{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:35:41Z","timestamp":1727238941714},"reference-count":130,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2024,2,17]]},"DOI":"10.1080\/0144929x.2023.2178830","type":"journal-article","created":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T11:14:01Z","timestamp":1676891641000},"page":"551-570","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Disentangling the relation among trust, efficacy and privacy management: a moderated mediation analysis of public support for government surveillance during the COVID-19 pandemic"],"prefix":"10.1080","volume":"43","author":[{"given":"Jing","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Accountancy, Economics and Finance, Hong Kong Baptist University, Hong Kong, Hong Kong"}]},{"given":"Marko M.","family":"Skoric","sequence":"additional","affiliation":[{"name":"Department of Media and Communication, City University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Chen","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]}],"member":"301","published-online":{"date-parts":[[2023,2,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_3_2_1","DOI":"10.1136\/amiajnl-2013-002079"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_1","DOI":"10.1016\/0749-5978(91)90020-T"},{"doi-asserted-by":"publisher","key":"e_1_3_3_4_1","DOI":"10.2196\/19857"},{"issue":"2","key":"e_1_3_3_5_1","first-page":"1","article-title":"Multiple Indicators in Survey Research: The Concept \"Sense of Political Efficacy\u201d","volume":"1","author":"Balch G. I.","year":"1974","unstructured":"Balch, G. I. 1974. \u201cMultiple Indicators in Survey Research: The Concept \"Sense of Political Efficacy\u201d.\u201d Political Methodology 1 (2): 1\u201343.","journal-title":"Political Methodology"},{"doi-asserted-by":"publisher","key":"e_1_3_3_6_1","DOI":"10.1080\/10413209008406426"},{"key":"e_1_3_3_7_1","volume-title":"Self-efficacy: The Exercise of Control","author":"Bandura A.","year":"1997","unstructured":"Bandura, A. 1997. Self-efficacy: The Exercise of Control. New York: W. H. Freeman."},{"doi-asserted-by":"publisher","key":"e_1_3_3_8_1","DOI":"10.1207\/S1532785XMEP0303_03"},{"doi-asserted-by":"publisher","key":"e_1_3_3_9_1","DOI":"10.1146\/annurev.psych.52.1.1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_10_1","DOI":"10.1057\/ejis.2014.41"},{"doi-asserted-by":"publisher","key":"e_1_3_3_11_1","DOI":"10.1016\/j.jpubeco.2020.104316"},{"doi-asserted-by":"publisher","key":"e_1_3_3_12_1","DOI":"10.1016\/j.tele.2017.04.013"},{"doi-asserted-by":"publisher","key":"e_1_3_3_13_1","DOI":"10.1016\/j.tele.2019.03.003"},{"doi-asserted-by":"publisher","key":"e_1_3_3_14_1","DOI":"10.1111\/lasr.12200"},{"doi-asserted-by":"publisher","key":"e_1_3_3_15_1","DOI":"10.1007\/s11127-006-9069-1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_16_1","DOI":"10.1177\/1948550612455931"},{"key":"e_1_3_3_17_1","volume-title":"The Voter Decides","author":"Campbell A.","year":"1954","unstructured":"Campbell, A., G. Gurin, and W. E. Miller. 1954. The Voter Decides. New York: Row, Peterson, and Company."},{"doi-asserted-by":"publisher","key":"e_1_3_3_18_1","DOI":"10.1080\/17544750.2017.1372493"},{"key":"e_1_3_3_19_1","volume-title":"Hong Kong Sees Rush for Burner Phones as Government Pushes Contact-Tracing app","author":"Chan J.","year":"2021","unstructured":"Chan, J. 2021, Feb 18. Hong Kong Sees Rush for Burner Phones as Government Pushes Contact-Tracing app. Hong Kong: Reuters. https:\/\/www.reuters.com\/article\/health-coronavirus-hongkong-idINKBN2AI0JY."},{"doi-asserted-by":"publisher","key":"e_1_3_3_20_1","DOI":"10.1086\/317987"},{"doi-asserted-by":"publisher","key":"e_1_3_3_21_1","DOI":"10.1177\/0002764218792691"},{"doi-asserted-by":"publisher","key":"e_1_3_3_22_1","DOI":"10.1089\/cyber.2014.0456"},{"doi-asserted-by":"publisher","key":"e_1_3_3_23_1","DOI":"10.1017\/S0007123400005639"},{"doi-asserted-by":"publisher","key":"e_1_3_3_24_1","DOI":"10.2307\/2136633"},{"doi-asserted-by":"publisher","key":"e_1_3_3_25_1","DOI":"10.1111\/j.1530-2415.2005.00071.x"},{"key":"e_1_3_3_26_1","first-page":"263","volume-title":"The Human Meaning of Social Change","author":"Converse P. E.","year":"1972","unstructured":"Converse, P. E.. 1972. \u201cChange in the American Electorate.\u201d In The Human Meaning of Social Change, edited by A. Campell and P. E. Converse, 263\u2013337. New York: Russell Sage Foundation."},{"doi-asserted-by":"publisher","key":"e_1_3_3_27_1","DOI":"10.1177\/1532673X7900700207"},{"issue":"3","key":"e_1_3_3_28_1","first-page":"85","article-title":"Measuring Political Efficacy","volume":"8","author":"Craig S. C.","year":"1982","unstructured":"Craig, S. C., and M. A. Maggiotto. 1982. \u201cMeasuring Political Efficacy.\u201d Political Methodology 8 (3): 85\u2013109.","journal-title":"Political Methodology"},{"doi-asserted-by":"publisher","key":"e_1_3_3_29_1","DOI":"10.1007\/BF00992337"},{"doi-asserted-by":"publisher","key":"e_1_3_3_30_1","DOI":"10.1287\/orsc.10.1.104"},{"doi-asserted-by":"publisher","key":"e_1_3_3_31_1","DOI":"10.1111\/1540-4560.00067"},{"doi-asserted-by":"publisher","key":"e_1_3_3_32_1","DOI":"10.2307\/249008"},{"key":"e_1_3_3_33_1","volume-title":"Negative Liberty: Public Opinion and the Terrorist Attacks on America","author":"Davis D. W.","year":"2007","unstructured":"Davis, D. W. 2007. Negative Liberty: Public Opinion and the Terrorist Attacks on America. New York: Russell Sage Foundation."},{"doi-asserted-by":"publisher","key":"e_1_3_3_34_1","DOI":"10.1111\/j.0092-5853.2004.00054.x"},{"doi-asserted-by":"publisher","key":"e_1_3_3_35_1","DOI":"10.1111\/j.1540-4560.1977.tb01885.x"},{"doi-asserted-by":"publisher","key":"e_1_3_3_36_1","DOI":"10.1111\/jcc4.12163"},{"doi-asserted-by":"publisher","key":"e_1_3_3_37_1","DOI":"10.1002\/ejsp.2049"},{"doi-asserted-by":"publisher","key":"e_1_3_3_38_1","DOI":"10.2307\/20721433"},{"doi-asserted-by":"publisher","key":"e_1_3_3_39_1","DOI":"10.4018\/jgim.2006100103"},{"doi-asserted-by":"crossref","unstructured":"Dinev T. and P. Hart. 2003. Privacy concerns and internet use - a model of trade-off factors. Academy of Management Proceedings.","key":"e_1_3_3_40_1","DOI":"10.5465\/ambpp.2003.13792464"},{"doi-asserted-by":"publisher","key":"e_1_3_3_41_1","DOI":"10.1080\/01449290410001715723"},{"doi-asserted-by":"publisher","key":"e_1_3_3_42_1","DOI":"10.1287\/isre.1060.0080"},{"doi-asserted-by":"publisher","key":"e_1_3_3_43_1","DOI":"10.1016\/j.jsis.2007.09.002"},{"doi-asserted-by":"publisher","key":"e_1_3_3_44_1","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_3_3_45_1","volume-title":"Radical Media: Rebellious Communication and Social Movements","author":"Downing J. D.","year":"2000","unstructured":"Downing, J. D. 2000. Radical Media: Rebellious Communication and Social Movements. CA: Sage."},{"doi-asserted-by":"publisher","key":"e_1_3_3_46_1","DOI":"10.1108\/JCM-03-2021-4510"},{"doi-asserted-by":"publisher","key":"e_1_3_3_47_1","DOI":"10.1016\/j.chb.2021.106806"},{"doi-asserted-by":"publisher","key":"e_1_3_3_48_1","DOI":"10.24908\/ss.v18i1.13985"},{"doi-asserted-by":"publisher","key":"e_1_3_3_49_1","DOI":"10.1017\/CBO9780511625138.008"},{"doi-asserted-by":"publisher","key":"e_1_3_3_50_1","DOI":"10.14786\/flr.v5i4.301"},{"doi-asserted-by":"publisher","key":"e_1_3_3_51_1","DOI":"10.1080\/01292980701306530"},{"doi-asserted-by":"publisher","key":"e_1_3_3_52_1","DOI":"10.1016\/j.cose.2018.04.002"},{"doi-asserted-by":"publisher","key":"e_1_3_3_53_1","DOI":"10.1007\/s10869-004-2229-8"},{"key":"e_1_3_3_54_1","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman E.","year":"1959","unstructured":"Goffman, E. 1959. The Presentation of Self in Everyday Life. New York: Knopf Doubleday Publishing Group."},{"key":"e_1_3_3_55_1","volume-title":"Stigma: Notes on the Management of Spoiled Identity","author":"Goffman E.","year":"1963","unstructured":"Goffman, E. 1963. Stigma: Notes on the Management of Spoiled Identity. NJ: Prence-Hall."},{"doi-asserted-by":"publisher","key":"e_1_3_3_56_1","DOI":"10.1007\/s10551-014-2346-x"},{"issue":"1","key":"e_1_3_3_57_1","first-page":"48","article-title":"Past as Prologue: Intercept and Surveillance Rules Under Hong Kong\u2019s National Security Law","volume":"20","author":"Hargreaves S.","year":"2021","unstructured":"Hargreaves, S. 2021. \u201cPast as Prologue: Intercept and Surveillance Rules Under Hong Kong\u2019s National Security Law.\u201d Santa Clara Journal of International Law 20 (1): 48\u201379.","journal-title":"Santa Clara Journal of International Law"},{"doi-asserted-by":"publisher","key":"e_1_3_3_58_1","DOI":"10.1108\/JCM-03-2021-4559"},{"key":"e_1_3_3_59_1","volume-title":"Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach","author":"Hayes A. F.","year":"2017","unstructured":"Hayes, A. F. 2017. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach. New York: Guilford publications."},{"doi-asserted-by":"publisher","key":"e_1_3_3_60_1","DOI":"10.1515\/9780691188690"},{"doi-asserted-by":"publisher","key":"e_1_3_3_61_1","DOI":"10.5817\/CP2016-4-7"},{"key":"e_1_3_3_62_1","first-page":"255","volume-title":"Framing Terrorism: The News Media, the Government, and the Public","author":"Huddy L.","year":"2003","unstructured":"Huddy, L., S. Feldman, and G. Lahav. 2003. \u201cFear and Terrorism: Psychological Reactions to 9\/11.\u201d In Framing Terrorism: The News Media, the Government, and the Public, edited by P. Norris, M. Kern, and M. Just, 255\u2013278. New York: Routledge."},{"doi-asserted-by":"publisher","key":"e_1_3_3_63_1","DOI":"10.1111\/j.1540-5907.2005.00144.x"},{"doi-asserted-by":"publisher","key":"e_1_3_3_64_1","DOI":"10.1016\/j.techsoc.2021.101774"},{"doi-asserted-by":"publisher","key":"e_1_3_3_65_1","DOI":"10.1086\/268589"},{"unstructured":"Joinson A. N. C. Paine U.-D. Reips and T. Buchanan. 2006. Privacy and trust: The role of situational and dispositional variables in online disclosure. Workshop on Privacy Trust and Identity Issues for Ambient Intelligence.","key":"e_1_3_3_66_1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_67_1","DOI":"10.1080\/07370020903586662"},{"doi-asserted-by":"publisher","key":"e_1_3_3_68_1","DOI":"10.1146\/annurev.polisci.6.121901.085719"},{"doi-asserted-by":"publisher","key":"e_1_3_3_69_1","DOI":"10.1111\/j.1540-5907.2007.00248.x"},{"unstructured":"Kininmonth J. N. Thompson T. McGill and A. Bunn. 2018. Privacy concerns and acceptance of government surveillance in Australia.","key":"e_1_3_3_70_1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_71_1","DOI":"10.1016\/j.cose.2015.07.002"},{"doi-asserted-by":"publisher","key":"e_1_3_3_72_1","DOI":"10.1057\/jit.2010.6"},{"doi-asserted-by":"publisher","key":"e_1_3_3_73_1","DOI":"10.1080\/0144929X.2018.1470671"},{"doi-asserted-by":"publisher","key":"e_1_3_3_74_1","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"doi-asserted-by":"publisher","key":"e_1_3_3_75_1","DOI":"10.1093\/ijpor\/edu040"},{"doi-asserted-by":"publisher","key":"e_1_3_3_76_1","DOI":"10.4000\/chinaperspectives.8009"},{"doi-asserted-by":"publisher","key":"e_1_3_3_77_1","DOI":"10.1007\/s13394-021-00394-7"},{"doi-asserted-by":"publisher","key":"e_1_3_3_78_1","DOI":"10.1080\/13183222.2015.1041229"},{"doi-asserted-by":"publisher","key":"e_1_3_3_79_1","DOI":"10.1177\/1940161214530787"},{"doi-asserted-by":"publisher","key":"e_1_3_3_80_1","DOI":"10.1371\/journal.pone.0245740"},{"doi-asserted-by":"publisher","key":"e_1_3_3_81_1","DOI":"10.2307\/2578601"},{"doi-asserted-by":"publisher","key":"e_1_3_3_82_1","DOI":"10.1016\/j.im.2011.09.006"},{"doi-asserted-by":"publisher","key":"e_1_3_3_83_1","DOI":"10.1177\/1461444820912544"},{"doi-asserted-by":"publisher","key":"e_1_3_3_84_1","DOI":"10.1080\/10670560500115416"},{"doi-asserted-by":"publisher","key":"e_1_3_3_85_1","DOI":"10.1002\/nvsm.1636"},{"doi-asserted-by":"publisher","key":"e_1_3_3_86_1","DOI":"10.1287\/isre.1040.0032"},{"doi-asserted-by":"publisher","key":"e_1_3_3_87_1","DOI":"10.1111\/1540-4560.00071"},{"doi-asserted-by":"publisher","key":"e_1_3_3_88_1","DOI":"10.2307\/258792"},{"doi-asserted-by":"publisher","key":"e_1_3_3_89_1","DOI":"10.1145\/1985347.1985353"},{"doi-asserted-by":"publisher","key":"e_1_3_3_90_1","DOI":"10.2307\/259290"},{"doi-asserted-by":"publisher","key":"e_1_3_3_91_1","DOI":"10.1111\/j.1083-6101.2004.tb00292.x"},{"doi-asserted-by":"publisher","key":"e_1_3_3_92_1","DOI":"10.1016\/j.soscij.2018.10.001"},{"doi-asserted-by":"publisher","key":"e_1_3_3_93_1","DOI":"10.2196\/25893"},{"doi-asserted-by":"crossref","unstructured":"Olson J. S. J. Grudin and E. Horvitz. 2005. A study of preferences for sharing and privacy. CHI'05 extended abstracts on Human factors in computing systems.","key":"e_1_3_3_94_1","DOI":"10.1145\/1056808.1057073"},{"doi-asserted-by":"publisher","key":"e_1_3_3_95_1","DOI":"10.1111\/j.1467-6494.2009.00618.x"},{"doi-asserted-by":"publisher","key":"e_1_3_3_96_1","DOI":"10.1080\/10864415.2003.11044275"},{"doi-asserted-by":"publisher","key":"e_1_3_3_97_1","DOI":"10.1177\/0963662510376886"},{"doi-asserted-by":"publisher","key":"e_1_3_3_98_1","DOI":"10.1177\/14614448221097305"},{"doi-asserted-by":"publisher","key":"e_1_3_3_99_1","DOI":"10.1016\/j.tmaid.2022.102358"},{"doi-asserted-by":"publisher","key":"e_1_3_3_100_1","DOI":"10.1016\/j.elerap.2014.06.007"},{"doi-asserted-by":"publisher","key":"e_1_3_3_101_1","DOI":"10.1016\/j.tele.2019.101303"},{"doi-asserted-by":"publisher","key":"e_1_3_3_102_1","DOI":"10.2307\/422441"},{"doi-asserted-by":"publisher","key":"e_1_3_3_103_1","DOI":"10.1038\/d41586-020-01693-y"},{"key":"e_1_3_3_104_1","first-page":"745","article-title":"I\u2019ve got Nothing to Hide and Other Misunderstandings of Privacy","volume":"44","author":"Solove D. J.","year":"2007","unstructured":"Solove, D. J. 2007. \u201cI\u2019ve got Nothing to Hide and Other Misunderstandings of Privacy.\u201d San Diego Law Review 44: 745\u2013772.","journal-title":"San Diego Law Review"},{"key":"e_1_3_3_105_1","volume-title":"Understanding Privacy","author":"Solove D. J.","year":"2008","unstructured":"Solove, D. J. 2008. Understanding Privacy. Cambridge: Harvard University Press."},{"doi-asserted-by":"publisher","key":"e_1_3_3_106_1","DOI":"10.1287\/orsc.14.1.5.12810"},{"issue":"3","key":"e_1_3_3_107_1","first-page":"349","article-title":"Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms","volume":"8","author":"Stone E. F.","year":"1990","unstructured":"Stone, E. F., and D. L. Stone. 1990. \u201cPrivacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms.\u201d Research in Personnel and Human Resources Management 8 (3): 349\u2013411.","journal-title":"Research in Personnel and Human Resources Management"},{"doi-asserted-by":"publisher","key":"e_1_3_3_108_1","DOI":"10.1017\/S0007123412000324"},{"key":"e_1_3_3_109_1","first-page":"255","article-title":"Privacy, Surveillance, and Self-Disclosure in the Social web","volume":"16","author":"Taddicken M.","year":"2013","unstructured":"Taddicken, M. 2013. \u201cPrivacy, Surveillance, and Self-Disclosure in the Social web.\u201d Internet and Surveillance: The Challenges of Web 2.0 and Social Media 16: 255\u2013272.","journal-title":"Internet and Surveillance: The Challenges of Web 2.0 and Social Media"},{"doi-asserted-by":"publisher","key":"e_1_3_3_110_1","DOI":"10.1111\/jcc4.12052"},{"doi-asserted-by":"publisher","key":"e_1_3_3_111_1","DOI":"10.1002\/asi.24372"},{"doi-asserted-by":"publisher","key":"e_1_3_3_112_1","DOI":"10.1348\/014466602165081"},{"doi-asserted-by":"publisher","key":"e_1_3_3_113_1","DOI":"10.1016\/j.giq.2017.07.003"},{"unstructured":"UN. 2020. Digital technologies critical in facing COVID-19 pandemic. United Nations Department of Economic and Social Affairs. https:\/\/www.un.org\/development\/desa\/en\/news\/policy\/digital-technologies-critical-in-facing-covid-19-pandemic.html.","key":"e_1_3_3_114_1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_115_1","DOI":"10.1017\/CBO9780511614934"},{"doi-asserted-by":"publisher","key":"e_1_3_3_116_1","DOI":"10.1017\/9781316888667"},{"key":"e_1_3_3_117_1","first-page":"22","article-title":"Digital Amplification of Fringe Voices: Alternative Media and Street Politics in Hong Kong","volume":"12","author":"Wang Y.","year":"2018","unstructured":"Wang, Y. 2018. \u201cDigital Amplification of Fringe Voices: Alternative Media and Street Politics in Hong Kong.\u201d International Journal of Communication 12: 22.","journal-title":"International Journal of Communication"},{"doi-asserted-by":"publisher","key":"e_1_3_3_118_1","DOI":"10.1080\/0144929X.2016.1143033"},{"doi-asserted-by":"publisher","key":"e_1_3_3_119_1","DOI":"10.2307\/1321160"},{"key":"e_1_3_3_120_1","volume-title":"Privacy and Freedom","author":"Westin A. F.","year":"1967","unstructured":"Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum."},{"doi-asserted-by":"publisher","key":"e_1_3_3_121_1","DOI":"10.1111\/1540-4560.00072"},{"unstructured":"Wilson D. J. Proudfoot and J. Valacich. 2014. Saving face on Facebook: Privacy concerns social benefits and impression management.","key":"e_1_3_3_122_1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_123_1","DOI":"10.1016\/j.chb.2021.106938"},{"doi-asserted-by":"publisher","key":"e_1_3_3_124_1","DOI":"10.1371\/journal.pone.0238973"},{"doi-asserted-by":"publisher","key":"e_1_3_3_125_1","DOI":"10.1016\/j.chb.2011.12.008"},{"doi-asserted-by":"publisher","key":"e_1_3_3_126_1","DOI":"10.1159\/000092659"},{"doi-asserted-by":"publisher","key":"e_1_3_3_127_1","DOI":"10.1177\/0963662507085162"},{"doi-asserted-by":"publisher","key":"e_1_3_3_128_1","DOI":"10.1080\/0144929X.2018.1552717"},{"doi-asserted-by":"publisher","key":"e_1_3_3_129_1","DOI":"10.17705\/1jais.00281"},{"doi-asserted-by":"publisher","key":"e_1_3_3_130_1","DOI":"10.1016\/j.dss.2010.11.017"},{"doi-asserted-by":"publisher","key":"e_1_3_3_131_1","DOI":"10.1080\/0144929X.2022.2046162"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2023.2178830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T19:24:05Z","timestamp":1727205845000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2023.2178830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":130,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,2,17]]}},"alternative-id":["10.1080\/0144929X.2023.2178830"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2023.2178830","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2023,2,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-10-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}