{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:00:06Z","timestamp":1776074406156,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"DOI":"10.1007\/s10207-025-01192-z","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:26:50Z","timestamp":1770280010000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A bonus and penalty mechanism as an incentive for cybersecurity investments"],"prefix":"10.1007","volume":"25","author":[{"given":"Artsiom","family":"Yautsiukhin","sequence":"first","affiliation":[]},{"given":"Natallia","family":"Kavalionak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"key":"1192_CR1","unstructured":"PwC. global risk report. Available via https:\/\/pwcplus.de\/en\/article\/247006\/global-risks-report-2025\/ on 12\/08\/2025 (2025)"},{"key":"1192_CR2","unstructured":"MunicRe. Cyber insurancerisks and trends (2024). Available via https:\/\/www.munichre.com\/en\/insights\/cyber\/cyber-insurance-risks-and-trends-2024.html on 12\/04\/2024"},{"key":"1192_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ijcip.2016.04.001","volume":"14","author":"D Young","year":"2016","unstructured":"Young, D., Lopez, J., Rice, M., Ramsey, B., McTasney, R.: A framework for incorporating insurance in critical infrastructure cyber risk strategies. Int. J. Crit. Infrastruct. Prot. 14, 43 (2016). https:\/\/doi.org\/10.1016\/j.ijcip.2016.04.001","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"4","key":"1192_CR4","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.3390\/smartcities7040081","volume":"7","author":"AP Zhao","year":"2024","unstructured":"Zhao, A.P., Fei, F.X., Alhazmi, M.: Cyber insurance for energy economic risks. Smart Cities 7(4), 2042 (2024). https:\/\/doi.org\/10.3390\/smartcities7040081","journal-title":"Smart Cities"},{"issue":"1","key":"1192_CR5","doi-asserted-by":"publisher","DOI":"10.1049\/rpg2.70011","volume":"19","author":"AP Zhao","year":"2025","unstructured":"Zhao, A.P., Gu, C., Bao, Z., Cheng, X., Alhazmi, M.: Optimizing cyber insurance and defense for multi?energy systems under false data injections. IET Renew. Power Gener. 19(1), e70011 (2025). https:\/\/doi.org\/10.1049\/rpg2.70011","journal-title":"IET Renew. Power Gener."},{"issue":"4","key":"1192_CR6","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/mc.2017.106","volume":"50","author":"JE Rossebo","year":"2017","unstructured":"Rossebo, J.E., Wolthuis, R., Fransen, F., Bjorkman, G., Medeiros, N.: An enhanced risk-assessment methodology for smart grids. Computer 50(4), 62 (2017). https:\/\/doi.org\/10.1109\/mc.2017.106","journal-title":"Computer"},{"key":"1192_CR7","unstructured":"UBITECH. Sdn-microsense risk assessment framework. online. https:\/\/ec.europa.eu\/research\/participants\/documents\/downloadPublic?documentIds=080166e5d3a01e71&appId=PPGMS"},{"issue":"1","key":"1192_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s13174-017-0059-y","volume":"8","author":"D Woods","year":"2017","unstructured":"Woods, D., Agrafiotis, I., Nurse, J.R.C., Creese, S.: Mapping the coverage of security controls in cyber insurance proposal forms. J. internet serv. appl. 8(1), 8 (2017). https:\/\/doi.org\/10.1186\/s13174-017-0059-y","journal-title":"J. internet serv. appl."},{"key":"1192_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cosrev.2017.01.001","volume":"24","author":"A Marotta","year":"2017","unstructured":"Marotta, A., Martinelli, F., Nanni, S., Orlando, A., Yautsiukhin, A.: Cyber-insurance survey. Comput. Sci. Rev. 24, 35 (2017). https:\/\/doi.org\/10.1016\/j.cosrev.2017.01.001","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"1192_CR10","doi-asserted-by":"publisher","first-page":"tyz002","DOI":"10.1093\/cybsec\/tyz002","volume":"5","author":"S Romanosky","year":"2019","unstructured":"Romanosky, S., Ablon, L., Kuehn, A., Jones, T.: Content analysis of cyber insurance policies: how do carriers price cyber risk? J. Cybersecur. 5(1), tyz002 (2019). https:\/\/doi.org\/10.1093\/cybsec\/tyz002","journal-title":"J. Cybersecur."},{"key":"1192_CR11","doi-asserted-by":"publisher","unstructured":"Farao, A., Panda, S., Menesidou, S.A., Veliou, E., Episkopos, N., Kalatzantonakis, G., Mohammadi, F., Georgopoulos, N., Sirivianos, M., Salamanos, N., Loizou, S., Pingos, M., Polley, J., Fielder, A., Panaousis, E., Xenakis, C.: SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions (Springer International Publishing, 2020), pp. 65\u201374. https:\/\/doi.org\/10.1007\/978-3-030-58986-8_5","DOI":"10.1007\/978-3-030-58986-8_5"},{"key":"1192_CR12","unstructured":"Woods, D.W., B\u00f6hme, R.: How cyber insurance shapes incident response: A mixed methods study. in Proceedings of the 20th Annual Workshop on the Economics of Information Security (2021). https:\/\/api.semanticscholar.org\/CorpusID:235498195"},{"key":"1192_CR13","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2020.102121","volume":"101","author":"G Uuganbayar","year":"2021","unstructured":"Uuganbayar, G., Yautsiukhin, A., Martinelli, F., Massacci, F.: Optimisation of cyber insurance coverage with selection of cost effective security controls. Computers & Security 101, 102 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102121","journal-title":"Computers & Security"},{"issue":"2","key":"1192_CR14","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/s13385-023-00366-0","volume":"14","author":"Q Xiang","year":"2024","unstructured":"Xiang, Q., Neufeld, A., Peters, G.W., Nevat, I., Datta, A.: A bonus-malus framework for cyber risk insurance and optimal cybersecurity provisioning. Eur. Actuar. J. 14(2), 581 (2024). https:\/\/doi.org\/10.1007\/s13385-023-00366-0","journal-title":"Eur. Actuar. J."},{"key":"1192_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104585","volume":"157","author":"Z Li","year":"2025","unstructured":"Li, Z., Liao, Q.: To insure or not to insure: How attackers exploit cyber-insurance via game theory. Computers & Security 157, 104585 (2025). https:\/\/doi.org\/10.1016\/j.cose.2025.104585","journal-title":"Computers & Security"},{"issue":"3","key":"1192_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.rie.2025.101059","volume":"79","author":"U Franke","year":"2025","unstructured":"Franke, U., Orlando, A.: Interdependent cyber risk and the role of insurers. Res. Econ. 79(3), 101059 (2025). https:\/\/doi.org\/10.1016\/j.rie.2025.101059","journal-title":"Res. Econ."},{"issue":"1","key":"1192_CR17","first-page":"30","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. TISSEC 3(1), 30 (2000). (http:\/\/dl.acm.org\/citation.cfm?id=353382)","journal-title":"Enforceable security policies. TISSEC"},{"key":"1192_CR18","unstructured":"Majuca, R.P., Yurcik, W., Kesan, J.P.: The evolution of cyberinsurance. The Computing Research Repository pp. pp 1\u201316 (2006). http:\/\/arxiv.org\/abs\/cs\/0601020"},{"key":"1192_CR19","unstructured":"Anderson, R., B\u00f6hme, R., Claytin, R., Moore, T.: Security economics and the internal market. Available via https:\/\/www.enisa.europa.eu\/publications\/archive\/economics-sec\/at_download\/fullReport on 15\/01\/2016"},{"key":"1192_CR20","unstructured":"Ogut, H., Menon, N., Raghunathan, S.: Cyber insurance and it security investment: Impact of interdependent risk. in Proceedings of the 4-th Workshop on the Economics of Information Security (2005). http:\/\/infosecon.net\/workshop\/pdf\/56.pdf"},{"key":"1192_CR21","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: Economic incentives to increase security in the internet: The case for insurance. in Proceedings of the 28th IEEE International Conference on Computer Communications (Rio de Janeiro, Brazil, 2009), pp. 1494\u20131502. http:\/\/www.di.ens.fr\/~lelarge\/papiers\/2009\/infocom09_cr.pdf","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"1192_CR22","doi-asserted-by":"publisher","unstructured":"Shetty, N., Schwartz, G., Walrand, J.: Can competitive insurers improve network security? in Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Lecture Notes in Computer Science, vol. 6101, ed. by A.\u00a0Acquisti, S.\u00a0Smith, A.R. Sadeghi (Springer Berlin Heidelberg, 2010), Lecture Notes in Computer Science, vol. 6101, pp. 308\u2013322. https:\/\/doi.org\/10.1007\/978-3-642-13869-0_23","DOI":"10.1007\/978-3-642-13869-0_23"},{"issue":"9","key":"1192_CR23","doi-asserted-by":"publisher","first-page":"2226","DOI":"10.1109\/TIFS.2018.2812205","volume":"13","author":"MM Khalili","year":"2018","unstructured":"Khalili, M.M., Naghizadeh, P., Liu, M.: Designing cyber insurance policies: The role of pre-screening and security interdependence. IEEE Trans. Inf. Forensics Secur. 13(9), 2226 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2812205","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"1192_CR24","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1111\/risa.13416","volume":"40","author":"A Mazzoccoli","year":"2020","unstructured":"Mazzoccoli, A., Naldi, M.: Robustness of optimal investment decisions in mixed insurance\/investment cyber risk management. Risk Anal. 40(3), 550 (2020). https:\/\/doi.org\/10.1111\/risa.13416","journal-title":"Risk Anal."},{"issue":"2","key":"1192_CR25","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1057\/s41288-023-00294-w","volume":"48","author":"M Boyer","year":"2023","unstructured":"Boyer, M., Eling, M.: New advances on cyber risk and cyber insurance. The Geneva Papers on Risk and Insurance - Issues and Practice 48(2), 267 (2023). https:\/\/doi.org\/10.1057\/s41288-023-00294-w","journal-title":"The Geneva Papers on Risk and Insurance - Issues and Practice"},{"key":"1192_CR26","unstructured":"B\u00f6hme, R., Schwartz, G.: Modeling cyber-insurance: Towards a unifying framework. in Proceedings of the 9th Workshop on the Economics in Information Security (2010). http:\/\/weis2010.econinfosec.org\/papers\/session5\/weis2010_boehme.pdf"},{"key":"1192_CR27","doi-asserted-by":"publisher","unstructured":"Pal, R., Golubchik, L., Psounis, K., Hui, P.: Will cyber-insurance improve network security? a market analysis. in Proceedings of the 2014 INFOCOM (IEEE, 2014), pp. 235\u2013243. https:\/\/doi.org\/10.1109\/INFOCOM.2014.6847944","DOI":"10.1109\/INFOCOM.2014.6847944"},{"key":"1192_CR28","doi-asserted-by":"crossref","unstructured":"Wolff, J.: Cyberinsurance policy: Rethinking risk in an Age of ransomware, computer fraud, data breaches, and cyberattacks (MIT Press, 2022)","DOI":"10.7551\/mitpress\/13665.001.0001"},{"key":"1192_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101593","volume":"87","author":"S Panda","year":"2019","unstructured":"Panda, S., Woods, D.W., Laszka, A., Fielder, A., Panaousis, E.: Post-incident audits on cyber insurance discounts. Computers & Security 87, 101593 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.101593","journal-title":"Computers & Security"},{"key":"1192_CR30","unstructured":"European Union Agency for Cybersecurity. Cyber insurance models and methods and the use of ai. Available via https:\/\/www.enisa.europa.eu\/publications\/cyber-insurance-models-and-methods-and-the-use-of-ai on 04\/11\/2024"},{"key":"1192_CR31","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Orlando, A., Uuganbayar, G., Yautsiukhin, A.: Preventing the drop in security investments for non-competitive cyber-insurance market. in Proceedings of the 2017 International Conference on Risks and Security of Internet and Systems, Lecture Notes in Computer Science, vol. 10694 (Cham, 2018), Lecture Notes in Computer Science, vol. 10694, pp. 159\u2013174. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-76687-4_11","DOI":"10.1007\/978-3-319-76687-4_11"},{"key":"1192_CR32","unstructured":"State, C.: Senate bill no. 1386 chapter 915. Available http:\/\/goo.gl\/W8qhb8 on 13\/07\/2015"},{"key":"1192_CR33","unstructured":"European Parliament. General data protection regulation. Available via https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj on 12\/04\/2024"},{"key":"1192_CR34","unstructured":"Schilbach, F.: MIT Lectures: Psychology and Economics. Risk Preferences. Available via https:\/\/ocw.mit.edu\/courses\/14-13-psychology-and-economics-spring-2020\/resources\/mit14_13s20_lec7_8\/ on 20\/11\/2025"},{"key":"1192_CR35","doi-asserted-by":"publisher","unstructured":"Phelps, C.E.: A user\u2019s guide to economic utility functions. Journal of Risk and Uncertainty, 69(3), 235\u2013280, December (2024). Springer Science and Business Media LLC. https:\/\/doi.org\/10.1007\/s11166-024-09443-5","DOI":"10.1007\/s11166-024-09443-5"},{"key":"1192_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.najef.2021.101627","volume":"60","author":"H Lee","year":"2022","unstructured":"Lee, H., Lee, M., Hong, J.: Optimal insurance under moral hazard in loss reduction. N. Am. J. Econ. Financ. 60, 101627 (2022). https:\/\/doi.org\/10.1016\/j.najef.2021.101627","journal-title":"N. Am. J. Econ. Financ."},{"issue":"1","key":"1192_CR37","doi-asserted-by":"publisher","first-page":"tyac016","DOI":"10.1093\/cybsec\/tyac016","volume":"9","author":"PV Shevchenko","year":"2023","unstructured":"Shevchenko, P.V., Jang, J., Malavasi, M., Peters, G.W., Sofronov, G., Tr\u00fcck, S.: The nature of losses from cyber-related events: risk categories and business sectors. J. Cybersecur. 9(1), tyac016 (2023). https:\/\/doi.org\/10.1093\/cybsec\/tyac016","journal-title":"J. Cybersecur."},{"issue":"4","key":"1192_CR38","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/978-94-015-7957-5_8","volume":"80","author":"I Ehrlich","year":"1992","unstructured":"Ehrlich, I., Becker, G.S.: Market insurance, self-insurance, and self-protection. J. Polit. Econ. 80(4), 623 (1992). https:\/\/doi.org\/10.1007\/978-94-015-7957-5_8","journal-title":"J. Polit. Econ."},{"key":"1192_CR39","doi-asserted-by":"publisher","unstructured":"Uuganbayar, G., Yautsiukhin, A., Martinelli, F.: Cyber insurance and security interdependence: Friends or foes? in Proceedings of 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA) (2018), pp. 1\u20134. https:\/\/doi.org\/10.1109\/CyberSA.2018.8551447","DOI":"10.1109\/CyberSA.2018.8551447"},{"key":"1192_CR40","doi-asserted-by":"crossref","unstructured":"Bolot, J., Lelarge, M.: A new perspective on internet security using insurance. in Proceedings of the 27th IEEE International Conference on Computer Communications (Phoenix, AZ, USA, 2008), pp. 1948\u20131956. http:\/\/www.di.ens.fr\/~lelarge\/papiers\/2008\/infocom08_ins.pdf","DOI":"10.1109\/INFOCOM.2008.259"},{"key":"1192_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-0631-3","author":"J Lemaire","year":"1995","unstructured":"Lemaire, J.: Bonus-Malus Systems in Automobile Insurance (Springer. Netherlands (1995). https:\/\/doi.org\/10.1007\/978-94-011-0631-3","journal-title":"Netherlands"},{"issue":"3","key":"1192_CR42","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1057\/s41288-022-00266-6","volume":"47","author":"F Cremer","year":"2022","unstructured":"Cremer, F., Sheehan, B., Fortmann, M., Kia, A.N., Mullins, M., Murphy, F., Materne, S.: Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance - Issues and Practice 47(3), 698 (2022). https:\/\/doi.org\/10.1057\/s41288-022-00266-6","journal-title":"The Geneva Papers on Risk and Insurance - Issues and Practice"},{"issue":"1","key":"1192_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13385-023-00341-9","volume":"13","author":"K Awiszus","year":"2023","unstructured":"Awiszus, K., Knispel, T., Penner, I., Svindland, G., Vo\u00df, A., Weber, S.: Modeling and pricing cyber insurance: Idiosyncratic, systematic, and systemic risks. Eur. Actuar. J. 13(1), 1 (2023). https:\/\/doi.org\/10.1007\/s13385-023-00341-9","journal-title":"Eur. Actuar. J."},{"key":"1192_CR44","unstructured":"ENISA. 2024 report on the state of the cybersecurity in the union. Available via https:\/\/www.enisa.europa.eu\/publications\/2024-report-on-the-state-of-the-cybersecurity-in-the-union on 04\/11\/2024"},{"key":"1192_CR45","unstructured":"Naghizadeh, P., Liu, M.: Voluntary participation in cyber-insurance markets. in Proceedings of the 2014 Annual Workshop on Economics in Information Security (2014). http:\/\/weis2014.econinfosec.org\/papers\/NaghizadehLiu-WEIS2014.pdf"},{"issue":"4","key":"1192_CR46","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.58127","volume":"5","author":"L Gordon","year":"2003","unstructured":"Gordon, L., Loeb, M.: The economics of information security investment. TISSEC 5(4), 438 (2003). https:\/\/doi.org\/10.1145\/581271.58127","journal-title":"TISSEC"},{"issue":"10","key":"1192_CR47","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/62.318876","volume":"9","author":"S Brocklehurst","year":"1994","unstructured":"Brocklehurst, S., Littlewood, B., Olovsson, T., Jonsson, E.: On measurement of operational security. IEEE Aerosp. Electron. Syst. Mag. 9(10), 7 (1994). https:\/\/doi.org\/10.1109\/62.318876","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"1192_CR48","doi-asserted-by":"publisher","unstructured":"B\u00f6hme, R.: Security metrics and security investment models. in Proceedings of the 5th International Workshop on Security on Advances in Information and Computer Security, ed. by I.\u00a0Echizen, N.\u00a0Kunihiro, R.\u00a0Sasaki (Springer Berlin Heidelberg, Berlin, Heidelberg, 2010), pp. 10\u201324. https:\/\/doi.org\/10.1007\/978-3-642-16825-3_2","DOI":"10.1007\/978-3-642-16825-3_2"},{"key":"1192_CR49","unstructured":"European Parlament. The NIS 2 Directive. Available via https:\/\/www.nis-2-directive.com on 24\/10\/2025"},{"key":"1192_CR50","unstructured":"Department for Science, Innovation and Technology. Cyber Security and Resilience Bill. Available via https:\/\/bills.parliament.uk\/bills\/4035 on 20\/11\/2025"},{"issue":"4","key":"1192_CR51","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1214\/aos\/1176349736","volume":"13","author":"AP Dawid","year":"1985","unstructured":"Dawid, A.P.: Calibration-Based Empirical Probability. Ann. Stat. 13(4), 698\u2013736 (1985). https:\/\/doi.org\/10.1214\/aos\/1176349736","journal-title":"Ann. Stat."},{"key":"1192_CR52","doi-asserted-by":"publisher","unstructured":"Montgomery, D.C., Peck, E.A., Vining, G.G.: Introduction to Linear Regression Analysis. Wiley Series in Probability and Statistics. Wiley (2021). https:\/\/doi.org\/10.1111\/insr.12020_10","DOI":"10.1111\/insr.12020_10"},{"key":"1192_CR53","unstructured":"Bolzano, B.: Rein analytischer Beweis des Lehrsatzes da\u00df zwischen je zwey Werthen, die ein entgegengesetzetes Resultat gew\u00e4hren, wenigstens eine reelle Wurzel der Gleichung liege (Gottlieb Haase, 1817). http:\/\/eudml.org\/doc\/202403"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01192-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01192-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01192-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:19:56Z","timestamp":1776071996000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01192-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,5]]},"references-count":53,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1192"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01192-z","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,5]]},"assertion":[{"value":"25 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work was partially supported by projects DUCA (No 101086308), RdS25\/27 CYBER, and SERICS (PE00000014) under the MUR National Recovery and Resilience Plan funded by the European Union - NextGenerationEU.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"47"}}