{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T19:13:22Z","timestamp":1770491602555,"version":"3.49.0"},"reference-count":73,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T00:00:00Z","timestamp":1594080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AJIM"],"published-print":{"date-parts":[[2020,7,7]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This study examines the impact of personality traits on the degree of challenge experienced by individuals with respect to the threat on their information, the evaluation of their self-efficacy to secure the information and hence, their readiness to secure information.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The study's population consisted of 157 teachers from various educational institutions across Israel. We used five questionnaires to gather data.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Findings reveal a link between participants' personality traits, situation evaluation indicators and their readiness to secure information. Further, the greater subjects' information security awareness and familiarity with information security concepts, the better their application of the tools for securing information will be.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The importance of this research lies primarily in that it highlights the importance of individual differences while dealing with information security awareness. The findings constitute a theoretical and empirical basis for building tools toward guiding teachers to protect their information, as well as for devising educational and pedagogic programs for making a cultural change.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ajim-12-2019-0371","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T05:31:25Z","timestamp":1594099885000},"page":"787-812","source":"Crossref","is-referenced-by-count":10,"title":["Readiness for information security of teachers as a function of their personality traits and their assessment of threats"],"prefix":"10.1108","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1440-3305","authenticated-orcid":false,"given":"Noa","family":"Aharony","sequence":"first","affiliation":[]},{"given":"Dan","family":"Bouhnik","sequence":"additional","affiliation":[]},{"given":"Nurit","family":"Reich","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"1","key":"key2020111704445827100_ref001","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.lisr.2008.06.004","article-title":"Web 2.0 use by librarians","volume":"31","year":"2009","journal-title":"Library and Information Science Research"},{"issue":"2","key":"key2020111704445827100_ref002","first-page":"11","article-title":"Librarians' attitudes towards knowledge management","volume":"72","year":"2011","journal-title":"College and Research Libraries"},{"issue":"1","key":"key2020111704445827100_ref003","first-page":"1","article-title":"Factors affecting the adoption of Facebook by information professionals","volume":"50","year":"2013","journal-title":"Proceedings of the American Society for Information Science and Technology"},{"issue":"2","key":"key2020111704445827100_ref004","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.lisr.2014.01.001","article-title":"The effect of personal and situational factors on LIS students' and professionals' intentions to use e-books","volume":"36","year":"2014","journal-title":"Library and Information Science Research"},{"issue":"1","key":"key2020111704445827100_ref005","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1108\/OIR-08-2014-0177","article-title":"What's app: a social capital perspective","volume":"39","year":"2015","journal-title":"Online Information Review"},{"issue":"3","key":"key2020111704445827100_ref006","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2020111704445827100_ref007","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","article-title":"Gender difference and employees\u2019 cybersecurity behaviors","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2020111704445827100_ref008","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","article-title":"Security awareness of computer users: a phishing threat avoidance perspective","volume":"38","year":"2014","journal-title":"Computers in Human Behavior"},{"key":"key2020111704445827100_ref009","doi-asserted-by":"crossref","unstructured":"Ash, R.A., Rosenbloom, J.L., Coder, L. and Dupont, B. (2006), \u201cPersonality characteristics of established IT professionals\u201d, in Big Five Personality Characteristics, December 2003, pp. 983-989.","DOI":"10.4018\/978-1-59140-815-4.ch155"},{"key":"key2020111704445827100_ref071","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1207\/s15327965pli0902_2","article-title":"Exploration of fortuitous determinants of life paths","volume-title":"Psychological Inquiry","year":"1998"},{"key":"key2020111704445827100_ref010","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1207\/s15327965pli0902_2","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","year":"1986"},{"key":"key2020111704445827100_ref011","unstructured":"Blascovich, J., Mendes, W.B., Hunter, S.B. and Lickel, B. (2000), \u201cThe social psychology of stigma\u201d, in Heatherton, T., Kleck, R. and Hull, J.G. (Eds), Stigma, Threat, and Social Interactions, Guilford Publications, New York."},{"key":"key2020111704445827100_ref012","unstructured":"Blascovich, J. (2008), \u201cChallenge and threat\u201d, in Elliott, A.J. (Ed.), Handbook of Approach and Avoidance Motivation, Psychology Press, New York, NY, pp. 431-445."},{"issue":"3","key":"key2020111704445827100_ref013","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1002\/asi.22979","article-title":"Gender differences in the moral judgment and behavior of Israeli adolescents in the internet environment","volume":"65","year":"2014","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"key2020111704445827100_ref014","doi-asserted-by":"crossref","first-page":"127","DOI":"10.28945\/877","article-title":"Role of perceived importance of information security: an exploratory study of middle school children's information security behavior","volume":"3","year":"2006","journal-title":"Issues in Informing Science and Information Technology"},{"issue":"1","key":"key2020111704445827100_ref015","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1177\/109442810141004","article-title":"Validation of a new general self-efficacy scale","volume":"4","year":"2001","journal-title":"Organizational Research Methods"},{"issue":"2","key":"key2020111704445827100_ref016","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1108\/IntR-09-2013-0192","article-title":"Self-disclosure in social networking sites: the role of perceived cost, perceived benefits and social influence","volume":"25","year":"2015","journal-title":"Internet Research"},{"key":"key2020111704445827100_ref017","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.compedu.2017.05.003","article-title":"The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers","volume":"112","year":"2017","journal-title":"Computers and Education"},{"key":"key2020111704445827100_ref072","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.chb.2015.02.042","article-title":"Surfing on social network sites","volume":"49","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2020111704445827100_ref018","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1521\/pedi.1992.6.4.343","article-title":"The five-factor model of personality and its relevance to personality disorders","volume":"6","year":"1992","journal-title":"Journal of Personality Disorders"},{"issue":"2","key":"key2020111704445827100_ref019","doi-asserted-by":"publisher","first-page":"285","DOI":"10.2753\/MIS0742-1222310210","article-title":"Understanding employee responses to stressful information security requirements: a coping perspective","volume":"31","year":"2014","journal-title":"Journal of Management Information Systems"},{"key":"key2020111704445827100_ref020","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.lindif.2013.07.006","article-title":"The determinants of scholastic achievement: the contribution of personality traits, self-esteem, and academic self-efficacy","volume":"27","year":"2013","journal-title":"Learning and Individual Differences"},{"key":"key2020111704445827100_ref021","first-page":"16","article-title":"The myth of the average user: improving privacy and security systems through individualization","year":"2015"},{"key":"key2020111704445827100_ref022","unstructured":"Etzion, D. and Laski, S. (1998). \u201cPersonality traits questionnaire (the big five)\u201d, extracted from available at: https:\/\/www.ocf.berkeley.edu\/\u223cjohnlab\/pdfs\/BFI-Hebrew.pdf."},{"key":"key2020111704445827100_ref023","unstructured":"Gritzalis, D., Kandias, M., Stavrou, V. and Mitrou, L. (2014), \u201cHistory of information: the case of privacy and security in social media\u201d, Information Security & Critical infrastructure protection research laboratory, Retrieved February, 6, 2014, from available at: http:\/\/www.cis.aueb.gr\/Publications\/infohist-2014_Legal_Publications.pdf."},{"key":"key2020111704445827100_ref024","first-page":"275","article-title":"The emotional valence of information experience: relation to personality and approach to studying","volume":"9","year":"2014","journal-title":"Information Experience: Approaches to Theory and Practice"},{"key":"key2020111704445827100_ref073","doi-asserted-by":"crossref","unstructured":"Heinstr\u00f6m, J., Sormunen, E. and Kaunisto-Laine, S. (2014), \u201cSpanning information behaviour across the stages of a learning task: where do personality and approach to studying matter?\u201d, Journal of Documentation, Vol. 70 No. 6, pp. 1076-1097, doi: 10.1108\/JD-02-2014-0041.","DOI":"10.1108\/JD-02-2014-0041"},{"issue":"4","key":"key2020111704445827100_ref025","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","article-title":"Managing employee compliance with information security policies: the critical role of top management and organizational culture","volume":"43","year":"2012","journal-title":"Decision Sciences"},{"key":"key2020111704445827100_ref026","first-page":"102","article-title":"The big five trait taxonomy: History, measurement, and theoretical perspectives","volume":"2","year":"1999","journal-title":"Handbook of Personality: Theory and Research"},{"issue":"1","key":"key2020111704445827100_ref027","doi-asserted-by":"crossref","first-page":"113","DOI":"10.25300\/MISQ\/2015\/39.1.06","article-title":"An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2020111704445827100_ref028","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1057\/ejis.2015.15","article-title":"Dispositional and situational factors: influences on information security policy violations","volume":"25","year":"2016","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"key2020111704445827100_ref029","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1057\/ejis.2008.29","article-title":"Personality traits and concern for privacy: an empirical study in the context of location-based services","volume":"17","year":"2008","journal-title":"European Journal of Information Systems"},{"key":"key2020111704445827100_ref030","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2014.03.003","article-title":"An exploratory investigation of message-person congruence in information security awareness campaigns","volume":"43","year":"2014","journal-title":"Computers and Security"},{"issue":"1","key":"key2020111704445827100_ref031","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1108\/IMCS-01-2013-0005","article-title":"Recommendations for information security awareness training for college students","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"key":"key2020111704445827100_ref032","article-title":"Behind the curtains of privacy calculus on social networking sites: the study of Germany and the USA","volume-title":"Paper Presented at Wirtschaftsinformatik 2011. 26","year":"2011"},{"key":"key2020111704445827100_ref033","volume-title":"Stress, Coping and Appraisal","year":"1984"},{"key":"key2020111704445827100_ref034","doi-asserted-by":"publisher","article-title":"The human element in cyber security: a study on student motivation to act","year":"2012","DOI":"10.1145\/2390317.2390318"},{"key":"key2020111704445827100_ref035","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","article-title":"Individual differences and information security awareness","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2020111704445827100_ref036","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/0022-3514.52.1.81","article-title":"Validation of the five-factor model of personality across instruments and observers","volume":"52","year":"1987","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2020111704445827100_ref037","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1037\/0022-3514.92.4.698","article-title":"Threatened by the unexpected: physiological responses during social interactions with expectancy-violating partners","volume":"92","year":"2007","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2020111704445827100_ref038","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/15536548.2013.10845672","article-title":"Applying protection motivation theory to information security training for college students","year":"2013","journal-title":"Journal of Information Privacy and Security"},{"issue":"6","key":"key2020111704445827100_ref039","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1037\/0022-3514.44.6.1234","article-title":"Openers: individuals who elicit intimate self-disclosure","volume":"44","year":"1983","journal-title":"Journal of Personality and Social Psychology"},{"issue":"1","key":"key2020111704445827100_ref040","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308","article-title":"Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory","volume":"30","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"key":"key2020111704445827100_ref041","volume-title":"Effectiveness of a security portal for improving student's knowledge and skills in information technology (IT) security","year":"2014"},{"key":"key2020111704445827100_ref042","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","article-title":"Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)","volume":"42","year":"2014","journal-title":"Computers and Security"},{"key":"key2020111704445827100_ref043","doi-asserted-by":"crossref","unstructured":"Pattinson, M., Butavicius, M., Parsons, K., McCormac, A. and Calic, D. (2015), \u201cFactors that influence information security behavior: an australian web-based study\u201d, in Tryfonas, T. and Askoxylakis, I. (Eds), Human Aspects of Information Security, Privacy, and Trust. HAS 2015. Lecture Notes in Computer Science, LNCS9190, Springer, Cham, pp. 231-241, available at: .https:\/\/doi.org\/10.1007\/978-3-319-20376-8_21.","DOI":"10.1007\/978-3-319-20376-8_21"},{"key":"key2020111704445827100_ref044","first-page":"3415","article-title":"Preservice teacher concerns about teaching cyber ethics, cyber safety, and cyber security: a focus group study","year":"2012"},{"issue":"3","key":"key2020111704445827100_ref045","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1177\/0894439312462802","article-title":"Online political engagement, Facebook, and personality traits","volume":"31","year":"2013","journal-title":"Social Science Computer Review"},{"issue":"8","key":"key2020111704445827100_ref046","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1016\/S0005-7967(97)00022-3","article-title":"A cognitive-behavioral model of anxiety in social phobia","volume":"35","year":"1997","journal-title":"Behaviour Research and Therapy"},{"key":"key2020111704445827100_ref047","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2017.1345271","article-title":"Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors","year":"2017","journal-title":"Journal of Cyber Security Technology"},{"key":"key2020111704445827100_ref048","doi-asserted-by":"crossref","unstructured":"Schunk, D.H. and Mullen, C.A. (2012), \u201cSelf-efficacy as an engaged learner\u201d, in Christenson, S.L., Reschly, A.L. and Wylie, C. (Eds), Handbook of Research on Student Engagement, Springer, New York, NY, pp. 219-235.","DOI":"10.1007\/978-1-4614-2018-7_10"},{"key":"key2020111704445827100_ref049","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1111\/j.1469-8986.2009.00945.x","article-title":"Cardiovascular measures independently predict performance in a university course","volume":"47","year":"2010","journal-title":"Psychophysiology"},{"key":"key2020111704445827100_ref050","article-title":"Multiple sources for security: the influence of source networks on coping self- efficacy and protection behavior habits in online safety","year":"2017"},{"issue":"6","key":"key2020111704445827100_ref051","doi-asserted-by":"publisher","first-page":"2414","DOI":"10.1016\/j.chb.2012.07.012","article-title":"The effects of personality traits, self-esteem, loneliness, and narcissism on Facebook use among university students","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"key":"key2020111704445827100_ref052","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1037\/0022-3514.84.5.1041","article-title":"Development of personality in early and middle adulthood: set like plaster or persistent change?","volume":"84","year":"2003","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2020111704445827100_ref053","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.chb.2016.02.004","article-title":"The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference","volume":"59","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2020111704445827100_ref054","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.cose.2015.04.006","article-title":"Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs","volume":"52","year":"2015","journal-title":"Computers and Security"},{"issue":"2","key":"key2020111704445827100_ref055","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1207\/s15326985ep3902_3","article-title":"The relation between self-beliefs and academic achievement: a meta-analytic review","volume":"39","year":"2004","journal-title":"Educational Psychologist"},{"key":"key2020111704445827100_ref056","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973620","article-title":"Empirical study on the risky behavior and security awareness among secondary school pupils validation and preliminary results","volume-title":"Information and Communication Technology, Electronics and Microelectronics","year":"2017"},{"key":"key2020111704445827100_ref057","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1016\/j.chb.2012.07.001","article-title":"The relationships among the big five personality factors, self-esteem, narcissism, and sensation-seeking to Chinese university students' uses of social networking sites (SNSs)","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"key":"key2020111704445827100_ref058","article-title":"The role of individual characteristics on insider abuse intentions","year":"2012"},{"key":"key2020111704445827100_ref059","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1123\/jsep.20.1.81","article-title":"The relationship between competitive anxiety and self-presentational concerns","volume":"20","year":"1998","journal-title":"Journal of Sport and Exercise Psychology"},{"key":"key2020111704445827100_ref060","article-title":"A protection motivation theory approach to home wireless security","year":"2005"},{"issue":"3","key":"key2020111704445827100_ref061","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/S0191-8869(01)00166-0","article-title":"Measuring thinking styles in addition to measuring personality traits","volume":"33","year":"2002","journal-title":"Personality and Individual Differences"},{"key":"key2020111704445827100_ref062","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.lindif.2012.07.010","article-title":"Academic achievement: the unique contribution of self-efficacy beliefs in self-regulated learning beyond intelligence, personality traits, and self-esteem","volume":"23","year":"2013","journal-title":"Learning and Individual Differences"},{"issue":"6","key":"key2020111704445827100_fur1","first-page":"1289","article-title":"Social network use and personality","volume":"2","year":"2010","journal-title":"Computers in Human Behavior"},{"key":"key2020111704445827100_fur2","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2147\/PRBM.S136049","article-title":"Antecedents of positive self-disclosure online: an empirical study of US college students' Facebook usage","volume":"10","year":"2017","journal-title":"Psychology Research and Behavior Management"},{"key":"key2020111704445827100_fur4","first-page":"71","volume-title":"\u2018Self-efficacy\u2019 Bandura","author":"Encyclopedia of Human Behavior","year":"1994"},{"issue":"8","key":"key2020111704445827100_fur5","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1016\/j.cose.2012.08.004","article-title":"Power to the people? The evolving recognition of human aspects of security","volume":"31","year":"2012","journal-title":"Computers and Security"},{"key":"key2020111704445827100_fur6","unstructured":"McAfee Labs (2017a), April, \u201cMcAfee labs quarterly threat report April 2017\u201d, Retrieved from available at: https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-mar-2017.pdf."},{"key":"key2020111704445827100_fur7","unstructured":"McAfee Labs (2017b), September, \u201cMcAfee labs threats report\u201d, McAfee labs report. 1-60, Retrieved July, 21, 2017 from available at: https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-jun-2017.pdf."},{"key":"key2020111704445827100_fur8","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","article-title":"Motivating IS security compliance: insights from habit and protection motivation theory","volume":"49","year":"2012","journal-title":"Information and Management"},{"key":"key2020111704445827100_fur9","doi-asserted-by":"crossref","first-page":"1076","DOI":"10.1108\/JD-02-2014-0041","article-title":"Spanning information behaviour across the stages of a learning task","volume":"70","year":"2014","journal-title":"Journal of Documentation"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-12-2019-0371\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-12-2019-0371\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:01:34Z","timestamp":1753398094000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/72\/5\/787-812\/60636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,7]]},"references-count":73,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,7,7]]}},"alternative-id":["10.1108\/AJIM-12-2019-0371"],"URL":"https:\/\/doi.org\/10.1108\/ajim-12-2019-0371","relation":{},"ISSN":["2050-3806"],"issn-type":[{"value":"2050-3806","type":"print"}],"subject":[],"published":{"date-parts":[[2020,7,7]]}}}