{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:36:34Z","timestamp":1775262994654,"version":"3.50.1"},"reference-count":115,"publisher":"Informa UK Limited","issue":"11","funder":[{"name":"European Union\u2019s Seventh Framework Programme"},{"name":"for research","award":["316097"],"award-info":[{"award-number":["316097"]}]},{"name":"The Polish National Science Centre","award":["DEC-2013\/09\/B\/ST6\/02317]"],"award-info":[{"award-number":["DEC-2013\/09\/B\/ST6\/02317]"]}]},{"name":"Faculty of Computer Science and Management"},{"DOI":"10.13039\/501100003406","name":"Finnish Funding Agency for Innovation","doi-asserted-by":"crossref","award":["TEKES\/40111\/"],"award-info":[{"award-number":["TEKES\/40111\/"]}],"id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003406","name":"Finnish Funding Agency for Innovation","doi-asserted-by":"crossref","award":["14"],"award-info":[{"award-number":["14"]}],"id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003406","name":"Finnish Funding Agency for Innovation","doi-asserted-by":"crossref","award":["TEKES\/40107\/14"],"award-info":[{"award-number":["TEKES\/40107\/14"]}],"id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1080\/0144929x.2016.1212932","type":"journal-article","created":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T21:16:00Z","timestamp":1473542160000},"page":"926-945","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":23,"title":["A picture is worth a thousand words: an empirical study on the influence of content visibility on diffusion processes within a virtual world"],"prefix":"10.1080","volume":"35","author":[{"given":"Jaros\u0142aw","family":"Jankowski","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Information Technology, West Pomeranian University of Technology, Szczecin, Poland"},{"name":"Department of Computational Intelligence, Wroclaw University of Technology, Wroc\u0142aw, Poland"}]},{"given":"Piotr","family":"Br\u00f3dka","sequence":"additional","affiliation":[{"name":"Department of Computational Intelligence, Wroclaw University of Technology, Wroc\u0142aw, Poland"}]},{"given":"Juho","family":"Hamari","sequence":"additional","affiliation":[{"name":"Game Research Lab, School of Information Sciences, University of Tampere, Tampere, Finland"}]}],"member":"301","published-online":{"date-parts":[[2016,9,8]]},"reference":[{"key":"CIT0001","unstructured":"Alha, K., E. Koskinen, J. Paavilainen, and J. Hamari. 2016. \u201cCritical Acclaim and Commercial Success in Mobile Free-to-Play Games.\u201d InProceedings of DiGRA FDG Conference, Dundee, August 1\u20136."},{"key":"CIT0002","unstructured":"Alha, K., E. Koskinen, J. Paavilainen, J. Hamari, and J. Kinnunen. 2014. \u201cFree-to-Play Games: Professionals\u2019 Perspectives.\u201d InProceedings of Nordic Digra 2014, Gotland, May 29."},{"key":"CIT0003","volume-title":"Free: The Future of a Radical Price","author":"Anderson C.","year":"2009"},{"key":"CIT0099","volume-title":"Infectious Diseases of Humans, Dynamics and Control","author":"Anderson R. M.","year":"1991"},{"key":"CIT0004","volume-title":"Infectious Diseases of Humans: Dynamics and Control","volume":"28","author":"Anderson R. M.","year":"1992"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.2307\/23042809"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0908800106"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1126\/science.1146930"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/00986280802529079"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Bakshy, E., B. Karrer, and L. A. Adamic. 2009. \u201cSocial Influence and the Diffusion of User-created Content.\u201d InProceedings of the 10th ACM Conference on Electronic Commerce, 325\u2013334. ACM, Stanford, July.","DOI":"10.1145\/1566374.1566421"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0152"},{"key":"CIT0011","volume-title":"Analysis of Infectious Disease Data","volume":"33","author":"Becker N. G.","year":"1989"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.10.0353"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2014.07.001"},{"key":"CIT0014","unstructured":"Boman, M., and S. J. Johansson. 2007. \u201cModeling Epidemic Spread in Synthetic Populations-Virtual Plagues in Massively Multiplayer Online Games.\u201d InProceedings of DiGRA Conference 2007, arXiv preprint arXiv:0705.4584."},{"key":"CIT0015","unstructured":"Boynton, G. R. 2009. \u201cGoing Viral \u2013 The Dynamics of Attention.\u201d InConference Proceedings YouTube and the 2008 Election Cycle, 11\u201338. University of Massachusetts, Amherst, ScholarWorks@ UMass Amherst, April."},{"key":"CIT0016","doi-asserted-by":"crossref","unstructured":"Br\u00f3dka, P., and P. Kazienko. 2014.Multi-layered Social Networks. Encyclopedia of Social Network Analysis and Mining, Vol. 2, 998\u20131013. New York: Springer.","DOI":"10.1007\/978-1-4614-6170-8_239"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2012.696922"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.07.008"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Castronova, E. 2001.Virtual Worlds: A First-hand Account of Market and Society on the Cyberian Frontier. CESifo Working Paper No. 618.","DOI":"10.2139\/ssrn.294828"},{"issue":"2","key":"CIT0100","first-page":"115","volume":"12","author":"Cha J","year":"2011","journal-title":"Journal of Electronic Commerce Research"},{"key":"CIT0020","doi-asserted-by":"crossref","unstructured":"Chen, W., Y. Wang, and S. Yang. 2009. \u201cEfficient Influence Maximization in Social Networks.\u201d InProceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 199\u2013208. ACM, Paris, June.","DOI":"10.1145\/1557019.1557047"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-013-0169-6"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.2501\/S0021849907070547"},{"issue":"3","key":"CIT0023","first-page":"1","volume":"18","author":"Chou C. M.","year":"2013","journal-title":"Journal of Internet Banking and Commerce"},{"key":"CIT0101","first-page":"85","volume-title":"Digital Education Review","volume":"27","author":"Cleghorn J.","year":"2015"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622013500247"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2008.03.004"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2007.01.004"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2012.08.001"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77105-0_27"},{"key":"CIT0029","first-page":"1047","volume":"85","author":"Fairfield J.","year":"2005","journal-title":"Boston University Law Review"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2009.07.013"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2010.09.004"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.642895"},{"key":"CIT0033","volume-title":"Mathematical Modeling in Epidemiology","author":"Frauenthal J. C.","year":"2012"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172660"},{"key":"CIT0102","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.7.392"},{"key":"CIT0035","unstructured":"Golde, S. 2008. \u201cThe Economics of Market Thickness.\u201d PhD thesis, Stanford University."},{"key":"CIT0103","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.004"},{"issue":"3","key":"CIT0104","first-page":"18","volume":"52","author":"Guo Y.","year":"2012","journal-title":"Journal of Computer Information Systems"},{"key":"CIT0036","unstructured":"Hamari, J. 2011. \u201cPerspectives from Behavioral Economics to Analyzing Game Design Patterns: Loss Aversion in Social Games.\u201d InProceedings of CHI\u20192011 (Social Games Workshop), Vancouver, May 7\u201312."},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.01.007"},{"key":"CIT0038","unstructured":"Hamari, J., and A. J\u00e4rvinen. 2011.Building Customer Relationship Through Game Mechanics in Social Games. Business, Technological and Social Dimensions of Computer Games: Multidisciplinary Developments. Hershey, PA: IGI Global."},{"key":"CIT0039","unstructured":"Hamari, J., and L. Keronen. 2016. \u201cWhy Do People Buy Virtual Goods? A Literature Review.\u201d InProceedings of the 49th Annual Hawaii International Conference on System Sciences (HICSS), Kauai, HI, January 5\u20138."},{"issue":"1","key":"CIT0040","first-page":"14","volume":"5","author":"Hamari J.","year":"2010","journal-title":"International Journal of Business Science & Applied Management"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.045"},{"key":"CIT0105","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2013.057818"},{"key":"CIT0042","unstructured":"Hanner, N., and R. Zarnekow. 2015. \u201cPurchasing Behavior in Free to Play Games: Concepts and Empirical Validation.\u201d InIEEE 48th Hawaii International Conference on System Sciences (HICSS), Kauai, 3326\u20133335."},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1002\/cb.383"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1108\/JD-09-2014-0135"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1509\/jm.10.0088"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2008.08.010"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1007\/s10683-011-9273-9"},{"key":"CIT0106","doi-asserted-by":"publisher","DOI":"10.1108\/10662241211235644"},{"key":"CIT0048","doi-asserted-by":"crossref","unstructured":"Huffaker, D. A., C. Y. Teng, M. P. Simmons, L. Gong, and L. A. Adamic. 2011. \u201cGroup Membership and Diffusion in Virtual Worlds.\u201d InPrivacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), Boston, 331\u2013338, October.","DOI":"10.1109\/PASSAT\/SocialCom.2011.218"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-53187-2.00012-7"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.015"},{"key":"CIT0051","doi-asserted-by":"crossref","unstructured":"Jankowski, J., R. Michalski, and P. Kazienko. 2013. \u201cCompensatory Seeding in Networks with Varying Availability of Nodes.\u201d In2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 1242\u20131249, August.","DOI":"10.1145\/2492517.2500256"},{"key":"CIT0052","doi-asserted-by":"crossref","unstructured":"Jin, F., E. Dougherty, P. Saraf, Y. Cao, and N. Ramakrishnan. 2013. \u201cEpidemiological Modeling of News and Rumors on Twitter.\u201d InProceedings of the 7th Workshop on Social Network Mining and Analysis, 8. ACM, Chicago, August.","DOI":"10.1145\/2501025.2501027"},{"key":"CIT0107","unstructured":"Kaburuan, E. R., C.H. Chen, and T.S. Jeng. 2009. \u201cIdentifying Users\u2019 Behavior Purchasing Virtual Items.\u201d The 9th International Conference on Electronic Business, Macau, November 30 - December 4, 2009, 250\u2013256."},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.4101\/jvwr.v3i2.1888"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1177\/1555412009351265"},{"key":"CIT0055","doi-asserted-by":"crossref","unstructured":"Kempe, D., J. Kleinberg, and \u00c9. Tardos. 2003. \u201cMaximizing the Spread of Influence Through a Social Network.\u201d InProceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 137\u2013146. ACM, Washington, August.","DOI":"10.1145\/956750.956769"},{"key":"CIT0108","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0128"},{"key":"CIT0109","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnu016"},{"key":"CIT0056","doi-asserted-by":"crossref","unstructured":"Kr\u00f3l, D., M. Budka, and K. Musial. 2014. \u201cSimulating the Information Diffusion Process in Complex Networks Using Push and Pull Strategies.\u201d In2014 IEEE European Network Intelligence Conference (ENIC), Wroc\u0142aw, 1\u20138, September.","DOI":"10.1109\/ENIC.2014.22"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.02.014"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-009-9028-2"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232727"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183113500472"},{"key":"CIT0110","doi-asserted-by":"publisher","DOI":"10.1177\/1555412010364981"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.2501\/JAR-52-4-465-478"},{"key":"CIT0111","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.2014.42.1.125"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1016\/S1473-3099(07)70212-8"},{"key":"CIT0112","doi-asserted-by":"publisher","DOI":"10.1080\/02642069.2010.503885"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.06.004"},{"issue":"15","key":"CIT0064","first-page":"1987","volume":"20","author":"Lytras M. D.","year":"2014","journal-title":"Journal of Universal Compter Science"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.06.003"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.12.002"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1007\/s00354-014-0402-9"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2014.06.002"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/359868"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1016\/j.ausmj.2013.07.003"},{"key":"CIT0072","volume-title":"Changing Views: Worlds in Play","author":"Neulight N.","year":"2005"},{"key":"CIT0113","doi-asserted-by":"publisher","DOI":"10.1177\/1046878113514808"},{"key":"CIT0114","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.06.013"},{"key":"CIT0073","doi-asserted-by":"crossref","unstructured":"Pathak, N., A. Banerjee, and J. Srivastava. 2010. \u201cA Generalized Linear Threshold Model for Multiple Cascades.\u201d In2010 IEEE 10th International Conference on Data Mining (ICDM), Sydney, 965\u2013970, December.","DOI":"10.1109\/ICDM.2010.153"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1186\/1476-072X-8-50"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.10.007"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1017\/S0021849904040371"},{"issue":"2","key":"CIT0077","first-page":"23","volume":"4","author":"Riedl M. O.","year":"2008","journal-title":"International Transactions on Systems Science and Applications, Special Issue on Agent Based Systems for Human Learning"},{"key":"CIT0078","volume-title":"Diffusion of Innovations","author":"Rogers E. M.","year":"2010"},{"key":"CIT0079","first-page":"529256","volume":"501","author":"Ro\u017cewski P.","year":"2015","journal-title":"Mathematical Problems in Engineering"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.014"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2015.2425961"},{"key":"CIT0082","doi-asserted-by":"crossref","unstructured":"Seeman, L., and Y. Singer. 2013. \u201cAdaptive Seeding in Social Networks.\u201d In2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), Berkeley, 459\u2013468, October.","DOI":"10.1109\/FOCS.2013.56"},{"issue":"1","key":"CIT0083","first-page":"21","volume":"14","author":"Sohn K.","year":"2013","journal-title":"The Journal of Applied B"},{"key":"CIT0084","unstructured":"Stewart, D. B., M. T. Ewing, and D. R. Mather. 2009. \u201cA Conceptual Framework for Viral Marketing.\u201d InAustralian and New Zealand Marketing Academy (ANZMAC) 2009 Sustainable Management and Marketing Conference, Melbourne, edited by Dewi Tojib, 1\u20137."},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290408"},{"key":"CIT0086","doi-asserted-by":"crossref","unstructured":"Stonedahl, F., W. Rand, and U. Wilensky. 2010. \u201cEvolving Viral Marketing Strategies.\u201d InProceedings of the 12th Annual Conference on Genetic and Evolutionary Computation, 1195\u20131202. ACM, Portland, July.","DOI":"10.1145\/1830483.1830701"},{"key":"CIT0087","unstructured":"Taxidou, I., and P. M. Fischer. 2014. \u201cOnline Analysis of Information Diffusion in Twitter.\u201d InProceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion, International World Wide Web Conferences Steering Committee, Seoul, 1313\u20131318."},{"key":"CIT0115","volume-title":"Global Virtual Goods Market 2012\u20132016","author":"TechNavio","year":"2013"},{"key":"CIT0088","unstructured":"Tolvanen, J. 2016.Measuring Moral Hazard Using Panel Data on Insurance. Working Paper. https:\/\/protect-us.mimecast.com\/s\/WDzdBRsbJx9WHJ?domain=dl.dropboxusercontent.com."},{"key":"CIT0089","doi-asserted-by":"crossref","unstructured":"Totti, L. C., F. A. Costa, S. Avila, E. Valle, W. Meira Jr, and V. Almeida. 2014. \u201cThe Impact of Visual Attributes on Online Image Diffusion.\u201d InProceedings of the 2014 ACM Conference on Web Science, 42\u201351. ACM, Bloomington, June.","DOI":"10.1145\/2615569.2615700"},{"issue":"3","key":"CIT0090","first-page":"43","volume":"6","author":"Touibia O.","year":"2011","journal-title":"Economics, Management and Financial Markets"},{"key":"CIT0091","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1090.0520"},{"key":"CIT0116","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-012-9389-2"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0262-1"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.2009.00952.x"},{"key":"CIT0095","volume-title":"Viral Marketing for the Real World","author":"Watts D. J.","year":"2007"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367370111"},{"key":"CIT0097","doi-asserted-by":"crossref","unstructured":"Wohn, D. Y. 2014. \u201cSpending Real Money: Purchasing Patterns of Virtual Goods in an Online Social Game.\u201d InProceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, 3359\u20133368. ACM, New York, April.","DOI":"10.1145\/2556288.2557074"},{"key":"CIT0098","first-page":"355","volume":"10","author":"Yang J.","year":"2010","journal-title":"ICWSM"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2016.1212932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T03:28:07Z","timestamp":1657250887000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2016.1212932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,8]]},"references-count":115,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2016,8,5]]},"published-print":{"date-parts":[[2016,11]]}},"alternative-id":["10.1080\/0144929X.2016.1212932"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2016.1212932","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}