Research article Special Issues

Determinants influencing the food digestibility perception: A study based on consumer-stated preferences for sweet peppers

  • Received: 17 August 2023 Revised: 29 November 2023 Accepted: 04 December 2023 Published: 14 December 2023
  • In recent years, there has been a growing focus on healthy eating. Concerns about general healthiness, food safety, evolving culinary preferences and the shift towards healthier lifestyles are shaping consumers' intentions when it comes to food purchases, impacting the demand for food items that are perceived as healthier than other options. This study aims to enhance our understanding of the significance that consumers place on perceptions of food digestibility, with a specific focus on sweet peppers as a case study. To explore signals linked to consumers' perceptions of digestibility, a questionnaire was administered to 582 Italian consumers. Employing an econometric estimation as the methodological approach, we aim to elucidate the relationship between various factors and the perception of digestibility. The results suggest that intrinsic and extrinsic characteristics of sweet peppers, culinary preparations and sociodemographic traits of consumers may influence perceived digestibility. In conclusion, the study finds that Italian consumers pay significant attention to the digestibility of sweet peppers, and these insights can serve as a valuable tool for the gastronomy sector. This paper introduces novel aspects to the literature, as–to the best of the authors' knowledge–no previous study has explored consumers' perceptions of food digestibility.

    Citation: Rachele De Cianni, Raffaele Zanchini, Angelina De Pascale, Maurizio Lanfranchi, Teresina Mancuso, Mario D'Amico, Giuseppe Di Vita. Determinants influencing the food digestibility perception: A study based on consumer-stated preferences for sweet peppers[J]. AIMS Agriculture and Food, 2024, 9(1): 30-51. doi: 10.3934/agrfood.2024003

    Related Papers:

    [1] Jindan Zhang, Urszula Ogiela, David Taniar, Nadia Nedjah . Improved cloud storage auditing scheme with deduplication. Mathematical Biosciences and Engineering, 2023, 20(5): 7905-7921. doi: 10.3934/mbe.2023342
    [2] Mikail Mohammed Salim, Jungho Kang, Yi Pan, Jong Hyuk Park . A Lightweight authentication scheme for IoT against Rogue Base Station Attacks. Mathematical Biosciences and Engineering, 2022, 19(11): 11735-11755. doi: 10.3934/mbe.2022546
    [3] Kittur Philemon Kibiwott , Yanan Zhao , Julius Kogo, Fengli Zhang . Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing. Mathematical Biosciences and Engineering, 2019, 16(5): 3561-3594. doi: 10.3934/mbe.2019178
    [4] Ridha Ouni, Kashif Saleem . Secure smart home architecture for ambient-assisted living using a multimedia Internet of Things based system in smart cities. Mathematical Biosciences and Engineering, 2024, 21(3): 3473-3497. doi: 10.3934/mbe.2024153
    [5] Han-Yu Lin, Tung-Tso Tsai, Hong-Ru Wu, Miao-Si Ku . Secure access control using updateable attribute keys. Mathematical Biosciences and Engineering, 2022, 19(11): 11367-11379. doi: 10.3934/mbe.2022529
    [6] Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang . Secure data storage based on blockchain and coding in edge computing. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091
    [7] Lihong Guo, Jian Wang, Haitao Wu, Najla Al-Nabhan . XML security protection scheme based on Kerberos authentication and polynomials authorization. Mathematical Biosciences and Engineering, 2020, 17(5): 4609-4630. doi: 10.3934/mbe.2020254
    [8] Yifeng Yin, Zhaobo Wang, Wanyi Zhou, Yong Gan, Yanhua Zhang . Group key agreement protocol for edge computing in industrial internet. Mathematical Biosciences and Engineering, 2022, 19(12): 12730-12743. doi: 10.3934/mbe.2022594
    [9] Te-Wei Chiang, Dai-Lun Chiang, Tzer-Shyong Chen, Frank Yeong-Sung Lin, Victor R. L. Shen, Min-Chien Wang . Novel Lagrange interpolation polynomials for dynamic access control in a healthcare cloud system. Mathematical Biosciences and Engineering, 2022, 19(9): 9200-9219. doi: 10.3934/mbe.2022427
    [10] Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, Taher Al-Shehari, Muna Al-Razgan, Taha Alfakih . SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures. Mathematical Biosciences and Engineering, 2023, 20(12): 20828-20851. doi: 10.3934/mbe.2023922
  • In recent years, there has been a growing focus on healthy eating. Concerns about general healthiness, food safety, evolving culinary preferences and the shift towards healthier lifestyles are shaping consumers' intentions when it comes to food purchases, impacting the demand for food items that are perceived as healthier than other options. This study aims to enhance our understanding of the significance that consumers place on perceptions of food digestibility, with a specific focus on sweet peppers as a case study. To explore signals linked to consumers' perceptions of digestibility, a questionnaire was administered to 582 Italian consumers. Employing an econometric estimation as the methodological approach, we aim to elucidate the relationship between various factors and the perception of digestibility. The results suggest that intrinsic and extrinsic characteristics of sweet peppers, culinary preparations and sociodemographic traits of consumers may influence perceived digestibility. In conclusion, the study finds that Italian consumers pay significant attention to the digestibility of sweet peppers, and these insights can serve as a valuable tool for the gastronomy sector. This paper introduces novel aspects to the literature, as–to the best of the authors' knowledge–no previous study has explored consumers' perceptions of food digestibility.



    Internet of Things is a promising technology that may promote human society towards intelligence. However, the constrained local storage space of the devices will be an obstacle for the further development of IoT. Cloud computing is a new emerging technology in recent years. By accessing the wired or wireless network, clients can enjoy the high-quality cloud services. At present, the resources of storage and computing are the main services that cloud computing can provide for consumers [1,2,3]. The resource of clients is constrained due to the IoT devices in the system are lightweight. Therefore, the resource-constrained clients of IoT can outsource their local data to cloud servers for long-term data storage. Moreover, clients can enjoy the unlimited storage resource and computing capability anytime and anywhere via the Internet [4,5]. As the cloud server can provide virtual resources for clients, they no longer need to worry about the local hardware investments [6]. Clients only need to pay the fees of cloud usage as a manner of pay-as-you-use. Hence, with the assist of cloud computing, the technology of IoT may have the further development space.

    In the practical cloud usage, the adversaries may impersonate legitimate clients to cheat cloud server, which brings a great security threats to the data stored in cloud servers [7,8]. On the other hand, cloud servers can be accessed by any users through the Internet, which is easy to cause malicious users to attack the server [9,10]. To ensure the storage security and avoid server attack, the authentication protocol should be provided to ensure the security of the system [11,12,13,14,15]. In 2009, Li et al. proposed an identity-based authentication protocol based on identity-based encryption and signature schemes [16]. Due to the superior feature of identity-based cryptography, The scheme of Li et al. is more efficient and very suitable for lightweight clients. To realize more strong security, Choudhury et al. proposed a strong user authentication framework for cloud computing that can strongly verify the legitimacy of users before the participation in the system [17]. Moreover, The scheme of Choudhury et al. can provide the properties of identity management, mutual authentication, session key establishment between cloud users and servers. In 2015, Liu et al. proposed a privacy-preserving authentication protocol based on shared authority [18]. The scheme of Liu et al. can also provide data sharing based on proxy re-encryption. In addition, various security features can realize except authentication in the scheme of Liu et al., such as data anonymity, user privacy, and forward security.

    However, the previous schemes only focused on the research of authentication security in cloud computing but ignored the storage security. Moreover, there is no in-depth study on the issue of mutual authentication. Despite some researches have devoted themselves to the research of mutual authentication in this respect, the traditional interactive authentication protocol will bring much communication cost to clients and servers. Hence, a secure mutual authentication with less interacting should be designed. In addition, the storage checking should also be considered in the design of the authentication scheme in cloud-assisted IoT.

    In this paper, a secure mutual authentication and storage checking scheme is proposed for cloud-assisted IoT. The main contributions of the proposed scheme are shown as follows.

    (1) Chameleon hash signature is used to design the authentication mechanism, which improves the security of authentication. Moreover, the proposed scheme is extended to support mutual authentication between cloud servers and clients that ensures the storage security for clients, and avoid the participation of malicious entities in the system.

    (2) By using the encryption of certificate in the authentication of server, the proposed scheme effectively prevents the leakage of sensitive information. Moreover, the proposed scheme can resist the tamper attack and the replay attack.

    (3) The proposed scheme also supports storage checking for the stored data in cloud servers. Moreover, the storage checking tasks are delegated to the entity of Authority, which improves the fairness of the storage checking and highly reduces the computational overhead at the client side.

    The authentication protocol can ensure the security of communication and storage security in cloud computing [19,20,21,22]. To enhance the security of mobile users in cloud computing, Tsai et al. proposed an efficient authentication for distributed mobile cloud computing [23]. By using the bilinear pairing and dynamic nonce generation, the proposed scheme in [23] can provide mutual authentication, key exchange, user anonymity and so on. In the scheme of Tsai et al., only the target server needs to interact with the request client, which highly reduces the communication cost between the client and the server. To protect the access policies in cloud computing, Liu et al. proposed a hierarchical attribute based access control scheme that can achieve scalability and authentication in realizing write privilege on the stored data [24]. Note that the scheme of Liu et al. can well enhance the security of access control on stored data. To solve the authentication of IoT devices in cloud computing, Amin et al. proposed an architecture that can implement authentication protocol using smartcard [25]. In addition, AVISPA tool and BAN logic model are used in the design of the proposed scheme in the scheme of Amin et al., which ensures the legitimate users can access the sensitive information from the private cloud with various security threats resistance.

    The rest of this paper is organized as follows. Section 2 presents the preliminaries. Section 3 provides the system model and the design goals. Section 4 introduces the proposed scheme in detail. Section 5 describes the analysis of the security and the performance of the proposed scheme. The conclusion of this paper is given in Section 6.

    In this section, the preliminaries of this paper are provided, including bilinear pairing and chameleon hash signature. The detailed introduction of them is shown as follows.

    Bilinear pairing is proposed by Boneh et al. in 2001 and it is widely used to construct all kinds of cryptographic security protocols [26]. In general, bilinear pairing are constructed on elliptic curve or hyperelliptic curve in finite field. In the construction of bilinear pairing, two multiplicative cyclic groups G0 and G1 with large prime order q are defined. The bilinear pairing can be denoted as ˆe:G0×G0G1. Then, two points P,QG0 and two integers a,bZq are randomly selected. Here, Zq is a set that consists integers 1 to q-1 with modulo q. The generator of group G0 is G. The properties of the bilinear pairing are shown as follows.

    (1) Bilinear: ˆe(Pa,Qb)=ˆe(P,Q)ab;

    (2) Non-degenerate: ˆe(G,G)1;

    (3) Computable: ˆe(P,Q) can be computed by an existing algorithm.

    Chameleon hash signature evolved from the technique of chameleon hashing that is a non-interactive signature algorithm [27]. That is to say, the prover generates the signature without interacting with the verifier in chameleon hash signature. The main process of chameleon hash signature is shown as follows.

    First, the prover selects sRZq as its secret key. Then, the prover computes the chameleon as C=Gs. To realize the authentication, the prover selects private key aRZq and computes the corresponding public key as P=Ga. After that, the prover generates an auxiliary parameter mau=CFind(a,nonce,s)=saλ, where CFind is a collision finding algorithm, nonce is authentication challenge and λ=H(Pnonce). The information of {C,mau,P,nonce} will be sent to the prover for the further authentication. Upon receiving the authentication information from the prover, the verifier will compute a chameleon hash parameter as CH(mau,P,nonce)=GmauPλ. According to checking whether the chameleon hash parameter is equal to C, the verifier can successfully authenticate the prover.

    This section provides the system model of the proposed scheme. Moreover, the design goals of the proposed scheme are given, including mutual authentication, tamper-resistance and storage checking.

    The system model of the proposed scheme consists of three different kinds of entities, which are Clients, Authority and Cloud Servers. The system model of the proposed scheme is shown as Figure 1. The detailed introduction and security features of each entity are shown as follows.

    Figure 1.  The system model.

    (1) Clients. In the system, clients are the IoT devices who enjoy the cloud services as a manner of pay-per-use through the Internet [28]. The IoT clients are not fully-trusted in the system. Note that the storage resource of clients is limited. To realize the unconstrained data file storage, clients can outsource the data files to cloud servers for long-term storage [29]. However, clients cannot determine whether the servers are legal. Hence, clients should authenticate the validity of a specific server before the data outsourcing. Moreover, clients can check the data file storage in the cloud servers with the help of Authority. Here, clients are honest, but it is also easy for attackers to impersonate legitimate users to participate in the system.

    (2) Authority. Compared to clients and cloud servers, the entity of Authority is a fully-trusted entity. Authority is responsible for generating the required security parameters and certificates for clients and cloud servers in the system. Moreover, Authority can check the data file storage on behalf of clients.

    (3) Cloud Servers. The cloud servers are distributed and can be connected each other by the Internet. However, cloud servers are honest-but-curious to the stored data. Moreover, cloud servers are vulnerable to be attacked by adversaries. In addition, cloud servers may destroy or delete the infrequently used data file for financial reasons. Hence, cloud servers need to authenticate the validity of the accessed clients and cooperate with the user's data storage checking at any time during the service providing period.

    (1) Mutual Authentication. To ensure the storage security and avoid the participation of illegal entities in the system, the proposed scheme should provide a mechanism of mutual authentication. That is to say, every client can authenticate the validity of any one of the cloud servers in the system and each cloud server can implement the authentication of any one of the clients.

    (2) Tamper-Resistance. In order to avoid the influence of external factors on the authentication, the proposed scheme should provide the property of tamper-resistance for the authentication. In other words, any attacker cannot modify the authentication information of the entity that needs to be authenticated in the system.

    (3) Storage Checking. The proposed scheme should support the storage checking. To improve the fairness and alleviate the computational overhead of the storage checking, the clients in the system can delegate the storage checking tasks to the entity of Authority.

    The proposed scheme consists of two parts, including authentication and storage checking. The authentication can realize mutual authentication, namely, the mutual authentication between clients and cloud servers. With the assist of mutual authentication, the proposed scheme can avoid illegal and attacked entities from participating in the system. The mutual authentication is designed based on the idea of chameleon hashing in [30]. Moreover, the proposed scheme supports storage checking, which highly improves the security of the data file storage. The detailed description of the proposed scheme is shown as follows.

    In the system, the total number of the clients and cloud servers is m and n, respectively. Assume that client x is a data owner who wants to enjoy the cloud services provided by server r via the Internet, where 1xm and 1rn. However, client x cannot determine whether server r is an authorized server by the Authority. To avoid the harm of malicious servers to users' rights and interests, in the proposed scheme, the clients in the system can authenticate the server before data outsourcing. At the same time, the cloud servers can also authenticate the validity of the accessed clients. The detailed construction of the proposed scheme is shown as follows.

    First, client x selects kxRZp as its secret key. Then, client x computes a chameleon parameter as CHAx=Gkx by using for the secret key for the certificate computation, where G is a randomly selected point from group G0. After that, client x sends CHAx to Authority in a secure channel. Upon receiving the chameleon parameter of client x, Authority will compute the certificate for client x as Cx=SKA(CHAx), where Ka is the secret key of Authority that is randomly selected from Zp. Note that S is an encryption algorithm and the corresponding public decryption key is pkA. Similar to the certificate computation of client x, Authority can compute a certificate for server r according to the received chameleon parameter of server r. The certificate of server r is denoted as Cr=SKA(CHAr), where CHAr=Gk and kr is the secret key of server r.

    In the authentication phase, client x randomly selects a private secret key skx from Zp. The corresponding public key can be computed as pkx=Gskx. Then, client x computes a security parameter as SPx=CFind(skx,nonce,kx) for the further authentication. Finally, client x sends SPx and its own certificate Cx to server r for verification. According to the received parameters from client x, server r can authenticate client x by checking whether Verify=(Cx,pkA)=CH(SPx,pkx,nonce) can hold using the public keys of Authority and client x. If the authentication of client x can pass, server r will compute encryption key Kxr=skxpkr by using its secret key and the public key of client x. Finally, server r encrypts its certificate Cr using Krx as ECr=EncKrx(Cr). Here, the encryption of Enc is a symmetric encryption. The encrypted certificate of server r will be sent to client x for the validity checking. When receiving the encrypted certificate of server r, client x can compute the decryption key as Krx=skrpkx. Note that Krx=Kxr. Hence, server r's encrypted certificate ECr can be decrypted by client x as Cr=DecKxr(ECr) by using Kxr, where Dec is the decryption algorithm. According to checking whether Cr is equal to Cr, client x can determine whether server r is a honest server. Here, Cr is the certificate of server r stored in the certificate list at Authority side. If CrCr, client x can check the correctness of equation Verify(Cr,pkA)=CH(SPr,pkr,nonce).

    When the mutual authentication between the client and the server is finished, the corresponding client can outsource its own data files to the valid cloud server. The main philosophy of storage checking in this paper is constructed based on the key techniques in studies [31,32]. Suppose that the data file of client x is F=[f1,f2,,fz] and the data file identifier is IdF. The tag of the data file can be computed as tF=IdF||SSigsks(IdF), where SSig is a signature algorithm for tag generation and sks is the secret key of signature generation. The corresponding public key for signature verification is pks. After that, client x computes authenticator δi=(H1(IdF)ηfi)kx for every data file block, where η is security parameter that is chosen from group G0 and 1iz. Moreover, client x computes ω=ˆe(η,CHAx). Finally, client x uploads the local data file blocks with the authenticators and data file tag to cloud server r.

    When client x wants to check the data file storage in server r, a specific data file storage checking request with security parameter ω needs to be generated and sent to Authority. Then, Authority retrieves the corresponding data file tag to local side and checks the correctness of it using pks. If the tag can pass the checking, the entity of Authority recovers the data file identifier from tF. To realize secure storage checking, Authority selects ρ parameters vi(1iρ) and randomly selects a security parameter ci from Zp for every vi. Finally, Authority sends {i,ci} to server r as storage checking challenge.

    Upon receiving the challenge from Authority, the cloud server r computes fprx=i[1,ρ](cifi) and tprx=i[1,ρ]δcii according to the stored data file and the corresponding tag. Then, server r sends fprx and tprx to Authority for the storage checking. The entity of Authority computes μf=i[1,ρ]ˆe((H(IdF))ci,CHAx) and checking whether μfωfprx=ˆe(tprx,G) can hold.

    In this section, the security and the performance of the proposed scheme are evaluated. The detailed evaluation is shown as follows.

    Theorem 1. The proposed authentication can be proved to be correct if all required parameters are generated successfully.

    Proof of Theorem 1. In the authentication of client x, we can get the chameleon hash result of SPx and pkx is CH(SPx,pkx)=GSPxpkλx. From the description of the authentication, the security parameter of SPx can be computed as SPx=CFind(skx,kx)=kxskxλ. We have CH(SPx,pkx)=Gkxskxλ(Gskx)λ=Gkx. According to the computation of the certificate of client x, the certificate can be recovered by pkA as CHAx=Gkx. In addition, similar to the proof of client x authentication, the correctness of server r authentication can also be proved. Here, the detailed description of the server r authentication is omitted. Hence, the mutual authentication presented in the proposed scheme is correct.

    Theorem 2. The encrypted certificates of servers can be successfully decrypted by using the generated keys of clients.

    Proof of Theorem 2. If Kxr=Krx is correct, the encrypted certificate of server r can be decrypted by client x. According to the above description, we can get that Kxr=skxpkr=skx(skrG)=(skxG)(skr)=pkxskr. The decryption of Krx=skrpkx. Therefore, the certificate decryption in the proposed scheme is correct.

    Theorem 3. The correctness of the proposed storage checking mechanism can be proved.

    Proof of Theorem 3. If the storage checking equation can be proved to be correct, the proposed storage checking in this paper is correct. The storage checking equation is solved as follows.

    μfωfprx=i[1,ρ]ˆe((H(IdF))ci,CHAx)ˆe(η,CHAx)i[1,ρ](cifi)=i[1,ρ]ˆe((H(IdF))ci,Gkx)i[1,ρ]ˆe(η,Gkx)cifi=i[1,ρ]ˆe(((H(IdF)ηfi)kx)ci,G)=ˆe(i[1,ρ]δcii,G)=ˆe(tprx,G)

    That is to say, the proposed storage checking in this paper is correct.

    In order to present the efficiency of the proposed scheme, the computational cost at the different entity side in the system is analyzed. The symbols of TE.,TH.,TMul.,TAdd. and TP. are used to denote the time required to execute the operations of exponentiation, hash function, multiplication, addition and pairing, respectively. The computational at each entity side is shown in Table 1. Note that the symbols of ρ and z is the number of the challenged data blocks and the total number of data blocks in the system, respectively. From Table 1, we can find that the computational cost of the client side is determined by the number of the total data blocks. The computational cost of the server side and the Authority side will be increased with the growth of the challenged data blocks. Table 2 shows the computational cost of authentication and storage checking in the proposed scheme. From Table 2, we can see that the computational cost of the phase of Authentication is almost a constant, but the computational cost of the server side will be larger with the increase of the total data blocks and the challenged data blocks.

    Table 1.  Computational cost at the different entity side.
    Entity Side Computational Cost
    Client (2z+4)TE+(3+z)TMul.+zTH.+1TAdd.+TP.
    Authority ρ(2TMul.+TE.+TAdd.)
    Server (4+ρ)TE.+(2ρ+3)TMul.+ρTH.+TP.
    *TE.,TH.,TMul.,TAdd.,TP.: Time required to perform the corresponding operations.
    *ρ: The number of the challenged data blocks.
    *z: The total number of data blocks.

     | Show Table
    DownLoad: CSV
    Table 2.  Computational cost of authentication and storage checking.
    Phase Computational Cost
    Authentication 7TE+5TMul.+1TAdd.
    Storage Checking (2z+2ρ+1)TE.+(z+3ρ+1)TMul.+(z+ρ)TH.+ρTAdd.+2TP.
    *TE.,TH.,TMul.,TAdd.,TP.: Time required to perform the corresponding operations.
    *ρ: The number of the challenged data blocks.
    *z: The total number of data blocks.

     | Show Table
    DownLoad: CSV

    In Table 3, the communication cost in the phase of authentication and storage checking is given. Here, we use the symbol of lG and lZ denotes the bit-length of parameters in group and integer field, respectively. From the comparison result in Table 3, we can find that the communication cost of Authentication and Storage Checking is 3lG+1lZ and (4ρ+z+2)lZ, respectively. That is to say, as the number of data blocks increases, the communication cost of Authentication remains unchanged but the communication cost of Storage Checking will be higher.

    Table 3.  Communication cost of authentication and storage checking.
    Phase Computational Cost
    Authentication 3lG+1lZ
    Storage Checking (4ρ+z+2)lZ
    *lG,lZ: Time required to perform the corresponding operations.
    *ρ: The number of the challenged data blocks.
    *z: The total number of data blocks.

     | Show Table
    DownLoad: CSV

    The proposed scheme is simulated on the PBC [26] and GMP [27] constructed experimental platform. The experimental platform is configured on a computer with 8GB RAM and Intel 2.60 GHZ CPU. In the simulation, the basis of total number of data blocks and the challenged data blocks is 100 and 50, respectively. From Figure 2, we can see that the computational time at the side of client, Authority and Server increases linearly with the number of data blocks. Moreover, the computational time at Authority side is the least and the computational time at Client side is the most under the condition of the same number of data blocks. Figure 3 is the simulation of computational time at the different entity side. From Figure 3, we can find that the computational time of Storage Checking phase growth linearly with the number of data blocks. The computational time of Authentication is a constant under the different number of data blocks. Hence, it can be determined that the simulation result is consistent with the result of the above theoretical analysis.

    Figure 2.  The simulation of computational time at the different entity side.
    Figure 3.  The simulation of computational time of authentication and storage checking.

    To enhance the security of server access and data storage, in this paper, we propose a secure mutual authentication scheme for cloud computing to implement the authentication between clients and cloud servers. The technique of chameleon hash signature is used to design the authentication mechanism, which makes the designed authentication have a variety of security performance such as tamper attack and replay attack resistance. Moreover, the proposed scheme supports data storage checking for clients. To reduce the local computational overhead, the storage checking tasks are delegated to the fully-trusted entity. Security analysis shows that the proposed mechanisms of authentication and storage checking can be proved to be correct. Performance analysis presents that the proposed scheme has a low computational overhead. Hence, the proposed scheme can be well used in practical cloud-assisted IoT environment for data storage.

    This work is supported by the National Science Foundation of China under Grant No. 62102169, No. 62072249, the Natural Science Foundation of the Jiangsu Higher Education Institutions of China under Grant 21KJB520033, the Key Research and Development Program (Social Development) of Lianyungang under Grant SF2102, the Research Start-up Fund of JOU under Grant KQ20039.

    The authors declare no conflict of interest.



    [1] Azeredo HMC, Tonon RV, McClements DJ (2021) Designing healthier foods: Reducing the content or digestibility of key nutrients. Trends Food Sci Technol 118: 459–470. https://doi.org/10.1016/j.tifs.2021.10.023 doi: 10.1016/j.tifs.2021.10.023
    [2] Hamam M, Di Vita G, Zanchini R, et al. (2022) Consumers' attitudes and purchase intention for a vitamin-enriched extra virgin olive oil. Nutrients 14: 1658. https://doi.org/10.3390/nu14081658 doi: 10.3390/nu14081658
    [3] Munialo CD, Andrei M (2023) Chapter 2—General health benefits and sensory perception of plant-based foods. In: Prakash S, Bhandari BR, Gaiani C (Eds.), Engineering Plant-Based Food Systems, Academic Press, 13–26. https://doi.org/10.1016/B978-0-323-89842-3.00017-8
    [4] Yang Z, Zhang Y, Wu Y, et al. (2022) Factors influencing the starch digestibility of starchy foods: A review. Food Chem 406: 135009. https://doi.org/10.1016/j.foodchem.2022.135009 doi: 10.1016/j.foodchem.2022.135009
    [5] Drolet-Labelle V, Laurin D, Bédard A, et al. (2023) Beliefs underlying older adults' intention to consume plant-based protein foods: A qualitative study. Appetite 180: 106346. https://doi.org/10.1016/j.appet.2022.106346 doi: 10.1016/j.appet.2022.106346
    [6] Shiferaw Terefe N, Augustin MA (2020) Fermentation for tailoring the technological and health related functionality of food products. Crit Rev Food Sci Nutr 60: 2887–2913. https://doi.org/10.1080/10408398.2019.1666250 doi: 10.1080/10408398.2019.1666250
    [7] Cais-Sokolińska D, Walkowiak-Tomczak D (2021) Consumer-perception, nutritional, and functional studies of a yogurt with restructured elderberry juice. J Dairy Sci 104: 1318–1335. https://doi.org/10.3168/jds.2020-18770 doi: 10.3168/jds.2020-18770
    [8] Xiang H, Sun-Waterhouse D, Waterhouse GIN, et al. (2019) Fermentation-enabled wellness foods: A fresh perspective. Food Sci Hum Wellness 8: 203–243. https://doi.org/10.1016/j.fshw.2019.08.003 doi: 10.1016/j.fshw.2019.08.003
    [9] Hou JK, Lee D, Lewis J (2014) Diet and inflammatory bowel disease: Review of patient-targeted recommendations. Clin Gastroenterol Hepatol 12: 1592–1600. https://doi.org/10.1016/j.cgh.2013.09.063 doi: 10.1016/j.cgh.2013.09.063
    [10] Chowdhury AMM, Helman C, Greenhalgh T (2023) Food beliefs and practices among British Bangladeshis with diabetes: implications for health education. Anthropology & Medicine 7: 209–226. https://doi.org/10.1080/713650589 doi: 10.1080/713650589
    [11] Chikkamath M, Atter BR, Srivastava SK, et al. (2012) Factors influencing consumers behaviour for vegetable purchase. Veg Sci 39: 35–39.
    [12] Owusu V, Owusu-Sekyere E, Donkor E, et al. (2019) Smallholder farmer perceptions of risk and benefits across three cocoa chains in Ghana. J Agribus Dev Emerg Econ 8: 1–40.
    [13] Bearth A, Cousin ME, Siegrist M (2014) Poultry consumers' behaviour, risk perception and knowledge related to campylobacteriosis and domestic food safety. Food Control 44: 166–176. https://doi.org/10.1016/j.foodcont.2014.03.055 doi: 10.1016/j.foodcont.2014.03.055
    [14] Amoah P, Drechsel P, Abaidoo RC, et al. (2006) Pesticide and pathogen contamination of vegetables in Ghana's urban markets. Arch Environ Contam Toxicol 50: 1–6. https://doi.org/10.1007/s00244-004-0054-8 doi: 10.1007/s00244-004-0054-8
    [15] Labrie CW, Sijtsema SJ, Snoek HM, et al. (2019) Flavour and nutrition of fruits and vegetables create added value to consumers. In: Proceedings of the Ⅻ International Rubus and Ribes Symposium: Innovative Rubus and Ribes Production for High Quality Berries in Changing, 1277: 425–432. https://doi.org/10.17660/ActaHortic.2020.1277.61
    [16] Mueller S, Szolnoki G (2010) The relative influence of packaging, labelling, branding and sensory attributes on liking and purchase intent: Consumers differ in their responsiveness. Food Qual Prefer 21: 774–783. https://doi.org/10.1016/j.foodqual.2010.07.011 doi: 10.1016/j.foodqual.2010.07.011
    [17] Byrne DV (2020) Current trends in multidisciplinary approaches to understanding consumer preference and acceptance of food products. Foods 9: 1380. https://doi.org/10.3390/foods9101380 doi: 10.3390/foods9101380
    [18] Frank CA, Nelson RG, Simonne EH, et al. (2001) Consumer preferences for color, price, and vitamin C content of bell peppers. HortScience 36: 795–800. https://doi.org/10.21273/HORTSCI.36.4.795 doi: 10.21273/HORTSCI.36.4.795
    [19] Hussein M, Silva A, Fraser I (2015) Linking intrinsic quality attributes of agricultural produce to revealed consumer preferences. Food Qual Prefer 41: 180–188. https://doi.org/10.1016/j.foodqual.2014.11.018 doi: 10.1016/j.foodqual.2014.11.018
    [20] Massaglia S, Borra D, Peano C, et al. (2019) Consumer preference heterogeneity evaluation in fruit and vegetable purchasing decisions using the best-worst approach. Foods 8: 266. https://doi.org/10.3390/foods8070266 doi: 10.3390/foods8070266
    [21] Wongprawmas R, Mora C, Pellegrini N, et al. (2021). Food choice determinants and perceptions of a healthy diet among Italian consumers. Foods 10: 318. https://doi.org/10.3390/foods10020318 doi: 10.3390/foods10020318
    [22] Sridhar K, Bouhallab S, Croguennec T, et al. (2022) Recent trends in design of healthier plant-based alternatives: Nutritional profile, gastrointestinal digestion, and consumer perception. Crit Rev Food Sci Nutr 63: 10483–10498. https://doi.org/10.1080/10408398.2022.2081666 doi: 10.1080/10408398.2022.2081666
    [23] Jang SS, Ha A, Silkes CA (2009) Perceived attributes of Asian foods: From the perspective of the American customers. Int J Hosp Manag 28: 63–70. https://doi.org/10.1016/j.ijhm.2008.03.007 doi: 10.1016/j.ijhm.2008.03.007
    [24] Figueira N, Curtain F, Beck E, et al. (2019) Consumer understanding and culinary use of legumes in Australia. Nutrients 11: 1575. https://doi.org/10.3390/nu11071575 doi: 10.3390/nu11071575
    [25] Tripodi P, D'Alessandro R, Festa G, et al. (2022). Profiling the diversity of sweet pepper 'Peperone Cornetto di Pontecorvo' PDO (Capsicum annuum) through multi-phenomic approaches and sequencing-based genotyping. Agronomy 12: 1433. https://doi.org/10.3390/agronomy12061433 doi: 10.3390/agronomy12061433
    [26] Sobolev AP, Mannina L, Capitani D, et al. (2018) A multi-methodological approach in the study of Italian PDO "Cornetto di Pontecorvo" red sweet pepper. Food Chem 255: 120–131. https://doi.org/10.1016/j.foodchem.2018.02.050 doi: 10.1016/j.foodchem.2018.02.050
    [27] Rana N, Ghabru A, Vaidya D (2019) Defensive function of fruits and vegetables. J Pharmacogn Phytochem 8: 1872–1877.
    [28] Nadeem M, Anjum FM, Khan MR, et al. (2011) Antioxidant potential of bell pepper (Capsicum annum L.)—A review. Pak J Food Sci 21: 45–51.
    [29] Yao H, Flanagan BM, Williams BA, et al. (2023) Particle size of dietary fiber has diverse effects on in vitro gut fermentation rate and end-products depending on food source. Food Hydrocoll 134: 108096. https://doi.org/10.1016/j.foodhyd.2022.108096 doi: 10.1016/j.foodhyd.2022.108096
    [30] Wong JMW, Jenkins DJA (2007) Carbohydrate digestibility and metabolic effects. J Nutr 137: 2539–2546. https://doi.org/10.1093/jn/137.11.2539S doi: 10.1093/jn/137.11.2539S
    [31] Manichanh C, Eck A, Varela E, et al. (2014) Anal gas evacuation and colonic microbiota in patients with flatulence: Effect of diet. Gut 63: 401408. https://doi.org/10.1136/gutjnl-2012-303013 doi: 10.1136/gutjnl-2012-303013
    [32] Urminská D, Haring N, Fábry V, et al. (2022). Fermentable oligosaccharides, disaccharides, monosaccharides and polyols and their role in food digestion. J Microbiol Biotechnol Food Sci 11: 1–11. https://doi.org/10.55251/jmbfs.5521 doi: 10.55251/jmbfs.5521
    [33] Koleva II, van Beek TA, Soffers AEMF, et al. (2012) Alkaloids in the human food chain—Natural occurrence and possible adverse effects. Mol Nutr Food Res 56: 30–52. https://doi.org/10.1002/mnfr.201100165 doi: 10.1002/mnfr.201100165
    [34] Loizzo M, Pugliese A, Bonesi M, et al. (2015) Evaluation of chemical profile and antioxidant activity of twenty cultivars from Capsicum annuum, Capsicum baccatum, Capsicum chacoense and Capsicum chinense: A comparison between fresh and processed peppers. LWT-Food Sci Technol 64: 623–631. https://doi.org/10.1016/j.lwt.2015.06.042 doi: 10.1016/j.lwt.2015.06.042
    [35] Guilherme R, Reboredo F, Guerra M, et al. (2020) Elemental composition and some nutritional parameters of sweet pepper from organic and conventional agriculture. Plants 9: 863. https://doi.org/10.3390/plants9070863 doi: 10.3390/plants9070863
    [36] Popov SV, Ovodova RG, Golovchenko VV, et al. (2011) Chemical composition and anti-inflammatory activity of a pectic polysaccharide isolated from sweet pepper using a simulated gastric medium. Food Chem 124: 309–315. https://doi.org/10.1016/j.foodchem.2010.06.038 doi: 10.1016/j.foodchem.2010.06.038
    [37] Tydeman EA, Parker ML, Faulks RM, et al. (2010) Effect of carrot (Daucus carota) microstructure on carotene bioaccessibility in the upper gastrointestinal tract. 2. in vivo digestions. J Agric Food Chem 58: 9855–9860. https://doi.org/10.1021/jf1010353 doi: 10.1021/jf1010353
    [38] Juániz I, Ludwig IA, Bresciani L, et al. (2016). Catabolism of raw and cooked green pepper (Capsicum annuum) (poly) phenolic compounds after simulated gastrointestinal digestion and faecal fermentation. J Funct Foods 27: 201–213. https://doi.org/https://doi.org/10.1016/j.jff.2016.09.006 doi: 10.1016/j.jff.2016.09.006
    [39] Moser R, Raffaelli R, Thilmany DD (2011) Consumer preferences for fruit and vegetables with credence-based attributes: A review. Food Agribusiness Manag Rev 14: 121–142. https://doi.org/10.22004/ag.econ.103990 doi: 10.22004/ag.econ.103990
    [40] Bowen A, Grygorczyk A (2022) Chapter 17—Consumer eating habits and perceptions of fresh produce quality. In: Florkowski WJ, Banks NH, Shewfelt RL, et al. (Eds.), Postharvest Handling, 4th Edition, Academic Press, 487–515. https://doi.org/10.1016/B978-0-12-822845-6.00017-8
    [41] Luning PA, De Rijk T, Wichers HJ, et al. (1994) Gas chromatography, mass spectrometry, and sniffing port analyses of volatile compounds of fresh bell peppers (Capsicum annuum) at different ripening stages. J Agric Food Chem 42: 977–983.
    [42] Sun T, Xu Z, Wu CT, et al. (2007) Antioxidant activities of different colored sweet bell peppers (Capsicum annuum L.). J Food Sci 72: S98–102. https://doi.org/10.1111/j.1750-3841.2006.00245.x doi: 10.1111/j.1750-3841.2006.00245.x
    [43] Hasenbeck A, Cho S, Meullenet JF, et al. (2014) Color and illuminance level of lighting can modulate willingness to eat bell peppers. J Sci Food Agric 94: 2049–2056. https://doi.org/10.1002/jsfa.6523 doi: 10.1002/jsfa.6523
    [44] Kyriacou MC, Rouphael Y (2018) Towards a new definition of quality for fresh fruits and vegetables. Sci Hortic 234: 463–469. https://doi.org/10.1016/j.scienta.2017.09.046 doi: 10.1016/j.scienta.2017.09.046
    [45] Barrett DM, Beaulieu JC, Shewfelt R (2010) Color, flavor, texture, and nutritional quality of fresh-cut fruits and vegetables: Desirable levels, instrumental and sensory measurement, and the effects of processing. Crit Rev Food Sci Nutr 50: 369–389. https://doi.org/10.1080/10408391003626322 doi: 10.1080/10408391003626322
    [46] O'Sullivan L, Jiwan MA, Daly T, et al. (2010) Bioaccessibility, uptake, and transport of carotenoids from peppers (Capsicum Spp.) using the coupled in vitro digestion and human intestinal Caco-2 cell model. J Agric Food Chem 58: 5374–5379. https://doi.org/10.1021/jf100413m doi: 10.1021/jf100413m
    [47] Castro SM, Saraiva JA, Lopes-da-Silva JA, et al. (2008) Effect of thermal blanching and of high-pressure treatments on sweet green and red bell pepper fruits (Capsicum annuum L.). Food Chem 107: 1436–1449. https://doi.org/10.1016/j.foodchem.2007.09.074 doi: 10.1016/j.foodchem.2007.09.074
    [48] Hwang IG, Shin YJ, Lee S, et al. (2012) Effects of different cooking methods on the antioxidant properties of red pepper (Capsicum annuum L.). Prev Nutr Food Sci 17: 286–292. https://doi.org/10.3746/pnf.2012.17.4.286 doi: 10.3746/pnf.2012.17.4.286
    [49] Adefegha SA, Oboh G (2011) Cooking enhances the antioxidant properties of some tropical green leafy vegetables. Afr J Biotechnol 10: 632–639.
    [50] Ryan L, O'Connell O, O'Sullivan L, et al. (2008) Micellarisation of carotenoids from raw and cooked vegetables. Plant Foods Hum Nutr 63: 127–133. https://doi.org/10.1007/s11130-008-0081-0 doi: 10.1007/s11130-008-0081-0
    [51] Sanatombi K, Rajkumari S (2020) Effect of processing on quality of pepper: A review. Food Rev Int 36: 626–643. https://doi.org/10.1080/87559129.2019.1669161 doi: 10.1080/87559129.2019.1669161
    [52] De Cianni R, Pippinato L, Mancuso T (2023) A systematic review on drivers influencing consumption of edible mushrooms and innovative mushroom-containing products. Appetite 182: 106454. https://doi.org/https://doi.org/10.1016/j.appet.2023.106454 doi: 10.1016/j.appet.2023.106454
    [53] Singleton CR, Winkler M, Houghtaling B, et al. (2020) Understanding the intersection of race/ethnicity, socioeconomic status, and geographic location: A scoping review of U.S. consumer food purchasing. Int J Environ Res Public Health 17: 7677. https://doi.org/10.3390/ijerph17207677 doi: 10.3390/ijerph17207677
    [54] Fernqvist F, Ekelund L (2014) Credence and the effect on consumer liking of food—A review. Food Qual Prefer 32: 340–353. https://doi.org/10.1016/j.foodqual.2013.10.005 doi: 10.1016/j.foodqual.2013.10.005
    [55] Schreiner M, Korn M, Stenger M, et al. (2013) Current understanding and use of quality characteristics of horticulture products. Sci Hortic 163: 63–69.
    [56] Lanfranchi M, Giannetto C, De Pascale A, et al. (2015) An application of qualitative risk analysis as a tool adopted by public organizations for evaluating "green projects". Amfiteatru Econ 17: 872–890.
    [57] Seyfang G (2006) Ecological citizenship and sustainable consumption: Examining local organic food networks. J Rural Stud 22: 383–395. https://doi.org/https://doi.org/10.1016/j.jrurstud.2006.01.003 doi: 10.1016/j.jrurstud.2006.01.003
    [58] Boca GD (2021) Factors influencing consumer behavior in sustainable fruit and vegetable consumption in maramures county, Romania. Sustainability 13: 1812. https://doi.org/10.3390/su13041812 doi: 10.3390/su13041812
    [59] De Cianni R, Pippinato L, Zanchini R, et al. (2023) Parental behaviour in choosing snacks for children aged six to ten: The role of mothers' nutritional awareness. Br Food J 125: 713–730. https://doi.org/10.1108/BFJ-09-2021-1010 doi: 10.1108/BFJ-09-2021-1010
    [60] Taherdoost H (2019) What is the best response scale for survey and questionnaire design; review of different lengths of rating scale/attitude scale/Likert scale. IJARM 8: 1–10. Available from: https://ssrn.com/abstract = 3588604
    [61] Di Vita G, Zanchini R, Spina D, et al. (2022) Exploring purchasing determinants for a low fat content Salami: Are consumers willing to pay for an additional premium? Front Sustain Food Syst 6: 794533. https://doi.org/10.3389/fsufs.2022.794533 doi: 10.3389/fsufs.2022.794533
    [62] Molinillo S, Vidal-Branco M, Japutra A (2020) Understanding the drivers of organic foods purchasing of millennials: Evidence from Brazil and Spain. J Retail Consum Serv 52: 101926. https://doi.org/10.1016/j.jretconser.2019.101926 doi: 10.1016/j.jretconser.2019.101926
    [63] Iofrida N, De Luca AI, Zanchini R, et al. (2022) Italians' behavior when dining out: Main drivers for restaurant selection and customers segmentation. Int J Gastron Food Sci 28: 100518. https://doi.org/10.1016/j.ijgfs.2022.100518 doi: 10.1016/j.ijgfs.2022.100518
    [64] Heckathorn D, Cameron C (2017) Network sampling: From snowball and multiplicity to respondent-driven sampling. Annu Rev Sociol 43: 101–119. https://doi.org/10.1146/annurev-soc-060116-053556 doi: 10.1146/annurev-soc-060116-053556
    [65] Conjointly (2023) Sample Size Calculator and Guide to Survey Sample Size. Available from: https://conjointly.com/blog/sample-size-calculator/.
    [66] Swedberg R (2020) Exploratory Research. In: Elman C, Gerring J, Mahoney J (Eds.), The Production of Knowledge: Enhancing Progress in Social Science (Strategies for Social Inquiry), Cambridge: Cambridge University Press, 17–41. https://doi.org/10.1017/9781108762519.002
    [67] Gujarati DN, Porter DC (2009) Basic Econometrics. 5th Edition, New York, McGraw Hill Inc.
    [68] Salgado A, Moreira-Leite B, Afonso A, et al. (2023) Chocolates enriched with seaweed: Sensory profiling and consumer segmentation. Int J Gastron Food Sci 33: 100747. https://doi.org/10.1016/j.ijgfs.2023.100747 doi: 10.1016/j.ijgfs.2023.100747
    [69] Ma L, Li Z, Zheng D (2022) Analysis of Chinese consumers' willingness and behavioral change to purchase green agri-food product online. PLoS ONE 17: e0265887. https://doi.org/10.1371/journal.pone.0265887 doi: 10.1371/journal.pone.0265887
    [70] Breen R, Karlson K B, Holm A (2018). Interpreting and understanding logits, probits, and other nonlinear probability models. Annu Rev Sociol 44: 39–54. https://doi.org/10.1146/annurev-soc-073117-041429 doi: 10.1146/annurev-soc-073117-041429
    [71] Agresti A (2002) Categorical Data Analysis. 792. John Wiley & Sons.
    [72] Healy L (2006) Logistic Regression: An Overview. Eastern Michighan College of Technology.
    [73] Di Vita G, Strano A, Maesano G, et al. (2020) The role of individual knowledge in functional olive oil preferences: Does self-coherence lead to different health attributes perception? Foods 9: 1428. https://doi.org/10.3390/foods9101428 doi: 10.3390/foods9101428
    [74] Darby K, Batte MT, Ernst SC, et al. (2006) Willingness to pay for locally produced foods: A customer intercept study of direct market and grocery store shoppers. No. 379-2016-21958.
    [75] Merlino VM, Brun F, Versino A, et al. (2020) Milk packaging innovation: Consumer perception and willingness to pay. AIMS Agric Food 5: 307–326. https://doi.org/10.3934/agrfood.2020.2.307 doi: 10.3934/agrfood.2020.2.307
    [76] Zanchini R, Di Vita G, Brun F (2022) Lifestyle, psychological and socio-demographic drivers in functional food choice: a systematic literature review based on bibliometric and network analysis. Int J Food Sci 73: 709–725. https://doi.org/10.1080/09637486.2022.2048361 doi: 10.1080/09637486.2022.2048361
    [77] Kushwah S, Dhir A, Sagar M, et al. (2019) Determinants of organic food consumption. A systematic literature review on motives and barriers. Appetite 143: 104402. https://doi.org/10.1016/j.appet.2019.104402 doi: 10.1016/j.appet.2019.104402
    [78] Derksen S, Keselman HJ (1992) Backward, forward and stepwise automated subset selection algorithms: Frequency of obtaining authentic and noise variables. Br J Stat Psychol 45: 265–282. https://doi.org/10.1111/j.2044-8317.1992.tb00992.x doi: 10.1111/j.2044-8317.1992.tb00992.x
    [79] Mehmetoglu M, Jakobsen T (2017) Applied Statistics Using Stata: A Guide for the Social Sciences.
    [80] Andaç Öztürk S, Yaman M (2022) Investigation of bioaccessibility of vitamin C in various fruits and vegetables under in vitro gastrointestinal digestion system. J Food Meas Charact 16: 3735–3742. https://doi.org/10.1007/s11694-022-01486-z doi: 10.1007/s11694-022-01486-z
    [81] Traber MG, Buettner GR, Bruno RS (2019) The relationship between vitamin C status, the gut-liver axis, and metabolic syndrome. Redox Biol 21: 101091. https://doi.org/https://doi.org/10.1016/j.redox.2018.101091 doi: 10.1016/j.redox.2018.101091
    [82] Pham VT, Fehlbaum S, Seifert N, et al. (2021). Effects of colon-targeted vitamins on the composition and metabolic activity of the human gut microbiome—A pilot study. Gut Microbes 13: 1875774. https://doi.org/10.1080/19490976.2021.1875774 doi: 10.1080/19490976.2021.1875774
    [83] Fabbri ADT, Crosby GA (2016) A review of the impact of preparation and cooking on the nutritional quality of vegetables and legumes. Int J Gastron Food Sci 3: 2–11. https://doi.org/https://doi.org/10.1016/j.ijgfs.2015.11.001 doi: 10.1016/j.ijgfs.2015.11.001
    [84] Chuah AM, Lee YC, Yamaguchi T, et al. (2008) Effect of cooking on the antioxidant properties of coloured peppers. Food Chem 111: 20–28. https://doi.org/https://doi.org/10.1016/j.foodchem.2008.03.022 doi: 10.1016/j.foodchem.2008.03.022
    [85] Sturmer J, Franken DL, Ternus DL, et al. (2022) Dietary pattern as a predictor of multimorbidity patterns: A population-based cross-sectional study with women. Clin Nutr ESPEN 51: 452–460. https://doi.org/https://doi.org/10.1016/j.clnesp.2022.06.105 doi: 10.1016/j.clnesp.2022.06.105
    [86] Chen JJ, Tsai LY, Tsai JM, et al. (2021) Food away from home and self-perceived gastrointestinal health. Front Nutr 8: 1–7. https://doi.org/10.3389/fnut.2021.741647 doi: 10.3389/fnut.2021.741647
    [87] Al-Windi A (2010) Association between perceived health and sociodemographic characteristics, workplace, and complaint symptoms-epidemiological study among healthy workers in Kurdistan, Iraq (ESHWKI). J Chin Clin Med 5: 520–529.
    [88] Torán-Pereg P, Mora M, Thomsen M, et al. (2023) Understanding food sustainability from a consumer perspective: A cross cultural exploration. Int J Gastron Food Sci 31: 100646. https://doi.org/https://doi.org/10.1016/j.ijgfs.2022.100646 doi: 10.1016/j.ijgfs.2022.100646
    [89] Rizzo G, Borrello M, Guccione D, et al. (2020) Organic food consumption: The relevance of the health attribute. Sustainability 12: 595. https://doi.org/10.3390/su12020595 doi: 10.3390/su12020595
    [90] Dorce LC, da Silva MC, Mauad JRC, et al. (2021) Extending the theory of planned behavior to understand consumer purchase behavior for organic vegetables in Brazil: The role of perceived health benefits, perceived sustainability benefits and perceived price. Food Qual Prefer 91: 104191. https://doi.org/https://doi.org/10.1016/j.foodqual.2021.104191 doi: 10.1016/j.foodqual.2021.104191
  • This article has been cited by:

    1. Chengzhi Yan, Chen Wang, Jian Shen, Kapal Dev, Mohsen Guizani, Weizheng Wang, Edge-Assisted Hierarchical Batch Authentication Scheme for VANETs, 2024, 73, 0018-9545, 1253, 10.1109/TVT.2023.3305556
    2. S. Milton Ganesh, S. Priya, Vinayakumar Ravi, Suliman A. Alsuhibany, A privacy preserving batch audit scheme for IoT based cloud data storage, 2025, 18, 1936-6442, 10.1007/s12083-024-01890-w
    3. Cherif Ghazel, Imen Merdassi, Leila Saidane, An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology, 2025, 0003-4347, 10.1007/s12243-025-01076-2
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1721) PDF downloads(228) Cited by(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog