{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T08:07:27Z","timestamp":1774166847273,"version":"3.50.1"},"reference-count":115,"publisher":"Informa UK Limited","issue":"18","funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2024,9,16]]},"DOI":"10.1080\/10447318.2023.2238367","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T04:44:15Z","timestamp":1690519455000},"page":"4987-5002","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":11,"title":["Fraudsters Beware: Unleashing the Power of Metaverse Technology to Uncover Financial Fraud"],"prefix":"10.1080","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2484-6751","authenticated-orcid":false,"given":"Cheng","family":"Xu","sequence":"first","affiliation":[{"name":"International Business School Suzhou, Xi\u2019an Jiaotong-Liverpool University, Suzhou, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3318-649X","authenticated-orcid":false,"given":"Xueji","family":"Liang","sequence":"additional","affiliation":[{"name":"International Business School Suzhou, Xi\u2019an Jiaotong-Liverpool University, Suzhou, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4660-6780","authenticated-orcid":false,"given":"Yanqi","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Beijing Institute of Petrochemical Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2973-8051","authenticated-orcid":false,"given":"Xudong","family":"He","sequence":"additional","affiliation":[{"name":"Essex Business School, University of Essex, Colchester, UK"}]}],"member":"301","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/01900692.2021.2009855"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41310-019-00067-9"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393550801934331"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11142-017-9435-x"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.21744\/irjmis.v6n5.706"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2010.10.010"},{"key":"e_1_3_3_8_1","doi-asserted-by":"crossref","unstructured":"Argyriou E. N. Sotiraki A. A. Symvonis A. (2013). Occupational fraud detection through visualization. 2013 IEEE International Conference on Intelligence and Security Informatics 4\u20136.","DOI":"10.1109\/ISI.2013.6578773"},{"key":"e_1_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Argyriou E. N. Symvonis A. Vassiliou V. (2014). A fraud detection visualization system utilizing radial drawings and heat-maps. 2014 International Conference on Information Visualization Theory and Applications (IVAPP) 153\u2013160.","DOI":"10.5220\/0004735501530160"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.04.004"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.22381\/lpi21202214"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(15)01485-9"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2022.113420"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.22381\/pihrm10120226"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/1475-679X.12104"},{"key":"e_1_3_3_16_1","first-page":"503","article-title":"Fraud type and auditor litigation: An analysis of SEC accounting and auditing enforcement releases","author":"Bonner S. E.","year":"1998","unstructured":"Bonner, S. E., Palmrose, Z.-V., & Young, S. M. (1998). Fraud type and auditor litigation: An analysis of SEC accounting and auditing enforcement releases. The Accounting Review, 73(4), 503\u2013532. http:\/\/www.jstor.org\/stable\/248188","journal-title":"The Accounting Review,"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.234"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11142-015-9326-y"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJCHM-05-2022-0631"},{"key":"e_1_3_3_20_1","first-page":"551","article-title":"Workplace gender diversity & inclusive growth in public & private organizations","author":"Bukhari S. S.","year":"2014","unstructured":"Bukhari, S. S., & Sharma, B. C. (2014). Workplace gender diversity & inclusive growth in public & private organizations. The Indian Journal of Industrial Relations, 49(3), 551\u2013563. http:\/\/www.jstor.org\/stable\/24546997","journal-title":"The Indian Journal of Industrial Relations,"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500172"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-1785-0"},{"key":"e_1_3_3_23_1","doi-asserted-by":"crossref","unstructured":"Chiu C.-C. Tsai C.-Y. (2004). A web services-based collaborative scheme for credit card fraud detection. IEEE International Conference on E-Technology e-Commerce and e-Service 2004. EEE\u201904. 2004 177\u2013181.","DOI":"10.1109\/EEE.2004.1287306"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/00014788.2017.1394607"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-10-2022-0261"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aos.2013.11.001"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-012-9192-1"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2015.01.001"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102542"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21767"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004282"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-7506-0921-0.50016-1"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.02.001"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510249.3510262"},{"issue":"9","key":"e_1_3_3_35_1","first-page":"76","article-title":"Coordination and cooperation between internal and external auditors","volume":"5","author":"Endaya K. A.","year":"2014","unstructured":"Endaya, K. A. (2014). Coordination and cooperation between internal and external auditors. Research Journal of Finance and Accounting, 5(9), 76\u201380.","journal-title":"Research Journal of Finance and Accounting,"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/1351847X.2019.1646666"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.4337\/9781849807074"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1168244"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/sipr.12064"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816635778"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.22381\/PIHRM4220161"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-011-9250-x"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.2308\/ajpt-10114"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.010"},{"issue":"2","key":"e_1_3_3_45_1","first-page":"147","article-title":"Social presence theory and implications for interaction and collaborative learning in computer conferences","volume":"1","author":"Gunawardena C. N.","year":"1995","unstructured":"Gunawardena, C. N. (1995). Social presence theory and implications for interaction and collaborative learning in computer conferences. International Journal of Educational Telecommunications, 1(2), 147\u2013166. Association for the Advancement of Computing in Education (AACE). Retrieved July 21, 2023, from https:\/\/www.learntechlib.org\/primary\/p\/15156","journal-title":"International Journal of Educational Telecommunications,"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhx058"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.35940\/ijitee.B7568.019320"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/SAMPJ-05-2017-0043"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2008.27.2.231"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0403723101"},{"key":"e_1_3_3_51_1","doi-asserted-by":"crossref","unstructured":"Huang M. L. Liang J. Nguyen Q. V. (2009a). A visualization approach for frauds detection in financial market. 2009 13th International Conference Information Visualisation 197\u2013202.","DOI":"10.1109\/IV.2009.23"},{"key":"e_1_3_3_52_1","doi-asserted-by":"crossref","unstructured":"Huang M. L. Liang J. Nguyen Q. V. (2009b). A visualization approach for frauds detection in financial market. 2009 13th International Conference Information Visualisation 197\u2013202.","DOI":"10.1109\/IV.2009.23"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-016-9647-9"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2011010105"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.36"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2010.00317.x"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203695005"},{"issue":"8","key":"e_1_3_3_58_1","article-title":"CPAs in China: Fascinating similarities and differences","volume":"75","author":"Kliegman E. J.","year":"2005","unstructured":"Kliegman, E. J. (2005). CPAs in China: Fascinating similarities and differences. The CPA Journal, 75(8), 6. https:\/\/www.proquest.com\/scholarly-journals\/cpas-china-fascinating-similarities-differences\/docview\/212286801\/se-2.","journal-title":"The CPA Journal,"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2004.1297040"},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1108\/13581980210810256"},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJEBR-12-2021-0984"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.5465\/ame.2003.19198794"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10648-021-09623-8"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.2308\/jeta.2006.3.1.61"},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/1046496407301972"},{"key":"e_1_3_3_66_1","first-page":"1","article-title":"Invariant diversity as a proactive fraud detection mechanism for online merchants","author":"Laurens R.","year":"2017","unstructured":"Laurens, R., Jusak, J., & Zou, C. C. (2017). Invariant diversity as a proactive fraud detection mechanism for online merchants. GLOBECOM 2017-2017 IEEE Global Communications Conference, 1\u20136.","journal-title":"GLOBECOM 2017-2017 IEEE Global Communications Conference,"},{"key":"e_1_3_3_67_1","volume-title":"3D user interfaces: Theory and practice","author":"LaViola J. J.","year":"2017","unstructured":"LaViola, J. J., Jr, Kruijff, E., McMahan, R. P., Bowman, D., & Poupyrev, I. (2017). 3D user interfaces: Theory and practice. Addison-Wesley Professional."},{"key":"e_1_3_3_68_1","article-title":"All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda","author":"Lee L.-H.","year":"2021","unstructured":"Lee, L.-H., Braud, T., Zhou, P., Wang, L., Xu, D., Lin, Z., Kumar, A., Bermejo, C., & Hui, P. (2021). All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. ArXiv Preprint ArXiv:2110.05352.","journal-title":"ArXiv Preprint ArXiv:2110.05352"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-04-2022-0058"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-984-7.ch010"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2022.100559"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511762888"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11115-020-00479-0"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1108\/ER-10-2019-0385"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.3390\/risks10090176"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.3390\/encyclopedia2010031"},{"issue":"5","key":"e_1_3_3_78_1","first-page":"99","article-title":"Research on data science, data analytics and big data","volume":"9","author":"Nadikattu R. R.","year":"2020","unstructured":"Nadikattu, R. R. (2020). Research on data science, data analytics and big data. International Journal of Engineering, Science, 9(5), 99\u2013105.","journal-title":"International Journal of Engineering, Science"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.tb00308.x"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98689-6_28"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.07.008"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(15)01211-3"},{"key":"e_1_3_3_83_1","unstructured":"Oztok M. & Brett C. (2011). Social presence and online learning: A review of the research. The Journal of Distance Education 25(3) 1\u201310. https:\/\/hdl.handle.net\/1807\/32440"},{"key":"e_1_3_3_84_1","volume-title":"Machine learning applications for accounting disclosure and fraud detection","author":"Papadakis S.","year":"2020","unstructured":"Papadakis, S., Garefalakis, A., Lemonakis, C., Chimonaki, C., & Zopounidis, C. (2020). Machine learning applications for accounting disclosure and fraud detection. IGI Global."},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.2308\/ajpt-50009"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-022-00682-x"},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.22381\/pihrm10120222"},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.2308\/bria-10065"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.14453\/aabfj.v16i1.7"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1111\/joes.12294"},{"key":"e_1_3_3_91_1","volume-title":"Financial statement fraud: Prevention and detection","author":"Rezaee Z.","year":"2002","unstructured":"Rezaee, Z. (2002a). Financial statement fraud: Prevention and detection. John Wiley & Sons."},{"key":"e_1_3_3_92_1","volume-title":"Financial statement fraud: Prevention and detection","author":"Rezaee Z.","year":"2002","unstructured":"Rezaee, Z. (2002b). Financial statement fraud: Prevention and detection. John Wiley & Sons."},{"key":"e_1_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1045-2354(03)00072-8"},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1993.tb00309.x"},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-12-2021-0142"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-01-2022-0017"},{"key":"e_1_3_3_97_1","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1007\/978-3-030-32101-7_35","article-title":"Secure multiparty PageRank algorithm for collaborative fraud detection","volume":"23","author":"Sangers A.","year":"2019","unstructured":"Sangers, A., van Heesch, M., Attema, T., Veugen, T., Wiggerman, M., Veldsink, J., Bloemen, O., & Worm, D. (2019). Secure multiparty PageRank algorithm for collaborative fraud detection. Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18\u201322, 2019, Revised Selected Papers 23, 605\u2013623.","journal-title":"Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18\u201322, 2019, Revised Selected Papers"},{"key":"e_1_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05045-1"},{"key":"e_1_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2011.552060"},{"key":"e_1_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1108\/17542410910968814"},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1108\/S1569-3732(2009)0000013005"},{"key":"e_1_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-06-2022-0124"},{"key":"e_1_3_3_103_1","volume-title":"Fraud analytics: Strategies and methods for detection and prevention","author":"Spann D. D.","year":"2013","unstructured":"Spann, D. D. (2013). Fraud analytics: Strategies and methods for detection and prevention. John Wiley & Sons."},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1111\/1911-3846.12139"},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.32670\/fairvalue.v4i12.1783"},{"key":"e_1_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.09.249"},{"key":"e_1_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1108\/MAJ-01-2018-1767"},{"key":"e_1_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.006"},{"key":"e_1_3_3_109_1","first-page":"37","volume-title":"Feminist strategies in international governance","author":"True J.","year":"2013","unstructured":"True, J., & Parisi, L. (2013). Gender mainstreaming strategies in international governance. In Feminist strategies in international governance (pp. 37\u201356). Routledge."},{"key":"e_1_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15389286AJDE1603_2"},{"key":"e_1_3_3_111_1","volume-title":"Money laundering prevention: Deterring, detecting, and resolving financial fraud","author":"Turner J. E.","year":"2011","unstructured":"Turner, J. E. (2011). Money laundering prevention: Deterring, detecting, and resolving financial fraud. John Wiley & Sons."},{"key":"e_1_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.4101\/jvwr.v4i3.6126"},{"key":"e_1_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.3390\/app122211804"},{"issue":"6","key":"e_1_3_3_114_1","first-page":"4175","article-title":"A comprehensive study of healthcare fraud detection based on machine learning","volume":"13","author":"Waghade S. S.","year":"2018","unstructured":"Waghade, S. S., & Karandikar, A. M. (2018). A comprehensive study of healthcare fraud detection based on machine learning. International Journal of Applied Engineering Research, 13(6), 4175\u20134178.","journal-title":"International Journal of Applied Engineering Research,"},{"key":"e_1_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2010.831"},{"key":"e_1_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.2308\/acch.2004.18.3.173"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2023.2238367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T05:58:29Z","timestamp":1726725509000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2023.2238367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,27]]},"references-count":115,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2024,9,16]]}},"alternative-id":["10.1080\/10447318.2023.2238367"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2023.2238367","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,27]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-03-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-20","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}