{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:49:20Z","timestamp":1769208560499,"version":"3.49.0"},"reference-count":133,"publisher":"Informa UK Limited","issue":"17","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,9,2]]},"DOI":"10.1080\/10447318.2024.2440674","type":"journal-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T06:57:30Z","timestamp":1734505050000},"page":"11116-11133","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Determinants of Users\u2019 Cybersecurity Behavior in the Metaverse: A Deep Learning-Based Hybrid SEM-ANN Approach"],"prefix":"10.1080","volume":"41","author":[{"given":"Afrah","family":"Almansoori","sequence":"first","affiliation":[{"name":"Faculty of Engineering & IT, The British University in Dubai","place":["Dubai, UAE"]},{"name":"General Department of Forensic Science and Criminology, Dubai Police G.H.Q","place":["Dubai, UAE"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5269-5380","authenticated-orcid":false,"given":"Mostafa","family":"Al-Emran","sequence":"additional","affiliation":[{"name":"Faculty of Engineering & IT, The British University in Dubai","place":["Dubai, UAE"]},{"name":"Engineering Technical College, Al-Bayan University","place":["Baghdad, Iraq"]}]},{"given":"Khaled","family":"Shaalan","sequence":"additional","affiliation":[{"name":"Faculty of Engineering & IT, The British University in Dubai","place":["Dubai, UAE"]}]}],"member":"301","published-online":{"date-parts":[[2024,12,18]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"Abdullahi K. M. (2021). Cybersecurity threats in virtual reality (VR) and augmented reality (AR)\u2014Challenges organizations may encounter & tips on how to overcome them. Immers Space. https:\/\/medium.com\/immers-space\/cybersecurity-threats-in-virtual-reality-vr-and-augmented-reality-ar-challenges-41435b6b5d88#"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1505.02908"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-019-09236-5"},{"key":"e_1_3_2_5_1","unstructured":"Agora. (2022). Agora survey: Majority of developers are all-in on the metaverse. Agora. https:\/\/www.agora.io\/en\/blog\/agora-survey-majority-of-developers-are-all-in-on-the-metaverse\/"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1856928"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2291608"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64987-6_10"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2020.1753216"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2024.102498"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-02-2020-0052"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2260984"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2084036"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJBM-07-2021-0291\/FULL\/PDF"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-018-9691-9"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.01.002"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1300\/J013v35n01_06"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2020.07.002"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13095700"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12122039"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2125610"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_2"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2023.102258"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106184"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106531"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.102120"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_4"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.05.023"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77448-6_66"},{"issue":"5","key":"e_1_3_2_31_1","first-page":"5","article-title":"Effort expectancy, performance expectancy, social influence and facilitating conditions as predictors of behavioural intentions to use ATMS with fingerprint authentication in Ugandan banks","volume":"17","author":"Catherine B. N.","year":"2017","unstructured":"Catherine, B. N., Geofrey, K. M., Moya, M. B., & Aballo, G. (2017). Effort expectancy, performance expectancy, social influence and facilitating conditions as predictors of behavioural intentions to use ATMS with fingerprint authentication in Ugandan banks. Global Journal of Computer Science and Technology, 17(5), 5\u201323.","journal-title":"Global Journal of Computer Science and Technology,"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-022-00056-9"},{"issue":"2","key":"e_1_3_2_33_1","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","volume":"295","author":"Chin W. W.","year":"1998","unstructured":"Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295\u2013336.","journal-title":"Modern Methods for Business Research,"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.068"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101931"},{"key":"e_1_3_2_36_1","unstructured":"Cinema8. (2021). Control over your personal data and systems in metaverse - Interactive video blogs and articles. https:\/\/cinema8.com\/blog\/control-over-your-personal-data-and-systems-in-metaverse"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2012.11645573"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJBM-05-2022-0202\/FULL\/PDF"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2021.1905066"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.17706\/ijeeee.2016.6.1.13-20"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102542"},{"key":"e_1_3_2_42_1","unstructured":"Ehizibue D. (2022). Investigation of individuals\u2019 behavior towards phishing attacks using the health belief model - University of Twente Student Theses [Paper presentation]. 36th Twente Student Conference on IT 1\u201312."},{"key":"e_1_3_2_43_1","unstructured":"Expert Panel. (2021). 13 bad habits that can compromise company tech devices and cybersecurity. Forbes. https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/10\/12\/13-bad-habits-that-can-compromise-company-tech-devices-and-cybersecurity"},{"key":"e_1_3_2_44_1","unstructured":"Fagan M. (2017). Emotionally and socially aware approaches to understanding and changing users\u2019 cybersecurity behavior [University of Connecticut - Storrs]. https:\/\/digitalcommons.lib.uconn.edu\/dissertations\/1663"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/AFRICON46755.2019.9133764"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2003.817277"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106319"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-116-4-350_1"},{"issue":"2","key":"e_1_3_2_50_1","first-page":"49","article-title":"Health beliefs and self breast examination in black women","volume":"9","author":"Graham M. E.","year":"2002","unstructured":"Graham, M. E., Liggons, Y., & Hypolite, M. (2002). Health beliefs and self breast examination in black women. Journal of Cultural Diversity, 9(2), 49\u201354.","journal-title":"Journal of Cultural Diversity"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v15i12.22503"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910978112"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2016-0130"},{"key":"e_1_3_2_54_1","volume-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","author":"Hair J. F.","year":"2016","unstructured":"Hair, J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2016). A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications."},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1611528"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102710"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS55398.2022.9800834"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.2307\/3151627"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2407686"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.010"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114803"},{"key":"e_1_3_2_64_1","unstructured":"Kappor G. (2022 September). Entrepreneurs must learn to tackle business risks in the metaverse. Coin Telegraph. https:\/\/cointelegraph.com\/news\/entrepreneurs-must-learn-to-tackle-business-risks-in-the-metaverse"},{"key":"e_1_3_2_65_1","unstructured":"Kelly K. (2023). What is cybersecurity & importance of cyber security. Simplilearn. https:\/\/www.simplilearn.com\/tutorials\/cyber-security-tutorial\/what-is-cyber-security"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1108\/BL-07-2019-0097"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2021.2001273"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00039"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijec.2015100101"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00302"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2023.2165197"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1551\/1\/012005"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113477"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.07.009"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"e_1_3_2_76_1","unstructured":"Li C. Lalani F. (2022). How to address digital safety in the metaverse. We Forum. https:\/\/www.weforum.org\/agenda\/2022\/01\/metaverse-risks-challenges-digital-safety\/"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.017"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ES.2014.66"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3442103"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.02.008"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20074-9_11"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.01390"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.101151"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101651"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.04.005"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570410522099"},{"key":"e_1_3_2_89_1","first-page":"1","volume-title":"Thirty Fifth International Conference on Information Systems","author":"Mou J.","year":"2014","unstructured":"Mou, J., & Cohen, J. F. (2014). Trust, risk barriers and health beliefs in consumer acceptance of online health services. In Thirty Fifth International Conference on Information Systems (pp. 1\u201319)."},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.3837\/TIIS.2021.01.006"},{"key":"e_1_3_2_91_1","volume-title":"PACIS 2007 Proceedings.","author":"Ng B. Y.","year":"2007","unstructured":"Ng, B. Y., & Xu, Y. (2007). Studying users\u2019 computer security behavior using the Health Belief Model. PACIS 2007 Proceedings."},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-020-10070-z"},{"key":"e_1_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927931"},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-022-00682-x"},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1093\/her\/1.3.153"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10144905"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2021.1944823"},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468784.3468789"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102281"},{"key":"e_1_3_2_100_1","first-page":"153","article-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation","author":"Rogers R. W.","year":"1983","unstructured":"Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In Social psychology: A source book (pp. 153\u2013176). The Guilford Press.","journal-title":"Social psychology: A source book"},{"key":"e_1_3_2_101_1","first-page":"113","volume-title":"Handbook of health behavior research 1: Personal and social determinants","author":"Rogers R. W.","year":"1997","unstructured":"Rogers, R. W., & Prentice-Dunn, S. (1997). Protection motivation theory. In Handbook of health behavior research 1: Personal and social determinants (pp. 113\u2013132)."},{"key":"e_1_3_2_102_1","doi-asserted-by":"publisher","DOI":"10.1177\/109019817400200403"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1108\/JIMA-09-2020-0261"},{"key":"e_1_3_2_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2013.43"},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.digbus.2022.100021"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSPPC.308785"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601253"},{"key":"e_1_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58481-2"},{"key":"e_1_3_2_109_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1812134"},{"key":"e_1_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_14"},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20823"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2023.3296132"},{"key":"e_1_3_2_113_1","volume-title":"Interpersonal behavior","author":"Triandis H.","year":"1977","unstructured":"Triandis, H. (1977). Interpersonal behavior. Brooks\/Cole Pub. Co."},{"key":"e_1_3_2_114_1","first-page":"195","article-title":"Values, attitudes, and interpersonal behavior","volume":"27","author":"Triandis H. C.","year":"1979","unstructured":"Triandis, H. C. (1979). Values, attitudes, and interpersonal behavior. Nebraska Symposium on Motivation, 27, 195\u2013259.","journal-title":"Nebraska Symposium on Motivation,"},{"key":"e_1_3_2_115_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"e_1_3_2_116_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101651"},{"key":"e_1_3_2_117_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"e_1_3_2_118_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.008"},{"key":"e_1_3_2_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMITEC50163.2020.9334097"},{"key":"e_1_3_2_120_1","unstructured":"Vigliarolo B. (2022). Metaverse companies faced 60% more attacks last year and 5 other online fraud statistics. TechRepublic. https:\/\/www.techrepublic.com\/article\/metaverse-companies-face-60-more-attacks-last-year-and-5-other-online-fraud-statistics\/"},{"key":"e_1_3_2_121_1","doi-asserted-by":"publisher","DOI":"10.3390\/app122211804"},{"key":"e_1_3_2_122_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102923"},{"key":"e_1_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047"},{"key":"e_1_3_2_124_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.11.029"},{"key":"e_1_3_2_125_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1232991"},{"key":"e_1_3_2_126_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102520"},{"key":"e_1_3_2_127_1","first-page":"80","volume-title":"SIGHCI 2004 Proceedings","author":"Woon I. M. Y.","year":"2004","unstructured":"Woon, I. M. Y. (2004). Behavioral Factors Affecting Internet Abuse in the Workplace \u2013 An Empirical Investigation. SIGHCI 2004 Proceedings (pp. 80\u201384)."},{"key":"e_1_3_2_128_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2413306"},{"key":"e_1_3_2_129_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-10-2018-0229"},{"issue":"4","key":"e_1_3_2_130_1","first-page":"407","article-title":"Exploring factors that influence students\u2019 behaviors in information security","volume":"23","author":"Yoon C.","year":"2012","unstructured":"Yoon, C., Hwang, J. W., & Kim, R. (2012). Exploring factors that influence students\u2019 behaviors in information security. Journal of Information Systems Education, 23(4), 407\u2013416.","journal-title":"Journal of Information Systems Education,"},{"key":"e_1_3_2_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2022.3204285"},{"key":"e_1_3_2_132_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tranpol.2021.08.002"},{"issue":"12","key":"e_1_3_2_133_1","first-page":"333","article-title":"The adoption of mobile banking in Islamic banks during COVID-19 pandemic","volume":"32","author":"Zakaria S. A.","year":"2021","unstructured":"Zakaria, S. A., Abdul-Majid, M., & Omar, N. A. (2021). The adoption of mobile banking in Islamic banks during COVID-19 pandemic. Journal of Islamic Economic System Conference, 32(12), 333\u2013342.","journal-title":"Journal of Islamic Economic System Conference,"},{"key":"e_1_3_2_134_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1712269"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2440674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T05:46:54Z","timestamp":1759211214000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2440674"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,18]]},"references-count":133,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2025,9,2]]}},"alternative-id":["10.1080\/10447318.2024.2440674"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2440674","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-11-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-03","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}