{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:59:37Z","timestamp":1762783177535,"version":"3.41.2"},"reference-count":145,"publisher":"Informa UK Limited","issue":"14","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,7,18]]},"DOI":"10.1080\/10447318.2024.2415750","type":"journal-article","created":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:50:38Z","timestamp":1729662638000},"page":"8858-8883","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5650-1838","authenticated-orcid":false,"given":"Abdulbasit A.","family":"Darem","sequence":"first","affiliation":[{"name":"Department of Computer Science, Northern Border University","place":["Arar, Saudi Arabia"]}]},{"given":"Tareq M.","family":"Alkhaldi","sequence":"additional","affiliation":[{"name":"Department of Educational Technologies, Imam Abdulrahman Bin Faisal University","place":["Dammam, Saudi Arabia"]}]},{"given":"Muteeb","family":"Alahmari","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Imam Abdulrahman Bin Faisal University","place":["Dammam, Saudi Arabia"]}]},{"given":"Asma A.","family":"Alhashmi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Northern Border University","place":["Arar, Saudi Arabia"]}]},{"given":"Abdullah M.","family":"Alashjaee","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Northern Border University","place":["Arar, Saudi Arabia"]}]},{"given":"Sultan M.","family":"Alanazi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Northern Border University","place":["Arar, Saudi Arabia"]}]},{"given":"Shouki A.","family":"Ebad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Northern Border University","place":["Arar, Saudi Arabia"]}]}],"member":"301","published-online":{"date-parts":[[2024,10,23]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17610-4_16"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jik.2017.07.003"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.35877\/soshum490"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/info9050110"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2291608"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0128-7"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030073"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983280"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2020919891"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140292"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.20428\/jst.v27i2.2055"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2017.1386483"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"issue":"2","key":"e_1_3_2_17_1","first-page":"108","article-title":"Envisioning the future of social behavior: A comment on curiosity","volume":"1","author":"Anderson R. E.","year":"2006","unstructured":"Anderson, R. E. (2006). Envisioning the future of social behavior: A comment on curiosity. Perspectives on Psychological Science, 1(2), 108\u2013109.","journal-title":"Perspectives on Psychological Science,"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/ics-05-2022-0085"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2302.08348"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.20533\/iji.1742.4712.2013.0083"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2023.1042783"},{"key":"e_1_3_2_22_1","volume-title":"WISP 2019 Proceedings","author":"Aviv S.","year":"2019","unstructured":"Aviv, S., Levy, Y., Wang, L., & Geri, N. (2019). An expert assessment of corporate professional users to measure business email compromise detection skills and develop a knowledge and awareness training program. In WISP 2019 Proceedings."},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.48047\/jcr.06.01.38"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/geroni\/igz038.2781"},{"key":"e_1_3_2_25_1","unstructured":"Baki S. Verma R. M. Mukherjee A. & Gnawali O. (2020). Less is more: Exploiting social trust to increase the effectiveness of a deception attack. arXiv preprint arXiv:2006.13499"},{"key":"e_1_3_2_26_1","unstructured":"BBC News. (2015). Nigerian oil company targeted by phishing scam. https:\/\/www.bbc.com\/news\/technology-34179640"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2023.113977"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(19)30040-5"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.52326\/ic-ecco.2022\/sec.01"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.52306\/02010219RZEX445"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2012.50"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/0004865814521224"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2023.3254504"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/21582440231152379"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.061"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3929"},{"key":"e_1_3_2_37_1","volume-title":"Influence: Science and practice","author":"Cialdini R. B.","year":"2001","unstructured":"Cialdini, R. B. (2001). Influence: Science and practice (4th ed.). Allyn and Bacon.","edition":"4"},{"key":"e_1_3_2_38_1","volume-title":"Influence: The psychology of persuasion","author":"Cialdini R. B.","year":"2007","unstructured":"Cialdini, R. B. (2007). Influence: The psychology of persuasion. HarperCollins."},{"key":"e_1_3_2_39_1","first-page":"8887","article-title":"Towards securing organizational data against social engineering attacks","volume":"975","author":"Cletus A.","unstructured":"Cletus, A., & Najim, U. (n.d.). Towards securing organizational data against social engineering attacks. International Journal of Computer Applications, 975, 8887.","journal-title":"International Journal of Computer Applications,"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-013-9484-z"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1108\/JOIC-01-2016-0003"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-6504-9.ch001"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeei.v3i3.169"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.4600"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3327016"},{"key":"e_1_3_2_46_1","unstructured":"Darvas Z. M. Dom\u00ednguez-Jim\u00e9nez M. & Wolff G. B. (2020). From climate change to cyber-attacks: Incipient financial-stability risks for the euro area (No. 2020\/02). Bruegel Policy Contribution."},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0892679418000618"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90241-4_36"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2020.100131"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003169192-8"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.1161"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101862"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.28945\/4112"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.24989\/ocg.v325.25"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00447"},{"issue":"2","key":"e_1_3_2_57_1","first-page":"96","article-title":"A sweetheart of a deal: How people get hooked and reeled in by financial scams","volume":"2","author":"Gregory D.","year":"2012","unstructured":"Gregory, D., & Nikiforova, B. (2012). A sweetheart of a deal: How people get hooked and reeled in by financial scams. The Journal of Behavioural Finance and Economics, 2(2), 96\u2013122.","journal-title":"The Journal of Behavioural Finance and Economics,"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461672"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.583723"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrn3301"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.47611\/jsrhs.v10i4.1938"},{"key":"e_1_3_2_62_1","unstructured":"Gungor O. Rosing T. & Aksanli B. (2023). DODEM: DOuble DEfense mechanism against adversarial attacks towards secure industrial internet of things analytics. arXiv preprint arXiv:2301.09740."},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183624"},{"key":"e_1_3_2_64_1","unstructured":"Halevi T. Lewis J. & Memon N. (2013). Phishing personality traits and Facebook. arXiv preprint arXiv:1301.7643."},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.002"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2010.509625"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1177\/0963721421995489"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/20\/2\/15"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.696"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.58496\/MJCS\/2023\/009"},{"key":"e_1_3_2_71_1","volume-title":"Consumer behavior","author":"Hoyer W. D.","year":"2012","unstructured":"Hoyer, W. D., MacInnis, D. J., & Pieters, R. (2012). Consumer behavior. Cengage Learning."},{"key":"e_1_3_2_72_1","unstructured":"Ibm.com. (2023). IBM security X-force threat intelligence index 2023. https:\/\/www.ibm.com\/reports\/threat-intelligence"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.009"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/160940690900800406"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.9.8.2089-2098"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.36348\/sb.2023.v09i01.001"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.29220\/CSAM.2023.30.1.075"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13063410"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1037\/pag0000228"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2013.6578859"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-4763-1.ch001"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyt.2023.959846"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-06-2021-0137"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.927398"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.116.1.75"},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7705-9.ch073"},{"key":"e_1_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3229766"},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-9715-5.ch054"},{"key":"e_1_3_2_91_1","unstructured":"McAfee. (2018). Economic impact of cybercrime\u2014No slowing down February 2018. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/restricted\/rp-economic-impact-cybercrime.pdf"},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1080\/15332861.2010.487415"},{"key":"e_1_3_2_93_1","unstructured":"McLennan M. (2022). The global risks report 2022 17th edition. World Economic Forum."},{"key":"e_1_3_2_94_1","unstructured":"Megaw G. (2010). Phishing within e-commerce: Reducing the risk increasing the trust. University of Fort Hare."},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2448130"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2019\/1781.42019"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-01-2021-0012"},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148722"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.18260\/p.25456"},{"key":"e_1_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.004"},{"key":"e_1_3_2_101_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23073467"},{"key":"e_1_3_2_102_1","doi-asserted-by":"publisher","DOI":"10.1177\/0734016820934175"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11896-019-09334-5"},{"key":"e_1_3_2_104_1","doi-asserted-by":"publisher","DOI":"10.3390\/en13153936"},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-05-2020-0086"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.1.54"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15010029"},{"key":"e_1_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.010"},{"key":"e_1_3_2_109_1","volume-title":"Proceedings of Science (PoS). International Symposium on Grid and Clouds","author":"Proch\u00e1zka M.","year":"2011","unstructured":"Proch\u00e1zka, M., Kouril, D., Wartel, R., Kanellopoulos, C., & Triantafyllidis, C. (2011, March). A race for security: Identifying vulnerabilities on 50000 hosts faster than attackers. In Proceedings of Science (PoS). International Symposium on Grid and Clouds."},{"key":"e_1_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926617"},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560830.3563728"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.4075"},{"key":"e_1_3_2_113_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2009.02.003"},{"key":"e_1_3_2_114_1","doi-asserted-by":"publisher","DOI":"10.6007\/ijarbss\/v13-i1\/16243"},{"key":"e_1_3_2_115_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1087463"},{"key":"e_1_3_2_116_1","doi-asserted-by":"publisher","DOI":"10.17148\/IJARCCE.2022.11728"},{"key":"e_1_3_2_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852704"},{"key":"e_1_3_2_119_1","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-3-642-39377-8_29","volume-title":"Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8\u201310, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon\u00e7alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers 8","author":"Smith A.","year":"2013","unstructured":"Smith, A., Papadaki, M., & Furnell, S. M. (2013). Improving awareness of social engineering attacks. In Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8\u201310, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon\u00e7alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers 8 (pp. 249\u2013256). Springer Berlin Heidelberg."},{"key":"e_1_3_2_120_1","doi-asserted-by":"publisher","DOI":"10.3390\/ai3010002"},{"key":"e_1_3_2_121_1","doi-asserted-by":"publisher","DOI":"10.33179\/bsv.99.svi.11.cmc.24.3.1"},{"key":"e_1_3_2_122_1","doi-asserted-by":"publisher","DOI":"10.1111\/ijcs.12907"},{"key":"e_1_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-021-10862-z"},{"key":"e_1_3_2_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3162594"},{"key":"e_1_3_2_125_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2041894"},{"key":"e_1_3_2_126_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-833-0.ch010"},{"key":"e_1_3_2_127_1","doi-asserted-by":"publisher","DOI":"10.37055\/sbn\/149510"},{"key":"e_1_3_2_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3213681"},{"key":"e_1_3_2_129_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.015"},{"key":"e_1_3_2_130_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650215627483"},{"key":"e_1_3_2_131_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"e_1_3_2_132_1","doi-asserted-by":"publisher","DOI":"10.1177\/0306624X20952391"},{"key":"e_1_3_2_133_1","unstructured":"Webroot Software Inc. (2017). Automated threat research. http:\/\/research.spysweeper.com\/automated_research.html"},{"key":"e_1_3_2_134_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph19148294"},{"key":"e_1_3_2_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_2_136_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748895815603773"},{"key":"e_1_3_2_137_1","unstructured":"Widup. (2018). Verizon Business 2018 data breach investigation report. http:\/\/www.verizonenterprise.com\/verizon- nsights-lab\/dbir\/"},{"key":"e_1_3_2_138_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1519599"},{"key":"e_1_3_2_139_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.002"},{"key":"e_1_3_2_140_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.06.004"},{"key":"e_1_3_2_141_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376276"},{"key":"e_1_3_2_142_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20779"},{"key":"e_1_3_2_143_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"},{"key":"e_1_3_2_144_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-10-2019-0536"},{"key":"e_1_3_2_145_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i2.pp1922-1931"},{"key":"e_1_3_2_146_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i2.pp1943-1953"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2415750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T23:02:51Z","timestamp":1752188571000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2415750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,23]]},"references-count":145,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2025,7,18]]}},"alternative-id":["10.1080\/10447318.2024.2415750"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2415750","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2024,10,23]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-05-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-15","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}