{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T05:24:23Z","timestamp":1778045063632,"version":"3.51.4"},"reference-count":128,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Production Research"],"published-print":{"date-parts":[[2022,1,2]]},"DOI":"10.1080\/00207543.2021.1984606","type":"journal-article","created":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T14:00:27Z","timestamp":1634220027000},"page":"162-183","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":109,"title":["New challenges in supply chain management: cybersecurity across the supply chain"],"prefix":"10.1080","volume":"60","author":[{"given":"Steven A.","family":"Melnyk","sequence":"first","affiliation":[{"name":"Department of Supply Chain Management, College of Business, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4958-189X","authenticated-orcid":false,"given":"Tobias","family":"Schoenherr","sequence":"additional","affiliation":[{"name":"Department of Supply Chain Management, College of Business, Michigan State University, East Lansing, MI, USA"}]},{"given":"Cheri","family":"Speier-Pero","sequence":"additional","affiliation":[{"name":"College of Business, Michigan State University, East Lansing, MI, USA"}]},{"given":"Chris","family":"Peters","sequence":"additional","affiliation":[{"name":"The Lucrum Group, Severna Park, MD, USA"}]},{"given":"Jeff F.","family":"Chang","sequence":"additional","affiliation":[{"name":"Lockheed Martin Space BITEE Resilient Digital Environments, Littleton, CO, USA"}]},{"given":"Derek","family":"Friday","sequence":"additional","affiliation":[{"name":"Newcastle Business School, University of Newcastle, Newcastle, Australia"}]}],"member":"301","published-online":{"date-parts":[[2021,10,12]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"issue":"4","key":"CIT0002","first-page":"293","volume":"2","author":"Ahmed M.","year":"2012","journal-title":"International Journal of Engineering and Technology Innovation"},{"issue":"3","key":"CIT0003","first-page":"14","volume":"14","author":"Aisenberg M. A.","year":"2018","journal-title":"SciTech Lawyer"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1126\/science.1130992"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1108\/02756661111150963"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2019-0019"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1108\/17542731011085320"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2018-0080"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1767239"},{"issue":"1","key":"CIT0010","first-page":"100","volume":"9","author":"Bartunek J. M.","year":"2010","journal-title":"Academy of Management Learning & Education"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/deci.12099"},{"key":"CIT0012","unstructured":"Bowman, R. J. 2013. Why Cybersecurity is a Supply-Chain Problem. Supply Chain Brain, May 20, 2013. Accessed January 13, 2021. https:\/\/www.supplychainbrain.com\/blogs\/1-think-tank\/post\/16330-why-cybersecurity-is-a-supply-chain-problem."},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/888"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.2307\/2551386"},{"key":"CIT0015","unstructured":"Buchholz, K. 2020. Toyota tops 2020 OEM-Supplier Relations Study. SAE Mobilus. June 23, 2020. Accessed April 25, 2021. https:\/\/www.sae.org\/news\/2020\/06\/toyota-tops-2020-wri-oem-supplier-relations-study."},{"key":"CIT0016","unstructured":"Carter, S. D. 2020. Hackers Putting Global Supply Chain at Risk. National Defense. July 2, 2020. https:\/\/www.nationaldefensemagazine.org\/articles\/2020\/7\/2\/hackers-putting-global-supply-chain-at-risk."},{"key":"CIT0017","unstructured":"Center for Strategic & International Studies. 2020. Significant Cyber Incidents Since 2006. Washington, DC: Center for Strategic & International Studies. Accessed January 5, 2020. https:\/\/csis-website-prod.s3.amazonaws.com\/s3fs-public\/201218_Significant_Cyber_Events.pdf."},{"key":"CIT0018","unstructured":"CERT-UK. 2015. Cyber-Security Risks in the Supply Chain. www.cert.gov.uk. Accessed December 28, 2020. https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/guidance_files\/Cyber-security-risks-in-the-supply-chain.pdf."},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1002\/kpm.1478"},{"issue":"12","key":"CIT0020","first-page":"112","volume":"89","author":"Choi T.","year":"2011","journal-title":"Harvard Business Review"},{"key":"CIT0022","unstructured":"Cimpanu, C. 2020. SEC Filings: SolarWinds says 18,000 Customers Were Impacted by Recent Hack. ZNET. December 14, 2020. Accessed May 13, 2021. https:\/\/www.zdnet.com\/article\/sec-filings-solarwinds-says-18000-customers-are-impacted-by-recent-hack\/."},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-09-2017-0289"},{"key":"CIT0025","unstructured":"College of Physicians of Philadelphia. 2018. Vaccine Development, Testing, and Regulation. The History of Vaccines. January 17, 2018. Accessed July 10, 2021. https:\/\/www.historyofvaccines.org\/content\/articles\/vaccine-development-testing-and-regulation."},{"key":"CIT0026","unstructured":"Council of Economic Advisors. 2018. The Cost of Malicious Cyber Activity to the U.S. Economy. February 2018."},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/887"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1108\/09600030911011423"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1111\/j.1530-9134.2009.00211.x"},{"key":"CIT0030","first-page":"671","volume-title":"The Sage Handbook of Organizational Research Methods","author":"Denyer D.","year":"2009"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1387680"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1722860"},{"key":"CIT0033","unstructured":"Ellis, J. E. 2021. How Toyota Dodged the Chip Shortage. Business Week. April 12, 2021. Pp. 14-16."},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.2307\/256313"},{"issue":"1","key":"CIT0035","first-page":"63","volume":"32","author":"Farahbod K.","year":"2020","journal-title":"Journal of Business and Behavioral Sciences"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.2307\/4131489"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1111\/fima.12274"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-10-2018-0357"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt5hhqgq"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"CIT0041","first-page":"1","volume":"279","author":"Govindan K.","year":"2019","journal-title":"Journal of Cleaner Production"},{"key":"CIT0042","unstructured":"Greenberg, A. 2018. The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Wired. August 22, 2018. Accessed January 17, 2021. https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/."},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2015.1106018"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2004.10.005"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1785034"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09959-1"},{"key":"CIT0130","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2018.08.030"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2015.0446"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1661538"},{"key":"CIT0050","volume-title":"Modern Marketing Theory: Critical Issues in the Philosophy of Marketing Science","author":"Hunt S. D.","year":"1991"},{"key":"CIT0051","unstructured":"IBM Ponemon Institute. 2018. 2018 Cost of a Data Breach Study: Global Overview. Accessed December 31, 2020. https:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/55\/en\/55017055usen\/2018-global-codb-report_06271811_55017055USEN.pdf."},{"key":"CIT0052","unstructured":"ISO. 2020a. The ISO Survey. Accessed May 4, 2021 at 0100 hrs. https:\/\/www.iso.org\/the-iso-survey.html."},{"key":"CIT0053","unstructured":"ISO. 2020b. ISO\/IEC 27000:2018: Information Technology \u2013 Security Techniques \u2013 Information Security Management Systems \u2013 Overview and Vocabulary. Accessed January 30, 2021 at 2200 hrs. https:\/\/www.iso.org\/standard\/73906.html."},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2013.858836"},{"key":"CIT0131","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2018.07.022"},{"key":"CIT0055","unstructured":"Jibillian, I. 2020. Here\u2019s a Simple Explanation of How the Massive Solarwinds Hack Happened and Why it\u2019s Such a Big Deal. Business Insider. December 24, 2020. Accessed January 5, 2021. https:\/\/www.businessinsider.com\/solarwinds-hack-explained-government-agencies-cyber-security-2020-12."},{"key":"CIT0056","first-page":"167","volume-title":"Leveraging the Private Sector: Management-Based Strategies for Improving Environmental Performance","author":"Johnston S. C.","year":"2006"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2019.3382"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0059","unstructured":"Kaplan, F. 2020. A Hack Foretold: The Government Has Known About the Vulnerabilities That Allowed the SolarWinds Attack Since the Birth of the Internet \u2013 and Chose Not To fix Them. Slate. December 18, 2020. Accessed January 4 2021. https:\/\/slate.com\/news-and-politics\/2020\/12\/solarwinds-russian-hack-cybersecurity.html."},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2019.1659523"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/885"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.3023225"},{"key":"CIT0063","unstructured":"King, A., and M. Gallagher. 2020. Cyberspace Solium Commission Final Report. United States of America Cyberspace Solarium Commission. March 2020. https:\/\/drive.google.com\/file\/d\/1ryMCIL_dZ30QyjFqFkkf10MxIXJGT4yv\/view."},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77492-3"},{"key":"CIT0065","unstructured":"KPMG. 2017. The New Mindset in Cybersecurity. Accessed December 31, 2020. https:\/\/boardleadership.kpmg.us\/content\/dam\/blc\/pdfs\/2017\/the-new-mindset-in-cyber-security-the-board-lens-presentation.pdf."},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1108\/09600039710162277"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2017.09.003"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1721591"},{"issue":"2","key":"CIT0069","first-page":"107","volume":"2","author":"Liu J.","year":"2020","journal-title":"Journal of Cybersecurity"},{"issue":"2","key":"CIT0070","first-page":"66","volume":"61","author":"Madnick S.","year":"2020","journal-title":"MIT Sloan Management Review"},{"key":"CIT0071","unstructured":"Mandia, K. 2020. FireEye Shares Details of Recent Cyber Attack, Actions to Protect the Community. FireEye Stories. December 8, 2020. Accessed January 4, 2021. https:\/\/www.fireeye.com\/blog\/products-and-services\/2020\/12\/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html."},{"issue":"24","key":"CIT0072","first-page":"1","volume":"9","author":"Mazzoccoli A.","year":"2021","journal-title":"Risks"},{"key":"CIT0073","unstructured":"McAfee. 2012. Threat Predictions. Accessed June 15, 2021. https:\/\/www.mcafee.com\/au\/resources\/reports\/rp-threat-predictions-2012.pdf."},{"key":"CIT0074","unstructured":"Melnyk, S. A., C. Peters, J. Spruill, and K. W. Sullivan. 2018. Implementing Cybsersecurity in DoD Supply Chains: White Paper. Manufacturing Division Survey Results. National Defense Industry Association. July 2018. http:\/\/www.ndia.org\/-\/media\/sites\/ndia\/divisions\/manufacturing\/documents\/cybersecurity-in-dod-supply-chains.ashx?la=en."},{"key":"CIT0076","unstructured":"Melnyk, S. A., C. Speier-Pero, and E. Connors. 2019. Blockchain is Vastly Overrated: Supply Chain Cybersecurity is Vastly Underrated. SupplyChain247, May 5, https:\/\/www.supplychain247.com\/article\/blockchain_is_overrated_supply_chain_cybersecurity_is_underrated\/."},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1111\/jscm.12003"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1086\/226550"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1504\/IJATM.2018.092187"},{"key":"CIT0080","unstructured":"Morrison, S. 2021. How a Major Oil Pipeline Got Held For Ransom. Vox. June 8, 2021. Accessed July 8, 2021. https:\/\/www.vox.com\/recode\/22428774\/ransomeware-pipeline-colonial-darkside-gas-prices."},{"key":"CIT0081","unstructured":"Murphy, P. 2019. Federal Supplier Base Continued to Shrink in Fiscal 2018. Bloomberg Law. May 23, 2019."},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-016-2209-1"},{"key":"CIT0083","unstructured":"NDIA. 2014. National Defense Industry Association\u2019s Manufacturing Division and Cyber Division. 2014. Cybersecurity for Advanced Manufacturing: A White Paper. May 5, 2014."},{"key":"CIT0084","unstructured":"NDIA. 2020. NDIA COVID-19 Small-Business Impacts Survey Summary. Washington, DC: NDIA. (April 23, 2020). Accessed May 15, 2021. https:\/\/www.ndia.org\/-\/media\/sites\/ndia\/policy\/documents\/covid-19-small-business-impacts-survey-summary.ashx."},{"key":"CIT0132","unstructured":"Ngo, M. 2020. \u201cSmall Business are Dying by the Thousands \u2013 and No One is Tracking the Carnage.\u201d Washington Post, August 11, 2020."},{"key":"CIT0085","unstructured":"OECD. 2001. Glossary of Statistical Terms: Small to Medium-Sized Enterprises. Accessed July 8, 2021 at 1530hrs. https:\/\/stats.oecd.org\/glossary\/detail.asp?ID=3123."},{"key":"CIT0086","unstructured":"OECD. 2009. The Impact of the Global Crisis on SME and Entrepreneurship Financing and Policy Responses. OECD Centre for Entrepreneurship, SMEs, and Local Development. Accessed April 19, 2020 at 0945hr. http:\/\/www.oecd.org\/industry\/smes\/49316499.pdf."},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.2307\/259101"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2011.0405"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.05.009"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1108\/09534811211280591"},{"key":"CIT0091","unstructured":"Plante Moran. 2020. Working Relationship Index. Accessed January 22, 2021 at 1400hrs. https:\/\/www.plantemoran.com\/explore-our-thinking\/info\/industries\/automotive\/working-relations-index."},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250130204"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2019-0039"},{"key":"CIT0094","volume-title":"Reason & Rigor: How Conceptual Frameworks Guide Research","author":"Ravitch S. M.","year":"2017"},{"key":"CIT0095","doi-asserted-by":"publisher","DOI":"10.1002\/smj.1948"},{"key":"CIT0096","unstructured":"Roos, G. 2015. Why Supplier Relationships Matter. EPSNEWS.COM. Accessed January 16, 2021 at 1445 hrs. https:\/\/epsnews.com\/2015\/05\/20\/why-supplier-relationships-matter\/."},{"key":"CIT0097","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0098","doi-asserted-by":"publisher","DOI":"10.1504\/IJVCM.2014.062898"},{"key":"CIT0099","doi-asserted-by":"publisher","DOI":"10.15678\/EBER.2020.080110"},{"key":"CIT0133","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2019.09.014"},{"key":"CIT0100","doi-asserted-by":"publisher","DOI":"10.1108\/BIJ-01-2020-0018"},{"key":"CIT0101","unstructured":"Sanger, D. E., N. Perlroth, and E. Schmitt. 2020. Scope of Russian Hack Becomes Clear: Multiple Agencies were Hit. December 15, 2020. Accessed January 5, 2021 at 0030hrs. https:\/\/www.nytimes.com\/2020\/12\/14\/us\/politics\/russia-hack-nsa-homeland-security-pentagon.html."},{"key":"CIT0102","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1856442"},{"key":"CIT0103","volume-title":"The Poems of John Godfrey Saxe","author":"Saxe J. G.","year":"1881"},{"key":"CIT0104","unstructured":"SBA. 2019. Small Businesses Generate 44 percent of U.S. economic Activity. Office of Advocacy. Release No. 19-1 ADV. January 30, 2019. Accessed June 1, 2021. https:\/\/advocacy.sba.gov\/2019\/01\/30\/small-businesses-generate-44-percent-of-u-s-economic-activity\/."},{"key":"CIT0105","doi-asserted-by":"publisher","DOI":"10.1111\/jbl.12249"},{"key":"CIT0106","unstructured":"Shackleford, D. 2015. \u201cCombatting Cyber Risks in the Supply Chain.\u201d SAS Institute InfoSec Reading Room. (September 2015): Accessed January 2, 2021. https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/combatting-cyber-risks-supply-chain-36252."},{"key":"CIT0107","volume-title":"The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage","volume":"1","author":"Sheffi Y.","year":"2005"},{"key":"CIT0108","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.09.017"},{"key":"CIT0109","doi-asserted-by":"publisher","DOI":"10.1080\/00207540601020544"},{"key":"CIT0110","doi-asserted-by":"publisher","DOI":"10.3390\/jtaer3010009"},{"key":"CIT0111","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2928280"},{"key":"CIT0112","volume-title":"Developing Sustainable Supply Chains to Drive Value: Management Issues, Insights, Concepts and Tools","author":"Sroufe R.","year":"2013"},{"key":"CIT0113","volume-title":"The art of war","author":"Sun Tzi","year":"1963"},{"key":"CIT0114","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-10-2019-0382"},{"key":"CIT0115","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-02-2014-0070"},{"key":"CIT0116","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2010.57318905"},{"key":"CIT0117","doi-asserted-by":"publisher","DOI":"10.2307\/2989894"},{"key":"CIT0118","doi-asserted-by":"publisher","DOI":"10.11610\/isij.2904"},{"key":"CIT0119","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_1"},{"key":"CIT0120","unstructured":"Verizon. 2014. Data Breach Investigation Report. Accessed November 3, 2016. www.verizonenterprise.com\/DBIR\/2013."},{"key":"CIT0121","doi-asserted-by":"publisher","DOI":"10.1080\/09537287.2012.705355"},{"key":"CIT0122","doi-asserted-by":"publisher","DOI":"10.2307\/2667086"},{"key":"CIT0123","unstructured":"White House. 2021a. Executive Order on America\u2019s Supply Chains. Executive Order. February 24, 2021. https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/02\/24\/executive-order-on-americas-supply-chains\/."},{"key":"CIT0124","unstructured":"White House. 2021b. Executive Order on Improving the Nation\u2019s Cybersecurity. May 12, 2021. https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/."},{"key":"CIT0125","doi-asserted-by":"publisher","DOI":"10.1108\/09600030810861189"},{"key":"CIT0126","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1720925"},{"key":"CIT0127","unstructured":"Wolf, J. 2020. What Enterprises Can Expect Following the Cyberspace Solarium Commission Report. Security Intelligence. June 1, 2020. Accessed January 13, 2021. https:\/\/securityintelligence.com\/articles\/what-enterprises-can-expect-following-the-cyberspace-solarium-commission-report\/."},{"key":"CIT0129","doi-asserted-by":"publisher","DOI":"10.1177\/0149206316673719"}],"container-title":["International Journal of Production Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207543.2021.1984606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T09:43:25Z","timestamp":1645695805000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207543.2021.1984606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,12]]},"references-count":128,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,2]]}},"alternative-id":["10.1080\/00207543.2021.1984606"],"URL":"https:\/\/doi.org\/10.1080\/00207543.2021.1984606","relation":{},"ISSN":["0020-7543","1366-588X"],"issn-type":[{"value":"0020-7543","type":"print"},{"value":"1366-588X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tprs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-05-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}