{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T22:43:30Z","timestamp":1743547410612,"version":"3.30.2"},"reference-count":68,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T00:00:00Z","timestamp":1088640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,7,1]]},"abstract":"Advances in electronic banking technology have created novel ways of handling daily banking affairs, especially via the online banking channel. The acceptance of online banking services has been rapid in many parts of the world, and in the leading e\u2010banking countries the number of e\u2010banking contracts has exceeded 50 percent. Investigates online banking acceptance in the light of the traditional technology acceptance model (TAM), which is leveraged into the online environment. On the basis of a focus group interview with banking professionals, TAM literature and e\u2010banking studies, we develop a model indicating online\u2010banking acceptance among private banking customers in Finland. The model was tested with a survey sample (n<\/jats:italic>=268). The findings of the study indicate that perceived usefulness and information on online banking on the Web site were the main factors influencing online\u2010banking acceptance.<\/jats:p>","DOI":"10.1108\/10662240410542652","type":"journal-article","created":{"date-parts":[[2004,7,10]],"date-time":"2004-07-10T03:43:30Z","timestamp":1089431010000},"page":"224-235","source":"Crossref","is-referenced-by-count":788,"title":["Consumer acceptance of online banking: an extension of the technology acceptance model"],"prefix":"10.1108","volume":"14","author":[{"given":"Tero","family":"Pikkarainen","sequence":"first","affiliation":[]},{"given":"Kari","family":"Pikkarainen","sequence":"additional","affiliation":[]},{"given":"Heikki","family":"Karjaluoto","sequence":"additional","affiliation":[]},{"given":"Seppo","family":"Pahnila","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021120121166900_b1","unstructured":"Aczel, A.D. (1999), Complete Business Statistics, 4th ed., Richard D. Irwin\/McGraw\u2010Hill, Boston, MA."},{"key":"key2022021120121166900_b2","doi-asserted-by":"crossref","unstructured":"Adams, D.A., Nelson, R.R. and Todd, P.A. (1992), \u201cPerceived usefulness, ease of use, and usage of information technology: a replication\u201d, MIS Quarterly, June, pp. 227\u201047.","DOI":"10.2307\/249577"},{"key":"key2022021120121166900_b3","doi-asserted-by":"crossref","unstructured":"Ajzen, I. (1991), \u201cThe theory of planned behavior\u201d, Organizational Behavior and Human Decision Processes, Vol. 50, pp. 179\u2010211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2022021120121166900_b4","unstructured":"Ajzen, I. and Fishbein, M. (1980), Understanding Attitudes and Predicting Social Behavior, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022021120121166900_b5","doi-asserted-by":"crossref","unstructured":"Al\u2010Gahtani, S. (2001), \u201cThe applicability of TAM outside North America: an empirical test in the United Kingdom\u201d, Information Resources Management Journal, July\u2010September, pp. 37\u201046.","DOI":"10.4018\/irmj.2001070104"},{"key":"key2022021120121166900_b6","doi-asserted-by":"crossref","unstructured":"Baronas, A.K. and Louis, M.R. (1988), \u201cRestoring a sense of control during implementation: how user involvement leads to system acceptance\u201d, MIS Quarterly, Vol. 12 No. 1, pp. 111\u201024.","DOI":"10.2307\/248811"},{"key":"key2022021120121166900_b7","doi-asserted-by":"crossref","unstructured":"Black, N.J., Lockett, A., Winklhofer, H. and McKechnie, S. (2002), \u201cModelling consumer choice of distribution channels: an illustration from financial services\u201d, The International Journal of Bank Marketing, Vol. 20 No. 4, pp. 161\u201073.","DOI":"10.1108\/02652320210432945"},{"key":"key2022021120121166900_b8","doi-asserted-by":"crossref","unstructured":"Bradley, L. and Stewart, K. (2003), \u201cA Delphi study of the drivers and inhibitors of Internet banking\u201d, The International Journal of Bank Marketing, Vol. 20 No. 6, pp. 250\u201060.","DOI":"10.1108\/02652320210446715"},{"key":"key2022021120121166900_b9","doi-asserted-by":"crossref","unstructured":"Compeau, R.D. and Higgins, A.C. (1995), \u201cComputer self\u2010efficacy:development of a measure and initial test\u201d, MIS Quarterly, Vol. 19 No. 2, pp. 189\u2010211.","DOI":"10.2307\/249688"},{"key":"key2022021120121166900_b10","unstructured":"Cranor, L.F., Reagle, J. and Ackerman, M.S. (1999), \u201cBeyond concern: understanding net users\u2019 attitudes about online privacy\u201d, technical report, TR 99.4.3, AT&T Labs \u2013 Research, available at: www.research.att.com\/resources\/trs\/TRs\/99\/99.4\/99.4.3\/report.htm."},{"key":"key2022021120121166900_b11","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived easy of use, and user acceptance of information technology\u201d, MIS Quarterly, September, pp. 319\u201040.","DOI":"10.2307\/249008"},{"key":"key2022021120121166900_b12","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1993), \u201cUser acceptance of information technology: system characteristics, user perceptions and behavioral impacts\u201d, International Journal of Man\u2010Machine Studies, Vol. 38, pp. 475\u201087.","DOI":"10.1006\/imms.1993.1022"},{"key":"key2022021120121166900_b13","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022021120121166900_b14","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1992), \u201cExtrinsic and intrinsic motivation to use computers in the workplace\u201d, Journal of Applied Social Psychology, Vol. 22 No. 14, pp. 1111\u201032.","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"key2022021120121166900_b15","doi-asserted-by":"crossref","unstructured":"Davis, F.D. and Venkatesh, V. (1996), \u201cA critical assessment of potential measurement biases in the technology acceptance model: three experiments\u201d, International Journal of Human\u2010Computer Studies, Vol. 45, pp. 19\u201045.","DOI":"10.1006\/ijhc.1996.0040"},{"key":"key2022021120121166900_b16","doi-asserted-by":"crossref","unstructured":"DeLone, W.H. and McLean, E.R. (1992), \u201cInformation systems success: the quest for the dependent variable\u201d, Information Systems Research, Vol. 3 No. 1, pp. 60\u201095.","DOI":"10.1287\/isre.3.1.60"},{"key":"key2022021120121166900_b17","unstructured":"DePallo, M. (2000), National Survey on Consumer Preparedness and E\u2010Commerce: A Survey of Computer Users Age 45 and Older, AARP, Washington, DC."},{"key":"key2022021120121166900_b18","unstructured":"Fishbein, M. and Ajzen, I. (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison\u2010Wesley, Reading, MA."},{"key":"key2022021120121166900_b19","doi-asserted-by":"crossref","unstructured":"Gefen, D. and Straub, D. (2000), \u201cThe relative importance of perceived ease of use in IS adoption: a study of e\u2010commerce adoption\u201d, Journal of the Association for Information Systems, Vol. 1 No. 8, pp. 1\u201028.","DOI":"10.17705\/1jais.00008"},{"key":"key2022021120121166900_b20","doi-asserted-by":"crossref","unstructured":"Gerrard, P. and Cunningham, J.B. (2003), \u201cThe diffusion of Internet banking among Singapore consumers\u201d, The International Journal of Bank Marketing, Vol. 21 No. 1, pp. 16\u201028.","DOI":"10.1108\/02652320310457776"},{"key":"key2022021120121166900_b21","unstructured":"Giglio, V. (2002), \u201cPrivacy in the world of cyberbanking: emerging legal issues and how you are protected\u201d, The Secured Lender, March\/April, pp. 48\u201060."},{"key":"key2022021120121166900_b22","unstructured":"Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1998), Multivariate Data Analysis, 5th ed., Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022021120121166900_b23","unstructured":"Hamlet, C. and Strube, M. (2000), \u201cCommunity banks go online\u201d, ABA Banking Journal's 2000 White Paper\/Banking on the Internet, March, pp. 61\u20105."},{"key":"key2022021120121166900_b24","doi-asserted-by":"crossref","unstructured":"Henderson, R. and Divett, M. (2003), \u201cPerceived usefulness, ease of use and electronic supermarket use\u201d, International Journal of Human\u2010Computer Studies, Vol. 59 No. 3, pp. 383\u201095.","DOI":"10.1016\/S1071-5819(03)00079-X"},{"key":"key2022021120121166900_b107","unstructured":"Hoffman, D.L. and Novak, T.P. (1998), \u201cTrustbuilders vs trustbusters\u201d, The Industry Standard, May."},{"key":"key2022021120121166900_b25","doi-asserted-by":"crossref","unstructured":"Howcroft, B., Hamilton, R. and Hewer, P. (2002), \u201cConsumer attitude and the usage and adoption of home\u2010based banking in the United Kingdom\u201d, The International Journal of Bank Marketing, Vol. 20 No. 3, pp. 111\u201021.","DOI":"10.1108\/02652320210424205"},{"key":"key2022021120121166900_b26","doi-asserted-by":"crossref","unstructured":"Igbaria, M., Schiffman, S.J. and Wieckowski, T.J. (1994), \u201cThe respective roles of perceived usefulness and perceived fun in the acceptance of microcomputer technology\u201d, Behaviour & Information Technology, Vol. 13 No. 6, pp. 349\u201061.","DOI":"10.1080\/01449299408914616"},{"key":"key2022021120121166900_b27","doi-asserted-by":"crossref","unstructured":"Igbaria, M., Iivari, J. and Maragahh, H. (1995), \u201cWhy do individuals use computer technology? A Finnish case study\u201d, Information & Management, Vol. 29, pp. 227\u201038.","DOI":"10.1016\/0378-7206(95)00031-0"},{"key":"key2022021120121166900_b28","doi-asserted-by":"crossref","unstructured":"Ives, B., Olson, M.H. and Baroudi, J.J. (1983), \u201cThe measurement of user information satisfaction\u201d, Communications of ACM, Vol. 26 No. 10, pp. 785\u201093.","DOI":"10.1145\/358413.358430"},{"key":"key2022021120121166900_b29","doi-asserted-by":"crossref","unstructured":"Karjaluoto, H., Mattila, M. and Pento, T. (2002), \u201cElectronic banking in Finland \u2013 consumer beliefs and reactions to a new delivery channel\u201d, Journal of Financial Services Marketing, Vol. 6 No. 4, pp. 346\u201061.","DOI":"10.1057\/palgrave.fsm.4770064"},{"key":"key2022021120121166900_b30","doi-asserted-by":"crossref","unstructured":"Karjaluoto, H., Koivum\u00e4ki, T. and Salo, J. (2003), \u201cIndividual differences in private banking: empirical evidence from Finland\u201d, Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS), Big Island, Hawaii, p. 196.","DOI":"10.1109\/HICSS.2003.1174449"},{"key":"key2022021120121166900_b31","doi-asserted-by":"crossref","unstructured":"Kobsa, A. (2001), \u201cTailoring privacy to users\u2019 needs (invited keynote)\u201d, in Bauer, M., Gmytrasiewicz, P.J. and Vassileva, J. (Eds), Proceedings of the User Modeling 2001: 8th International Conference, Springer Verlag, Berlin and Heidelberg, pp. 303\u201013.","DOI":"10.1007\/3-540-44566-8_52"},{"key":"key2022021120121166900_b32","doi-asserted-by":"crossref","unstructured":"Kobsa, A. (2002), \u201cPersonalized hypermedia and international privacy\u201d, Communications of the ACM, Vol. 45 No. 5, pp. 64\u20107.","DOI":"10.1145\/506218.506249"},{"key":"key2022021120121166900_b33","doi-asserted-by":"crossref","unstructured":"Lederer, A.L., Maupin, D.J., Sena, M.P. and Zhuang, Y. (1998), \u201cThe role of ease of use, usefulness and attitude in the prediction of World Wide Web usage\u201d, Proceedings of the 1998 Association for Computing Machinery Special Interest Group on Computer Personnel Research Conference, pp. 195\u2010204.","DOI":"10.1145\/279179.279211"},{"key":"key2022021120121166900_b34","doi-asserted-by":"crossref","unstructured":"Legris, P., Ingham, J. and Collerette, P. (2003), \u201cWhy do people use information technology? A critical review of the technology acceptance model\u201d, Information & Management, Vol. 40, pp. 191\u2010204.","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"key2022021120121166900_b35","doi-asserted-by":"crossref","unstructured":"Lu, J., Yu, C.S., Liu, C. and Yao, J.E. (2003), \u201cTechnology acceptance model for wireless Internet\u201d, Internet Research, Vol. 13 No. 3, pp. 206\u201022.","DOI":"10.1108\/10662240310478222"},{"key":"key2022021120121166900_b36","unstructured":"Luxman, N. (1999), \u201cWww.your\u2010community\u2010bank.com: community banks are going online\u201d, Communities and Banking, Vol. 27 No. Fall, pp. 2\u20108."},{"key":"key2022021120121166900_b37","doi-asserted-by":"crossref","unstructured":"Mathieson, K. (1991), \u201cPredicting user intentions: comparing the technology acceptance model with the theory of planned behavior\u201d, Information Systems Research, Vol. 2 No. 3, pp. 173\u201091.","DOI":"10.1287\/isre.2.3.173"},{"key":"key2022021120121166900_b38","doi-asserted-by":"crossref","unstructured":"Mattila, M., Karjaluoto, H. and Pento, T. (2003), \u201cInternet banking adoption among mature customers: early majority or laggards\u201d, Journal of Services Marketing, Vol. 17 No. 5, pp. 514\u201026.","DOI":"10.1108\/08876040310486294"},{"key":"key2022021120121166900_b39","doi-asserted-by":"crossref","unstructured":"Mols, N.P. (1998), \u201cThe behavioral consequences of PC banking\u201d, The International Journal of Bank Marketing, Vol. 16 No. 5, pp. 195\u2010201.","DOI":"10.1108\/02652329810228190"},{"key":"key2022021120121166900_b40","doi-asserted-by":"crossref","unstructured":"Mols, N.P., Bukh, P.N.D. and Nielsen, J.F. (1999), \u201cDistribution channel strategies in Danish retail banking\u201d, International Journal of Retail & Distribution Management, Vol. 27 No. 1, pp. 37\u201047.","DOI":"10.1108\/09590559910252694"},{"key":"key2022021120121166900_b41","doi-asserted-by":"crossref","unstructured":"Moon, J.\u2010W. and Kim, Y.G. (2001), \u201cExtending the TAM for a World\u2010Wide\u2010Web context\u201d, Information & Management, Vol. 38, pp. 217\u201030.","DOI":"10.1016\/S0378-7206(00)00061-6"},{"key":"key2022021120121166900_b42","doi-asserted-by":"crossref","unstructured":"Mukherjee, A. and Nath, P. (2003), \u201cA model of trust in online relationship banking\u201d, The International Journal of Bank Marketing, Vol. 21 No. 1, pp. 5\u201015.","DOI":"10.1108\/02652320310457767"},{"key":"key2022021120121166900_b43","unstructured":"Nordea Oyj (2003), available at: www.nordea.fi."},{"key":"key2022021120121166900_b44","unstructured":"Nummenmaa, T., Konttinen, R., Kuusinen, J. and Leskinen, E. (1996), Tutkimusaineiston Analyysi (Analysis of Research Data), WSOY, Helsinki."},{"key":"key2022021120121166900_b45","unstructured":"Orr, B. (2001), \u201cE\u2010banking: what next?\u201d, ABA Banking Journal, pp. 40\u20106."},{"key":"key2022021120121166900_b46","doi-asserted-by":"crossref","unstructured":"Peterson, R.A. (1994), \u201cA meta\u2010analysis of Cronbach's coefficient alpha\u201d, Journal of Consumer Research, Vol. 21 September, pp. 381\u201091.","DOI":"10.1086\/209405"},{"key":"key2022021120121166900_b47","doi-asserted-by":"crossref","unstructured":"Polatoglu, V.N. and Ekin, S. (2001), \u201cAn empirical investigation of the Turkish consumers\u2019 acceptance of Internet banking services\u201d, International Journal of Bank Marketing, Vol. 19 No. 4, pp. 156\u201065.","DOI":"10.1108\/02652320110392527"},{"key":"key2022021120121166900_b48","unstructured":"Pyun, C.S., Scruggs, L. and Nam, K. (2002), \u201cInternet banking in the US, Japan and Europe\u201d, Multinational Business Review, No. Fall, pp. 73\u201081."},{"key":"key2022021120121166900_b49","unstructured":"Robinson, T. (2000), \u201cInternet banking: still not a perfect marriage\u201d, Informationweek.com, April 17, pp. 104\u20106."},{"key":"key2022021120121166900_b50","unstructured":"Roboff, G. and Charles, C. (1998), \u201cPrivacy of financial information in cyberspace: banks addressing what consumers want\u201d, Journal of Retail Banking Services, Vol. XX No. 3, pp. 51\u20106."},{"key":"key2022021120121166900_b51","doi-asserted-by":"crossref","unstructured":"Sathye, M. (1999), \u201cAdoption of Internet banking by Australian consumers: an empirical investigation\u201d, International Journal of Bank Marketing, Vol. 17 No. 7, pp. 324\u201034.","DOI":"10.1108\/02652329910305689"},{"key":"key2022021120121166900_b52","unstructured":"Schneider, I. (2001), \u201cIs time running out for Internet\u2010only banks?\u201d, Bank Systems & Technology, September, p. 8."},{"key":"key2022021120121166900_b53","doi-asserted-by":"crossref","unstructured":"Segars, A.H. and Grover, V. (1993), \u201cRe\u2010examining perceived easy of use and usefulness: a confirmatory factor analysis\u201d, MIS Quarterly, December, pp. 517\u201025.","DOI":"10.2307\/249590"},{"key":"key2022021120121166900_b54","unstructured":"Sheshunoff, A. (2000), \u201cInternet banking \u2013 an update from the frontlines\u201d, ABA Banking Journal, January, pp. 51\u20103."},{"key":"key2022021120121166900_b55","unstructured":"Sievewright, M. (2002), \u201cTraditional vs virtual service\u201d, Credit Union Magazine, February, p. 26."},{"key":"key2022021120121166900_b56","unstructured":"The Finnish Banker's Association (2003), \u201cS\u00e4\u00e4st\u00e4minen ja luotonk\u00e4ytt\u00f6 (\u201cSurvey on saving and use of credit\u201d)\u201d, available at: www.pankkiyhdistys.fi."},{"key":"key2022021120121166900_b57","doi-asserted-by":"crossref","unstructured":"Succi, M.J. and Walter, Z.D. (1999), \u201cTheory of user acceptance of information technologies: an examination of health care professionals\u201d, Proceedings of the 32nd Hawaii International Conference on System Sciences (HICSS), pp. 1\u20107.","DOI":"10.1109\/HICSS.1999.773013"},{"key":"key2022021120121166900_b58","doi-asserted-by":"crossref","unstructured":"Tan, M. and Teo, T.S.H. (2000), \u201cFactors influencing the adoption of Internet banking\u201d, Journal of the Association for Information Systems, Vol. 1 No. 5, pp. 1\u201042.","DOI":"10.17705\/1jais.00005"},{"key":"key2022021120121166900_b59","doi-asserted-by":"crossref","unstructured":"Taylor, S. and Todd, P.A. (1995), \u201cUnderstanding information technology usage: a test of competing models\u201d, Information Systems Research, Vol. 6 No. 2, pp. 144\u201076.","DOI":"10.1287\/isre.6.2.144"},{"key":"key2022021120121166900_b60","doi-asserted-by":"crossref","unstructured":"Teo, T.S.H., Lim, V.K.G. and Lai, R.Y.C. (1999), \u201cIntrinsic and extrinsic motivation in Internet usage\u201d, Omega, International Journal of Management Science, Vol. 27, pp. 25\u201037.","DOI":"10.1016\/S0305-0483(98)00028-0"},{"key":"key2022021120121166900_b61","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Davis, F.D. (1996), \u201cA model of the antecedents of perceived ease of use: development and test\u201d, Decision Sciences, Vol. 27 No. 3, pp. 451\u201081.","DOI":"10.1111\/j.1540-5915.1996.tb00860.x"},{"key":"key2022021120121166900_b62","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Davis, F.D. (2000), \u201cTheoretical extension of the technology acceptance model: four longitudinal field studies\u201d, Management Science, Vol. 46 No. 2, pp. 186\u2010204.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"key2022021120121166900_b63","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Morris, M.G. (2000), \u201cWhy don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior\u201d, MIS Quarterly, Vol. 24 No. 1, pp. 115\u201039.","DOI":"10.2307\/3250981"},{"key":"key2022021120121166900_b64","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Speier, C. (1999), \u201cComputer technology training in the workplace: a longitudinal investigation of the effect of mood\u201d, Organizational Behavior and Human Decision Processes, Vol. 79, pp. 1\u201028.","DOI":"10.1006\/obhd.1999.2837"},{"key":"key2022021120121166900_b65","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Speier, C. and Morris, M.G. (2002), \u201cUser acceptance enablers in individual decision making about technology: toward an integrated model\u201d, Decision Sciences, Vol. 33 No. 3, pp. 297\u2010316.","DOI":"10.1111\/j.1540-5915.2002.tb01646.x"},{"key":"key2022021120121166900_b66","doi-asserted-by":"crossref","unstructured":"Waite, K. and Harrison, T. (2002), \u201cConsumer expectations of online information provided by bank websites\u201d, Journal of Financial Services Marketing, Vol. 6 No. 4, pp. 309\u201022.","DOI":"10.1057\/palgrave.fsm.4770061"},{"key":"key2022021120121166900_b67","unstructured":"Westin, A.F. and Maurici, D. (1998), \u201cE\u2010commerce & privacy: what the net users want\u201d, Privacy & American Business, and PricewaterhouseCoopers LLP, New York, NY, available at: www.pwcglobal.com\/gx\/eng\/svcs\/privacy\/images\/E\u2010Commerce.pdf."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240410542652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410542652\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410542652\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T21:30:51Z","timestamp":1734471051000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410542652\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,7,1]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,7,1]]}},"alternative-id":["10.1108\/10662240410542652"],"URL":"https:\/\/doi.org\/10.1108\/10662240410542652","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2004,7,1]]}}}