Next Article in Journal
Automatically Generated Visual Profiles of Code Solutions as Feedback for Students
Next Article in Special Issue
A Semantic Similarity-Based Identification Method for Implicit Citation Functions and Sentiments Information
Previous Article in Journal
Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks
 
 
Article

Article Versions Notes

Information 2022, 13(9), 414; https://doi.org/10.3390/info13090414
Action Date Notes Link
article xml file uploaded 31 August 2022 12:35 CEST Original file -
article xml uploaded. 31 August 2022 12:35 CEST Update -
article pdf uploaded. 31 August 2022 12:35 CEST Version of Record https://www.mdpi.com/2078-2489/13/9/414/pdf-vor
article html file updated 31 August 2022 12:37 CEST Original file -
article xml file uploaded 1 September 2022 08:50 CEST Update -
article xml uploaded. 1 September 2022 08:50 CEST Update https://www.mdpi.com/2078-2489/13/9/414/xml
article pdf uploaded. 1 September 2022 08:50 CEST Updated version of record https://www.mdpi.com/2078-2489/13/9/414/pdf
article html file updated 1 September 2022 08:51 CEST Update -
article html file updated 28 February 2023 11:40 CET Update https://www.mdpi.com/2078-2489/13/9/414/html
Back to TopTop