{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:21:04Z","timestamp":1770747664582,"version":"3.49.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T00:00:00Z","timestamp":1386028800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Technol Tourism"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s40558-013-0002-4","type":"journal-article","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T17:35:15Z","timestamp":1386610515000},"page":"21-47","source":"Crossref","is-referenced-by-count":18,"title":["Social actor attribution to mobile phones: the case of tourists"],"prefix":"10.1007","volume":"14","author":[{"given":"Iis P.","family":"Tussyadiah","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,3]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/BF02723327","volume":"16","author":"RP Bagozzi","year":"1988","unstructured":"Bagozzi RP, Yi T (1988) On the evaluation of structural equation models. J Acad Mark Sci 16(1):74\u201394","journal-title":"J Acad Mark Sci"},{"issue":"1","key":"2_CR2","first-page":"81","volume":"38","author":"C-H Chang","year":"2012","unstructured":"Chang C-H, Ferris DL, Johnson RE, Rosen CC, Tan Ja (2012) Core self-evaluations: a review and evaluation of the literature. J Manag 38(1):81\u2013128","journal-title":"J Manag"},{"key":"2_CR3","unstructured":"Chin W (1998) The partial least squares approach to structural equation modeling. In: Marcoulides GA (ed) Modern methods for business research. Laurence Erlbaum Associates, New Jersey, pp 295\u2013336"},{"key":"2_CR4","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1037\/0022-3514.54.5.853","volume":"54","author":"PTJ Costa","year":"1988","unstructured":"Costa PTJ, McCrae RR (1988) Personality in adult-hood: a six-year longitudinal study of self-reports and spouse ratings on the NEO personality inventory. J Pers Soc Psychol 54:853\u2013863","journal-title":"J Pers Soc Psychol"},{"key":"2_CR5","volume-title":"Personal causation: the internal affective determinants of behavior","author":"R DeCharms","year":"1968","unstructured":"DeCharms R (1968) Personal causation: the internal affective determinants of behavior. Academic Press, New York"},{"key":"2_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-2271-7","volume-title":"Intrinsic motivation and self-determination in human behavior","author":"EL Deci","year":"1985","unstructured":"Deci EL, Ryan RM (1985) Intrinsic motivation and self-determination in human behavior. Plenum, New York"},{"key":"2_CR7","volume-title":"Multivariate analysis, methods and applications","author":"WR Dillon","year":"1984","unstructured":"Dillon WR, Goldstein M (1984) Multivariate analysis, methods and applications. John Wiley & Sons, New York"},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3727\/109830506778193887","volume":"8","author":"SJ Edwards","year":"2006","unstructured":"Edwards SJ, Blythe PT, Scott S, Weihong-Guo A (2006) Tourist information delivered through mobile devices: findings from the image project. Inform Technol Tour 8:31\u201346","journal-title":"Inform Technol Tour"},{"key":"2_CR9","volume-title":"Manual for the Eysenck personality inventory","author":"HJ Eysenck","year":"1968","unstructured":"Eysenck HJ, Eysenck SBG (1968) Manual for the Eysenck personality inventory. Educational and Industrial Testing Service, San Diego"},{"key":"2_CR10","first-page":"1028","volume":"2002","author":"N Falaleeva","year":"2002","unstructured":"Falaleeva N, Johnson R (2002) Influence of individual psychological traits on attribution toward computing technology. Eighth Am Conf Inform Syst 2002:1028\u20131033","journal-title":"Eighth Am Conf Inform Syst"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Fogg BJ (1998) Persuasive computers: perspectives and research directions. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York","DOI":"10.1145\/274644.274677"},{"key":"2_CR12","volume-title":"Persuasive technology: using computers to change what we think and do","author":"BJ Fogg","year":"2003","unstructured":"Fogg BJ (2003) Persuasive technology: using computers to change what we think and do. Morgan Kaufmann Publishers, San Francisco"},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1006\/ijhc.1996.0104","volume":"46","author":"BJ Fogg","year":"1997","unstructured":"Fogg BJ, Nass CI (1997) Silicon sycophants: the effect of computers that flatter. Int J Hum Comput Stud 46:551\u2013561","journal-title":"Int J Hum Comput Stud"},{"key":"2_CR14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larcker DF (1981) Evaluating structural equation models with unobserved variables and measurement error. J Mark Res 18:39\u201350","journal-title":"J Mark Res"},{"issue":"3","key":"2_CR15","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.annals.2011.04.014","volume":"38","author":"U Gretzel","year":"2011","unstructured":"Gretzel U (2011) Intelligent systems in tourism: a social science perspective. Annals Tour Res 38(3):757\u2013779","journal-title":"Annals Tour Res"},{"key":"2_CR16","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195069013.001.0001","volume-title":"Faces in the clouds: a new theory of religion","author":"SE Guthrie","year":"1993","unstructured":"Guthrie SE (1993) Faces in the clouds: a new theory of religion. Oxford University Press, New York"},{"key":"2_CR17","volume-title":"Tourism","author":"CM Hall","year":"2004","unstructured":"Hall CM (2004) Tourism. Prentice-Hall, Harlow"},{"issue":"6","key":"2_CR18","doi-asserted-by":"crossref","first-page":"2965","DOI":"10.1016\/j.chb.2008.05.003","volume":"24","author":"B Hall","year":"2008","unstructured":"Hall B, Henningsen DD (2008) Social facilitation and human\u2013computer interaction. Comput Hum Behav 24(6):2965\u20132971","journal-title":"Comput Hum Behav"},{"issue":"3","key":"2_CR19","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/BF01173404","volume":"13","author":"B Hayes","year":"1989","unstructured":"Hayes B, Hesketh B (1989) Attribution theory, judgmental biases, and cognitive behavior modification: prospects and problems. Cogn Therapy Res 13(3):211\u2013230","journal-title":"Cogn Therapy Res"},{"key":"2_CR20","doi-asserted-by":"crossref","DOI":"10.1037\/10628-000","volume-title":"The psychology of interpersonal relations","author":"F Heider","year":"1958","unstructured":"Heider F (1958) The psychology of interpersonal relations. Wiley, New York"},{"key":"2_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10705519909540118","volume":"6","author":"L Hu","year":"1999","unstructured":"Hu L, Bentler PM (1999) Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct Equ Model 6:1\u201355","journal-title":"Struct Equ Model"},{"issue":"2","key":"2_CR22","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1016\/j.compedu.2011.02.001","volume":"57","author":"M-C Hung","year":"2011","unstructured":"Hung M-C, Chang I-C, Hwang H-G (2011) Exploring academic teachers\u2019 continuance toward the web-based learning system: the role of causal attributions. Comput Educ 57(2):1530\u20131543","journal-title":"Comput Educ"},{"issue":"6","key":"2_CR23","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/0305-0483(95)00035-6","volume":"23","author":"M Igbaria","year":"1995","unstructured":"Igbaria M, Iivari J (1995) The effects of self-efficacy on computer usage. Omega 23(6):587\u2013605","journal-title":"Omega"},{"key":"2_CR24","volume-title":"Tool or social actor: factors contributing to differential social attributions toward computing technology","author":"RD Johnson","year":"2001","unstructured":"Johnson RD (2001) Tool or social actor: factors contributing to differential social attributions toward computing technology. University of Maryland, College Park"},{"key":"2_CR25","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1016\/j.ijhcs.2005.09.002","volume":"64","author":"RD Johnson","year":"2006","unstructured":"Johnson RD, Marakas GM, Palmer JW (2006) Differential social attributions toward computing technology: an empirical examination. Int J Hum Comput Stud 64:446\u2013460","journal-title":"Int J Hum Comput Stud"},{"issue":"2","key":"2_CR26","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1080\/01449290600959104","volume":"27","author":"RD Johnson","year":"2008","unstructured":"Johnson RD, Marakas GM, Palmer JW (2008) Beliefs about the social roles and capabilities of computing technology: development of the computing technology continuum of perspective. Behav Inform Technol 27(2):169\u2013181","journal-title":"Behav Inform Technol"},{"key":"2_CR27","first-page":"151","volume":"19","author":"TA Judge","year":"1997","unstructured":"Judge TA, Locke EA, Durham CC (1997) The dispositional causes of job satisfaction: a core evaluations approach. Res Organ Behav 19:151\u2013188","journal-title":"Res Organ Behav"},{"issue":"3","key":"2_CR28","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1037\/0022-3514.83.3.693","volume":"83","author":"TA Judge","year":"2002","unstructured":"Judge TA, Erez A, Bono JE, Thoresen CJ (2002) Are measures of self-esteem, neuroticism, locus of control, and generalized self-efficacy indicators of a common core construct? J Pers Soc Psychol 83(3):693\u2013710","journal-title":"J Pers Soc Psychol"},{"issue":"1","key":"2_CR29","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.tele.2009.05.003","volume":"27","author":"K Kabassi","year":"2010","unstructured":"Kabassi K (2010) Personalizing recommendations for tourists. Telematics Inform 27(1):51\u201366","journal-title":"Telematics Inform"},{"key":"2_CR30","unstructured":"Kansas State University (2011, June 28). Attachment to cellphones more about entertainment, less about communication. ScienceDaily. Retrieved January 3, 2012, from http:\/\/www.sciencedaily.com\/releases\/2011\/06\/110628113139.htm"},{"issue":"4","key":"2_CR31","doi-asserted-by":"crossref","first-page":"51","DOI":"10.4018\/joeuc.2002100104","volume":"14","author":"R Karsten","year":"2002","unstructured":"Karsten R (2002) An analysis of IS professional end user causal attributions for user-system outcomes. J End User Comput 14(4):51\u201373","journal-title":"J End User Comput"},{"issue":"2","key":"2_CR32","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1037\/h0034225","volume":"28","author":"HH Kelley","year":"1973","unstructured":"Kelley HH (1973) The processes of causal attribution. Am Psychol 28(2):107\u2013128","journal-title":"Am Psychol"},{"issue":"1","key":"2_CR33","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1080\/10548408.2013.751220","volume":"30","author":"J Kim","year":"2013","unstructured":"Kim J, Tussyadiah IP (2013) Social networking and social support in tourism experience: the moderating role of online self-presentation strategies. J Travel Tour Market 30(1):78\u201392","journal-title":"J Travel Tour Market"},{"key":"2_CR34","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.chb.2010.01.003","volume":"26","author":"E-U Lee","year":"2010","unstructured":"Lee E-U (2010) The more humanlike, the better? How speech type and users\u2019 cognitive style affect social responses to computers. Comput Hum Behav 26:665\u2013672","journal-title":"Comput Hum Behav"},{"issue":"3","key":"2_CR35","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1037\/h0035357","volume":"41","author":"H Levenson","year":"1973","unstructured":"Levenson H (1973) Multidimensional locus of control in psychiatric patients. J Consult Clin Psychol 41(3):397\u2013404","journal-title":"J Consult Clin Psychol"},{"key":"2_CR36","unstructured":"Lindstrom M (2011, September). You love your iPhone. Literally. The New York Times. Retrieved January 3, 2012, from http:\/\/www.nytimes.com\/2011\/10\/01\/opinion\/you-love-your-iphone-literally.html"},{"issue":"2","key":"2_CR37","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1287\/isre.9.2.126","volume":"9","author":"GM Marakas","year":"1998","unstructured":"Marakas GM, Yi MY, Johnson RD (1998) The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research. Inform Syst Res 9(2):126\u2013163","journal-title":"Inform Syst Res"},{"key":"2_CR38","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1006\/ijhc.1999.0348","volume":"52","author":"GM Marakas","year":"2000","unstructured":"Marakas GM, Johnson RD, Palmer JW (2000) A theoretical model of differential social attributions toward computing technology: when metaphor become the model. Int J Hum Comput Stud 52:719\u2013750","journal-title":"Int J Hum Comput Stud"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Martin D, Alzua A, Lamsfus C (2011) A contextual geofencing mobile tourism service. In: Law R, Fuchs M, Ricci F (eds) Information and communication technologies in tourism 2011. Springer, Vienna\/New York, pp 191\u2013202","DOI":"10.1007\/978-3-7091-0503-0_16"},{"key":"2_CR40","first-page":"7","volume-title":"Attribution theory: an organizational perspective","author":"MJ Martinko","year":"1995","unstructured":"Martinko MJ (1995) The nature and function of attribution theory within the organizational science. In: Martinko MJ (ed) Attribution theory: an organizational perspective. St. Lucie Press, Delray Beach, pp 7\u201316"},{"issue":"5","key":"2_CR41","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1016\/j.chb.2011.02.002","volume":"27","author":"J Mumm","year":"2011","unstructured":"Mumm J, Mutlu B (2011) Designing motivational agents: the role of praise, social comparison, and embodiment in computer feedback. Comput Hum Behav 27(5):1643\u20131650","journal-title":"Comput Hum Behav"},{"key":"2_CR42","unstructured":"Muth\u00e9n LK, Muth\u00e9n BO (1998\u20132011). Mplus User\u2019s Guide. 6th edn. Muth\u00e9n & Muth\u00e9n, Los Angeles"},{"issue":"1","key":"2_CR43","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1111\/0022-4537.00153","volume":"56","author":"C Nass","year":"2000","unstructured":"Nass C, Moon Y (2000) Machines and mindlessness: social responses to computers. J Soc Issues 56(1):81\u2013103","journal-title":"J Soc Issues"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Nass C, Steuer J, Tauber ER (1994) Computers are social actors. In: The proceedings of the SIGCHI conference on human factors in computing systems: celebrating interdependence. Boston, Massachusetts, pp 72\u201378","DOI":"10.1145\/191666.191703"},{"key":"2_CR45","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1006\/ijhc.1995.1042","volume":"43","author":"C Nass","year":"1995","unstructured":"Nass C, Moon Y, Fogg BJ, Reeves B, Dryer C (1995) Can computer personalities be human personalities? Int J Hum Comput Stud 43:223\u2013239","journal-title":"Int J Hum Comput Stud"},{"key":"2_CR46","volume-title":"Educational psychology: developing learners","author":"JE Ormrod","year":"2006","unstructured":"Ormrod JE (2006) Educational psychology: developing learners, 5th edn. Pearson\/Merrill Prentice Hall, Upper Saddle River","edition":"5"},{"key":"2_CR47","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/S0261-5177(03)00130-4","volume":"25","author":"S Quan","year":"2004","unstructured":"Quan S, Wang N (2004) Towards a structural model of the tourist experience: an illustration from food experiences in tourism. Tour Manag 25:297\u2013305","journal-title":"Tour Manag"},{"issue":"3\u20134","key":"2_CR48","doi-asserted-by":"crossref","first-page":"177","DOI":"10.3727\/109830507782166962","volume":"9","author":"J Rasinger","year":"2007","unstructured":"Rasinger J, Fuchs M, H\u00f6pken W (2007) Information search with mobile tourist guides: a survey of usage intention. Inform Technol Tour 9(3\u20134):177\u2013194","journal-title":"Inform Technol Tour"},{"key":"2_CR49","volume-title":"The media equation: how people treat computers, television, and new media like real people and places","author":"B Reeves","year":"1996","unstructured":"Reeves B, Nass C (1996) The media equation: how people treat computers, television, and new media like real people and places. Cambridge University Press, Stanford"},{"key":"2_CR50","doi-asserted-by":"crossref","DOI":"10.1515\/9781400876136","volume-title":"Society and the adolescent self-image","author":"M Rosenberg","year":"1965","unstructured":"Rosenberg M (1965) Society and the adolescent self-image. Princeton University Press, Princeton"},{"key":"2_CR51","doi-asserted-by":"crossref","DOI":"10.1037\/10788-000","volume-title":"Social learning and clinical psychology","author":"JB Rotter","year":"1954","unstructured":"Rotter JB (1954) Social learning and clinical psychology. Prentice-Hall, New York"},{"key":"2_CR52","doi-asserted-by":"crossref","unstructured":"Schmeil A, Broll W (2007) An anthropomorphic AR-based personal information manager and guide. Proceedings of HCI international 2007, July 22\u201327, Beijing, PR China","DOI":"10.1007\/978-3-540-73281-5_76"},{"key":"2_CR53","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1207\/s15327051hci1102_1","volume":"11","author":"L Sproull","year":"1996","unstructured":"Sproull L, Subramani M, Kiesler S, Walker JH (1996) When the interface is a face. Hum Comput Interact 11:97\u2013124","journal-title":"Hum Comput Interact"},{"issue":"6","key":"2_CR54","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.paid.2008.06.013","volume":"45","author":"ER Thompson","year":"2008","unstructured":"Thompson ER (2008) Development and validation of an international English big-five mini-markers. Personality Individ Differ 45(6):542\u2013548","journal-title":"Personality Individ Differ"},{"key":"2_CR55","volume-title":"The second self","author":"S Turkle","year":"1984","unstructured":"Turkle S (1984) The second self. Simon and Schuster, New York"},{"issue":"3","key":"2_CR56","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/10548408.2012.666168","volume":"29","author":"IP Tussyadiah","year":"2012","unstructured":"Tussyadiah IP (2012) A concept of location-based social network marketing. J Travel Tour Market 29(3):205\u2013220","journal-title":"J Travel Tour Market"},{"key":"2_CR57","doi-asserted-by":"crossref","unstructured":"Tussyadiah IP, Fesenmaier DR (2009) Mediating tourists experiences-access to places via shared videos. Annals Tour Res 36(1), 24\u201340","DOI":"10.1016\/j.annals.2008.10.001"},{"issue":"2","key":"2_CR58","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1016\/j.annals.2011.10.003","volume":"39","author":"IP Tussyadiah","year":"2012","unstructured":"Tussyadiah IP, Zach FJ (2012) The role of geo-based technology in place experiences. Annals Tour Res 39(2):780\u2013800","journal-title":"Annals Tour Res"},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Wang D, Fesenmaier DR (2013) Transforming the travel experience: the use of smartphones for travel. In: Cantoni L, Xiang Z (eds) Information and communication technologies in tourism 2013. Springer, Vienna\/New York","DOI":"10.1007\/978-3-642-36309-2_6"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Wang D, Xiang Z (2012) The new landscape of travel: a comprehensive analysis of Smartphone Apps. In: Fuchs M, Ricci F, Cantoni L (eds) Information and communication technologies in tourism 2012. Springer, Vienna\/New York","DOI":"10.1007\/978-3-7091-1142-0_27"},{"issue":"4","key":"2_CR61","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1177\/0047287511426341","volume":"51","author":"D Wang","year":"2011","unstructured":"Wang D, Park S, Fesenmaier DR (2011) The role of smartphones in mediating the touristic experience. J Travel Res 51(4):371\u2013387","journal-title":"J Travel Res"},{"key":"2_CR62","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1037\/0033-295X.92.4.548","volume":"92","author":"B Weiner","year":"1985","unstructured":"Weiner B (1985) An attribution theory of achievement motivation and emotion. Psychol Rev 92:548\u2013573","journal-title":"Psychol Rev"},{"issue":"8","key":"2_CR63","first-page":"28","volume":"38","author":"C-S You","year":"2013","unstructured":"You C-S, Hung Y-C, Tsen Y-J, Wang H-B (2013) The roles of causal attribution on the continued use of e-learning systems. Int J Appl Math Stat 38(8):28\u201342","journal-title":"Int J Appl Math Stat"},{"issue":"1","key":"2_CR64","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.jretai.2012.10.004","volume":"89","author":"Z Zhu","year":"2013","unstructured":"Zhu Z, Nakata C, Shivakumar K, Grewal D (2013) Fix it or leave it? Customer recovery from self-service technology failures. J Retail 89(1):15\u201329","journal-title":"J Retail"}],"container-title":["Information Technology &amp; Tourism"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40558-013-0002-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40558-013-0002-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40558-013-0002-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T07:56:58Z","timestamp":1716278218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40558-013-0002-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,3]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["2"],"URL":"https:\/\/doi.org\/10.1007\/s40558-013-0002-4","relation":{},"ISSN":["1098-3058","1943-4294"],"issn-type":[{"value":"1098-3058","type":"print"},{"value":"1943-4294","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,3]]}}}