{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:23:59Z","timestamp":1769919839042,"version":"3.49.0"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005626","name":"Universit\u00e4t Regensburg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005626","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Cyber threat intelligence (CTI) provides actionable insights into the threat landscape, helping organizations strengthen their defenses. Because commercial CTI is costly, inter-organizational sharing can reduce expenses, yet adoption remains limited. Still, the design of effective incentives for CTI sharing and their embedding in a sharing platform remains underexplored. We conducted 15 semi-structured interviews with security professionals to elicit incentive requirements and design options. We find that organizations prefer to share CTI with known recipients to build trust and support GDPR compliance. They also value mechanisms that lower coordination costs, such as a reputation system and price guidance to help prioritize scarce analyst time. Further, a major barrier is skepticism about the net benefits of sharing. To address this, we propose financial compensation for contributed CTI and a marketing label that signals proactive cybersecurity to partners and customers. We implemented these incentives in a platform prototype and assessed their effects in 14 hands-on sessions with security experts. Participants reported increased willingness to share, suggesting that well-designed incentives can catalyze CTI-sharing ecosystems. Put simply, organizations can share and benefit.<\/jats:p>","DOI":"10.1007\/s10207-025-01165-2","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T14:14:49Z","timestamp":1769091289000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Share and benefit: incentives for cyber threat intelligence sharing"],"prefix":"10.1007","volume":"25","author":[{"given":"Tobias","family":"Reittinger","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Grill","sequence":"additional","affiliation":[]},{"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,22]]},"reference":[{"key":"1165_CR1","unstructured":"Microsoft Corporation. Microsoft digital defense report 2024: The foundations and new frontiers of cybersecurity (2024). https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/threat-landscape\/microsoft-digital-defense-report-2024. Accessed: 07\/06\/25"},{"key":"1165_CR2","unstructured":"Deloitte Global. The promise of cyber: Global future of cyber survey (4th edition) (2024). https:\/\/www.deloitte.com\/global\/en\/services\/consulting-risk\/research\/global-future-of-cyber.html. Accessed: 07\/06\/25"},{"key":"1165_CR3","unstructured":"Statista. Estimated cost of cybercrime worldwide 2018-2029 (2025). https:\/\/www.statista.com\/forecasts\/1280009\/cost-cybercrime-worldwide. Accessed: 11\/14\/25"},{"issue":"2","key":"1165_CR4","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/g8020023","volume":"8","author":"K Hausken","year":"2017","unstructured":"Hausken, K.: Security investment, hacking, and information sharing between firms and between hackers. Games 8(2), 23 (2017)","journal-title":"Games"},{"key":"1165_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101589","volume":"87","author":"TD Wagner","year":"2019","unstructured":"Wagner, T.D., Mahbub, K., Palomar, E., Abdallah, A.E.: Cyber threat intelligence sharing: Survey and research directions. Computers & Security 87, 101589 (2019)","journal-title":"Computers & Security"},{"key":"1165_CR6","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.cose.2017.09.001","volume":"72","author":"W Tounsi","year":"2018","unstructured":"Tounsi, W., Rais, H.: A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers & security 72, 212 (2018)","journal-title":"Computers & security"},{"key":"1165_CR7","unstructured":"Bouwman, X., Griffioen, H., Egbers, J., Doerr, C., Klievink, B., Van\u00a0Eeten, M.: A different cup of ti the added value of commercial threat intelligence, In: 29th USENIX security symposium (USENIX security 20), pp. 433\u2013450 (2020)"},{"key":"1165_CR8","doi-asserted-by":"crossref","unstructured":"Liao, X., Yuan, K., Wang, X., Li, Z., Xing, L., Beyah, R.: Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence, In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 755\u2013766 (2016)","DOI":"10.1145\/2976749.2978315"},{"key":"1165_CR9","doi-asserted-by":"crossref","unstructured":"Jin, B., Kim, E., Lee, H., Bertino, E., Kim, D., Kim, H.: Sharing cyber threat intelligence: Does it really help?, In: 31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024 The Internet Society, (2024)","DOI":"10.14722\/ndss.2024.24228"},{"key":"1165_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103786","volume":"83","author":"P Alaeifar","year":"2024","unstructured":"Alaeifar, P., Pal, S., Jadidi, Z., Hussain, M., Foo, E.: Current approaches and future directions for cyber threat intelligence sharing: A survey. Journal of Information Security and Applications 83, 103786 (2024)","journal-title":"Journal of Information Security and Applications"},{"key":"1165_CR11","doi-asserted-by":"crossref","unstructured":"Geras, T., Schreck, T.: Sharing communities: The good, the bad, and the ugly, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2755\u20132769 (2023)","DOI":"10.1145\/3576915.3623144"},{"issue":"5","key":"1165_CR12","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s10207-020-00528-1","volume":"20","author":"F Menges","year":"2021","unstructured":"Menges, F., Putz, B., Pernul, G.: Dealer: decentralized incentives for threat intelligence reporting and exchange. Int. J. Inf. Secur. 20(5), 741 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"1165_CR13","volume-title":"Intrinsic motivation and self-determination in human behavior","author":"EL Deci","year":"2013","unstructured":"Deci, E.L., Ryan, R.M.: Intrinsic motivation and self-determination in human behavior. Springer Science & Business Media, Berlin (2013)"},{"issue":"2","key":"1165_CR14","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2307\/2095101","volume":"48","author":"PJ DiMaggio","year":"1983","unstructured":"DiMaggio, P.J., Powell, W.W., et al.: The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. Am. Sociol. Rev. 48(2), 147 (1983)","journal-title":"Am. Sociol. Rev."},{"key":"1165_CR15","unstructured":"PAMELA, S.T.: The institutionalization of institutional theory, Studying organization: Theory and method p. 169 (1999)"},{"issue":"6","key":"1165_CR16","first-page":"1404","volume":"35","author":"AJ Hillman","year":"2009","unstructured":"Hillman, A.J., Withers, M.C., Collins, B.J.: Resource dependence theory: A review. J. Manag. 35(6), 1404 (2009)","journal-title":"J. Manag."},{"key":"1165_CR17","unstructured":"Pfeffer, J., Salancik, G.: In: Organizational behavior 2 Routledge, pp. 355\u2013370, (2015)"},{"key":"1165_CR18","doi-asserted-by":"crossref","unstructured":"Reittinger, T., Pernul, G.: A taxonomy of positive incentives to motivate cybersecurity behaviors, In: Proceedings of the 58th HI International Conference on System Sciences (HICSS-58) (2025)","DOI":"10.24251\/HICSS.2025.545"},{"key":"1165_CR19","doi-asserted-by":"crossref","unstructured":"Reittinger, T., Glas, M., Aminzada, S., Pernul, G.: Employee motivation in organizational cybersecurity: Matching theory and reality, In: International Symposium on Human Aspects of Information Security and Assurance, Springer, pp. 3\u201316 (2024)","DOI":"10.1007\/978-3-031-72559-3_1"},{"key":"1165_CR20","doi-asserted-by":"crossref","unstructured":"Reittinger, T., Glas, M., Aminzada, S., Pernul, G.: Motivational factors in cybersecurity: linking theory to organizational practice, Information & Computer Security (2025)","DOI":"10.1108\/ICS-02-2025-0046"},{"issue":"1","key":"1165_CR21","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1146\/annurev-economics-080511-110909","volume":"4","author":"E Kamenica","year":"2012","unstructured":"Kamenica, E.: Behavioral economics and psychology of incentives. Annu. Rev. Econ. 4(1), 427 (2012)","journal-title":"Annu. Rev. Econ."},{"key":"1165_CR22","first-page":"52","volume":"1112","author":"A Bryson","year":"2012","unstructured":"Bryson, A., Freeman, R., Lucifora, C., Pellizzari, M., Perotin, V., et al.: Paying for performance: incentive pay schemes and employees\u2019 financial participation. CEP discussion paper 1112, 52\u201375 (2012)","journal-title":"CEP discussion paper"},{"key":"1165_CR23","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1023\/A:1011557319152","volume":"1","author":"RA Malaga","year":"2001","unstructured":"Malaga, R.A.: Web-based reputation management systems: Problems and suggested solutions. Electron. Commer. Res. 1, 403 (2001)","journal-title":"Electron. Commer. Res."},{"key":"1165_CR24","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1146\/annurev-economics-080315-015325","volume":"8","author":"S Tadelis","year":"2016","unstructured":"Tadelis, S.: Reputation and feedback systems in online platform markets. Annual Review of Economics 8, 321 (2016)","journal-title":"Annual Review of Economics"},{"key":"1165_CR25","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10603-004-7298-6","volume":"28","author":"G Jahn","year":"2005","unstructured":"Jahn, G., Schramm, M., Spiller, A.: The reliability of certification: Quality labels as a consumer policy tool. J. Consum. Policy 28, 53 (2005)","journal-title":"J. Consum. Policy"},{"key":"1165_CR26","doi-asserted-by":"publisher","unstructured":"de Melo e Silva, A., Costa Gondim, J.J., de Oliveira Albuquerque, R., Garc\u00eda Villalba, L.J.: A methodology to evaluate standards and platforms within cyber threat intelligence. Future Internet 12(6), 108 (2020). https:\/\/doi.org\/10.3390\/fi12060108","DOI":"10.3390\/fi12060108"},{"key":"1165_CR27","unstructured":"OASIS. Oasis stix documentation (2024). https:\/\/oasis-open.github.io\/cti-documentation\/stix\/intro. Accessed: 07\/06\/25"},{"key":"1165_CR28","unstructured":"Corporation, M.: Mitre ATT&CK website (2025). https:\/\/attack.mitre.org\/. Accessed: 07\/06\/25"},{"key":"1165_CR29","doi-asserted-by":"publisher","unstructured":"Sunyaev, A.: In: Internet Computing, vol.\u00a02, ed. by A.\u00a0Sunyaev Springer International Publishing, Cham, (2020), pp. 265\u201329. https:\/\/doi.org\/10.1007\/978-3-030-34957-8_9","DOI":"10.1007\/978-3-030-34957-8_9"},{"key":"1165_CR30","doi-asserted-by":"crossref","unstructured":"El\u00a0Ioini, N., Pahl, C.: A review of distributed ledger technologies, In: On the Move to Meaningful Internet Systems. OTM 2018 Conferences, ed. by H.\u00a0Panetto, C.\u00a0Debruyne, H.A. Proper, C.A. Ardagna, D.\u00a0Roman, R.\u00a0Meersman Springer International Publishing, Cham, pp. 277\u2013288 (2018)","DOI":"10.1007\/978-3-030-02671-4_16"},{"key":"1165_CR31","unstructured":"De\u00a0Angelis, S., Zanfino, G., Aniello, L., Lombardi, F., Sassone, V.: Blockchain and cybersecurity: a taxonomic approach, In: Workshop. EU Blockchain Observatory (2019)"},{"key":"1165_CR32","unstructured":"Willis, G.B.: Cognitive interviewing: A tool for improving questionnaire design, sage publications, (2004)"},{"issue":"2","key":"1165_CR33","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1177\/0049124118799377","volume":"50","author":"NM Deterding","year":"2021","unstructured":"Deterding, N.M., Waters, M.C.: Flexible coding of in-depth interviews: A twenty-first-century approach. Sociological methods & research 50(2), 708 (2021)","journal-title":"Sociological methods & research"},{"key":"1165_CR34","doi-asserted-by":"crossref","unstructured":"G.R. Gibbs, Thematic coding and categorizing, Analyzing qualitative data 703(38-56) (2007)","DOI":"10.4135\/9781849208574.n4"},{"key":"1165_CR35","doi-asserted-by":"crossref","unstructured":"Caine, K.: Local standards for sample size at chi, In: Proceedings of the 2016 CHI conference on human factors in computing systems (2016), pp. 981\u2013992","DOI":"10.1145\/2858036.2858498"},{"key":"1165_CR36","doi-asserted-by":"crossref","unstructured":"Nweke, L.O., Wolthusen, S.: Legal issues related to cyber threat information sharing among private entities for critical infrastructure protection, In: 2020 12th International Conference on Cyber Conflict (CyCon), vol. 1300 (IEEE, 2020), vol. 1300, pp. 63\u201378","DOI":"10.23919\/CyCon49761.2020.9131721"},{"key":"1165_CR37","unstructured":"DIHK. Industrie- und handelskammern (german trade associations). https:\/\/www.dihk.de\/de\/ueber-uns\/die-ihk-organisation\/industrie-und-handelskammern. Accessed: 07\/06\/25"},{"key":"1165_CR38","unstructured":"European Union. General data protection regulation (gdpr) (2016). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A02016R0679-20160504&qid=1532348683434. Accessed: 07\/06\/25"},{"key":"1165_CR39","unstructured":"Netwrix. Netwrix cloud data security report (2019). https:\/\/www.netwrix.com\/2019cloudsecurityreport.html. Accessed: 07\/06\/25"},{"key":"1165_CR40","unstructured":"Capgemini. Capgemini cloud sovereignty: The road ahead (2022). https:\/\/www.capgemini.com\/insights\/research-library\/cloud-sovereignty\/. Accessed: 07\/06\/25"},{"key":"1165_CR41","unstructured":"Federal Bureau of Investigation. 2023 cryptocurrency fraud report released (2024). https:\/\/www.fbi.gov\/news\/stories\/2023-cryptocurrency-fraud-report-released. Accessed: 07\/06\/25"},{"key":"1165_CR42","unstructured":"The Linux Foundation. Hyperledger besu (2025). https:\/\/github.com\/hyperledger\/besu. Accessed: 07\/06\/25"},{"key":"1165_CR43","unstructured":"Couchbase, Inc. Couchbase (2025). https:\/\/github.com\/couchbase. Accessed: 07\/06\/25"},{"key":"1165_CR44","unstructured":"OpenJS Foundation. Node.js (2025). https:\/\/github.com\/nodejs. Accessed: 07\/06\/25"},{"key":"1165_CR45","unstructured":"Laravel Holdings Inc. Laravel (2025). https:\/\/github.com\/laravel\/framework. Accessed: 07\/06\/25"},{"key":"1165_CR46","unstructured":"European Union. Regulation (eu) 2024\/1624 of the european parliament and of the council of 31 may 2024 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing (2024). https:\/\/eur-lex.europa.eu\/eli\/reg\/2024\/1624\/oj\/eng. Accessed: 07\/06\/25"},{"key":"1165_CR47","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10207-020-00490-y","volume":"20","author":"D Schlette","year":"2021","unstructured":"Schlette, D., B\u00f6hm, F., Caselli, M., Pernul, G.: Measuring and visualizing cyber threat intelligence quality. Int. J. Inf. Secur. 20, 21 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"1165_CR48","unstructured":"Rinberg, R., Agarwal, N.: Privacy when everyone is watching: An sok on anonymity on the blockchain, Cryptology ePrint Archive (2022)"},{"key":"1165_CR49","unstructured":"Petkus, M.: Why and how zk-snark works, arXiv preprint arXiv:1906.07221 (2019)"},{"key":"1165_CR50","doi-asserted-by":"crossref","unstructured":"C.\u00a0Fan, C.\u00a0Lin, H.\u00a0Khazaei, P.\u00a0Musilek, Performance analysis of hyperledger besu in private blockchain, In: 2022 IEEE international conference on decentralized applications and infrastructures (DAPPS) (IEEE, 2022), pp. 64\u201373","DOI":"10.1109\/DAPPS55202.2022.00016"},{"key":"1165_CR51","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","volume":"30","author":"A M\u00fchle","year":"2018","unstructured":"M\u00fchle, A., Gr\u00fcner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Computer Science Review 30, 80 (2018)","journal-title":"Computer Science Review"},{"issue":"2","key":"1165_CR52","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11235-019-00613-4","volume":"73","author":"R Riesco","year":"2020","unstructured":"Riesco, R., Larriva-Novo, X., Villagr\u00e1, V.A.: Cybersecurity threat intelligence knowledge exchange based on blockchain: Proposal of a new incentive model based on blockchain and smart contracts to foster the cyber threat and risk intelligence exchange of information. Telecommun. Syst. 73(2), 259 (2020)","journal-title":"Telecommun. Syst."},{"issue":"3","key":"1165_CR53","doi-asserted-by":"publisher","first-page":"521","DOI":"10.3390\/electronics9030521","volume":"9","author":"S Gong","year":"2020","unstructured":"Gong, S., Lee, C.: Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance. Electronics 9(3), 521 (2020)","journal-title":"Electronics"},{"key":"1165_CR54","doi-asserted-by":"crossref","unstructured":"K.\u00a0Nguyen, S.\u00a0Pal, Z.\u00a0Jadidi, A.\u00a0Dorri, R.\u00a0Jurdak, A blockchain-enabled incentivised framework for cyber threat intelligence sharing in ics, In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (IEEE, 2022), pp. 261\u2013266","DOI":"10.1109\/PerComWorkshops53856.2022.9767226"},{"key":"1165_CR55","doi-asserted-by":"crossref","unstructured":"Alexopoulos, N., Vasilomanolakis, E., Roux, S.L., Rowe, S., M\u00fchlh\u00e4user, M.: Trident: towards a decentralized threat indicator marketplace, In: Proceedings of the 35th Annual ACM Symposium on Applied Computing (2020), pp. 332\u2013341","DOI":"10.1145\/3341105.3374020"},{"key":"1165_CR56","doi-asserted-by":"crossref","unstructured":"Wagner, C., Dulaunoy, A., Wagener, G., Iklody, A.: MISP: the design and implementation of a collaborative threat intelligence sharing platform, In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, Vienna, Austria, October 24 - 28, 2016 (ACM, 2016), pp. 49\u201356","DOI":"10.1145\/2994539.2994542"},{"key":"1165_CR57","unstructured":"Baumer, T., Reittinger, T., Kern, S., Pernul, G.: Digital nudges for access reviews: Guiding deciders to revoke excessive authorizations, In: Twentieth Symposium on Usable Privacy and Security (SOUPS 2024) (2024), pp. 239\u2013258"},{"key":"1165_CR58","doi-asserted-by":"crossref","unstructured":"Fischer, D., Sauerwein, C., Werchan, M., Stelzer, D.: An exploratory study on the use of threat intelligence sharing platforms in germany, austria and switzerland, In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023 (ACM, 2023), pp. 30:1\u201330:7","DOI":"10.1145\/3600160.3600185"},{"key":"1165_CR59","unstructured":"CIRCL. MISP documentation (2024). https:\/\/www.circl.lu\/doc\/misp\/. Accessed: 07\/06\/25"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01165-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01165-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01165-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:39Z","timestamp":1769875659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01165-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,22]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1165"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01165-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,22]]},"assertion":[{"value":"30 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"During the preparation of this work, the authors used DeepL, Grammarly, and ChatGPT (Version 4o) in order to improve readability and language. After using this tool, the authors reviewed and edited the content as needed and take full responsibility for the content of the publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"AI Acknowledgement"}},{"value":"One of the authors, G\u00fcnther Pernul, is a member of the editorial board.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"37"}}