{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:51:42Z","timestamp":1761965502782,"version":"build-2065373602"},"reference-count":95,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Operational Programme Integrated Infrastructure for the project: Research in the SANET network and possibilities of its further use and development","award":["ITMS code: 313011W988"],"award-info":[{"award-number":["ITMS code: 313011W988"]}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cultural and Educational Grant Agency of Slovak Republic","award":["KG 014STU-4\/2024"],"award-info":[{"award-number":["KG 014STU-4\/2024"]}]},{"DOI":"10.13039\/501100005357","name":"Slovak Research and Development Agency","doi-asserted-by":"crossref","award":["APVV-23-0408"],"award-info":[{"award-number":["APVV-23-0408"]}],"id":[{"id":"10.13039\/501100005357","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Slovak Technical University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>With widespread use of online forms and questionnaires, detection of the user\u2019s intent to lie has become increasingly important. In-lab studies have shown that mouse dynamics-information on how the user operates a mouse-can be valuable for automatically and unobtrusively distinguishing between faking and honest intent in personality questionnaires. However, data variability in the wild (e.g., mouse configurations, screen resolutions) could present a barrier for mouse dynamics in naturalistic conditions. Our aim is to design a data-driven faking good detection method operable under naturalistic conditions and evaluate its reliability. We conducted a between-subjects uncontrolled experiment where users\u2019 mouse dynamics data was obtained with the BFI-2 personality questionnaire, yielding a sample of 5344 items from 112 participants. The proposed user model characterizes participants\u2019 mouse dynamics, serving as input for prediction. Varied machine learning classification models were trained and evaluated to determine the best approach and feature set. XGBoost with LASSO feature selection achieved the highest F1-score of 86.92%, outperforming in a real-world web form and conditions the results achieved by related works utilizing specialized questions in laboratory conditions. Faking good prediction that leverages our user model can therefore be viable for online questionnaires in the wild.<\/jats:p>","DOI":"10.1007\/s11042-025-20852-9","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T07:57:42Z","timestamp":1745827062000},"page":"43395-43431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["User modeling for detecting faking-good intent in online personality questionnaires in the wild based on mouse dynamics"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7371-5512","authenticated-orcid":false,"given":"Eduard","family":"Kuric","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4111-1052","authenticated-orcid":false,"given":"Peter","family":"Demcak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9227-1542","authenticated-orcid":false,"given":"Peter","family":"Smrecek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8132-6755","authenticated-orcid":false,"given":"Beata","family":"Spilakova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"issue":"3","key":"20852_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"AAE Ahmed","year":"2007","unstructured":"Ahmed AAE, Traore I (2007) A new biometric technology based on mouse dynamics. IEEE Trans Dependable Secure Comput 4(3):165\u2013179. https:\/\/doi.org\/10.1109\/TDSC.2007.70207","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"20852_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1111\/ajpy.12202","volume":"71","author":"J Anglim","year":"2019","unstructured":"Anglim J, O\u2019connor P (2019) Measurement and research using the Big Five, HEXACO, and narrow traits: a primer for researchers and practitioners. Aust J Psychol 71(1):16\u201325. https:\/\/doi.org\/10.1111\/ajpy.12202","journal-title":"Aust J Psychol"},{"key":"20852_CR3","doi-asserted-by":"publisher","unstructured":"Arapakis I, Leiva LA (2016) Predicting user engagement with direct displays using mouse cursor information. In: Proceedings of the 39th international ACM SIGIR conference on research and development in information retrieval. Association for Computing Machinery, New York, NY, USA, SIGIR \u201916, pp 599\u2013608. https:\/\/doi.org\/10.1145\/2911451.2911505","DOI":"10.1145\/2911451.2911505"},{"issue":"1","key":"20852_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1037\/1040-3590.14.1.16","volume":"14","author":"RA Baer","year":"2022","unstructured":"Baer RA, Miller J (2022) Underreporting of psychopathology on the mmpi-2: A meta-analytic review. Psychol Assess 14(1):16\u201326. https:\/\/doi.org\/10.1037\/1040-3590.14.1.16","journal-title":"Psychol Assess"},{"issue":"5","key":"20852_CR5","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1016\/j.ipm.2019.03.005","volume":"56","author":"A Barr\u00f3n-Cede\u00f1o","year":"2019","unstructured":"Barr\u00f3n-Cede\u00f1o A, Jaradat I, Da San Martino G et al (2019) Proppy: organizing the news based on their propagandistic content. Inf Process Manag 56(5):1849\u20131864. https:\/\/doi.org\/10.1016\/j.ipm.2019.03.005","journal-title":"Inf Process Manag"},{"issue":"8","key":"20852_CR6","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1080\/09658211.2021.1960380","volume":"29","author":"F Battista","year":"2021","unstructured":"Battista F, Mangiulli I, Riesthuis P et al (2021) Do liars really remember what they lied upon? The impact of fabrication on memory. Memory 29(8):1076\u20131090. https:\/\/doi.org\/10.1080\/09658211.2021.1960380","journal-title":"Memory"},{"issue":"9","key":"20852_CR7","doi-asserted-by":"publisher","first-page":"5826","DOI":"10.1109\/TPAMI.2021.3067464","volume":"44","author":"X Ben","year":"2022","unstructured":"Ben X, Ren Y, Zhang J et al (2022) Video-based facial micro-expression analysis: a survey of datasets, features and algorithms. IEEE Trans Pattern Anal Mach Intell 44(9):5826\u20135846. https:\/\/doi.org\/10.1109\/TPAMI.2021.3067464","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"20852_CR8","doi-asserted-by":"publisher","unstructured":"Brusilovsky P, Kobsa A, Nejdl W (2007) The adaptive web: methods and strategies of web personalization. Springer, Berlin Heidelberg, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-72079-9_1","DOI":"10.1007\/978-3-540-72079-9_1"},{"issue":"6","key":"20852_CR9","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1177\/0020764008090843","volume":"54","author":"A Bunevicius","year":"2008","unstructured":"Bunevicius A, Katkute A, Bunevicius R (2008) Symptoms of anxiety and depression in medical students and in humanities students: relationship with Big-Five personality dimensions and vulnerability to stress. Int J Soc Psychiatry 54(6):494\u2013501. https:\/\/doi.org\/10.1177\/0020764008090843","journal-title":"Int J Soc Psychiatry"},{"key":"20852_CR10","doi-asserted-by":"publisher","unstructured":"Burla F, Mazza C, Cosmo C et\u00a0al (2019) Use of the parents preference test in child custody evaluations: preliminary development of conforming parenting index. Mediterran J Clinic Psychol 7(3). https:\/\/doi.org\/10.6092\/2282-1619\/2019.7.2213","DOI":"10.6092\/2282-1619\/2019.7.2213"},{"issue":"2","key":"20852_CR11","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1111\/ijsa.12279","volume":"28","author":"P Calanna","year":"2020","unstructured":"Calanna P, Lauriola M, Saggino A et al (2020) Using a supervised machine learning algorithm for detecting faking good in a personality self-report. Int J Sel Assess 28(2):176\u2013185. https:\/\/doi.org\/10.1111\/ijsa.12279","journal-title":"Int J Sel Assess"},{"key":"20852_CR12","doi-asserted-by":"publisher","first-page":"123684","DOI":"10.1016\/j.eswa.2024.123684","volume":"249","author":"MK Camara","year":"2024","unstructured":"Camara MK, Postal A, Maul TH et al (2024) Can lies be faked? Comparing low-stakes and high-stakes deception video datasets from a Machine Learning perspective. Expert Syst Appl 249:123684. https:\/\/doi.org\/10.1016\/j.eswa.2024.123684","journal-title":"Expert Syst Appl"},{"key":"20852_CR13","doi-asserted-by":"crossref","unstructured":"Carson TL (2009) Lying, deception, and related concepts. The philosophy of deception 153\u201387","DOI":"10.1093\/acprof:oso\/9780195327939.003.0010"},{"key":"20852_CR14","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.jvlc.2015.10.022","volume":"31","author":"L Caruccio","year":"2015","unstructured":"Caruccio L, Deufemia V, Polese G (2015) Understanding user intent on the web through interaction mining. J Vis Lang Comput 31:230\u2013236. https:\/\/doi.org\/10.1016\/j.jvlc.2015.10.022","journal-title":"J Vis Lang Comput"},{"key":"20852_CR15","first-page":"93","volume":"2018","author":"F Celli","year":"2018","unstructured":"Celli F, Lepri B (2018) Is big five better than MBTI? A personality computing challenge using Twitter data. Comput Ling CLiC-it 2018:93","journal-title":"Comput Ling CLiC-it"},{"key":"20852_CR16","doi-asserted-by":"publisher","first-page":"77659","DOI":"10.1109\/ACCESS.2019.2916996","volume":"7","author":"C Cepeda","year":"2019","unstructured":"Cepeda C, Tonet R, Osorio DN et al (2019) Latent: A flexible data collection tool to research human behavior in the context of web navigation. IEEE Access 7:77659\u201377673. https:\/\/doi.org\/10.1109\/ACCESS.2019.2916996","journal-title":"IEEE Access"},{"issue":"9","key":"20852_CR17","doi-asserted-by":"publisher","first-page":"13073","DOI":"10.1007\/s11042-021-11148-9","volume":"82","author":"S Chebbi","year":"2023","unstructured":"Chebbi S, Jebara SB (2023) Deception detection using multimodal fusion approaches. Multimed Tools Appl 82(9):13073\u201313102. https:\/\/doi.org\/10.1007\/s11042-021-11148-9","journal-title":"Multimed Tools Appl"},{"key":"20852_CR18","doi-asserted-by":"publisher","unstructured":"Chud\u00e1 D, Kr\u00e1tky P (2014) Usage of computer mouse characteristics for identification in web browsing. In: Proceedings of the 15th international conference on computer systems and technologies. Association for Computing Machinery, New York, NY, USA, CompSysTech \u201914, pp 218\u2013225. https:\/\/doi.org\/10.1145\/2659532.2659645","DOI":"10.1145\/2659532.2659645"},{"key":"20852_CR19","doi-asserted-by":"publisher","first-page":"103849","DOI":"10.1016\/j.jrp.2019.103849","volume":"82","author":"PG Curran","year":"2019","unstructured":"Curran PG, Hauser KA (2019) I\u2019m paid biweekly, just not by leprechauns: evaluating valid-but-incorrect response rates to attention check items. J Res Pers 82:103849. https:\/\/doi.org\/10.1016\/j.jrp.2019.103849","journal-title":"J Res Pers"},{"issue":"2","key":"20852_CR20","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10844-018-0542-3","volume":"54","author":"S Dara","year":"2020","unstructured":"Dara S, Chowdary CR, Kumar C (2020) A survey on group recommender systems. J Intell Inf Syst 54(2):271\u2013295. https:\/\/doi.org\/10.1007\/s10844-018-0542-3","journal-title":"J Intell Inf Syst"},{"key":"20852_CR21","doi-asserted-by":"publisher","unstructured":"DeYoung CG (2015) Cybernetic Big Five theory. J Res Pers 56:33\u201358. https:\/\/doi.org\/10.1016\/j.jrp.2014.07.004. integrative Theories of Personality","DOI":"10.1016\/j.jrp.2014.07.004"},{"issue":"1","key":"20852_CR22","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10902-021-00390-5","volume":"23","author":"LR Diaconu-Gherasim","year":"2022","unstructured":"Diaconu-Gherasim LR, Mardari CR (2022) Personality traits and time perspectives: implications for adolescents\u2019 mental health and mental illness. J Happiness Stud 23(1):101\u2013124. https:\/\/doi.org\/10.1007\/s10902-021-00390-5","journal-title":"J Happiness Stud"},{"issue":"1","key":"20852_CR23","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1146\/annurev.ps.41.020190.002221","volume":"41","author":"JM Digman","year":"1990","unstructured":"Digman JM (1990) Personality structure: emergence of the five-factor model. Annu Rev Psychol 41(1):417\u2013440. https:\/\/doi.org\/10.1146\/annurev.ps.41.020190.002221","journal-title":"Annu Rev Psychol"},{"issue":"3","key":"20852_CR24","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1037\/a0012897","volume":"23","author":"MB Donnellan","year":"2008","unstructured":"Donnellan MB, Lucas RE (2008) Age differences in the Big Five across the life span: evidence from two national samples. Psychol Aging 23(3):558\u2013566. https:\/\/doi.org\/10.1037\/a0012897","journal-title":"Psychol Aging"},{"issue":"1","key":"20852_CR25","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1207\/S15327043HUP1601_4","volume":"16","author":"JJ Donovan","year":"2003","unstructured":"Donovan JJ, Dwight SA, Hurtz GM (2003) An assessment of the prevalence, severity, and verifiability of entry-level applicant faking using the randomized response technique. Hum Perform 16(1):81\u2013106. https:\/\/doi.org\/10.1207\/S15327043HUP1601_4","journal-title":"Hum Perform"},{"issue":"4","key":"20852_CR26","doi-asserted-by":"publisher","first-page":"486","DOI":"10.3758\/PBR.17.4.486","volume":"17","author":"ND Duran","year":"2010","unstructured":"Duran ND, Dale R, McNamara DS (2010) The action dynamics of overcoming the truth. Psychonomic Bulletin & Review 17(4):486\u2013491. https:\/\/doi.org\/10.3758\/PBR.17.4.486","journal-title":"Psychonomic Bulletin & Review"},{"issue":"1","key":"20852_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/S15327043HUP1601_1","volume":"16","author":"SA Dwight","year":"2003","unstructured":"Dwight SA, Donovan JJ (2003) Do warnings not to fake reduce faking? Hum Perform 16(1):1\u201323. https:\/\/doi.org\/10.1207\/S15327043HUP1601_1","journal-title":"Hum Perform"},{"issue":"1","key":"20852_CR28","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1109\/TAFFC.2020.3015684","volume":"13","author":"MU \u015een","year":"2022","unstructured":"\u015een MU, P\u00e9rez-Rosas V, Yanikoglu B et al (2022) Multimodal deception detection using real-life trial data. IEEE Trans Affect Comput 13(1):306\u2013319. https:\/\/doi.org\/10.1109\/TAFFC.2020.3015684","journal-title":"IEEE Trans Affect Comput"},{"key":"20852_CR29","doi-asserted-by":"publisher","first-page":"110002","DOI":"10.1016\/j.paid.2020.110002","volume":"169","author":"A Feher","year":"2021","unstructured":"Feher A, Vernon PA (2021) Looking beyond the Big Five: a selective review of alternatives to the Big Five model of personality. Personality Individ Differ 169:110002. https:\/\/doi.org\/10.1016\/j.paid.2020.110002","journal-title":"Personality Individ Differ"},{"key":"20852_CR30","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3389\/fpsyg.2011.00059","volume":"2","author":"J Freeman","year":"2011","unstructured":"Freeman J, Dale R, Farmer TA (2011) Hand in motion reveals mind in motion. Front Psychol 2:59. https:\/\/doi.org\/10.3389\/fpsyg.2011.00059","journal-title":"Front Psychol"},{"issue":"1","key":"20852_CR31","doi-asserted-by":"publisher","first-page":"226","DOI":"10.3758\/BRM.42.1.226","volume":"42","author":"JB Freeman","year":"2010","unstructured":"Freeman JB, Ambady N (2010) Mousetracker: software for studying real-time mental processing using a computer mouse-tracking method. Behav Res Methods 42(1):226\u2013241. https:\/\/doi.org\/10.3758\/BRM.42.1.226","journal-title":"Behav Res Methods"},{"key":"20852_CR32","doi-asserted-by":"publisher","unstructured":"Gamboa H, Fred A (2004) A behavioral biometric system based on human-computer interaction. In: Jain AK, Ratha NK (eds) Biometric Technology for Human Identification, International Society for Optics and Photonics, vol 5404. SPIE, pp 381\u2013392. https:\/\/doi.org\/10.1117\/12.542625","DOI":"10.1117\/12.542625"},{"key":"20852_CR33","volume-title":"Studies in the way of words","author":"P Grice","year":"1989","unstructured":"Grice P (1989) Studies in the way of words. Harvard University Press"},{"issue":"1","key":"20852_CR34","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1177\/0049124118769083","volume":"50","author":"T Gummer","year":"2021","unstructured":"Gummer T, Ro\u00dfmann J, Silber H (2021) Using instructed response items as attention checks in web surveys: properties and implementation. Sociol Meth Res 50(1):238\u2013264. https:\/\/doi.org\/10.1177\/0049124118769083","journal-title":"Sociol Meth Res"},{"issue":"1","key":"20852_CR35","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5465\/amj.2009.0873","volume":"55","author":"BC Gunia","year":"2012","unstructured":"Gunia BC, Wang L, Huang L et al (2012) Contemplation and conversation: subtle influences on moral decision making. Acad Manag J 55(1):13\u201333. https:\/\/doi.org\/10.5465\/amj.2009.0873","journal-title":"Acad Manag J"},{"issue":"1","key":"20852_CR36","doi-asserted-by":"publisher","first-page":"74","DOI":"10.31577\/sp.2020.01.792","volume":"62","author":"P Halama","year":"2020","unstructured":"Halama P, Koh\u00fat M, Soto CJ et al (2020) Slovak adaptation of the Big Five Inventory (BFI-2): psychometric properties and initial validation. Studia Psychol 62(1):74\u201387. https:\/\/doi.org\/10.31577\/sp.2020.01.792","journal-title":"Studia Psychol"},{"key":"20852_CR37","doi-asserted-by":"publisher","unstructured":"Hinbarji Z, Albatal R, Gurrin C (2015) Dynamic user authentication based on mouse movements curves. In: He X, Luo S, Tao D et\u00a0al (eds) MultiMedia Modeling. Springer International Publishing, Cham, pp 111\u2013122. https:\/\/doi.org\/10.1007\/978-3-319-14442-9_10","DOI":"10.1007\/978-3-319-14442-9_10"},{"key":"20852_CR38","doi-asserted-by":"publisher","unstructured":"Holtrop D, Oostrom JK, Dunlop PD et al (2021) Predictors of faking behavior on personality inventories in selection: do indicators of the ability and motivation to fake predict faking? Int J Sel Assess 29(2):185\u2013202. https:\/\/doi.org\/10.1111\/ijsa.12322. https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/ijsa.12322","DOI":"10.1111\/ijsa.12322"},{"key":"20852_CR39","doi-asserted-by":"crossref","unstructured":"Horn LR (2022) From Lying to Perjury: Linguistic and Legal Perspectives on Lies and Other Falsehoods, vol\u00a03. Walter de Gruyter GmbH & Co KG","DOI":"10.1515\/9783110733730"},{"key":"20852_CR40","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1002\/9781119263685.ch16","volume":"16","author":"R Horwitz","year":"2020","unstructured":"Horwitz R, Brockhaus S, Henninger F et al (2020) Learning from mouse movements: improving questionnaires and respondents\u2019 user experience through passive data collection. John Wiley & Sons Ltd, chap 16:403\u2013425. https:\/\/doi.org\/10.1002\/9781119263685.ch16","journal-title":"John Wiley & Sons Ltd, chap"},{"key":"20852_CR41","doi-asserted-by":"publisher","unstructured":"Huang J, White RW, Dumais S (2011) No clicks, no problem: using cursor movements to understand and improve search. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, CHI \u201911, pp 1225\u20131234. https:\/\/doi.org\/10.1145\/1978942.1979125","DOI":"10.1145\/1978942.1979125"},{"key":"20852_CR42","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.ins.2017.11.055","volume":"432","author":"M Huang","year":"2018","unstructured":"Huang M, Zou G, Zhang B et al (2018) Overlapping community detection in heterogeneous social networks via the user model. Inf Sci 432:164\u2013184. https:\/\/doi.org\/10.1016\/j.ins.2017.11.055","journal-title":"Inf Sci"},{"issue":"1","key":"20852_CR43","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TAFFC.2019.2930058","volume":"13","author":"JCS Jacques Junior","year":"2022","unstructured":"Jacques Junior JCS, G\u00fc\u00e7l\u00fct\u00fcrk Y, P\u00e9rez M et al (2022) First impressions: a survey on vision-based apparent personality trait analysis. IEEE Trans Affect Comput 13(1):75\u201395. https:\/\/doi.org\/10.1109\/TAFFC.2019.2930058","journal-title":"IEEE Trans Affect Comput"},{"issue":"1","key":"20852_CR44","first-page":"3","volume":"20","author":"JL Jenkins","year":"2019","unstructured":"Jenkins JL, Proudfoot J, Valacich JS et al (2019) Sleight of hand: identifying concealed information by monitoring mouse-cursor movements. J Assoc Inf Syst 20(1):3","journal-title":"J Assoc Inf Syst"},{"issue":"1","key":"20852_CR45","doi-asserted-by":"publisher","first-page":"317","DOI":"10.3758\/s13428-019-01228-y","volume":"52","author":"PJ Kieslich","year":"2020","unstructured":"Kieslich PJ, Schoemann M, Grage T et al (2020) Design factors in mouse-tracking: what makes a difference? Behav Res Methods 52(1):317\u2013341. https:\/\/doi.org\/10.3758\/s13428-019-01228-y","journal-title":"Behav Res Methods"},{"key":"20852_CR46","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-030-60700-5_53","volume-title":"HCI International 2020 - Late Breaking Posters","author":"I Kirsh","year":"2020","unstructured":"Kirsh I, Joy M, Kirsh Y (2020) Horizontal Mouse Movements (HMMs) on web pages as indicators of user interest. In: Stephanidis C, Antona M, Ntoa S (eds) HCI International 2020 - Late Breaking Posters. Springer International Publishing, Cham, pp 416\u2013423"},{"issue":"3","key":"20852_CR47","doi-asserted-by":"publisher","first-page":"246","DOI":"10.31577\/sp.2020.03.803","volume":"62","author":"M Koh\u00fat","year":"2020","unstructured":"Koh\u00fat M, Koh\u00fatov\u00e1 V, \u017ditn\u00fd P et al (2020) Further validation of Slovak Big Five Inventory 2: 6-months test-retest stability and predictive power. Studia Psychol 62(3):246\u2013258. https:\/\/doi.org\/10.31577\/sp.2020.03.803","journal-title":"Studia Psychol"},{"key":"20852_CR48","doi-asserted-by":"publisher","unstructured":"Kuric E, Puskas A, Demcak P et al (2023) Effect of low-level interaction data in repeat purchase prediction task. Int J Human-Comp Interact 1\u201319. https:\/\/doi.org\/10.1080\/10447318.2023.2175973","DOI":"10.1080\/10447318.2023.2175973"},{"key":"20852_CR49","doi-asserted-by":"publisher","first-page":"103849","DOI":"10.1016\/j.csi.2024.103849","volume":"90","author":"E Kuric","year":"2024","unstructured":"Kuric E, Demcak P, Krajcovic M et al (2024) Is mouse dynamics information credible for user behavior research? An empirical investigation. Comp Stand Interf 90:103849. https:\/\/doi.org\/10.1016\/j.csi.2024.103849","journal-title":"Comp Stand Interf"},{"issue":"5","key":"20852_CR50","doi-asserted-by":"publisher","first-page":"1987","DOI":"10.3758\/s13428-019-01258-6","volume":"51","author":"MB Mathur","year":"2019","unstructured":"Mathur MB, Reichling DB (2019) Open-source software for mouse-tracking in Qualtrics to measure category competition. Behav Res Methods 51(5):1987\u20131997. https:\/\/doi.org\/10.3758\/s13428-019-01258-6","journal-title":"Behav Res Methods"},{"key":"20852_CR51","doi-asserted-by":"publisher","first-page":"725","DOI":"10.3389\/fpsyt.2019.00725","volume":"10","author":"C Mazza","year":"2019","unstructured":"Mazza C, Burla F, Verrocchio MC et al (2019) MMPI-2-RF profiles in child custody litigants. Front Psych 10:725. https:\/\/doi.org\/10.3389\/fpsyt.2019.00725","journal-title":"Front Psych"},{"key":"20852_CR52","doi-asserted-by":"publisher","first-page":"389","DOI":"10.3389\/fpsyt.2019.00389","volume":"10","author":"C Mazza","year":"2019","unstructured":"Mazza C, Monaro M, Orr\u00f9 G et al (2019) Introducing machine learning to detect personality faking-good in a male sample: a new model based on minnesota multiphasic personality inventory-2 restructured form scales and reaction times. Front Psych 10:389. https:\/\/doi.org\/10.3389\/fpsyt.2019.00389","journal-title":"Front Psych"},{"issue":"1","key":"20852_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-61636-5","volume":"10","author":"C Mazza","year":"2020","unstructured":"Mazza C, Monaro M, Burla F et al (2020) Use of mouse-tracking software to detect faking-good behavior on personality questionnaires: an explorative study. Sci Rep 10(1):1\u201313","journal-title":"Sci Rep"},{"issue":"4","key":"20852_CR54","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/per.2410090402","volume":"9","author":"RR McCrae","year":"1995","unstructured":"McCrae RR, Costa PT Jr (1995) Trait explanations in personality psychology. Eur J Pers 9(4):231\u2013252. https:\/\/doi.org\/10.1002\/per.2410090402","journal-title":"Eur J Pers"},{"issue":"5","key":"20852_CR55","doi-asserted-by":"publisher","first-page":"e0177851","DOI":"10.1371\/journal.pone.0177851","volume":"12","author":"M Monaro","year":"2017","unstructured":"Monaro M, Gamberini L, Sartori G (2017) The detection of faked identity using unexpected questions and mouse dynamics. PLoS ONE 12(5):e0177851. https:\/\/doi.org\/10.1371\/journal.pone.0177851","journal-title":"PLoS ONE"},{"key":"20852_CR56","doi-asserted-by":"publisher","unstructured":"Monaro M, Gamberini L, Sartori G (2018a) Spotting faked identities via mouse dynamics using complex questions. In: Proceedings of the 32nd international BCS human computer interaction conference 32, pp 1\u20139. https:\/\/doi.org\/10.14236\/ewic\/HCI2018.8","DOI":"10.14236\/ewic\/HCI2018.8"},{"key":"20852_CR57","doi-asserted-by":"publisher","first-page":"249","DOI":"10.3389\/fpsyt.2018.00249","volume":"9","author":"M Monaro","year":"2018","unstructured":"Monaro M, Toncini A, Ferracuti S et al (2018) The detection of malingering: a new tool to identify made-up depression. Front Psych 9:249. https:\/\/doi.org\/10.3389\/fpsyt.2018.00249","journal-title":"Front Psych"},{"key":"20852_CR58","doi-asserted-by":"publisher","first-page":"106348","DOI":"10.1016\/j.chb.2020.106348","volume":"109","author":"M Monaro","year":"2020","unstructured":"Monaro M, Cannonito E, Gamberini L et al (2020) Spotting faked 5 stars ratings in E-Commerce using mouse dynamics. Comput Hum Behav 109:106348. https:\/\/doi.org\/10.1016\/j.chb.2020.106348","journal-title":"Comput Hum Behav"},{"issue":"8","key":"20852_CR59","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1007\/s00426-020-01473-3","volume":"85","author":"M Monaro","year":"2021","unstructured":"Monaro M, Mazza C, Colasanti M et al (2021) Detecting faking-good response style in personality questionnaires with four choice alternatives. Psychol Res 85(8):3094\u20133107. https:\/\/doi.org\/10.1007\/s00426-020-01473-3","journal-title":"Psychol Res"},{"key":"20852_CR60","doi-asserted-by":"publisher","first-page":"120225","DOI":"10.1016\/j.eswa.2023.120225","volume":"229","author":"H Niu","year":"2023","unstructured":"Niu H, Wei A, Song Y et al (2023) Exploring visual representations of computer mouse movements for bot detection using deep learning approaches. Expert Syst Appl 229:120225. https:\/\/doi.org\/10.1016\/j.eswa.2023.120225","journal-title":"Expert Syst Appl"},{"issue":"5","key":"20852_CR61","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1111\/1467-6494.00117","volume":"68","author":"SV Paunonen","year":"2000","unstructured":"Paunonen SV, Jackson DN (2000) What is beyond the Big Five? Plenty! J Pers 68(5):821\u2013835. https:\/\/doi.org\/10.1111\/1467-6494.00117","journal-title":"J Pers"},{"key":"20852_CR62","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.cognition.2015.11.009","volume":"147","author":"R Pfister","year":"2016","unstructured":"Pfister R, Wirth R, Schwarz KA et al (2016) Burdens of non-conformity: motor execution reveals cognitive conflict during deliberate rule violations. Cognition 147:93\u201399. https:\/\/doi.org\/10.1016\/j.cognition.2015.11.009","journal-title":"Cognition"},{"issue":"1","key":"20852_CR63","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1348\/135532508X281520","volume":"14","author":"S Porter","year":"2009","unstructured":"Porter S, ten Brinke L (2009) Dangerous decisions: a theoretical framework for understanding how judges assess credibility in the courtroom. Leg Criminol Psychol 14(1):119\u2013134. https:\/\/doi.org\/10.1348\/135532508X281520","journal-title":"Leg Criminol Psychol"},{"key":"20852_CR64","doi-asserted-by":"publisher","unstructured":"Reeder R, Maxion R (2006) User interface defect detection by hesitation analysis. In: International Conference on Dependable Systems and Networks (DSN\u201906), pp 61\u201372, https:\/\/doi.org\/10.1109\/DSN.2006.71","DOI":"10.1109\/DSN.2006.71"},{"key":"20852_CR65","doi-asserted-by":"publisher","unstructured":"Revett K, Jahankhani H, De\u00a0Magalhaes ST, et\u00a0al (2008) A survey of user authentication based on mouse dynamics. In: Global E-Security: 4th international conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings, Springer, pp 210\u2013219. https:\/\/doi.org\/10.1007\/978-3-540-69403-8","DOI":"10.1007\/978-3-540-69403-8"},{"key":"20852_CR66","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10611-019-09857-2","volume":"73","author":"R Ribeiro","year":"2020","unstructured":"Ribeiro R, Silva B, Pimenta C et al (2020) Why do consumers perpetrate fraudulent behaviors in insurance? Crime Law Soc Chang 73:249\u2013273. https:\/\/doi.org\/10.1007\/s10611-019-09857-2","journal-title":"Crime Law Soc Chang"},{"issue":"2","key":"20852_CR67","first-page":"116","volume":"10","author":"P Roma","year":"2016","unstructured":"Roma P, Piccinni E, Ferracuti S (2016) Using MMPI-2 in forensic assessment. Rassegna Italiana di Criminologia 10(2):116\u2013122","journal-title":"Rassegna Italiana di Criminologia"},{"key":"20852_CR68","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.3389\/fpsyg.2018.01064","volume":"9","author":"P Roma","year":"2018","unstructured":"Roma P, Verrocchio MC, Mazza C et al (2018) Could time detect a faking-good attitude? A study with the MMPI-2-RF. Front Psychol 9:1064. https:\/\/doi.org\/10.3389\/fpsyg.2018.01064","journal-title":"Front Psychol"},{"issue":"1","key":"20852_CR69","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s12207-019-09368-4","volume":"13","author":"P Roma","year":"2020","unstructured":"Roma P, Giromini L, Burla F et al (2020) Ecological validity of the Inventory of Problems-29 (IOP-29): an Italian study of court-ordered, psychological injury evaluations using the Structured Inventory of Malingered Symptomatology (SIMS) as criterion variable. Psychol Injury Law 13(1):57\u201365. https:\/\/doi.org\/10.1007\/s12207-019-09368-4","journal-title":"Psychol Injury Law"},{"key":"20852_CR70","doi-asserted-by":"publisher","first-page":"101578","DOI":"10.1016\/j.intell.2021.101578","volume":"88","author":"D Rozgonjuk","year":"2021","unstructured":"Rozgonjuk D, Schmitz F, Kannen C et al (2021) Cognitive ability and personality: testing broad to nuanced associations with a smartphone app. Intelligence 88:101578. https:\/\/doi.org\/10.1016\/j.intell.2021.101578","journal-title":"Intelligence"},{"issue":"4","key":"20852_CR71","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1111\/1467-6494.00022","volume":"66","author":"G Saucier","year":"1998","unstructured":"Saucier G, Goldberg LR (1998) What is beyond the Big Five? J Pers 66(4):495\u2013524","journal-title":"J Pers"},{"key":"20852_CR72","doi-asserted-by":"publisher","first-page":"436","DOI":"10.3758\/s13421-019-00981-x","volume":"48","author":"S Scherbaum","year":"2020","unstructured":"Scherbaum S, Dshemuchadse M (2020) Psychometrics of the continuous mind: measuring cognitive sub-processes via mouse tracking. Memory Cogn 48:436\u2013454. https:\/\/doi.org\/10.3758\/s13421-019-00981-x","journal-title":"Memory Cogn"},{"issue":"1","key":"20852_CR73","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1037\/0022-3514.94.1.168","volume":"94","author":"DP Schmitt","year":"2008","unstructured":"Schmitt DP, Realo A, Voracek M et al (2008) Why can\u2019t a man be more like a woman? Sex differences in Big Five personality traits across 55 cultures. J Pers Soc Psychol 94(1):168. https:\/\/doi.org\/10.1037\/0022-3514.94.1.168","journal-title":"J Pers Soc Psychol"},{"issue":"4","key":"20852_CR74","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.dadm.2015.09.006","volume":"1","author":"A Seelye","year":"2015","unstructured":"Seelye A, Hagler S, Mattek N et al (2015) Computer mouse movement patterns: a potential marker of mild cognitive impairment. Alzheimer\u2019s & Dementia: Diagnosis, Assessment & Disease Monitoring 1(4):472\u2013480. https:\/\/doi.org\/10.1016\/j.dadm.2015.09.006","journal-title":"Alzheimer\u2019s & Dementia: Diagnosis, Assessment & Disease Monitoring"},{"issue":"3","key":"20852_CR75","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1080\/03637751.2021.1985153","volume":"89","author":"KB Serota","year":"2022","unstructured":"Serota KB, Levine TR, Docan-Morgan T (2022) Unpacking variation in lie prevalence: prolific liars, bad lie days, or both? Commun Monogr 89(3):307\u2013331. https:\/\/doi.org\/10.1080\/03637751.2021.1985153","journal-title":"Commun Monogr"},{"key":"20852_CR76","doi-asserted-by":"publisher","unstructured":"Shalvi S, Eldar O, Bereby-Meyer Y (2013) Honesty requires time\u2014a reply to foerster et al.(2013). Frontiers in psychology 4:634. https:\/\/doi.org\/10.3389\/fpsyg.2013.00634","DOI":"10.3389\/fpsyg.2013.00634"},{"key":"20852_CR77","doi-asserted-by":"publisher","unstructured":"Shamon H, Berning CC (2020) Attention check items and instructions in online surveys with incentivized and non-incentivized samples: boon or bane for data quality? Survey Research Methods 14(1):55\u201377. https:\/\/doi.org\/10.18148\/srm\/2020.v14i1.7374","DOI":"10.18148\/srm\/2020.v14i1.7374"},{"key":"20852_CR78","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.675097","volume":"12","author":"X Shen","year":"2021","unstructured":"Shen X, Fan G, Niu C et al (2021) Catching a liar through facial expression of fear. Front Psychol 12:675097. https:\/\/doi.org\/10.3389\/fpsyg.2021.675097","journal-title":"Front Psychol"},{"issue":"1","key":"20852_CR79","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1037\/pspp0000096","volume":"113","author":"CJ Soto","year":"2017","unstructured":"Soto CJ, John OP (2017) The next Big Five Inventory (BFI-2): developing and assessing a hierarchical model with 15 facets to enhance bandwidth, fidelity, and predictive power. J Pers Soc Psychol 113(1):117\u2013143. https:\/\/doi.org\/10.1037\/pspp0000096","journal-title":"J Pers Soc Psychol"},{"issue":"6","key":"20852_CR80","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.tics.2018.03.012","volume":"22","author":"PE Stillman","year":"2018","unstructured":"Stillman PE, Shen X, Ferguson MJ (2018) How mouse-tracking can advance social cognitive theory. Trends Cogn Sci 22(6):531\u2013543. https:\/\/doi.org\/10.1016\/j.tics.2018.03.012","journal-title":"Trends Cogn Sci"},{"issue":"4","key":"20852_CR81","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1037\/bul0000087","volume":"143","author":"K Suchotzki","year":"2017","unstructured":"Suchotzki K, Verschuere B, Van Bockstaele B et al (2017) Lying takes time: a meta-analysis on reaction time measures of deception. Psychol Bull 143(4):428\u2013453. https:\/\/doi.org\/10.1037\/bul0000087","journal-title":"Psychol Bull"},{"issue":"1","key":"20852_CR82","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1080\/23744006.2015.1060080","volume":"1","author":"J Synnott","year":"2015","unstructured":"Synnott J, Dietzel D, Ioannou M (2015) A review of the polygraph: history, methodology and current status. Crime Psychol Rev 1(1):59\u201383. https:\/\/doi.org\/10.1080\/23744006.2015.1060080","journal-title":"Crime Psychol Rev"},{"key":"20852_CR83","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.chb.2018.02.012","volume":"83","author":"K Tzafilkou","year":"2018","unstructured":"Tzafilkou K, Protogeros N (2018) Mouse behavioral patterns and keystroke dynamics in End-User Development: what can they tell us about users\u2019 behavioral attributes? Comput Hum Behav 83:288\u2013305. https:\/\/doi.org\/10.1016\/j.chb.2018.02.012","journal-title":"Comput Hum Behav"},{"issue":"3","key":"20852_CR84","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.jarmac.2018.04.005","volume":"7","author":"B Verschuere","year":"2018","unstructured":"Verschuere B, K\u00f6bis NC, Bereby-Meyer Y et al (2018) Taxing the brain to uncover lying? Meta-analyzing the effect of imposing cognitive load on the reaction-time costs of lying. J Appl Res Mem Cogn 7(3):462\u2013469. https:\/\/doi.org\/10.1016\/j.jarmac.2018.04.005","journal-title":"J Appl Res Mem Cogn"},{"issue":"3","key":"20852_CR85","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10979-007-9103-y","volume":"32","author":"A Vrij","year":"2008","unstructured":"Vrij A, Mann SA, Fisher RP et al (2008) Increasing cognitive load to facilitate lie detection: the benefit of recalling an event in reverse order. Law Hum Behav 32(3):253\u2013265. https:\/\/doi.org\/10.1007\/s10979-007-9103-y","journal-title":"Law Hum Behav"},{"key":"20852_CR86","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.newideapsych.2019.02.003","volume":"54","author":"JJ Walczyk","year":"2019","unstructured":"Walczyk JJ, Fargerson C (2019) A cognitive framework for understanding development of the ability to deceive. New Ideas Psychol 54:82\u201392. https:\/\/doi.org\/10.1016\/j.newideapsych.2019.02.003","journal-title":"New Ideas Psychol"},{"issue":"2","key":"20852_CR87","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1111\/apps.12118","volume":"67","author":"M Ward","year":"2018","unstructured":"Ward M, Meade AW (2018) Applying social psychology to prevent careless responding during online surveys. Appl Psychol 67(2):231\u2013263. https:\/\/doi.org\/10.1111\/apps.12118","journal-title":"Appl Psychol"},{"key":"20852_CR88","doi-asserted-by":"publisher","first-page":"178","DOI":"10.3389\/fpsyg.2011.00178","volume":"2","author":"YJ Weisberg","year":"2011","unstructured":"Weisberg YJ, DeYoung CG, Hirsh JB (2011) Gender differences in personality across the ten aspects of the Big Five. Front Psychol 2:178. https:\/\/doi.org\/10.3389\/fpsyg.2011.00178","journal-title":"Front Psychol"},{"issue":"3","key":"20852_CR89","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1111\/cogs.12557","volume":"42","author":"T Yamauchi","year":"2018","unstructured":"Yamauchi T, Xiao K (2018) Reading emotion from mouse cursor motions: affective computing approach. Cogn Sci 42(3):771\u2013819. https:\/\/doi.org\/10.1111\/cogs.12557","journal-title":"Cogn Sci"},{"key":"20852_CR90","doi-asserted-by":"publisher","first-page":"126240","DOI":"10.1016\/j.neucom.2023.126240","volume":"542","author":"S Yang","year":"2023","unstructured":"Yang S, Pang Y, Wang H et al (2023) Spike-driven multi-scale learning with hybrid mechanisms of spiking dendrites. Neurocomputing 542:126240. https:\/\/doi.org\/10.1016\/j.neucom.2023.126240","journal-title":"Neurocomputing"},{"issue":"19","key":"20852_CR91","doi-asserted-by":"publisher","first-page":"29115","DOI":"10.1007\/s11042-023-14551-6","volume":"82","author":"S Yildirim","year":"2023","unstructured":"Yildirim S, Chimeumanu MS, Rana ZA (2023) The influence of micro-expressions on deception detection. Multimed Tools Appl 82(19):29115\u201329133. https:\/\/doi.org\/10.1007\/s11042-023-14551-6","journal-title":"Multimed Tools Appl"},{"key":"20852_CR92","doi-asserted-by":"publisher","first-page":"424","DOI":"10.3389\/fpsyt.2019.00424","volume":"10","author":"S Zago","year":"2019","unstructured":"Zago S, Piacquadio E, Monaro M et al (2019) The detection of malingered amnesia: an approach involving multiple strategies in a mock crime. Front Psych 10:424. https:\/\/doi.org\/10.3389\/fpsyt.2019.00424","journal-title":"Front Psych"},{"key":"20852_CR93","volume-title":"New Perspectives on Faking in Personality Assessment","author":"M Ziegler","year":"2012","unstructured":"Ziegler M, MacCann C, Roberts R (2012) New Perspectives on Faking in Personality Assessment. Oxford University Press, USA"},{"issue":"5","key":"20852_CR94","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1177\/1747021820978851","volume":"74","author":"M Zloteanu","year":"2021","unstructured":"Zloteanu M, Bull P, Krumhuber EG et al (2021) Veracity judgement, not accuracy: reconsidering the role of facial expressions, empathy, and emotion recognition training on deception detection. Quart J Experiment Psychol 74(5):910\u2013927. https:\/\/doi.org\/10.1177\/1747021820978851","journal-title":"Quart J Experiment Psychol"},{"issue":"1","key":"20852_CR95","doi-asserted-by":"publisher","first-page":"102739","DOI":"10.1016\/j.ipm.2021.102739","volume":"59","author":"A Zrnec","year":"2022","unstructured":"Zrnec A, Po\u017eenel M, Lavbi\u010d D (2022) Users\u2019 ability to perceive misinformation: an information quality assessment approach. Inf Process Manag 59(1):102739. https:\/\/doi.org\/10.1016\/j.ipm.2021.102739","journal-title":"Inf Process Manag"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20852-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20852-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20852-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T23:08:21Z","timestamp":1759446501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20852-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":95,"journal-issue":{"issue":"34","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20852"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20852-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"15 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"All authors accepted to submit and publish the submitted work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"All participants consented to the collection of data for this study and its use in research and academic publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors contributed and accepted to submit the current work.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}