{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T18:52:28Z","timestamp":1776365548016,"version":"3.51.2"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10207-025-01009-z","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T19:57:38Z","timestamp":1741636658000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A risk and conformity assessment framework to ensure security and resilience of healthcare systems and medical supply chain"],"prefix":"10.1007","volume":"24","author":[{"given":"Kitty","family":"Kioskli","sequence":"first","affiliation":[]},{"given":"Elisavet","family":"Grigoriou","sequence":"additional","affiliation":[]},{"given":"Shareeful","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Andrianos M.","family":"Yiorkas","sequence":"additional","affiliation":[]},{"given":"Loizos","family":"Christofi","sequence":"additional","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,10]]},"reference":[{"issue":"4","key":"1009_CR1","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.3390\/su15043317","volume":"15","author":"F Kamalov","year":"2023","unstructured":"Kamalov, F., Pourghebleh, B., Gheisari, M., Liu, Y., Moussa, S.: Internet of medical things privacy and security: challenges, solutions, and future trends from a new perspective. Sustainability 15(4), 3317 (2023). https:\/\/doi.org\/10.3390\/su15043317","journal-title":"Sustainability"},{"key":"1009_CR2","unstructured":"Medical Device Network.: Medical device cybersecurity: assessing risks and mitigating threats, 2021. Retrieved from https:\/\/www.medicaldevice-network.com\/comment\/medical-device-cybersecurity\/"},{"issue":"8","key":"1009_CR3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.4236\/jcc.2022.108006","volume":"10","author":"AE Khaled","year":"2022","unstructured":"Khaled, A.E.: Internet of medical things (IoMT): overview, taxonomies, and classifications. J. Comput. Commun. 10(8), 64\u201389 (2022). https:\/\/doi.org\/10.4236\/jcc.2022.108006","journal-title":"J. Comput. Commun."},{"issue":"5","key":"1009_CR4","doi-asserted-by":"publisher","first-page":"100748","DOI":"10.1016\/j.pursup.2022.100748","volume":"28","author":"A Spieske","year":"2022","unstructured":"Spieske, A., et al.: Improving resilience of the healthcare supply chain in a pandemic: evidence from Europe during the COVID-19 crisis. J. Purch. Supply Manag. 28(5), 100748 (2022). https:\/\/doi.org\/10.1016\/j.pursup.2022.100748","journal-title":"J. Purch. Supply Manag."},{"key":"1009_CR5","unstructured":"Medical Futurist.: How to improve cybersecurity in healthcare? 7 steps to start, 2021. Retrieved from https:\/\/medicalfuturist.com\/improve-cybersecurity-in-healthcare\/"},{"issue":"4","key":"1009_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.3390\/informatics8040072","volume":"8","author":"M Torky","year":"2021","unstructured":"Torky, M., Hassanien, A.E.: COVID-19 contact tracing and detection based on blockchain technology and IoMT. Informatics 8(4), 72 (2021). https:\/\/doi.org\/10.3390\/informatics8040072","journal-title":"Informatics"},{"key":"1009_CR7","unstructured":"National Institute of Standards and Technology (NIST).: Cybersecurity for the internet of things (IoT) and beyond, 2021. Retrieved from https:\/\/www.nist.gov\/programs-projects\/cybersecurity-internet-things-iot-and-beyond"},{"key":"1009_CR8","unstructured":"The Journal of Medical Device Regulation.: Cybersecurity of medical devices: a regulatory perspective, 2019. Retrieved from https:\/\/www.emergobyul.com\/resources\/white-paper\/cybersecurity-medical-devices-regulatory-perspective"},{"key":"1009_CR9","unstructured":"US Food and Drug Administration (FDA).: Medical device cybersecurity, 2021. Retrieved from https:\/\/www.fda.gov\/medical-devices\/digital-health-center-excellence\/medical-device-cybersecurity"},{"key":"1009_CR10","unstructured":"Medical Devices Coordination Group. MDCG 2019-16 guidance on cybersecurity for medical devices. European Commission, 2019"},{"key":"1009_CR11","unstructured":"European Union Agency for Cybersecurity. Cybersecurity of connected medical devices\u2014addressing the regulatory challenges (No. EUCS-01\/2019). EU Agency for Cybersecurity, 2019"},{"key":"1009_CR12","unstructured":"The EU cybersecurity act. Available at: https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cybersecurity-act#:~:text=The%20Cybersecurity%20Act%20strengthens%20the,framework%20for%20products%20and%20services. (Accessed: 12 Jun 2023)"},{"issue":"4","key":"1009_CR13","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1109\/comst.2019.2914094","volume":"21","author":"T Yaqoob","year":"2019","unstructured":"Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices\u2014a review. IEEE Commun. Surv. Tutor. 21(4), 3723\u20133768 (2019). https:\/\/doi.org\/10.1109\/comst.2019.2914094","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1009_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6632599","volume":"2021","author":"B Pradhan","year":"2021","unstructured":"Pradhan, B., Bhattacharyya, S., Pal, K.: IOT-based applications in healthcare devices. J. Healthcare Eng. 2021, 1\u201318 (2021). https:\/\/doi.org\/10.1155\/2021\/6632599","journal-title":"J. Healthcare Eng."},{"key":"1009_CR15","first-page":"15","volume-title":"Medical device cybersecurity for engineers and manufacturers","author":"R Connolly","year":"2021","unstructured":"Connolly, R., Tuunanen, T., Cheah, W.N.: Medical device security in the European Union: challenges and potential solutions. In: Medical device cybersecurity for engineers and manufacturers, pp. 15\u201332. Springer, Berlin (2021)"},{"issue":"9","key":"1009_CR16","doi-asserted-by":"publisher","first-page":"6699","DOI":"10.1016\/j.jksuci.2022.02.022","volume":"34","author":"I Islam","year":"2022","unstructured":"Islam, I., Islam, M.N.: Digital intervention to reduce counterfeit and falsified medicines: a systematic review and future research agenda. J. King Saud Univ. Comput. Inform. Sci. 34(9), 6699\u20136718 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.02.022","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"key":"1009_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9888-1_15","author":"A Sharma","year":"2023","unstructured":"Sharma, A., et al.: Supply chain management using blockchain security enhancement. Adv. Inform. Commun. Technol. Comput. (2023). https:\/\/doi.org\/10.1007\/978-981-19-9888-1_15","journal-title":"Adv. Inform. Commun. Technol. Comput."},{"issue":"2","key":"1009_CR18","doi-asserted-by":"publisher","first-page":"133","DOI":"10.3390\/healthcare8020133","volume":"8","author":"AH Seh","year":"2020","unstructured":"Seh, A.H., et al.: Healthcare data breaches: insights and implications. Healthcare 8(2), 133 (2020). https:\/\/doi.org\/10.3390\/healthcare8020133","journal-title":"Healthcare"},{"key":"1009_CR19","doi-asserted-by":"publisher","DOI":"10.48175\/ijarsct-9104","author":"I Dwaraka Srihith","year":"2023","unstructured":"Dwaraka Srihith, I., et al.: Firmware attacks: the silent threat to your IOT connected devices. Int. J. Adv. Res. Sci. Commun. Technol. (2023). https:\/\/doi.org\/10.48175\/ijarsct-9104","journal-title":"Int. J. Adv. Res. Sci. Commun. Technol."},{"issue":"02","key":"1009_CR20","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1142\/s2424862221500147","volume":"06","author":"S Khan","year":"2021","unstructured":"Khan, S., et al.: Exploring the impact of covid-19 pandemic on medical supply chain disruption. J. Ind. Integrat. Manage. 06(02), 235\u2013255 (2021). https:\/\/doi.org\/10.1142\/s2424862221500147","journal-title":"J. Ind. Integrat. Manage."},{"key":"1009_CR21","doi-asserted-by":"publisher","unstructured":"Bartock, M., et al.: Hardware-enabled security\u202f: [Preprint], 2022. https:\/\/doi.org\/10.6028\/nist.ir.8320.","DOI":"10.6028\/nist.ir.8320"},{"key":"1009_CR22","unstructured":"Regulation (EU) 2019\/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526\/2013 (Cybersecurity Act) (Text with EEA relevance) http:\/\/data.europa.eu\/eli\/reg\/2019\/881\/oj"},{"key":"1009_CR23","unstructured":"The EU Cybersecurity Certification Framework.: Available at: https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cybersecurity-certification-framework (Accessed: 23 Jun 2023)."},{"issue":"2","key":"1009_CR24","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1365\/s43439-022-00067-6","volume":"3","author":"PG Chiara","year":"2022","unstructured":"Chiara, P.G.: The cyber resilience act: the EU commission\u2019s proposal for a horizontal regulation on cybersecurity for products with Digital Elements. Int. Cybersecur. Law Rev. 3(2), 255\u2013272 (2022). https:\/\/doi.org\/10.1365\/s43439-022-00067-6","journal-title":"Int. Cybersecur. Law Rev."},{"key":"1009_CR25","unstructured":"The NIS2 directive: A high common level of cybersecurity in the EU: Think tank: European parliament (no date) Think Tank | European Parliament. Available at: https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2021)689333 (Accessed: 23 Jun 2023)."},{"issue":"7","key":"1009_CR26","doi-asserted-by":"publisher","first-page":"6177","DOI":"10.3390\/su15076177","volume":"15","author":"B Bhushan","year":"2023","unstructured":"Bhushan, B., Kumar, A., Bhattacharya, P., Kumar, A.: Towards a secure and sustainable internet of medical things (IoMT): requirements, design challenges, security techniques, and future trends. Sustainability 15(7), 6177 (2023). https:\/\/doi.org\/10.3390\/su15076177","journal-title":"Sustainability"},{"key":"1009_CR27","doi-asserted-by":"publisher","unstructured":"Lie, M.F., S\u00e1nchez-Gord\u00f3n, M. and Colomo-Palacios, R.: DevOps in an ISO 13485 regulated environment, In Proceedings of the 14th ACM\/IEEE International symposium on empirical software engineering and measurement (ESEM) [Preprint], 2020. https:\/\/doi.org\/10.1145\/3382494.3410679.","DOI":"10.1145\/3382494.3410679"},{"issue":"5","key":"1009_CR28","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/smr.1711","volume":"27","author":"D Flood","year":"2015","unstructured":"Flood, D., et al.: A roadmap to ISO 14971 implementation. J. Soft.: Evol. Process 27(5), 319\u2013336 (2015). https:\/\/doi.org\/10.1002\/smr.1711","journal-title":"J. Soft.: Evol. Process"},{"key":"1009_CR29","doi-asserted-by":"publisher","unstructured":"Jordan, P.: Standard IEC 62304\u2014medical device software\u2014software lifecycle processes, In IET seminar on software for medical devices [Preprint], 2006. https:\/\/doi.org\/10.1049\/ic:20060141","DOI":"10.1049\/ic:20060141"},{"key":"1009_CR30","doi-asserted-by":"publisher","unstructured":"Medical devices\u2014part 1: application of usability engineering to medical devices: ANSI\/AAMI\/IEC 62366\u20131:2015\/(R)2021+AMD1:2020; medical devices\u2014Part 1: application of usability engineering to medical devices + Amendment 1 [Preprint], 2020. https:\/\/doi.org\/10.2345\/9781570207631.ch1.","DOI":"10.2345\/9781570207631.ch1"},{"key":"1009_CR31","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.csi.2018.04.013","volume":"60","author":"ST MacMahon","year":"2018","unstructured":"MacMahon, S.T., Cooper, T., McCaffery, F.: Revising IEC 80001\u20131: risk management of health information technology systems. Comput. Stand. Interfaces 60, 67\u201372 (2018). https:\/\/doi.org\/10.1016\/j.csi.2018.04.013","journal-title":"Comput. Stand. Interfaces"},{"key":"1009_CR32","unstructured":"ISO 13482:2014: ISO, 2021. Available at: https:\/\/www.iso.org\/standard\/53820.html (Accessed: 23 Jun 2023)"},{"key":"1009_CR33","unstructured":"More Efficient Supply Chain\u2014GS1. Available at: https:\/\/www.gs1.org\/industries\/healthcare\/saving-money\/more-efficient-supply-chain (Accessed: 23 Jun 2023)."},{"key":"1009_CR34","doi-asserted-by":"publisher","unstructured":"Boyens, J. et al.: Cybersecurity supply chain risk management for systems and organizations [Preprint], 2022a. https:\/\/doi.org\/10.6028\/nist.sp.800-161r1","DOI":"10.6028\/nist.sp.800-161r1"},{"key":"1009_CR35","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/B978-0-443-13951-2.00002-7","volume-title":"Securing next-generation connected healthcare systems","author":"P Das","year":"2024","unstructured":"Das, P., Gupta, I., Mishra, S.: Artificial intelligence driven cybersecurity in digital healthcare frameworks. In: Securing next-generation connected healthcare systems, pp. 213\u2013228. Academic Press, California (2024)"},{"issue":"3","key":"1009_CR36","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MSEC.2020.2983714","volume":"18","author":"A Kott","year":"2020","unstructured":"Kott, A., Theron, P.: Doers, not watchers: intelligent autonomous agents are a path to cyber resilience. IEEE Secur. Priv. 18(3), 62\u201366 (2020)","journal-title":"IEEE Secur. Priv."},{"issue":"5","key":"1009_CR37","doi-asserted-by":"crossref","first-page":"3849","DOI":"10.1007\/s10462-020-09942-2","volume":"54","author":"A B\u00e9cue","year":"2021","unstructured":"B\u00e9cue, A., Pra\u00e7a, I., Gama, J.: Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artif. Intell. Rev. 54(5), 3849\u20133886 (2021)","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"1009_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41746-021-00403-w","volume":"4","author":"S Carmody","year":"2021","unstructured":"Carmody, S., Coravos, A., Fahs, G., Hatch, A., Medina, J., Woods, B., Corman, J.: Building resilient medical technology supply chains with a software bill of materials. NPJ Digit. Med. 4(1), 1\u20136 (2021)","journal-title":"NPJ Digit. Med."},{"key":"1009_CR39","doi-asserted-by":"crossref","first-page":"106993","DOI":"10.1016\/j.knosys.2021.106993","volume":"222","author":"AV Konstantinov","year":"2021","unstructured":"Konstantinov, A.V., Utkin, L.V.: Interpretable machine learning with an ensemble of gradient boosting machines. Knowl.-Based Syst. 222, 106993 (2021)","journal-title":"Knowl.-Based Syst."},{"issue":"1","key":"1009_CR40","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","volume":"109","author":"F Zhuang","year":"2020","unstructured":"Zhuang, F., Qi, Z., Duan, K., Xi, D., Zhu, Y., Zhu, H., He, Q.: A comprehensive survey on transfer learning. Proceed. IEEE 109(1), 43\u201376 (2020)","journal-title":"Proceed. IEEE"},{"issue":"8","key":"1009_CR41","doi-asserted-by":"crossref","first-page":"3779","DOI":"10.1109\/TNNLS.2021.3121870","volume":"34","author":"TT Nguyen","year":"2021","unstructured":"Nguyen, T.T., Reddi, V.J.: Deep reinforcement learning for cyber security. IEEE Trans. Neural Netw. Learn. Syst. 34(8), 3779\u20133795 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"98","key":"1009_CR42","first-page":"1","volume":"22","author":"A Agarwal","year":"2021","unstructured":"Agarwal, A., Kakade, S.M., Lee, J.D., Mahajan, G.: On the theory of policy gradient methods: optimality, approximation, and distribution shift. J. Mach. Learn. Res. 22(98), 1\u201376 (2021)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"1009_CR43","doi-asserted-by":"crossref","first-page":"2037254","DOI":"10.1080\/08839514.2022.2037254","volume":"36","author":"B Guembe","year":"2022","unstructured":"Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L., Pospelova, V.: The emerging threat of ai-driven cyber attacks: a review. Appl. Artif. Intell. 36(1), 2037254 (2022)","journal-title":"Appl. Artif. Intell."},{"issue":"1","key":"1009_CR44","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1186\/s40537-021-00448-4","volume":"8","author":"F Laghrissi","year":"2021","unstructured":"Laghrissi, F., Douzi, S., Douzi, K., Hssina, B.: Intrusion detection systems using long short-term memory (LSTM). J. Big Data 8(1), 65 (2021)","journal-title":"J. Big Data"},{"issue":"1","key":"1009_CR45","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1038\/s41746-021-00455-y","volume":"4","author":"L Rasmy","year":"2021","unstructured":"Rasmy, L., Xiang, Y., Xie, Z., Tao, C., Zhi, D.: Med-BERT: pretrained contextualized embeddings on large-scale structured electronic health records for disease prediction. NPJ Digit. Med. 4(1), 86 (2021)","journal-title":"NPJ Digit. Med."},{"key":"1009_CR46","doi-asserted-by":"crossref","unstructured":"Aziz, N., Akhir, E.A.P., Aziz, I.A., Jaafar, J., Hasan, M. H., Abas, A.N.C.: A study on gradient boosting algorithms for development of AI monitoring and prediction systems. In 2020 International conference on computational intelligence (ICCI) (pp. 11\u201316). IEEE, 2020","DOI":"10.1109\/ICCI51257.2020.9247843"},{"issue":"2","key":"1009_CR47","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1109\/COMST.2020.2964534","volume":"22","author":"F Hussain","year":"2020","unstructured":"Hussain, F., Hassan, S.A., Hussain, R., Hossain, E.: Machine learning for resource management in cellular and IoT networks: potentials, current solutions, and open challenges. IEEE Commun. Surv. Tutor. 22(2), 1251\u20131275 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1009_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-45952-8_8","author":"P Whig","year":"2023","unstructured":"Whig, P., Kouser, S., Bhatia, A.B., Nadikattu, R.R., Alkali, Y.J.: Leveraging meta-heuristics in improving health care delivery: a comprehensive overview. Nature-Inspir. Methods Smart Healthcare Syst. Med. Data (2023). https:\/\/doi.org\/10.1007\/978-3-031-45952-8_8","journal-title":"Nature-Inspir. Methods Smart Healthcare Syst. Med. Data"},{"issue":"1","key":"1009_CR49","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1177\/1475921720934051","volume":"20","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Cha, Y.J.: Unsupervised deep learning approach using a deep auto-encoder with a one-class support vector machine to detect damage. Struct. Health Monit. 20(1), 406\u2013425 (2021)","journal-title":"Struct. Health Monit."},{"key":"1009_CR50","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-030-70679-1_5","volume-title":"Variational methods for machine learning with applications to deep networks","author":"L Pinheiro Cinelli","year":"2021","unstructured":"Pinheiro Cinelli, L., Ara\u00fajo Marins, M., Barros da Silva, E.A., Lima Netto, S.: Variational autoencoder. In: Variational methods for machine learning with applications to deep networks, pp. 111\u2013149. Springer International Publishing, Cham (2021)"},{"key":"1009_CR51","unstructured":"Regulation\u20142017\/745\u2014EN\u2014Medical Device Regulation\u2014EUR-Lex (europa.eu)"},{"key":"1009_CR52","doi-asserted-by":"publisher","DOI":"10.52098\/acj.202364","author":"M Alshar'e","year":"2023","unstructured":"Alshar\u2019e, M.: Cyber security framework selection: comparision of NIST and ISO27001. Appl. Comput J. (2023). https:\/\/doi.org\/10.52098\/acj.202364","journal-title":"Appl. Comput J."},{"issue":"1","key":"1009_CR53","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1002\/ieam.4332","volume":"17","author":"L Kaikkonen","year":"2021","unstructured":"Kaikkonen, L., Parviainen, T., Rahikainen, M., Uusitalo, L., Lehikoinen, A.: Bayesian networks in environmental risk assessment: a review. Integr. Environ. Assess. Manag. 17(1), 62\u201378 (2021)","journal-title":"Integr. Environ. Assess. Manag."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01009-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01009-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01009-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T07:59:44Z","timestamp":1743321584000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01009-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,10]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["1009"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01009-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,10]]},"assertion":[{"value":"23 February 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This study constitutes a desk review, and as such, no ethical standards were applicable to its execution.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"90"}}