{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:33:06Z","timestamp":1766503986678,"version":"3.37.3"},"reference-count":108,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation Korea","doi-asserted-by":"crossref","award":["NRF-2019S1A3A2098438"],"award-info":[{"award-number":["NRF-2019S1A3A2098438"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10796-022-10321-1","type":"journal-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T08:03:52Z","timestamp":1660896232000},"page":"1829-1845","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Information Privacy Behaviors during the COVID-19 Pandemic: Focusing on the Restaurant Context"],"prefix":"10.1007","volume":"25","author":[{"given":"Eunji","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jin-young","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Junchul","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Chulmo","family":"Koo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"10321_CR1","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.chb.2016.10.023","volume":"67","author":"H Ahmadi","year":"2017","unstructured":"Ahmadi, H., Nilashi, M., Shahmoradi, L., & Ibrahim, O. (2017). Hospital Information System adoption: Expert perspectives on an adoption framework for Malaysian public hospitals. Computers in Human Behavior, 67, 161\u2013189","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10321_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179\u2013211","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"1","key":"10321_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.52255\/smarttourism.2021.1.1.9","volume":"1","author":"R Alt","year":"2021","unstructured":"Alt, R. (2021). Digital transformation in the restaurant industry: Current developments and implications. Journal of Smart Tourism, 1(1), 69\u201374","journal-title":"Journal of Smart Tourism"},{"issue":"1","key":"10321_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/10705519409539961","volume":"1","author":"RP Bagozzi","year":"1994","unstructured":"Bagozzi, R. P., & Heatherton, T. F. (1994). A general approach to representing multifaceted personality constructs: Application to state self-esteem. Structural Equation Modeling: A Multidisciplinary Journal, 1(1), 35\u201367","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"issue":"2","key":"10321_CR5","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","volume":"49","author":"G Bansal","year":"2010","unstructured":"Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138\u2013150","journal-title":"Decision Support Systems"},{"issue":"3","key":"10321_CR6","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.jhin.2020.04.035","volume":"105","author":"S Bashirian","year":"2020","unstructured":"Bashirian, S., Jenabi, E., Khazaei, S., Barati, M., Karimi-Shahanjarini, A., Zareian, S., Rezapur-Shahkolai, F., & Moeini, B. (2020). Factors associated with preventive behaviours of COVID-19 among hospital staff in Iran in 2020: an application of the Protection Motivation Theory. Journal of Hospital Infection, 105(3), 430\u2013433","journal-title":"Journal of Hospital Infection"},{"issue":"4","key":"10321_CR7","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35(4), 1017\u20131041","journal-title":"MIS Quarterly"},{"issue":"5","key":"10321_CR8","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313\u2013324","journal-title":"The Information Society"},{"issue":"8","key":"10321_CR9","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1002\/smj.2041","volume":"34","author":"P Berrone","year":"2013","unstructured":"Berrone, P., Fosfuri, A., Gelabert, L., & Gomez-Mejia, L. R. (2013). Necessity as the mother of \u2018green\u2019inventions: Institutional pressures and environmental innovations. Strategic Management Journal, 34(8), 891\u2013909","journal-title":"Strategic Management Journal"},{"key":"10321_CR10","doi-asserted-by":"crossref","unstructured":"Bhatt, P., Vemprala, N., Valecha, R., Hariharan, G., & Rao, H. R. (2022). User Privacy, Surveillance and Public Health during COVID-19\u2013An Examination of Twitterverse.Information Systems Frontiers,1\u201316","DOI":"10.1007\/s10796-022-10247-8"},{"issue":"1","key":"10321_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.2307\/25148669","volume":"29","author":"GW Bock","year":"2005","unstructured":"Bock, G. W., Zmud, R. W., Kim, Y. G., & Lee, J. N. (2005). Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces, and organizational climate. MIS Quarterly, 29(1), 87\u2013111","journal-title":"MIS Quarterly"},{"issue":"2","key":"10321_CR12","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1207\/s15324796abm2702_7","volume":"27","author":"NT Brewer","year":"2004","unstructured":"Brewer, N. T., Weinstein, N. D., Cuite, C. L., & Herrington, J. E. (2004). Risk perceptions and their relation to risk behavior. Annals of Behavioral Medicine, 27(2), 125\u2013130","journal-title":"Annals of Behavioral Medicine"},{"issue":"1","key":"10321_CR13","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1177\/0743915620929999","volume":"40","author":"AR Brough","year":"2021","unstructured":"Brough, A. R., & Martin, K. D. (2021). Consumer privacy during (and after) the COVID-19 pandemic. Journal of Public Policy & Marketing, 40(1), 108\u2013110","journal-title":"Journal of Public Policy & Marketing"},{"issue":"1","key":"10321_CR14","doi-asserted-by":"publisher","first-page":"106","DOI":"10.2307\/256514","volume":"36","author":"LR Burns","year":"1993","unstructured":"Burns, L. R., & Wholey, D. R. (1993). Adoption and abandonment of matrix management programs: Effects of organizational characteristics and interorganizational networks. Academy of Management Journal, 36(1), 106\u2013138","journal-title":"Academy of Management Journal"},{"issue":"2","key":"10321_CR15","doi-asserted-by":"publisher","first-page":"602","DOI":"10.3390\/su13020602","volume":"13","author":"HS Cha","year":"2021","unstructured":"Cha, H. S., Wi, J. H., Park, C., & Kim, T. (2021). Sustainability Calculus in Adopting Smart Speakers\u2014Personalized Services and Privacy Risks. Sustainability, 13(2), 602","journal-title":"Sustainability"},{"key":"10321_CR16","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s10796-020-10080-x","volume":"24","author":"AG Chin","year":"2020","unstructured":"Chin, A. G., Harris, M. A., & Brookshire, R. (2020). An empirical investigation of intent to adopt mobile payment systems using a trust-based extended valence framework. Information Systems Frontiers, 24, 329\u2013347","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10321_CR17","doi-asserted-by":"publisher","first-page":"287","DOI":"10.2753\/MTP1069-6679160402","volume":"16","author":"WW Chin","year":"2008","unstructured":"Chin, W. W., Peterson, R. A., & Brown, S. P. (2008). Structural equation modeling in marketing: Some practical reminders. Journal of Marketing Theory and Practice, 16(4), 287\u2013298","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"1","key":"10321_CR18","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1177\/002224377901600110","volume":"16","author":"GA Churchill Jr.","year":"1979","unstructured":"Churchill, G. A. Jr. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16(1), 64\u201373","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"10321_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1177\/014662168500900103","volume":"9","author":"DV Cicchetti","year":"1985","unstructured":"Cicchetti, D. V., Shoinralter, D., & Tyrer, P. J. (1985). The effect of number of rating scale categories on levels of interrater reliability: A Monte Carlo investigation. Applied Psychological Measurement, 9(1), 31\u201336","journal-title":"Applied Psychological Measurement"},{"issue":"1","key":"10321_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104\u2013115","journal-title":"Organization Science"},{"issue":"4","key":"10321_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1509\/jmkg.65.4.33.18386","volume":"65","author":"K De Wulf","year":"2001","unstructured":"De Wulf, K., Odekerken-Schr\u00f6der, G., & Iacobucci, D. (2001). Investments in consumer relationships: A cross-country and cross-industry exploration. Journal of Marketing, 65(4), 33\u201350","journal-title":"Journal of Marketing"},{"issue":"1","key":"10321_CR22","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s12529-008-9008-2","volume":"16","author":"O De Zwart","year":"2009","unstructured":"De Zwart, O., Veldhuijzen, I. K., Elam, G., Aro, A. R., Abraham, T., Bishop, G. D., Voeten, H. A., Richardus, J. H., & Brug, J. (2009). Perceived threat, risk perception, and efficacy beliefs related to SARS and other (emerging) infectious diseases: results of an international survey. International journal of Behavioral Medicine, 16(1), 30\u201340","journal-title":"International journal of Behavioral Medicine"},{"issue":"5","key":"10321_CR23","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1111\/jcc4.12163","volume":"21","author":"T Dienlin","year":"2016","unstructured":"Dienlin, T., & Metzger, M. J. (2016). An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative US sample. Journal of Computer-Mediated Communication, 21(5), 368\u2013383","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"10321_CR24","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2307\/2095101","volume":"48","author":"PJ DiMaggio","year":"1983","unstructured":"DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48(2), 147\u2013160","journal-title":"American Sociological Review"},{"key":"10321_CR25","doi-asserted-by":"crossref","unstructured":"Dinev, T., Albano, V., Xu, H., D\u2019Atri, A., & Hart, P. (2016). Individuals\u2019 attitudes towards electronic health records: A privacy calculus perspective. Advances in Healthcare Informatics and Analytics (pp. 19\u201350). Springer","DOI":"10.1007\/978-3-319-23294-2_2"},{"issue":"4","key":"10321_CR26","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","volume":"15","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce\u2013a study of Italy and the United States. European Journal of Information Systems, 15(4), 389\u2013402","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"10321_CR27","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61\u201380","journal-title":"Information Systems Research"},{"issue":"3","key":"10321_CR28","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1057\/ejis.2012.23","volume":"22","author":"T Dinev","year":"2013","unstructured":"Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295\u2013316","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"10321_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12889-021-10500-w","volume":"21","author":"R Ezati Rad","year":"2021","unstructured":"Ezati Rad, R., Mohseni, S., Takhti, K., Hassani Azad, H., Shahabi, M., Aghamolaei, N., T., & Norozian, F. (2021). Application of the protection motivation theory for predicting COVID-19 preventive behaviors in Hormozgan, Iran: a cross-sectional study. Bmc Public Health, 21(1), 1\u201311","journal-title":"Bmc Public Health"},{"issue":"4","key":"10321_CR30","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1177\/002224378201900406","volume":"19","author":"C Fornell","year":"1982","unstructured":"Fornell, C., & Bookstein, F. L. (1982). Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research, 19(4), 440\u2013452","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"10321_CR31","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39\u201350","journal-title":"Journal of Marketing Research"},{"issue":"6","key":"10321_CR32","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1007\/s10796-020-10053-0","volume":"23","author":"G Fox","year":"2021","unstructured":"Fox, G., & James, T. L. (2021). Toward an understanding of the antecedents to health information privacy concern: a mixed methods study. Information Systems Frontiers, 23(6), 1537\u20131562","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"10321_CR33","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.lrp.2015.02.004","volume":"49","author":"IM Garc\u00eda-S\u00e1nchez","year":"2016","unstructured":"Garc\u00eda-S\u00e1nchez, I. M., Cuadrado-Ballesteros, B., & Frias-Aceituno, J. V. (2016). Impact of the institutional macro context on the voluntary disclosure of CSR information. Long Range Planning, 49(1), 15\u201335","journal-title":"Long Range Planning"},{"key":"10321_CR34","doi-asserted-by":"crossref","unstructured":"Gasser, U., Ienca, M., Scheibner, J., Sleigh, J., & Vayena, E. (2020). Digital tools against COVID-19: Framing the ethical challenges and how to address them. arXiv preprint arXiv:2004.10236","DOI":"10.1016\/S2589-7500(20)30137-0"},{"issue":"4","key":"10321_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jgim.2006100101","volume":"14","author":"D Gefen","year":"2006","unstructured":"Gefen, D., & Heart, T. H. (2006). On the need to include national culture as a central issue in e-commerce trust beliefs. Journal of Global Information Management (JGIM), 14(4), 1\u201330","journal-title":"Journal of Global Information Management (JGIM)"},{"issue":"2","key":"10321_CR36","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1080\/10196780410001675077","volume":"14","author":"JL Gibbs","year":"2004","unstructured":"Gibbs, J. L., & Kraemer, K. L. (2004). A cross-country investigation of the determinants of scope of e\u2010commerce use: an institutional approach. Electronic Markets, 14(2), 124\u2013137","journal-title":"Electronic Markets"},{"key":"10321_CR37","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.chb.2018.09.015","volume":"95","author":"A Gutierrez","year":"2019","unstructured":"Gutierrez, A., O\u2019Leary, S., Rana, N. P., Dwivedi, Y. K., & Calle, T. (2019). Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor. Computers in Human Behavior, 95, 295\u2013306","journal-title":"Computers in Human Behavior"},{"key":"10321_CR38","doi-asserted-by":"crossref","unstructured":"Hair, J. F. Jr., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2021). A primer on partial least squares structural equation modeling (PLS-SEM). Sage publications","DOI":"10.1007\/978-3-030-80519-7"},{"issue":"3","key":"10321_CR39","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/14494035.2020.1783791","volume":"39","author":"K Hartley","year":"2020","unstructured":"Hartley, K., & Jarvis, D. S. (2020). Policymaking in a low-trust state: legitimacy, state capacity, and responses to COVID-19 in Hong Kong. Policy and Society, 39(3), 403\u2013423","journal-title":"Policy and Society"},{"key":"10321_CR40","unstructured":"Harman, D. (1967). A single factor test of common method variance. Journal of Psychology, 35(1967), 359\u2013378"},{"issue":"3","key":"10321_CR41","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1093\/jamia\/ocaa240","volume":"28","author":"F Hassandoust","year":"2021","unstructured":"Hassandoust, F., Akhlaghpour, S., & Johnston, A. C. (2021). Individuals\u2019 privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective. Journal of the American Medical Informatics Association, 28(3), 463\u2013471","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"1","key":"10321_CR42","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115\u2013135","journal-title":"Journal of the Academy of Marketing Science"},{"key":"10321_CR43","unstructured":"Houck, B. (2020). Michigan Clarifies Rules for Restaurants Collecting Customer Contact Information. Retrieved July 15, 2022 from https:\/\/detroit.eater.com\/21549042\/michigan-rules-for-restaurants-collecting-customer-contact-information"},{"key":"10321_CR44","unstructured":"Huang, Y., Sun, M., & Sui, Y. (2020). How digital contact tracing slowed Covid-19 in East Asia.Harvard Business Review, 15(04)"},{"issue":"4","key":"10321_CR45","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1038\/s41591-020-0832-5","volume":"26","author":"M Ienca","year":"2020","unstructured":"Ienca, M., & Vayena, E. (2020). On the responsible use of digital data to tackle the COVID-19 pandemic. Nature Medicine, 26(4), 463\u2013464","journal-title":"Nature Medicine"},{"key":"10321_CR46","doi-asserted-by":"publisher","first-page":"104290","DOI":"10.1016\/j.tourman.2021.104290","volume":"84","author":"OS Itani","year":"2021","unstructured":"Itani, O. S., & Hollebeek, L. D. (2021). Light at the end of the tunnel: Visitors\u2019 virtual reality (versus in-person) attraction site tour-related behavioral intentions during and post-COVID-19. Tourism Management, 84, 104290","journal-title":"Tourism Management"},{"key":"10321_CR47","doi-asserted-by":"publisher","first-page":"106260","DOI":"10.1016\/j.chb.2020.106260","volume":"107","author":"M Jozani","year":"2020","unstructured":"Jozani, M., Ayaburi, E., Ko, M., & Choo, K. K. R. (2020). Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Computers in Human Behavior, 107, 106260","journal-title":"Computers in Human Behavior"},{"key":"10321_CR48","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3389\/fpubh.2020.00305","volume":"8","author":"G Jung","year":"2020","unstructured":"Jung, G., Lee, H., Kim, A., & Lee, U. (2020). Too much information: assessing privacy risks of contact trace data disclosure on people with COVID-19 in South Korea. Frontiers in Public Health, 8, 305","journal-title":"Frontiers in Public Health"},{"key":"10321_CR49","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.tmp.2015.09.002","volume":"16","author":"AK Kaushik","year":"2015","unstructured":"Kaushik, A. K., Agrawal, A. K., & Rahman, Z. (2015). Tourist behaviour towards self-service hotel technology adoption: Trust and subjective norm as key antecedents. Tourism Management Perspectives, 16, 278\u2013289","journal-title":"Tourism Management Perspectives"},{"key":"10321_CR50","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.elerap.2018.11.003","volume":"32","author":"K Kaushik","year":"2018","unstructured":"Kaushik, K., Jain, N. K., & Singh, A. K. (2018). Antecedents and outcomes of information privacy concerns: Role of subjective norm and social presence. Electronic Commerce Research and Applications, 32, 57\u201368","journal-title":"Electronic Commerce Research and Applications"},{"key":"10321_CR51","unstructured":"Kim, D., & Mah, S. (2020, June 2). South Korea mandates QR codes to log customers after nightclub coronavirus outbreak. Retrieved July 15, 2022 from https:\/\/www.reuters.com\/article\/us-health-coronavirus-southkorea-qr-code-idUSKBN23907E"},{"key":"10321_CR52","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.chb.2018.11.022","volume":"92","author":"D Kim","year":"2019","unstructured":"Kim, D., Park, K., Park, Y., & Ahn, J. H. (2019). Willingness to provide personal information: Perspective of privacy calculus in IoT services. Computers in Human Behavior, 92, 273\u2013281","journal-title":"Computers in Human Behavior"},{"issue":"e1","key":"10321_CR53","doi-asserted-by":"publisher","first-page":"e33","DOI":"10.1136\/amiajnl-2012-001609","volume":"20","author":"EW Kokkonen","year":"2013","unstructured":"Kokkonen, E. W., Davis, S. A., Lin, H. C., Dabade, T. S., Feldman, S. R., & Fleischer, A. B. Jr. (2013). Use of electronic medical records differs by specialty and office settings. Journal of the American Medical Informatics Association, 20(e1), e33\u2013e38","journal-title":"Journal of the American Medical Informatics Association"},{"key":"10321_CR54","doi-asserted-by":"crossref","unstructured":"Kostova, T. (1997). Country institutional profiles: Concept and measurement. Academy of Management Proceedings, 1, 180\u2013184","DOI":"10.5465\/ambpp.1997.4981338"},{"issue":"6","key":"10321_CR55","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1016\/j.im.2016.02.006","volume":"53","author":"K Krell","year":"2016","unstructured":"Krell, K., Matook, S., & Rohde, F. (2016). The impact of legitimacy-based motives on IS adoption success: An institutional theory perspective. Information & Management, 53(6), 683\u2013697","journal-title":"Information & Management"},{"key":"10321_CR56","doi-asserted-by":"crossref","unstructured":"Lang, M., Wiesche, M., & Krcmar, H. (2018). Perceived Control and Privacy in a Professional Cloud Environment. In Proceedings of the 51st Hawaii International Conference on System Sciences, 3668\u20133677","DOI":"10.24251\/HICSS.2018.464"},{"key":"10321_CR57","unstructured":"Lee, H. (2020). These Elite Contact Tracers Show the World How to Beat Covid-19. Retrieved July 7, 2020, from https:\/\/www.bloomberg.com\/news\/articles\/2020-07-25\/these-elite-contact-tracers-show-the-world-how-to-beat-covid-19"},{"issue":"1","key":"10321_CR58","doi-asserted-by":"publisher","first-page":"144","DOI":"10.2307\/3069289","volume":"45","author":"K Lee","year":"2002","unstructured":"Lee, K., & Pennings, J. M. (2002). Mimicry and the market: Adoption of a new organizational form. Academy of Management Journal, 45(1), 144\u2013162","journal-title":"Academy of Management Journal"},{"issue":"1","key":"10321_CR59","doi-asserted-by":"publisher","first-page":"e0245740","DOI":"10.1371\/journal.pone.0245740","volume":"16","author":"S Lewandowsky","year":"2021","unstructured":"Lewandowsky, S., Dennis, S., Perfors, A., Kashima, Y., White, J. P., Garrett, P., Little, D. R., & Yesilada, M. (2021). Public acceptance of privacy-encroaching policies to address the COVID-19 pandemic in the United Kingdom. Plos one, 16(1), e0245740","journal-title":"Plos one"},{"issue":"1","key":"10321_CR60","first-page":"62","volume":"51","author":"H Li","year":"2010","unstructured":"Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62\u201371","journal-title":"Journal of Computer Information Systems"},{"key":"10321_CR61","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ijmedinf.2015.12.010","volume":"88","author":"H Li","year":"2016","unstructured":"Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining individuals\u2019 adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. International Journal of Medical Informatics, 88, 8\u201317","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"10321_CR62","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","volume":"54","author":"Y Li","year":"2012","unstructured":"Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471\u2013481","journal-title":"Decision Support Systems"},{"issue":"1","key":"10321_CR63","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/25148781","volume":"31","author":"H Liang","year":"2007","unstructured":"Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59\u201387","journal-title":"MIS Quarterly"},{"key":"10321_CR64","unstructured":"Lin, L., & Martin, T. W. (2020). How coronavirus is eroding privacy.The Wall Street Journal, 15(04)"},{"key":"10321_CR65","unstructured":"Liu, Z., Shan, J., Bonazzi, R., & Pigneur, Y. (2014). Privacy as a tradeoff: Introducing the notion of privacy calculus for context-aware mobile applications. 2014 47th Hawaii International Conference on System Sciences, 1063\u20131072"},{"issue":"7","key":"10321_CR66","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1016\/j.ajic.2020.04.021","volume":"48","author":"N Lu","year":"2020","unstructured":"Lu, N., Cheng, K. W., Qamar, N., Huang, K. C., & Johnson, J. A. (2020). Weathering COVID-19 storm: Successful control measures of five Asian countries. American Journal of Infection Control, 48(7), 851","journal-title":"American Journal of Infection Control"},{"issue":"5","key":"10321_CR67","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"JE Maddux","year":"1983","unstructured":"Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469\u2013479","journal-title":"Journal of Experimental Social Psychology"},{"issue":"4","key":"10321_CR68","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1177\/109019817400200404","volume":"2","author":"LA Maiman","year":"1974","unstructured":"Maiman, L. A., & Becker, M. H. (1974). The health belief model: Origins and correlates in psychological theory. Health Education Monographs, 2(4), 336\u2013353","journal-title":"Health Education Monographs"},{"key":"10321_CR69","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ijhm.2015.03.008","volume":"47","author":"C Morosan","year":"2015","unstructured":"Morosan, C., & DeFranco, A. (2015). Disclosing personal information via hotel apps: A privacy calculus perspective. International Journal of Hospitality Management, 47, 120\u2013130","journal-title":"International Journal of Hospitality Management"},{"key":"10321_CR70","doi-asserted-by":"publisher","first-page":"102188","DOI":"10.1016\/j.ijinfomgt.2020.102188","volume":"55","author":"T Nabity-Grover","year":"2020","unstructured":"Nabity-Grover, T., Cheung, C. M., & Thatcher, J. B. (2020). Inside out and outside in: How the COVID-19 pandemic affects self-disclosure on social media. International Journal of Information Management, 55, 102188","journal-title":"International Journal of Information Management"},{"key":"10321_CR71","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808678","volume-title":"Institutions, institutional change and economic performance","author":"DC North","year":"1990","unstructured":"North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge: Cambridge university press"},{"issue":"4","key":"10321_CR72","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.giq.2010.10.007","volume":"28","author":"S Ozkan","year":"2011","unstructured":"Ozkan, S., & Kanat, I. E. (2011). e-Government adoption model based on theory of planned behavior: Empirical validation. Government Information Quarterly, 28(4), 503\u2013513","journal-title":"Government Information Quarterly"},{"key":"10321_CR73","unstructured":"Park, J. (2021). Striking a Balance between Data Privacy and Public Health Safety A South Korean Perspective. Retrived April 29, 2021, from https:\/\/www.nbr.org\/publication\/striking-a-balance-between-data-privacy-and-public-health-safety-a-south-korean-perspective\/"},{"issue":"6","key":"10321_CR74","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1007\/s10796-021-10131-x","volume":"23","author":"F Piccialli","year":"2021","unstructured":"Piccialli, F., Di Cola, V. S., Giampaolo, F., & Cuomo, S. (2021). The role of artificial intelligence in fighting the COVID-19 pandemic. Information Systems Frontiers, 23(6), 1467\u20131497","journal-title":"Information Systems Frontiers"},{"issue":"5","key":"10321_CR75","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879","journal-title":"Journal of Applied Psychology"},{"key":"10321_CR76","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ijid.2020.07.074","volume":"99","author":"YT Prasetyo","year":"2020","unstructured":"Prasetyo, Y. T., Castillo, A. M., Salonga, L. J., Sia, J. A., & Seneta, J. A. (2020). Factors affecting perceived effectiveness of COVID-19 prevention measures among Filipinos during enhanced community quarantine in Luzon, Philippines: Integrating Protection Motivation Theory and extended Theory of Planned Behavior. International Journal of Infectious Diseases, 99, 312\u2013323","journal-title":"International Journal of Infectious Diseases"},{"issue":"1","key":"10321_CR77","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93\u2013114","journal-title":"The Journal of Psychology"},{"key":"10321_CR78","volume-title":"Institutions and Organizations","author":"WR Scott","year":"1995","unstructured":"Scott, W. R. (1995). Institutions and Organizations. Thousands Oaks. Cal: Sage Publications"},{"key":"10321_CR79","first-page":"408","volume":"11","author":"WR Scott","year":"2004","unstructured":"Scott, W. R. (2004). Institutional theory. Encyclopedia of Social Theory, 11, 408\u2013414","journal-title":"Encyclopedia of Social Theory"},{"issue":"2","key":"10321_CR80","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1093\/oso\/9780199276813.003.0022","volume":"37","author":"WR Scott","year":"2005","unstructured":"Scott, W. R. (2005). Institutional theory: Contributing to a theoretical research program. Great Minds in Management: The Process of Theory Development, 37(2), 460\u2013484","journal-title":"Great Minds in Management: The Process of Theory Development"},{"key":"10321_CR81","unstructured":"Scott, W. R., Ruef, M., Mendel, P. J., & Caronna, C. A. (2000). Institutional change and healthcare organizations: From professional dominance to managed care. University of Chicago Press"},{"key":"10321_CR82","doi-asserted-by":"crossref","unstructured":"Sharma, S., Singh, G., Sharma, R., Jones, P., Kraus, S., & Dwivedi, Y. K. (2020). Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps.IEEE Transactions on Engineering Management,1\u201317","DOI":"10.1109\/TEM.2020.3019033"},{"issue":"9","key":"10321_CR83","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1016\/j.ijmedinf.2015.05.010","volume":"84","author":"SA Sherer","year":"2015","unstructured":"Sherer, S. A., Meyerhoefer, C. D., Sheinberg, M., & Levick, D. (2015). Integrating commercial ambulatory electronic health records with hospital systems: An evolutionary process. International Journal of Medical Informatics, 84(9), 683\u2013693","journal-title":"International Journal of Medical Informatics"},{"issue":"4","key":"10321_CR84","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1057\/palgrave.fsm.4760081","volume":"12","author":"W Shi","year":"2008","unstructured":"Shi, W., Shambare, N., & Wang, J. (2008). The adoption of internet banking: An institutional theory perspective. Journal of Financial Services Marketing, 12(4), 272\u2013286","journal-title":"Journal of Financial Services Marketing"},{"issue":"4","key":"10321_CR85","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1080\/08874417.2009.11645342","volume":"49","author":"D Sledgianowski","year":"2009","unstructured":"Sledgianowski, D., & Kulviwat, S. (2009). Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. Journal of Computer Information Systems, 49(4), 74\u201383","journal-title":"Journal of Computer Information Systems"},{"issue":"4","key":"10321_CR86","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989\u20131015","journal-title":"MIS Quarterly"},{"issue":"1","key":"10321_CR87","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/TEM.2007.912806","volume":"55","author":"A Soares-Aguiar","year":"2008","unstructured":"Soares-Aguiar, A., & Palma-dos-Reis, A. (2008). Why do firms adopt e-procurement systems? Using logistic regression to empirically test a conceptual model. IEEE Transactions on Engineering Management, 55(1), 120\u2013133","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"3","key":"10321_CR88","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1108\/TR-05-2019-0153","volume":"76","author":"ALV Soares","year":"2020","unstructured":"Soares, A. L. V., Mendes-Filho, L., & Gretzel, U. (2020). Technology adoption in hotels: applying institutional theory to tourism. Tourism Review, 76(3), 669\u2013680","journal-title":"Tourism Review"},{"issue":"4","key":"10321_CR89","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1108\/IJPCC-06-2020-0069","volume":"16","author":"C Sreelakshmi","year":"2020","unstructured":"Sreelakshmi, C., & Prathap, S. K. (2020). Continuance adoption of mobile-based payments in Covid-19 context: an integrated framework of health belief model and expectation confirmation model. International Journal of Pervasive Computing and Communications, 16(4), 351\u2013369","journal-title":"International Journal of Pervasive Computing and Communications"},{"issue":"2","key":"10321_CR90","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","volume":"36","author":"M Stone","year":"1974","unstructured":"Stone, M. (1974). Cross-validatory choice and assessment of statistical predictions. Journal of the royal statistical society: Series B (Methodological), 36(2), 111\u2013133","journal-title":"Journal of the royal statistical society: Series B (Methodological)"},{"issue":"4","key":"10321_CR91","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/BF00993595","volume":"22","author":"D Strang","year":"1993","unstructured":"Strang, D., & Meyer, J. W. (1993). Institutional conditions for diffusion. Theory and Society, 22(4), 487\u2013511","journal-title":"Theory and Society"},{"issue":"3","key":"10321_CR92","doi-asserted-by":"publisher","first-page":"571","DOI":"10.2307\/258788","volume":"20","author":"MC Suchman","year":"1995","unstructured":"Suchman, M. C. (1995). Managing legitimacy: Strategic and institutional approaches. Academy of Management Review, 20(3), 571\u2013610","journal-title":"Academy of Management Review"},{"key":"10321_CR93","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.chb.2015.06.006","volume":"52","author":"Y Sun","year":"2015","unstructured":"Sun, Y., Wang, N., Shen, X. L., & Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278\u2013292","journal-title":"Computers in Human Behavior"},{"key":"10321_CR94","doi-asserted-by":"publisher","first-page":"101755","DOI":"10.1016\/j.techsoc.2021.101755","volume":"67","author":"CD Tran","year":"2021","unstructured":"Tran, C. D., & Nguyen, T. T. (2021). Health vs. privacy? The risk-risk tradeoff in using COVID-19 contact-tracing apps. Technology in Society, 67, 101755","journal-title":"Technology in Society"},{"issue":"2","key":"10321_CR95","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254\u2013268","journal-title":"Information Systems Research"},{"issue":"1","key":"10321_CR96","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.im.2012.05.006","volume":"50","author":"MC Tsai","year":"2013","unstructured":"Tsai, M. C., Lai, K. H., & Hsu, W. C. (2013). A study of the institutional forces influencing the adoption intention of RFID by suppliers. Information & Management, 50(1), 59\u201365","journal-title":"Information & Management"},{"key":"10321_CR97","doi-asserted-by":"publisher","first-page":"102743","DOI":"10.1016\/j.annals.2019.102743","volume":"78","author":"J Wang","year":"2019","unstructured":"Wang, J., Liu-Lastres, B., Ritchie, B. W., & Mills, D. J. (2019). Travellers\u2019 self-protections against health risks: An application of the full Protection Motivation Theory. Annals of Tourism Research, 78, 102743","journal-title":"Annals of Tourism Research"},{"issue":"1","key":"10321_CR98","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1016\/j.ijinfomgt.2016.10.006","volume":"37","author":"L Wang","year":"2017","unstructured":"Wang, L., Yan, J., Lin, J., & Cui, W. (2017). Let the users tell the truth: Self-disclosure intention and self-disclosure honesty in mobile social networking. International Journal of Information Management, 37(1), 1428\u20131440","journal-title":"International Journal of Information Management"},{"issue":"1","key":"10321_CR99","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1002\/bse.1983","volume":"27","author":"S Wang","year":"2018","unstructured":"Wang, S., Li, J., & Zhao, D. (2018). Institutional pressures and environmental management practices: The moderating effects of environmental commitment and resource availability. Business Strategy and the Environment, 27(1), 52\u201369","journal-title":"Business Strategy and the Environment"},{"issue":"4","key":"10321_CR100","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.ijinfomgt.2016.03.003","volume":"36","author":"T Wang","year":"2016","unstructured":"Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531\u2013542","journal-title":"International Journal of Information Management"},{"issue":"4","key":"10321_CR101","doi-asserted-by":"publisher","first-page":"490","DOI":"10.2307\/258554","volume":"14","author":"DA Whetten","year":"1989","unstructured":"Whetten, D. A. (1989). What constitutes a theoretical contribution? Academy of Management Review, 14(4), 490\u2013495","journal-title":"Academy of Management Review"},{"issue":"8","key":"10321_CR102","doi-asserted-by":"publisher","first-page":"e435","DOI":"10.1016\/S2589-7500(20)30142-4","volume":"2","author":"S Whitelaw","year":"2020","unstructured":"Whitelaw, S., Mamas, M. A., Topol, E., & Van Spall, H. G. (2020). Applications of digital technology in COVID-19 pandemic planning and response. The Lancet Digital Health, 2(8), e435\u2013e440","journal-title":"The Lancet Digital Health"},{"key":"10321_CR103","unstructured":"World Health Organization (2014). Contact Tracing During an Outbreak of Ebola Virus Disease. Retrived July 15 from https:\/\/www.who.int\/csr\/resources\/publications\/ebola\/contact-tracing-during-outbreak-of-ebola.pdf?ua%20=%201"},{"issue":"5","key":"10321_CR104","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1037\/0278-6133.6.5.453","volume":"6","author":"SK Wurtele","year":"1987","unstructured":"Wurtele, S. K., & Maddux, J. E. (1987). Relative contributions of protection motivation theory components in predicting exercise intentions and behavior. Health Psychology, 6(5), 453","journal-title":"Health Psychology"},{"issue":"1","key":"10321_CR105","doi-asserted-by":"publisher","first-page":"1","DOI":"10.52255\/smarttourism.2021.1.1.1","volume":"1","author":"Z Xiang","year":"2021","unstructured":"Xiang, Z. (2021). Journal of Smart Tourism: A New Platform to Support and Define an Emerging Field. Journal of Smart Tourism, 1(1), 1\u20132","journal-title":"Journal of Smart Tourism"},{"issue":"12","key":"10321_CR106","doi-asserted-by":"publisher","first-page":"798","DOI":"10.17705\/1jais.00281","volume":"12","author":"H Xu","year":"2011","unstructured":"Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798\u2013824","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"10321_CR107","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1496930.1496937","volume":"40","author":"S Yang","year":"2009","unstructured":"Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 40(1), 38\u201351","journal-title":"ACM SIGMIS Database: the DATABASE for Advances in Information Systems"},{"issue":"6","key":"10321_CR108","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1287\/orsc.13.6.667.494","volume":"13","author":"D Yiu","year":"2002","unstructured":"Yiu, D., & Makino, S. (2002). The choice between joint venture and wholly owned subsidiary: An institutional perspective. Organization Science, 13(6), 667\u2013683","journal-title":"Organization Science"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10321-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10321-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10321-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T02:40:07Z","timestamp":1727836807000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10321-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,19]]},"references-count":108,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["10321"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10321-1","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"type":"print","value":"1387-3326"},{"type":"electronic","value":"1572-9419"}],"subject":[],"published":{"date-parts":[[2022,8,19]]},"assertion":[{"value":"31 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"No potential conflict of interest was reported by the author(s).","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}