{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:45:42Z","timestamp":1753602342754,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71502132"],"award-info":[{"award-number":["71502132"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s00521-022-07355-6","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T20:03:12Z","timestamp":1652817792000},"page":"2279-2289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Contracting and timing for outsourcing of information system with uncertain requirements"],"prefix":"10.1007","volume":"35","author":[{"given":"Zongming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Rundong","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1071-9735","authenticated-orcid":false,"given":"Qingyuan","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"issue":"2","key":"7355_CR1","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.jom.2007.02.003","volume":"26","author":"OZ Aksin","year":"2008","unstructured":"Aksin OZ, Masini A (2008) Effective strategies for internal outsourcing and offshoring of business services: an empirical investigation. J Oper Manag 26(2):239\u2013256","journal-title":"J Oper Manag"},{"key":"7355_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2021.102385","volume":"60","author":"CP Deng","year":"2021","unstructured":"Deng CP, Wang T, Teo TSH et al (2021) Organizational agility through outsourcing: roles of it alignment, cloud computing and knowledge transfer. Int J Inf Manage 60:1\u201316. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2021.102385","journal-title":"Int J Inf Manage"},{"issue":"3","key":"7355_CR3","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.jsis.2015.08.001","volume":"24","author":"I Oshri","year":"2015","unstructured":"Oshri I, Kotlarsky J, Gerbasi A (2015) Strategic innovation through outsourcing: the role of relational and contractual governance. J Strateg Inf Syst 24(3):203\u2013216","journal-title":"J Strateg Inf Syst"},{"issue":"4","key":"7355_CR4","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/1035233.1035236","volume":"35","author":"J Dibbern","year":"2004","unstructured":"Dibbern J, Goles T, Hirschheim R, Jayatilaka B (2004) Information systems outsourcing: a survey and analysis of the literature. SIGMIS Database 35(4):6\u2013102","journal-title":"SIGMIS Database"},{"issue":"5","key":"7355_CR5","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1111\/deci.12446","volume":"52","author":"T Jain","year":"2020","unstructured":"Jain T, Hazra J, Cheng TCE (2020) IT outsourcing and vendor cost improvement strategies under asymmetric information. Decis Sci 52(5):1109\u20131136","journal-title":"Decis Sci"},{"issue":"1","key":"7355_CR6","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.ijresmar.2016.08.002","volume":"34","author":"Y Liu","year":"2017","unstructured":"Liu Y, Tyagi RK (2017) Outsourcing to convert fixed costs into variable costs: a competitive analysis. Int J Res Mark 34(1):252\u2013264","journal-title":"Int J Res Mark"},{"issue":"3","key":"7355_CR7","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.emj.2017.05.004","volume":"36","author":"F Law","year":"2018","unstructured":"Law F (2018) Breaking the outsourcing path: backsourcing process and outsourcing lock-in. Eur Manag J 36(3):341\u2013352","journal-title":"Eur Manag J"},{"issue":"1","key":"7355_CR8","doi-asserted-by":"crossref","first-page":"50","DOI":"10.2307\/41166468","volume":"51","author":"NF Veltri","year":"2008","unstructured":"Veltri NF, Saunders CS, Kavan CB (2008) Information systems backsourcing: correcting problems and responding to opportunities. Calif Manage Rev 51(1):50\u201376","journal-title":"Calif Manage Rev"},{"issue":"4","key":"7355_CR9","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1111\/j.1540-5414.2006.00140.x","volume":"37","author":"D Whitten","year":"2006","unstructured":"Whitten D, Leidner D (2006) Bringing it back: an analysis of the decision to backsource or switch vendors. Decis Sci 37(4):605\u2013621","journal-title":"Decis Sci"},{"issue":"3","key":"7355_CR10","first-page":"60","volume":"42","author":"J Barth\u00e9lemy","year":"2001","unstructured":"Barth\u00e9lemy J (2001) The hidden costs of it outsourcing. MIT Sloan Manag Rev 42(3):60\u201369","journal-title":"MIT Sloan Manag Rev"},{"issue":"3","key":"7355_CR11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.im.2010.01.006","volume":"47","author":"D Whitten","year":"2010","unstructured":"Whitten D, Chakrabarty S, Wakefield R (2010) The strategic choice to continue outsourcing, switch vendors, or backsource: do switching costs matter? Inf Manag 47(3):167\u2013175","journal-title":"Inf Manag"},{"issue":"4","key":"7355_CR12","doi-asserted-by":"crossref","first-page":"317","DOI":"10.2753\/MIS0742-1222260411","volume":"26","author":"M Benaroch","year":"2010","unstructured":"Benaroch M, Dai Q, Kauffman RJ (2010) Should we go our own way? backsourcing flexibility in it services contracts. J Manag Inf Syst 26(4):317\u2013358","journal-title":"J Manag Inf Syst"},{"issue":"4","key":"7355_CR13","doi-asserted-by":"crossref","first-page":"535","DOI":"10.2307\/249554","volume":"22","author":"S Ang","year":"1998","unstructured":"Ang S, Straub DW (1998) Production and transaction economies and is outsourcing: a study of the US Banking industry. MIS Q 22(4):535\u2013552","journal-title":"MIS Q"},{"issue":"1","key":"7355_CR14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1287\/isre.1080.0223","volume":"21","author":"D Dey","year":"2010","unstructured":"Dey D, Fan M, Zhang C (2010) Design and analysis of contracts for software outsourcing. Inf Syst Res 21(1):93\u2013114","journal-title":"Inf Syst Res"},{"issue":"2","key":"7355_CR15","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1287\/isre.2018.0806","volume":"30","author":"KL Hui","year":"2019","unstructured":"Hui KL, Ke PF, Yao Y et al (2019) Bilateral liability-based contracts in information security outsourcing. Inf Syst Res 30(2):411\u2013429","journal-title":"Inf Syst Res"},{"issue":"3","key":"7355_CR16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/07421222.2004.11045810","volume":"21","author":"R Kishore","year":"2004","unstructured":"Kishore R, Agrawal M, Rao HR (2004) Determinants of sourcing during technology growth and maturity: an empirical study of e-commerce sourcing. J Manag Inf Syst 21(3):47\u201382","journal-title":"J Manag Inf Syst"},{"issue":"3","key":"7355_CR17","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1287\/deca.2019.0406","volume":"17","author":"Y Wu","year":"2020","unstructured":"Wu Y, Duan J, Dai T et al (2020) Managing security outsourcing in the presence of strategic hackers. Decis Anal 17(3):235\u2013259","journal-title":"Decis Anal"},{"issue":"1","key":"7355_CR18","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1287\/isre.2021.1059","volume":"33","author":"C Hsu","year":"2022","unstructured":"Hsu C, Lee JN, Fang Y et al (2022) The role of vendor legitimacy in IT outsourcing performance: theory and evidence. Inf Syst Res 33(1):337\u2013361","journal-title":"Inf Syst Res"},{"issue":"1","key":"7355_CR19","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1287\/serv.2018.0233","volume":"11","author":"T Jain","year":"2019","unstructured":"Jain T, Hazra J (2019) Vendor\u2019s strategic investments under IT outsourcing competition. Serv Sci 11(1):16\u201339","journal-title":"Serv Sci"},{"issue":"3","key":"7355_CR20","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1287\/isre.6.3.191","volume":"6","author":"S Nidumolu","year":"1995","unstructured":"Nidumolu S (1995) The effect of coordination and uncertainty on software project performance: residual performance risk as an intervening variable. Inf Syst Res 6(3):191\u2013219","journal-title":"Inf Syst Res"},{"issue":"2","key":"7355_CR21","doi-asserted-by":"crossref","first-page":"553","DOI":"10.2307\/41703467","volume":"36","author":"A Gopal","year":"2012","unstructured":"Gopal A, Koka BR (2012) The asymmetric benefits of relational flexibility: evidence from software development outsourcing. MIS Q 36(2):553\u2013576","journal-title":"MIS Q"},{"issue":"1","key":"7355_CR22","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.jsis.2016.02.004","volume":"25","author":"M Schermann","year":"2016","unstructured":"Schermann M, Dongus K, Yetton P, Krcmar H (2016) The role of transaction cost economics in information technology outsourcing research: a meta-analysis of the choice of contract type. J Strateg Inf Syst 25(1):32\u201348","journal-title":"J Strateg Inf Syst"},{"issue":"7","key":"7355_CR23","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1287\/mnsc.1110.1493","volume":"58","author":"A Susarla","year":"2012","unstructured":"Susarla A (2012) Contractual flexibility, rent seeking, and renegotiation design: an empirical analysis of information technology outsourcing contracts. Manage Sci 58(7):1388\u20131407","journal-title":"Manage Sci"},{"issue":"2","key":"7355_CR24","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.ipm.2022.102871","volume":"59","author":"Q Zhou","year":"2022","unstructured":"Zhou Q, Zhuang W, Ren H, Chen Y, Yu B, Lou J, Wang Y (2022) Hybrid collaborative filtering model for consumer dynamic service recommendation based on mobile cloud information system. Inf Process Manag 59(2):1028. https:\/\/doi.org\/10.1016\/j.ipm.2022.102871","journal-title":"Inf Process Manag"},{"key":"7355_CR25","doi-asserted-by":"crossref","DOI":"10.1515\/9781400830176","volume-title":"Investment under uncertainty","author":"AK Dixit","year":"1994","unstructured":"Dixit AK, Pindyck RS (1994) Investment under uncertainty. Princeton University Press, Princeton"},{"issue":"1","key":"7355_CR26","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.ejor.2019.01.055","volume":"285","author":"S Maier","year":"2020","unstructured":"Maier S, Pflug GC, Polak JW (2020) Valuing Portfolios of Interdependent Real Options under Exogenous and Endogenous Uncertainties. Eur J Oper Res 285(1):133\u2013147","journal-title":"Eur J Oper Res"},{"issue":"3","key":"7355_CR27","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1287\/isre.1120.0448","volume":"24","author":"D Wu","year":"2013","unstructured":"Wu D, Ding M, Hitt LM (2013) It implementation contract design: Analytical and experimental investigation of IT value, learning, and contract structure. Inf Syst Res 24(3):787\u2013801","journal-title":"Inf Syst Res"},{"issue":"3","key":"7355_CR28","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1287\/mnsc.2013.1763","volume":"60","author":"A Cezar","year":"2014","unstructured":"Cezar A, Cavusoglu H, Raghunathan S (2014) Outsourcing information security: Contracting issues and security implications. Manage Sci 60(3):638\u2013657","journal-title":"Manage Sci"},{"issue":"2","key":"7355_CR29","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1287\/isre.1120.0447","volume":"24","author":"CH Lee","year":"2013","unstructured":"Lee CH, Geng X, Raghunathan S (2013) Contracting information security in the presence of double moral hazard. Inf Syst Res 24(2):295\u2013311","journal-title":"Inf Syst Res"},{"issue":"3","key":"7355_CR30","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1287\/isre.2013.0475","volume":"24","author":"S Sen","year":"2013","unstructured":"Sen S, Raghu TS (2013) Interdependencies in it infrastructure services: Analyzing service processes for optimal incentive design. Inf Syst Res 24(3):822\u2013841","journal-title":"Inf Syst Res"},{"issue":"1","key":"7355_CR31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1287\/isre.1100.0310","volume":"23","author":"D Fitoussi","year":"2012","unstructured":"Fitoussi D, Gurbaxani V (2012) It outsourcing contracts and performance measurement. Inf Syst Res 23(1):129\u2013143","journal-title":"Inf Syst Res"},{"issue":"1","key":"7355_CR32","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s10586-016-0724-0","volume":"20","author":"Z Zhang","year":"2017","unstructured":"Zhang Z, Xu X (2017) Principal agent model based design and outsourcing of information value. Clust Comput 20(1):67\u201379","journal-title":"Clust Comput"},{"issue":"2","key":"7355_CR33","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1287\/mnsc.2017.2967","volume":"65","author":"P Casas-Arce","year":"2019","unstructured":"Casas-Arce P, Kittsteiner T, Mart\u00ednez-Jerez FA (2019) Contracting with opportunistic partners: theory and application to technology development and innovation. Manage Sci 65(2):842\u2013858","journal-title":"Manage Sci"},{"issue":"1","key":"7355_CR34","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1002\/smj.433","volume":"26","author":"SK Ethiraj","year":"2005","unstructured":"Ethiraj SK, Kale P, Krishnan MS, Singh JV (2005) Where do capabilities come from and how do they matter? A study in the software services industry. Strateg Manag J 26(1):25\u201345","journal-title":"Strateg Manag J"},{"doi-asserted-by":"crossref","unstructured":"Gopal A, Sivaramakrishnan K (2008) Research note: On vendor preferences for contract types in offshore software projects: The case of fixed price vs. Time and materials contracts. Information Systems Research 19(2):202\u2013220","key":"7355_CR35","DOI":"10.1287\/isre.1070.0162"},{"issue":"3","key":"7355_CR36","doi-asserted-by":"crossref","first-page":"387","DOI":"10.2307\/2696361","volume":"32","author":"P Bajari","year":"2001","unstructured":"Bajari P, Tadelis S (2001) Incentives versus transaction costs: A theory of procurement contracts. Rand J Econ 32(3):387\u2013407","journal-title":"Rand J Econ"},{"issue":"1","key":"7355_CR37","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1093\/jleo\/ewh031","volume":"20","author":"KS Corts","year":"2004","unstructured":"Corts KS, Singh J (2004) The effect of repeated interaction on contract choice: Evidence from offshore drilling. J Law Econ Organ 20(1):230\u2013260","journal-title":"J Law Econ Organ"},{"issue":"1","key":"7355_CR38","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1093\/jleo\/ewh030","volume":"20","author":"A Kalnins","year":"2004","unstructured":"Kalnins A, Mayer KJ (2004) Relationships and hybrid contracts: An analysis of contract choice in information technology. J Law Econ Organ 20(1):207\u2013229","journal-title":"J Law Econ Organ"},{"issue":"2","key":"7355_CR39","doi-asserted-by":"crossref","first-page":"47","DOI":"10.2307\/41166122","volume":"44","author":"T Kern","year":"2002","unstructured":"Kern T, Willcocks LP, van Heck E (2002) The winner\u2019s curse in it outsourcing: Strategies for avoiding relational trauma. Calif Manage Rev 44(2):47\u201369","journal-title":"Calif Manage Rev"},{"issue":"2","key":"7355_CR40","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1046\/j.1365-2575.1998.00030.x","volume":"8","author":"WL Currie","year":"1998","unstructured":"Currie WL, Willcocks LP (1998) Analysing four types of it sourcing decisions in the context of scale, client\/supplier interdependency and risk mitigation. Inf Syst J 8(2):119\u2013143","journal-title":"Inf Syst J"},{"issue":"10","key":"7355_CR41","first-page":"96","volume":"83","author":"R Nolan","year":"2005","unstructured":"Nolan R, McFarlan FW (2005) Information technology and the board of directors. Harv Bus Rev 83(10):96\u2013106","journal-title":"Harv Bus Rev"},{"issue":"4","key":"7355_CR42","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1287\/isre.2013.0478","volume":"24","author":"D Mani","year":"2013","unstructured":"Mani D, Barua A, Whinston AB (2013) Outsourcing contracts and equity prices. Inf Syst Res 24(4):1028\u20131049","journal-title":"Inf Syst Res"},{"issue":"4","key":"7355_CR43","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1007\/s10257-013-0230-3","volume":"13","author":"C Wernz","year":"2015","unstructured":"Wernz C, Gehrke I, Ball D (2015) Managerial decision-making in hospitals with real options analysis. Inf Syst E-Bus Manage 13(4):673\u2013691","journal-title":"Inf Syst E-Bus Manage"},{"issue":"1","key":"7355_CR44","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.ijindorg.2006.01.003","volume":"25","author":"LHR Alvarez","year":"2007","unstructured":"Alvarez LHR, Stenbacka R (2007) Partial outsourcing: A real options perspective. Int J Ind Organ 25(1):91\u2013102","journal-title":"Int J Ind Organ"},{"issue":"1","key":"7355_CR45","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.cie.2010.02.010","volume":"59","author":"Y Moon","year":"2010","unstructured":"Moon Y (2010) Efforts and efficiency in partial outsourcing and investment timing strategy under market uncertainty. Comput Ind Eng 59(1):24\u201333","journal-title":"Comput Ind Eng"},{"issue":"2","key":"7355_CR46","first-page":"143","volume":"4","author":"Q Cao","year":"2009","unstructured":"Cao Q, Gu VC, Burns JR (2009) Applications of real option analysis to vendor selection process in it outsourcing. Int J Inf Syst Chang Manage 4(2):143\u2013155","journal-title":"Int J Inf Syst Chang Manage"},{"issue":"6","key":"7355_CR47","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1016\/j.omega.2007.05.004","volume":"36","author":"B Jiang","year":"2008","unstructured":"Jiang B, Reinhardt G, Young ST (2008) BOCOG\u2019s outsourcing contracts: The vendor\u2019s perspective. Omega 36(6):941\u2013949","journal-title":"Omega"},{"issue":"1","key":"7355_CR48","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.ijpe.2010.08.006","volume":"129","author":"Y Moon","year":"2011","unstructured":"Moon Y, Yao T, Jiang B (2011) Outsourcing versus joint venture from vendor\u2019s perspective. Int J Prod Econ 129(1):23\u201331","journal-title":"Int J Prod Econ"},{"key":"7355_CR49","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-51570-5","volume-title":"Axiomatic models of bargaining","author":"AE Roth","year":"1979","unstructured":"Roth AE (1979) Axiomatic models of bargaining. Springer-Verlag, Berlin"},{"issue":"3","key":"7355_CR50","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1111\/j.1540-5915.2010.00281.x","volume":"41","author":"B Jiang","year":"2010","unstructured":"Jiang B, Talluri S, Yao T, Moon Y (2010) Breaking the winner\u2019s curse in outsourcing. Decis Sci 41(3):573\u2013594","journal-title":"Decis Sci"},{"issue":"3","key":"7355_CR51","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1111\/j.1540-5915.2008.00197.x","volume":"39","author":"B Jiang","year":"2008","unstructured":"Jiang B, Yao T, Feng B (2008) Valuate outsourcing contracts from vendors\u2019 perspective: A real options approach. Decis Sci 39(3):383\u2013405","journal-title":"Decis Sci"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07355-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-022-07355-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07355-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T05:07:58Z","timestamp":1673845678000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-022-07355-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["7355"],"URL":"https:\/\/doi.org\/10.1007\/s00521-022-07355-6","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"16 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}