{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T11:04:59Z","timestamp":1772363099331,"version":"3.50.1"},"reference-count":123,"publisher":"Informa UK Limited","issue":"19","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,10,2]]},"DOI":"10.1080\/10447318.2025.2452201","type":"journal-article","created":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T09:04:42Z","timestamp":1737968682000},"page":"12050-12071","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Bits, Bytes, and Bars: Towards a Digital Twin of the US Criminal Justice System"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5440-8456","authenticated-orcid":false,"given":"Amir Reza","family":"Asadi","sequence":"first","affiliation":[{"name":"School of Information Technology, University of Cincinnati","place":["Cincinnati, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3763-3300","authenticated-orcid":false,"given":"Taiwo Peter","family":"Akinremi","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati","place":["Cincinnati, USA"]}]},{"given":"Joel Kwesi","family":"Appiah","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati","place":["Cincinnati, USA"]}]},{"given":"Hansinie Madushika","family":"Jayathilake","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati","place":["Cincinnati, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7934-4976","authenticated-orcid":false,"given":"Opetunde","family":"Ibitoye","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati","place":["Cincinnati, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2453-1207","authenticated-orcid":false,"given":"Hazem","family":"Said","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati","place":["Cincinnati, USA"]}]}],"member":"301","published-online":{"date-parts":[[2025,1,27]]},"reference":[{"key":"e_1_3_3_2_1","unstructured":"AIAA Digital Engineering Integration Committee. (2020). Digital twin: Definition & value. AIAA and AIA Position Paper."},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100165"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/146879410100100307"},{"key":"e_1_3_3_5_1","doi-asserted-by":"crossref","unstructured":"Baralt M. (2011). Coding qualitative data. In A. Mackey & S. M. Gass (Eds.) Research methods in second language acquisition: A practical guide (pp. 222\u2013242). Wiley-Blackwell.","DOI":"10.1002\/9781444347340.ch12"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBI54897.2022.00009"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578527.3578542"},{"key":"e_1_3_3_8_1","volume-title":"Viral justice: How we grow the world we want","author":"Benjamin R.","year":"2022","unstructured":"Benjamin, R. (2022). Viral justice: How we grow the world we want. Princeton University Press."},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/14329.001.0001"},{"key":"e_1_3_3_10_1","volume-title":"Successful qualitative research: A practical guide for beginners.","author":"Braun V.","year":"2013","unstructured":"Braun, V., & Clarke, V. (2013). Successful qualitative research: A practical guide for beginners. Sage Publications."},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190684099.001.0001"},{"key":"e_1_3_3_12_1","unstructured":"Bureau of Justice Statistics. (2024). National crime victimization survey (NCVS)\u2014Home. https:\/\/ncvs.bjs.ojp.gov\/Home"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11825890_3"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/17410401111094286"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2023.816"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20216181"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-021-00153-9"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1747-4469.2006.00012.x"},{"key":"e_1_3_3_19_1","unstructured":"Crabtree A. (2024). H is for human and how (not) to evaluate qualitative research in HCI. arXiv preprint arXiv: 2409.01302. https:\/\/arxiv.org\/abs\/2409.01302"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316987124"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/s24020655"},{"key":"e_1_3_3_22_1","first-page":"429","volume-title":"Public service operations management","author":"de Blok C.","year":"2015","unstructured":"de Blok, C., Donk, D. P., Seepma, A., & Roukema, I. (2015). Applying supply chain logic to criminal law enforcement: The case of The Netherlands. In Public service operations management (pp. 429\u2013446). Routledge."},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSC52266.2021.9715412"},{"key":"e_1_3_3_24_1","unstructured":"Dillingham S. Nugent M. E. & Whitcomb D. (2004). Prosecution in the 21st century: Goals objectives and performance measures (2004). https:\/\/nij.ojp.gov\/library\/publications\/prosecution-21st-century-goals-objectives-and-performance-measures"},{"key":"e_1_3_3_25_1","unstructured":"Dlamini N. Mamushiane L. Nkosi M. Dlamini S. & Ramaboka T. (2023). Towards a digitally transformed criminal justice system: A South African case study. http:\/\/hdl.handle.net\/10204\/13665"},{"issue":"2000","key":"e_1_3_3_26_1","first-page":"52","article-title":"Criminal justice and the IT revolution","volume":"65","author":"Dunworth T.","year":"2000","unstructured":"Dunworth, T. (2000). Criminal justice and the IT revolution. Federal Probation, 65 (2000), 52. https:\/\/www.ojp.gov\/ncjrs\/virtual-library\/abstracts\/criminal-justice-and-it-revolution","journal-title":"Federal Probation"},{"key":"e_1_3_3_27_1","unstructured":"Elbashir A. (2022). Improving police and criminal court data transparency in the United States: A case study [PhD dissertation]. Massachusetts Institute of Technology."},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.11648\/j.ajtas.20160501.11"},{"key":"e_1_3_3_29_1","volume-title":"Automating inequality: How high-tech tools profile, police, and punish the poor","author":"Eubanks V.","year":"2018","unstructured":"Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish the poor. St. Martin\u2019s Press."},{"key":"e_1_3_3_30_1","first-page":"1","article-title":"Disciplining criminal justice: The peril and the promise of numbers","volume":"26","author":"Fan M. D. M.","year":"2007","unstructured":"Fan, M. D. M. (2007). Disciplining criminal justice: The peril and the promise of numbers. Yale L. & Pol\u2019y Rev, 26(1), 1.","journal-title":"Yale L. & Pol\u2019y Rev"},{"key":"e_1_3_3_31_1","volume-title":"Roe v. Wade: The untold story of the landmark Supreme Court decision that made abortion legal","author":"Faux M.","year":"2000","unstructured":"Faux, M. (2000). Roe v. Wade: The untold story of the landmark Supreme Court decision that made abortion legal. Cooper Square Press."},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47236-8_4"},{"key":"e_1_3_3_33_1","first-page":"38","article-title":"False positives, false negatives, and false analyses: A rejoinder to machine bias: There\u2019s software used across the country to predict future criminals. and it\u2019s biased against blacks","volume":"80","author":"Flores A. W.","year":"2016","unstructured":"Flores, A. W., Bechtel, K., & Lowenkamp, C. T. (2016). False positives, false negatives, and false analyses: A rejoinder to machine bias: There\u2019s software used across the country to predict future criminals. and it\u2019s biased against blacks. Federal Probation, 80(2), 38.","journal-title":"Federal Probation"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1215\/9780822390169-018"},{"key":"e_1_3_3_35_1","unstructured":"Giddens A. (1984). The constitution of society: Outline of the theory of structuration. Polity Press."},{"key":"e_1_3_3_36_1","volume-title":"The practice of qualitative data analysis: Research examples using MAXQDA","author":"Gizzi M. C.","year":"2021","unstructured":"Gizzi, M. C., & R\u00e4diker, S. (2021). The practice of qualitative data analysis: Research examples using MAXQDA. BoD\u2013Books on Demand."},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378797"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378797"},{"key":"e_1_3_3_39_1","volume-title":"Handbook of qualitative research","author":"Guba E.G.","year":"1994","unstructured":"Guba, E.G. (1994). Competing paradigms in qualitative research. Handbook of qualitative research. Sage."},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.18254\/S207751800012583-0"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47658-7_16"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1162\/desi_a_00600"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2479724.2479735"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105456"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315660318"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/0963721418763931"},{"key":"e_1_3_3_47_1","unstructured":"Hexagon G. (2021). Crime crash fire scene preserved: Forensic digital twin. Retrieved October 28 2024 from https:\/\/blog.hexagongeosystems.com\/crime-crash-fire-scene-preserved-forensic-digital-twin\/"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.2196\/33081"},{"issue":"7","key":"e_1_3_3_49_1","first-page":"180","article-title":"Grounded theory: The method","volume":"2","author":"Hutchinson S. A.","year":"1993","unstructured":"Hutchinson, S. A., & Wilson, H. S. (1993). Grounded theory: The method. Nursing Research: A Qualitative Perspective, 2(7), 180\u2013212.","journal-title":"Nursing Research: A Qualitative Perspective"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2023.108938"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2022.101706"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.12688\/digitaltwin.17440.1"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjae.2021.07.006"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/16094069221105075"},{"key":"e_1_3_3_55_1","first-page":"2009","article-title":"Open coding","volume":"23","author":"Khandkar S. H.","year":"2009","unstructured":"Khandkar, S. H. (2009). Open coding. University of Calgary, 23, 2009. https:\/\/cspages.ucalgary.ca\/\u223csaul\/wiki\/uploads\/CPSC681\/open-coding.pdf","journal-title":"University of Calgary"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10708-013-9516-8"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.08.474"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642914"},{"key":"e_1_3_3_59_1","volume-title":"Qualitative data analysis","author":"Lacey A.","year":"2001","unstructured":"Lacey, A., & Luff, D. (2001). Qualitative data analysis. Trent Focus Group UK."},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00691-z"},{"key":"e_1_3_3_61_1","volume-title":"Street-level bureaucracy: Dilemmas of the individual in public service","author":"Lipsky M.","year":"2010","unstructured":"Lipsky, M. (2010). Street-level bureaucracy: Dilemmas of the individual in public service. Russell Sage Foundation."},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/lsi.12334"},{"key":"e_1_3_3_63_1","volume-title":"The technology of policing: Crime mapping, information technology, and the rationality of crime control","author":"Manning P. K.","year":"2008","unstructured":"Manning, P. K. (2008). The technology of policing: Crime mapping, information technology, and the rationality of crime control (Vol. 4). NYU Press."},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v16i2.8346"},{"key":"e_1_3_3_65_1","first-page":"1","article-title":"MAXQDA and its application to LIS research","author":"Marjaei S.","year":"2019","unstructured":"Marjaei, S., Yazdi, F. A., & Chandrashekara, M. (2019). MAXQDA and its application to LIS research. Library Philosophy and Practice 1\u20139. https:\/\/digitalcommons.unl.edu\/libphilprac\/2325","journal-title":"Library Philosophy and Practice"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.3758\/bf03206329"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2019.3713"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479565"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.33621\/jdsr.v6i440456"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12103-019-09500-9"},{"key":"e_1_3_3_71_1","first-page":"1","volume-title":"The focus group kit","author":"Morgan D. L.","year":"1998","unstructured":"Morgan, D. L., Krueger, R. A., & King, J. A. (1998). The focus group kit (vols. 1\u20136). Sage Publications, Inc."},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2015.7333684"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.17226\/26894"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594093"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1pwt9w5.4"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406919899220"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037432"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.4.404.14600"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2020.08.001"},{"key":"e_1_3_3_80_1","first-page":"1","article-title":"From Brock Turner to Brian Banks: Protecting victims and preserving due process in the new area of title IX","volume":"14","author":"Perry L.","year":"2021","unstructured":"Perry, L. (2021). From Brock Turner to Brian Banks: Protecting victims and preserving due process in the new area of title IX. DePaul Journal for Social Justice, 14, 1. https:\/\/via.library.depaul.edu\/jsj\/vol14\/iss2\/2","journal-title":"DePaul Journal for Social Justice"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.06.446"},{"key":"e_1_3_3_82_1","unstructured":"Pope T. Freeguard G. & Metcalfe S. (2023). Doing data justice: Improving how data is collected managed and used in the justice system. https:\/\/apo.org.au\/node\/324427"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2015.7116993"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316091265"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003425724"},{"key":"e_1_3_3_86_1","unstructured":"Saad L. (2023). Historically low faith in US institutions continues. Gallup July 6."},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781444328301"},{"issue":"1","key":"e_1_3_3_88_1","first-page":"65","article-title":"The story of Felony sentencing in Ohio: An information technology perspective","volume":"21","author":"Said H.","year":"2024","unstructured":"Said, H. (2024). The story of Felony sentencing in Ohio: An information technology perspective. Ohio State Journal of Criminal Law, 21(1), 65. https:\/\/kb.osu.edu\/handle\/1811\/104858","journal-title":"Ohio State Journal of Criminal Law"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.22395\/ojum.v21n46a2"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557388"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.33612\/diss.128074337"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-03-2019-0111"},{"key":"e_1_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780192845290.001.0001"},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12115727"},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3633200"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512676.3512711"},{"key":"e_1_3_3_97_1","first-page":"1","volume-title":"AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering","author":"Somers S.","year":"2020","unstructured":"Somers, S., Oltramari, A., & Lebiere, C. (2020). Cognitive twin: A cognitive approach to personalized assistants. In AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering (p. 1). Association for the Advancement of Artificial Intelligence."},{"key":"e_1_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000005801"},{"key":"e_1_3_3_99_1","unstructured":"Steven S. (2002). Minority report. Film adaptation of Philip K. Dick\u2019s short story. https:\/\/www.historyofinformation.com\/detail.php?id=2146"},{"key":"e_1_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511557842"},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024969.3024980"},{"key":"e_1_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIS54172.2023.00055"},{"key":"e_1_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2012.1758"},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.3390\/su131810155"},{"key":"e_1_3_3_105_1","volume-title":"Research methods: The essential knowledge base","author":"Trochim W. M. K.","year":"2016","unstructured":"Trochim, W. M. K., Donnelly, J. P., & Arora, K. (2016). Research methods: The essential knowledge base. Cengage Learning."},{"key":"e_1_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569219.3569376"},{"key":"e_1_3_3_107_1","volume-title":"Stories: Screen narrative in the digital era.","author":"van der Oever A.","year":"2018","unstructured":"van der Oever, A., van den Oever, A., & Christie, I. (2018). Stories: Screen narrative in the digital era. Amsterdam University Press."},{"key":"e_1_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.2196\/25637"},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb008097"},{"key":"e_1_3_3_110_1","unstructured":"VERBI Software. (2021). MAXQDA 2022. https:\/\/www.maxqda.com\/about"},{"key":"e_1_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2022.913093"},{"key":"e_1_3_3_112_1","first-page":"3","volume-title":"New Directions in Group Communication","author":"Waldeck J. H.","year":"2002","unstructured":"Waldeck, J. H., Shepard, C. A., Teitelbaum, J., Farrar, W. J., & Seibold, D. R. (2002). New directions for functional, symbolic convergence, structuration, and bona fide group perspectives of group communication. In New Directions in Group Communication (pp. 3\u201324). Sage Publications, Inc."},{"key":"e_1_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3347423"},{"key":"e_1_3_3_114_1","unstructured":"Wang K. (2024). Capturing the dynamics in organizational digital transformation using system dynamics modelling [Master\u2019s thesis]. University of Twente."},{"key":"e_1_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jum.2023.03.001"},{"issue":"1954","key":"e_1_3_3_116_1","first-page":"483","article-title":"Brown v. board of education","volume":"347","author":"Warren C. J. E.","year":"1954","unstructured":"Warren, C. J. E. (1954). Brown v. board of education. United States Reports, 347(1954), 483. https:\/\/supreme.justia.com\/cases\/federal\/us\/347\/483\/","journal-title":"United States Reports"},{"issue":"2023","key":"e_1_3_3_117_1","first-page":"43","article-title":"Transforming access to justice in the digital age: The role of E-courts","volume":"8","author":"Waseem Sharma, A.","year":"2023","unstructured":"Waseem, Sharma, A., & Kumar, A. (2023). Transforming access to justice in the digital age: The role of E-courts. NUJS Journal of Regulatory Studies, 8 (2023), 43. https:\/\/www.nujs.edu\/wp-content\/uploads\/2023\/08\/vol8iss2-3.pdf","journal-title":"NUJS Journal of Regulatory Studies"},{"key":"e_1_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342197.3344539"},{"key":"e_1_3_3_119_1","volume-title":"Proceedings of the Fourth Media in Transition Conference","author":"Worth S.","year":"2005","unstructured":"Worth, S. (2005). Narrative knowledge: Knowing through storytelling. In Proceedings of the Fourth Media in Transition Conference. MIT Press."},{"key":"e_1_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1177\/23998083221137079"},{"key":"e_1_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858523"},{"key":"e_1_3_3_122_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2021.2014591"},{"key":"e_1_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJEPR.333851"},{"key":"e_1_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2111046"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2025.2452201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T05:07:19Z","timestamp":1758604039000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2025.2452201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,27]]},"references-count":123,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2025,10,2]]}},"alternative-id":["10.1080\/10447318.2025.2452201"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2025.2452201","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,27]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-07-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-03","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}