{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:25:58Z","timestamp":1777937158427,"version":"3.51.4"},"reference-count":84,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2024,5]]},"abstract":"<jats:p>Algorithmic decision-making systems are ubiquitous in digital media, but the public has been largely unable to negotiate the role of algorithms in society. Building from the concept of attitude-behavior consistency for political behavior, we develop a framework for fostering algorithmic literacy to develop well-informed attitudes toward algorithms. As algorithms are increasingly relevant to broad societal effects, an integrative approach is needed for a full account of how the public makes sense of algorithms and their role in society. We designed and tested a novel intervention that combines algorithmic literacy with personalized user experiences to see how each component influenced attitudes toward algorithms. We found these methods jointly informed attitudes, but the intervention\u2019s efficacy was dependent on participants\u2019 individual differences in technology use.<\/jats:p>","DOI":"10.1177\/14614448221098042","type":"journal-article","created":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T10:30:03Z","timestamp":1654597803000},"page":"2992-3017","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":24,"title":["Facets of algorithmic literacy: Information, experience, and individual factors predict attitudes toward algorithmic systems"],"prefix":"10.1177","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9635-6575","authenticated-orcid":false,"given":"David E","family":"Silva","sequence":"first","affiliation":[{"name":"Kent State University, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chan","family":"Chen","sequence":"additional","affiliation":[{"name":"Hunan Normal University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ying","family":"Zhu","sequence":"additional","affiliation":[{"name":"Kent State University, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2022,6,7]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415192"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816676645"},{"key":"e_1_3_3_4_1","doi-asserted-by":"crossref","unstructured":"Anik AI Bunt A (2021) Data-centric explanations: explaining training data of machine learning systems to promote transparency. In: Proceedings of the 2021 CHI conference on human factors in computing systems Yokohama Japan 8\u201313 May pp. 1\u201313. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3411764.3445736","DOI":"10.1145\/3411764.3445736"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327027hc1801_4"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/jac5.1386"},{"key":"e_1_3_3_7_1","unstructured":"Barnett T (2016) The zettabyte era officially begins (how much is that?). In: Cisco Blogs. Available at: https:\/\/blogs.cisco.com\/sp\/the-zettabyte-era-officially-begins-how-much-is-that (accessed 31 October 2019)."},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055405051580"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1216147"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819854731"},{"key":"e_1_3_3_11_1","first-page":"1","volume-title":"Proceedings of the twenty-seventh Americas conference on information systems","author":"Bitzer T","year":"2021","unstructured":"Bitzer T, Wiener M, Morana S (2021) Algorithmic transparency and contact\u2014tracing apps\u2014an empirical investigation. In: Proceedings of the twenty-seventh Americas conference on information systems, Montreal, QC, Canada, 9\u201313 August, pp. 1\u201310. Association for Information Systems."},{"key":"e_1_3_3_12_1","unstructured":"boyd d (2017) Did media literacy backfire? In: Data & Society: Points. Available at: https:\/\/points.datasociety.net\/did-media-literacy-backfire-7418c084d88d"},{"key":"e_1_3_3_13_1","unstructured":"boyd d (2018) You think you want media literacy. . . do you? In: Data & Society: Points. Available at: https:\/\/points.datasociety.net\/you-think-you-want-media-literacy-do-you-7cad6af18ec2"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812440159"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.05.009"},{"key":"e_1_3_3_16_1","doi-asserted-by":"crossref","unstructured":"Chen T-W Sundar SS (2018) This app would like to use your current location to better serve you: importance of user assent and system transparency in personalized mobile services. In: Proceedings of the 2018 CHI conference on human factors in computing systems \u2014CHI \u201918 Montreal QC Canada 21\u201326 April pp. 1\u201313. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3173574.3174111","DOI":"10.1145\/3173574.3174111"},{"key":"e_1_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Cheng H-F Wang R Zhang Z et al. (2019) Explaining decision-making algorithms through UI: strategies to help non-expert stakeholders. In: Proceedings of the 2019 CHI conference on human factors in computing systems \u2014CHI \u201919 Glasgow 4\u20139 May pp. 1\u201312. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3290605.3300789","DOI":"10.1145\/3290605.3300789"},{"key":"e_1_3_3_18_1","unstructured":"Constine J (2018) How Instagram\u2019s algorithm works. TechCrunch 1 June. Available at: https:\/\/techcrunch.com\/2018\/06\/01\/how-instagram-feed-works\/"},{"key":"e_1_3_3_19_1","first-page":"745","article-title":"Algorithmic knowledge gaps: a new horizon of (digital) inequality","volume":"14","author":"Cotter K","year":"2020","unstructured":"Cotter K, Reisdorf BC (2020) Algorithmic knowledge gaps: a new horizon of (digital) inequality. International Journal of Communication 14: 745\u2013765.","journal-title":"International Journal of Communication"},{"key":"e_1_3_3_20_1","unstructured":"De la Torre LF (2019) The \u201cright to an explanation\u201d under EU data protection law 3 October. Available at: https:\/\/medium.com\/golden-data\/what-rights-related-to-automated-decision-making-do-individuals-have-under-eu-data-protection-law-76f70370fcd0 (accessed 31 October 2019)."},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476080"},{"key":"e_1_3_3_22_1","doi-asserted-by":"crossref","unstructured":"DeVito MA Birnholtz J Hancock JT et al. (2018) How people form folk theories of social media feeds and what it means for how we study self-presentation. In: Proceedings of the 2018 CHI conference on human factors in computing systems Montreal QC Canada 21\u201326 April pp. 1\u201312. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3173574.3173694","DOI":"10.1145\/3173574.3173694"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2016.1208053"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000033"},{"key":"e_1_3_3_25_1","doi-asserted-by":"crossref","unstructured":"DiFranzo D Choi YH Purington A et al. (2019) Social media TestDrive: real-world social media education for the next generation. In: Proceedings of the 2019 CHI conference on human factors in computing systems Glasgow 4\u20139 May pp. 303:1\u2013303:11. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3290605.3300533","DOI":"10.1145\/3290605.3300533"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2021.1949768"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/19312458.2021.1968361"},{"key":"e_1_3_3_28_1","volume-title":"Think Python, 2e: How to think like a computer scientist","author":"Downey AB","year":"2015","unstructured":"Downey AB (2015) Think Python, 2e: How to think like a computer scientist. O\u2019Reilly Media."},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00038-7"},{"key":"e_1_3_3_30_1","doi-asserted-by":"crossref","unstructured":"Eiband M Schneider H Bilandzic M et al. (2018) Bringing transparency design into practice. In: 23rd International conference on intelligent user interfaces Tokyo Japan 7\u201311 March pp. 211\u2013223. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3172944.3172961","DOI":"10.1145\/3172944.3172961"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.33902\/JPR.2021473498"},{"key":"e_1_3_3_32_1","doi-asserted-by":"crossref","unstructured":"Eslami M Karahalios K Sandvig C et al. (2016) First I \u201clike\u201d it then I hide it: folk theories of social feeds. In: Proceedings of the 2016 CHI conference on human factors in computing systems \u2014CHI \u201916 San Jose CA 7\u201312 May pp. 2371\u20132382. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/2858036.2858494","DOI":"10.1145\/2858036.2858494"},{"key":"e_1_3_3_33_1","doi-asserted-by":"crossref","unstructured":"Eslami M Rickman A Vaccaro K et al. (2015) \u201cI always assumed that I wasn\u2019t really that close to [her]\u201d: reasoning about invisible algorithms in news feeds. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems Seoul Republic of Korea 18\u201323 April pp. 153\u2013162. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/2702123.2702556","DOI":"10.1145\/2702123.2702556"},{"issue":"1","key":"e_1_3_3_34_1","first-page":"63","article-title":"\u201cBe careful; things can be worse than they appear\u201d: understanding biased algorithms and users\u2019 behavior around them in rating platforms","volume":"11","author":"Eslami M","year":"2017","unstructured":"Eslami M, Vaccaro K, Karahalios K, et al. (2017) \u201cBe careful; things can be worse than they appear\u201d: understanding biased algorithms and users\u2019 behavior around them in rating platforms. Proceedings of the Eleventh International AAAI Conference on Web and Social Media 11(1): 63\u201371.","journal-title":"Proceedings of the Eleventh International AAAI Conference on Web and Social Media"},{"key":"e_1_3_3_35_1","doi-asserted-by":"crossref","unstructured":"Eslami M Vaccaro K Lee MK et al. (2019) User attitudes towards algorithmic opacity and transparency in online reviewing platforms. In: Proceedings of the CHI conference on human factors in computing systems Glasgow 4\u20139 May pp. 1\u201314. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3290605.3300724","DOI":"10.1145\/3290605.3300724"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(82)90058-0"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.87.3.293"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691620917333"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817724170"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809342738"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compcom.2019.102521"},{"key":"e_1_3_3_42_1","unstructured":"Google (n.d.) Google\u2019s search algorithm and ranking system. Available at: https:\/\/www.google.com\/search\/howsearchworks\/algorithms\/ (accessed 16 March 2019)."},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1736124"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0032754"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1713846"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053168015604648"},{"issue":"2","key":"e_1_3_3_47_1","first-page":"111","article-title":"Exploring media literacy and computational thinking: a game maker curriculum study","volume":"14","author":"Jenson J","year":"2016","unstructured":"Jenson J, Droumeva M (2016) Exploring media literacy and computational thinking: a game maker curriculum study. Electronic Journal of E-Learning 14(2): 111\u2013121.","journal-title":"Electronic Journal of E-Learning"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359252"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2015.0340"},{"key":"e_1_3_3_50_1","doi-asserted-by":"crossref","unstructured":"Kim K Moon S-I (2021) When algorithmic transparency failed: controversies over algorithm-driven content curation in the South Korean digital environment. American Behavioral Scientist 65(6): 847\u2013862. https:\/\/doi.org\/10.1177\/0002764221989783","DOI":"10.1177\/0002764221989783"},{"key":"e_1_3_3_51_1","doi-asserted-by":"crossref","unstructured":"Kizilcec RF (2016) How much information? Effects of transparency on trust in an algorithmic interface. In: Proceedings of the 2016 CHI conference on human factors in computing systems \u2014CHI \u201916 San Jose CA 7\u201312 May pp. 2390\u20132395. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/2858036.2858402","DOI":"10.1145\/2858036.2858402"},{"key":"e_1_3_3_52_1","doi-asserted-by":"crossref","unstructured":"Latzer M Hollnbuchner K Just N et al. (2016) The economics of algorithmic selection on the internet. In: Bauer JM Latzer M (eds) Handbook on the Economics of the Internet. Cheltenham: Edward Elgar Publishing pp. 395\u2013425. Available at: https:\/\/www.elgaronline.com\/view\/edcoll\/9780857939845\/9780857939845.00028.xml","DOI":"10.4337\/9780857939852.00028"},{"key":"e_1_3_3_53_1","doi-asserted-by":"crossref","unstructured":"Lee MK Baykal S (2017) Algorithmic mediation in group decisions: fairness perceptions of algorithmically mediated vs. discussion-based social division. In: Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing \u2014CSCW \u201917 Portland OR 25 February\u20131 March pp. 1035\u20131048. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/2998181.2998230","DOI":"10.1145\/2998181.2998230"},{"key":"e_1_3_3_54_1","doi-asserted-by":"crossref","unstructured":"Liao QV Gruen D Miller S (2020) Questioning the AI: informing design practices for explainable AI user experiences. In: Proceedings of the 2020 CHI conference on human factors in computing systems Honolulu HI 25\u201330 April pp. 1\u201315. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3313831.3376590","DOI":"10.1145\/3313831.3376590"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211010170"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-02-2019-0035"},{"key":"e_1_3_3_57_1","volume-title":"57th Annual conference of the International Communication Association","author":"Marathe SS","year":"2007","unstructured":"Marathe SS, Sundar S, Nije Bijvank M, et al. (2007) Who are these power users anyway? Building a psychological profile. In: 57th Annual conference of the International Communication Association, San Francisco, CA, 23 May."},{"key":"e_1_3_3_58_1","unstructured":"Metz C (2015) Google is 2 billion lines of code\u2014and it\u2019s all in one place. Wired 16 September. Available at: https:\/\/www.wired.com\/2015\/09\/google-2-billion-lines-codeand-one-place\/"},{"key":"e_1_3_3_59_1","first-page":"3","volume-title":"Media Access: Social and Psychological Dimensions of New Technology Use","author":"Newhagen JE","year":"2003","unstructured":"Newhagen JE, Bucy E (2003) Routes to media access. In: Bucy E, Newhagen JE (eds) Media Access: Social and Psychological Dimensions of New Technology Use. Mahwah, NJ: Lawrence Erlbaum Associates, pp. 3\u201323."},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120805200422"},{"key":"e_1_3_3_61_1","article-title":"Determinants of system transparency and its influence on trust in and reliance on unmanned robotic systems","volume":"9084","author":"Ososky S","year":"2014","unstructured":"Ososky S, Sanders T, Jentsch F, et al. (2014) Determinants of system transparency and its influence on trust in and reliance on unmanned robotic systems. Unmanned Systems Technology XVI 9084: 90840E.","journal-title":"Unmanned Systems Technology XVI"},{"key":"e_1_3_3_62_1","unstructured":"Perrin A Anderson M (2019) Share of U.S. adults using social media including Facebook is mostly unchanged since 2018. Available at: https:\/\/pewrsr.ch\/2VxJuJ3 (accessed 31 March 2021)."},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/10810730.2011.635770"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/10410230802342135"},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720913064"},{"key":"e_1_3_3_66_1","unstructured":"R Core Team (2016) R: A language and environment for statistical computing. Vienna Austria: R Foundation for Statistical Computing. Available at: https:\/\/www.R-project.org\/."},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173677"},{"key":"e_1_3_3_68_1","unstructured":"Rainie L Anderson J (2017) Experts on the pros and cons of algorithms. Available at: https:\/\/www.pewresearch.org\/internet\/2017\/02\/08\/code-dependent-pros-and-cons-of-the-algorithm-age\/ (accessed 1 November 2019)."},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856517736982"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.04.019"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-02-2021-0087"},{"key":"e_1_3_3_72_1","unstructured":"Siles I Mel\u00e9ndez-Moran A (2021) \u201cThe most aggressive of algorithms\u201d: user awareness of and attachment to TikTok\u2019s content personalization. In Paper presented at the 71st annual conference of the international communication association (ICA) Denver CO 27\u201331 May. Available at: http:\/\/www.kerwa.ucr.ac.cr\/handle\/\/1066983230"},{"key":"e_1_3_3_73_1","unstructured":"Smith A (2018) Public attitudes toward computer algorithms. Available at: https:\/\/www.pewinternet.org\/2018\/11\/16\/public-attitudes-toward-computer-algorithms\/ (accessed 29 October 2019)."},{"key":"e_1_3_3_74_1","doi-asserted-by":"crossref","unstructured":"Snowberg E Yariv L (2018) Testing the Waters: Behavior across Participant Pools (National Bureau of Economic Research Working Paper Series: 24781). Cambridge MA: National Bureau of Economic Research. Available at: http:\/\/www.nber.org\/papers\/w24781","DOI":"10.3386\/w24781"},{"key":"e_1_3_3_75_1","doi-asserted-by":"crossref","unstructured":"Springer A Whittaker S (2019) Progressive disclosure: empirically motivated approaches to designing effective transparency. In: Proceedings of the 24th international conference on intelligent user interfaces \u2014IUI \u201919 Marina del Rey CA 17\u201320 March pp. 107\u2013120. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3301275.3302322","DOI":"10.1145\/3301275.3302322"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2010.01377.x"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211008828"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/13527266.2018.1452046"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.23860\/JMLE-2019-11-2-2"},{"issue":"2","key":"e_1_3_3_80_1","first-page":"841","article-title":"Counterfactual explanations without opening the black box: Automated decisions and the GDPR","volume":"31","author":"Wachter S","year":"2018","unstructured":"Wachter S, Mittelstadt BDM, Russell C (2018) Counterfactual explanations without opening the black box: Automated decisions and the GDPR. Harvard Journal of Law and Technology 31(2): 841\u2013887.","journal-title":"Harvard Journal of Law and Technology"},{"key":"e_1_3_3_81_1","doi-asserted-by":"crossref","unstructured":"Wang R Harper FM Zhu H (2020) Factors influencing perceived fairness in algorithmic decision-making: algorithm outcomes development procedures and individual differences. In: Proceedings of the 2020 CHI conference on human factors in computing systems Honolulu HI 25\u201330 April pp. 1\u201314. New York: ACM. Available at: https:\/\/doi.org\/10.1145\/3313831.3376813","DOI":"10.1145\/3313831.3376813"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/6699.001.0001"},{"key":"e_1_3_3_83_1","doi-asserted-by":"crossref","unstructured":"Wickham H (2009) ggplot2: Elegant graphics for data analysis. New York NY: Springer-Verlag.","DOI":"10.1007\/978-0-387-98141-3"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.02.016"},{"key":"e_1_3_3_85_1","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"Zuboff S","year":"2019","unstructured":"Zuboff S (2019) The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: PublicAffairs."}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448221098042","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14614448221098042","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448221098042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:55:06Z","timestamp":1777694106000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14614448221098042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":84,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["10.1177\/14614448221098042"],"URL":"https:\/\/doi.org\/10.1177\/14614448221098042","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,7]]}}}