{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:07:13Z","timestamp":1762376833208,"version":"3.41.2"},"reference-count":56,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AJIM"],"published-print":{"date-parts":[[2020,12,11]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This investigation aims to examine the differences and similarities between activity tracking technology users from two regions (the USA and Germany) in their intended privacy-related behavior. The focus lies on data handling after hypothetical discontinuance of use, data protection and privacy policy seeking, and privacy concerns.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The data was collected through an online survey in 2019. In order to identify significant differences between participants from Germany and the USA, the chi-squared test and the Mann\u2013Whitney U test were applied.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The intensity of several privacy-related concerns was significantly different between the two groups. The majority of the participants did not inform themselves about the respective data privacy policies or terms and conditions before installing an activity tracking application. The majority of the German participants knew that they could request the deletion of all their collected data. In contrast, only 35% out of 68 participants from the US knew about this option.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>This study intends to raise awareness about managing the collected health and fitness data after stopping to use activity tracking technologies. Furthermore, to reduce privacy and security concerns, the involvement of the government, companies and users is necessary to handle and share data more considerably and in a sustainable way.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This study sheds light on users of activity tracking technologies from a broad perspective (here, participants from the USA and Germany). It incorporates not only concerns and the privacy paradox but (intended) user behavior, including seeking information on data protection and privacy policy and handling data after hypothetical discontinuance of use of the technology.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ajim-03-2020-0067","type":"journal-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T18:16:43Z","timestamp":1607624203000},"page":"180-200","source":"Crossref","is-referenced-by-count":13,"title":["Data privacy-related behavior and concerns of activity tracking technology users from Germany and the USA"],"prefix":"10.1108","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3601-5100","authenticated-orcid":false,"given":"Aylin","family":"Ilhan","sequence":"first","affiliation":[]},{"given":"Kaja J.","family":"Fietkiewicz","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"4","key":"key2021022303514046100_ref001","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","article-title":"A review on the state-of-the-art privacy-preserving approaches in the e-health clouds","volume":"18","year":"2014","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"2","key":"key2021022303514046100_ref002","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1108\/EUM0000000007083","article-title":"Information and digital literacies: a review of concepts","volume":"57","year":"2001","journal-title":"Journal of Documentation"},{"key":"key2021022303514046100_ref003","doi-asserted-by":"crossref","unstructured":"Case, D.O. and Given, L.M. (Eds) (2016), Looking for Information: A Survey of Research on Information Seeking, Needs, and Behavior, 4th ed., Emerald Group Publishing, Howard House, Wagon Lane.","DOI":"10.1108\/S2055-53772016022"},{"key":"key2021022303514046100_ref005","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1145\/2998181.2998220","article-title":"Gender and cross-cultural differences in social media disclosures of mental illness","year":"2017"},{"issue":"2-3","key":"key2021022303514046100_ref006","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1177\/1833358319851684","article-title":"Wearable devices in healthcare: privacy and information security issues","volume":"49","year":"2020","journal-title":"Health Information Management Journal"},{"key":"key2021022303514046100_ref007","unstructured":"CJEU (2020), \u201cJudgment in case C-311\/18. data protection commissioner v facebook Ireland and maximillian schrems. press release no 91\/20\u201d, available at: https:\/\/curia.europa.eu\/jcms\/upload\/docs\/application\/pdf\/2020-07\/cp200091en.pdf (accessed 29 July 2020)."},{"volume-title":"Statistical Power Analysis for the Behavioral Sciences","year":"1988","key":"key2021022303514046100_ref008"},{"issue":"2","key":"key2021022303514046100_ref009","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1108\/AJIM-12-2016-0208","article-title":"Food logging: an information literacy perspective","volume":"69","year":"2017","journal-title":"Aslib Journal of Information Management"},{"issue":"3","key":"key2021022303514046100_ref010","doi-asserted-by":"crossref","first-page":"341","DOI":"10.2307\/249775","article-title":"\u2018How did they get my name?\u2019: an exploratory investigation of consumer attitudes toward secondary information use","volume":"17","year":"1993","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021022303514046100_ref011","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"key":"key2021022303514046100_ref012","unstructured":"European Commission (2019), \u201cGeneral data protection regulation: one year on\u201d, available at: http:\/\/europa.eu\/rapid\/press-release_IP-19-2610_en.htm (accessed 5 March 2020)."},{"key":"key2021022303514046100_ref013","doi-asserted-by":"publisher","DOI":"10.1186\/s12966-015-0314-1","article-title":"Systematic review of the validity and reliability of consumer-wearable activity trackers","volume":"12","year":"2015","journal-title":"International Journal of Behavioral Nutrition and Physical Activity"},{"key":"key2021022303514046100_ref014","doi-asserted-by":"crossref","unstructured":"Feng, Y., Li, K. and Agosto, D.E. (2017), \u201cHealthy users' personal health information management from activity trackers: the perspective of gym-goers\u201d, in Erdelez, S. and Agarwal, N. (Ed.), Proceedings of the 80th ASIS&T Annual Meeting Diversity of Engagement: Connecting People and Information in the Physical and Virtual Worlds in Washington, USA, 2017, John Wiley & Sons, Somerset, NJ, pp. 71-81, doi: 10.1002\/pra2.2017.14505401009.","DOI":"10.1002\/pra2.2017.14505401009"},{"issue":"3","key":"key2021022303514046100_ref015","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","article-title":"Security and privacy in electronic health records: a systematic literature review","volume":"46","year":"2013","journal-title":"Journal of Biomedical Informatics"},{"key":"key2021022303514046100_ref016","doi-asserted-by":"crossref","unstructured":"Fietkiewicz, K.J. and Henkel, M. (2018), \u201cPrivacy protecting fitness trackers: an oxymoron or soon to be reality?\u201d, in Meiselwitz, G. (Ed.), Social Computing and Social Media. User Experience and Behavior. SCSM 2018, Lecture Notes in Computer Science, Springer, Cham, Vol. 10913, pp. 431-444, doi: 10.1007\/978-3-319-91521-0_31.","DOI":"10.1007\/978-3-319-91521-0_31"},{"key":"key2021022303514046100_ref017","unstructured":"Fietkiewicz, K.J. and Ilhan, A. (2020a), \u201cFitness tracking technologies: data privacy doesn't matter? the (un)concerns of users, former users and non-users\u201d, Proceedings of the 53rd Hawaii International Conference on System Sciences, Maui, USA, HICSS (ScholarSpace), Honolulu, HI, pp. 3439-3448, available at: http:\/\/hdl.handle.net\/10125\/64163."},{"key":"key2021022303514046100_ref018","unstructured":"Fietkiewicz, K.J. and Ilhan, A. (2020b), \u201cHow do users of activity tracking technologies perceive the data privacy environment in the EU?\u201d, in Proceedings of the iConference 2020, IDEALS, Urbana, IL, pp. 1-8, available at: http:\/\/hdl.handle.net\/2142\/106603."},{"key":"key2021022303514046100_ref019","doi-asserted-by":"crossref","unstructured":"Fietkiewicz, K.J. and Lins, E. (2016), \u201cNew media and new territories for european law: competition in the market for social networking services\u201d, in Knautz, K. and Baran, K.S. (Ed.), Facets of Facebook: Use and Users, De Gruyter Saur, Berlin\/Boston, pp. 285-324, doi: 10.1515\/9783110418163-012.","DOI":"10.1515\/9783110418163-012"},{"key":"key2021022303514046100_ref020","doi-asserted-by":"crossref","unstructured":"Fietkiewicz, K.J., Lins, E. and Budree, A. (2018), \u201cInvestigating the generation- and gender-dependent differences in social media use: a cross-cultural study in Germany, Poland and South Africa\u201d, in Meiselwitz, G. (Ed.), Social Computing and Social Media Technologies and Analytics, Lecture Notes in Computer Science, Springer, Cham, Vol. 10914, pp. 183-200, doi: 10.1007\/978-3-319-91485-5.","DOI":"10.1007\/978-3-319-91485-5"},{"issue":"9","key":"key2021022303514046100_ref021","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1002\/asi.24369","article-title":"To protect my health or to protect my health privacy? A mixed-methods investigation of the privacy paradox","volume":"71","year":"2019","journal-title":"Journal of Association for Information Science and Technology"},{"key":"key2021022303514046100_ref022","doi-asserted-by":"crossref","unstructured":"Fritz, T., Huang, E.M., Murphy, G.C. and Zimmermann, T. (2014), \u201cPersuasive technology in the real world: a study of long-term use of activity sensing devices for fitness\u201d, CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, ON, Canada, ACM, New York, pp. 487-496, doi: 10.1145\/2556288.2557383.","DOI":"10.1145\/2556288.2557383"},{"key":"key2021022303514046100_ref023","doi-asserted-by":"crossref","unstructured":"Gouveia, R., Karapanos, E. and Hassenzahl, M. (2015), \u201cHow do we engage with activity trackers?: a longitudinal study of habito\u201d, UbiComp '15: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Osaka, Japan, ACM, New York, pp. 1305-1316, doi: 10.1145\/2750858.2804290.","DOI":"10.1145\/2750858.2804290"},{"key":"key2021022303514046100_ref024","doi-asserted-by":"crossref","unstructured":"Hagen, L. (2017), \u201cOvercoming the privacy challenges of wearable devices: a study on the role of digital literacy\u201d, Proceedings of the 18th Annual International Conference on Digital Government Research, Staten Island, NY, USA, ACM, New York, pp. 598-599, doi: 10.1145\/3085228.3085254.","DOI":"10.1145\/3085228.3085254"},{"key":"key2021022303514046100_ref025","first-page":"3737","article-title":"What can I really do?' Explaining the privacy paradox with online apathy","volume":"10","year":"2016","journal-title":"International Journal of Communication"},{"key":"key2021022303514046100_ref026","doi-asserted-by":"crossref","unstructured":"Henkel, M., Heck, T. and G\u00f6retz, J. (2018), \u201cRewarding fitness tracking - the communication and promotion of health insurers' bonus programs and the use of self-tracking data\u201d, in Meiselwitz, G. (Ed.), Social Computing and Social Media. Technologies and Analytics. SCSM 2018. Lecture Notes in Computer Science, Springer, Cham, Vol. 10914, pp. 28-49, doi: 10.1007\/978-3-319-91485-5_3.","DOI":"10.1007\/978-3-319-91485-5_3"},{"issue":"1","key":"key2021022303514046100_ref027","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1108\/ITP-01-2014-0007","article-title":"Understanding the roles of cultural differences and socio-economic status in social media continuance intention","volume":"28","year":"2015","journal-title":"Information Technology and People"},{"key":"key2021022303514046100_ref028","unstructured":"IDC (2019), \u201cIDC reports strong growth in the worldwide wearables market, led by holiday shipments of smartwatches, wrist band, and ear-worn devices\u201d, available at: https:\/\/www.businesswire.com\/news\/home\/20190305005268\/en\/IDC-Reports-Strong-Growth-in-the-Worldwide-Wearables-Market-Led-by-Holiday-Shipments-of-Smartwatches-Wrist-Bands-and-Ear-Worn-Devices (accessed 5 March 2020)."},{"first-page":"3376","article-title":"10,000 Steps a day for health? User-based evaluation of wearable activity trackers","year":"2018","key":"key2021022303514046100_ref029"},{"key":"key2021022303514046100_ref030","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s12599-012-0216-6","article-title":"Self-disclosure and privacy calculus on social networking sites: the role of culture intercultural dynamics of privacy calculus","volume":"4","year":"2012","journal-title":"Business and Information Systems Engineering"},{"key":"key2021022303514046100_ref031","first-page":"243","article-title":"Health information privacy of activity trackers","volume-title":"Proceedings of the 16th European Conference on Cyber Warfare and Security","year":"2017"},{"journal-title":"Havard Magazine","article-title":"Features. Code is law. On liberty in cyberspace","year":"2000","key":"key2021022303514046100_ref032"},{"volume-title":"Code: And Other Laws of Cyberspace (Version 2)","year":"2006","key":"key2021022303514046100_ref033"},{"key":"key2021022303514046100_ref034","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ijmedinf.2015.12.010","article-title":"Examining individuals' adoption of healthcare wearable devices: an empirical study from privacy calculus perspective","volume":"88","year":"2016","journal-title":"International Journal of Medical Informatics"},{"key":"key2021022303514046100_ref035","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.techfore.2016.07.021","article-title":"Seeking and sharing health information on social media: a net valence model and cross-cultural comparison","volume":"126","year":"2018","journal-title":"Technological Forecasting and Social Change"},{"key":"key2021022303514046100_ref036","doi-asserted-by":"crossref","unstructured":"Lidynia, C., Brauner, P. and Ziefle, M. (2018), \u201cA step in the right direction - understanding privacy concerns and perceived sensitivity of fitness trackers\u201d, in Ahram, T. and Falc\u00e3o, C. (Eds), Advances in Human Factors in Wearable Technologies and Game Design, AHFE 2017, Advances in Intelligent Systems and Computing, Springer, Cham, Vol. 608, pp. 42-53, doi: 10.1007\/978-3-319-60639-2_5.","DOI":"10.1007\/978-3-319-60639-2_5"},{"key":"key2021022303514046100_ref037","doi-asserted-by":"crossref","unstructured":"Lidynia, C., Schomakers, E.-M. and Ziefle, M. (2019), \u201cWhat are you waiting for? \u2013 perceived barriers to the adoption of fitness-applications and wearables\u201d, in Ahram, T. (Ed.), Advances in Human Factors in Wearable Technologies and Game Design, AHFE 2018, Advances in Intelligent Systems and Computing, Vol. 795, Springer, Cham, pp. 41-52, doi: 10.1007\/978-3-319-94619-1_5.","DOI":"10.1007\/978-3-319-94619-1_5"},{"issue":"1","key":"key2021022303514046100_ref038","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1177\/1440783317722854","article-title":"Tool, toy and tutor: subjective experiences of digital self-tracking","volume":"54","year":"2018","journal-title":"Journal of Sociology"},{"issue":"8","key":"key2021022303514046100_ref039","doi-asserted-by":"publisher","DOI":"10.2196\/13652","article-title":"Information literacy in food and activity tracking among parkrunners, people with type 2 diabetes, and people with irritable bowel syndrome: exploratory study","volume":"21","year":"2019","journal-title":"Journal of Medical Internet Research"},{"issue":"2","key":"key2021022303514046100_ref040","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1057\/ejis.2013.17","article-title":"Cultural and generational influences on privacy concerns: a qualitative study in seven European countries","volume":"23","year":"2014","journal-title":"European Journal of Information Systems"},{"key":"key2021022303514046100_ref041","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.chb.2016.03.065","article-title":"Health empowerment through activity trackers: an empirical smart wristband study","volume":"62","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021022303514046100_ref042","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox: personal information disclosure intentions versus behaviors","volume":"41","year":"2007","journal-title":"Journal of Consumer Affairs"},{"first-page":"4388","article-title":"Privacy concerns regarding wearable IoT devices: how it is influenced by GDPR?","year":"2020","key":"key2021022303514046100_ref004"},{"key":"key2021022303514046100_ref043","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.chb.2016.09.005","article-title":"Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison","volume":"65","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2021022303514046100_ref044","doi-asserted-by":"crossref","unstructured":"Pingo, Z. and Narayan, B. (2018), \u201cUsers' responses to privacy issues with the connected information ecologies created by fitness trackers\u201d, in Dobreva, M., Hinze, A. and \u017dumer, M. (Ed.), Maturity and Innovation in Digital Libraries, ICADL 2018, Lecture Notes in Computer Science, Vol. 11279, Springer, Cham, pp. 240-255, doi: 10.1007\/978-3-030-04257-8_25.","DOI":"10.1007\/978-3-030-04257-8_25"},{"key":"key2021022303514046100_ref045","doi-asserted-by":"crossref","unstructured":"Rooksby, J., Rost, M., Morrison, A. and Chalmers, M. (2014), \u201cPersonal tracking as lived informatics\u201d, CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Toronto, ON, New York, pp. 1163-1172, doi: 10.1145\/2556288.2557039.","DOI":"10.1145\/2556288.2557039"},{"issue":"3","key":"key2021022303514046100_ref046","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1249\/MSS.0000000000000778","article-title":"Twenty-four hours of sleep, sedentary behavior, and physical activity with nine wearable devices","volume":"48","year":"2016","journal-title":"Medicine and Science in Sports and Exercise"},{"key":"key2021022303514046100_ref047","doi-asserted-by":"crossref","unstructured":"Schneegass, S., Poguntke, R. and Machulla, T. (2019), \u201cUnderstanding the impact of information representation on willingness to share information\u201d, CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow, New York, doi: 10.1145\/3290605.3300753.","DOI":"10.1145\/3290605.3300753"},{"key":"key2021022303514046100_ref048","doi-asserted-by":"crossref","unstructured":"Schomakers, E.-M., Lidynia, C. and Ziefle, M. (2019), \u201cListen to my heart? How privacy concerns shape users' acceptance of e-health technologies\u201d, Proceedings of the International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, IEEE Xplore, Barcelona, pp. 306-311, doi: 10.1109\/WiMOB.2019.8923448.","DOI":"10.1109\/WiMOB.2019.8923448"},{"key":"key2021022303514046100_ref049","doi-asserted-by":"publisher","first-page":"103153","DOI":"10.1016\/j.jbi.2019.103153","article-title":"Wearable activity trackers, accuracy, adoption, acceptance and health impact: a systematic literature review","volume":"93","year":"2019","journal-title":"Journal of Biomedical Informatics"},{"key":"key2021022303514046100_ref050","unstructured":"The Guardian (2018), \u201cHackers steal data of 150 million MyFitnessPal app users\u201d, available at: https:\/\/www.theguardian.com\/technology\/2018\/mar\/30\/hackers-steal-data-150m-myfitnesspal-app-users-under-armour (accessed 14 October 2020)."},{"key":"key2021022303514046100_ref051","unstructured":"Trepte, S. and Masur, P.K. (2016), \u201cCultural differences in social media use, privacy, and self-disclosure: research report on a multicultural survey study\u201d, available at: http:\/\/opus.uni-hohenheim.de\/volltexte\/2016\/1218\/."},{"key":"key2021022303514046100_ref052","doi-asserted-by":"crossref","unstructured":"Tsoi, H.K. and Chen, L. (2011), \u201cFrom privacy concern to uses of social network sites: a cultural comparison via user survey\u201d, Proceedings of 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, Boston, MA, IEEE Computer Society, Washington DC, pp. 457-464, doi: 10.1109\/PASSAT\/SocialCom.2011.71.","DOI":"10.1109\/PASSAT\/SocialCom.2011.71"},{"key":"key2021022303514046100_ref053","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-78105-1_27","article-title":"Privacy attitudes and data valuation among fitness tracker users","volume-title":"Proceedings of the iConference 2018, Transforming Digital Worlds, Lecture Notes in Computer Science","year":"2018"},{"key":"key2021022303514046100_ref054","doi-asserted-by":"crossref","unstructured":"Wang, Y., Norice, G. and Cranor, L.F. (2011), \u201cWho is concerned about what? A study of American, Chinese and Indian users' privacy concerns on social network sites\u201d, in McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.R., Sasse, A. and Beres, Y. (Ed.), Trust and Trustworthy Computing, Trust 2011, Lecture Notes in Computer Science, Vol. 6740, pp. 146-153, doi: 10.1007\/978-3-642-21599-5_11.","DOI":"10.1007\/978-3-642-21599-5_11"},{"issue":"2","key":"key2021022303514046100_ref055","doi-asserted-by":"crossref","first-page":"378","DOI":"10.15760\/comminfolit.2017.11.2.9","article-title":"Privacy literacy: from theory to practice","volume":"11","year":"2017","journal-title":"Communications in Information Literacy"},{"issue":"7","key":"key2021022303514046100_ref056","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1080\/1369118X.2018.1543442","article-title":"\u2018There's nothing really they can do with this information\u2019: unpacking how users manage privacy boundaries for personal fitness information","volume":"23","year":"2020","journal-title":"Information, Communication and Society"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-03-2020-0067\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-03-2020-0067\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:00:28Z","timestamp":1753398028000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/73\/2\/180-200\/33459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,12,11]]}},"alternative-id":["10.1108\/AJIM-03-2020-0067"],"URL":"https:\/\/doi.org\/10.1108\/ajim-03-2020-0067","relation":{},"ISSN":["2050-3806"],"issn-type":[{"type":"print","value":"2050-3806"}],"subject":[],"published":{"date-parts":[[2020,12,11]]}}}