{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T10:29:09Z","timestamp":1768386549554,"version":"3.49.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T00:00:00Z","timestamp":1764892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T00:00:00Z","timestamp":1764892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012305","name":"Universit\u00e0 degli Studi del Molise","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012305","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2026,3]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In this paper, we investigate the strategies adopted by Solidity developers to fix security vulnerabilities in smart contracts. Vulnerabilities are categorized using the DASP TOP 10 taxonomy, and fixing strategies are extracted from 364 commits collected from open-source Solidity projects on GitHub. Each commit was selected through a two-phase process: an initial filter using natural language processing techniques, followed by manual validation. We assessed whether these fixes adhere to established academic guidelines. Our analysis shows that 60.55% of the commits aligned with at least one literature-based recommendation, particularly for well-documented vulnerability types such as Reentrancy and Arithmetic. However, adherence dropped significantly for categories like Denial of Service, Time Manipulation, and Bad Randomness, highlighting gaps between academic best practices and real-world developer behavior. From the remaining 143 non-aligned commits, we identified 27 novel fixing strategies not previously discussed in the literature. To evaluate their quality, we conducted a structured questionnaire involving 9 experts from both academia and industry. Their feedback indicated high perceived effectiveness of the new fixes, especially for vulnerabilities like Reentrancy and Unchecked Return Values. Generalizability received more varied responses, suggesting context-specific applicability. Finally, we performed a post-fix evolution analysis on over 6700 subsequent commits to assess the long-term stability of the fixes. Most patches remained unchanged, confirming their persistence in production code. Our findings offer practical insights into how vulnerabilities are fixed in smart contracts today, reveal promising emerging patterns, and help bridge the gap between academic guidelines and developer practices.<\/jats:p>","DOI":"10.1007\/s10664-025-10780-5","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T07:32:49Z","timestamp":1764919969000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Bridging the gap: a comparative study of academic and developer approaches to smart contract vulnerabilities"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1029-4861","authenticated-orcid":false,"given":"Francesco","family":"Salzano","sequence":"first","affiliation":[]},{"given":"Lodovica","family":"Marchesi","sequence":"additional","affiliation":[]},{"given":"Cosmo Kevin","family":"Antenucci","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Scalabrino","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Tonelli","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"Oliveto","sequence":"additional","affiliation":[]},{"given":"Remo","family":"Pareschi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,5]]},"reference":[{"key":"10780_CR1","doi-asserted-by":"publisher","unstructured":"Alsunaidi SJ, Alhaidari FA (2019) A survey of consensus algorithms for blockchain technology. In: 2019 International Conference on Computer and Information Sciences (ICCIS), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCISci.2019.8716424","DOI":"10.1109\/ICCISci.2019.8716424"},{"key":"10780_CR2","unstructured":"Bodell\u00a0III WE, Meisami S, Duan Y (2023) Proxy hunting: understanding and characterizing proxy-based upgradeable smart contracts in blockchains. In: 32nd USENIX Security Symposium (USENIX Security 23), pp 1829\u20131846"},{"key":"10780_CR3","first-page":"22","volume":"1","author":"V Buterin","year":"2013","unstructured":"Buterin V et al (2013) Ethereum white paper. GitHub Repository 1:22\u201323","journal-title":"GitHub Repository"},{"issue":"37","key":"10780_CR4","first-page":"2","volume":"3","author":"V Buterin","year":"2014","unstructured":"Buterin V et al (2014) A next-generation smart contract and decentralized application platform. White Paper 3(37):2\u20131","journal-title":"White Paper"},{"issue":"1","key":"10780_CR5","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TSE.2020.2989002","volume":"48","author":"J Chen","year":"2020","unstructured":"Chen J, Xia X, Lo D, Grundy J, Luo X, Chen T (2020) Defining smart contract defects on ethereum. IEEE Trans Software Eng 48(1):327\u2013345","journal-title":"IEEE Trans Software Eng"},{"issue":"2","key":"10780_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10515-023-00392-y","volume":"30","author":"Q Chen","year":"2023","unstructured":"Chen Q, Zhou T, Liu K, Li L, Ge C, Liu Z, Klein J, Bissyand\u00e9 TF (2023a) Tips: towards automating patch suggestion for vulnerable smart contracts. Autom Softw Eng 30(2):31","journal-title":"Autom Softw Eng"},{"key":"10780_CR7","doi-asserted-by":"crossref","unstructured":"Chen J, Chen C, Hu J, Grundy J, Wang Y, Chen T, Zheng Z (2024) Identifying smart contract security issues in code snippets from stack overflow. In: Proceedings of the 33rd ACM SIGSOFT international symposium on software testing and analysis, pp 1198\u20131210","DOI":"10.1145\/3650212.3680353"},{"key":"10780_CR8","unstructured":"Chen C, Su J, Chen J, Wang Y, Bi T, Yu J, Wang Y, Lin X, Chen T, Zheng Z (2023b) When chatgpt meets smart contract vulnerability detection: how far are we? ACM Trans Softw Eng Methodol"},{"issue":"1","key":"10780_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Measur 20(1):37\u201346","journal-title":"Educ Psychol Measur"},{"key":"10780_CR10","doi-asserted-by":"crossref","unstructured":"Dabic O, Aghajani E, Bavota G (2021) Sampling projects in github for msr studies. In: 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR). IEEE, pp 560\u2013564","DOI":"10.1109\/MSR52588.2021.00074"},{"key":"10780_CR11","doi-asserted-by":"publisher","unstructured":"Demir M, Alalfi M, Turetken O, Ferworn A (2019a) Security smells in smart contracts. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp 442\u2013449. https:\/\/doi.org\/10.1109\/QRS-C.2019.00086","DOI":"10.1109\/QRS-C.2019.00086"},{"key":"10780_CR12","doi-asserted-by":"crossref","unstructured":"Demir M, Alalfi M, Turetken O, Ferworn A (2019b) Security smells in smart contracts. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, pp 442\u2013449","DOI":"10.1109\/QRS-C.2019.00086"},{"key":"10780_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111193","volume":"186","author":"A Di Sorbo","year":"2022","unstructured":"Di Sorbo A, Laudanna S, Vacca A, Visaggio CA, Canfora G (2022) Profiling gas consumption in solidity smart contracts. J Syst Softw 186:111193","journal-title":"J Syst Softw"},{"key":"10780_CR14","doi-asserted-by":"crossref","unstructured":"Dia B, Ivaki N, Laranjeiro N (2021) An empirical evaluation of the effectiveness of smart contract verification tools. In: 2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, pp 17\u201326","DOI":"10.1109\/PRDC53464.2021.00013"},{"key":"10780_CR15","doi-asserted-by":"crossref","unstructured":"Durieux T, Ferreira JF, Abreu R, Cruz P (2020) Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd International conference on software engineering, pp 530\u2013541","DOI":"10.1145\/3377811.3380364"},{"key":"10780_CR16","unstructured":"Enterprise Ethereum\u00a0Alliance IE (2023) Eea ethtrust security levels specification version 2. https:\/\/entethalliance.org\/specs\/ethtrust-sl\/v2\/"},{"key":"10780_CR17","unstructured":"Ethereum Developer Community (2020) SWC registry - smart contract weakness classification and test cases. https:\/\/swcregistry.io\/. Accessed March 2025"},{"key":"10780_CR18","doi-asserted-by":"crossref","unstructured":"Feist J, Grieco G, Groce A (2019) Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). IEEE, pp 8\u201315","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"10780_CR19","doi-asserted-by":"crossref","unstructured":"Ferreira JF, Cruz P, Durieux T, Abreu R (2020) Smartbugs: a framework to analyze solidity smart contracts. In: Proceedings of the 35th IEEE\/ACM international conference on automated software engineering, pp 1349\u20131352","DOI":"10.1145\/3324884.3415298"},{"key":"10780_CR20","doi-asserted-by":"crossref","unstructured":"Gao B, Shen S, Shi L, Li J, Sun J, Bu L (2021) Verification assisted gas reduction for smart contracts. In: 2021 28th Asia-Pacific Software Engineering Conference (APSEC). IEEE, pp 264\u2013274","DOI":"10.1109\/APSEC53868.2021.00034"},{"key":"10780_CR21","doi-asserted-by":"crossref","unstructured":"Ghaleb A (2022) Towards effective static analysis approaches for security vulnerabilities in smart contracts. In: 37th IEEE\/ACM international conference on automated software engineering, pp 1\u20135","DOI":"10.1145\/3551349.3559567"},{"key":"10780_CR22","doi-asserted-by":"crossref","unstructured":"Ghaleb A, Pattabiraman K (2020) How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. In: Proceedings of the 29th ACM SIGSOFT international symposium on software testing and analysis, pp 415\u2013427","DOI":"10.1145\/3395363.3397385"},{"issue":"4","key":"10780_CR23","first-page":"1","volume":"33","author":"H Guo","year":"2024","unstructured":"Guo H, Chen Y, Chen X, Huang Y, Zheng Z (2024) Smart contract code repair recommendation based on reinforcement learning and multi-metric optimization. ACM Trans Softw Eng Methodol 33(4):1\u201331","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10780_CR24","doi-asserted-by":"publisher","first-page":"112107","DOI":"10.1016\/j.jss.2024.112107","volume":"216","author":"R Huang","year":"2024","unstructured":"Huang R, Shen Q, Wang Y, Wu Y, Wu Z, Luo X, Ruan A (2024a) Reenrepair: automatic and semantic equivalent repair of reentrancy in smart contracts. J Syst Softw 216:112107","journal-title":"J Syst Softw"},{"key":"10780_CR25","doi-asserted-by":"crossref","unstructured":"Huang M, Chen J, Jiang Z, Zheng Z (2024b) Revealing hidden threats: an empirical study of library misuse in smart contracts. In: Proceedings of the 46th IEEE\/ACM international conference on software engineering, pp 1\u201312","DOI":"10.1145\/3597503.3623335"},{"key":"10780_CR26","doi-asserted-by":"publisher","unstructured":"Jiang B, Liu Y, Chan W (2018) Contractfuzzer: fuzzing smart contracts for vulnerability detection. In: 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp 259\u2013269. https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"issue":"4","key":"10780_CR27","doi-asserted-by":"publisher","first-page":"2006","DOI":"10.1109\/TSE.2022.3207428","volume":"49","author":"F Khan","year":"2022","unstructured":"Khan F, David I, Varro D, McIntosh S (2022) Code cloning in smart contracts on the ethereum platform: an extended replication study. IEEE Trans Software Eng 49(4):2006\u20132019","journal-title":"IEEE Trans Software Eng"},{"key":"10780_CR28","doi-asserted-by":"publisher","first-page":"4617","DOI":"10.1007\/s10664-020-09852-5","volume":"25","author":"M Kondo","year":"2020","unstructured":"Kondo M, Oliva GA, Jiang ZM, Hassan AE, Mizuno O (2020) Code cloning in smart contracts: a case study on verified contracts from the ethereum blockchain platform. Empir Softw Eng 25:4617\u20134675","journal-title":"Empir Softw Eng"},{"key":"10780_CR29","doi-asserted-by":"publisher","unstructured":"Marchesi L, Pompianu L, Tonelli R (2025) Security checklists for ethereum smart contract development: patterns and best practices. Blockchain: Research and Applications, p 100367. https:\/\/doi.org\/10.1016\/j.bcra.2025.100367.\u00a0https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2096720925000946","DOI":"10.1016\/j.bcra.2025.100367"},{"key":"10780_CR30","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, p 21260"},{"key":"10780_CR31","doi-asserted-by":"crossref","unstructured":"Nguyen TD, Pham LH, Sun J (2021) Sguard: towards fixing vulnerable smart contracts automatically. In: 2021 IEEE Symposium on Security and Privacy (SP). IEEE, pp 1215\u20131229","DOI":"10.1109\/SP40001.2021.00057"},{"key":"10780_CR32","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1007\/s10664-019-09772-z","volume":"25","author":"YS Nugroho","year":"2020","unstructured":"Nugroho YS, Hata H, Matsumoto K (2020) How different are different diff algorithms in git? use-histogram for code changes. Empir Softw Eng 25:790\u2013823","journal-title":"Empir Softw Eng"},{"key":"10780_CR33","doi-asserted-by":"crossref","unstructured":"Pierro GA, Rocha H (2019) The influence factors on ethereum transaction fees. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). IEEE, pp 24\u201331","DOI":"10.1109\/WETSEB.2019.00010"},{"key":"10780_CR34","doi-asserted-by":"crossref","unstructured":"Porru S, Pinna A, Marchesi M, Tonelli R (2017) Blockchain-oriented software engineering: challenges and new directions. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C). IEEE, pp 169\u2013171","DOI":"10.1109\/ICSE-C.2017.142"},{"key":"10780_CR35","unstructured":"Qian P, Liu Z, He Q, Huang B, Tian D, Wang X (2022) Smart contract vulnerability detection technique: a survey. arXiv:2209.05872"},{"key":"10780_CR36","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2022.814977","volume":"5","author":"H Rameder","year":"2022","unstructured":"Rameder H, Di Angelo M, Salzer G (2022) Review of automated vulnerability analysis of smart contracts on ethereum. Frontiers in Blockchain 5:814977","journal-title":"Frontiers in Blockchain"},{"key":"10780_CR37","unstructured":"Rodler M, Li W, Karame GO, Davi L (2021) $$\\{$$EVMPatch$$\\}$$: timely and automated patching of ethereum smart contracts. In: 30th usenix security symposium (USENIX Security 21), pp 1289\u20131306"},{"issue":"3","key":"10780_CR38","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/s10664-025-10639-9","volume":"30","author":"G Rosa","year":"2025","unstructured":"Rosa G, Scalabrino S, Mastrostefano S, Oliveto R (2025) Why and how developers maintain smart contracts. Empir Softw Eng 30(3):84","journal-title":"Empir Softw Eng"},{"key":"10780_CR39","unstructured":"Rosa G, Scalabrino S, Bavota G, Oliveto R (2018) What quality aspects influence the adoption of docker images? ACM Trans Softw Eng Methodol"},{"key":"10780_CR40","unstructured":"Salzano F, Antenucci CK, Marchesi L, Scalabrino S, Tonelli R, Oliveto R, Pareschi R (2024a) Replication package for \u201dfixing smart contract vulnerabilities: a comparative study of academic solutions and developer approaches\u201d. GitHub Repository. https:\/\/zenodo.org\/records\/17105939"},{"key":"10780_CR41","unstructured":"Salzano F, Scalabrino S, Oliveto R, Pareschi R (2024b) Fixing smart contract vulnerabilities: a comparative analysis of literature and developer\u2019s practices. arXiv:2403.07458"},{"key":"10780_CR42","doi-asserted-by":"crossref","unstructured":"Shakya S, Mukherjee A, Halder R, Maiti A, Chaturvedi A (2022) Smartmixmodel: machine learning-based vulnerability detection of solidity smart contracts. In: 2022 IEEE international conference on blockchain (Blockchain). IEEE, pp 37\u201344","DOI":"10.1109\/Blockchain55522.2022.00016"},{"key":"10780_CR43","doi-asserted-by":"crossref","unstructured":"Soud M, Qasse I, Liebel G, Hamdaqa M (2023) Automesc: automatic framework for mining and classifying ethereum smart contract vulnerabilities and their fixes. In: 2023 49th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE, pp 410\u2013417","DOI":"10.1109\/SEAA60479.2023.00068"},{"key":"10780_CR44","doi-asserted-by":"crossref","unstructured":"Spadini D, Aniche M, Bacchelli A (2018) Pydriller: python framework for mining software repositories. In: Proceedings of the 2018 26th ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering, pp 908\u2013911","DOI":"10.1145\/3236024.3264598"},{"key":"10780_CR45","doi-asserted-by":"crossref","unstructured":"Sun Y, Wu D, Xue Y, Liu H, Wang H, Xu Z, Xie X, Liu Y (2024) Gptscan: detecting logic vulnerabilities in smart contracts by combining gpt with program analysis. In: Proceedings of the IEEE\/ACM 46th international conference on software engineering, pp 1\u201313","DOI":"10.1145\/3597503.3639117"},{"key":"10780_CR46","doi-asserted-by":"crossref","unstructured":"Szabo N (1997) Formalizing and securing relationships on public networks. First Monday","DOI":"10.5210\/fm.v2i9.548"},{"key":"10780_CR47","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y (2018) Smartcheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st international workshop on emerging trends in software engineering for blockchain, pp 9\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"10780_CR48","doi-asserted-by":"crossref","unstructured":"Wang Y, Chen X, Huang Y, Zhu HN, Bian J, Zheng Z (2023) An empirical study on real bug fixes from solidity smart contract projects. J Syst Softw, p 111787","DOI":"10.1016\/j.jss.2023.111787"},{"key":"10780_CR49","doi-asserted-by":"crossref","unstructured":"Wang Z, Chen J, Wang Y, Zhang Y, Zhang W, Zheng Z (2024) Efficiently detecting reentrancy vulnerabilities in complex smart contracts. Proc ACM Softw Eng 1(FSE): 161\u2013181","DOI":"10.1145\/3643734"},{"key":"10780_CR50","doi-asserted-by":"crossref","unstructured":"Wang Z, Chen X, Zhou X, Huang Y, Zheng Z, Wu J (2021) An empirical study of solidity language features. In: 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, pp 698\u2013707","DOI":"10.1109\/QRS-C55045.2021.00105"},{"key":"10780_CR51","doi-asserted-by":"crossref","unstructured":"W\u00f6hrer M, Zdun U (2020) Domain specific language for smart contract development. In: 2020 IEEE International Conference on blockchain and Cryptocurrency (ICBC). IEEE, pp 1\u20139","DOI":"10.1109\/ICBC48266.2020.9169399"},{"issue":"4","key":"10780_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402450","volume":"29","author":"XL Yu","year":"2020","unstructured":"Yu XL, Al-Bataineh O, Lo D, Roychoudhury A (2020) Smart contract repair. ACM Trans Softw Eng Methodol (TOSEM) 29(4):1\u201332","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"10780_CR53","doi-asserted-by":"crossref","unstructured":"Zhang Z, Lei Y, Yan M, Yu Y, Chen J, Wang S, Mao X (2022) Reentrancy vulnerability detection and localization: a deep learning based two-phase approach. In: Proceedings of the 37th IEEE\/ACM international conference on automated software engineering, pp 1\u201313","DOI":"10.1145\/3551349.3560428"},{"key":"10780_CR54","doi-asserted-by":"crossref","unstructured":"Zhang Y, Ma S, Li J, Li K, Nepal S, Gu D (2020) Smartshield: automatic smart contract protection made easy. In: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, pp 23\u201334","DOI":"10.1109\/SANER48275.2020.9054825"},{"key":"10780_CR55","first-page":"103555","volume":"77","author":"K Zhou","year":"2023","unstructured":"Zhou K, Huang J, Han H, Gong B, Xiong A, Wang W, Wu Q (2023a) Smart contracts vulnerability detection model based on adversarial multi-task learning. J Inf Secur Appl 77:103555","journal-title":"J Inf Secur Appl"},{"key":"10780_CR56","doi-asserted-by":"publisher","unstructured":"Zhou X, Chen Y, Guo H, Chen X, Huang Y (2023b) Security code recommendations for smart contract. In: 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp 190\u2013200. https:\/\/doi.org\/10.1109\/SANER56733.2023.00027","DOI":"10.1109\/SANER56733.2023.00027"},{"issue":"10","key":"10780_CR57","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","volume":"47","author":"W Zou","year":"2019","unstructured":"Zou W, Lo D, Kochhar PS, Le XBD, Xia X, Feng Y, Chen Z, Xu B (2019) Smart contract development: challenges and opportunities. IEEE Trans Software Eng 47(10):2084\u20132106","journal-title":"IEEE Trans Software Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10780-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10780-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10780-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T04:33:07Z","timestamp":1768365187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10780-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,5]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["10780"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10780-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,5]]},"assertion":[{"value":"9 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors declare no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}],"article-number":"37"}}