{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:18:19Z","timestamp":1770905899907,"version":"3.50.1"},"reference-count":129,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2008,6,30]]},"DOI":"10.1080\/01972240802189468","type":"journal-article","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T23:26:34Z","timestamp":1216423594000},"page":"199-218","source":"Crossref","is-referenced-by-count":21,"title":["Parameters for Software Piracy Research"],"prefix":"10.1080","volume":"24","author":[{"given":"Clyde W.","family":"Holsapple","sequence":"first","affiliation":[{"name":"University of Kentucky","place":["USA"]}]},{"given":"Deepak","family":"Iyengar","sequence":"additional","affiliation":[{"name":"University of Kentucky","place":["USA"]}]},{"given":"Haihao","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Memphis","place":["USA"]}]},{"given":"Shashank","family":"Rao","sequence":"additional","affiliation":[{"name":"University of Kentucky","place":["USA"]}]}],"member":"301","published-online":{"date-parts":[[2008,7,18]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(96)00053-9"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-005-1902-9"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-005-0009-2"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10657-006-5670-5"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoecopol.2006.02.002"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132470"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejpoleco.2005.03.003"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-7187(01)00090-X"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/3857471"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2005.08.029"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1086\/501085"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230104"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2004.11.001"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/792704.792707"},{"issue":"2","key":"e_1_3_3_16_1","first-page":"89","article-title":"A behavioral model of digital music piracy","volume":"14","author":"Bhattacharjee S.","year":"2002","unstructured":"Bhattacharjee , S. , Gopal , R. , Sanders , L. , Agarwal , M. and Wagner , S. 2002 . A behavioral model of digital music piracy . Journal of Organizational Computing and Electronic Commerce , 14 ( 2 ) : 89 \u2013 105 .","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132499"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804618"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022427897034003001"},{"key":"e_1_3_3_20_1","volume-title":"Fourth annual BSA & IDC global software piracy study","author":"BSA","year":"2007","unstructured":"BSA . 2007 . Fourth annual BSA & IDC global software piracy study http:\/\/w3.bsa.org\/globalstudy\/\/upload\/2007-Global-Piracy-Study-EN.pdf (accessed April 1, 2008)"},{"key":"e_1_3_3_21_1","volume-title":"First annual BSA & IDC global software piracy study","author":"BSA and IDC","year":"2004","unstructured":"BSA and IDC . 2004 . First annual BSA & IDC global software piracy study http:\/\/www.caast.com\/resources\/IDC_Global_Software_Piracy_Study_2004.pdf (accessed April 1, 2008)"},{"key":"e_1_3_3_22_1","article-title":"Are you a software thief, but don't know it","author":"Caborn A.","year":"1997","unstructured":"Caborn , A. 1997 . Are you a software thief, but don't know it . Management Today , http:\/\/www.managementtoday.co.uk\/search\/article\/410979\/uk-software-thief-dont-know-it\/ November 1, 1997 (accessed April 1, 2008)","journal-title":"Management Today"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:BUSI.0000032658.12032.4e"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0069"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1997.11518142"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-004-5263-6"},{"issue":"1","key":"e_1_3_3_27_1","first-page":"67","article-title":"Factors influencing software piracy: Implications for accountants","volume":"5","author":"Christinsen A.","year":"1991","unstructured":"Christinsen , A. and Eining , M. 1991 . Factors influencing software piracy: Implications for accountants . Journal of Information Systems , 5 ( 1 ) : 67 \u2013 80 .","journal-title":"Journal of Information Systems"},{"key":"e_1_3_3_28_1","article-title":"Hot products: Understanding, anticipating and reducing the demand for stolen goods","author":"Clarke R.","year":"1999","unstructured":"Clarke , R. 1999 . Hot products: Understanding, anticipating and reducing the demand for stolen goods . United Kingdom Police Research Series , http:\/\/www.crimereduction.gov.uk\/stolengoods1.htm (Paper 112) (accessed October 15, 2007)","journal-title":"United Kingdom Police Research Series"},{"key":"e_1_3_3_29_1","first-page":"1","volume-title":"Routine activity and rational choice","author":"Clarke R.","year":"1993","unstructured":"Clarke , R. and Felson , M. 1993 . \u201c Criminology, routine activity and rational choice\u2014An introduction \u201d . In Routine activity and rational choice , Edited by: Clarke , R. and Felson , M. 1 \u2013 13 . New Brunswick, NJ : Transaction ."},{"key":"e_1_3_3_30_1","first-page":"147","volume-title":"Crime & justice: An annual review of research","author":"Clarke R. V.","year":"1985","unstructured":"Clarke , R. V. and Cornish , D. B. 1985 . \u201c Modeling offenders decisions: A framework for policy & research \u201d . In Crime & justice: An annual review of research Edited by: Tonry , M. and Morris , N. vol. 6 , 147 \u2013 185 ."},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1086\/228750"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.37.2.125"},{"key":"e_1_3_3_34_1","volume-title":"Software Piracy Exposed","author":"Craig P.","year":"2005","unstructured":"Craig , P. and Burnett , M. 2005 . Software Piracy Exposed , Rockland, MA : Syngress ."},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132472"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0047358"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/1350485042000200187"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02074820"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.03.005"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.2307\/1123809"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/1252012"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0040-1625(96)00181-3"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00412817"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-005-4709-9"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1997.11518141"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.4.380"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/348941.349002"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781503621794"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.2307\/3053861"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02221281"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-004-0991-1"},{"issue":"2","key":"e_1_3_3_52_1","first-page":"6","article-title":"Computer crime and abuse by IS employees","volume":"46","author":"Harrington S.","year":"1995","unstructured":"Harrington , S. 1995 . Computer crime and abuse by IS employees . Journal of Systems Management , 46 ( 2 ) : 6 \u2013 11 .","journal-title":"Journal of Systems Management"},{"issue":"2","key":"e_1_3_3_53_1","first-page":"581","article-title":"The effect of piracy on the market penetration of subscription software","volume":"77","author":"Haruvy E.","year":"2004","unstructured":"Haruvy , E. , Mahajan , V. and Prasad , A. 2004 . The effect of piracy on the market penetration of subscription software . Journal of Business , 77 ( 2 ) : 581 \u2013 609 .","journal-title":"Journal of Business"},{"key":"e_1_3_3_54_1","volume-title":"Human ecology: A theory of community structure","author":"Hawley A.","year":"1950","unstructured":"Hawley , A. 1950 . Human ecology: A theory of community structure , New York : Ronald Press ."},{"key":"e_1_3_3_55_1","article-title":"Piracy stats don't add up","author":"Hayes S.","year":"2006","unstructured":"Hayes , S. 2006 . Piracy stats don't add up . Australian IT , http:\/\/www.australianit.news.com.au\/story\/0,24897,20713160-15306,00.html November 7, 2006 (accessed October 16 2007)","journal-title":"Australian IT"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/14786010600615934"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639620490497947"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986201017004006"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024910523384"},{"key":"e_1_3_3_60_1","volume-title":"Causes of delinquency","author":"Hirschi T.","year":"1969","unstructured":"Hirschi , T. 1969 . Causes of delinquency , first edition , Berkeley : University of California Press ."},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.1999070102"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1437043"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006250203828"},{"key":"e_1_3_3_64_1","volume-title":"Eighth annual BSA global software piracy study","author":"International Planning and Research Corporation","year":"2003","unstructured":"International Planning and Research Corporation . 2003 . Eighth annual BSA global software piracy study , Washington DC : Business Software Alliance ."},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6245(02)00110-5"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:BUSI.0000013863.82522.98"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290301784"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2000.11647456"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(96)01090-7"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010715504824"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8608.00323"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/10941660500309648"},{"key":"e_1_3_3_73_1","article-title":"Iceland's net traffic plummets, following P2P raids","author":"Leyden J.","year":"2004","unstructured":"Leyden , J. 2004 . Iceland's net traffic plummets, following P2P raids . The Register , http:\/\/www.theregister.co.uk\/2004\/09\/30\/p2p_raids_iceland\/ September 30, 2004 (accessed 1 April 2008)","journal-title":"The Register"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.835087"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233999"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00871698"},{"key":"e_1_3_3_77_1","first-page":"835","article-title":"Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement","volume":"77","author":"Loren L. P.","year":"1999","unstructured":"Loren , L. P. 1999 . Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement . Washington University Law Review , 77 : 835 \u2013 887 .","journal-title":"Washington University Law Review"},{"issue":"6","key":"e_1_3_3_78_1","first-page":"32","article-title":"Controlling copyright infringements of intellectual property: The case of computer software","volume":"45","author":"Malhotra Y.","year":"1994","unstructured":"Malhotra , Y. 1994 . Controlling copyright infringements of intellectual property: The case of computer software . Journal of Systems Management , 45 ( 6\/7 ) : 32 \u2013 25 .","journal-title":"Journal of Systems Management"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214766"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1465-7295.2000.tb00011.x"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.2307\/248873"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-005-1012-1"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327744joce1503_3"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148722"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.10.005"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903939"},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355129"},{"issue":"4","key":"e_1_3_3_88_1","first-page":"24","article-title":"The attitude of managers to be toward software piracy","volume":"17","author":"Oz E.","year":"1990","unstructured":"Oz , E. 1990 . The attitude of managers to be toward software piracy . ORMS Today , 17 ( 4 ) : 24 \u2013 26 .","journal-title":"ORMS Today"},{"issue":"4","key":"e_1_3_3_89_1","first-page":"50","article-title":"Software: Intellectual property protection alternatives","volume":"46","author":"Oz E.","year":"1995","unstructured":"Oz , E. 1995 . Software: Intellectual property protection alternatives . Journal of Systems Management , 46 ( 4 ) : 50 \u2013 56 .","journal-title":"Journal of Systems Management"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1162\/105864099567622"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/07418828700089271"},{"key":"e_1_3_3_92_1","first-page":"37","volume-title":"Routine activity and rational choice","author":"Paternoster R.","year":"1994","unstructured":"Paternoster , R. and Simpson , S. 1994 . \u201c A rational choice theory of corporate crime \u201d . In Routine activity and rational choice , Edited by: Clarke , R. and Felson , M. 37 \u2013 58 . New Brunswick, NJ : Transaction ."},{"key":"e_1_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.1997.11647313"},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045759"},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1080\/07418820400095761"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-9031-z"},{"key":"e_1_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2003.02.001"},{"key":"e_1_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010312326"},{"key":"e_1_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(99)00010-X"},{"key":"e_1_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2001.11647022"},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socec.2003.12.027"},{"key":"e_1_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.2307\/2087693"},{"key":"e_1_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/13504850500390374"},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449299008924250"},{"issue":"2","key":"e_1_3_3_105_1","first-page":"519","article-title":"Intellectual property and the digital economy: Why the anti-circumvention regulations need to be revised","volume":"14","author":"Samuelson P.","year":"1999","unstructured":"Samuelson , P. 1999 . Intellectual property and the digital economy: Why the anti-circumvention regulations need to be revised . Berkeley Technology Law Journal , 14 ( 2 ) : 519 \u2013 547 .","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/641205.641229"},{"key":"e_1_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1080\/014492998119652"},{"key":"e_1_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/962081.962088"},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0160-791X(01)00037-9"},{"key":"e_1_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-004-3391-4"},{"key":"e_1_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00881451"},{"key":"e_1_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00381852"},{"key":"e_1_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.1080\/08853134.1992.10753905"},{"issue":"3","key":"e_1_3_3_114_1","first-page":"45","article-title":"The effect of demographic factors on attitudes toward software piracy","volume":"30","author":"Solomon S.","year":"1990","unstructured":"Solomon , S. and Obrien , J. 1990 . The effect of demographic factors on attitudes toward software piracy . Journal of Computer Information Systems , 30 ( 3 ) : 45 \u2013 55 .","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.2307\/248772"},{"key":"e_1_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00383392"},{"key":"e_1_3_3_117_1","doi-asserted-by":"publisher","DOI":"10.1108\/07363760210420531"},{"key":"e_1_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.1080\/019722498128980"},{"key":"e_1_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-004-2170-9"},{"key":"e_1_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872679304600401"},{"key":"e_1_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1998.11518203"},{"key":"e_1_3_3_122_1","unstructured":"U.S. Copyright Law . 1993 . http:\/\/www.copyright.gov\/title17\/92chap10.html Copyright Law of the United States of America and related laws contained in article 17 of the United States Code\u2014Circular 92"},{"key":"e_1_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006415514200"},{"key":"e_1_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203164501"},{"key":"e_1_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.1108\/07363760510623939"},{"issue":"6","key":"e_1_3_3_126_1","first-page":"689","article-title":"Dealing with piracy: Intellectual asset management in software and music","volume":"20","author":"Wijk J. V.","year":"2002","unstructured":"Wijk , J. V. 2002 . Dealing with piracy: Intellectual asset management in software and music . European Management Journal , 20 ( 6 ) : 689 \u2013 698 .","journal-title":"European Management Journal"},{"issue":"4","key":"e_1_3_3_127_1","first-page":"114","article-title":"A study of unauthorized software copying among post secondary students in Hong Kong","volume":"22","author":"Wong G.","year":"1990","unstructured":"Wong , G. 1990 . A study of unauthorized software copying among post secondary students in Hong Kong . Australian Computer Journal , 22 ( 4 ) : 114 \u2013 122 .","journal-title":"Australian Computer Journal"},{"issue":"2","key":"e_1_3_3_128_1","first-page":"37","article-title":"Sex as a determinant of software piracy","volume":"36","author":"Wood W.","year":"1995","unstructured":"Wood , W. and Glass , R. 1995 . Sex as a determinant of software piracy . Journal of Computer Information Systems , 36 ( 2 ) : 37 \u2013 40 .","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2006.20.1.49"},{"key":"e_1_3_3_130_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2005.11044326"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972240802189468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T13:28:58Z","timestamp":1770902938000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972240802189468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,30]]},"references-count":129,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,6,30]]}},"alternative-id":["10.1080\/01972240802189468"],"URL":"https:\/\/doi.org\/10.1080\/01972240802189468","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6,30]]}}}