{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T05:35:00Z","timestamp":1771911300623,"version":"3.50.1"},"reference-count":125,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["European Journal of Information Systems"],"published-print":{"date-parts":[[2025,7,4]]},"DOI":"10.1080\/0960085x.2024.2359460","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T06:14:04Z","timestamp":1717395244000},"page":"565-588","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["A field experiment on ISP training designs for enhancing employee information security compliance"],"prefix":"10.1080","volume":"34","author":[{"given":"Ilja","family":"Nastjuk","sequence":"first","affiliation":[{"name":"Georg-August-Universit\u00e4t G\u00f6ttingen","place":["G\u00f6ttingen, Germany"]}]},{"given":"Florian","family":"Rampold","sequence":"additional","affiliation":[{"name":"Georg-August-Universit\u00e4t G\u00f6ttingen","place":["G\u00f6ttingen, Germany"]}]},{"given":"Simon","family":"Trang","sequence":"additional","affiliation":[{"name":"University of Paderborn","place":["Paderborn, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9142-4508","authenticated-orcid":false,"given":"Jose","family":"Benitez","sequence":"additional","affiliation":[{"name":"Kent State University","place":["Kent, USA"]}]}],"member":"301","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250961"},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543061003315"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.635"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333"},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00583"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393203"},{"key":"e_1_3_5_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8116(91)90020-8"},{"issue":"4","key":"e_1_3_5_12_1","first-page":"143","article-title":"A study of the effectiveness of remote instruction from students\u2019 perspectives","volume":"21","author":"Bai X.","year":"2020","unstructured":"Bai, X., Ola, A., Reese, S., Eyob, E., & Bazemore, S. (2020). A study of the effectiveness of remote instruction from students\u2019 perspectives. Issues in Information Systems, 21(4), 143\u2013155.","journal-title":"Issues in Information Systems"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1988.tb00632.x"},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/09576050210447019"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.08.002"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206309352880"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30046-4"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645767"},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290305"},{"key":"e_1_3_5_23_1","first-page":"521","volume-title":"Proceeding from \u201cEDEN Annual Conference-Expanded Learning Scenarios\u201d","author":"Cigognini M. E.","year":"2015","unstructured":"Cigognini, M. E., Paoletti, G., Fattorini, R., & Boscarol, M. (2015, June). Lecture vs Webinar: Engagement and distraction in distance learning adult teachers. Proceeding from \u201cEDEN Annual Conference-Expanded Learning Scenarios\u201d, Barcelona, Spain (pp. 521\u2013530)."},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.017"},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/15117"},{"key":"e_1_3_5_26_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0059-9"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"issue":"2","key":"e_1_3_5_28_1","first-page":"3","article-title":"Towards a best fit between organisational security countermeasures and information systems misuse behaviors","volume":"3","author":"D\u2019Arcy J.","year":"2007","unstructured":"D\u2019Arcy, J., & Hovav, A. (2007). Towards a best fit between organisational security countermeasures and information systems misuse behaviors. Journal of Information System Security, 3(2), 3\u201331.","journal-title":"Journal of Information System Security"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9909-7"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12173"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2021.101693"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2020.1797546"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2010.05.002"},{"key":"e_1_3_5_35_1","unstructured":"ENISA. (2007). European report: Information security awareness initiatives: Current practice and the measurement of success. Retrieved November 6 2023 from. https:\/\/ifap.ru\/library\/book206.pdf"},{"key":"e_1_3_5_36_1","unstructured":"Esentire. (2022). Esentire official cybercrime report. Retrieved November 6 2023 from. https:\/\/www.esentire.com\/resources\/library\/2022-official-cybercrime-report 2022"},{"key":"e_1_3_5_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/014920639502100101"},{"key":"e_1_3_5_38_1","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.4.1149"},{"key":"e_1_3_5_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"e_1_3_5_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-015-0469-y"},{"key":"e_1_3_5_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-8327.1997.tb00047.x"},{"key":"e_1_3_5_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/13540600701837582"},{"key":"e_1_3_5_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(92)90033-G"},{"key":"e_1_3_5_44_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-12"},{"key":"e_1_3_5_45_1","volume-title":"Multivariate data analysis","author":"Hair J. F.","year":"2009","unstructured":"Hair, J. F. (2009). Multivariate data analysis. Pearson Prentice Hall Upper Saddle River."},{"key":"e_1_3_5_46_1","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/43298.9.6.20010102\/30985.4"},{"key":"e_1_3_5_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"e_1_3_5_48_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_5_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.06.007"},{"key":"e_1_3_5_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2021.1913671"},{"key":"e_1_3_5_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195:AID-SMJ13>3.0.CO;2-7"},{"key":"e_1_3_5_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-017-0532-y"},{"key":"e_1_3_5_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103252"},{"key":"e_1_3_5_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"e_1_3_5_55_1","volume-title":"ISO\/IEC 27002:2022 Information technology \u2014 Security techniques \u2014 Code of practice for information security controls","author":"ISO\/IEC","year":"2022","unstructured":"ISO\/IEC. (2022). ISO\/IEC 27002:2022 Information technology \u2014 Security techniques \u2014 Code of practice for information security controls (Vol. 2022)."},{"key":"e_1_3_5_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.10.004"},{"key":"e_1_3_5_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"e_1_3_5_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2020.1793696"},{"key":"e_1_3_5_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103020"},{"key":"e_1_3_5_60_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"e_1_3_5_61_1","doi-asserted-by":"publisher","DOI":"10.1111\/deci.12328"},{"key":"e_1_3_5_62_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2015.15"},{"key":"e_1_3_5_63_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"e_1_3_5_64_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00274"},{"key":"e_1_3_5_65_1","volume-title":"Proceedings of the Pacific Asia Conference on Information Systems","author":"Karjalainen M.","year":"2013","unstructured":"Karjalainen, M., Siponen, M., Petri, P., & Suprateek, S. (2013). One size does not fit all: Different cultures require different information systems security interventions. Proceedings of the Pacific Asia Conference on Information Systems, Jeju Island, Korea."},{"key":"e_1_3_5_66_1","unstructured":"Kaspersky. (2018). Not so know-it-all: Just 12% of employees are fully aware of their organization\u2019s it security policies. Retrieved November 6 2023 from. https:\/\/www.kaspersky.com\/about\/press-releases\/2017_organizations-it-security-policies"},{"key":"e_1_3_5_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272516.1272521"},{"key":"e_1_3_5_68_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1921417117"},{"key":"e_1_3_5_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12186-015-9139-y"},{"key":"e_1_3_5_70_1","volume-title":"The adult learner: The definitive classic in adult education and human resource development","author":"Knowles M. S.","year":"2015","unstructured":"Knowles, M. S., Holton Iii, E. F., Swanson, R. A., Swanson, R., & Robinson, P. A. (2015). The adult learner: The definitive classic in adult education and human resource development (8th ed.). Routledge.","edition":"8"},{"key":"e_1_3_5_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12131"},{"key":"e_1_3_5_72_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00302"},{"key":"e_1_3_5_73_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0066-x"},{"key":"e_1_3_5_74_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12063"},{"key":"e_1_3_5_75_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:ITDE.0000007359.81781.7c"},{"key":"e_1_3_5_76_1","unstructured":"McKinsey. (2019). Perspectives on transforming cybersecurity. McKinsey Global Institute. Retrieved November 6 2023 from. https:\/\/www.mckinsey.com\/~\/media\/McKinsey\/McKinsey%20Solutions\/Cyber%20Solutions\/Perspectives%20on%20transforming%20cybersecurity\/Transforming%20cybersecurity_March2019.ashx"},{"key":"e_1_3_5_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"e_1_3_5_78_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"e_1_3_5_79_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00723"},{"key":"e_1_3_5_80_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04207"},{"key":"e_1_3_5_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2023.2252390"},{"key":"e_1_3_5_82_1","volume-title":"Psychometric theory","author":"Nunnally J.","year":"1994","unstructured":"Nunnally, J., & Bernstein, I. (1994). Psychometric theory. McGraw-Hill."},{"key":"e_1_3_5_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045759"},{"key":"e_1_3_5_84_1","doi-asserted-by":"publisher","DOI":"10.1201\/1079.07366981\/45423.33.1.20050701\/89329.1"},{"key":"e_1_3_5_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/17437199.2012.703527"},{"key":"e_1_3_5_86_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_5_87_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"e_1_3_5_88_1","first-page":"1","volume-title":"Twenty Second European Conference on Information Systems","author":"Putri F. F.","year":"2014","unstructured":"Putri, F. F., & Hovav, A. (2014). Employees\u2019 compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory. Twenty Second European Conference on Information Systems, Tel Aviv, Israel (pp. 1\u201317)."},{"issue":"6","key":"e_1_3_5_89_1","first-page":"1532","article-title":"Network configuration in app design: The effects of simplex and multiplex networks on team performance","volume":"23","author":"Qu G.","year":"2022","unstructured":"Qu, G., Wang, J., Lu, X., Xu, Q., & Wang, Q. (2022). Network configuration in app design: The effects of simplex and multiplex networks on team performance. Journal of the Association for Information Systems, 23(6), 1532\u20131556.","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_3_5_90_1","doi-asserted-by":"publisher","DOI":"10.1111\/eje.12053"},{"key":"e_1_3_5_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2012.747234"},{"key":"e_1_3_5_92_1","first-page":"1","article-title":"CSI computer crime and security survey","volume":"1","author":"Richardson R.","year":"2008","unstructured":"Richardson, R., & Director, C. S. I. (2008). CSI computer crime and security survey. Computer Security Institute, 1, 1\u201330.","journal-title":"Computer Security Institute"},{"key":"e_1_3_5_93_1","volume-title":"Freedom to learn","author":"Rogers C.","year":"1969","unstructured":"Rogers, C. (1969). Freedom to learn. Charles E. Merrill."},{"key":"e_1_3_5_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_5_95_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790187"},{"key":"e_1_3_5_96_1","first-page":"27","volume-title":"Calculation Vs Context: Quantitative Literacy and Its Implications for Teacher Education","author":"Shavelson R. J.","year":"2008","unstructured":"Shavelson, R. J. (2008). Reflections on quantitative reasoning: An assessment perspective. In B. Madison & L. Steen (Eds.), Calculation Vs Context: Quantitative Literacy and Its Implications for Teacher Education, 27\u201347. Mathematical Association of America."},{"key":"e_1_3_5_97_1","doi-asserted-by":"publisher","DOI":"10.32727\/8.2023.13"},{"key":"e_1_3_5_98_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2019.1705512"},{"key":"e_1_3_5_99_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"e_1_3_5_100_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00491"},{"key":"e_1_3_5_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101617"},{"key":"e_1_3_5_102_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"key":"e_1_3_5_103_1","first-page":"99","volume-title":"Handbook of Social Cognition: Basic Processes","author":"Smith E. R.","year":"1994","unstructured":"Smith, E. R. (1994). Procedural knowledge and processing strategies in social cognition. In R. Wyer & T. Srull (Eds.), Handbook of Social Cognition: Basic Processes (2nded., pp. 99\u2013151). Lawrence Erlbaum Associates.","edition":"2"},{"key":"e_1_3_5_104_1","volume-title":"Computer-assisted instruction: A synthesis of theory, practice, and technology","author":"Steinberg E. R.","year":"1991","unstructured":"Steinberg, E. R. (1991). Computer-assisted instruction: A synthesis of theory, practice, and technology. Lawrence Erlbaum Associates."},{"key":"e_1_3_5_105_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_5_106_1","first-page":"1","volume-title":"Thirty Sixth International Conference of Information Systems, Fort Worth 2015","author":"Talib Y.","year":"2015","unstructured":"Talib, Y., & Dhillon, G. (2015). Employee ISP compliance intentions: An empirical test of empowerment. Thirty Sixth International Conference of Information Systems, Fort Worth 2015, Fort Worth, USA (pp. 1\u201319)."},{"key":"e_1_3_5_107_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.05018"},{"key":"e_1_3_5_108_1","volume-title":"Sanctions and social deviance: The question of deterrence","author":"Tittle C. R.","year":"1980","unstructured":"Tittle, C. R. (1980). Sanctions and social deviance: The question of deterrence. Praeger."},{"key":"e_1_3_5_109_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.80.2.239"},{"key":"e_1_3_5_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09956-4"},{"key":"e_1_3_5_111_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2020\/14121"},{"key":"e_1_3_5_112_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2022\/15511"},{"key":"e_1_3_5_113_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"e_1_3_5_114_1","unstructured":"Verizon. (2023). Verizon 2023 data breach investigations report. Retrieved November 6 2023 from. https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/"},{"key":"e_1_3_5_115_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04113"},{"key":"e_1_3_5_116_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.03.002"},{"key":"e_1_3_5_117_1","doi-asserted-by":"publisher","DOI":"10.1093\/workar\/waw033"},{"key":"e_1_3_5_118_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.09.013"},{"key":"e_1_3_5_119_1","volume-title":"Proceedings of the Eighteenth Americas Conference on Information Systems","author":"Warkentin M.","year":"2012","unstructured":"Warkentin, M., McBride, M., Carter, L., & Johnston, A. C. (2012). The role of individual characteristics on insider abuse intentions the role of individual characteristics on insider abuse intentions. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, USA."},{"key":"e_1_3_5_120_1","volume-title":"Principles of information security","author":"Whitman M. E.","year":"2018","unstructured":"Whitman, M. E., & Mattord, H. J. (2018). Principles of information security. Cengage Learning."},{"key":"e_1_3_5_121_1","doi-asserted-by":"publisher","DOI":"10.14742\/ajet.869"},{"key":"e_1_3_5_122_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00524"},{"key":"e_1_3_5_123_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376276"},{"key":"e_1_3_5_124_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102520"},{"key":"e_1_3_5_125_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2022.2099767"},{"key":"e_1_3_5_126_1","doi-asserted-by":"publisher","DOI":"10.1002\/ase.1754"}],"container-title":["European Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0960085X.2024.2359460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T10:25:43Z","timestamp":1753093543000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0960085X.2024.2359460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":125,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7,4]]}},"alternative-id":["10.1080\/0960085X.2024.2359460"],"URL":"https:\/\/doi.org\/10.1080\/0960085x.2024.2359460","relation":{},"ISSN":["0960-085X","1476-9344"],"issn-type":[{"value":"0960-085X","type":"print"},{"value":"1476-9344","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}