:\/\/doi.org\/10.1016\/j.ijcip.2018.12.001","journal-title":"Int J Crit Infrastruct Prot"},{"key":"690_CR5","volume-title":"Reclaiming reality: a critical introduction to contemporary philosophy","author":"R Bhaskar","year":"1989","unstructured":"Bhaskar R (1989) Reclaiming reality: a critical introduction to contemporary philosophy. Sage, London"},{"key":"690_CR6","doi-asserted-by":"publisher","unstructured":"Bishop M, Engle S, Peisert S, Whalen S, Gates C (2008) We have met the enemy and he is us. In: Proceedings of the 2008 new security paradigms workshop. https:\/\/doi.org\/10.1145\/1595676.1595678","DOI":"10.1145\/1595676.1595678"},{"key":"690_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50439-7_22","author":"M Canham","year":"2020","unstructured":"Canham M, Posey C, Bockelman P (2020) Confronting information security\u2019s elephant, the unintentional insider threat. Int Conf Hum Comput Interact HCI. https:\/\/doi.org\/10.1007\/978-3-030-50439-7_22","journal-title":"Int Conf Hum Comput Interact HCI"},{"key":"690_CR8","doi-asserted-by":"publisher","DOI":"10.1184\/R1\/6575231.v1","author":"D Cappelli","year":"2007","unstructured":"Cappelli D, Desai A, Moore A, Shimeall T, Weaver E, Willke B (2007) Management and education of the risk of insider threat (MERIT): mitigating the risk of sabotage to employers information, systems, or networks. Carnegie Mellon Univ. https:\/\/doi.org\/10.1184\/R1\/6575231.v1","journal-title":"Carnegie Mellon Univ"},{"key":"690_CR9","unstructured":"Cappelli D, Desai A, Moore A, Shimeall T, Weaver E, Willke B (2008) Management and education of the risk of insider threat (MERIT): system dynamics modeling of computer system. Carnegie Mellon University, Pittsburgh. https:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=52324. Accessed 17 Sep 2020"},{"key":"690_CR10","doi-asserted-by":"publisher","DOI":"10.1184\/R1\/6585575.v1","author":"CERT Insider Threat Team","year":"2013","unstructured":"CERT Insider Threat Team (2013) Unintentional insider threats: a foundational study. Softw Eng Inst. https:\/\/doi.org\/10.1184\/R1\/6585575.v1","journal-title":"Softw Eng Inst"},{"key":"690_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2857473","author":"P Chattopadhyay","year":"2018","unstructured":"Chattopadhyay P, Wang L, Tan Y-P (2018) Scenario-based insider threat detection from cyber activities. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2018.2857473","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"690_CR12","unstructured":"Dice Staff (2020) Cybersecurity in 2021: 5 Trends Security Pros Need to Know. Dice Insights. https:\/\/insights.dice.com\/2020\/12\/14\/cybersecurity-in-2021-5-trends-security-pros-need-to-know\/. Accessed 17 Dec 2020"},{"key":"690_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s11299-012-0104-2","volume":"11","author":"JSBT Evans","year":"2012","unstructured":"Evans JSBT (2012) Spot the difference: distinguishing between two kinds of processing. Mind Soc 11:121\u2013131. https:\/\/doi.org\/10.1007\/s11299-012-0104-2","journal-title":"Mind Soc"},{"key":"690_CR14","volume-title":"The discovery of grounded theory: strategies for qualitative research","author":"BG Glaser","year":"1967","unstructured":"Glaser BG, Strauss AL (1967) The discovery of grounded theory: strategies for qualitative research. Routledge, New York"},{"key":"690_CR15","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2019.1601889","author":"PL Goethals","year":"2019","unstructured":"Goethals PL, Hunt ME (2019) A review of scientific research in defensive cyberspace operation tools and technologies. J Cyber Secur Technol. https:\/\/doi.org\/10.1080\/23742917.2019.1601889","journal-title":"J Cyber Secur Technol"},{"key":"690_CR16","doi-asserted-by":"publisher","first-page":"504","DOI":"10.2105\/AJPH.39.4.504","volume":"39","author":"J Gordon","year":"1949","unstructured":"Gordon J (1949) The epidemiology of accidents. Am J Public Health Nations Health 39:504\u2013515","journal-title":"Am J Public Health Nations Health"},{"key":"690_CR17","doi-asserted-by":"publisher","DOI":"10.5038\/1944-0472.4.2.2","author":"FL Greitzer","year":"2011","unstructured":"Greitzer FL, Hohimer RE (2011) Modeling human behavior to anticipate insider attacks. J Strateg Secur. https:\/\/doi.org\/10.5038\/1944-0472.4.2.2","journal-title":"J Strateg Secur"},{"key":"690_CR18","doi-asserted-by":"publisher","unstructured":"Greitzer F, Purl J, Leong YM, Becker DES (2018) SOFIT: sociotechnical and organizational factors for insider threat. In: 2018 IEEE security and privacy workshops. https:\/\/doi.org\/10.1109\/SPW.2018.00035","DOI":"10.1109\/SPW.2018.00035"},{"key":"690_CR19","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.2105\/ajph.58.8.1431","volume":"58","author":"W Haddon","year":"1968","unstructured":"Haddon W (1968) The changing approach to the epidemiology, prevention, and amelioration of trauma: the transition to approaches etiologically rather than descriptively based. Am J Public Health Nations Health 58:1431\u20131438. https:\/\/doi.org\/10.2105\/ajph.58.8.1431","journal-title":"Am J Public Health Nations Health"},{"key":"690_CR21","doi-asserted-by":"publisher","unstructured":"Hadlington L (2018) The \u201chuman factor\u201d in cybersecurity: exploring the accidental insider. In: McAlaney J, Frumkin LA, Benson V (eds) Psychological and behavioral examinations in cyber security. IGI Global, pp 46\u201363. https:\/\/doi.org\/10.4018\/978-1-5225-4053-3.ch003","DOI":"10.4018\/978-1-5225-4053-3.ch003"},{"key":"690_CR20","doi-asserted-by":"publisher","DOI":"10.1145\/1938595.1938605","author":"R Hoda","year":"2010","unstructured":"Hoda R, Noble J, Marshall S (2010) Using grounded theory to study the human aspects of software engineering. HAoSE . https:\/\/doi.org\/10.1145\/1938595.1938605","journal-title":"HAoSE"},{"key":"690_CR22","doi-asserted-by":"publisher","DOI":"10.1518\/001872098779480442","author":"RR Hoffman","year":"1998","unstructured":"Hoffman RR, Crandall B, Shadbolt N (1998) Use of the critical decision method to elicit expert knowledge: a case study in the methodology of cognitive task analysis. Hum Factors. https:\/\/doi.org\/10.1518\/001872098779480442","journal-title":"Hum Factors"},{"key":"690_CR23","doi-asserted-by":"publisher","unstructured":"Hollnagel E, Wears RL, Braithwaite J (2015) From Safety-I to Safety-II: a white paper. University of Southern Denmark, University of Florida and Macquarie University. https:\/\/doi.org\/10.13140\/RG.2.1.4051.5282","DOI":"10.13140\/RG.2.1.4051.5282"},{"key":"690_CR24","volume-title":"Resilient health care","author":"E Hollnagel","year":"2017","unstructured":"Hollnagel E (2017) Why is work-as-imagined different from work-as- done? In: Wears RL, Hollnagel E (eds) Resilient health care, vol 2. CRC Press, Boca Raton"},{"key":"690_CR25","doi-asserted-by":"publisher","unstructured":"Hunker J, Probst C (2011) Insiders and insider threats\u2014an overview of definitions and mitigation techniques. J Wirel Mob Netw Ubiquitous Comput Dependable Appl. https:\/\/doi.org\/10.22667\/JOWUA.2011.03.31.004","DOI":"10.22667\/JOWUA.2011.03.31.004"},{"key":"690_CR26","doi-asserted-by":"publisher","unstructured":"Kamm\u00fcller F, Probst CW (2013) Invalidating policies using structural information. In: 2013 IEEE security and privacy workshops. https:\/\/doi.org\/10.1109\/SPW.2013.36","DOI":"10.1109\/SPW.2013.36"},{"key":"690_CR27","unstructured":"Keeney M, Kowalski E, Cappelli D, Moore A, Shimeall T, Rogers S (2005) Insider threat study: computer system sabotage in critical infrastructure sectors. National Threat Assessment CTR, Washington. https:\/\/apps.dtic.mil\/dtic\/tr\/fulltext\/u2\/a636653.pdf. Accessed 23 Sep 2020"},{"key":"690_CR28","doi-asserted-by":"publisher","unstructured":"Klein GA, Calderwood R, MacGregor D (1989) Critical decision method for eliciting knowledge. In: IEEE transactions on systems, man, and cybernetics. https:\/\/doi.org\/10.1109\/21.31053","DOI":"10.1109\/21.31053"},{"key":"690_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2438442","author":"PA Legg","year":"2017","unstructured":"Legg PA, Buckley O, Goldsmith M, Creese S (2017) Automated insider threat detection system using user and role-based profile assessment. IEEE Syst J. https:\/\/doi.org\/10.1109\/JSYST.2015.2438442","journal-title":"IEEE Syst J"},{"key":"690_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.003","author":"D Liginlal","year":"2009","unstructured":"Liginlal D, Sim I, Khansa L (2009) How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2008.11.003","journal-title":"Comput Secur"},{"key":"690_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00109-8","author":"G Magklaras","year":"2002","unstructured":"Magklaras G, Furnell S (2002) Insider threat prediction tool: evaluating the probability of IT misuse. Comput Secur. https:\/\/doi.org\/10.1016\/S0167-4048(02)00109-8","journal-title":"Comput Secur"},{"key":"690_CR32","doi-asserted-by":"publisher","unstructured":"Morel B (2011) Artificial intelligence and the future of cybersecurity. In: Proceedings of the 4th ACM workshop on security and artificial intelligence (AISec '11), Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/2046684.2046699","DOI":"10.1145\/2046684.2046699"},{"key":"690_CR33","doi-asserted-by":"publisher","unstructured":"Mundie DA, Perl S, Huth CL (2013) Toward an ontology for insider threat research: varieties of insider threat definitions. In: 2013 third workshop on socio-technical aspects in security and trust. https:\/\/doi.org\/10.1109\/STAST.2013.14","DOI":"10.1109\/STAST.2013.14"},{"key":"690_CR34","first-page":"1","volume-title":"Grounded theory method in HCI and CSCW","author":"MJ Muller","year":"2010","unstructured":"Muller MJ, Kogan S (2010) Grounded theory method in HCI and CSCW. IBM Center for Social Software, Cambridge, pp 1\u201346"},{"key":"690_CR35","unstructured":"NCSC (2012) 10 steps to cyber security: guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security. https:\/\/www.ncsc.gov.uk\/collection\/10-steps-to-cyber-security. Accessed 27 Aug 2020"},{"key":"690_CR36","doi-asserted-by":"publisher","unstructured":"Neal A, Griffin MA (2004) Safety climate and safety at work. In: Barling J and Frone MR (eds) The psychology of workplace safety. American Psychological Association, pp 15\u201334. https:\/\/doi.org\/10.1037\/10662-002","DOI":"10.1037\/10662-002"},{"key":"690_CR37","doi-asserted-by":"publisher","DOI":"10.1201\/b15703","volume-title":"User centered system design; new perspectives on human-computer interaction","author":"DA Norman","year":"1986","unstructured":"Norman DA (1986) Cognitive engineering, chapter 3. In: Norman DA, Draper SW (eds) User centered system design; new perspectives on human-computer interaction. Lawrence Erlbaum Associates, New Jersey"},{"key":"690_CR38","doi-asserted-by":"publisher","unstructured":"Nurse JRC, Buckley O, Legg PA, Goldsmith M, Creese S, Wright GRT, Whitty M (2014) Understanding insider threat: a framework for characterising attacks. In: 2014 IEEE security and privacy workshops. https:\/\/doi.org\/10.1109\/SPW.2014.38","DOI":"10.1109\/SPW.2014.38"},{"key":"690_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.10.038","author":"MR Ogiela","year":"2012","unstructured":"Ogiela MR, Ogiela U (2012) Linguistic protocols for secure information management and sharing. Comput Math Appl. https:\/\/doi.org\/10.1016\/j.camwa.2011.10.038","journal-title":"Comput Math Appl"},{"issue":"4","key":"690_CR40","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.amjsurg.2010.11.009","volume":"202","author":"K Pauley","year":"2011","unstructured":"Pauley K, Flin R, Yule S, Youngson G (2011) Surgeons\u2019 intraoperative decision making and risk management. Amjsurg 202(4):375\u2013381. https:\/\/doi.org\/10.1016\/j.amjsurg.2010.11.009","journal-title":"Amjsurg"},{"issue":"8","key":"690_CR41","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1080\/00140139.2013.809480","volume":"56","author":"KL Plant","year":"2013","unstructured":"Plant KL, Stanton NA (2013) What is on your mind? Using the perceptual cycle model and critical decision method to understand the decision-making process in the cockpit. Ergonomics 56(8):1232\u20131250. https:\/\/doi.org\/10.1080\/00140139.2013.809480","journal-title":"Ergonomics"},{"key":"690_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.87","author":"J Predd","year":"2008","unstructured":"Predd J, Pfleeger SL, Hunker J, Bulford C (2008) Insiders behaving badly. IEEE Secur Priv. https:\/\/doi.org\/10.1109\/MSP.2008.87","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"690_CR43","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1080\/02678379808256868","volume":"12","author":"J Reason","year":"1998","unstructured":"Reason J (1998) Achieving a safe culture: theory and practice. Work Stress 12(3):293\u2013306. https:\/\/doi.org\/10.1080\/02678379808256868","journal-title":"Work Stress"},{"issue":"10\u201311","key":"690_CR44","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1080\/00140139008925335","volume":"33","author":"J Reason","year":"1990","unstructured":"Reason J, Manstead A, Stradling S, Baxter J, Campbell K (1990) Errors and violations on the roads: a real distinction? Ergonomics 33(10\u201311):1315\u20131332. https:\/\/doi.org\/10.1080\/00140139008925335","journal-title":"Ergonomics"},{"key":"690_CR45","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.procir.2014.05.016","volume":"19","author":"G Schuh","year":"2014","unstructured":"Schuh G, Potente T, Wesch-Potente C, Weber AR, Prote JP (2014) Collaboration mechanisms to increase productivity in the context of Industrie 4.0. Proc CIRP 19:51\u201356. https:\/\/doi.org\/10.1016\/j.procir.2014.05.016","journal-title":"Proc CIRP"},{"key":"690_CR46","doi-asserted-by":"crossref","unstructured":"Siegel H (2004) Relativism. In: Niiniluoto I, Sintonen M and J Wolenski (eds) Handbook of Epistemology. Springer, Dordrecht, pp 747\u2013780","DOI":"10.1007\/978-1-4020-1986-9_22"},{"key":"690_CR47","volume-title":"Plans and situated actions: the problem of human\u2013machine communication","author":"L Suchman","year":"1985","unstructured":"Suchman L (1985) Plans and situated actions: the problem of human\u2013machine communication. Cambridge University Press, Cambridge"},{"key":"690_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.104814","author":"F Vanderhaegen","year":"2020","unstructured":"Vanderhaegen F, Wolff M, Mollard R (2020) Non-conscious errors in the control of dynamic events synchronized with heartbeats: a new challenge for human reliability study. Saf Sci. https:\/\/doi.org\/10.1016\/j.ssci.2020.104814","journal-title":"Saf Sci"},{"key":"690_CR49","unstructured":"Verizon (2020) Data Breach Investigations Report. https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf. Accessed 12 Jan 2021"},{"key":"690_CR50","first-page":"327","volume-title":"The handbook of task analysis for human\u2013computer interaction","author":"BLW Wong","year":"2004","unstructured":"Wong BLW (2004) Critical decision method data analysis. In: Diaper D, Stanton N (eds) The handbook of task analysis for human\u2013computer interaction. Lawrence Erlbaum Associates, New Jersey, pp 327\u2013346"},{"key":"690_CR51","doi-asserted-by":"publisher","DOI":"10.1201\/9781420005684","volume-title":"Joint cognitive systems: patterns in cognitive systems engineering","author":"DD Woods","year":"2006","unstructured":"Woods DD, Hollnagel E (2006) Joint cognitive systems: patterns in cognitive systems engineering. CRC Press, Boca Raton"},{"key":"690_CR52","doi-asserted-by":"publisher","unstructured":"Zargar A, Nowroozi A, Jalili R (2016) XABA: a zero-knowledge anomaly-based behavioral analysis method to detect insider threats. In: 2016 13th International Iranian society of cryptology conference on information security and cryptology (ISCISC). https:\/\/doi.org\/10.1109\/ISCISC.2016.7736447","DOI":"10.1109\/ISCISC.2016.7736447"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-021-00690-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10111-021-00690-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-021-00690-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T01:54:45Z","timestamp":1658973285000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10111-021-00690-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,28]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["690"],"URL":"https:\/\/doi.org\/10.1007\/s10111-021-00690-z","relation":{},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,28]]},"assertion":[{"value":"19 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}