{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:32:25Z","timestamp":1773221545118,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21241-6","type":"journal-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:10:30Z","timestamp":1773144630000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling and validating rumor dynamics in online social network: formalizing crowdsourcing with colored petri nets"],"prefix":"10.1007","volume":"85","author":[{"given":"Amber","family":"Sarfraz","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Farooq","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Furkh","family":"Zeshan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,10]]},"reference":[{"key":"21241_CR1","doi-asserted-by":"crossref","unstructured":"Dang A, Moh\u2019d A, Milios E, Minghim R (2016) What is in a rumour: Combined visual analysis of rumour flow and user activity, in Proceedings of the 33rd Computer Graphics International, pp. 17\u201320","DOI":"10.1145\/2949035.2949040"},{"key":"21241_CR2","doi-asserted-by":"crossref","unstructured":"Wang Z, Wen T, Wu W Modeling and simulation of rumor propagation in social networks based on Petri net theory, in Networking, Sensing and Control (ICNSC), (2015) IEEE 12th International Conference on, 2015, pp. 492\u2013497","DOI":"10.1109\/ICNSC.2015.7116086"},{"key":"21241_CR3","doi-asserted-by":"crossref","unstructured":"Olan F, Jayawickrama U, Arakpogun EO, Suklan J, Liu S (2022) Fake news on social media: the impact on society. Inform Syst Front pp. 1\u201316","DOI":"10.1007\/s10796-022-10242-z"},{"key":"21241_CR4","doi-asserted-by":"crossref","unstructured":"Pourghomi P, Safieddine F, Masri W, Dordevic M (2018) How to stop spread of misinformation on social media: Facebook plans vs. right-click authenticate approach, in Engineering \\& MIS (ICEMIS), IEEE","DOI":"10.1109\/ICEMIS.2017.8272957"},{"key":"21241_CR5","unstructured":"Rubin VL, Conroy NJ, Chen Y (2015) Towards news verification: Deception detection methods for news discourse, in Proceedings of the Hawaii International Conference on System Sciences (HICSS48) Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment Symposium, January, pp. 5\u20138"},{"key":"21241_CR6","doi-asserted-by":"publisher","first-page":"5577","DOI":"10.1007\/s00500-022-07080-1","volume":"26","author":"A Mughaid","year":"2022","unstructured":"Mughaid A, Al-Zu\u2019bi S, Al Arjan A, Al-Amrat R, Alajmi R, Zitar RA, Abualigah L (2022) An intelligent cybersecurity system for detecting fake news in social media websites. Soft Comput 26:5577\u20135591","journal-title":"Soft Comput"},{"key":"21241_CR7","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/242223.242257","volume":"28","author":"EM Clarke","year":"1996","unstructured":"Clarke EM, Wing JM (1996) Formal methods: state of the art and future directions. ACM Comput Surv (CSUR) 28:626\u2013643","journal-title":"ACM Comput Surv (CSUR)"},{"key":"21241_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6702","volume":"23","author":"AD Mishra","year":"2022","unstructured":"Mishra AD, Mustafa K (2022) A review on security requirements specification by formal methods. Concurrency Computat Pract Exper 23:e6702","journal-title":"Concurrency Computat Pract Exper"},{"issue":"8","key":"21241_CR9","first-page":"3656","volume":"10","author":"NA Khan","year":"2016","unstructured":"Khan NA, Ahmad F, Hussain SA, Naseer M (2016) Hierarchical coloured petri net based random direction mobility model for wireless communications. TIIS 10(8):3656\u20133671","journal-title":"TIIS"},{"key":"21241_CR10","unstructured":"Adamski MA, Karatkevich A, Wegrzyn M (2005) Design of embedded control systems. Springer"},{"key":"21241_CR11","doi-asserted-by":"crossref","unstructured":"Billington J, Diaz M (1999) Application of Petri nets to communication networks: Advances in Petri nets. Springer Science & Business Media","DOI":"10.1007\/BFb0097770"},{"key":"21241_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781003427421","volume-title":"Foundations of probabilistic logic programming: Languages, semantics, inference and learning","author":"F Riguzzi","year":"2023","unstructured":"Riguzzi F (2023) Foundations of probabilistic logic programming: Languages, semantics, inference and learning. CRC Press"},{"key":"21241_CR13","volume-title":"Advanced Course on Petri Nets","author":"J Billington","year":"2003","unstructured":"Billington J, Gallasch GE, Han B (2003) A coloured petri net approach to protocol verification. Advanced Course on Petri Nets. Springer"},{"key":"21241_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/b95112","volume-title":"Coloured Petri nets: modelling and validation of concurrent systems","author":"K Jensen","year":"2009","unstructured":"Jensen K, Kristensen LM, Wells L (2009) Coloured Petri nets: modelling and validation of concurrent systems. Springer Science & Business Media"},{"key":"21241_CR15","unstructured":"Mishra KS, Tripathi AK (2014) Some Issues, challenges and problems of distributed software system. Int J Comput Sci Inform Technol Varanasi India, 7"},{"issue":"3\u20134","key":"21241_CR16","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10009-007-0038-x","volume":"9","author":"K Jensen","year":"2007","unstructured":"Jensen K, Kristensen LM, Wells L (2007) Coloured petri nets and CPN tools for modelling and validation of concurrent systems. Int J Softw Tools Technol Transfer 9(3\u20134):213\u2013254","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"21241_CR17","volume-title":"Coloured Petri nets: basic concepts, analysis methods and practical use","author":"K Jensen","year":"2013","unstructured":"Jensen K (2013) Coloured Petri nets: basic concepts, analysis methods and practical use. Springer Science & Business Media"},{"key":"21241_CR18","doi-asserted-by":"crossref","unstructured":"Chavoshi M, Sabamir SM (2023) Fuzzy coloured petri nets-based method to analyse and verify the functionality of software. CAAI Trans Intell Technol","DOI":"10.1049\/cit2.12251"},{"key":"21241_CR19","unstructured":"Reisig W (1985) Petri Nets, an introduction (EATCS monographs on theoretical computer science, vol 4. Springer Heidelberg"},{"key":"21241_CR20","volume-title":"Elements of ML Programming: ML97 Edition","author":"JD Ullman","year":"1998","unstructured":"Ullman JD (1998) Elements of ML Programming: ML97 Edition. Prentice Hall"},{"key":"21241_CR21","doi-asserted-by":"crossref","unstructured":"Manita M, Kumar MJ, Sainyali T, Rekha S (2022) Machine learning based rumor detection on twitter data, in International Conference on Emerging Technologies in Computer Engineering, pp. 259\u2013273","DOI":"10.1007\/978-3-031-07012-9_23"},{"issue":"1","key":"21241_CR22","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s12652-022-03900-2","volume":"15","author":"R Poonam","year":"2024","unstructured":"Poonam R, Vibha J, Jyoti S, Arnav B (2024) Blockchain-based rumor detection approach for COVID-19. J Ambient Intell Humaniz Comput 15(1):435\u2013449","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"21241_CR23","doi-asserted-by":"publisher","first-page":"3136","DOI":"10.1007\/s10489-022-03592-3","volume":"53","author":"X Shouzhi","year":"2023","unstructured":"Shouzhi X, Liu, Xiaodi M, Kai D, Fangmin R, Basheer X, Shunzhi, Changsong B (2023) Rumor detection on social media using hierarchically aggregated feature via graph neural networks. Appl Intell 53(3):3136\u20133149","journal-title":"Appl Intell"},{"key":"21241_CR24","doi-asserted-by":"crossref","unstructured":"Wei W, Yuchen Q, Shichang X, Wu Y (2021) Early rumor detection based on deep recurrent Q-Learning. Secur Communication Networks, p. 5569064","DOI":"10.1155\/2021\/5569064"},{"key":"21241_CR25","first-page":"341","volume-title":"Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies","author":"S Ke","year":"2023","unstructured":"Ke S, Priyanshi G, Wu W, Ding-Zhu D (2023) Machine Learning-Based Rumor Controlling. Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies. pp 341\u2013370"},{"key":"21241_CR26","doi-asserted-by":"publisher","first-page":"114208","DOI":"10.1016\/j.eswa.2020.114208","volume":"168","author":"E Kathrin","year":"2021","unstructured":"Kathrin E (2021) A review on rumour prediction and veracity assessment in online social network. Expert Syst Appl 168:114208","journal-title":"Expert Syst Appl"},{"key":"21241_CR27","doi-asserted-by":"publisher","first-page":"62097","DOI":"10.1109\/ACCESS.2022.3181184","volume":"10","author":"S Noureddine","year":"2022","unstructured":"Noureddine S, Abdelouahid D, Mohamed B, Waleed H, Jalal A-M, Abdelghani B (2022) A hybrid linguistic and knowledge-based analysis approach for fake news detection on social media. IEEE Access 10:62097\u201362109","journal-title":"IEEE Access"},{"key":"21241_CR28","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2023.03.098","volume":"634","author":"L Weimin","year":"2023","unstructured":"Weimin L, Chang G, Yanxia L, Xiaokang Z, Qun J, Mingjun X (2023) Rumor source localization in social networks based on infection potential energy. Inf Sci 634:172\u2013188","journal-title":"Inf Sci"},{"key":"21241_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-024-01214-z","volume":"14","author":"A Sarfraz","year":"2024","unstructured":"Sarfraz A, Ahmad A, Zeshan F, Turab H (2024) Synews: a synergy-based rumor verification system. Soc Netw Anal Min 14:57","journal-title":"Soc Netw Anal Min"},{"key":"21241_CR30","first-page":"1","volume":"CSCW2","author":"P Nicolas","year":"2023","unstructured":"Nicolas P, Stefan S (2023) Mechanisms of true and false rumor sharing in social media: collective intelligence or herd behavior? Proceedings of the ACM on Human-Computer Interaction CSCW2:1\u201338","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"21241_CR31","unstructured":"Xiong C, Murata T, Tsai J (2002) Modeling and simulation of routing protocol for mobile ad hoc networks using colored petri nets, in Proceedings of the conference on Application and theory of petri nets: formal methods in software engineering and defence systems, pp. 145\u2013153"},{"key":"21241_CR32","doi-asserted-by":"crossref","unstructured":"Khan N, Ahmad F, Baig W (2014) Formal model of random walk mobility model for WMN using coloured petri nets, in Proceedings of 2014 11th International Bhurban Conference on Applied Sciences \\& Technology (IBCAST), pp. 436\u2013444","DOI":"10.1109\/IBCAST.2014.6778183"},{"key":"21241_CR33","doi-asserted-by":"crossref","unstructured":"Khan NA, Ahmad F, Khan SA Coloured Petri net modeling and analysis for community based wireless mesh networks, in (2014) IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2014, pp. 139\u2013144","DOI":"10.1109\/SMC.2014.6973897"},{"key":"21241_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2017.12.001","author":"J Zhou","year":"2018","unstructured":"Zhou J, Reniers G (2018) Petri-net based evaluation of emergency response actions for preventing domino effects triggered by fire. J Loss Prev Process Ind. https:\/\/doi.org\/10.1016\/j.jlp.2017.12.001","journal-title":"J Loss Prev Process Ind"},{"key":"21241_CR35","doi-asserted-by":"crossref","unstructured":"Yu Q, Cai L, Tan X (2018) Airport emergency rescue model establishment and performance analysis using colored petri Nets and CPN tools. Int J Aerosp Eng","DOI":"10.1155\/2018\/2858375"},{"key":"21241_CR36","doi-asserted-by":"crossref","unstructured":"Gehlot V, Sloane E, Thalassinidis AE (2019) Personal Health Technology: CPN based Modeling of Coordinated Neighborhood Care Environments (Hubs) and Personal Care Device Ecosystems, in Proceedings of the 52nd Hawaii International Conference on System Sciences","DOI":"10.24251\/HICSS.2019.504"},{"key":"21241_CR37","doi-asserted-by":"crossref","unstructured":"Wang R, Kristensen LM, Stolz V (2018) MBT\/CPN: A Tool for Model-Based Software Testing of Distributed Systems Protocols Using Coloured Petri Nets, in International Conference on Verification and Evaluation of Computer and Communication Systems, pp. 97\u2013113","DOI":"10.1007\/978-3-030-00359-3_7"},{"issue":"2","key":"21241_CR38","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1002\/rsa.20432","volume":"43","author":"N Fountoulakis","year":"2013","unstructured":"Fountoulakis N, Panagiotou K (2013) Rumor spreading on random regular graphs and expanders. Random Struct Algorithms 43(2):201\u2013220","journal-title":"Random Struct Algorithms"},{"key":"21241_CR39","doi-asserted-by":"crossref","unstructured":"Clementi A, Crescenzi P, Doerr C, Fraigniaud P, Pasquale F, Silvestri R (2013) Rumor spreading in random evolving graphs, in European Symposium on Algorithms, pp. 325\u2013336","DOI":"10.1007\/978-3-642-40450-4_28"},{"issue":"3","key":"21241_CR40","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1017\/S0022172400011918","volume":"39","author":"W Kermack","year":"1939","unstructured":"Kermack W, McKendrick A (1939) Contributions to the mathematical theory of epidemics: V. Analysis of experimental epidemics of mouse-typhoid; a bacterial disease conferring incomplete immunity. J Hyg 39(3):271\u2013288","journal-title":"J Hyg"},{"issue":"5","key":"21241_CR41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.055101","volume":"69","author":"Y Moreno","year":"2004","unstructured":"Moreno Y, Nekovee M, Vespignani A (2004) Efficiency and reliability of epidemic data dissemination in complex networks. Phys Rev E 69(5):055101","journal-title":"Phys Rev E"},{"key":"21241_CR42","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physa.2014.06.053","volume":"413","author":"J Wang","year":"2014","unstructured":"Wang J, Zhao L, Huang R (2014) 2SI2R rumor spreading model in homogeneous networks. Physica A 413:153\u2013161","journal-title":"Physica A"},{"key":"21241_CR43","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1016\/j.jmaa.2014.06.035","volume":"420","author":"C Li","year":"2014","unstructured":"Li C, Li J, Ma Z, Zhu H (2014) Canard phenomenon for an SIS epidemic model with nonlinear incidence. J Math Anal Appl 420:987\u20131004","journal-title":"J Math Anal Appl"},{"key":"21241_CR44","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1093\/biostatistics\/kxt023","volume":"15","author":"ES Knock","year":"2014","unstructured":"Knock ES, O\u2019Neill PD (2014) Bayesian model choice for epidemic models with two levels of mixing. Biostatistics 15:46\u201359","journal-title":"Biostatistics"},{"key":"21241_CR45","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.matcom.2013.08.008","volume":"97","author":"Z Hu","year":"2014","unstructured":"Hu Z, Teng Z, Zhang L (2014) Stability and bifurcation analysis in a discrete SIR epidemic model. Math Comput Simul 97:80\u201393","journal-title":"Math Comput Simul"},{"key":"21241_CR46","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/S0025-5564(02)00109-8","volume":"180","author":"O\u2019Neill","year":"2002","unstructured":"O\u2019Neill, Philip D (2002) A tutorial introduction to bayesian inference for stochastic epidemic models using Markov chain Monte Carlo methods. Math Biosci 180:103\u2013114","journal-title":"Math Biosci"},{"key":"21241_CR47","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/0025-5564(82)90036-0","volume":"63","author":"P Grassberger","year":"1983","unstructured":"Grassberger P (1983) On the critical behavior of the general epidemic process and dynamical percolation. Math Biosci 63:157\u2013172","journal-title":"Math Biosci"},{"key":"21241_CR48","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.63.066117","volume":"63","author":"R Pastor","year":"2001","unstructured":"Pastor R, Vespignani A (2001) Epidemic dynamics and endemic states in complex networks. Phys Rev E 63:066117","journal-title":"Phys Rev E"},{"key":"21241_CR49","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1109\/TCSS.2020.3014135","volume":"7","author":"G Shrivastava","year":"2020","unstructured":"Shrivastava G, Kumar P, Ojha RP, Pramod K, Mohan S, Srivastava G (2020) Defensive modeling of fake news through online social networks. IEEE Trans Comput Social Syst 7:1159\u20131167","journal-title":"IEEE Trans Comput Social Syst"},{"key":"21241_CR50","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.ins.2021.09.012","volume":"580","author":"Z Yu","year":"2021","unstructured":"Yu Z, Lu S, Wang D, Li Z (2021) Modeling and analysis of rumor propagation in social networks. Inf Sci 580:857\u2013873","journal-title":"Inf Sci"},{"key":"21241_CR51","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.ins.2022.10.095","volume":"630","author":"H Guo","year":"2023","unstructured":"Guo H, Yan X (2023) Dynamic modeling and simulation of rumor propagation based on the double refutation mechanism. Inf Sci 630:385\u2013402","journal-title":"Inf Sci"},{"issue":"4","key":"21241_CR52","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.jsis.2013.07.004","volume":"22","author":"A Majchrzak","year":"2013","unstructured":"Majchrzak A, Malhotra A (2013) Towards an information systems perspective and research agenda on crowdsourcing for innovation. J Strategic Inform Syst Elsevier 22(4):257\u2013268","journal-title":"J Strategic Inform Syst Elsevier"},{"key":"21241_CR53","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/10580530.2013.739883","volume":"30","author":"GD Saxton","year":"2013","unstructured":"Saxton GD, Oh O, Kishore R (2013) Rules of crowdsourcing: models, issues, and systems of control. Inform Syst Manage 30:2\u201320","journal-title":"Inform Syst Manage"},{"key":"21241_CR54","unstructured":"Create a Knowledge Base to Stimulate Information Sharing and Boost Organizational Value, SmartSheet 23 October 2017. [Online]. Available: https:\/\/www.smartsheet.com\/knowledge-base-systems-and-templates. [Accessed 12 January 2023]"},{"key":"21241_CR55","doi-asserted-by":"crossref","unstructured":"Schmitz PW, Tr{\\\"o}ger T (2012) The (sub-) optimality of the majority rule. Games Econ Behav 74:651\u2013665","DOI":"10.1016\/j.geb.2011.08.002"},{"key":"21241_CR56","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.3390\/s25051400","volume":"25","author":"G de Roger T","year":"2025","unstructured":"de Roger T G, Cristina K Y, Stefano F S, dos Leandro S C, Viviana C M (2025) Deep learning approach for automatic heartbeat classification. Sensors 25:1400","journal-title":"Sensors"},{"key":"21241_CR57","first-page":"5975153","volume":"1","author":"S Chen","year":"2023","unstructured":"Chen S, Li M, Yang W (2023) Multilevel feature fusion-based GCN for rumor detection with topic relevance mining. Adv Multimedia 1:5975153","journal-title":"Adv Multimedia"},{"key":"21241_CR58","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1186\/s40537-023-00725-4","volume":"10","author":"C Wei","year":"2023","unstructured":"Wei C, Shang M (2023) KAGN: knowledge-powered attention and graph convolutional networks for social media rumor detection. J Big Data 10:45","journal-title":"J Big Data"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21241-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21241-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21241-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:10:38Z","timestamp":1773144638000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21241-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,10]]},"references-count":58,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["21241"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21241-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,10]]},"assertion":[{"value":"11 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics, consent to Participate, and consent to publish declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"268"}}