{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:45:50Z","timestamp":1771476350223,"version":"3.50.1"},"reference-count":120,"publisher":"Informa UK Limited","issue":"2","funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-21-1-2732"],"award-info":[{"award-number":["N00014-21-1-2732"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,1,17]]},"DOI":"10.1080\/10447318.2024.2314349","type":"journal-article","created":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T07:43:35Z","timestamp":1708501415000},"page":"1364-1380","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation of an Internet of Things Device-Based Educational Approach to Engage a More Diverse Cybersecurity Workforce"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3158-2747","authenticated-orcid":false,"given":"Maureen","family":"Namukasa","sequence":"first","affiliation":[{"name":"College of Aeronautics, Florida Institute of Technology","place":["Melbourne, USA"]}]},{"given":"Maria","family":"Chaparro Osman","sequence":"additional","affiliation":[{"name":"College of Aeronautics, Florida Institute of Technology","place":["Melbourne, USA"]}]},{"given":"Cherrise","family":"Ficke","sequence":"additional","affiliation":[{"name":"College of Aeronautics, Florida Institute of Technology","place":["Melbourne, USA"]}]},{"given":"Isabella","family":"Piasecki","sequence":"additional","affiliation":[{"name":"College of Aeronautics, Florida Institute of Technology","place":["Melbourne, USA"]}]},{"given":"TJ","family":"OConnor","sequence":"additional","affiliation":[{"name":"College of Engineering and Science, Florida Institute of Technology","place":["Melbourne, USA"]}]},{"given":"Meredith","family":"Carroll","sequence":"additional","affiliation":[{"name":"College of Aeronautics, Florida Institute of Technology","place":["Melbourne, USA"]}]}],"member":"301","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4515"},{"key":"e_1_3_3_3_1","unstructured":"Air Force Association. (2022). Cyberpatriot XIV National Youth Cyber Defense Competition Registration Report 2021\u20132022. \u2013 Google Search. (n.d.). Retrieved 7 March 2023 from https:\/\/www.google.com\/search?rlz=1C5CHFA_enQA870QA870&q=Air+Force+Association.+2022.+Cyberpatriot+XIV+National+Youth+Cyber+Defense+Competition+Registration+Report+2021-2022.&spell=1&sa=X&ved=2ahUKEwjw2Nya7cr9AhUpRDABHdQIB9UQBSgAegQICBAB&biw=830&bih=796&dpr=2"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263395718760960"},{"key":"e_1_3_3_5_1","unstructured":"Ashcraft C. Eger E. Friend M. (2012). Girls in IT: The facts. National Center for Women & IT. Boulder CO. https:\/\/bcwt.bg\/wp-content\/uploads\/documents\/girlsInIT.pdf."},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2010.5673215"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11024-016-9295-8"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2017.206"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01421590500046924"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2013.838920"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCRE.2021070105"},{"key":"e_1_3_3_12_1","volume-title":"Human characteristics and school learning","author":"Bloom B. S.","year":"1976","unstructured":"Bloom, B. S. (1976). Human characteristics and school learning. McGraw-Hill."},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/15512169.2018.1485571"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174781.3174788"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2466-4.ch063"},{"key":"e_1_3_3_17_1","unstructured":"Carlson S. Maxa S. (1998). Pedagogy applied to nonformal education. http:\/\/conservancy.umn.edu\/handle\/11299\/125490."},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2019.1636083"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374135.3385269"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/0361684312459328"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.00049"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106909"},{"key":"e_1_3_3_23_1","unstructured":"Chothia T. De Ruiter J. (2016). Learning from {Others\u2019} mistakes: Penetration testing {IoT} devices in the classroom. In 2016 USENIX Workshop on Advances in Security Education (ASE 16)."},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10576-1_83"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/1527476418778420"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-9094-9_6"},{"key":"e_1_3_3_27_1","unstructured":"Daud F. (2022). Benefits of teaching technology through experiential learning: Exploring the experiences of students of color [Doctoral dissertation]. University of Kansas."},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199557257.013.0005"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979575"},{"key":"e_1_3_3_30_1","volume-title":"Collaborative learning: Cognitive and computational approaches. advances in learning and instruction series","author":"Dillenbourg P.","year":"1999","unstructured":"Dillenbourg, P. (1999). Collaborative learning: Cognitive and computational approaches. advances in learning and instruction series. Elsevier Science, Inc. PO Box 945 10160-0757."},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159462"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8624.1993.tb02946.x"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11031-008-9102-4"},{"key":"e_1_3_3_34_1","unstructured":"Ericson B. (2016). Detailed race and gender information 2015. http:\/\/home.cc.gatech.edu\/ice-gt\/594."},{"key":"e_1_3_3_35_1","first-page":"1","article-title":"A call for concern: The unbalanced representation of minorities and women in cybersecurity profession","volume":"2","author":"Esin J. O.","year":"2020","unstructured":"Esin, J. O. (2020). A call for concern: The unbalanced representation of minorities and women in cybersecurity profession. J Women Minor Technol, 2, 1\u201311.","journal-title":"J Women Minor Technol,"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.9734\/BJESBS\/2015\/18161"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20113048"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2022.2100297"},{"key":"e_1_3_3_39_1","unstructured":"Gray T. & Ross C. (2020). The effects of an experiential learning course on secondary student achievement and motivation in Geometry [Doctoral dissertation]. University of Missouri-Saint Louis."},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.07.048"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.045"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/2372732216655542"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/03043797.2014.883363"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/S2055-364120160000006010"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12147"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11162-008-9114-7"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40692-015-0043-0"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538899"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0735633116651971"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/EITT53287.2021.00077"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.3390\/pharmacy9010048"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/sce.21492"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.7771\/1541-5015.1712"},{"issue":"1","key":"e_1_3_3_56_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.62915\/2472-2707.1039","article-title":"Experiential learning builds cybersecurity self-efficacy in K-12 students","volume":"2018","author":"Konak A.","year":"2018","unstructured":"Konak, A. (2018). Experiential learning builds cybersecurity self-efficacy in K-12 students. Education, Research and Practice, Journal of Cybersecurity, 2018(1), 6. https:\/\/digitalcommons.kennesaw.edu\/jcerp\/vol2018\/iss1\/6","journal-title":"Education, Research and Practice, Journal of Cybersecurity"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--37048"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40594-020-00219-2"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2011.12.092"},{"key":"e_1_3_3_60_1","volume-title":"Proceedings of the management, knowledge and learning international conference","author":"Laskowski M.","year":"2014","unstructured":"Laskowski, M., & Badurowicz, M. (2014). Gamification in higher education: A case study. Human capital without borders: Knowledge and learning for quality of life. In Proceedings of the management, knowledge and learning international conference."},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125686"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-022-10308-y"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjep.12095"},{"key":"e_1_3_3_64_1","unstructured":"Lingelbach K. K. (2018). Perceptions of female cybersecurity professionals toward factors that encourage females to the cybersecurity field [Doctoral dissertation]. Nova Southeastern University."},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677262"},{"key":"e_1_3_3_66_1","unstructured":"Malecki A. (2018). Cybersecurity in the classroom: Bridging the gap between computer access and online safety. https:\/\/scholar.valpo.edu\/cscrpr\/1."},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1037\/edu0000061"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6685108"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2920214"},{"key":"e_1_3_3_70_1","unstructured":"Mirkovic J. Peterson P. (2014). Class Capture-the-Flag exercises. 3GSE. Retrieved from https:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/mirkovic."},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3344429.3372507"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.36941\/jesr-2022-0027"},{"key":"e_1_3_3_73_1","first-page":"105","article-title":"The concept of flow","volume":"89","author":"Nakamura J.","year":"2002","unstructured":"Nakamura, J., & Csikszentmihalyi, M. (2002). The concept of flow. Handbook of Positive Psychology, 89, 105.","journal-title":"Handbook of Positive Psychology,"},{"key":"e_1_3_3_74_1","unstructured":"Nygard K. Chowdhury M. Kambhampaty K. Kotala P. (2018 April). Cybersecurity materials for K-12 education. The Midwest Instruction and Computing Symposium 2018. Retrieved from https:\/\/micsymposium.org\/mics2018\/proceedings\/MICS_2018_paper_59.pdf."},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/VizSec48167.2019.9161386"},{"issue":"2","key":"e_1_3_3_76_1","first-page":"4","article-title":"Understanding how to diversify the cybersecurity workforce: A qualitative analysis","volume":"2023","author":"Osman M. C.","year":"2023","unstructured":"Osman, M. C., Namukasa, M., Ficke, C., Piasecki, I., OConnor, T. J., & Carroll, M. (2023). Understanding how to diversify the cybersecurity workforce: A qualitative analysis. Journal of Cybersecurity Education, Research, and Practice, 2023(2), 4. https:\/\/digitalcommons.kennesaw.edu\/jcerp\/vol2023\/iss2\/4\/","journal-title":"Journal of Cybersecurity Education, Research, and Practice"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02504795"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.99.1.83"},{"issue":"1","key":"e_1_3_3_79_1","first-page":"25","article-title":"Gender inequality in cybersecurity: Exploring the gender gap in opportunities and progression","volume":"9","author":"Peacock D.","year":"2017","unstructured":"Peacock, D., & Irons, A. (2017). Gender inequality in cybersecurity: Exploring the gender gap in opportunities and progression. International Journal of Gender, Science and Technology, 9(1), 25\u201344. https:\/\/genderandset.open.ac.uk\/index.php\/genderandset\/article\/view\/449","journal-title":"International Journal of Gender, Science and Technology"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695752"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181r1"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-020-01153-x"},{"issue":"3","key":"e_1_3_3_83_1","first-page":"44","article-title":"Student Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap","volume":"18","author":"Pinchot J.","year":"2020","unstructured":"Pinchot, J., Cellante, D., Mishra, S., & Paullet, K. (2020). Student Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap. Information Systems Education Journal, 18(3), 44\u201353. https:\/\/eric.ed.gov\/?id=EJ1258205","journal-title":"Information Systems Education Journal,"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11958-8_28"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjep.12244"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.25776\/k9m2-2r57"},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.06.039"},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315771045"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2017.05.005"},{"key":"e_1_3_3_90_1","unstructured":"Rheinberg F. Vollmeyer R. & Engeser S. (2003). Die erfassung des flow-erlebens [The assessment of flow experience]. In J. Stiensmeier-Pelster & F. Rheinberg (Eds.) Diagnostik von Motivation und Selbstkonzept (pp. 261\u2013279). Hogrefe."},{"key":"e_1_3_3_91_1","unstructured":"Riley M. Elgin B. Lawrence D. Matlack C. (2014 March 17). Missed alarms and 40 million stolen credit card numbers: How Target blew it. Bloomberg.Com. https:\/\/www.bloomberg.com\/news\/articles\/2014-03-13\/target-missed-warnings-in-epic-hack-of-credit-card-data."},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41979-020-00048-6"},{"key":"e_1_3_3_93_1","unstructured":"Rowland P. (2018). The CybHER program supported by CISSE framework to engage and anchor middle-school girls in cybersecurity. https:\/\/scholar.dsu.edu\/theses\/337."},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/00221546.2016.1257306"},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2923.2011.04035.x"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1002\/tea.21306"},{"key":"e_1_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1521\/scpq.18.2.158.21860"},{"key":"e_1_3_3_98_1","doi-asserted-by":"crossref","unstructured":"Shernoff D. J. (2013). Optimal learning environments to promote student engagement. Springer.","DOI":"10.1007\/978-1-4614-7089-2"},{"key":"e_1_3_3_99_1","first-page":"194","volume-title":"Enacting flow and student engagement in the college classroom","author":"Shernoff D. J.","year":"2014","unstructured":"Shernoff, D. J., & Anderson, B. (2014). Enacting flow and student engagement in the college classroom (pp. 194\u2013212). The Wiley Blackwell Handbook of Positive Psychological Interventions."},{"key":"e_1_3_3_100_1","first-page":"145","article-title":"Cultivating engaged learners and optimal learning environments","volume":"131","author":"Shernoff D. J.","year":"2009","unstructured":"Shernoff, D. J., & Csikszentmihalyi, M. (2009). Cultivating engaged learners and optimal learning environments. Handbook of Positive Psychology in Schools, 131, 145.","journal-title":"Handbook of Positive Psychology in Schools,"},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543882.2543883"},{"key":"e_1_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11251-006-9002-5"},{"key":"e_1_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/20567790.2021.1969762"},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.99.4.808"},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23084117"},{"key":"e_1_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1080\/17439760.2019.1579362"},{"key":"e_1_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568195.2568213"},{"key":"e_1_3_3_108_1","unstructured":"Toda A. M. Oliveira W. Shi L. Bittencourt I. I. Isotani S. Cristea A. (2019). Planning gamification strategies based on user characteristics and DM: A dender-based case study (arXiv:1905.09146). arXiv. https:\/\/arxiv.org\/abs\/1905.09146."},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2010.527697"},{"key":"e_1_3_3_110_1","unstructured":"Verenikina I. (2003). Understanding scaffolding and the ZPD in educational research. Retrieved from https:\/\/ro.uow.edu.au\/edupapers\/381\/."},{"key":"e_1_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00015"},{"key":"e_1_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt6wq6fh"},{"key":"e_1_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.1080\/14703290903525838"},{"key":"e_1_3_3_114_1","volume-title":"The gamification toolkit: Dynamics, mechanics, and components for the win","author":"Werbach K.","year":"2015","unstructured":"Werbach, K., & Hunter, D. (2015). The gamification toolkit: Dynamics, mechanics, and components for the win. University of Pennsylvania Press."},{"key":"e_1_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343195"},{"issue":"2","key":"e_1_3_3_116_1","first-page":"64","article-title":"The impact of student engagement, institutional environment, college preparation, and financial support on the persistence of underrepresented minority students in engineering at a predominately White institution: A perspective from students","volume":"18","author":"White V.","year":"2018","unstructured":"White, V., Alexander, J., Prince, D., & Verdell, A. (2018). The impact of student engagement, institutional environment, college preparation, and financial support on the persistence of underrepresented minority students in engineering at a predominately White institution: A perspective from students. Journal of Higher Education Theory and Practice, 18(2), 64. https:\/\/par.nsf.gov\/biblio\/10078664","journal-title":"Journal of Higher Education Theory and Practice,"},{"issue":"1","key":"e_1_3_3_117_1","first-page":"40","article-title":"Flow theory and student engagement","volume":"2","author":"Whitson C.","year":"2009","unstructured":"Whitson, C., & Consoli, J. (2009). Flow theory and student engagement. Journal of Cross-Disciplinary Perspectives in Education, 2(1), 40\u201349.","journal-title":"Journal of Cross-Disciplinary Perspectives in Education,"},{"key":"e_1_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1015"},{"key":"e_1_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220973.2011.596855"},{"key":"e_1_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12528-021-09271-5"},{"key":"e_1_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993069.1993074"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2314349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T03:42:39Z","timestamp":1739245359000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2314349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,20]]},"references-count":120,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,1,17]]}},"alternative-id":["10.1080\/10447318.2024.2314349"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2314349","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-03-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-07","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}