{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:25Z","timestamp":1740141325090,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T00:00:00Z","timestamp":1657756800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T00:00:00Z","timestamp":1657756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s10588-022-09364-1","type":"journal-article","created":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T10:08:06Z","timestamp":1657793286000},"page":"415-433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Drone strikes and radicalization: an exploration utilizing agent-based modeling and data applied to Pakistan"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4111-8542","authenticated-orcid":false,"given":"Brandon","family":"Shapiro","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew","family":"Crooks","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,7,14]]},"reference":[{"issue":"3","key":"9364_CR1","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/s10588-016-9232-2","volume":"23","author":"M Alizadeh","year":"2017","unstructured":"Alizadeh M, Cioffi-Revilla C, Crooks A (2017) Generating and analyzing spatial social networks. Comput Math Organ Theory 23(3):362\u2013390. https:\/\/doi.org\/10.1007\/s10588-016-9232-2","journal-title":"Comput Math Organ Theory"},{"issue":"4","key":"9364_CR2","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/s10588-010-9078-y","volume":"16","author":"J Arroyo","year":"2010","unstructured":"Arroyo J, Hassan S, Guti\u00e9rrez C, Pav\u00f3n J (2010) Re-thinking simulation: a methodological approach for the application of data mining in agent-based modelling. Comput Math Organ Theory 16(4):416\u2013435. https:\/\/doi.org\/10.1007\/s10588-010-9078-y","journal-title":"Comput Math Organ Theory"},{"issue":"4","key":"9364_CR3","first-page":"28","volume":"9","author":"RL Axtell","year":"1994","unstructured":"Axtell RL, Epstein JM (1994) Agent-based modeling: understanding our creations. Bull Santa Fe Inst 9(4):28\u201332","journal-title":"Bull Santa Fe Inst"},{"issue":"5","key":"9364_CR5","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1038\/scientificamerican0503-60","volume":"288","author":"A-L Barab\u00e1si","year":"2003","unstructured":"Barab\u00e1si A-L, Bonabeau E (2003) Scale-free networks. Sci Am 288(5):60\u201369. https:\/\/doi.org\/10.1038\/scientificamerican0503-60","journal-title":"Sci Am"},{"issue":"6","key":"9364_CR6","doi-asserted-by":"publisher","first-page":"68","DOI":"10.2307\/20031777","volume":"84","author":"Z Baran","year":"2005","unstructured":"Baran Z (2005) Fighting the war of ideas. Foreign Aff 84(6):68\u201378. https:\/\/doi.org\/10.2307\/20031777","journal-title":"Foreign Aff"},{"key":"9364_CR7","unstructured":"Brennan J (2012) The efficacy and ethics of the president\u2019s counterterrorism strategy. Speech delivered at the Wilson Center, Washington, DC. http:\/\/www.wilsoncenter.org\/event\/the-efficacy-and-ethics-us-counterterrorism-strategy"},{"key":"9364_CR8","unstructured":"Bureau of Investigative Journalism: Drone Warfare (2020). https:\/\/www.thebureauinvestigates.com\/projects\/drone-war Accessed 2021\/10\/10"},{"key":"9364_CR9","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.jedc.2016.06.001","volume":"69","author":"A Caiani","year":"2016","unstructured":"Caiani A, Godin A, Caverzasi E, Gallegati M, Kinsella S, Stiglitz JE (2016) Agent based-stock flow consistent macroeconomics: towards a benchmark model. J Econ Dyn Control 69:375\u2013408. https:\/\/doi.org\/10.1016\/j.jedc.2016.06.001","journal-title":"J Econ Dyn Control"},{"key":"9364_CR10","unstructured":"Cioffi-Revilla C, Harrison JF (2011) Pandemonium in silico: individual radicalization for agent-based modeling. In: Annual convention of the international studies association, Montreal, Canada, pp. 1\u201315. http:\/\/mars.gmu.edu\/handle\/1920\/8643"},{"key":"9364_CR11","doi-asserted-by":"publisher","DOI":"10.4135\/9781529793543","volume-title":"Agent-based modelling and geographical information systems: a primer","author":"A Crooks","year":"2019","unstructured":"Crooks A, Malleson N, Manley E, Heppenstall A (2019) Agent-based modelling and geographical information systems: a primer. Sage, London"},{"key":"9364_CR12","unstructured":"Defense Science Board (2015) Task force on Department of Defense strategy to counter violent extremism outside of the united states. Report, Department of Defense. https:\/\/www.acq.osd.mil\/dsb\/reports\/2010s\/DSB-CVE-FinalReport-April172015.pdf"},{"key":"9364_CR41","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1146\/annurev-polisci-042716-102314","volume":"21","author":"D della Porta","year":"2018","unstructured":"della Porta D (2018) Radicalization: a relational perspective. Annu Rev Polit Sci 21:461\u2013474. https:\/\/doi.org\/10.1146\/annurev-polisci-042716-102314","journal-title":"Annu Rev Polit Sci"},{"issue":"01","key":"9364_CR13","doi-asserted-by":"publisher","first-page":"1641001","DOI":"10.1142\/S1793962316410014","volume":"7","author":"SY Diallo","year":"2016","unstructured":"Diallo SY, Gore R, Lynch CJ, Padilla JJ (2016) Formal methods, statistical debugging and exploratory analysis in support of system development: towards a verification and validation calculator tool. Int J Model Simul Sci Comput 7(01):1641001","journal-title":"Int J Model Simul Sci Comput"},{"key":"9364_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.copsyc.2016.06.008","volume":"11","author":"B Doosje","year":"2016","unstructured":"Doosje B, Moghaddam M, Fathali Kruglanski AW, de Wolf A, Mann L, Feddes AR (2016) Terrorism, radicalization and de-radicalization. Curr Opin Psychol 11:79\u201384. https:\/\/doi.org\/10.1016\/j.copsyc.2016.06.008","journal-title":"Curr Opin Psychol"},{"issue":"5","key":"9364_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0155407","volume":"11","author":"S Galam","year":"2016","unstructured":"Galam S, Javarone MA (2016) Modeling radicalization phenomena in heterogeneous populations. PLoS ONE 11(5):1\u201315. https:\/\/doi.org\/10.1371\/journal.pone.0155407","journal-title":"PLoS ONE"},{"key":"9364_CR16","doi-asserted-by":"crossref","unstructured":"Genkin M, Gutfraind A (2011) How do terrorist cells self-assemble: insights from an agent-based model of radicalization. SSRN. http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1031521","DOI":"10.2139\/ssrn.1031521"},{"issue":"1","key":"9364_CR17","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1111\/j.1939-7445.2002.tb00078.x","volume":"15","author":"V Grimm","year":"2002","unstructured":"Grimm V (2002) Visual debugging: a way of analyzing, understanding and communicating bottom-up simulation models in ecology. Nat Resource Model 15(1):23\u201338. https:\/\/doi.org\/10.1111\/j.1939-7445.2002.tb00078.x","journal-title":"Nat Resource Model"},{"issue":"1\u20132","key":"9364_CR18","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.ecolmodel.2006.04.023","volume":"198","author":"V Grimm","year":"2006","unstructured":"Grimm V, Berger U, Bastiansen F, Eliassen S, Ginot V, Giske J, Goss-Custard J, Grand T, Heinz S, Huse G, Huth A, Jepsen J, Jorgensen C, Mooij W, Muller B, Pe\u2019er G, Piou C, Railsback S, Robbins A, Robbins M, Rossmanith E, Ruger N, Strand E, Souissi S, Stillman R, Vabo R, Visser U, Deangelis D (2006) A standard protocol for describing individual-based and agent-based models. Ecol Model 198(1\u20132):115\u2013126. https:\/\/doi.org\/10.1016\/j.ecolmodel.2006.04.023","journal-title":"Ecol Model"},{"issue":"5","key":"9364_CR19","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1177\/0022002710393919","volume":"55","author":"S Helfstein","year":"2011","unstructured":"Helfstein S, Wright D (2011) Covert or convenient? Evolution of terror attack networks. J Confl Resolut 55(5):785\u2013813. https:\/\/doi.org\/10.1177\/0022002710393919","journal-title":"J Confl Resolut"},{"issue":"1","key":"9364_CR20","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1111\/gean.12267","volume":"53","author":"A Heppenstall","year":"2021","unstructured":"Heppenstall A, Crooks A, Malleson N, Manley E, Ge J, Batty M (2021) Future developments in geographical agent-based models: challenges and opportunities. Geogr Anal 53(1):76\u201391. https:\/\/doi.org\/10.1111\/gean.12267","journal-title":"Geogr Anal"},{"issue":"4","key":"9364_CR21","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1093\/cesifo\/ify011","volume":"64","author":"DA Jaeger","year":"2018","unstructured":"Jaeger DA, Siddique Z (2018) Are drone strikes effective in Afghanistan and Pakistan? On the dyanmics of violence between the United States and the Taliban. CESifo Econ Stud 64(4):667\u2013697. https:\/\/doi.org\/10.1093\/cesifo\/ify011","journal-title":"CESifo Econ Stud"},{"issue":"5","key":"9364_CR22","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1080\/09546553.2018.1442330","volume":"32","author":"MA Jensen","year":"2020","unstructured":"Jensen MA, Seate AA, James PA (2020) Radicalization to violence: a pathway approach to studying extremism. Terror Polit Violence 32(5):1067\u20131090. https:\/\/doi.org\/10.1080\/09546553.2018.1442330","journal-title":"Terror Polit Violence"},{"issue":"7","key":"9364_CR23","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1080\/1057610X.2018.1492819","volume":"43","author":"J Klausen","year":"2020","unstructured":"Klausen J, Libretti R, Hung BWK, Jayasumana AP (2020) Radicalization trajectories: an evidence-based computational approach to dynamic risk assesssment of \u201chomegrown\u2019\u2019 Jihadists. Stud Confl Terror 43(7):588\u2013615. https:\/\/doi.org\/10.1080\/1057610X.2018.1492819","journal-title":"Stud Confl Terror"},{"key":"9364_CR24","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1111\/pops.12163","volume":"35","author":"AW Kruglanski","year":"2014","unstructured":"Kruglanski AW, Gelfand MJ, B\u00e9langer JJ, Sheveland A, Hetiarachchi M, Gunaratna R (2014) The psychology of radicalization and deradicalization: how significance quest impacts violent extremism. Polit Psychol 35:69\u201393. https:\/\/doi.org\/10.1111\/pops.12163","journal-title":"Polit Psychol"},{"key":"9364_CR25","doi-asserted-by":"crossref","unstructured":"Mahmood R, Jetter M (2019) Military intervention via drone strikes. IZA discussion paper 12318, IZA: Institute of Labor Economics, Bonn, Germany. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3390307","DOI":"10.2139\/ssrn.3390307"},{"issue":"3","key":"9364_CR26","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1162\/isec.2009.33.3.180","volume":"33","author":"K Marten","year":"2008","unstructured":"Marten K, Johnson TH, Mason C (2008) Misunderstanding Pakistan\u2019s federally administered tribal area? Int Secur 33(3):180\u2013189. https:\/\/doi.org\/10.1162\/isec.2009.33.3.180","journal-title":"Int Secur"},{"issue":"3","key":"9364_CR27","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1080\/09546550802073367","volume":"20","author":"C McCauley","year":"2008","unstructured":"McCauley C, Moskalenko S (2008) Mechanisms of political radicalization: pathways toward terrorism. Terror Polit Violence 20(3):415\u2013433. https:\/\/doi.org\/10.1080\/09546550802073367","journal-title":"Terror Polit Violence"},{"issue":"3","key":"9364_CR28","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1037\/amp0000062","volume":"72","author":"C McCauley","year":"2017","unstructured":"McCauley C, Moskalenko S (2017) Understanding political radicalization: the two-pyramids model. Am Psychol 72(3):205\u2013216. https:\/\/doi.org\/10.1037\/amp0000062","journal-title":"Am Psychol"},{"key":"9364_CR29","first-page":"151","volume-title":"Values and violence","author":"R Medina","year":"2008","unstructured":"Medina R, Hepner G (2008) Geospatial analysis of dynamic terrorist networks. In: Karawan IA, McCormack W, Reynolds SE (eds) Values and violence. Springer, New York, pp 151\u2013167"},{"issue":"4","key":"9364_CR30","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1093\/isq\/sqz040","volume":"63","author":"A Mir","year":"2019","unstructured":"Mir A, Moore D (2019) Drones, surveillance, and violence: theory and evidence from a us drone program. Int Stud Q 63(4):846\u2013862. https:\/\/doi.org\/10.1093\/isq\/sqz040","journal-title":"Int Stud Q"},{"issue":"2","key":"9364_CR31","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1037\/0003-066X.60.2.161","volume":"60","author":"FM Moghaddam","year":"2005","unstructured":"Moghaddam FM (2005) The staircase to terrorism: a psychological exploration. Am Psychol 60(2):161\u2013169. https:\/\/doi.org\/10.1037\/0003-066X.60.2.161","journal-title":"Am Psychol"},{"issue":"5","key":"9364_CR32","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIS.2007.4338493","volume":"22","author":"I-C Moon","year":"2007","unstructured":"Moon I-C, Carley KM (2007) Modeling and simulating terrorist networks in social and geospatial dimensions. IEEE Intell Syst 22(5):40\u201349. https:\/\/doi.org\/10.1109\/MIS.2007.4338493","journal-title":"IEEE Intell Syst"},{"key":"9364_CR33","unstructured":"National Consortium for the Study of Terrorism and Responses to Terrorism (START), University of Maryland, Global Terrorism Database (GTD) (2019). https:\/\/www.start.umd.edu\/gtd. Accessed 10 Oct 2021"},{"key":"9364_CR34","unstructured":"Nawaz S (2009) Fata\u2014a most dangerous place: meeting the challenge of militancy and terror in the federally administered tribal areas of Pakistan. Report, Center for Strategic & International Studies (CSIS), Washington, D.C. https:\/\/csis-website-prod.s3.amazonaws.com\/s3fs-public\/legacy_files\/files\/media\/csis\/pubs\/081218_nawaz_fata_web.pdf"},{"issue":"4","key":"9364_CR35","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1080\/17419166.2013.802984","volume":"9","author":"P Neumann","year":"2013","unstructured":"Neumann P, Kleinmann S (2013) How rigorous is radicalization research? Democr Secur 9(4):360\u2013382","journal-title":"Democr Secur"},{"key":"9364_CR36","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2020.1738669","author":"A Orsini","year":"2020","unstructured":"Orsini A (2020) What everybody should know about radicalization and the DRIA model. Stud Confl Terror. https:\/\/doi.org\/10.1080\/1057610X.2020.1738669","journal-title":"Stud Confl Terror"},{"issue":"4","key":"9364_CR37","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIS.2008.71","volume":"23","author":"J Ozik","year":"2008","unstructured":"Ozik J, Sallach DL, Macal CM (2008) Modeling dynamic multiscale social processes in agent-based models. IEEE Intell Syst 23(4):36\u201342. https:\/\/doi.org\/10.1109\/MIS.2008.71","journal-title":"IEEE Intell Syst"},{"key":"9364_CR38","unstructured":"Pew Research Center (2014) Global opposition to U.S. surveillance and drones, but limited harm to America\u2019s image. Report, Pew Research Center, Washington, DC. http:\/\/pewrsr.ch\/1rbygYx"},{"issue":"3","key":"9364_CR39","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/s10588-012-9122-1","volume":"18","author":"J Pfeffer","year":"2012","unstructured":"Pfeffer J, Carley KM (2012) Rapid modeling and analyzing networks extracted from pre-structured news articles. Comput Math Organ Theory 18(3):280\u2013299. https:\/\/doi.org\/10.1007\/s10588-012-9122-1","journal-title":"Comput Math Organ Theory"},{"key":"9364_CR40","volume-title":"The drone debate: a primer on the u.S. use of unmanned aircraft outside conventional battlefields","author":"A Plaw","year":"2016","unstructured":"Plaw A, Fricker MS, Colon CR (2016) The drone debate: a primer on the u.S. use of unmanned aircraft outside conventional battlefields. Rowman & Littlefield, New York"},{"key":"9364_CR42","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206791","volume-title":"Understanding terror networks","author":"M Sageman","year":"2004","unstructured":"Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia"},{"key":"9364_CR43","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206784","volume-title":"Leaderless Jihad: terror networks in the twenty-first century","author":"M Sageman","year":"2008","unstructured":"Sageman M (2008) Leaderless Jihad: terror networks in the twenty-first century. University of Pennsylvania Press, Philadelphia"},{"key":"9364_CR44","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1002\/9781118923986.ch3","volume-title":"The handbook of the criminology of terrorism","author":"JP Sawyer","year":"2017","unstructured":"Sawyer JP, Hienz J (2017) What makes them do it? Individual-level indicators of extremist outcomes. In: LaFree G, Freilich JD (eds) The handbook of the criminology of terrorism. Wiley, Malden, pp 47\u201361"},{"issue":"4","key":"9364_CR45","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1162\/isec_a_00312","volume":"42","author":"A Shah","year":"2018","unstructured":"Shah A (2018) Do U.S. drone strikes cause blowback?: Evidence from Pakistan and beyond. Int Secur 42(4):47\u201384. https:\/\/doi.org\/10.1162\/isec_a_00312","journal-title":"Int Secur"},{"key":"9364_CR47","doi-asserted-by":"crossref","unstructured":"Shults FL, Gore R (2020) Modeling radicalization and violent extremism. In: Verhagen H, Borit M, Bravo G, Wijermans N (eds) Advances in social simulation. Springer, Cham, pp 405\u2013410","DOI":"10.1007\/978-3-030-34127-5_41"},{"key":"9364_CR46","doi-asserted-by":"publisher","DOI":"10.18564\/jasss.3840","author":"FL Shults","year":"2018","unstructured":"Shults FL, Gore R, Wildman WJ, Lynch CJ, Lane JE, Toft MD (2018) A generative model of the mutual escalation of anxiety between religious groups. J Artif Soc Soc Simul. https:\/\/doi.org\/10.18564\/jasss.3840","journal-title":"J Artif Soc Soc Simul"},{"key":"9364_CR48","unstructured":"Silber MD, Bhatt A (2007) Radicalization in the West: the homegrown threat. Report, New York Police Department Intelligence Division, New York, NY . https:\/\/www.ojp.gov\/ncjrs\/virtual-library\/abstracts\/radicalization-west-homegrown-threat"},{"key":"9364_CR49","volume-title":"How radicalization to terrorism occurs in the United States: what research sponsored by the national institute of justice tells us","author":"AG Smith","year":"2018","unstructured":"Smith AG (2018) How radicalization to terrorism occurs in the United States: what research sponsored by the national institute of justice tells us. US Department of Justice, Office of Justice Programs, National Institute of Justice, Washington, DC"},{"issue":"Supplement 1","key":"9364_CR50","doi-asserted-by":"publisher","first-page":"234","DOI":"10.2307\/143141","volume":"46","author":"WR Tobler","year":"1970","unstructured":"Tobler WR (1970) A computer movie simulating urban growth in the Detroit region. Econ Geogr 46(Supplement 1):234\u2013240. https:\/\/doi.org\/10.2307\/143141","journal-title":"Econ Geogr"},{"key":"9364_CR51","unstructured":"United States House of Representatives (2009) Reassessing the evolving Al-qaeda threat to the homeland security. Hearing. https:\/\/www.govinfo.gov\/content\/pkg\/CHRG-111hhrg55595\/html\/CHRG-111hhrg55595.htm"},{"key":"9364_CR52","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.copsyc.2017.03.024","volume":"19","author":"D Webber","year":"2018","unstructured":"Webber D, Kruglanski AW (2018) The social psychological makings of a terrorist. Curr Opin Psychol 19:131\u2013134. https:\/\/doi.org\/10.1016\/j.copsyc.2017.03.024","journal-title":"Curr Opin Psychol"},{"key":"9364_CR53","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1002\/9781118923986.ch2","volume-title":"The handbook of the criminology of terrorism","author":"D Webber","year":"2017","unstructured":"Webber D, Kruglanski AW (2017) Psychological factors in radicalization: a \u201c3N\u2019\u2019 approach. In: LaFree G, Freilich JD (eds) The handbook of the criminology of terrorism. Wiley, Malden, pp 33\u201346"},{"key":"9364_CR54","unstructured":"Wilensky U (1999) NetLogo. Center for connected learning and computer-based modeling, Northwestern University, Evanston, IL. http:\/\/ccl.northwestern.edu\/netlogo"},{"key":"9364_CR55","doi-asserted-by":"publisher","DOI":"10.2202\/1547-7355.1477","author":"J Xu","year":"2009","unstructured":"Xu J, Hu D, Chen H (2009) The dynamics of terrorist networks: understanding the survival mechanisms of global Salafi Jihad. J Homel Secur Emerg Manage. https:\/\/doi.org\/10.2202\/1547-7355.1477","journal-title":"J Homel Secur Emerg Manage"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-022-09364-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10588-022-09364-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-022-09364-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T08:26:59Z","timestamp":1692692819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10588-022-09364-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,14]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["9364"],"URL":"https:\/\/doi.org\/10.1007\/s10588-022-09364-1","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2022,7,14]]},"assertion":[{"value":"16 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}