{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T23:55:52Z","timestamp":1773446152726,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>As the world becomes increasingly digitalised, cyber insecurity has become the monster under the bed, an unseen threat that many either remain unaware of or ignore, hoping it will simply vanish. In today\u2019s digital landscape, nearly every individual with a digital footprint has, at some point, encountered spam calls or emails containing offers that appear too good to be true or attempt to induce fear and coerce them into parting with their money. Organisations of all sizes are on the front lines of this cyber war. A 2024 cybersecurity breaches survey by the UK Home Office found several organisations reported receiving countless phishing emails and other cyberattacks daily. This study evaluates and ranks the leading voluntary cybersecurity frameworks and standards based on their relevance and adoption in the academic and professional communities. A systematic review identified 12 voluntary cybersecurity frameworks and 17 cybersecurity standards. The top five frameworks and standards from each category were analysed, with the key components of each outlined in detail. The ranking system developed for this study was based on academic research interest, highlighting the cybersecurity measures most frequently studied and discussed in scholarly literature. The results provide a comprehensive overview of the most influential voluntary cybersecurity frameworks and standards, providing valuable insights for organisations seeking to improve their cybersecurity posture through voluntary measures. This study aimed to contribute to the ongoing discussion of how voluntary cybersecurity initiatives can complement regulatory efforts in safeguarding digital infrastructure.<\/jats:p>","DOI":"10.1007\/s10207-025-01121-0","type":"journal-article","created":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T17:59:38Z","timestamp":1757699978000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Systematic Review of Voluntary Cybersecurity Standards and Frameworks"],"prefix":"10.1007","volume":"24","author":[{"given":"Blessing","family":"Reuben-Owoh","sequence":"first","affiliation":[]},{"given":"Ella","family":"Haig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"1121_CR1","unstructured":"Ardley, N.: \u201cComputer criminals,\u201d in School, Work and Play (The World of Tomorrow), p.\u00a027, Franklin Watt, 1981"},{"key":"1121_CR2","doi-asserted-by":"crossref","DOI":"10.1093\/wentk\/9780199918096.001.0001","volume-title":"Cybersecurity and Cyberwar: What Everyone Needs to Know?","author":"PW Singer","year":"2014","unstructured":"Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar: What Everyone Needs to Know? Oxford University Press, Oxford (2014)"},{"key":"1121_CR3","unstructured":"NCSC, \u201cPhishing attacks: defending your organisation,\u201d 02 2024. Retrieved from National Cyber Security Centre"},{"key":"1121_CR4","doi-asserted-by":"crossref","unstructured":"Home Office, \u201cCyber security breaches survey 2024,\u201d 04 2024. Retrieved from Gov.UK","DOI":"10.63180\/jcsra.thestap.2024.1.3"},{"key":"1121_CR5","unstructured":"European Union Agency for Cybersecurity (ENISA), \u201cEnisa threat landscape 2024: Cyber threat landscape report.\u201d PDF available from ENISA website, Sept. 2024. Reporting period: July 2023-June 2024; published 19 September 2024; CC BY 4.0"},{"key":"1121_CR6","unstructured":"NCSC, \u201cCyber assessment framework,\u201d 04 2024. Retrieved from National Cyber Security Centre"},{"key":"1121_CR7","unstructured":"Simplilearn, \u201cWhat is a cyber security framework: Types, benefits, & best practices,\u201d 02 2024. Retrieved from Simplilearn"},{"key":"1121_CR8","doi-asserted-by":"crossref","unstructured":"Alshar\u2019e, M.: \u201cCyber security framework selection: Comparision of nist and iso27001,\u201d Applied computing Journal, pp.\u00a0245\u2013255, 2023","DOI":"10.52098\/acj.202364"},{"key":"1121_CR9","doi-asserted-by":"crossref","unstructured":"Roy, P.\u00a0P.: \u201cA high-level comparison between the nist cyber security framework and the iso 27001 information security standard,\u201d in 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA), pp.\u00a01\u20133, IEEE, 2020","DOI":"10.1109\/NCETSTEA48365.2020.9119914"},{"key":"1121_CR10","doi-asserted-by":"crossref","unstructured":"Al\u00a0Hadad, R.\u00a0S., Maulana, H.: \u201cA comprehensive review of cobit and iso 27001: Approaches to auditing credit bureau automation system (cbas) at pt xyz,\u201d in 2023 9th International Conference on Signal Processing and Intelligent Systems (ICSPIS), pp.\u00a01\u20138, IEEE, 2023","DOI":"10.1109\/ICSPIS59665.2023.10402713"},{"key":"1121_CR11","unstructured":"GDPR.eu, \u201cWhat is gdpr, the eu\u2019s new data protection law?.\u201d https:\/\/gdpr.eu\/what-is-gdpr\/, 2018. Accessed: 2025-07-26"},{"key":"1121_CR12","unstructured":"LGA, \u201cGeneral data protection regulation (gdpr),\u201d 05 2018. Retrieved from Local Government Association"},{"key":"1121_CR13","unstructured":"GDPR.EU, \u201cWhat is gdpr, the eu\u2019s new data protection law?,\u201d 05 2018. Retrieved from GDPR.EU"},{"key":"1121_CR14","unstructured":"ICO, \u201cInformation rights at the end of the transition period frequently asked questions,\u201d tech. rep., ICO, 2020. Retrieved from ICO"},{"key":"1121_CR15","doi-asserted-by":"crossref","unstructured":"Mangini, V., Tal, I., Moldovan, A.-N.: \u201cAn empirical study on the impact of gdpr and right to be forgotten-organisations and users perspective,\u201d in Proceedings of the 15th international conference on availability, reliability and security, pp.\u00a01\u20139, 2020","DOI":"10.1145\/3407023.3407080"},{"key":"1121_CR16","unstructured":"European Union Agency for Cybersecurity (ENISA), \u201cEnisa cybereducation platform.\u201d https:\/\/tools.enisa.europa.eu\/topics\/education\/cyberedu#\/, 2024. Accessed: 27 July 2025"},{"key":"1121_CR17","unstructured":"CISA, \u201c4 things you can do to keep yourself cyber safe,\u201d 12 2022. Retrieved from Cybersecurity and Infrastructure Security Agency"},{"key":"1121_CR18","unstructured":"Cyberspace Administration of China, \u201cCyberspace administration of china,\u201d 08 2021. Retrieved from Cyberspace Administration of China"},{"key":"1121_CR19","unstructured":"UK Government Security, \u201cCyber security behaviours campaign materials,\u201d n.d. Retrieved from UK Government Security"},{"issue":"9","key":"1121_CR20","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1108\/TQM-07-2022-0220","volume":"35","author":"M Podrecca","year":"2023","unstructured":"Podrecca, M., Sartor, M.: Forecasting the diffusion of iso\/iec 27001: a grey model approach. The TQM Journal 35(9), 123\u2013151 (2023)","journal-title":"The TQM Journal"},{"key":"1121_CR21","unstructured":"NIST, \u201cNist cybersecurity framework 2.0 concept paper: Potential significant updates to the cybersecurity framework,\u201d tech. rep., National Institute of Standards and Technology, 01 2023. Retrieved from NIST"},{"issue":"3","key":"1121_CR22","first-page":"417","volume":"12","author":"M Syafrizal","year":"2020","unstructured":"Syafrizal, M., Selamat, S.R., Zakaria, N.A.: Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security 12(3), 417\u2013432 (2020)","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"1121_CR23","unstructured":"IASME, \u201cIasme cyber assurance,\u201d n.d. Retrieved from IASME Consortium"},{"key":"1121_CR24","unstructured":"ETSI, \u201cCyber,\u201d 2024. Retrieved from ETSI"},{"key":"1121_CR25","unstructured":"NIST, \u201cNist special publication,\u201d n.d. Retrieved from NIST"},{"issue":"14","key":"1121_CR26","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.3390\/electronics11142181","volume":"11","author":"H Taherdoost","year":"2022","unstructured":"Taherdoost, H.: Understanding cybersecurity frameworks and information security standards-a review and comprehensive overview. Electronics 11(14), 2181 (2022)","journal-title":"Electronics"},{"key":"1121_CR27","doi-asserted-by":"crossref","unstructured":"Toussaint, M., Krima, S., Panetto, H.: \u201cIndustry 4.0 data security: A cybersecurity frameworks review,\u201d Journal of Industrial Information Integration, p.\u00a0100604, 2024","DOI":"10.1016\/j.jii.2024.100604"},{"issue":"3","key":"1121_CR28","doi-asserted-by":"crossref","first-page":"422","DOI":"10.3390\/network3030018","volume":"3","author":"M Chauhan","year":"2023","unstructured":"Chauhan, M., Shiaeles, S.: An analysis of cloud security frameworks, problems and proposed solutions. Network 3(3), 422\u2013450 (2023)","journal-title":"Network"},{"key":"1121_CR29","unstructured":"Jin, Y.: \u201cHow we\u2019re improving search results when you use quotes,\u201d 08 2022. Retrieved from Google Keyword"},{"issue":"9","key":"1121_CR30","volume":"33","author":"C Ponsard","year":"2021","unstructured":"Ponsard, C., Grandclaudon, J., Massonet, P.: A goal-driven approach for the joint deployment of safety and security standards for operators of essential services. Journal of Software: Evolution and Process 33(9), e2338 (2021)","journal-title":"Journal of Software: Evolution and Process"},{"key":"1121_CR31","unstructured":"Cambridge Dictionary, \u201cFramework,\u201d n.d. Retrieved from Cambridge Dictionary"},{"key":"1121_CR32","unstructured":"ISO, \u201cIso\/iec 27001:2022,\u201d 2022. Retrieved from ISO-International Organisation for Standardization"},{"key":"1121_CR33","doi-asserted-by":"crossref","unstructured":"NIST, \u201cThe nist cybersecurity framework (csf) 2.0,\u201d tech. rep., National Institute of Standards and Technology, 02 2024. Retrieved from NIST","DOI":"10.6028\/NIST.CSWP.29.ger"},{"issue":"3","key":"1121_CR34","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1108\/ICS-10-2018-0122","volume":"27","author":"A Dedeke","year":"2019","unstructured":"Dedeke, A., Masterson, K.: Contrasting cybersecurity implementation frameworks (cif) from three countries. Information & Computer Security 27(3), 373\u2013392 (2019)","journal-title":"Information & Computer Security"},{"key":"1121_CR35","unstructured":"Dictionary, O.\u00a0E.: \u201cStandard,\u201d n.d. Retrieved from Oxford English Dictionary"},{"key":"1121_CR36","unstructured":"Australia, S.: \u201cWhat is a standard?,\u201d 2024. Retrieved from Standards Australia"},{"key":"1121_CR37","unstructured":"ISO, \u201cIso\/iec 27001 information security management systems,\u201d 10 2022. Retrieved from ISO"},{"key":"1121_CR38","doi-asserted-by":"crossref","unstructured":"Rajak, C., Bharti, J., Mateen, A., Mehndiratta, N., Chauhan, J., Marndi, R.: \u201cA roadmap to isms iso 27001 implementation process,\u201d in 2023 3rd International Conference on Range Technology (ICORT), pp.\u00a01\u20135, IEEE, 2023","DOI":"10.1109\/ICORT56052.2023.10249115"},{"key":"1121_CR39","unstructured":"Hurkadli, P.: \u201cCobit 2019 framework,\u201d 08 2023. Retrieved from ITIL Docs"},{"key":"1121_CR40","unstructured":"ISACA, \u201cEffective it governance at your fingertips,\u201d n.d. Retrieved from The Information Systems Audit and Control Association"},{"key":"1121_CR41","unstructured":"ISACA, \u201cIntroducing cobit 2019 overview,\u201d 11 2018. Retrieved from ISACA"},{"key":"1121_CR42","unstructured":"Curtis, B.:\u201cIntegrating mitre with cobit: Goals cascading from the strategic to tactical levels,\u201d may 2022. Retrieved from ISACA"},{"key":"1121_CR43","unstructured":"ISACA, \u201cCobit 5 certificates,\u201d 2024. Retrieved from ISACA"},{"key":"1121_CR44","unstructured":"COSO, \u201cEnterprise risk management,\u201d 2023. Retrieved from COSO"},{"key":"1121_CR45","unstructured":"Posey, B.:\u201cCoso framework,\u201d 2023. Retrieved from TechTarget"},{"key":"1121_CR46","unstructured":"COSO, \u201cInternal control-integrated framework,\u201d 2023. Retrieved from COSO"},{"key":"1121_CR47","unstructured":"Leland, A. \u201cFundamentals of the coso framework: Building blocks for integrated internal controls,\u201d 05 2023. Retrieved from AuditBoard"},{"key":"1121_CR48","unstructured":"governance, I.: \u201cIso\/iec 27001 - information security management,\u201d 2024. Retrieved from IT governance"},{"key":"1121_CR49","unstructured":"Belding, G.: \u201cIso 27001 framework: What it is and how to comply,\u201d 07 2021. Retrieved from InfoSec"},{"key":"1121_CR50","unstructured":"Kosutic, D.: \u201cWhat is iso 27001? a quick and easy explanation,\u201d 2024. Retrieved from Advisera"},{"key":"1121_CR51","unstructured":"ISO, \u201cAbout iso,\u201d n.d. Retrieved from ISO"},{"key":"1121_CR52","unstructured":"ISO, \u201cIso in figures,\u201d 12 2024. Retrieved from ISO"},{"issue":"6","key":"1121_CR53","first-page":"8","volume":"37","author":"W List","year":"1995","unstructured":"List, W.: Bs 7799 the code of practice for information security management. ITNOW 37(6), 8\u20139 (1995)","journal-title":"ITNOW"},{"key":"1121_CR54","doi-asserted-by":"crossref","unstructured":"Tipton, H.\u00a0F., Krause, M.: Information security management handbook. CRC press, 2007","DOI":"10.1201\/9781439833032"},{"key":"1121_CR55","unstructured":"ENISA, \u201cIso\/iec 27001 (bs7799-2:2002),\u201d 2024. Retrieved from ENISA"},{"key":"1121_CR56","unstructured":"Australia, S.: \u201cAs\/nzs iso\/iec 27001:2023,\u201d 09 2023. Retrieved from Standards Australia Store"},{"key":"1121_CR57","unstructured":"UKAS, \u201cTransition arrangements for iso\/iec 27001:2022,\u201d 12 2022. Retrieved from UKAS"},{"key":"1121_CR58","unstructured":"Barker, S.: \u201cIso 27001 certification cost: Everything you need to know,\u201d 2024. Retrieved from HighTable"},{"key":"1121_CR59","doi-asserted-by":"crossref","unstructured":"Banoth, R., Narsimha, G., Godishala, A.\u00a0K.: A Comprehensive Guide to Information Security Management and Audit. CRC Press, 2022","DOI":"10.1201\/9781003322191"},{"issue":"30","key":"1121_CR60","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.ifacol.2018.11.283","volume":"51","author":"M G\u00ebrvalla","year":"2018","unstructured":"G\u00ebrvalla, M., Preniqi, N., Kopacek, P.: It infrastructure library (itil) framework approach to it governance. IFAC-PapersOnLine 51(30), 181\u2013185 (2018)","journal-title":"IFAC-PapersOnLine"},{"key":"1121_CR61","unstructured":"Anand, A.: \u201cItil 4 explained - what\u2019s new in it service management.\u201d https:\/\/itsm.tools\/itil-4-explained\/, January 2024. Retrieved from ITSM Tools"},{"key":"1121_CR62","unstructured":"Avinash, V.: \u201cWhat is itil?,\u201d 08 2023. Retrieved from ITIL Docs"},{"key":"1121_CR63","unstructured":"Atlassian, \u201cItil service strategy & itil processes,\u201d 2024. Retrieved from Atlassian"},{"key":"1121_CR64","doi-asserted-by":"crossref","unstructured":"Santosa, I., Mulyana, R.: \u201cThe it services management architecture design for large and medium-sized companies based on itil 4 and togaf framework,\u201d JOIV: International Journal on Informatics Visualization, vol.\u00a07, no.\u00a01, pp.\u00a030\u201336, 2023","DOI":"10.30630\/joiv.7.1.1590"},{"key":"1121_CR65","unstructured":"itSMF UK, \u201cIntroductory overview of itil 4,\u201d 10 2020. Retrieved from itSMF UK"},{"key":"1121_CR66","unstructured":"ALELOS, \u201cITIL\u00ae 4: the framework for the management of IT-enabled services.\u201d https:\/\/www.axelos.com\/certifications\/itil-service-management, 2024. Retrieved from ALELOS"},{"key":"1121_CR67","unstructured":"NIST, \u201cSecurity content automation protocol,\u201d 05 2024. Retrieved from NIST"},{"key":"1121_CR68","unstructured":"IBM, \u201cWhat is the nist cybersecurity framework?,\u201d 2024. Retrieved from IBM"},{"key":"1121_CR69","unstructured":"ISC2, \u201cIntroduction to the nist cybersecurity framework certificate,\u201d 2024. Retrieved from ISC2"},{"key":"1121_CR70","unstructured":"NICCS, \u201cCertified nist cybersecurity framework 2.0 lead implementer (csf li),\u201d 05 2024. Retrieved from NICCS"},{"key":"1121_CR71","unstructured":"ISO, \u201cIso\/iec 27002:2022,\u201d 2022. Retrieved from ISO"},{"key":"1121_CR72","unstructured":"BCS, \u201cThe importance of bs7799,\u201d 03 2008. Retrieved from BCS"},{"key":"1121_CR73","unstructured":"ISO, \u201cIso\/iec 27002:2022,\u201d 2022. Retrieved from ISO"},{"key":"1121_CR74","unstructured":"Secureframe, \u201cIso\/iec 15408,\u201d 2023. Retrieved from Secureframe"},{"key":"1121_CR75","unstructured":"ISO\/IEC, \u201cIso\/iec 15408-1:2022(en) information security, cybersecurity and privacy protection - evaluation criteria for it security - part 1: Introduction and general model,\u201d 2022. Retrieved from ISO\/IEC 15408-1:2022(en)"},{"key":"1121_CR76","doi-asserted-by":"crossref","unstructured":"Bao, D., Sun, W., Goto, Y., Cheng, J.: \u201cDevelopment of supporting environment for it system security evaluation based on iso\/iec 15408 and iso\/iec 18045,\u201d in 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), pp.\u00a0204\u2013209, IEEE, 2018","DOI":"10.1109\/SmartWorld.2018.00070"},{"key":"1121_CR77","doi-asserted-by":"crossref","unstructured":"Chen, H., Bao, D., Goto, Y., Cheng, J.: \u201cA supporting environment for it system security evaluation based on iso\/iec 15408 and iso\/iec 18045,\u201d in Computer Science and its Applications: Ubiquitous Information Technologies, pp.\u00a01359\u20131366, Springer, 2015","DOI":"10.1007\/978-3-662-45402-2_189"},{"key":"1121_CR78","unstructured":"ISA, \u201cConformity assessment programs at isa,\u201d 2024. Retrieved from ISA"},{"key":"1121_CR79","unstructured":"ISA, \u201cUnited nations commission to integrate isa standards into cybersecurity regulatory framework,\u201d 01 2019. Retrieved from ISA"},{"key":"1121_CR80","unstructured":"ISASecure, \u201cAccredited isasecure certification bodies,\u201d 2024. Retrieved from ISASecure"},{"key":"1121_CR81","unstructured":"ISA, \u201cIsa\/iec 62443 cybersecurity certificate program,\u201d 2024. Retrieved from ISA"},{"key":"1121_CR82","unstructured":"ISASecure, \u201cIsasecure certifications,\u201d 2024. Retrieved from ISASecure"},{"key":"1121_CR83","unstructured":"ISA, \u201cIsa\/iec 62443 series of standards,\u201d 2024. Retrieved from ISA"},{"key":"1121_CR84","unstructured":"ISO, \u201cIso\/iec 27032:2023(en),\u201d 2023. Retrieved from ISO"},{"issue":"4","key":"1121_CR85","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3390\/fi11040089","volume":"11","author":"F Salahdine","year":"2019","unstructured":"Salahdine, F., Kaabouch, N.: Social engineering attacks: A survey. Future internet 11(4), 89 (2019)","journal-title":"Future internet"},{"issue":"10","key":"1121_CR86","doi-asserted-by":"crossref","first-page":"10733","DOI":"10.1007\/s10462-023-10437-z","volume":"56","author":"R Ahmad","year":"2023","unstructured":"Ahmad, R., Alsmadi, I., Alhamdani, W., Tawalbeh, L.: Zero-day attack detection: a systematic literature review. Artif. Intell. Rev. 56(10), 10733\u201310811 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"1121_CR87","doi-asserted-by":"crossref","unstructured":"Liu, Y., Hu, B.: \u201cSecurity baseline verification technology for domestic computer terminal based on scap,\u201d in 2023 IEEE 5th International Conference on Power, Intelligent Computing and Systems (ICPICS), pp.\u00a0171\u2013174, IEEE, 2023","DOI":"10.1109\/ICPICS58376.2023.10235334"},{"key":"1121_CR88","doi-asserted-by":"crossref","unstructured":"Cook, M., Quinn, S., Waltermire, D., Prisaca, D.: \u201cSecurity content automation protocol (scap) version 1.3 validation program test requirements,\u201d tech. rep., NIST, 04 2018. Retrieved from NIST","DOI":"10.6028\/NIST.IR.7511r5"},{"key":"1121_CR89","doi-asserted-by":"crossref","unstructured":"Waltermire, D., Quinn, S., Booth, H., Scarfone, K., Prisaca, D.: \u201cThe technical specification for the security content automation protocol (scap),\u201d nist special publication 800-126, NIST, 2018. Retrieved from NIST","DOI":"10.6028\/NIST.SP.800-126r3"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01121-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01121-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01121-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:38:53Z","timestamp":1760614733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01121-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,12]]},"references-count":89,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1121"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01121-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,12]]},"assertion":[{"value":"1 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"206"}}