{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T01:37:07Z","timestamp":1767836227896,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20077-2","type":"journal-article","created":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T03:40:31Z","timestamp":1724470831000},"page":"22949-22969","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel methodological approach for learning cybersecurity topics in primary schools"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9859-5051","authenticated-orcid":false,"given":"Maja","family":"Videnovik","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0034-2855","authenticated-orcid":false,"given":"Sonja","family":"Filiposka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8103-8059","authenticated-orcid":false,"given":"Vladimir","family":"Trajkovik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"20077_CR1","doi-asserted-by":"publisher","unstructured":"Rowe DC, Lunt BM, Ekstrom JJ (2011) The role of cyber-security in information technology education. In\u00a0Proceedings of the 2011 conference on Information technology education 113\u2013122. https:\/\/doi.org\/10.1145\/2047594.2047628","DOI":"10.1145\/2047594.2047628"},{"issue":"3","key":"20077_CR2","doi-asserted-by":"publisher","first-page":"3011","DOI":"10.1007\/s10639-021-10704-y","volume":"27","author":"BJ Bla\u017ei\u010d","year":"2022","unstructured":"Bla\u017ei\u010d BJ (2022) Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills? Educ Inf Technol 27(3):3011\u20133036. https:\/\/doi.org\/10.1007\/s10639-021-10704-y","journal-title":"Educ Inf Technol"},{"issue":"4","key":"20077_CR3","first-page":"44","volume":"7","author":"RL Suson","year":"2019","unstructured":"Suson RL (2019) Appropriating digital citizenship in the context of basic education. Int J Educ, Learn Dev 7(4):44\u201366","journal-title":"Int J Educ, Learn Dev"},{"issue":"2","key":"20077_CR4","first-page":"23","volume":"27","author":"MD Richardson","year":"2020","unstructured":"Richardson MD, Lemoine PA, Stephens WE, Waller RE (2020) Planning for cyber security in schools: The Human Factor. Educ Plan 27(2):23\u201339","journal-title":"Educ Plan"},{"issue":"1","key":"20077_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.30958\/aje.8-1-3","volume":"8","author":"A Kaban","year":"2021","unstructured":"Kaban A (2021) Secure internet use in information technologies and software course textbooks at primary and secondary schools. Athens J Educ 8(1):37\u201352. https:\/\/doi.org\/10.30958\/aje.8-1-3","journal-title":"Athens J Educ"},{"issue":"4","key":"20077_CR6","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1080\/07380569.2019.1674621","volume":"36","author":"F Martin","year":"2019","unstructured":"Martin F, Gezer T, Wang C (2019) Educators\u2019 perceptions of student digital citizenship practices. Comput Sch 36(4):238\u2013254. https:\/\/doi.org\/10.1080\/07380569.2019.1674621","journal-title":"Comput Sch"},{"issue":"1","key":"20077_CR7","first-page":"157","volume":"17","author":"G Javidi","year":"2019","unstructured":"Javidi G, Sheybani E (2019) Transforming cybersecurity education through consulting. Systemics, Cybernetics and Informatics 17(1):157\u2013168","journal-title":"Systemics, Cybernetics and Informatics"},{"key":"20077_CR8","doi-asserted-by":"publisher","unstructured":"Rahman N, Sairi I, Zizi NAM, Khalid F (2020) The importance of cybersecurity education in school. International J Inf Educ Technol 10(5):378\u2013382. https:\/\/doi.org\/10.18178\/ijiet.2020.10.5.1393","DOI":"10.18178\/ijiet.2020.10.5.1393"},{"key":"20077_CR9","doi-asserted-by":"publisher","unstructured":"Aldawood H, Skinner G (2019) Reviewing cyber security social engineering training and awareness programs\u2014pitfalls and ongoing issues. Future Internet, 11(3) Article 3. https:\/\/doi.org\/10.3390\/fi11030073","DOI":"10.3390\/fi11030073"},{"issue":"2","key":"20077_CR10","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSEC.2020.2969409","volume":"18","author":"D Pencheva","year":"2020","unstructured":"Pencheva D, Hallett J, Rashid A (2020) Bringing cyber to school: Integrating cybersecurity into secondary school education. IEEE Secur Priv 18(2):68\u201374. https:\/\/doi.org\/10.1109\/MSEC.2020.2969409","journal-title":"IEEE Secur Priv"},{"key":"20077_CR11","doi-asserted-by":"publisher","first-page":"029","DOI":"10.28945\/4200","volume":"18","author":"HJ Kam","year":"2019","unstructured":"Kam HJ, Katerattanakul P (2019) Enhancing student learning in cybersecurity education using an out-of-class learning approach. J Inf Technol Educ: Innov Prac 18:029\u2013047. https:\/\/doi.org\/10.28945\/4200","journal-title":"J Inf Technol Educ: Innov Prac"},{"key":"20077_CR12","doi-asserted-by":"crossref","unstructured":"Muir K, Joinson A (2020) An exploratory study into the negotiation of cyber-security within the family home. Front Psychol 11. https:\/\/www.frontiersin.org\/articles\/10.3389\/fpsyg.2020.00424","DOI":"10.3389\/fpsyg.2020.00424"},{"key":"20077_CR13","doi-asserted-by":"publisher","unstructured":"Sa\u011flam RB, Miller V, Franqueira VNL (2023) A systematic literature review on cyber security education for children. IEEE Trans Educ 1\u201313. https:\/\/doi.org\/10.1109\/TE.2022.3231019","DOI":"10.1109\/TE.2022.3231019"},{"key":"20077_CR14","doi-asserted-by":"publisher","unstructured":"Hafeez M (2021) Effects of game-based learning in comparison of traditional learning to provide effective learning environment- a comparative review. Int J Social Sci Educ Studies 8(4). https:\/\/doi.org\/10.23918\/ijsses.v8i4p100","DOI":"10.23918\/ijsses.v8i4p100"},{"key":"20077_CR15","doi-asserted-by":"publisher","unstructured":"Vank\u00fa\u0161 P (2021) Influence of game-based learning in mathematics education on students\u2019 affective domain: a systematic review. Mathematics 9(9) Article 9. https:\/\/doi.org\/10.3390\/math9090986","DOI":"10.3390\/math9090986"},{"issue":"3","key":"20077_CR16","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1017\/S0958344019000028","volume":"31","author":"SM Lee","year":"2019","unstructured":"Lee SM (2019) Her story or their own stories? Digital game-based learning, student creativity, and creative writing. ReCALL 31(3):238\u2013254. https:\/\/doi.org\/10.1017\/S0958344019000028","journal-title":"ReCALL"},{"issue":"1","key":"20077_CR17","doi-asserted-by":"publisher","first-page":"42","DOI":"10.4018\/IJGBL.2019010104","volume":"9","author":"A Cardinot","year":"2019","unstructured":"Cardinot A, Fairfield JA (2019) Game-based learning to engage students with physics and astronomy using a board game. Int J Game-Based Learn 9(1):42\u201357. https:\/\/doi.org\/10.4018\/IJGBL.2019010104","journal-title":"Int J Game-Based Learn"},{"key":"20077_CR18","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1016\/j.procs.2021.01.078","volume":"179","author":"GP Kusuma","year":"2021","unstructured":"Kusuma GP, Putera Suryapranata LK, Wigati EK, Utomo Y (2021) Enhancing historical learning using role-playing game on mobile platform. Procedia Comp Sci 179:886\u2013893. https:\/\/doi.org\/10.1016\/j.procs.2021.01.078","journal-title":"Procedia Comp Sci"},{"key":"20077_CR19","doi-asserted-by":"publisher","unstructured":"Marengo A, Pagano A, Soomro KA (2024) Serious games to assess university students\u2019 soft skills: investigating the effectiveness of a gamified assessment prototype.\u00a0Interact Learn Environ 1\u201317. https:\/\/doi.org\/10.1080\/10494820.2023.2253849","DOI":"10.1080\/10494820.2023.2253849"},{"key":"20077_CR20","doi-asserted-by":"publisher","first-page":"101827","DOI":"10.1016\/j.cose.2020.101827","volume":"95","author":"S Hart","year":"2020","unstructured":"Hart S, Margheri A, Paci F, Sassone V (2020) Riskio: a serious game for cyber security awareness and education. Comput Secur 95:101827. https:\/\/doi.org\/10.1016\/j.cose.2020.101827","journal-title":"Comput Secur"},{"key":"20077_CR21","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.compedu.2012.11.019","volume":"63","author":"HY Sung","year":"2013","unstructured":"Sung HY, Hwang G-J (2013) A collaborative game-based learning approach to improving students\u2019 learning performance in science courses. Comput Educ 63:43\u201351. https:\/\/doi.org\/10.1016\/j.compedu.2012.11.019","journal-title":"Comput Educ"},{"key":"20077_CR22","doi-asserted-by":"publisher","unstructured":"Videnovik M, Vold T, Ki\u00f8nig L, Trajkovik V (2019) Design thinking methodology for increasing quality of experience of augmented reality educational games. In 18th International Conference on Information Technology Based Higher Education and Training (ITHET) 1\u20139. IEEE. https:\/\/doi.org\/10.1109\/ITHET46829.2019.8937385","DOI":"10.1109\/ITHET46829.2019.8937385"},{"key":"20077_CR23","unstructured":"S\u00e1nchez-Mena A, Mart\u00ed-Parre\u00f1o J (2017) Teachers\u00b4 acceptance of educational video games: a comprehensive literature review. J E-Learn Knowl Soc 13(2). https:\/\/www.learntechlib.org\/p\/188115\/"},{"issue":"2","key":"20077_CR24","first-page":"164","volume":"21","author":"CH Chen","year":"2018","unstructured":"Chen CH, Liu JH, Shou WC (2018) How competition in a game-based science learning environment influences students\u2019 learning achievement, flow experience, and learning behavioral patterns. Educ Technol Soc 21(2):164\u2013176","journal-title":"Educ Technol Soc"},{"issue":"3","key":"20077_CR25","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TE.2020.3044174","volume":"64","author":"D Zhao","year":"2021","unstructured":"Zhao D, Muntean CH, Chis AE, Muntean G-M (2021) Learner attitude, educational background, and gender influence on knowledge gain in a serious games-enhanced programming course. IEEE Trans Educ 64(3):308\u2013316. https:\/\/doi.org\/10.1109\/TE.2020.3044174","journal-title":"IEEE Trans Educ"},{"key":"20077_CR26","doi-asserted-by":"publisher","unstructured":"Leune K, Petrilli SJ (2017) Using Capture-the-Flag to enhance the effectiveness of cybersecurity education. In Proceedings of the 18th Annual Conference on Information Technology Education 47\u201352. https:\/\/doi.org\/10.1145\/3125659.3125686","DOI":"10.1145\/3125659.3125686"},{"key":"20077_CR27","unstructured":"Olano M, Sherman A, Oliva L, Cox R, Firestone D, Kubik O, Patil M, Seymour J, Thomas D (2014) SecurityEmpire: Development and evaluation of a digital game to promote cybersecurity education. USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)"},{"key":"20077_CR28","doi-asserted-by":"publisher","unstructured":"Chowdhury N, Gkioulos V (2023) A personalized learning theory-based cyber-security training exercise.\u00a0Int J Inf Secur 1\u201316. https:\/\/doi.org\/10.1007\/s10207-023-00704-z","DOI":"10.1007\/s10207-023-00704-z"},{"key":"20077_CR29","doi-asserted-by":"publisher","unstructured":"Khan MA, Merabet A, Alkaabi S, Sayed HE (2022) Game-based learning platform to enhance cybersecurity education.\u00a0Educ Inf Technol 1\u201325. https:\/\/doi.org\/10.1007\/s10639-021-10807-6","DOI":"10.1007\/s10639-021-10807-6"},{"key":"20077_CR30","doi-asserted-by":"publisher","unstructured":"Triplett WJ (2023) Addressing cybersecurity challenges in education.\u00a0Int J STEM Educ Sustain\u00a03(1):47\u201367. https:\/\/doi.org\/10.52889\/ijses.v3i1.132","DOI":"10.52889\/ijses.v3i1.132"},{"key":"20077_CR31","doi-asserted-by":"publisher","first-page":"96309","DOI":"10.1109\/ACCESS.2019.2929089","volume":"7","author":"MH Hussein","year":"2019","unstructured":"Hussein MH, Ow SH, Cheong LS, Thong M-K (2019) A digital game-based learning method to improve students\u2019 critical thinking skills in elementary science. IEEE Access 7:96309\u201396318. https:\/\/doi.org\/10.1109\/ACCESS.2019.2929089","journal-title":"IEEE Access"},{"key":"20077_CR32","doi-asserted-by":"publisher","unstructured":"Ke F, Shute V, Clark KM, Erlebacher G (2019) Interdisciplinary design of game-based learning platforms: a phenomenological examination of the integrative design of game, learning, and assessment. Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-04339-1","DOI":"10.1007\/978-3-030-04339-1"},{"key":"20077_CR33","doi-asserted-by":"publisher","unstructured":"Vlahu-Gjorgievska E, Videnovik M, Trajkovik V (2018) Computational thinking and coding subject in primary schools: Methodological approach based on alternative cooperative and individual learning cycles. In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 77\u201383. https:\/\/doi.org\/10.1109\/TALE.2018.8615334","DOI":"10.1109\/TALE.2018.8615334"},{"issue":"3","key":"20077_CR34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1080\/15228053.2021.1980848","volume":"23","author":"S Chandra","year":"2021","unstructured":"Chandra S, Palvia S (2021) Online education next wave: Peer to peer learning. J Inf Technol Case Appl Res 23(3):157\u2013172. https:\/\/doi.org\/10.1080\/15228053.2021.1980848","journal-title":"J Inf Technol Case Appl Res"},{"issue":"3","key":"20077_CR35","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/BF00138870","volume":"32","author":"KJ Topping","year":"1996","unstructured":"Topping KJ (1996) The effectiveness of peer tutoring in further and higher education: a typology and review of the literature. High Educ 32(3):321\u2013345. https:\/\/doi.org\/10.1007\/BF00138870","journal-title":"High Educ"},{"key":"20077_CR36","doi-asserted-by":"crossref","unstructured":"Lim C, Jalil HA, Ma\u2019rof A, Saad W (2020) Peer learning, self-regulated learning and academic achievement in blended learning courses: a structural equation modeling approach. Int J Emerg Technol Learn (IJET) 15(3):110\u2013125. https:\/\/www.learntechlib.org\/p\/217022\/","DOI":"10.3991\/ijet.v15i03.12031"},{"issue":"3","key":"20077_CR37","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1080\/07294360.2021.1877625","volume":"41","author":"S Gamlath","year":"2022","unstructured":"Gamlath S (2022) Peer learning and the undergraduate journey: A framework for student success. High Educ Res Dev 41(3):699\u2013713. https:\/\/doi.org\/10.1080\/07294360.2021.1877625","journal-title":"High Educ Res Dev"},{"issue":"1","key":"20077_CR38","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s41239-016-0017-y","volume":"13","author":"G Ion","year":"2016","unstructured":"Ion G, Barrera-Corominas A, Tom\u00e0s-Folch M (2016) Written peer-feedback to enhance students\u2019 current and future learning. Int J Educ Technol High Educ 13(1):15. https:\/\/doi.org\/10.1186\/s41239-016-0017-y","journal-title":"Int J Educ Technol High Educ"},{"key":"20077_CR39","doi-asserted-by":"publisher","unstructured":"Deshpande P, Lee CB, Ahmed I (2019) Evaluation of peer instruction for cybersecurity education. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education 720\u2013725. https:\/\/doi.org\/10.1145\/3287324.3287403","DOI":"10.1145\/3287324.3287403"},{"issue":"1","key":"20077_CR40","first-page":"6","volume":"2018","author":"A Konak","year":"2018","unstructured":"Konak A (2018) Experiential learning builds cybersecurity self-efficacy in K-12 students. J Cybersecurity Educ, Res Pract 2018(1):6","journal-title":"J Cybersecurity Educ, Res Pract"},{"key":"20077_CR41","doi-asserted-by":"publisher","unstructured":"Scheider B, Asprion PM (2023) Peer instruction as teaching method in cybersecurity and data privacy.\u00a0Int J Manag Knowl Learn\u00a012. https:\/\/doi.org\/10.53615\/2232-5697.12.1-7","DOI":"10.53615\/2232-5697.12.1-7"},{"key":"20077_CR42","doi-asserted-by":"crossref","unstructured":"Nerantzi C (2020) The use of peer instruction and flipped learning to support flexible blended learning during and after the COVID-19 pandemic. Int J Manag Appl Res 7(2):184\u2013195. https:\/\/www.ceeol.com\/search\/article-detail?id=883236","DOI":"10.18646\/2056.72.20-013"},{"issue":"3","key":"20077_CR43","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.iheduc.2008.06.005","volume":"11","author":"Y Xiao","year":"2008","unstructured":"Xiao Y, Lucking R (2008) The impact of two types of peer assessment on students\u2019 performance and satisfaction within a Wiki environment. Internet Higher Educ 11(3):186\u2013193. https:\/\/doi.org\/10.1016\/j.iheduc.2008.06.005","journal-title":"Internet Higher Educ"},{"key":"20077_CR44","doi-asserted-by":"publisher","first-page":"103169","DOI":"10.1016\/j.nepr.2021.103169","volume":"55","author":"E \u00c4del","year":"2021","unstructured":"\u00c4del E, L\u00f6fmark A, P\u00e5lsson Y, M\u00e5rtensson G, Engstr\u00f6m M, Lindberg M (2021) Health-promoting and -impeding aspects of using peer-learning during clinical practice education: A qualitative study. Nurse Educ Pract 55:103169. https:\/\/doi.org\/10.1016\/j.nepr.2021.103169","journal-title":"Nurse Educ Pract"},{"key":"20077_CR45","doi-asserted-by":"publisher","unstructured":"Balakrishna C (2021) Design considerations for developing a game-based learning resource for cyber security education. In Proceedings of the European Conference on Games-based Learning 80\u201389. https:\/\/doi.org\/10.34190\/ecgbl.16.1.804","DOI":"10.34190\/ecgbl.16.1.804"},{"key":"20077_CR46","doi-asserted-by":"publisher","first-page":"104536","DOI":"10.1016\/j.compedu.2022.104536","volume":"186","author":"JWA Witsenboer","year":"2022","unstructured":"Witsenboer JWA, Sijtsma K, Scheele F (2022) Measuring cyber secure behavior of elementary and high school students in the Netherlands. Comput Educ 186:104536. https:\/\/doi.org\/10.1016\/j.compedu.2022.104536","journal-title":"Comput Educ"},{"issue":"1","key":"20077_CR47","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2016.12","volume":"14","author":"L Amo","year":"2016","unstructured":"Amo L (2016) Addressing gender gaps in teens\u2019 cybersecurity engagement and self-efficacy. IEEE Secur Priv 14(1):72\u201375. https:\/\/doi.org\/10.1109\/MSP.2016.12","journal-title":"IEEE Secur Priv"},{"issue":"1","key":"20077_CR48","doi-asserted-by":"publisher","first-page":"012098","DOI":"10.1088\/1742-6596\/1339\/1\/012098","volume":"1339","author":"FB Fatokun","year":"2019","unstructured":"Fatokun FB, Hamid S, Norman A, Fatokun JO (2019) The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an empirical investigation on Malaysian Universities. J Phys: Conf Ser 1339(1):012098. https:\/\/doi.org\/10.1088\/1742-6596\/1339\/1\/012098","journal-title":"J Phys: Conf Ser"},{"key":"20077_CR49","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","volume":"69","author":"A McCormac","year":"2017","unstructured":"McCormac A, Zwaans T, Parsons K, Calic D, Butavicius M, Pattinson M (2017) Individual differences and information security awareness. Comput Hum Behav 69:151\u2013156. https:\/\/doi.org\/10.1016\/j.chb.2016.11.065","journal-title":"Comput Hum Behav"},{"key":"20077_CR50","doi-asserted-by":"publisher","first-page":"106791","DOI":"10.1016\/j.chb.2021.106791","volume":"121","author":"Z Yan","year":"2021","unstructured":"Yan Z, Xue Y, Lou Y (2021) Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers. Comput Hum Behav 121:106791. https:\/\/doi.org\/10.1016\/j.chb.2021.106791","journal-title":"Comput Hum Behav"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20077-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20077-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20077-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T11:23:07Z","timestamp":1751455387000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20077-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":50,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["20077"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20077-2","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"4 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards and laws of the North Macedonia. Informed consent was obtained from all individual participants included in the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethic statement"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}