{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:29:32Z","timestamp":1775838572913,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper aims to examine the challenges of preventing internal identity theft related crimes (IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected number of cross-functional management teams in the UK retail companies, management roles were analysed. We used semi-structured interview as a qualitative data collection technique and used Nvivo aided thematic analysis and interpretivism underpinned by Role-Based Framework (RBF) for analysis. Our findings revealed that vagueness of roles and lack of clarity in sharing data security responsibilities are the major challenges of preventing IIDTRC in UK retail companies. We suggest an application of RBF which provides a conceptual analysis for cross-functional management team to address the challenges of preventing IIDTRC. RBF enables clarity of shared roles where both information security and crimes prevention teams work in unison is required to prevent IIDTRC to maximise internal data security. Contributions for policymakers are offered in this paper.<\/jats:p>","DOI":"10.1007\/s10796-022-10326-w","type":"journal-article","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T03:31:37Z","timestamp":1662003097000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8733-7401","authenticated-orcid":false,"given":"Romanus Izuchukwu","family":"Okeke","sequence":"first","affiliation":[]},{"given":"Max Hashem","family":"Eiza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"issue":"1","key":"10326_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/fi14010011","volume":"14","author":"YS Abdulsalam","year":"2022","unstructured":"Abdulsalam, Y. S., & Hedabou, M. (2022). Security and privacy in cloud computing: Technical review. Future Internet, 14(1), 11.","journal-title":"Future Internet"},{"key":"10326_CR2","unstructured":"Association of Certified Fraud Examiners (ACFE). (2014). Report to the Nations on Occupational Fraud and Abuse: Global Fraud Study. Available at: http:\/\/www.acfe.com\/rttn\/docs\/2014-report-to-nations.pdf. Accessed 20 April 2014."},{"key":"10326_CR3","doi-asserted-by":"crossref","unstructured":"Amasiatu, C. V., & Shah, M. H. (2018). First party fraud management: Framework for the retail industry. International Journal of Retail & Distribution Management.","DOI":"10.1108\/IJRDM-10-2016-0185"},{"key":"10326_CR4","unstructured":"Barling, J. (1995). International Review of Industry and Organisational Psychology. 11 (1). Wiley, UK."},{"key":"10326_CR5","volume-title":"Research Methods in Anthropology: Qualitative and Quantitative Approaches","author":"HR Bernard","year":"1994","unstructured":"Bernard, H. R. (1994). Research Methods in Anthropology: Qualitative and Quantitative Approaches (2nd ed.). Alta Mira Press.","edition":"2"},{"key":"10326_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1146\/annurev.so.12.080186.000435","volume":"12","author":"BJ Biddle","year":"1986","unstructured":"Biddle, B. J. (1986). Recent developments in role theory. Annual Review of Sociology, 12, 67\u201392.","journal-title":"Annual Review of Sociology"},{"key":"10326_CR7","unstructured":"Biegelman, M. T. (2009). Identity Theft Handbook: Detection, Prevention and Security. (edn). Wiley."},{"key":"10326_CR8","doi-asserted-by":"crossref","unstructured":"Biglari, V., & Pourabedin, Z. (2022). Application of Data Analysis and Big Data in Auditing. In Community Empowerment, Sustainable Cities, and Transformative Economies (pp. 111\u2013128). Springer, Singapore.","DOI":"10.1007\/978-981-16-5260-8_8"},{"key":"10326_CR9","unstructured":"British Retail Consortium (BRC). (2015). \u2018BRC Retail Crime Survey 2014\u2019. Available at: http:\/\/www.sbrcentre.co.uk\/images\/site_images\/14591_BRC_Retail_Crime_Survey_2014.pdf. Accessed 10 January 2015."},{"key":"10326_CR10","unstructured":"British Retail Consortium (BRC). (2019). \u2018BRC 2019 Retail Crime Survey\u2019. Avalable at: https:\/\/brc.org.uk\/media\/404253\/brc-annual-crime-survey-2019.pdf."},{"key":"10326_CR11","volume-title":"Social Research Methods","author":"A Bryman","year":"2001","unstructured":"Bryman, A. (2001). Social Research Methods. Oxford University Press."},{"key":"10326_CR12","doi-asserted-by":"crossref","unstructured":"Cabri, G., Ferrari, L., Leonardi, L., & Quitadamo, R. (2006). \u2018Collaboration-Driven Role Suggestion for Agents\u2019. Proc. of IEEE Workshop on Distributed Intelligent Systems - Collective Intelligence and Its Applications, Prague, Czech.","DOI":"10.1109\/DIS.2006.16"},{"key":"10326_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/271007","volume":"23","author":"KM Carley","year":"1993","unstructured":"Carley, K. M. (1993). Coding choices for textual analysis: A comparison of content analysis and map analysis. Sociology Methodology, 23, 75\u2013126.","journal-title":"Sociology Methodology"},{"key":"10326_CR14","unstructured":"Centre for Retail Research. (2015). European Online Growth, Available at https:\/\/www.retailresearch.org\/onlineretail.html"},{"key":"10326_CR15","doi-asserted-by":"crossref","unstructured":"Chatterjee, U., & Ray, S. (2022). Security Issues on IoT Communication and Evolving Solutions. In Soft Computing in Interdisciplinary Sciences (pp. 183\u2013204). Springer, Singapore.","DOI":"10.1007\/978-981-16-4713-0_10"},{"key":"10326_CR16","doi-asserted-by":"crossref","unstructured":"Chen, Y., Galletta, D. F., Lowry, P. B., Luo, X., Moody, G. D., & Willison, R. (2021). Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. Information Systems Research.","DOI":"10.1287\/isre.2021.1014"},{"key":"10326_CR17","unstructured":"Chen, P., & Rohatgi, P. (2008). \u2018IT Security as Risk Management: A Research Perspective\u2019. IBM Research Report. Thomas J. Watson Research Centre, Yorktown Heights, NY, USA."},{"key":"10326_CR18","unstructured":"CIFAS. (2021). Fraudscape, CIFAS, London, UK."},{"key":"10326_CR19","volume-title":"Preventing Identity Theft in Your Business","author":"JM Collins","year":"2006","unstructured":"Collins, J. M. (2006). Preventing Identity Theft in Your Business. Wiley."},{"key":"10326_CR20","doi-asserted-by":"crossref","unstructured":"Cross, C., & Layt, R. (2021). \u201cI Suspect That the Pictures Are Stolen\u201d: Romance Fraud, Identity Crime, and Responding to Suspicions of Inauthentic Identities. Social Science Computer Review, p.0894439321999311.","DOI":"10.1177\/0894439321999311"},{"issue":"4","key":"10326_CR21","first-page":"532","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K. M. (1989). Building theories from case study research. Journal of Academic Management., 14(4), 532\u2013550.","journal-title":"Journal of Academic Management."},{"key":"10326_CR22","volume-title":"Crime Prevention, Security and Community Safety with the 5Is Framework","author":"P Ekblom","year":"2010","unstructured":"Ekblom, P. (2010). Crime Prevention, Security and Community Safety with the 5Is Framework. Palgrave Macmillan."},{"issue":"2","key":"10326_CR23","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s11135-014-0003-1","volume":"49","author":"R Falotico","year":"2015","unstructured":"Falotico, R., & Quatto, P. (2015). Fleiss\u2019 kappa statistic without paradoxes. Quality & Quantity, 49(2), 463\u2013470.","journal-title":"Quality & Quantity"},{"key":"10326_CR24","doi-asserted-by":"crossref","unstructured":"Gottschalk, P., & Hamerton, C. (2022). Online Convenience. In White-Collar Crime Online (pp. 37\u201361). Palgrave Macmillan, Cham.","DOI":"10.1007\/978-3-030-82132-6_3"},{"key":"10326_CR25","doi-asserted-by":"crossref","unstructured":"Gu\u00e9raiche, W. (2022). Cyberspace, threat agents and power. Facets of Security in the United Arab Emirates, pp.76\u201386.","DOI":"10.4324\/9781003025566-10"},{"key":"10326_CR26","doi-asserted-by":"crossref","unstructured":"Haislip, J., Lim, J. H., & Pinsker, R. (2021). The Impact of Executives\u2019 IT Expertise on Reported Data Security Breaches. Information Systems Research.","DOI":"10.1287\/isre.2020.0986"},{"key":"10326_CR27","unstructured":"Hakim, C. (2000). Research Design: Successful Designs for Social and Economic Research. 2nd (edn). London, Routledge."},{"issue":"2","key":"10326_CR28","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s10796-015-9599-5","volume":"19","author":"SM Ho","year":"2017","unstructured":"Ho, S. M., & Warkentin, M. (2017). Leader\u2019s dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19(2), 377\u2013396.","journal-title":"Information Systems Frontiers"},{"key":"10326_CR29","doi-asserted-by":"crossref","unstructured":"Hodgson, G. M. (2006). What are Institutions? Journal of Economic Issues, 40(1), 1\u201320.","DOI":"10.1080\/00213624.2006.11506879"},{"issue":"1","key":"10326_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10796-013-9419-8","volume":"15","author":"CL Huth","year":"2013","unstructured":"Huth, C. L., Chadwick, D. W., Claycomb, W. R., & You, I. (2013). Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers, 15(1), 1\u20134.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"10326_CR31","first-page":"3","volume":"20","author":"A Johnston","year":"2019","unstructured":"Johnston, A., Di Gangi, P., Howard, J., & Worrell, J. L. (2019). It takes a village: Understanding the collective security efficacy of employee groups. Journal of the Association for Information Systems, 20(3), 3.","journal-title":"Journal of the Association for Information Systems"},{"key":"10326_CR32","doi-asserted-by":"crossref","unstructured":"Jones, P., & Comfort, D. (2022). Corporate Digital Responsibility: Approaches of the Leading IT Companies. Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies, pp.231\u2013248.","DOI":"10.4018\/978-1-7998-7712-7.ch013"},{"key":"10326_CR33","unstructured":"Jupe, L., Vrij, A., Leal, S., Mann, S., & Nahari, G. (2016). The lies we live: Using the verifiability approach to detect lying about occupation. Journal of Articles in Support of the Null Hypothesis, 13(1)."},{"key":"10326_CR34","volume-title":"The social psychology of organizations","author":"RL Kahn","year":"1978","unstructured":"Kahn, R. L., & Katz, D. (1978). The social psychology of organizations (2nd ed.). Wiley.","edition":"2"},{"key":"10326_CR35","unstructured":"Katz, D., & Kahn, R. L. (1966). \u2018The social psychology of organizations. (edn). Wiley."},{"key":"10326_CR36","doi-asserted-by":"crossref","unstructured":"Klerman, D., & Shortland, A. (2022). The transformation of the art market: Law, norms, and institutions. Theoretical Inquiries in Law, 23(1).","DOI":"10.1515\/til-2022-0009"},{"key":"10326_CR37","unstructured":"Kroll Global Fraud Report. (2010). Available at: http:\/\/ethicsline.com\/pdf\/kroll-global-fraudreport-english-usapr10.pdf. Accessed 23 September 2011."},{"key":"10326_CR38","unstructured":"Kroll Fraud Report. (2011). http:\/\/www.krollconsulting.com\/insights-reports\/global-fraud-reports\/."},{"key":"10326_CR39","doi-asserted-by":"crossref","unstructured":"Lawrence, T., Suddaby, R., & Leca, B. (2009). Institutional Work: Refocusing Institutional Studies of Organisation.\u00a0Journal of Management Inquiry 20(1), 52\u201358.","DOI":"10.1177\/1056492610387222"},{"key":"10326_CR40","doi-asserted-by":"crossref","unstructured":"Luhmann N. (2004). Law as a Social System (pp. 64\u201366). Oxford, UK: Blackwell.","DOI":"10.1093\/oso\/9780198262381.001.0001"},{"issue":"6","key":"10326_CR41","first-page":"5","volume":"21","author":"XR Luo","year":"2020","unstructured":"Luo, X. R., Li, H., Hu, Q., & Xu, H. (2020). Why individual employees commit malicious computer abuse: A routine activity theory perspective. Journal of the Association for Information Systems, 21(6), 5.","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"10326_CR42","doi-asserted-by":"publisher","first-page":"2","DOI":"10.17705\/1jais.00453","volume":"18","author":"K Lyytinen","year":"2017","unstructured":"Lyytinen, K., & Grover, V. (2017). Management misinformation systems: A time to revisit? Journal of the Association for Information Systems, 18(3), 2.","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"10326_CR43","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1177\/1525822X980100020301","volume":"10","author":"KM MacQueen","year":"1998","unstructured":"MacQueen, K. M., McLellan, E., Kay, K., & Milstein, B. (1998). Codebook development for team-based qualitative analysis. Cam Journal, 10(2), 31\u201336.","journal-title":"Cam Journal"},{"key":"10326_CR44","unstructured":"Madsen, M. T. (2002). \u2018Managerial roles in a dynamic world\u2019, Proceedings of the 12th Nordic Conference on Small Business Research, Finland."},{"key":"10326_CR45","doi-asserted-by":"crossref","unstructured":"Majhi, S. G., Anand, A., Mukherjee, A., & Rana, N. P. (2021). The Optimal Configuration of IT-Enabled Dynamic Capabilities in a firm\u2019s Capabilities Portfolio: A Strategic Alignment Perspective. Information Systems Frontiers, pp.1\u201316.","DOI":"10.1007\/s10796-021-10145-5"},{"issue":"3","key":"10326_CR46","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh, M. L. (2012). Interrater reliability: The kappa statistic. Biochemia Medica, 22(3), 276\u2013282.","journal-title":"Biochemia Medica"},{"key":"10326_CR47","first-page":"135","volume-title":"Handbook of mixed methods in social & behavioral research","author":"DM Mertens","year":"2003","unstructured":"Mertens, D. M. (2003). Mixed methods and the politics of human research: Then transformative-nemancipatory perspective. In A. Tashakkori & C. Teddlie (Eds.), Handbook of mixed methods in social & behavioral research (pp. 135\u2013164). Sage."},{"key":"10326_CR48","first-page":"126","volume":"2014","author":"NAS Mirza","year":"2014","unstructured":"Mirza, N. A. S., Abbas, H., Khan, F. A., & Al Muhtadi, J. (2014). Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms. International Symposium on Biometrics and Security Technologies (ISBAST), 2014, 126\u2013132.","journal-title":"International Symposium on Biometrics and Security Technologies (ISBAST)"},{"key":"10326_CR49","unstructured":"Okeke, R. I. (2015). The prevention of internal identity theft-related crimes: a case study research of the UK online retail companies (Doctoral dissertation, University of Central Lancashire)."},{"key":"10326_CR50","doi-asserted-by":"publisher","DOI":"10.4324\/9781315732015","volume-title":"Information theft prevention: Theory and practice","author":"R Okeke","year":"2016","unstructured":"Okeke, R., & Shah, M. (2016). Information theft prevention: Theory and practice. Routledge."},{"key":"10326_CR51","unstructured":"Organisation for Economic Cooperation and Developement (OECD), (2008). \u2018Policy Guidance on Online Identity Theft\u2019, OECD Ministerial Meeting on the future of the Internet Economy Seoul."},{"key":"10326_CR52","doi-asserted-by":"crossref","unstructured":"Pettigrew, A. M. (1990). Longitudinal field research on change: Theory and practice. Journal of Organisational Science, 1(3), 267\u2013292.","DOI":"10.1287\/orsc.1.3.267"},{"key":"10326_CR53","unstructured":"Potter, C., & Waterfall, G. (2012). PriceWaterCooper\u2019s Information security breaches survey: Technical report [Available Onlince at www.infosec.co.uk]."},{"key":"10326_CR54","unstructured":"Romanosky, S., & Telang, R., & Acquisti, A. (2008). Do Data Breach Disclosure Laws Reduce Identity Theft? Seventh Workshop on the Economics of Information Security, Center for Digital Strategies, Tuck School of Business, Dartmouth College, Hanover, NH, pp. 1\u201315"},{"key":"10326_CR55","doi-asserted-by":"crossref","unstructured":"Salam, A. F., Dai, H., & Wang, L. (2021). Online Users\u2019 Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment. Information Systems Frontiers, pp.1\u201320.","DOI":"10.1007\/s10796-021-10194-w"},{"key":"10326_CR56","unstructured":"Sarnecki, J. (2005). Knowledge-based crime prevention, theoretical points of departure for practical crime prevention. In Paper presented at the Eleventh United Nations Congress on Crime Prevention and Criminal Justice, 18 \u2013 25 April 2005, Bangkok, Thailand (pp. 1\u201311)."},{"key":"10326_CR57","first-page":"1","volume-title":"Collaborative Security: An Approach to Tackling Internet Security Issues","author":"I Security","year":"2015","unstructured":"Security, I. (2015). Collaborative Security: An Approach to Tackling Internet Security Issues (pp. 1\u20136). Creative Commons."},{"key":"10326_CR58","doi-asserted-by":"crossref","unstructured":"Shah, M. & Clarke, S. (Eds.) (2009). E-banking Management: Issues, Solutions and Strategies. London, UK: IGI Global.","DOI":"10.4018\/978-1-60566-252-7"},{"key":"10326_CR59","unstructured":"Shah, M, & Okeke, R. (2011). Framework for Prevention of Identity Theft Related Crimes in UK Retail Industry. Proc. of Intelligence and Security Informatics Conference (EISIC)."},{"key":"10326_CR60","doi-asserted-by":"crossref","unstructured":"Shopon, M., Hossain Bari, A. S. M., Bhatia, Y., Narayanaswamy, P. K., Tumpa, S. N., Sieu, B., & Gavrilova, M. (2022). Biometric System De-identification: Concepts, Applications, and Open Problems. In Handbook of Artificial Intelligence in Healthcare (pp. 393\u2013422). Springer, Cham.","DOI":"10.1007\/978-3-030-83620-7_17"},{"key":"10326_CR61","doi-asserted-by":"crossref","unstructured":"Stalla-Bourdillon, S. (2014). Privacy Versus Security\u2026 Are we done yet?. In Privacy vs. Security (pp. 1\u201390). Springer, London.","DOI":"10.1007\/978-1-4471-6530-9_1"},{"key":"10326_CR62","volume-title":"The Truth About Identity Theft. Why be me when I can be you?","author":"J Stickley","year":"2009","unstructured":"Stickley, J. (2009). The Truth About Identity Theft. Why be me when I can be you? USA: Pearson Education New Jersey."},{"key":"10326_CR63","volume-title":"Basics of qualitative research","author":"A Strauss","year":"1998","unstructured":"Strauss, A., & Corbin, J. (1998). Basics of qualitative research (2nd ed.). Sage.","edition":"2"},{"issue":"3","key":"10326_CR64","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s10796-014-9490-9","volume":"16","author":"KJ Wakunuma","year":"2014","unstructured":"Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow\u2019s ethics and today\u2019s response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383\u2013397.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"10326_CR65","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1007\/s10796-019-09958-2","volume":"21","author":"G Walsh","year":"2019","unstructured":"Walsh, G., Shiu, E., Hassan, L., Hille, P., & Takahashi, I. (2019). Fear of online consumer identity theft: Cross-country application and short scale development. Information Systems Frontiers, 21(6), 1251\u20131264.","journal-title":"Information Systems Frontiers"},{"key":"10326_CR66","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983488","volume-title":"Basic Content Analysis","author":"RP Weber","year":"1990","unstructured":"Weber, R. P. (1990). Basic Content Analysis. Sage Publications."},{"key":"10326_CR67","first-page":"1","volume":"592","author":"M Wyre","year":"2020","unstructured":"Wyre, M., Lacey, D., & Allan, K. (2020). The identity theft response system. Trends and Issues in Crime and Criminal Justice, 592, 1\u201318.","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"key":"10326_CR68","unstructured":"Xie, Q. (2013). Agree or disagree? A demonstration of an alternative statistic to Cohen\u2019s Kappa for measuring the extent and reliability of agreement between observers. In Proceedings of the Federal Committee on Statistical Methodology Research Conference (vol. 4)."},{"key":"10326_CR69","volume-title":"Case study research: Design and methods","author":"RK Yin","year":"1984","unstructured":"Yin, R. K. (1984). Case study research: Design and methods. Sage."},{"key":"10326_CR70","doi-asserted-by":"crossref","unstructured":"Zhang, Y., & Yin, J. (2006). A Role-Based Modeling for Agent Teams. Proc. of 2006 IEEE Workshop on Distributed Intelligent Systems - Collective Intelligence and Its Applications, Prague, Czech.","DOI":"10.1109\/DIS.2006.6"},{"issue":"2","key":"10326_CR71","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.im.2009.12.003","volume":"47","author":"JC Zimmer","year":"2010","unstructured":"Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115\u2013123.","journal-title":"Information & Management"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10326-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10326-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10326-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T12:53:55Z","timestamp":1701003235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10326-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":71,"alternative-id":["10326"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10326-w","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"12 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}