{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T02:14:51Z","timestamp":1773108891826,"version":"3.50.1"},"reference-count":130,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,4,26]]},"DOI":"10.1080\/0144929x.2020.1856928","type":"journal-article","created":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T04:42:36Z","timestamp":1607056956000},"page":"1151-1170","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":27,"title":["The influence of hardiness and habit on security behaviour intention"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9358-2246","authenticated-orcid":false,"given":"Queen A.","family":"Aigbefo","sequence":"first","affiliation":[{"name":"Macquarie University","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0129-7400","authenticated-orcid":false,"given":"Yvette","family":"Blount","sequence":"additional","affiliation":[{"name":"Macquarie University","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3896-6049","authenticated-orcid":false,"given":"Mauricio","family":"Marrone","sequence":"additional","affiliation":[{"name":"Macquarie University","place":["Sydney, Australia"]}]}],"member":"301","published-online":{"date-parts":[[2020,12,4]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"ABS. 2018. \u201cMain Features - Summary of Findings [WWW Document].\u201d Accessed September 21 2019. http:\/\/abs.gov.au\/ausstats\/abs@.nsf\/0\/85372091B76BD119CA257B710014993B?Opendocument."},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0602_02"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/08870446.2011.613995"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-09-2016-0073"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41402-7_6"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130515.3130518"},{"key":"e_1_3_2_12_1","article-title":"Development and Validation of a Short Hardiness Measure","author":"Bartone P. T.","year":"1991","unstructured":"Bartone, P. T. 1991. \u201cDevelopment and Validation of a Short Hardiness Measure.\u201d Annual Convention of the American Psychological Society.","journal-title":"Annual Convention of the American Psychological Society"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327876mp1803s_10"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-21"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1108\/01437730910981908"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.7205\/MILMED-D-11-00200"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2389.2008.00412.x"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250956"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/1612197X.2016.1232743"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9608-8"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/joop.12194"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/02683941111181752"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570610653498"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290305"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/\/0021-9010.85.6.835"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.05.011"},{"key":"e_1_3_2_28_1","first-page":"295","volume-title":"Modern Methods for Business Research","author":"Chin W.","year":"1998","unstructured":"Chin, W. 1998. \u201cThe Partial Least Squares Approach to Structural Equation Modeling.\u201d In Modern Methods for Business Research, 295\u2013336. London: Lawrence Erlbaum Associates."},{"key":"e_1_3_2_29_1","volume-title":"Small and Mighty: How Small and Midmarket Businesses Can Fortify Their Defenses Against Today\u2019s Threats, CYBERSECURITY SPECIAL REPORT","author":"Cisco","year":"2018","unstructured":"Cisco. 2018. Small and Mighty: How Small and Midmarket Businesses Can Fortify Their Defenses Against Today\u2019s Threats, CYBERSECURITY SPECIAL REPORT. San Jose, CA: Cisco Systems."},{"key":"e_1_3_2_30_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988","unstructured":"Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences. 2nd ed. Hillsdale, NJ: L. Erlbaum Associates.","edition":"2"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/17437199.2014.899060"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0057410"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12173"},{"key":"e_1_3_2_36_1","volume-title":"Business Population Estimates for the UK and Regions 2017","author":"DBEIS","year":"2017","unstructured":"DBEIS. 2017. Business Population Estimates for the UK and Regions 2017. London: Department for Business, Energy & Industrial Strategy."},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2015.0972"},{"key":"e_1_3_2_38_1","volume-title":"Belief, Attitude, Intention, and Behaviour: An Introduction to Theory and Research","author":"Fishbein M.","year":"1975","unstructured":"Fishbein, M., and I. Ajzen. 1975. Belief, Attitude, Intention, and Behaviour: An Introduction to Theory and Research. Reading, MA: Addison-Wesley."},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.06.002"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.016"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.48.1.26"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1551934"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.015"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2016-0130"},{"key":"e_1_3_2_48_1","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair J. F.","year":"2017","unstructured":"Hair, J. F., G. T. M. Hult, C. M. Ringle, and M. Sarstedt. 2017b. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). 2nd ed. Thousand Oaks: Sage.","edition":"2"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"e_1_3_2_50_1","volume-title":"Modern Factor Analysis","author":"Harman H. H.","year":"1976","unstructured":"Harman, H. H. 1976. Modern Factor Analysis. Chicago: University of Chicago Press."},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-03-2013-0019"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24466-7_50"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-10-2017-0322"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1623322"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.06.007"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12082"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.4018\/IRMJ.2018010103"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2015.15"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2010.0837"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.003"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1653992"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.37.1.1"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.42.1.168"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2015.1102160"},{"key":"e_1_3_2_69_1","unstructured":"KPMG. 2018. \u201cDigital Supply Chain \u2013 the Hype and the Risks\u201d."},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1539519"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2016.06.002"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2014.2312452"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5222-1_2"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5222-1_3"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118521373.wbeaa002"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.4236\/oalib.1102250"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/17439760903157133"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1037\/1061-4087.50.2.78"},{"key":"e_1_3_2_79_1","volume-title":"The Hardy Executive: Health Under Stress","author":"Maddi S. R.","year":"1984","unstructured":"Maddi, S. R., and S. C. Kobasa. 1984. The Hardy Executive: Health Under Stress. Homewood, IL: Irwin Professional."},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64069-3_10"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/17437199.2010.521684"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.020"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1117369"},{"key":"e_1_3_2_85_1","first-page":"38","article-title":"Relationship Between Hardiness and Exercise Habits in Japanese Undergraduates","volume":"19","author":"Monri T.","year":"2014","unstructured":"Monri, T., M. Tajima, T. Miyakawa, and S. Matsueda. 2014. \u201cRelationship Between Hardiness and Exercise Habits in Japanese Undergraduates.\u201d Kawasaki Journal of Medical Welfare 19: 38\u201344.","journal-title":"Kawasaki Journal of Medical Welfare"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.04.005"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"e_1_3_2_88_1","unstructured":"Office of Advocacy. 2017. \u201cUnited States Small Business Profiles\u201d."},{"key":"e_1_3_2_89_1","unstructured":"Office of Advocacy. 2018. \u201c2018 United States Small Business Profiles\u201d."},{"key":"e_1_3_2_90_1","unstructured":"Office of Advocacy. 2019. \u201cU. S. Small Business Administration [WWW Document].\u201d https:\/\/www.sba.gov\/document\/support--table-size-standards."},{"key":"e_1_3_2_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/17437199.2014.992031"},{"key":"e_1_3_2_92_1","doi-asserted-by":"crossref","unstructured":"Pahnila S. M. Siponen and A. Mahmood. 2007. \u201cEmployees\u2019 Behavior Towards IS Security Policy Compliance.\u201d In: System Sciences 2007. HICSS 2007. 40Th Annual Hawaii International Conference On. IEEE pp. 156b\u2013156b.","DOI":"10.1109\/HICSS.2007.206"},{"key":"e_1_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.01.004"},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-120710-100452"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2004.tb00515.x"},{"key":"e_1_3_2_97_1","volume-title":"2018 Cost of a Data Breach Study (Research)","author":"Ponemon","year":"2018","unstructured":"Ponemon. 2018. 2018 Cost of a Data Breach Study (Research). Michigan."},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"e_1_3_2_100_1","first-page":"47","article-title":"Does Hardiness Improve Resilience?","volume":"3","author":"Puri D. R.","year":"2016","unstructured":"Puri, D. R. 2016. \u201cDoes Hardiness Improve Resilience?\u201d International Journal of Engineering Technology Science and Research 3: 47\u201349.","journal-title":"International Journal of Engineering Technology Science and Research"},{"key":"e_1_3_2_101_1","volume-title":"SmartPLS 3","author":"Ringle C. M.","year":"2015","unstructured":"Ringle, C. M., S. Wende, and J.-M. Becker. 2015. SmartPLS 3. Boenningstedt: SmartPLS GmbH."},{"key":"e_1_3_2_102_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-11-2013-0083"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_2_104_1","volume-title":"Social Psychophysiology","author":"Rogers R. W.","year":"1983","unstructured":"Rogers, R. W. 1983. \u201cCognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation.\u201d In Social Psychophysiology, edited by J. Cacioppo and R. Petty. New York: Guilford Press."},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.024"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.012"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(16)30017-3"},{"key":"e_1_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.1108\/S1474-7979(2011)0000022012"},{"key":"e_1_3_2_109_1","doi-asserted-by":"publisher","DOI":"10.1037\/hea0000387"},{"key":"e_1_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.01.002"},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_12"},{"key":"e_1_3_2_113_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.59"},{"key":"e_1_3_2_114_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2012-0045"},{"key":"e_1_3_2_115_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2015010102"},{"key":"e_1_3_2_116_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1368421"},{"key":"e_1_3_2_117_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.02"},{"key":"e_1_3_2_118_1","doi-asserted-by":"publisher","DOI":"10.2307\/248922"},{"key":"e_1_3_2_119_1","volume-title":"Internet Security Threat Report (No. 23)","author":"Symantec","year":"2018","unstructured":"Symantec. 2018. Internet Security Threat Report (No. 23). Mountain View, CA: Symantec."},{"key":"e_1_3_2_120_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1734087"},{"key":"e_1_3_2_121_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.003"},{"key":"e_1_3_2_122_1","first-page":"17","volume-title":"Thirty Ninth International Conference on Information Systems, San Francisco 2018","author":"Trang S.","year":"2018","unstructured":"Trang, S. 2018. \u201cWhen Does Deterrence Work? A Moderation Meta-Analysis of Employees\u2019 Information Security Policy Behavior.\u201d In Thirty Ninth International Conference on Information Systems, San Francisco 2018, 17. San Francisco, CA."},{"key":"e_1_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.388"},{"key":"e_1_3_2_124_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"e_1_3_2_125_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/14124"},{"key":"e_1_3_2_126_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"key":"e_1_3_2_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"e_1_3_2_128_1","volume-title":"2019 Data Breach Investigations Report (12th), Data Breach Investigations Report","author":"Verizon","year":"2019","unstructured":"Verizon. 2019. 2019 Data Breach Investigations Report (12th), Data Breach Investigations Report. USA: Verizon."},{"key":"e_1_3_2_129_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2003.tb01951.x"},{"key":"e_1_3_2_130_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.006"},{"key":"e_1_3_2_131_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910993980"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2020.1856928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:50:27Z","timestamp":1772765427000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2020.1856928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":130,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4,26]]}},"alternative-id":["10.1080\/0144929X.2020.1856928"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2020.1856928","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-01-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}