{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T20:34:22Z","timestamp":1769891662170,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s12652-025-05027-6","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T12:35:23Z","timestamp":1767702923000},"page":"165-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust models for blockchain networks: a comprehensive review"],"prefix":"10.1007","volume":"17","author":[{"given":"R.","family":"Bala","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Manoharan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Ramya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"key":"5027_CR1","doi-asserted-by":"crossref","unstructured":"Alam S (2023) The current state of blockchain consensus mechanism: issues and future works. Int J Adv Comput Sci Appl 14(8)","DOI":"10.14569\/IJACSA.2023.0140810"},{"issue":"4","key":"5027_CR2","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1504\/IJAHUC.2022.124554","volume":"40","author":"B Bhabani","year":"2022","unstructured":"Bhabani B, Mahapatro J (2022) Rcapcha: Rsu controlled ahp-based prioritised channel allocation protocol for hybrid vanets. Int J Ad Hoc Ubiquitous Comput 40(4):250\u2013266","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"key":"5027_CR3","doi-asserted-by":"crossref","unstructured":"Chen L, Xu L, Shah N, Gao Z, Lu Y, Shi W (2017) On security analysis of proof- of-elapsed-time (poet),\u201d in Stabilization, Safety, and Security of Distributed Systems: 19th International Symposium, SSS 2017, Boston, MA, USA, November 5\u20138, 2017, Proceedings 19, pp. 282\u2013297, Springer","DOI":"10.1007\/978-3-319-69084-1_19"},{"key":"5027_CR4","doi-asserted-by":"crossref","unstructured":"Dhiman P, Henge SK, Singh S, Kaur A, Singh P, Hadabou M (2023) Blockchain merkle-tree ethereum approach in enterprise multitenant cloud environment. Comput Mater Continua. 74(2).","DOI":"10.32604\/cmc.2023.030558"},{"issue":"1","key":"5027_CR5","first-page":"51","volume":"11","author":"O Dib","year":"2018","unstructured":"Dib O, Brousmiche K-L, Durand A, Thea E, Hamida EB (2018) Consortium blockchains: overview, applications and challenges. Int J Adv Telecommun 11(1):51\u201364","journal-title":"Int J Adv Telecommun"},{"issue":"5\/6","key":"5027_CR6","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1108\/BPMJ-11-2021-0750","volume":"28","author":"S Fernandez-Vazquez","year":"2022","unstructured":"Fernandez-Vazquez S, Rosillo R, De la Fuente D, Puente J (2022) Blockchain in sustainable supply chain management: an application of the analytical hierarchical process (AHP) methodology. Bus Process Manag J 28(5\/6):1277\u20131300","journal-title":"Bus Process Manag J"},{"key":"5027_CR7","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1007\/s12083-015-0365-8","volume":"9","author":"Q Han","year":"2016","unstructured":"Han Q, Wen H, Feng G, Wu B, Ren M (2016) Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Netw Appl 9:1020\u20131030","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"10","key":"5027_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym11101198","volume":"11","author":"L Ismail","year":"2019","unstructured":"Ismail L, Materwala H (2019) A review of blockchain architecture and consensus protocols: use cases, challenges, and solutions. Symmetry 11(10):1\u201347","journal-title":"Symmetry"},{"key":"5027_CR9","doi-asserted-by":"crossref","unstructured":"Karayazi F, Bereketli I (2021) Criteria weighting for blockchain software selection using fuzzy ahp. In: Intelligent and fuzzy techniques: smart and innovative solutions: Proceedings of the INFUS 2020 Conference, Istanbul, Turkey, July 21\u201323, 2020, pp. 608\u2013615, Springer","DOI":"10.1007\/978-3-030-51156-2_70"},{"key":"5027_CR10","doi-asserted-by":"crossref","unstructured":"Karpak B (2022) Theory and applications of ahp\/anp at mcdm 2022. Int J Anal Hierarchy Process (14)2","DOI":"10.13033\/ijahp.v14i2.1027"},{"key":"5027_CR11","doi-asserted-by":"crossref","unstructured":"Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Annual international cryptology conference, pp. 357\u2013388, Springer","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"5027_CR12","unstructured":"Kroll JA , Davey IC, Felten EW (2013) The economics of bitcoin mining, or bitcoin in the presence of adversaries 2013(11)"},{"key":"5027_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3320945","author":"T Lenard","year":"2023","unstructured":"Lenard T, Collen A, Benyahya M, Nijdam NA, Genge B (2023) Exploring trust modelling and management techniques in the context of distributed wireless networks: a literature review. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3320945","journal-title":"IEEE Access"},{"issue":"6","key":"5027_CR14","doi-asserted-by":"publisher","first-page":"1604","DOI":"10.4304\/jsw.9.6.1604-1611","volume":"9","author":"B Li","year":"2014","unstructured":"Li B, Zhang Y, Wang H, Xia H, Liu Y, Zhou H, Jiang M (2014) Combining various trust factors for e-commerce platforms using analytic hierarchy process. J Softw 9(6):1604\u20131611","journal-title":"J Softw"},{"key":"5027_CR15","doi-asserted-by":"crossref","unstructured":"Li J, Liu L, Xu J (2010) A p2p e-commerce reputation model based on fuzzy logic. In: 2010 10th IEEE International Conference on Computer and Information Technology, pp. 1275\u20131279, IEEE","DOI":"10.1109\/CIT.2010.230"},{"key":"5027_CR16","doi-asserted-by":"crossref","unstructured":"Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability pp. 468\u2013477","DOI":"10.1109\/CCGRID.2017.8"},{"key":"5027_CR17","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/s12083-010-0096-9","volume":"4","author":"H Lin","year":"2011","unstructured":"Lin H, Li Z, Huang Q (2011) Multifactor hierarchical fuzzy trust evaluation on peer-to- peer networks. Peer-to-Peer Netw Appl 4:376\u2013390","journal-title":"Peer-to-Peer Netw Appl"},{"key":"5027_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1529983","author":"P Liu","year":"2022","unstructured":"Liu P, Ren S, Wang J, Yuan S, Nian Y, Li Y (2022) A blockchain consensus optimization-based algorithm for food traceability. Mob Inf Syst. https:\/\/doi.org\/10.1155\/2022\/1529983","journal-title":"Mob Inf Syst"},{"key":"5027_CR19","first-page":"2022","volume":"1","author":"W Lv","year":"2022","unstructured":"Lv W, Qiu X, Meng L (2022) Blockchain localization spoofing detection based on fuzzy ahp in iot systems. EURASIP J Wirel Commun Netw 1:2022","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"5027_CR20","doi-asserted-by":"crossref","unstructured":"Marar HW, Marar RW (2020) Hybrid blockchain. Jordanian J Comput Inf Technol (JJCIT) 6(04)","DOI":"10.5455\/jjcit.71-1589089941"},{"issue":"4","key":"5027_CR21","first-page":"1","volume":"3","author":"L Marchesi","year":"2022","unstructured":"Marchesi L, Marchesi M, Tonelli R, Lunesu MI (2022) A blockchain architecture for industrial applications. Blockchain Res Appl 3(4):1\u201313","journal-title":"Blockchain Res Appl"},{"key":"5027_CR22","doi-asserted-by":"crossref","unstructured":"Mauri L, Cimato S, Damiani E (2020) A formal approach for the analysis of the xrp ledger consensus protocol. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy. 1, pp. 52\u201363, SciTePress","DOI":"10.5220\/0008954200520063"},{"issue":"6","key":"5027_CR23","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TPDS.2021.3049915","volume":"32","author":"T Meng","year":"2021","unstructured":"Meng T, Zhao Y, Wolter K, Xu C-Z (2021) On consortium blockchain consistency: a queueing network model approach. IEEE Trans Parallel Distrib Syst 32(6):1369\u20131382","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"5027_CR24","first-page":"642","volume":"7","author":"J Miraj","year":"2023","unstructured":"Miraj J, Sami I, Abbas MG et al (2023) Blockchain technology: a research review. Harf-o-Sukhan 7(3):642\u2013660","journal-title":"Harf-o-Sukhan"},{"key":"5027_CR25","unstructured":"Nafi KW, Hossain A, Hashem M et al (2013) An advanced certain trust model using fuzzy logic and probabilistic logic theory. arXiv preprint arXiv:1303.0459"},{"key":"5027_CR26","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system, white paper"},{"key":"5027_CR27","doi-asserted-by":"crossref","unstructured":"Ncube T, Dlodlo N, Terzoli A (2020) Private blockchain networks: a solution for data privacy. 2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC) 1(1): 1\u20138","DOI":"10.1109\/IMITEC50163.2020.9334132"},{"key":"5027_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106789","author":"SO Ogundoyin","year":"2020","unstructured":"Ogundoyin SO, Kamil IA (2020) A fuzzy-AHP based prioritization of trust criteria in fog computing services. Appl Soft Comput. https:\/\/doi.org\/10.1016\/j.asoc.2020.106789","journal-title":"Appl Soft Comput"},{"key":"5027_CR29","doi-asserted-by":"crossref","unstructured":"Pandey M, Velmurugan M, Sathi G, Abbas AR, Zebo N, Sathish T (2023) Blockchain technology: applications and challenges in computer science in E3S Web of Conferences, vol. 399, EDP Sciences","DOI":"10.1051\/e3sconf\/202339904035"},{"issue":"2","key":"5027_CR30","first-page":"189","volume":"9","author":"P Paul","year":"2021","unstructured":"Paul P, Aithal P, Saavedra R, Ghosh S (2021) Blockchain technology and its types\u2014a short review. Int J Appl Sci Eng (IJASE) 9(2):189\u2013200","journal-title":"Int J Appl Sci Eng (IJASE)"},{"key":"5027_CR31","doi-asserted-by":"crossref","unstructured":"Peters GW, Panayi E, Chapelle A (2015) Trends in cryptocurrencies and blockchain technologies: a monetary theory and regulation perspective arXiv preprint arXiv:1508.04364","DOI":"10.2139\/ssrn.2646618"},{"issue":"5","key":"5027_CR32","first-page":"506","volume":"8","author":"R Popli","year":"2019","unstructured":"Popli R, Juneja V, Garg K, Gupta D (2019) Fuzzy based trust evaluation models for enhancing security in manets. Int J Eng Adv Technol (IJEAT) 8(5):506\u2013510","journal-title":"Int J Eng Adv Technol (IJEAT)"},{"issue":"4","key":"5027_CR33","doi-asserted-by":"publisher","first-page":"2549","DOI":"10.1007\/s11277-016-3666-1","volume":"94","author":"VR Prabha","year":"2017","unstructured":"Prabha VR, Latha P (2017) Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wirel Pers Commun 94(4):2549\u20132559","journal-title":"Wirel Pers Commun"},{"key":"5027_CR34","doi-asserted-by":"crossref","unstructured":"Purwono P, Ma\u2019arif A, Rahmaniar W, ul Haq QM, Herjuno D, Naseer M (2022) Blockchain technology. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 8(2)","DOI":"10.26555\/jiteki.v8i2.24327"},{"key":"5027_CR35","unstructured":"Rahimpour CB, Khodabandeh AA (2011) Ahp techniques for trust evaluation in semantic web"},{"key":"5027_CR36","doi-asserted-by":"publisher","first-page":"10127","DOI":"10.1109\/ACCESS.2018.2890507","volume":"7","author":"K Salah","year":"2019","unstructured":"Salah K, Rehman MHU, Nizamuddin N, Al-Fuqaha A (2019) Blockchain for AI: review and open research challenges. IEEE Access 7:10127\u201310149","journal-title":"IEEE Access"},{"issue":"3","key":"5027_CR37","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1093\/rfs\/hhaa075","volume":"34","author":"F Saleh","year":"2021","unstructured":"Saleh F (2021) Blockchain without waste: proof-of-stake. Rev Financ Stud 34(3):1156\u20131190","journal-title":"Rev Financ Stud"},{"key":"5027_CR38","doi-asserted-by":"crossref","unstructured":"Saraswat D, Chaurasia BK (2013) Ahp based trust model in vanets. In: 2013 5th International Conference and Computational Intelligence and Communication Networks, pp. 391\u2013393, IEEE","DOI":"10.1109\/CICN.2013.86"},{"key":"5027_CR39","unstructured":"Shalini R, Manoharan R (2022) Trust model for effective consensus in blockchain. EAI Endorsed Trans Scalable Inf Syst 9(5)"},{"key":"5027_CR40","doi-asserted-by":"publisher","first-page":"38947","DOI":"10.1109\/ACCESS.2019.2902811","volume":"7","author":"W She","year":"2019","unstructured":"She W, Liu Q, Tian Z, Chen J-S, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947\u201338956","journal-title":"IEEE Access"},{"issue":"4","key":"5027_CR41","first-page":"4925","volume":"8","author":"B Singh","year":"2016","unstructured":"Singh B (2016) Analytical hierarchical process (ahp) and fuzzy ahp applications-a review paper. Int J Pharm Technol 8(4):4925\u20134946","journal-title":"Int J Pharm Technol"},{"issue":"2","key":"5027_CR42","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1504\/IJAHUC.2021.113383","volume":"36","author":"G Soni","year":"2021","unstructured":"Soni G, Selvaradjou K (2021) A robust guaranteed time slots allotment scheme for real-time and reliable communication in wbans. Int J Ad Hoc Ubiquitous Comput 36(2):101\u2013113","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"issue":"1","key":"5027_CR43","doi-asserted-by":"publisher","first-page":"77","DOI":"10.3390\/encyclopedia3010006","volume":"3","author":"H Taherdoost","year":"2023","unstructured":"Taherdoost H, Madanchian M (2023) Multi-criteria decision making (MCDM) methods and concepts. Encyclopedia 3(1):77\u201387","journal-title":"Encyclopedia"},{"issue":"1","key":"5027_CR44","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.asoc.2009.11.025","volume":"11","author":"A Tajeddine","year":"2011","unstructured":"Tajeddine A, Kayssi A, Chehab A, Artail H (2011) Fuzzy reputation-based trust model. Appl Soft Comput 11(1):345\u2013355","journal-title":"Appl Soft Comput"},{"issue":"2","key":"5027_CR45","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/s10479-021-04432-2","volume":"326","author":"M Tavana","year":"2023","unstructured":"Tavana M, Soltanifar M, Santos-Arteaga FJ (2023) Analytical hierarchy process: revolution and evolution. Ann Oper Res 326(2):879\u2013907","journal-title":"Ann Oper Res"},{"key":"5027_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/2214971","volume":"2021","author":"H Upadhyay","year":"2021","unstructured":"Upadhyay H, Juneja S, Juneja A, Dhiman G, Kautish S (2021) Evaluation of ergonomics-related disorders in online education using fuzzy ahp. Comput Intell Neurosci 2021:1\u201311","journal-title":"Comput Intell Neurosci"},{"key":"5027_CR47","doi-asserted-by":"publisher","DOI":"10.3390\/math12020308","author":"S Wang","year":"2024","unstructured":"Wang S (2024) A new distance-type fuzzy inference method based on characteristic parameters. Mathematics. https:\/\/doi.org\/10.3390\/math12020308","journal-title":"Mathematics"},{"key":"5027_CR48","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7:22328\u201322370","journal-title":"IEEE Access"},{"issue":"12","key":"5027_CR49","doi-asserted-by":"publisher","first-page":"14726","DOI":"10.1007\/s11227-022-04370-1","volume":"78","author":"J Wang","year":"2022","unstructured":"Wang J, Liu Q, Song B (2022) Blockchain-based multi-malicious double-spending attack blacklist management model. J Supercomput 78(12):14726\u201314755","journal-title":"J Supercomput"},{"key":"5027_CR50","doi-asserted-by":"crossref","unstructured":"Wang X, WeiLi J, Chai J (2018) The research on the incentive method of consortium blockchain based on practical byzantine fault tolerant. In: 2018 11th international symposium on computational intelligence and design (ISCID), vol. 2, pp. 154\u2013156, IEEE","DOI":"10.1109\/ISCID.2018.10136"},{"issue":"3\/4","key":"5027_CR51","first-page":"124","volume":"3","author":"G Wu","year":"2013","unstructured":"Wu G, Liu Z, Yao L, Xu Z, Wang W (2013) A fuzzy-based trust management in wsns. J Internet Serv Inf Secur 3(3\/4):124\u2013135","journal-title":"J Internet Serv Inf Secur"},{"issue":"2","key":"5027_CR52","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1049\/iet-ifs.2012.0145","volume":"8","author":"H Xia","year":"2014","unstructured":"Xia H, Jia Z, Sha EH-M (2014) Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf Secur 8(2):88\u2013103","journal-title":"IET Inf Secur"},{"key":"5027_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2022.01.029","volume":"164","author":"G Xu","year":"2022","unstructured":"Xu G, Bai H, Xing J, Luo T, Xiong NN, Cheng X, Liu S, Zheng X (2022) Sg- pbft: a secure and highly efficient distributed blockchain pbft consensus algorithm for intelligent internet of vehicles. J Parallel Distrib Comput 164:1\u201311","journal-title":"J Parallel Distrib Comput"},{"issue":"4","key":"5027_CR54","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018b) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352\u2013375","journal-title":"Int J Web Grid Serv"},{"key":"5027_CR55","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends, pp. 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"5027_CR56","doi-asserted-by":"crossref","unstructured":"Zheng K, Liu Y, Dai C, Duan Y, Huang X (2018) Model checking pbft consensus mechanism. In: healthcare blockchain network. In: 2018 9th International conference on information technology in medicine and education (ITME), pp. 877\u2013881, IEEE","DOI":"10.1109\/ITME.2018.00196"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-025-05027-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-025-05027-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-025-05027-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:03:48Z","timestamp":1769846628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-025-05027-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["5027"],"URL":"https:\/\/doi.org\/10.1007\/s12652-025-05027-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"20 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}