{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:46:26Z","timestamp":1776876386065,"version":"3.51.2"},"reference-count":137,"publisher":"Informa UK Limited","issue":"6","license":[{"start":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T00:00:00Z","timestamp":1682553600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2024,4,25]]},"DOI":"10.1080\/0144929x.2023.2196598","type":"journal-article","created":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T18:43:21Z","timestamp":1682621001000},"page":"1096-1128","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":16,"title":["Adopting information systems at work: a longitudinal examination of trust dynamics, antecedents, and outcomes"],"prefix":"10.1080","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0972-3649","authenticated-orcid":false,"given":"Lea S.","family":"M\u00fcller","sequence":"first","affiliation":[{"name":"Department of Organizational and Business Psychology, University of M\u00fcnster, M\u00fcnster, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-4371","authenticated-orcid":false,"given":"Christoph","family":"Nohe","sequence":"additional","affiliation":[{"name":"Department of Organizational and Business Psychology, University of M\u00fcnster, M\u00fcnster, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0516-1378","authenticated-orcid":false,"given":"Sebastian","family":"Reiners","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of M\u00fcnster, M\u00fcnster, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5690-439X","authenticated-orcid":false,"given":"J\u00f6rg","family":"Becker","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of M\u00fcnster, M\u00fcnster, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7754-2786","authenticated-orcid":false,"given":"Guido","family":"Hertel","sequence":"additional","affiliation":[{"name":"Department of Organizational and Business Psychology, University of M\u00fcnster, M\u00fcnster, Germany"}]}],"member":"301","published-online":{"date-parts":[[2023,4,27]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/1071181312561371"},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-05-2018-0156"},{"key":"e_1_3_5_4_1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4324\/9781315745572-3","volume-title":"The Routledge Companion to Trust","author":"Audrey Korsgaard M.","year":"2018","unstructured":"Audrey Korsgaard, M. 2018. \u201cReciprocal Trust. A Self-Reinforcing Dynamic Process.\u201d In The Routledge Companion to Trust. 1st ed., edited by R. H. Searle, A.-M. I. Nienaber, and S. B. Sitkin, 14\u201318. London: Routledge.","edition":"1"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/21515581.2018.1516557"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2003.11647533"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/02683940710733115"},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1988.11517807"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2005.00035.x"},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.013"},{"key":"e_1_3_5_11_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.107.2.238"},{"key":"e_1_3_5_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.88.3.588"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.9.1.30"},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/00483480310488324"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124189017003004"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1581258"},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.934287"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/875697280503600304"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2012.06.003"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2022.06.001"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2016.1155951"},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11166-012-9147-3"},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.85.1.65"},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogpsych.2010.03.001"},{"key":"e_1_3_5_25_1","unstructured":"Chasin F. D. M. Riehle and M. Rosemann. 2019. \u201cTrust Management \u2013 an Information Systems Perspective.\u201d Proceedings of the 27th European Conference on Information Systems 1\u201313 Stockholm Sweden."},{"key":"e_1_3_5_26_1","doi-asserted-by":"publisher","DOI":"10.2307\/41703503"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/30040651"},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20312"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM0902_5"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2011.6059256"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1027\/1866-5888\/a000075"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240402"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.19"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.5.1359"},{"key":"e_1_3_5_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045748"},{"key":"e_1_3_5_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8325.1998.tb00658.x"},{"key":"e_1_3_5_37_1","doi-asserted-by":"publisher","DOI":"10.1108\/00483480610682299"},{"key":"e_1_3_5_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00038-012-0416-3"},{"key":"e_1_3_5_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.03.119"},{"key":"e_1_3_5_40_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM0803_5"},{"key":"e_1_3_5_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(95)00052-6"},{"key":"e_1_3_5_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303001"},{"key":"e_1_3_5_43_1","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"e_1_3_5_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/21515581.2018.1531657"},{"key":"e_1_3_5_45_1","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.42.2.350"},{"key":"e_1_3_5_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/569905.569910"},{"key":"e_1_3_5_47_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240411"},{"key":"e_1_3_5_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036519"},{"key":"e_1_3_5_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-004-2229-8"},{"key":"e_1_3_5_50_1","doi-asserted-by":"publisher","DOI":"10.5465\/annals.2018.0057"},{"key":"e_1_3_5_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"e_1_3_5_52_1","volume-title":"Multivariate Data Analysis","author":"Hair J. F.","year":"2010","unstructured":"Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson. 2010. Multivariate Data Analysis. 7th ed. New York: Pearson Prentice Hall.","edition":"7"},{"key":"e_1_3_5_53_1","volume-title":"A Primer on Partial Least Squares Structural Equation Modelling (PLS-SEM)","author":"Hair J. F.","year":"2014","unstructured":"Hair, J. F., G. T. M. Hult, C. M. Ringle, and M. Sarstedt. 2014. A Primer on Partial Least Squares Structural Equation Modelling (PLS-SEM). Thousand Oaks, CA: SAGE Publications."},{"key":"e_1_3_5_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/13594320344000228"},{"key":"e_1_3_5_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2019.1574361"},{"key":"e_1_3_5_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2012.11645571"},{"key":"e_1_3_5_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720814547570"},{"key":"e_1_3_5_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-009-0157-x"},{"key":"e_1_3_5_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2018.2874188"},{"issue":"1","key":"e_1_3_5_60_1","first-page":"53","article-title":"The 2017 SIM IT Issues and Trends Study","volume":"17","author":"Kappelman L.","year":"2018","unstructured":"Kappelman, L., V. Johnson, C. Maurer, E. McLean, R. Torres, A. David, and Q. Nguyen. 2018. \u201cThe 2017 SIM IT Issues and Trends Study.\u201d MIS Quarterly Executive 17 (1): 53\u201388.","journal-title":"MIS Quarterly Executive"},{"key":"e_1_3_5_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2012.09.1205"},{"key":"e_1_3_5_62_1","doi-asserted-by":"publisher","DOI":"10.17210\/hcik.2016.01.139"},{"key":"e_1_3_5_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120501.1120506"},{"key":"e_1_3_5_64_1","doi-asserted-by":"publisher","DOI":"10.1055\/s-2007-986199"},{"key":"e_1_3_5_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.624638"},{"key":"e_1_3_5_66_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2000.2904"},{"key":"e_1_3_5_67_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00411"},{"key":"e_1_3_5_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/16258312.2005.11517150"},{"key":"e_1_3_5_69_1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"e_1_3_5_70_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-orgpsych-032516-113147"},{"key":"e_1_3_5_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206306294405"},{"key":"e_1_3_5_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481287"},{"key":"e_1_3_5_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.01.001"},{"key":"e_1_3_5_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-013-0172-y"},{"key":"e_1_3_5_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1959022.1959023"},{"key":"e_1_3_5_76_1","doi-asserted-by":"publisher","DOI":"10.1093\/icc\/dtw038"},{"key":"e_1_3_5_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2007.900792"},{"key":"e_1_3_5_78_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506066042"},{"key":"e_1_3_5_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551505055399"},{"key":"e_1_3_5_80_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478722"},{"key":"e_1_3_5_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.09.006"},{"key":"e_1_3_5_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2012.08.001"},{"key":"e_1_3_5_83_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"e_1_3_5_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.2412"},{"key":"e_1_3_5_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecresq.2006.09.003"},{"key":"e_1_3_5_86_1","first-page":"329","volume-title":"The Blackwell Encyclopedia of Management","author":"McKnight D. H.","year":"2005","unstructured":"McKnight, D. H. 2005. \u201cTrust in Information Technology.\u201d In The Blackwell Encyclopedia of Management, edited by G. B. Davis, 329\u2013331. Malden, MA: Blackwell."},{"key":"e_1_3_5_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_5_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00020-3"},{"key":"e_1_3_5_89_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926622"},{"key":"e_1_3_5_90_1","doi-asserted-by":"publisher","DOI":"10.1026\/0932-4089\/a000306"},{"key":"e_1_3_5_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2020.1758797"},{"key":"e_1_3_5_92_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2009.00239.x"},{"key":"e_1_3_5_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2016.1203024"},{"key":"e_1_3_5_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139408964957"},{"key":"e_1_3_5_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404983.3405515"},{"key":"e_1_3_5_96_1","doi-asserted-by":"publisher","DOI":"10.1026\/0012-1924\/a000067"},{"key":"e_1_3_5_97_1","volume-title":"Management Information Systems","author":"O\u2019Brien J. A.","year":"2010","unstructured":"O\u2019Brien, J. A., and G. M. Marakas. 2010. Management Information Systems. 10th ed. New York: McGraw-Hill\/Irwin.","edition":"10"},{"key":"e_1_3_5_98_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"e_1_3_5_99_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.15"},{"key":"e_1_3_5_100_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206309352110"},{"key":"e_1_3_5_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.243"},{"key":"e_1_3_5_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dr.2016.06.004"},{"key":"e_1_3_5_103_1","volume-title":"Introduction to Information Systems","author":"Rainer R. K.","year":"2021","unstructured":"Rainer, R. K., and B. Prince. 2021. Introduction to Information Systems. Hoboken, NJ: John Wiley & Sons."},{"key":"e_1_3_5_104_1","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"e_1_3_5_105_1","first-page":"319","volume-title":"Trust and Crime in Information Societies","author":"Sasse M. A.","year":"2005","unstructured":"Sasse, M. A. 2005. \u201cUsability and Trust in Information Systems.\u201d In Trust and Crime in Information Societies, edited by R. Mansell and B. Collins, 319\u2013348. Cheltenham: Edward Elgar."},{"key":"e_1_3_5_106_1","unstructured":"Scheer A. W. 2015. Whitepaper - Hochschule 4.0. https:\/\/www.researchgate.net\/publication\/281116948_Whitepaper_-_Hochschule_40."},{"key":"e_1_3_5_107_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2007.24348410"},{"key":"e_1_3_5_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.02.056"},{"key":"e_1_3_5_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.09.013"},{"key":"e_1_3_5_110_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-01-2015-0019"},{"key":"e_1_3_5_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106344"},{"key":"e_1_3_5_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102551"},{"key":"e_1_3_5_113_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2020.1841018"},{"key":"e_1_3_5_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.007"},{"key":"e_1_3_5_115_1","unstructured":"S\u00f6llner M. and P. A. Pavlou. 2016. \u201cA Longitudinal Perspective on Trust in IT Artefacts.\u201d In 24th European Conference on Information Systems (ECIS). Istanbul Turkey."},{"key":"e_1_3_5_116_1","doi-asserted-by":"publisher","DOI":"10.1177\/00131640121971455"},{"key":"e_1_3_5_117_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr2502_4"},{"key":"e_1_3_5_118_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290600571610"},{"key":"e_1_3_5_119_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327752JPA8001_18"},{"key":"e_1_3_5_120_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-4223(02)00017-0"},{"key":"e_1_3_5_121_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-06-2018-0262"},{"key":"e_1_3_5_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2009.2028320"},{"key":"e_1_3_5_123_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2017.1421954"},{"key":"e_1_3_5_124_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj.5483"},{"key":"e_1_3_5_125_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2013.11645666"},{"key":"e_1_3_5_126_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1339367"},{"key":"e_1_3_5_127_1","doi-asserted-by":"publisher","DOI":"10.1177\/109442810031002"},{"key":"e_1_3_5_128_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000445"},{"key":"e_1_3_5_129_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206314543475"},{"key":"e_1_3_5_130_1","doi-asserted-by":"publisher","DOI":"10.1177\/2041386619873616"},{"key":"e_1_3_5_131_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"e_1_3_5_132_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2011.00373.x"},{"key":"e_1_3_5_133_1","doi-asserted-by":"publisher","DOI":"10.1080\/02642069.2015.1047827"},{"key":"e_1_3_5_134_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.116.2.363"},{"key":"e_1_3_5_135_1","first-page":"219","volume-title":"Modeling Longitudinal and Multilevel Data: Practical Issues, Applied Approaches and Specific Examples","author":"Wothke W.","year":"2000","unstructured":"Wothke, W. 2000. \u201cLongitudinal and Multi-Group Modeling with Missing Data.\u201d In Modeling Longitudinal and Multilevel Data: Practical Issues, Applied Approaches and Specific Examples, edited by T. D. Little, K. U. Schnabel, and J. Baumert, 219\u2013240. Mahwah, NJ: Lawrence Erlbaum Associates, Inc."},{"key":"e_1_3_5_136_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705510701301677"},{"key":"e_1_3_5_137_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-09-2014-0262"},{"key":"e_1_3_5_138_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0528"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2023.2196598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T07:34:37Z","timestamp":1714030477000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2023.2196598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,27]]},"references-count":137,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,4,25]]}},"alternative-id":["10.1080\/0144929X.2023.2196598"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2023.2196598","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,27]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-07-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}