{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:10:30Z","timestamp":1772500230390,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00797-6","type":"journal-article","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T03:02:22Z","timestamp":1704250942000},"page":"1459-1475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Information security and privacy challenges of cloud computing for government adoption: a systematic review"],"prefix":"10.1007","volume":"23","author":[{"given":"Ndukwe","family":"Ukeje","sequence":"first","affiliation":[]},{"given":"Jairo","family":"Gutierrez","sequence":"additional","affiliation":[]},{"given":"Krassie","family":"Petrova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,3]]},"reference":[{"key":"797_CR1","doi-asserted-by":"publisher","unstructured":"Espinha Gasiba, T., Andrei-Cristian, I., Lechner, U., Pinto-Albuquerque, M.: Raising security awareness of cloud deployments using infrastructure as code through cybersecurity challenges. In: The 16th International Conference on Availability, Reliability and Security, pp. 1\u20138 (2021). https:\/\/doi.org\/10.1145\/3465481.3470030","DOI":"10.1145\/3465481.3470030"},{"key":"797_CR2","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ijin.2021.08.001","volume":"2","author":"S Alhomdy","year":"2021","unstructured":"Alhomdy, S., et al.: The role of cloud computing technology: a savior to fight the lockdown in COVID 19 crisis, the benefits, characteristics and applications. Int. J. Intell. Netw. 2, 166\u2013174 (2021). https:\/\/doi.org\/10.1016\/j.ijin.2021.08.001","journal-title":"Int. J. Intell. Netw."},{"key":"797_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100407","volume":"15","author":"A Al Hadwer","year":"2021","unstructured":"Al Hadwer, A., et al.: A systematic review of organizational factors impacting cloud-based technology adoption using technology-organization-environment framework. Internet Things 15, 100407 (2021). https:\/\/doi.org\/10.1016\/j.iot.2021.100407","journal-title":"Internet Things"},{"issue":"11","key":"797_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.15722\/jds.14.11.201611.37","volume":"14","author":"MM Salem","year":"2016","unstructured":"Salem, M.M., Hwang, G.-H.: Critical factors influencing adoption of cloud computing for government organizations in Yemen. J. Distrib. Sci. 14(11), 37\u201347 (2016). https:\/\/doi.org\/10.15722\/jds.14.11.201611.37","journal-title":"J. Distrib. Sci."},{"key":"797_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102266","volume":"106","author":"Y Nugraha","year":"2021","unstructured":"Nugraha, Y., Martin, A.: Towards a framework for trustworthy data security level agreement in cloud procurement. Comput. Secur. 106, 102266 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102266","journal-title":"Comput. Secur."},{"key":"797_CR6","doi-asserted-by":"publisher","unstructured":"Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: NIST cloud computing reference architecture. In: NIST Special Publication, vol. 500, pp. 1\u201328 (2011). https:\/\/doi.org\/10.1016\/j.cose.2021.102266","DOI":"10.1016\/j.cose.2021.102266"},{"key":"797_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.procs.2016.08.279","volume":"97","author":"J Alonso","year":"2016","unstructured":"Alonso, J., Escalante, M., Orue-Echevarria, L.: Transformational Cloud Government (TCG): transforming public administrations with a cloud of public services. Procedia Comput. Sci. 97, 43\u201352 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.08.279","journal-title":"Procedia Comput. Sci."},{"key":"797_CR8","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1016\/j.procs.2019.11.247","volume":"161","author":"N Anggraini","year":"2019","unstructured":"Anggraini, N., Binariswanto, Legowo, N.: Cloud computing adoption strategic planning using ROCCA and TOGAF 92: a study in government agency. Procedia Comput. Sci. 161, 1316\u20131324 (2019). https:\/\/doi.org\/10.1016\/j.procs.2019.11.247","journal-title":"Procedia Comput. Sci."},{"key":"797_CR9","volume-title":"Cloud Computing for Dummies","author":"JS Hurwitz","year":"2020","unstructured":"Hurwitz, J.S., Kirsch, D.: Cloud Computing for Dummies. Wiley, London (2020)"},{"issue":"3","key":"797_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.5626\/JCSE.2015.9.3.119","volume":"9","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Sun, Y.L., Ryoo, J., Rizvi, S., Vasilakos, A.V.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9(3), 119\u2013133 (2015). https:\/\/doi.org\/10.5626\/JCSE.2015.9.3.119","journal-title":"J. Comput. Sci. Eng."},{"issue":"3","key":"797_CR11","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1108\/JSIT-01-2016-0001","volume":"18","author":"F Mohammed","year":"2016","unstructured":"Mohammed, F., Ibrahim, O., Ithnin, N.: Factors influencing cloud computing adoption for e-government implementation in developing countries. J. Syst. Inf. Technol. 18(3), 297\u2013327 (2016). https:\/\/doi.org\/10.1108\/JSIT-01-2016-0001","journal-title":"J. Syst. Inf. Technol."},{"issue":"2","key":"797_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2020.07.003","volume":"22","author":"I Keshta","year":"2021","unstructured":"Keshta, I., Odeh, A.: Security and privacy of electronic health records: concerns and challenges. Egypt. Inform. J. 22(2), 177\u2013183 (2021). https:\/\/doi.org\/10.1016\/j.eij.2020.07.003","journal-title":"Egypt. Inform. J."},{"key":"797_CR13","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.jhtm.2019.04.001","volume":"39","author":"S Pahlevan-Sharif","year":"2019","unstructured":"Pahlevan-Sharif, S., Mura, P., Wijesinghe, S.N.R.: A systematic review of systematic reviews in tourism. J. Hosp. Tour. Manag. 39, 158\u2013165 (2019). https:\/\/doi.org\/10.1016\/j.jhtm.2019.04.001","journal-title":"J. Hosp. Tour. Manag."},{"key":"797_CR14","doi-asserted-by":"publisher","first-page":"n160","DOI":"10.1136\/bmj.n160","volume":"372","author":"MJ Page","year":"2021","unstructured":"Page, M.J., Moher, D., Bossuyt, P.M., Boutron, I., Hoffmann, T.C., Mulrow, C.D., Shamseer, L., Tetzlaff, J.M., Akl, E.A., Brennan, S.E., Chou, R., Glanville, J., Grimshaw, J.M., Hr\u00f3bjartsson, A., Lalu, M.M., Li, T., Loder, E.W., Mayo-Wilson, E., McDonald, S., McKenzie, J.E.: PRISMA 2020 explanation and elaboration: updated guidance and exemplars for reporting systematic reviews. BMJ 372, n160 (2021). https:\/\/doi.org\/10.1136\/bmj.n160","journal-title":"BMJ"},{"key":"797_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsu.2021.105918","volume":"88","author":"C Sohrabi","year":"2021","unstructured":"Sohrabi, C., Franchi, T., Mathew, G., Kerwan, A., Nicola, M., Griffin, M., Agha, M., Agha, R.: PRISMA 2020 statement: what\u2019s new and the importance of reporting guidelines. Int. J. Surg. 88, 105918 (2021). https:\/\/doi.org\/10.1016\/j.ijsu.2021.105918","journal-title":"Int. J. Surg."},{"issue":"1","key":"797_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/fi14010011","volume":"14","author":"YS Abdulsalam","year":"2022","unstructured":"Abdulsalam, Y.S., Hedabou, M.: Security and privacy in cloud computing: technical review. Future Internet 14(1), 11 (2022). https:\/\/doi.org\/10.3390\/fi14010011","journal-title":"Future Internet"},{"key":"797_CR17","doi-asserted-by":"crossref","unstructured":"Alsafi, T., Fan, I.S.: Cloud computing adoption barriers faced by Saudi manufacturing SMEs. In: 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1\u20136 (2020)","DOI":"10.23919\/CISTI49556.2020.9140940"},{"key":"797_CR18","doi-asserted-by":"crossref","unstructured":"Chikhaoui, E., Sarabdeen, J., Parveen, R.: Privacy and security issues in the use of clouds in e-health in the Kingdom of Saudi Arabia. In: Proceedings of the 28th International Business Information Management Association Conference\u2014Vision 2020: Innovation Management, Development Sustainability, and Competitive Economic Growth (2016)","DOI":"10.5171\/2017.369309"},{"key":"797_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ijinfomgt.2019.02.002","volume":"48","author":"F Gao","year":"2019","unstructured":"Gao, F., Sunyaev, A.: Context matters: a review of the determinant factors in the decision to adopt cloud computing in healthcare. Int. J. Inf. Manag. 48, 120\u2013138 (2019). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.02.002","journal-title":"Int. J. Inf. Manag."},{"issue":"2","key":"797_CR20","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1504\/IJBIS.2016.074257","volume":"21","author":"I Shafiu","year":"2016","unstructured":"Shafiu, I., Wang, W.Y.C., Singh, H.: Drivers and barriers in the decision to adopt IaaS: a public sector case study. Int. J. Bus. Inf. Syst. 21(2), 249\u2013267 (2016). https:\/\/doi.org\/10.1504\/IJBIS.2016.074257","journal-title":"Int. J. Bus. Inf. Syst."},{"key":"797_CR21","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/j.procs.2021.01.193","volume":"181","author":"B Alghamdi","year":"2021","unstructured":"Alghamdi, B., Potter, L.E., Drew, S.: Validation of architectural requirements for tackling cloud computing barriers: cloud provider perspective. Procedia Comput. Sci. 181, 477\u2013486 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"797_CR22","doi-asserted-by":"publisher","unstructured":"Manzoor, A.: Cloud Computing applications in the public sector. In: Cloud Computing Technologies for Connected Government, pp. 215\u2013246 (2016). https:\/\/doi.org\/10.4018\/978-1-4666-8629-8.ch009","DOI":"10.4018\/978-1-4666-8629-8.ch009"},{"issue":"5","key":"797_CR23","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1108\/JEIM-09-2019-0276","volume":"33","author":"M Sharma","year":"2020","unstructured":"Sharma, M., Sehrawat, R.: Quantifying SWOT analysis for cloud adoption using FAHP-DEMATEL approach: evidence from the manufacturing sector. J. Enterp. Inf. Manag. 33(5), 1111\u20131152 (2020). https:\/\/doi.org\/10.1108\/JEIM-09-2019-0276","journal-title":"J. Enterp. Inf. Manag."},{"key":"797_CR24","doi-asserted-by":"publisher","unstructured":"Yan, L., Hao, X., Cheng, Z., Zhou, R.: Cloud computing security and privacy. In: Proceedings of the 3rd International Conference on Big Data and Computing, Shenzhen, China, pp. 119\u2013123 (2018). https:\/\/doi.org\/10.1145\/3220199.3220217","DOI":"10.1145\/3220199.3220217"},{"key":"797_CR25","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. Technical report, ver. 2.3 ebse technical report. ebse (2007)"},{"key":"797_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsu.2021.105906","volume":"88","author":"MJ Page","year":"2021","unstructured":"Page, M.J., McKenzie, J.E., Bossuyt, P.M., Boutron, I., Hoffmann, T.C., Mulrow, C.D., Shamseer, L., Tetzlaff, J.M., Akl, E.A., Brennan, S.E.: The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Int. J. Surg. 88, 105906 (2021)","journal-title":"Int. J. Surg."},{"key":"797_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmedr.2020.101058","volume":"17","author":"D Burnes","year":"2020","unstructured":"Burnes, D., DeLiema, M., Langton, L.: Risk and protective factors of identity theft victimization in the United States. Prev. Med. Rep. 17, 101058 (2020). https:\/\/doi.org\/10.1016\/j.pmedr.2020.101058","journal-title":"Prev. Med. Rep."},{"issue":"2","key":"797_CR28","doi-asserted-by":"publisher","first-page":"819","DOI":"10.13053\/CyS-24-2-3119","volume":"24","author":"SDO Jim\u00e9nez","year":"2020","unstructured":"Jim\u00e9nez, S.D.O., Anaya, E.A.: A survey on information security in cloud computing. Comput. Sist. 24(2), 819\u2013833 (2020). https:\/\/doi.org\/10.13053\/CyS-24-2-3119","journal-title":"Comput. Sist."},{"key":"797_CR29","unstructured":"Force, J.T., Initiative, T.: Security and privacy controls for federal information systems and organizations. In: NIST Special Publication, pp. 8\u201313 (2013)"},{"key":"797_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: a survey. In: 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp. 105\u2013112 (2010)","DOI":"10.1109\/SKG.2010.19"},{"key":"797_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102642","volume":"160","author":"P Sun","year":"2020","unstructured":"Sun, P.: Security and privacy protection in cloud computing: discussions and challenges. J. Netw. Comput. Appl. 160, 102642 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"797_CR32","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1177\/0971721818806088","volume":"24","author":"Y Abed","year":"2019","unstructured":"Abed, Y., Chavan, M.: The challenges of institutional distance: data privacy issues in cloud computing. Sci. Technol. Soc. 24(1), 161\u2013181 (2019). https:\/\/doi.org\/10.1177\/0971721818806088","journal-title":"Sci. Technol. Soc."},{"key":"797_CR33","doi-asserted-by":"crossref","unstructured":"Verizon, Verizon 2021 Data Breach Investigations Report, Verizon 2021DBIR Master\u2019s Guide (2021)","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"797_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105396","volume":"36","author":"O Ali","year":"2020","unstructured":"Ali, O., Osmanaj, V.: The role of government regulations in the adoption of cloud computing: a case study of local government. Comput. Law Secur. Rev. 36, 105396 (2020). https:\/\/doi.org\/10.1016\/j.clsr.2020.105396","journal-title":"Comput. Law Secur. Rev."},{"key":"797_CR35","doi-asserted-by":"crossref","unstructured":"Gholami, A., Laure, E.: Security and privacy of sensitive data in cloud computing: a survey of recent developments. arXiv preprint arXiv:1601.01498 (2016)","DOI":"10.5121\/csit.2015.51611"},{"issue":"10","key":"797_CR36","doi-asserted-by":"publisher","first-page":"2475","DOI":"10.1108\/K-06-2019-0434","volume":"49","author":"C Jianwen","year":"2020","unstructured":"Jianwen, C., Wakil, K.: A model for evaluating the vital factors affecting cloud computing adoption. Kybernetes 49(10), 2475\u20132492 (2020). https:\/\/doi.org\/10.1108\/K-06-2019-0434","journal-title":"Kybernetes"},{"issue":"2","key":"797_CR37","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DAB Fernandes","year":"2014","unstructured":"Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., In\u00e1cio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113\u2013170 (2014). https:\/\/doi.org\/10.1007\/s10207-013-0208-7","journal-title":"Int. J. Inf. Secur."},{"key":"797_CR38","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp. 693\u2013702 (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"issue":"1","key":"797_CR39","doi-asserted-by":"publisher","first-page":"141","DOI":"10.31803\/tg-20220826124655","volume":"17","author":"FA AlSelami","year":"2023","unstructured":"AlSelami, F.A.: Major cloud computing security challenges with innovative approaches. Teh. Glas. 17(1), 141\u2013145 (2023). https:\/\/doi.org\/10.31803\/tg-20220826124655","journal-title":"Teh. Glas."},{"key":"797_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103152","volume":"190","author":"AS AlAhmad","year":"2021","unstructured":"AlAhmad, A.S., Kahtan, H., Alzoubi, Y.I., Ali, O., Jaradat, A.: Mobile cloud computing models security issues: a systematic review. J. Netw. Comput. Appl. 190, 103152 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.103152","journal-title":"J. Netw. Comput. Appl."},{"key":"797_CR41","doi-asserted-by":"publisher","unstructured":"Alghofaili, Y., Albattah, A., Alrajeh, N., Rassam, M.A., Al-Rimy, B.A.S.: Secure cloud infrastructure: a survey on issues, current solutions, and open challenges. Appl. Sci. (Switz.) 11(19), 9005 (2021). https:\/\/doi.org\/10.3390\/app11199005","DOI":"10.3390\/app11199005"},{"issue":"10","key":"797_CR42","doi-asserted-by":"publisher","first-page":"10217","DOI":"10.1016\/j.jksuci.2022.10.018","volume":"34","author":"O Isaac Abiodun","year":"2022","unstructured":"Isaac Abiodun, O., Alawida, M., Esther Omolara, A., Alabdulatif, A.: Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: a survey. J. King Saud Univ. Comput. Inf. Sci. 34(10), 10217\u201310245 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.10.018","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"797_CR43","doi-asserted-by":"publisher","unstructured":"Kumar, R., Goyal, R.: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput. Sci. Rev. 33, 1\u201348 (2019). https:\/\/doi.org\/10.1016\/j.cosrev.2019.05.002","DOI":"10.1016\/j.cosrev.2019.05.002"},{"issue":"12","key":"797_CR44","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1109\/TKDE.2019.2936353","volume":"32","author":"D Miorandi","year":"2020","unstructured":"Miorandi, D., Rizzardi, A., Sicari, S., Coen-Porisini, A.: Sticky policies: a survey. IEEE Trans. Knowl. Data Eng. 32(12), 2481\u20132499 (2020). https:\/\/doi.org\/10.1109\/TKDE.2019.2936353","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"797_CR45","doi-asserted-by":"publisher","first-page":"927","DOI":"10.3390\/s22030927","volume":"22","author":"A Ometov","year":"2022","unstructured":"Ometov, A., Molua, O.L., Komarov, M., Nurmi, J.: A survey of security in cloud, edge, and fog computing. Sensors 22(3), 927 (2022)","journal-title":"Sensors"},{"key":"797_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101258","volume":"61","author":"M Sharma","year":"2020","unstructured":"Sharma, M., Sehrawat, R.: A hybrid multi-criteria decision-making method for cloud adoption: evidence from the healthcare sector. Technol. Soc. 61, 101258 (2020). https:\/\/doi.org\/10.1016\/j.techsoc.2020.101258","journal-title":"Technol. Soc."},{"key":"797_CR47","doi-asserted-by":"publisher","unstructured":"Wilson, B.M.R., Khazaei, B., Hirsch, L.: Enablers and barriers of cloud adoption among small and medium enterprises in Tamil Nadu. In: Proceedings\u20142015 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2015, pp. 140\u2013145 (2015). https:\/\/doi.org\/10.1109\/CCEM.2015.21","DOI":"10.1109\/CCEM.2015.21"},{"issue":"3","key":"797_CR48","doi-asserted-by":"publisher","first-page":"2390","DOI":"10.1109\/TSG.2022.3148978","volume":"13","author":"S Zhang","year":"2022","unstructured":"Zhang, S., Pandey, A., Luo, X., Powell, M., Banerji, R., Fan, L., Parchure, A., Luzcando, E.: Practical adoption of cloud computing in power systems: drivers, challenges, guidance, and real-world use cases. IEEE Trans. Smart Grid 13(3), 2390\u20132411 (2022). https:\/\/doi.org\/10.1109\/TSG.2022.3148978","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00797-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00797-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00797-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T03:44:21Z","timestamp":1711511061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00797-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["797"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00797-6","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3351319\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,3]]},"assertion":[{"value":"25 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are directly or indirectly related to the content of this article. The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}