{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:57Z","timestamp":1740122877497,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16939-w","type":"journal-article","created":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T06:02:27Z","timestamp":1702965747000},"page":"58043-58073","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["User-selectable interaction and privacy features in mobile app recommendation (MAR)"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4738-9127","authenticated-orcid":false,"given":"Saira","family":"Beg","sequence":"first","affiliation":[]},{"given":"Adeel","family":"Anjum","sequence":"additional","affiliation":[]},{"given":"Mansoor","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,19]]},"reference":[{"issue":"10","key":"16939_CR1","doi-asserted-by":"publisher","first-page":"9367","DOI":"10.1016\/j.eswa.2012.02.131","volume":"39","author":"E Costa-Montenegro","year":"2012","unstructured":"Costa-Montenegro E, Barrag\u00e1ns-Mart\u00ednez AB, Rey-L\u00f3pez M (2012) Which App? A recommender system of applications in markets: Implementation of the service for monitoring users\u2019 interaction. Expert Syst Appl 39(10):9367\u20139375","journal-title":"Expert Syst Appl"},{"issue":"7","key":"16939_CR2","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1016\/j.tele.2017.05.005","volume":"34","author":"P Unal","year":"2017","unstructured":"Unal P, Temizel TT, Eren PE (2017) What installed mobile applications tell about their owners and how they affect users\u2019 download behavior. Telemat Informatics 34(7):1153\u20131165","journal-title":"Telemat Informatics"},{"key":"16939_CR3","unstructured":"Zhang B, Wang N, Jin H (2014) \u201cPrivacy concerns in online recommender systems: influences of control and user data input\u201d. In Symposium on Usable Privacy and Security (SOUPS), pp 159\u2013173"},{"key":"16939_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2017.01.007","volume":"37","author":"H Cao","year":"2017","unstructured":"Cao H, Lin M (2017) Mining smartphone data for app usage prediction and recommendations: A survey. Pervasive Mob Comput 37:1\u201322","journal-title":"Pervasive Mob Comput"},{"key":"16939_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.eswa.2016.10.024","volume":"69","author":"Y-D Seo","year":"2017","unstructured":"Seo Y-D, Kim Y-G, Lee E, Baik D-K (2017) Personalized recommender system based on friendship strength in social network services. Expert Syst Appl 69:135\u2013148","journal-title":"Expert Syst Appl"},{"key":"16939_CR6","doi-asserted-by":"crossref","unstructured":"Dhakal N, Spezzano F, Xu D (2017) \u201cPredicting friendship strength for privacy preserving: A case study on facebook\u201d. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp 1096\u20131103","DOI":"10.1145\/3110025.3116196"},{"key":"16939_CR7","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.is.2017.08.006","volume":"71","author":"RM Frey","year":"2017","unstructured":"Frey RM, Xu R, Ammendola C, Moling O, Giglio G, Ilic A (2017) Mobile recommendations based on interest prediction from consumer\u2019s installed apps\u2013insights from a large-scale field study. Inf Syst 71:152\u2013163","journal-title":"Inf Syst"},{"key":"16939_CR8","doi-asserted-by":"crossref","unstructured":"Xu K, Yan Z (2016) \u201cPrivacy Protection in Mobile Recommender Systems: A Survey\u201d. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp 305\u2013318","DOI":"10.1007\/978-3-319-49148-6_26"},{"issue":"7","key":"16939_CR9","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1109\/TCYB.2014.2349954","volume":"45","author":"H Zhu","year":"2015","unstructured":"Zhu H, Liu C, Ge Y, Xiong H, Chen E (2015) Popularity modeling for mobile apps: A sequential approach. IEEE Trans Cybern 45(7):1303\u20131314","journal-title":"IEEE Trans Cybern"},{"issue":"3","key":"16939_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2721896.2721908","volume":"18","author":"S Seneviratne","year":"2015","unstructured":"Seneviratne S, Seneviratne A, Mohapatra P, Mahanti A (2015) Your installed apps reveal your gender and more! ACM SIGMOBILE Mob Comput Commun Rev 18(3):55\u201361","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"16939_CR11","unstructured":"Ahmad W, Riaz A (2010) Predicting friendship levels in online social networks. Master's thesis, Blekinge Institute of Technology, 2010"},{"issue":"4","key":"16939_CR12","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s00799-015-0156-0","volume":"17","author":"J Beel","year":"2016","unstructured":"Beel J, Gipp B, Langer S, Breitinger C (2016) paper recommender systems: a literature survey. Int J Digit Libr 17(4):305\u2013338","journal-title":"Int J Digit Libr"},{"issue":"4","key":"16939_CR13","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/TLT.2015.2438867","volume":"8","author":"M Erdt","year":"2015","unstructured":"Erdt M, Fernandez A, Rensing C (2015) Evaluating recommender systems for technology enhanced learning: a quantitative survey. IEEE Trans Learn Technol 8(4):326\u2013344","journal-title":"IEEE Trans Learn Technol"},{"issue":"2","key":"16939_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2636242.2636244","volume":"18","author":"S Seneviratne","year":"2014","unstructured":"Seneviratne S, Seneviratne A, Mohapatra P, Mahanti A (2014) Predicting user traits from a snapshot of apps installed on a smartphone. ACM SIGMOBILE Mob Comput Commun Rev 18(2):1\u20138","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"16939_CR15","doi-asserted-by":"crossref","unstructured":"Wang Q et al (2015) \u201cA novel APP recommendation method based on SVD and social influence,\u201d in International Conference on Algorithms and Architectures for Parallel Processing, pp 269\u2013281","DOI":"10.1007\/978-3-319-27122-4_19"},{"key":"16939_CR16","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.procs.2017.06.090","volume":"110","author":"DF Chamorro-Vela","year":"2017","unstructured":"Chamorro-Vela DF et al (2017) Recommendation of Mobile Applications based on social and contextual user information. Procedia Comput Sci 110:236\u2013241","journal-title":"Procedia Comput Sci"},{"issue":"5","key":"16939_CR17","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s00779-011-0420-2","volume":"16","author":"Z Yan","year":"2012","unstructured":"Yan Z, Zhang P, Deng RH (2012) TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications. Pers Ubiquitous Comput 16(5):485\u2013506","journal-title":"Pers Ubiquitous Comput"},{"key":"16939_CR18","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.jocs.2018.04.001","volume":"26","author":"K Xu","year":"2018","unstructured":"Xu K, Zhang W, Yan Z (2018) A privacy-preserving mobile application recommender system based on trust evaluation. J Comput Sci 26:87\u2013107","journal-title":"J Comput Sci"},{"key":"16939_CR19","doi-asserted-by":"crossref","unstructured":"Ickin S, Petersen K, Gonzalez-Huerta J (2017) \u201cWhy do users install and delete Apps? A survey study\u201d. In: International Conference of Software Business, pp 186\u2013191","DOI":"10.1007\/978-3-319-69191-6_13"},{"issue":"1","key":"16939_CR20","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TSE.2014.2360674","volume":"41","author":"SL Lim","year":"2014","unstructured":"Lim SL, Bentley PJ, Kanakam N, Ishikawa F, Honiden S (2014) Investigating country differences in mobile app user behavior and challenges for software engineering. IEEE Trans Softw Eng 41(1):40\u201364","journal-title":"IEEE Trans Softw Eng"},{"key":"16939_CR21","doi-asserted-by":"crossref","unstructured":"Chin E, Felt AP, Sekar V, Wagner D (2012) \u201cMeasuring user confidence in smartphone security and privacy\u201d. In: Proceedings of the eighth symposium on usable privacy and security, pp 1\u201316","DOI":"10.1145\/2335356.2335358"},{"key":"16939_CR22","doi-asserted-by":"crossref","unstructured":"Oechslein O, Hess T (2014) \u201cThe value of a recommendation: The role of social ties in social recommender systems\u201d. In 2014 47th Hawaii International Conference on System Sciences, pp 1864\u20131873","DOI":"10.1109\/HICSS.2014.235"},{"key":"16939_CR23","doi-asserted-by":"crossref","unstructured":"Banks L, Wu SF (2009) \u201cAll friends are not created equal: An interaction intensity based approach to privacy in online social networks\u201d. In: 2009 International Conference on Computational Science and Engineering, vol 4, pp 970\u2013974","DOI":"10.1109\/CSE.2009.429"},{"key":"16939_CR24","doi-asserted-by":"crossref","unstructured":"Hristova D, Musolesi M, Mascolo C (2014) Keep your friends close and your facebook friends closer: A multiplex network approach to the analysis of offline and online social ties.  In Proceedings of the International AAAI Conference on Web and Social Media 8(1):206\u2013215","DOI":"10.1609\/icwsm.v8i1.14544"},{"key":"16939_CR25","unstructured":"Wiese J, Min JK, Hong JI, Zimmerman J (2014) Assessing call and SMS logs as an indication of tie strength. Human-Computer Interaction Institute School of Computer Science Carnegie Mellon. CMU-HCII-14-101. [Online]. Available: http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/hcii\/CMU-HCII-14-101.pdf"},{"issue":"1","key":"16939_CR26","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s40305-018-00237-6","volume":"7","author":"Q Qi","year":"2019","unstructured":"Qi Q, Wang W-W, Yu L-F (2019) Competitive and Collaborative Influence in Social Networks. J Oper Res Soc China 7(1):169\u2013182","journal-title":"J Oper Res Soc China"},{"issue":"2","key":"16939_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2641190.2641195","volume":"15","author":"J Tang","year":"2014","unstructured":"Tang J, Chang Y, Liu H (2014) Mining social media with social theories: a survey. ACM Sigkdd Explor Newsl 15(2):20\u201329","journal-title":"ACM Sigkdd Explor Newsl"},{"key":"16939_CR28","doi-asserted-by":"publisher","first-page":"18783","DOI":"10.1109\/ACCESS.2019.2893024","volume":"7","author":"R Chen","year":"2019","unstructured":"Chen R et al (2019) A novel social recommendation method fusing user\u2019s social status and homophily based on matrix factorization techniques. IEEE Access 7:18783\u201318798","journal-title":"IEEE Access"},{"key":"16939_CR29","doi-asserted-by":"crossref","unstructured":"Li J, Guo R, Liu C, Liu H (2019) \u201cAdaptive unsupervised feature selection on attributed networks\u201d. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp 92\u2013100","DOI":"10.1145\/3292500.3330856"},{"key":"16939_CR30","first-page":"1102","volume":"11","author":"Z Khairallah","year":"2016","unstructured":"Khairallah Z, Nawaf HN (2016) Improving Recommendation System Based on Homophily Principle and Demographic. Res J Appl Sci 11:1102\u20131106","journal-title":"Res J Appl Sci"},{"issue":"2","key":"16939_CR31","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1504\/IJWET.2018.092831","volume":"13","author":"A Taneja","year":"2018","unstructured":"Taneja A, Arora A (2018) Recommendation research trends: review, approaches and open issues. Int J Web Eng Technol 13(2):123\u2013186","journal-title":"Int J Web Eng Technol"},{"key":"16939_CR32","doi-asserted-by":"crossref","unstructured":"Zhong Y, Yang J, Nugroho R (2015) \u201cIncorporating tie strength in robust social recommendation\u201d. In: 2015 IEEE International Congress on Big Data, pp 63\u201370","DOI":"10.1109\/BigDataCongress.2015.19"},{"issue":"12","key":"16939_CR33","doi-asserted-by":"publisher","first-page":"3403","DOI":"10.1109\/TMC.2017.2694830","volume":"16","author":"C Wu","year":"2017","unstructured":"Wu C, Zhang Y, Jia J, Zhu W (2017) Mobile contextual recommender system for online social media. IEEE Trans Mob Comput 16(12):3403\u20133416","journal-title":"IEEE Trans Mob Comput"},{"key":"16939_CR34","doi-asserted-by":"crossref","unstructured":"Yang B, Wu C, Sigg S, Zhang Y (2016) \u201cCoCo (Context vs. Content): Behavior-Inspired Social Media Recommendation for Mobile Apps\u201d. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2016.7841666"},{"issue":"14","key":"16939_CR35","doi-asserted-by":"publisher","first-page":"5173","DOI":"10.1007\/s11042-013-1849-2","volume":"74","author":"B Wu","year":"2015","unstructured":"Wu B, Zhou X, Jin Q (2015) Participatory information search and recommendation based on social roles and networks. Multimed Tools Appl 74(14):5173\u20135188","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"16939_CR36","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11042-011-0737-x","volume":"57","author":"J-M Oh","year":"2012","unstructured":"Oh J-M, Moon N (2012) User-selectable interactive recommendation system in mobile environment. Multimed Tools Appl 57(2):295\u2013313","journal-title":"Multimed Tools Appl"},{"key":"16939_CR37","doi-asserted-by":"crossref","unstructured":"Shi Y, Cao J, Xiong C, Zhang X (2018) \u201cA Prediction Method of Mobile User Preference Based on the Influence between Users\u201d. Int J Digit Multimed Broadcast 2018","DOI":"10.1155\/2018\/8081409"},{"issue":"18","key":"16939_CR38","first-page":"1178","volume":"2","author":"A Landin","year":"2018","unstructured":"Landin A, Su\u00e1rez-Garc\u00eda E, Valcarce D (2018) When Diversity Met Accuracy: A Story of Recommender Systems. Multidiscip Digit Publ Inst Proc 2(18):1178","journal-title":"Multidiscip Digit Publ Inst Proc"},{"issue":"4","key":"16939_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1944339.1944341","volume":"10","author":"N Hurley","year":"2011","unstructured":"Hurley N, Zhang M (2011) Novelty and diversity in top-n recommendation\u2013analysis and evaluation. ACM Trans Internet Technol 10(4):1\u201330","journal-title":"ACM Trans Internet Technol"},{"issue":"1","key":"16939_CR40","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.eng.2018.02.005","volume":"4","author":"C Wang","year":"2018","unstructured":"Wang C, Zheng Y, Jiang J, Ren K (2018) Toward Privacy-Preserving Personalized Recommendation Services. Engineering 4(1):21\u201328","journal-title":"Engineering"},{"key":"16939_CR41","unstructured":"Olejnik L, Novak J (2018) Self-review questionnaire: security and privacy. Online available at:  https:\/\/w3ctag.github.io\/security-questionnaire\/, 2015"},{"issue":"4","key":"16939_CR42","doi-asserted-by":"publisher","first-page":"640","DOI":"10.3126\/nje.v6i4.17258","volume":"6","author":"PR Regmi","year":"2016","unstructured":"Regmi PR, Waithaka E, Paudyal A, Simkhada P, Van Teijlingen E (2016) Guide to the design and application of online questionnaire surveys. Nepal J Epidemiol 6(4):640","journal-title":"Nepal J Epidemiol"},{"key":"16939_CR43","doi-asserted-by":"crossref","unstructured":"Van Selm, Martine e Jankowski, Nicholas W (2006) Conducting online surveys in quality and quantity 40:435\u2013456","DOI":"10.1007\/s11135-005-8081-8"},{"key":"16939_CR44","unstructured":"Choi J, Lee HJ, Kim H-W (2017) \u201cExamining the effects of personalized app recommendation systems on purchase intention: a self and social interaction perspective\u201d. J Electron Commer Res 18(1)"},{"issue":"4","key":"16939_CR45","doi-asserted-by":"publisher","first-page":"5399","DOI":"10.1007\/s11042-016-3966-1","volume":"76","author":"SE Chang","year":"2017","unstructured":"Chang SE, Shen W-C, Yeh C-H (2017) A comparative study of user intention to recommend content on mobile social networks. Multimed Tools Appl 76(4):5399\u20135417","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"16939_CR46","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","volume":"31","author":"JF Hair","year":"2019","unstructured":"Hair JF, Risher JJ, Sarstedt M, Ringle CM (2019) When to use and how to report the results of PLS-SEM. Eur Bus Rev 31(1):2\u201324","journal-title":"Eur Bus Rev"},{"key":"16939_CR47","doi-asserted-by":"crossref","unstructured":"Low MP, Cham T-H, Chang Y-S, Lim X-J (2021) Advancing on weighted PLS-SEM in examining the trust-based recommendation system in pioneering product promotion effectiveness. Qual Quant pp 1\u201330","DOI":"10.1007\/s11135-021-01147-1"},{"issue":"9","key":"16939_CR48","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.3390\/ijerph16091495","volume":"16","author":"D Gu","year":"2019","unstructured":"Gu D et al (2019) Social media-based health management systems and sustained health engagement: TPB perspective. Int J Environ Res Public Health 16(9):1495","journal-title":"Int J Environ Res Public Health"},{"key":"16939_CR49","doi-asserted-by":"crossref","unstructured":"Xiao X, Tao Y (2006) Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp 229\u2013240","DOI":"10.1145\/1142473.1142500"},{"issue":"1","key":"16939_CR50","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1186\/s40537-019-0211-6","volume":"6","author":"IH Sarker","year":"2019","unstructured":"Sarker IH, Colman A, Han J (2019) RecencyMiner: mining recency-based personalized behavior from contextual smartphone data. J Big Data 6(1):49","journal-title":"J Big Data"},{"key":"16939_CR51","doi-asserted-by":"crossref","unstructured":"McSherry F, Mironov I (2009) \u201cDifferentially private recommender systems: Building privacy into the netflix prize contenders\u201d. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 627\u2013636","DOI":"10.1145\/1557019.1557090"},{"issue":"5","key":"16939_CR52","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s13042-017-0762-9","volume":"10","author":"T Silveira","year":"2019","unstructured":"Silveira T, Zhang M, Lin X, Liu Y, Ma S (2019) How good your recommender system is? A survey on evaluations in recommendation. Int J Mach Learn Cybern 10(5):813\u2013831","journal-title":"Int J Mach Learn Cybern"},{"key":"16939_CR53","unstructured":"Nayebzadeh M, Moazzam A, Saba AM Abdolrahimpour H, Shahab E (2017) \u201cAn investigation on social network recommender systems and collaborative filtering techniques,\u201d arXiv Prepr. arXiv1708.00417"},{"key":"16939_CR54","doi-asserted-by":"crossref","unstructured":"Beg S, Anjum A, Ahmed M, Malik SUR, Malik H, Sharma N, Waqar O (2021) \u201cDynamic parameters based reversible data transform (RDT) algorithm in recommendation system.\u201d IEEE Access: Access-2021\u201307976","DOI":"10.1109\/ACCESS.2021.3101150"},{"key":"16939_CR55","doi-asserted-by":"publisher","unstructured":"Peng M, Cao B, Chen J, Liu J, Hu R (2021) MR-FI: Mobile Application Recommendation Based on Feature Importance and Bilinear Feature Interaction. In: Gao, H., Wang, X. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 406. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-92635-9_13","DOI":"10.1007\/978-3-030-92635-9_13"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16939-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16939-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16939-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T09:09:23Z","timestamp":1717405763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16939-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,19]]},"references-count":55,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["16939"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16939-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,12,19]]},"assertion":[{"value":"9 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}