{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:50:44Z","timestamp":1776106244948,"version":"3.50.1"},"reference-count":114,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>\n            Ecommerce websites increasingly provide\n            <jats:bold>predictive analytics-based advice (PAA)<\/jats:bold>\n            , such as advice about future potential price reductions. Establishing consumer-trust in these advice-giving systems imposes unique and novel challenges. First, PAA about future alternatives that can benefit the consumer appears to inherently contradict the business goal of selling a product quickly and at high profit margins. Second, PAA is based on mathematical models that are non-transparent to the user. Third, PAA advice is inherently uncertain, and can be perceived as subjectively imposed in algorithms. Utilizing Toulmin's argumentation-model, we investigate the influence of advice-justification statements in overcoming these difficulties. Based on three experimental studies, in which respondents are provided with the advice of PAA systems, we show evidence for the different roles Toulmin's statement-types play in enhancing various trusting-beliefs in PAA systems. Provision of warrants is mostly associated with enhanced competence beliefs; rebuttals with integrity beliefs; backings both competence and benevolence; and data statements enhance competence, integrity, and benevolence beliefs. Implications of the findings for research and practice are provided.\n          <\/jats:p>","DOI":"10.1145\/3580479","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T11:28:42Z","timestamp":1674041322000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Using Toulmin's Argumentation Model to Enhance Trust in Analytics-Based Advice Giving Systems"],"prefix":"10.1145","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9435-1439","authenticated-orcid":false,"given":"Eran","family":"Rubin","sequence":"first","affiliation":[{"name":"Cleveland State University, Ohio, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9731-3403","authenticated-orcid":false,"given":"Izak","family":"Benbasat","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,6,23]]},"reference":[{"key":"e_1_3_4_2_2","first-page":"21","volume-title":"AMCIS 2007 Proceedings","author":"Amblee N.","year":"2007","unstructured":"N. Amblee and T. Bui. 2007. Freeware downloads: An empirical investigation into the impact of expert and user reviews on demand for digital goods. In AMCIS 2007 Proceedings. 21."},{"key":"e_1_3_4_3_2","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160205"},{"key":"e_1_3_4_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-1782-9_36"},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1287\/msom.1070.0183"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.14.0380"},{"key":"e_1_3_4_7_2","doi-asserted-by":"publisher","DOI":"10.1108\/03090561111119921"},{"key":"e_1_3_4_8_2","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290107"},{"key":"e_1_3_4_9_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.41.10.1639"},{"key":"e_1_3_4_10_2","doi-asserted-by":"publisher","DOI":"10.1177\/1745691615621278"},{"issue":"12","key":"e_1_3_4_11_2","first-page":"1793","article-title":"Identifying and analyzing the transient and permanent barriers for big data","volume":"11","author":"Brohi S. N.","year":"2016","unstructured":"S. N. Brohi, M. A. Bamiah, and M. N. Brohi. 2016. Identifying and analyzing the transient and permanent barriers for big data. J. Eng. Sci. Technol. 11, 12 (2016), 1793\u20131807.","journal-title":"J. Eng. Sci. Technol."},{"key":"e_1_3_4_12_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2001.11045665"},{"key":"e_1_3_4_13_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1997.11518181"},{"key":"e_1_3_4_14_2","article-title":"When the robot doesn't see dark skin","author":"Buolamwini J.","year":"2018","unstructured":"J. Buolamwini. 2018. When the robot doesn't see dark skin. N. Y. Times (2018).","journal-title":"N. Y. Times"},{"key":"e_1_3_4_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9192-x"},{"key":"e_1_3_4_16_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0948"},{"key":"e_1_3_4_17_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0163"},{"issue":"2","key":"e_1_3_4_18_2","first-page":"149","article-title":"Antecedents and distinctions between online trust and distrust: Predicting high-and low-risk internet behaviors","volume":"14","author":"Chang Y. S.","year":"2013","unstructured":"Y. S. Chang and S. R. Fang. 2013. Antecedents and distinctions between online trust and distrust: Predicting high-and low-risk internet behaviors. J. Electron. Commer. Res. 14, 2 (2013), 149\u2013166.","journal-title":"J. Electron. Commer. Res."},{"key":"e_1_3_4_19_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-0-387-36060-7_1","volume-title":"Information Systems Action Research","author":"Checkland P.","year":"2007","unstructured":"P. Checkland and S. Holwell. 2007. Action research. In Information Systems Action Research. Springer, Boston, MA, 3\u201317."},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2010.03.001"},{"issue":"2","key":"e_1_3_4_21_2","first-page":"44","article-title":"Analysis and detection of fake views in online video services","volume":"11","author":"Chen L.","year":"2015","unstructured":"L. Chen, Y. Zhou, and D. M. Chiu. 2015. Analysis and detection of fake views in online video services. ACM Trans. Multimed. Comput. Commun. Appl. TOMM 11, 2s (2015), 44.","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. TOMM"},{"key":"e_1_3_4_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.008"},{"key":"e_1_3_4_23_2","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.43.3.345"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.5555\/2882809.2882810"},{"key":"e_1_3_4_25_2","unstructured":"Cisco. 2013. Catch and keep digital shoppers. Cisco Internet Business Solutions Group . Retrieved from http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/retail\/Catch-andKeep-the-Digital-ShopperPoV.pdf."},{"key":"e_1_3_4_26_2","first-page":"323","article-title":"Toward a theory of consumer electronic shopping cart behavior","author":"Close A. G.","year":"2012","unstructured":"A. G. Close, M. Kukar-Kinney, and T. K. Benusa. 2012. Toward a theory of consumer electronic shopping cart behavior. Online Consum. Behav. Theory Res. Soc. Media Advert. E-Tail (2012), 323\u2013343.","journal-title":"Online Consum. Behav. Theory Res. Soc. Media Advert. E-Tail"},{"key":"e_1_3_4_27_2","volume-title":"AMCIS 2014 Proceedings","author":"Cummings J.","year":"2014","unstructured":"J. Cummings and A. Dennis. 2014. Do SNS impressions matter? Virtual team and impression formation in the era of social technologies. In AMCIS 2014 Proceedings."},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13202"},{"key":"e_1_3_4_29_2","doi-asserted-by":"publisher","DOI":"10.1093\/jcr\/ucv047"},{"key":"e_1_3_4_30_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"key":"e_1_3_4_31_2","first-page":"30","volume-title":"ICIS 2004 Proceedings","author":"Dellarocas C.","year":"2004","unstructured":"C. Dellarocas, N. Awad, and X. Zhang. 2004. Exploring the value of online reviews to organizations: Implications for revenue forecasting and planning. In ICIS 2004 Proceedings. 30."},{"key":"e_1_3_4_32_2","doi-asserted-by":"publisher","DOI":"10.5334\/irsp.102"},{"key":"e_1_3_4_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-014-9139-2"},{"key":"e_1_3_4_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10503-005-4420-0"},{"key":"e_1_3_4_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2016.63"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.2307\/30036519"},{"key":"e_1_3_4_37_2","doi-asserted-by":"publisher","DOI":"10.5555\/2891434.2891441"},{"key":"e_1_3_4_38_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1440766"},{"key":"e_1_3_4_39_2","doi-asserted-by":"publisher","DOI":"10.1177\/0963721414550709"},{"key":"e_1_3_4_40_2","volume-title":"Multivariate Data Analysis","author":"Hair J. F.","year":"1998","unstructured":"J. F. Hair, R. E. Anderson, R. L. Tatham, and W. C. Black. 1998. Multivariate Data Analysis (5th ed.). Prentice Hall, Upper Saddle River, NJ.","edition":"5"},{"key":"e_1_3_4_41_2","volume-title":"Multivariate Data Analysis","author":"Hair J. F.","year":"2010","unstructured":"J. F. Hair, W. C. Black, B. J. Babin, and R. E. Anderson. 2010. Multivariate Data Analysis (7th ed.). Pearson Prentice Hall, Upper Saddle River, NJ.","edition":"7"},{"key":"e_1_3_4_42_2","first-page":"6","volume-title":"Penny hopes new pricing strategy is right","author":"Halkias M.","year":"2012","unstructured":"M. Halkias. 2012. Penny hopes new pricing strategy is right. Dallas Morning News (2012), 1, 6."},{"key":"e_1_3_4_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.11.018"},{"key":"e_1_3_4_44_2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00998"},{"key":"e_1_3_4_45_2","volume-title":"Adaption-Level Theory: An Experimental and Systematic Approach to Behavior","author":"Helson H.","year":"1964","unstructured":"H. Helson. 1964. Adaption-Level Theory: An Experimental and Systematic Approach to Behavior. Harper & Row, New York."},{"issue":"8","key":"e_1_3_4_46_2","first-page":"432","article-title":"Some guidelines for the critical reviewing of conceptual papers","volume":"9","author":"Hirschheim R.","year":"2008","unstructured":"R. Hirschheim. 2008. Some guidelines for the critical reviewing of conceptual papers. J. Assoc. Inf. Syst. 9, 8 (2008), 432\u2013441.","journal-title":"J. Assoc. Inf. Syst."},{"key":"e_1_3_4_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-4938-5"},{"key":"e_1_3_4_48_2","volume-title":"A Human's Guide to Machine Intelligence: How Algorithms are Shaping Our Lives and How We Can Stay in Control","author":"Hosanagar K.","year":"2019","unstructured":"K. Hosanagar. 2019. A Human's Guide to Machine Intelligence: How Algorithms are Shaping Our Lives and How We Can Stay in Control. Viking."},{"key":"e_1_3_4_49_2","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2013-0007"},{"key":"e_1_3_4_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134743"},{"key":"e_1_3_4_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/1562764.1562800"},{"key":"e_1_3_4_52_2","doi-asserted-by":"publisher","DOI":"10.1108\/EJM-12-2016-0870"},{"key":"e_1_3_4_53_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045817"},{"key":"e_1_3_4_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_4_55_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0093"},{"key":"e_1_3_4_56_2","volume-title":"The Executive's Right to Transparency","author":"King R.","year":"2018","unstructured":"R. King. 2018. The Executive's Right to Transparency. The Lone Star. Retrieved from https:\/\/www.lonestar.com\/2018\/07\/25\/executive-right-to-transparency\/"},{"key":"e_1_3_4_57_2","author":"Kirschner P. A.","year":"2002","unstructured":"P. A. Kirschner, S. J. Buckingham Shum, and C. S. Carr. 2002. Visualizing Argumentation: Software Tools for Collaborative and Educational Sense-Making.","journal-title":"Visualizing Argumentation: Software Tools for Collaborative and Educational Sense-Making"},{"key":"e_1_3_4_58_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011453721700"},{"key":"e_1_3_4_59_2","first-page":"941","volume-title":"The effects of personalization and familiarity on trust and adoption of recommendation agents","author":"Komiak S. Y.","year":"2006","unstructured":"S. Y. Komiak and I. Benbasat. 2006. The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Q. (2006), 941\u2013960."},{"key":"e_1_3_4_60_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1440758"},{"key":"e_1_3_4_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2005.01.001"},{"key":"e_1_3_4_62_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045756"},{"key":"e_1_3_4_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2007.05.004"},{"key":"e_1_3_4_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoecopol.2018.07.002"},{"key":"e_1_3_4_65_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0936"},{"key":"e_1_3_4_66_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2013.1860"},{"key":"e_1_3_4_67_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0154"},{"key":"e_1_3_4_68_2","doi-asserted-by":"publisher","DOI":"10.2307\/3250969"},{"key":"e_1_3_4_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.057"},{"key":"e_1_3_4_70_2","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2015.0965"},{"key":"e_1_3_4_71_2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.4.04"},{"key":"e_1_3_4_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_4_73_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"e_1_3_4_74_2","article-title":"Analyzing customers, Best Buy decides not all are welcome","author":"McWilliams G.","year":"2004","unstructured":"G. McWilliams. 2004. Analyzing customers, Best Buy decides not all are welcome. Wall Str. J. Online (2004).","journal-title":"Wall Str. J. Online"},{"key":"e_1_3_4_75_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2016.03.001"},{"key":"e_1_3_4_76_2","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.48.3.444"},{"key":"e_1_3_4_77_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.01.029"},{"key":"e_1_3_4_78_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2015.02.001"},{"key":"e_1_3_4_79_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.02.003"},{"key":"e_1_3_4_80_2","doi-asserted-by":"publisher","DOI":"10.1108\/10662240110402777"},{"key":"e_1_3_4_81_2","doi-asserted-by":"publisher","DOI":"10.2307\/25148633"},{"key":"e_1_3_4_82_2","doi-asserted-by":"publisher","DOI":"10.5555\/1288216.1288221"},{"key":"e_1_3_4_83_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0106"},{"key":"e_1_3_4_84_2","doi-asserted-by":"publisher","DOI":"10.2307\/25148720"},{"key":"e_1_3_4_85_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"e_1_3_4_86_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.4.363.9705"},{"key":"e_1_3_4_87_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.5.3.294"},{"key":"e_1_3_4_88_2","article-title":"Balance efficiency with transparency in analytics-driven business","author":"Ransbotham S.","year":"2017","unstructured":"S. Ransbotham. 2017. Balance efficiency with transparency in analytics-driven business. Sloan Manage. Rev. (2017). Retrieved from https:\/\/sloanreview.mit.edu\/article\/balance-efficiency-with-transparency-in-analytics-driven-business\/","journal-title":"Sloan Manage. Rev."},{"key":"e_1_3_4_89_2","doi-asserted-by":"publisher","DOI":"10.1108\/10662249810231050"},{"key":"e_1_3_4_90_2","doi-asserted-by":"publisher","DOI":"10.1080\/17470210701282618"},{"key":"e_1_3_4_91_2","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415140102"},{"key":"e_1_3_4_92_2","doi-asserted-by":"publisher","DOI":"10.1108\/10662240110410165"},{"issue":"1","key":"e_1_3_4_93_2","first-page":"4","article-title":"Veracity roadmap: Is big data objective, truthful and credible?","volume":"24","author":"Rubin V.","year":"2013","unstructured":"V. Rubin and T. Lukoianova. 2013. Veracity roadmap: Is big data objective, truthful and credible? Adv. Classif. Res. Online 24, 1 (2013), 4.","journal-title":"Adv. Classif. Res. Online"},{"key":"e_1_3_4_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2014.63"},{"key":"e_1_3_4_95_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.064"},{"key":"e_1_3_4_96_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2004.04.001"},{"key":"e_1_3_4_97_2","first-page":"914","volume-title":"Information Fusion (FUSION), 2013 16th International Conference on","author":"\u015eensoy M.","year":"2013","unstructured":"M. \u015eensoy, G. Mel, L. Kaplan, T. Pham, and T. J. Norman. 2013. TRIBE: Trust revision for information based on evidence. In Information Fusion (FUSION), 2013 16th International Conference on, IEEE. 914\u2013921."},{"key":"e_1_3_4_98_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00022-7"},{"key":"e_1_3_4_99_2","volume-title":"Computer-Based Medical Consultations: MYCIN. American","author":"Shortliffe E. H.","year":"1976","unstructured":"E. H. Shortliffe. 1976. Computer-Based Medical Consultations: MYCIN. American Elsevier, New York."},{"key":"e_1_3_4_100_2","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0203_5"},{"key":"e_1_3_4_101_2","doi-asserted-by":"publisher","DOI":"10.1093\/jcr\/ucv091"},{"key":"e_1_3_4_102_2","volume-title":"Absolute Value: What Really Influences Customers in the Age of (Nearly) Perfect Information","author":"Simonson I.","unstructured":"I. Simonson and E. Rosen. Absolute Value: What Really Influences Customers in the Age of (Nearly) Perfect Information. New York."},{"key":"e_1_3_4_103_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-4938-5_11"},{"key":"e_1_3_4_104_2","article-title":"Trust","author":"S\u00f6llner M.","year":"2018","unstructured":"M. S\u00f6llner, I. Benbasat, D. Gefen, J. M. Leimeister, and P. A. Pavlou. 2018. Trust. MIS Q. Res. Curations (2018).","journal-title":"MIS Q. Res. Curations"},{"key":"e_1_3_4_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2010.12.011"},{"key":"e_1_3_4_106_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0667"},{"key":"e_1_3_4_107_2","volume-title":"The Use of Argument","author":"Toulmin S. E.","year":"1958","unstructured":"S. E. Toulmin. 1958. The Use of Argument. Cambridge University Press, Cambridge, UK."},{"key":"e_1_3_4_108_2","volume-title":"An Introduction to Reasoning","author":"Toulmin S. E.","year":"1984","unstructured":"S. E. Toulmin, R. D. Rieke, and A. Janik. 1984. An Introduction to Reasoning (2nd ed.). Macmillan, New York.","edition":"2"},{"key":"e_1_3_4_109_2","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230410"},{"key":"e_1_3_4_110_2","doi-asserted-by":"publisher","DOI":"10.5555\/2017327.2017335"},{"key":"e_1_3_4_111_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39747-9_18"},{"key":"e_1_3_4_112_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.03.005"},{"key":"e_1_3_4_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_3_4_114_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2015.10.004"},{"key":"e_1_3_4_115_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1172460"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580479","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:42Z","timestamp":1750178262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,23]]},"references-count":114,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3580479"],"URL":"https:\/\/doi.org\/10.1145\/3580479","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,23]]},"assertion":[{"value":"2021-01-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}