{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:21:42Z","timestamp":1778347302949,"version":"3.51.4"},"reference-count":69,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T00:00:00Z","timestamp":1622937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p>The importance of big data is widely accepted in various fields. Organisations spend a lot of money to collect, process and mine the data to identify patterns. These patterns facilitate their future decision-making process to improve the organisational performance and profitability. However, among discovered patterns, there are some meaningless and misleading patterns which restrict the effectiveness of decision-making process. The presence of data discrepancies, noise and outliers also impacts the quality of discovered patterns and leads towards missing strategic goals and objectives. Quality inception of these discovered patterns is vital before utilising them in making predictions, decision-making process or strategic planning. Mining useful and credible patterns over social media is a challenging task. Often, people spread targeted content for character assassination or defamation of brands. Recently, some studies have evaluated the credibility of information over social media based on users\u2019 surveys, experts\u2019 judgement and manually annotating Twitter tweets to predict credibility. Unfortunately, due to the large volume and exponential growth of data, these surveys and annotation-based information credibility techniques are not efficiently applicable. This article presents a data quality and credibility evaluation framework to determine the quality of individual data instances. This framework provides a way to discover useful and credible patterns using credibility indicators. Moreover, a new Twitter bot detection algorithm is proposed to classify tweets generated by Twitter bots and real users. The results of conducted experiments showed that the proposed model generates a positive impact on improving classification accuracy and quality of discovered patterns.<\/jats:p>","DOI":"10.1177\/01655515211013693","type":"journal-article","created":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T19:21:57Z","timestamp":1623352917000},"page":"544-564","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":23,"title":["Enhancing data quality to mine credible patterns"],"prefix":"10.1177","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4124-7929","authenticated-orcid":false,"given":"Muhammad","family":"Imran","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2488-8043","authenticated-orcid":false,"given":"Adnan","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Pakistan; Department of Mathematics and Computer Science, Saint Louis University, Spain"}]}],"member":"179","published-online":{"date-parts":[[2021,6,6]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Big Data for better or worse: 90% of world\u2019s data generated over last two years. ScienceDaily 22 May 2013 https:\/\/www.sciencedaily.com\/releases\/2013\/05\/130522085217.htm (accessed 25 April 2020)."},{"key":"e_1_3_2_3_2","first-page":"214","volume-title":"Proceedings of the industrial conference on data mining","author":"Elgendy N","unstructured":"Elgendy N, Elragal A. Big data analytics: a literature review paper. In: Proceedings of the industrial conference on data mining, St. Petersburg, 16 July 2014, pp. 214\u2013227. Cham: Springer.."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1108\/00220410810899709"},{"key":"e_1_3_2_5_2","unstructured":"Gerhardt B Griffin K Klemann R. Unlocking value in the fragmented world of big data analytics. Cisco Internet Business Solutions Group June 2012 https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/sp\/Information-Infomediaries.pdf"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0489-0"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.4102\/sajim.v9i4.201"},{"key":"e_1_3_2_8_2","unstructured":"How a small data error becomes a big data quality problem. Data-informed.com 2012 http:\/\/data-informed.com\/how-a-small-data-error-becomes-a-big-data-quality-problem\/ (accessed 17 October 2016)."},{"key":"e_1_3_2_9_2","unstructured":"Nokia failed because they did the one thing that drives most companies into the ground. Nextshark.com 1 March 2016 http:\/\/nextshark.com\/the-fall-of-nokia-has-an-important-lesson-in-success-everyone-should-know\/ (accessed 25 April 2020)."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-016-1910-9"},{"issue":"12","key":"e_1_3_2_11_2","first-page":"33","article-title":"An efficient data correctness approach over cloud architectures","volume":"8","author":"Sujatha P","year":"2013","unstructured":"Sujatha P, Radha NT. An efficient data correctness approach over cloud architectures. Int J Eng Res Dev 2013; 8(12): 33\u201337.","journal-title":"Int J Eng Res Dev"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.195"},{"key":"e_1_3_2_13_2","unstructured":"When Google got flu wrong. Nature.com 13 February 2013 http:\/\/www.nature.com\/news\/when-google-got-flu-wrong-1.12413 (accessed 25 April 2020)."},{"key":"e_1_3_2_14_2","first-page":"269","volume-title":"Proceedings of the 2006 IEEE international conference on granular computing","author":"Zhu X","unstructured":"Zhu X, Wu X. Error awareness data mining. In: Proceedings of the 2006 IEEE international conference on granular computing, Atlanta, GA, 10 May 2006, pp. 269\u2013274. New York: IEEE."},{"issue":"1","key":"e_1_3_2_15_2","first-page":"365","article-title":"Web credibility assessment: affecting factors and assessment techniques","volume":"20","author":"Ali Shah A","year":"2015","unstructured":"Ali Shah A, Ravana SD, Hamid S et al. Web credibility assessment: affecting factors and assessment techniques. Inform Res 2015; 20(1): 365\u2013391.","journal-title":"Inform Res"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23543"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1002\/aris.2007.1440410114"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.08.071"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.4018\/jitwe.2008070102"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-04-2014-0019"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1108\/17440081111141772"},{"key":"e_1_3_2_22_2","unstructured":"Forrester Consulting. Trends in data quality and business process alignment. https:\/\/docplayer.net\/5030274-Trends-in-data-quality-and-business-process-alignment.html (2011 accessed 27 May 2021)."},{"key":"e_1_3_2_23_2","first-page":"228","volume-title":"Proceedings of the international conference on social informatics","author":"Gupta A","unstructured":"Gupta A, Kumaraguru P, Castillo C et al. TweetCred: real-time credibility assessment of content on twitter. In: Proceedings of the international conference on social informatics, Barcelona, 11 November 2014, pp. 228\u2013243. Cham: Springer."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24106-7_1"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.06.0105.0026"},{"key":"e_1_3_2_26_2","unstructured":"Yang KC Torres-Lugo C Menczer F. Prevalence of low-credibility information on twitter during the covid-19 outbreak. arXiv preprint 2020 https:\/\/arxiv.org\/abs\/2004.14484"},{"key":"e_1_3_2_27_2","first-page":"1","volume-title":"Proceedings of the 14th international conference on knowledge technologies and data-driven business","author":"AlMansour AA","unstructured":"AlMansour AA, Brankovic L, Iliopoulos CS. Evaluation of credibility assessment for microblogging: models and future directions. In: Proceedings of the 14th international conference on knowledge technologies and data-driven business, Graz, 16 September 2014, pp. 1\u20134. New York: ACM."},{"key":"e_1_3_2_28_2","first-page":"1","volume-title":"Proceedings of the 17th international conference on information fusion (FUSION)","author":"Sikdar S","unstructured":"Sikdar S, Adali S, Amin M et al. Finding true and credible information on Twitter. In: Proceedings of the 17th international conference on information fusion (FUSION), Salamanca, 7 July 2014, pp. 1\u20138. New York: IEEE."},{"key":"e_1_3_2_29_2","first-page":"729","volume-title":"Proceedings of the 22nd international conference on World Wide Web","author":"Gupta A","unstructured":"Gupta A, Lamba H, Kumaraguru P et al. Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd international conference on World Wide Web, Rio de Janeiro, Brazil, 13 May 2013, pp. 729\u2013736. New York: ACM."},{"key":"e_1_3_2_30_2","first-page":"171","volume-title":"Proceedings of the 2018 IEEE 27th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE)","author":"Hassan D","unstructured":"Hassan D. A text mining approach for evaluating event credibility on twitter. In: Proceedings of the 2018 IEEE 27th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE), Paris, 27 June 2018, pp. 171\u2013174. New York: IEEE."},{"issue":"6","key":"e_1_3_2_31_2","first-page":"655","article-title":"Topical categorization of credible microblog content","volume":"2","author":"Kumar RV","year":"2014","unstructured":"Kumar RV, Sheriff I. Topical categorization of credible microblog content. Int J Sci Res Dev 2014; 2(6): 655\u2013658.","journal-title":"Int J Sci Res Dev"},{"key":"e_1_3_2_32_2","first-page":"153","volume-title":"Proceedings of the 2012 SIAM international conference on data mining","author":"Gupta M","unstructured":"Gupta M, Zhao P, Han J. Evaluating event credibility on twitter. In: Proceedings of the 2012 SIAM international conference on data mining, Anaheim, CA, 26 April 2012, pp. 153\u2013164. Philadelphia, PA: Society for Industrial and Applied Mathematics."},{"key":"e_1_3_2_33_2","first-page":"1586","volume-title":"Proceedings of the 2015 IEEE\/ACM international conference on advances in social networks analysis and mining 2015","author":"Zou J","unstructured":"Zou J, Fekri F, McLaughlin SW. Mining streaming tweets for real-time event credibility prediction in twitter. In: Proceedings of the 2015 IEEE\/ACM international conference on advances in social networks analysis and mining 2015, Paris, 25 August 2015, pp. 1586\u20131589. New York: IEEE."},{"key":"e_1_3_2_34_2","first-page":"618","volume-title":"Proceedings of the 11th international conference on information integration and web-based applications & services","author":"Al-Eidan RM","unstructured":"Al-Eidan RM, Al-Khalifa HS, Al-Salman AS. Towards the measurement of Arabic weblogs credibility automatically. In: Proceedings of the 11th international conference on information integration and web-based applications & services, Kuala Lumpur, Malaysia, 14 December 2009, pp. 618\u2013622. New York: ACM."},{"key":"e_1_3_2_35_2","first-page":"1","volume-title":"Proceedings of the 2019 CHI conference on human factors in computing systems","author":"Vaidya T","unstructured":"Vaidya T, Votipka D, Mazurek ML et al. Does being verified make you more credible? Account verification\u2019s effect on tweet credibility. In: Proceedings of the 2019 CHI conference on human factors in computing systems, Glasgow, 2 May 2019, pp. 1\u201313. New York: ACM."},{"key":"e_1_3_2_36_2","first-page":"116","volume-title":"Proceedings of the 2019 4th international conference on system reliability and safety (ICSRS)","author":"Dongo I","unstructured":"Dongo I, Cardinale Y, Aguilera A. Credibility analysis for available information sources on the web: a review and a contribution. In: Proceedings of the 2019 4th international conference on system reliability and safety (ICSRS), Rome, 20 November 2019, pp. 116\u2013125. New York: IEEE."},{"key":"e_1_3_2_37_2","volume-title":"Working notes proceedings of the MediaEval 2015 workshop","author":"Middleton S","unstructured":"Middleton S. Extracting attributed verification and debunking reports from social media: mediaeval-2015 trust and credibility analysis of image and video. In: Working notes proceedings of the MediaEval 2015 workshop, Wurzen, Germany, September 2015."},{"issue":"4","key":"e_1_3_2_38_2","first-page":"1086","article-title":"Credibility evaluation of scientific information on websites: designing and evaluating an exploratory model","volume":"52","author":"Keshavarz H","year":"2020","unstructured":"Keshavarz H, Esmaeili Givi M, Norouzi Y. Credibility evaluation of scientific information on websites: designing and evaluating an exploratory model. J Libr Inf Sci 2020; 52(4): 1086\u20131101.","journal-title":"J Libr Inf Sci"},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Boothby C Murray D Sugimoto C et al. Credibility of scientific information on social media: variation by platform and presence of formal credibility cues. Open Archive of the Social Sciences (SocArXiv) 2020 https:\/\/osf.io\/preprints\/socarxiv\/4dhcz\/","DOI":"10.31235\/osf.io\/4dhcz"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102345"},{"key":"e_1_3_2_41_2","first-page":"1","volume-title":"Proceedings of the international conference on data mining (DMIN)","author":"Nagy A","unstructured":"Nagy A, Stamberger J. Credo: a framework for semi-supervised credibility assessment for social networks. In: Proceedings of the international conference on data mining (DMIN), Las Vegas, NV, July 2012, p. 1. Athens, Greece: The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)."},{"key":"e_1_3_2_42_2","volume-title":"Proceedings of the 6th international conference on social informatics (SocInfo)","author":"Gupta A","unstructured":"Gupta A, Kumaraguru P, Castillo C et al. TweetCred: a real-time Web-based system for assessing credibility of content on Twitter. In: Proceedings of the 6th international conference on social informatics (SocInfo), Barcelona, Spain, 21 May 2014."},{"key":"e_1_3_2_43_2","first-page":"103","volume-title":"Proceedings of the 11th international conference on cognitive modeling","author":"Liao QV","year":"2012","unstructured":"Liao QV, Pirolli P, Fu WT. An ACT-R model of credibility judgment of micro-blogging web pages. In: Ru\u00dfwinkel N, Drewitz U, van Rijn H (eds) Proceedings of the 11th international conference on cognitive modeling. Berlin: Universitaetsverlag der TU Berlin, 2012, p. 103."},{"key":"e_1_3_2_44_2","first-page":"483","volume-title":"Joint European conference on machine learning and knowledge discovery in databases","author":"Wu X","unstructured":"Wu X, Feng Z, Fan W et al. Detecting marionette microblog users for improved information credibility. In: Joint European conference on machine learning and knowledge discovery in databases, Prague, 22 September 2013, pp. 483\u2013498. Berlin: Springer."},{"key":"e_1_3_2_45_2","first-page":"1","volume-title":"MILCOM 2012\u20132012 IEEE military communications conference","author":"Nguyen DT","unstructured":"Nguyen DT, Nguyen NP, Thai MT. Sources of misinformation in online social networks: who to suspect. In: MILCOM 2012\u20132012 IEEE military communications conference, Orlando, FL, October 2012, pp. 1\u20136. New York: IEEE."},{"key":"e_1_3_2_46_2","volume-title":"Twenty-fourth conference on neural information processing systems (NIPS)","author":"Canini KR","unstructured":"Canini KR, Suh B, Pirolli P. Finding relevant sources in twitter based on content and social structure. In: Twenty-fourth conference on neural information processing systems (NIPS), Vancouver, BC, Canada, 6\u201311 December 2010."},{"issue":"2","key":"e_1_3_2_47_2","first-page":"355","article-title":"Authenticity issues of social media: credibility, quality and reality","volume":"7","author":"Ismail S","year":"2013","unstructured":"Ismail S, Latif RA. Authenticity issues of social media: credibility, quality and reality. Int J Humanit Soc Sci 2013; 7(2): 355\u2013362.","journal-title":"Int J Humanit Soc Sci"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.026"},{"key":"e_1_3_2_49_2","first-page":"1","volume-title":"Proceedings of the ACM SIGKDD workshop on mining data semantics","author":"Yang F","unstructured":"Yang F, Liu Y, Yu X et al. Automatic detection of rumor on Sina Weibo. In: Proceedings of the ACM SIGKDD workshop on mining data semantics, Beijing, China, 12 August 2012, pp. 1\u20137. New York: ACM."},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.7494\/csci.2015.16.2.157"},{"key":"e_1_3_2_51_2","first-page":"553","volume-title":"Proceedings of the 2016 2nd international conference on contemporary computing and informatics (IC3I)","author":"Jain P","unstructured":"Jain P, Singh V. CredRank: evaluating tweet credibility during high impact events. In: Proceedings of the 2016 2nd international conference on contemporary computing and informatics (IC3I), Greater Noida, India, 14 December 2016, pp. 553\u2013557. New York: IEEE."},{"key":"e_1_3_2_52_2","first-page":"2","volume-title":"Proceedings of the 1st workshop on privacy and security in online social media","author":"Gupta A","unstructured":"Gupta A, Kumaraguru P. Credibility ranking of tweets during high impact events. In: Proceedings of the 1st workshop on privacy and security in online social media, Lyon, 17 April 2012, pp. 2\u20138. New York: ACM."},{"key":"e_1_3_2_53_2","first-page":"259","volume-title":"Proceedings of the 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD)","author":"Peng M","unstructured":"Peng M, Ouyang S, Zhu J et al. Emerging topic detection from microblog streams based on emerging pattern mining. In: Proceedings of the 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD), Nanjing, China, 9 May 2018, pp. 259\u2013264. New York: IEEE."},{"key":"e_1_3_2_54_2","first-page":"675","volume-title":"Proceedings of the 20th international conference on World Wide Web","author":"Castillo C","unstructured":"Castillo C, Mendoza M, Poblete B. Information credibility on twitter. In: Proceedings of the 20th international conference on World Wide Web, Hyderabad, India, 28 March 2011, pp. 675\u2013684. New York: ACM."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.08.003"},{"issue":"4","key":"e_1_3_2_56_2","first-page":"661","article-title":"A credibility analysis system for assessing information on twitter","volume":"15","author":"Alrubaian M","year":"2016","unstructured":"Alrubaian M, Al-Qurishi M, Hassan MM et al. A credibility analysis system for assessing information on twitter. IEEE T Depend Secure 2016; 15(4): 661\u2013674.","journal-title":"IEEE T Depend Secure"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.286"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.17993\/3ctecno.2019.specialissue2.206-221"},{"key":"e_1_3_2_59_2","first-page":"300","volume-title":"Proceedings of the 2012 international conference on information retrieval & knowledge management","author":"Sidi F","unstructured":"Sidi F, Panahy PH, Affendey LS et al. Data quality: a survey of data quality dimensions. In: Proceedings of the 2012 international conference on information retrieval & knowledge management, Kuala Lumpur, Malaysia, 13 March 2012, pp. 300\u2013304. New York: IEEE."},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.5334\/dsj-2015-002"},{"key":"e_1_3_2_61_2","unstructured":"Liu Q Wu S Yu F et al. ICE: information credibility evaluation on social media via representation learning. arXiv preprint 2016 https:\/\/arxiv.org\/pdf\/1609.09226.pdf"},{"key":"e_1_3_2_62_2","first-page":"59","volume-title":"Measuring social media credibility: a study on a Measure of Blog Credibility","author":"Kang M","year":"2010","unstructured":"Kang M. Measuring social media credibility: a study on a Measure of Blog Credibility. Gainesville, FL: Institute for Public Relations, 2010, pp. 59\u201368."},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.923034"},{"issue":"3","key":"e_1_3_2_64_2","first-page":"151","article-title":"Cutting through the noise: defining ground truth in information credibility on twitter","volume":"2","author":"Sikdar SK","year":"2013","unstructured":"Sikdar SK, Kang B, O\u2019Donovan J et al. Cutting through the noise: defining ground truth in information credibility on twitter. Human 2013; 2(3): 151\u2013167.","journal-title":"Human"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2012-0095"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pragma.2013.07.012"},{"key":"e_1_3_2_67_2","first-page":"1","volume-title":"Proceedings of the 2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing","author":"Canini KR","unstructured":"Canini KR, Suh B, Pirolli PL. Finding credible information sources in social networks based on content and social structure. In: Proceedings of the 2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing, Boston, MA, 9 October 2011, pp. 1\u20138. New York: IEEE."},{"key":"e_1_3_2_68_2","first-page":"453","volume-title":"European conference on information retrieval","author":"Shariff SM","unstructured":"Shariff SM, Sanderson M, Zhang X. Correlation analysis of reader\u2019s demographics and tweet credibility perception. In: European conference on information retrieval, Padua, 20 March 2016, pp. 453\u2013465. Cham: Springer."},{"key":"e_1_3_2_69_2","first-page":"316","volume-title":"Proceedings of the 25th ACM conference on hypertext and social media","author":"Saez-Trumper D","unstructured":"Saez-Trumper D. Fake tweet buster: a webtool to identify users promoting fake news on Twitter. In: Proceedings of the 25th ACM conference on hypertext and social media, Santiago, Chile, 1 September 2014, pp. 316\u2013317. New York: ACM."},{"key":"e_1_3_2_70_2","unstructured":"15 social media management tools that can help your business thrive. Forbes.com 15 May 2017 https:\/\/www.forbes.com\/sites\/forbesagencycouncil\/2017\/05\/15\/15-social-media-management-tools-that-can-help-your-business-thrive\/#6ff726d22b13 (accessed 25 April 2020)."}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211013693","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01655515211013693","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211013693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:18Z","timestamp":1777504158000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01655515211013693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,6]]},"references-count":69,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.1177\/01655515211013693"],"URL":"https:\/\/doi.org\/10.1177\/01655515211013693","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,6]]}}}