{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T22:04:23Z","timestamp":1755036263107,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T00:00:00Z","timestamp":1728086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T00:00:00Z","timestamp":1728086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s13198-024-02494-6","type":"journal-article","created":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T11:02:08Z","timestamp":1728126128000},"page":"5111-5138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An improved cloud-based business process compliance management system using a user-centered approach"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1259-2862","authenticated-orcid":false,"given":"Abiodun Muyideen","family":"Mustapha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9338-491X","authenticated-orcid":false,"given":"Oluwasefunmi \u2018Tale","family":"Arogundade","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3875-1606","authenticated-orcid":false,"given":"Adebayo","family":"Abayomi-Alli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1217-1651","authenticated-orcid":false,"given":"A. Kayode","family":"Adesemowo","sequence":"additional","affiliation":[]},{"given":"Olusola John","family":"Adeniran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,5]]},"reference":[{"issue":"7","key":"2494_CR1","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1080\/09720510.2020.1799576","volume":"23","author":"M Agnihotri","year":"2020","unstructured":"Agnihotri M, Chug A (2020) Application of machine learning algorithms for code smell prediction using object-oriented software metrics. J Stat Manag Syst 23(7):1159\u20131171. https:\/\/doi.org\/10.1080\/09720510.2020.1799576","journal-title":"J Stat Manag Syst"},{"key":"2494_CR2","doi-asserted-by":"publisher","unstructured":"Agostinelli S, Maggi FM, Marrella A, Sapio F (2019) Achieving GDPR compliance of BPMN process models. In: International conference on advanced information systems engineering, Springer, Cham, p 10\u201322 https:\/\/doi.org\/10.1007\/978-3-030-21297-1_2","DOI":"10.1007\/978-3-030-21297-1_2"},{"issue":"2","key":"2494_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10515-021-00289-8","volume":"28","author":"A Ali","year":"2021","unstructured":"Ali A, Khan N, Abu-Tair M, Noppen J, McClean S, McChesney I (2021) Discriminating features-based cost-sensitive approach for software defect prediction. Autom Softw Eng 28(2):1\u201318. https:\/\/doi.org\/10.1007\/s10515-021-00289-8","journal-title":"Autom Softw Eng"},{"key":"2494_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.02.064","author":"J Amankwah-Amoah","year":"2019","unstructured":"Amankwah-Amoah J, Wang X (2019) Contemporary business risks: an overview and new research agenda. J Bus Res 97:208\u2013211. https:\/\/doi.org\/10.1016\/j.jbusres.2019.01.036","journal-title":"J Bus Res"},{"key":"2494_CR5","unstructured":"Amaral JN et al (2011) About computing science research methodology. Edmonton, Alberta"},{"key":"2494_CR6","doi-asserted-by":"publisher","unstructured":"Antignac T, Scandariato R, Schneider G (2018) Privacy compliance via model transformations. In: 2018 IEEE European symposium on security and privacy workshops (EuroS&PW), IEEE p 120\u2013126 https:\/\/doi.org\/10.1109\/EuroSPW.2018.00024","DOI":"10.1109\/EuroSPW.2018.00024"},{"issue":"6","key":"2494_CR7","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1080\/08276331.2018.1466850","volume":"31","author":"M Attaran","year":"2018","unstructured":"Attaran M, Woods J (2018) Cloud computing technology: improving small business performance using the Internet. J Small Bus Entrep 31(6):495\u2013519. https:\/\/doi.org\/10.1080\/08276331.2018.1466850","journal-title":"J Small Bus Entrep"},{"key":"2494_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jfs.2015.12.007","volume":"23","author":"R Ayadi","year":"2016","unstructured":"Ayadi R, Naceur SB, Casu B, Quinn B (2016) Does Basel compliance matter for bank performance? J Financ Stab 23:15\u201332. https:\/\/doi.org\/10.1016\/j.jfs.2015.12.007","journal-title":"J Financ Stab"},{"key":"2494_CR9","unstructured":"Barnawi A, Awad A, Elgammal A, El Shawi R, Almalaise A, Sakr S (2015) BP-MaaS: a runtime compliance-monitoring system for business processes. In: BPM (Demos), p 25\u201329"},{"key":"2494_CR10","unstructured":"Bayer P (2019) Strategic government enforcement and firm compliance with international regulation: evidence from carbon regulation. In: PEIO Conference"},{"key":"2494_CR11","doi-asserted-by":"publisher","unstructured":"Bottoms A (2019) Understanding compliance with laws and regulations: a mechanism-based approach. In: Financial Compliance, Palgrave Macmillan, Cham, p 1\u201345 https:\/\/doi.org\/10.1007\/978-3-030-14511-8_1","DOI":"10.1007\/978-3-030-14511-8_1"},{"issue":"1","key":"2494_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"T Breaux","year":"2008","unstructured":"Breaux T, Ant\u00f3n A (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5\u201320. https:\/\/doi.org\/10.1109\/TSE.2007.70746","journal-title":"IEEE Trans Softw Eng"},{"key":"2494_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2018.06.043","volume":"90","author":"A Celesti","year":"2019","unstructured":"Celesti A, Fazio M, Galletta A, Carnevale L, Wan J, Villari M (2019) An approach for the secure management of hybrid cloud\u2013edge environments. Futur Gener Comput Syst 90:1\u201319. https:\/\/doi.org\/10.1016\/j.future.2018.06.043","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"2494_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jcae.2018.11.002","volume":"15","author":"YT Chang","year":"2019","unstructured":"Chang YT, Chen H, Cheng RK, Chi W (2019) The impact of internal audit attributes on the effectiveness of internal control over operations and compliance. J Contemp Account Econ 15(1):1\u201319. https:\/\/doi.org\/10.1016\/j.jcae.2018.11.002","journal-title":"J Contemp Account Econ"},{"issue":"2","key":"2494_CR16","first-page":"115","volume":"96","author":"H Chen","year":"2018","unstructured":"Chen H, Soltes E (2018) Why compliance programs fail\u2014and how to fix them. Harv Bus Rev 96(2):115\u2013125","journal-title":"Harv Bus Rev"},{"issue":"3","key":"2494_CR17","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s10270-021-00959-x","volume":"21","author":"Di Ciccio","year":"2022","unstructured":"Ciccio Di, Claudio GM, Plebani P (2022) On the adoption of blockchain for business process monitoring. Softw Syst Model 21(3):915\u2013937","journal-title":"Softw Syst Model"},{"key":"2494_CR13","unstructured":"CSA (2019) Security guidance v4.0, Accessed June, 2019"},{"key":"2494_CR18","doi-asserted-by":"publisher","unstructured":"Deb D and Chaki N (2018) A framework for goal compliance of business process model. In: Progress in intelligent computing techniques: theory, practice, and applications, Springer, Singapore p 345\u2013356 https:\/\/doi.org\/10.1007\/978-981-10-3376-6_38","DOI":"10.1007\/978-981-10-3376-6_38"},{"issue":"1","key":"2494_CR19","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10270-014-0395-3","volume":"15","author":"A Elgammal","year":"2016","unstructured":"Elgammal A, Turetken O, van den Heuvel WJ, Papazoglou M (2016) Formalizing and appling compliance patterns for business process compliance. Softw Syst Model 15(1):119\u2013146. https:\/\/doi.org\/10.1007\/s10270-014-0395-3","journal-title":"Softw Syst Model"},{"key":"2494_CR20","doi-asserted-by":"publisher","unstructured":"Elgammal A and Turetken O (2015) Lifecycle business process compliance management: a semantically-enabled framework. In: 2015 International conference on cloud computing (ICCC), IEEE, p 1\u20138 https:\/\/doi.org\/10.1109\/CLOUDCOMP.2015.7149646","DOI":"10.1109\/CLOUDCOMP.2015.7149646"},{"key":"2494_CR21","unstructured":"Fellmann M and Zasada A (2016) State-of-the-art of business process compliance approaches-a survey. In: EMISA Forum: Vol 36, No. 2. De Gruyter"},{"key":"2494_CR22","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s00038-019-01217-0","volume":"64","author":"G Gulis","year":"2019","unstructured":"Gulis G (2019) Compliance, adherence, or implementation? Int J Pub Health 64:411\u2013412. https:\/\/doi.org\/10.1007\/s00038-019-01217-0","journal-title":"Int J Pub Health"},{"key":"2494_CR23","doi-asserted-by":"publisher","unstructured":"Harris MA, Martin R (2019) Promoting cybersecurity compliance. In: Cybersecurity education for awareness and compliance\u00a0. IGI Global, p 54\u201371 https:\/\/doi.org\/10.4018\/978-1-5225-7847-5.ch004","DOI":"10.4018\/978-1-5225-7847-5.ch004"},{"issue":"1","key":"2494_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jeea\/jvy055","volume":"17","author":"B Harstad","year":"2019","unstructured":"Harstad B, Lancia F, Russo A (2019) Compliance technology and self-enforcing agreements. J Eur Econ Assoc 17(1):1\u201329. https:\/\/doi.org\/10.1093\/jeea\/jvy055","journal-title":"J Eur Econ Assoc"},{"issue":"3","key":"2494_CR25","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10796-015-9558-1","volume":"18","author":"M Hashmi","year":"2016","unstructured":"Hashmi M, Governatori G, Wynn MT (2016) Normative requirements for regulatory compliance: An abstract formal framework. Inf Syst Front 18(3):429\u2013455. https:\/\/doi.org\/10.1007\/s10796-015-9558-1","journal-title":"Inf Syst Front"},{"issue":"2","key":"2494_CR26","first-page":"1","volume":"9","author":"B Heinrich","year":"2018","unstructured":"Heinrich B, Hristova D, Klier M, Schiller A, Szubartowicz M (2018) Requirements for data quality metrics. J Data Inf Qual (JDIQ) 9(2):1\u201332","journal-title":"J Data Inf Qual (JDIQ)"},{"key":"2494_CR27","doi-asserted-by":"publisher","unstructured":"Holz HJ, Applin A, Haberman B, Joyce D, Purchase H, Reed C (2006) Research methods in computing. In: Working group reports on iticse on innovation and technology in computer science education - ITiCSE-WGR 2006, ACM Press, New York, p 96 https:\/\/doi.org\/10.1145\/1189215.1189180","DOI":"10.1145\/1189215.1189180"},{"key":"2494_CR28","doi-asserted-by":"publisher","unstructured":"Iqbal M, Matulevi\u010dius R (2020) Managing security risks in post-trade matching and confirmation using CorDapp. In:\u00a0International baltic conference on databases and information systems, Springer, Cham, p 325\u2013339 https:\/\/doi.org\/10.1007\/978-3-030-57672-1_24","DOI":"10.1007\/978-3-030-57672-1_24"},{"issue":"2","key":"2494_CR29","doi-asserted-by":"publisher","first-page":"454","DOI":"10.14419\/ijet.v9i2.30396","volume":"9","author":"J Jabbar","year":"2020","unstructured":"Jabbar J, Mehmood H, Malik H (2020) Security of cloud computing: belongings for the generations. International Journal of Engineering & Technology 9(2):454\u2013457","journal-title":"International Journal of Engineering & Technology"},{"key":"2494_CR30","doi-asserted-by":"crossref","unstructured":"Joshi M, Jetawat A (2021) Performance analysis of classification algorithms used for software defect prediction. In: Sustainable intelligent systems, p 1\u20139","DOI":"10.1007\/978-981-33-4901-8_1"},{"key":"2494_CR31","unstructured":"Kamm\u00fcller F, Ogunyanwo OO, Probst CW (2019) Designing data protection for GDPR compliance into IoT healthcare systems. Preprint at arXiv:1901.02426"},{"issue":"02","key":"2494_CR32","first-page":"95","volume":"25","author":"S Khan","year":"2020","unstructured":"Khan S, Dar SH, Iqbal Z, Zafar B, Ali N, Khalil T (2020) An approach for evaluating & ranking ontologies with applications in biomedical domain. Tech J 25(02):95\u2013109","journal-title":"Tech J"},{"key":"2494_CR33","doi-asserted-by":"publisher","unstructured":"Kiyavitskaya N, Zeni N, Breaux TD, Ant\u00f3n AI, Cordy JR, Mich, Mylopoulos J (2008) Automating the extraction of rights and obligations for regulatory compliance. In: International conference on conceptual modeling, p 154\u2013168, Springer, Heidelberg https:\/\/doi.org\/10.1007\/978-3-540-87877-3_13","DOI":"10.1007\/978-3-540-87877-3_13"},{"issue":"2","key":"2494_CR34","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13198-019-00939-x","volume":"11","author":"YS Klochkov","year":"2020","unstructured":"Klochkov YS, Tveryakov AM (2020) Approaches to the improvement of quality management methods. Int J Syst Assur Eng Manag 11(2):163\u2013172. https:\/\/doi.org\/10.1007\/s13198-019-00939-x","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2494_CR35","doi-asserted-by":"publisher","unstructured":"Ly LT, Maggi FM, Montali M, Rinderle-Ma S, van der Aalst WM (2013) A framework for the systematic comparison and evaluation of compliance monitoring approaches. In: 2013 17th IEEE international enterprise distributed object computing conference, IEEE, p 7\u201316 https:\/\/doi.org\/10.1109\/EDOC.2013.11","DOI":"10.1109\/EDOC.2013.11"},{"key":"2494_CR36","doi-asserted-by":"publisher","unstructured":"Mahalle A, Yong J, Tao X, Shen J (2018) Data privacy and system security for banking and financial services industry based on cloud computing infrastructure. In: 2018 IEEE 22nd International conference on computer supported cooperative work in design (CSCWD), IEEE, p 407\u2013413 https:\/\/doi.org\/10.1109\/CSCWD.2018.8465318","DOI":"10.1109\/CSCWD.2018.8465318"},{"key":"2494_CR37","doi-asserted-by":"publisher","unstructured":"Mandal S, Gandhi R, Siy H (2015) Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security. In:\u00a02015 IEEE 8th International workshop on requirements engineering and law (RELAW), IEEE, p 1\u20139 https:\/\/doi.org\/10.1109\/RELAW.2015.7330205","DOI":"10.1109\/RELAW.2015.7330205"},{"issue":"1","key":"2494_CR38","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s10257-017-0354-y","volume":"16","author":"AM Mustapha","year":"2018","unstructured":"Mustapha AM, Arogundade OT, Vincent OR, Adeniran OJ (2018) Towards a compliance requirement management for SMEs: a model and architecture. IseB 16(1):155\u2013185. https:\/\/doi.org\/10.1007\/s10257-017-0354-y","journal-title":"IseB"},{"issue":"3","key":"2494_CR39","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s13198-020-00985-w","volume":"11","author":"AM Mustapha","year":"2020","unstructured":"Mustapha AM, Arogundade OT, Misra S, Damasevicius R, Maskeliunas R (2020a) A systematic literature review on compliance requirements management of business processes. Int J Syst Assur Eng Manag 11(3):561\u2013576. https:\/\/doi.org\/10.1007\/s13198-020-00985-w","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2494_CR40","doi-asserted-by":"publisher","unstructured":"Mustapha AM, Arogundade OT, Vincent OR, Adeniran OJ, Chen X (2017) A model-based business process compliance management architecture for SMSE towards effective adoption of cloud computing. In: 2017 International conference on computing networking and informatics (ICCNI), IEEE, p 1\u20136 https:\/\/doi.org\/10.1109\/ICCNI.2017.8123820","DOI":"10.1109\/ICCNI.2017.8123820"},{"key":"2494_CR41","doi-asserted-by":"publisher","unstructured":"Mustapha AM, Abayomi-Alli A, Adeniran OJ, Adesemowo K, Alonge CY (2020b) A systematic method for extracting and analyzing cloud-based compliance requirements. In:\u00a02020 International conference in mathematics, computer engineering and computer science (ICMCECS), IEEE, p 1\u20137 https:\/\/doi.org\/10.1109\/ICMCECS47690.2020.240839","DOI":"10.1109\/ICMCECS47690.2020.240839"},{"key":"2494_CR42","doi-asserted-by":"crossref","unstructured":"Papazoglou MP (2011) Making business processes compliant to standards and regulations. In: Enterprise Distributed object computing conference (EDOC), 2011 15th IEEE International, p 3\u201313","DOI":"10.1109\/EDOC.2011.37"},{"issue":"1","key":"2494_CR43","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1504\/IJCAT.2019.097120","volume":"59","author":"JL Pereira","year":"2019","unstructured":"Pereira JL, Varaj\u00e3o J (2019) The temporal dimension of business processes: requirements and challenges. Int J Comput Appl Technol 59(1):74\u201381. https:\/\/doi.org\/10.1504\/IJCAT.2019.097120","journal-title":"Int J Comput Appl Technol"},{"key":"2494_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2023.102184","volume":"114","author":"A Revina","year":"2023","unstructured":"Revina A, Aksu \u00dc (2023) An approach for analyzing business process execution complexity based on textual data and event log. Inf Syst 114:102184","journal-title":"Inf Syst"},{"key":"2494_CR45","doi-asserted-by":"publisher","unstructured":"Rojas MAT, Red\u00edgolo FF, Gonzalez NM, Sbampato FV, de Brito Carvalho TCM, Ullah KW, Ahmed AS (2018) Managing the lifecycle of security SLA requirements in cloud computing. In: Developments and advances in intelligent systems and applications, Springer, Cham p 119\u2013140 https:\/\/doi.org\/10.1007\/978-3-319-58965-7_9","DOI":"10.1007\/978-3-319-58965-7_9"},{"key":"2494_CR46","first-page":"203","volume":"94","author":"V Root","year":"2019","unstructured":"Root V (2019) The compliance process. Ind LJ 94:203","journal-title":"Ind LJ"},{"key":"2494_CR47","doi-asserted-by":"publisher","unstructured":"Sadiq S, Governatori G (2015) Managing regulatory compliance in business processes. In: Handbook on business process management, Springer, Heidelberg, p 265\u2013288 https:\/\/doi.org\/10.1007\/978-3-642-45103-4_11","DOI":"10.1007\/978-3-642-45103-4_11"},{"key":"2494_CR48","doi-asserted-by":"publisher","unstructured":"Saralaya S, Saralaya V, D\u2019Souza R (2019) Compliance management in business processes. In: Digital business, Springer, Cham, p 53\u201391 https:\/\/doi.org\/10.1007\/978-3-319-93940-7_3","DOI":"10.1007\/978-3-319-93940-7_3"},{"key":"2494_CR49","unstructured":"Saunders MNK, Lewis P, Thornhill A (2019) Understanding research philosophy and approaches to theory development. In: Research methods for business students, Pearson, Harlow, p 128\u2013170"},{"issue":"2","key":"2494_CR50","doi-asserted-by":"publisher","first-page":"168","DOI":"10.69554\/DIWP5782","volume":"11","author":"K Schindler","year":"2019","unstructured":"Schindler K, White AP (2019) Compliance as a service: utilising the power of the cloud. J Secur Oper Custody 11(2):168\u2013177","journal-title":"J Secur Oper Custody"},{"key":"2494_CR51","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.future.2016.07.013","volume":"67","author":"S Singh","year":"2017","unstructured":"Singh S, Sidhu J (2017) Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers. Futur Gener Comput Syst 67:109\u2013132","journal-title":"Futur Gener Comput Syst"},{"key":"2494_CR52","doi-asserted-by":"publisher","unstructured":"Sunyaev A (2020) Cloud computing. In: Internet computing, Springer, Cham, p. 195\u2013236 https:\/\/doi.org\/10.1007\/978-3-030-34957-8_7","DOI":"10.1007\/978-3-030-34957-8_7"},{"issue":"12","key":"2494_CR53","doi-asserted-by":"publisher","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","volume":"76","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi H, Rafsanjani MK (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493\u20139532. https:\/\/doi.org\/10.1007\/s11227-020-03213-1","journal-title":"J Supercomput"},{"key":"2494_CR54","unstructured":"Wenzhong S (2012) Design and implementation of a BPMN to PROMELA translator. MSc Dissertation in advanced computer science. School of Computing Science, Newcastle University"},{"issue":"1","key":"2494_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00766-013-0181-8","volume":"20","author":"N Zeni","year":"2015","unstructured":"Zeni N, Kiyavitskaya N, Mich L, Cordy JR, Mylopoulos J (2015) GaiusT: supporting the extraction of rights and obligations for regulatory compliance. Requir Eng 20(1):1\u201322. https:\/\/doi.org\/10.1007\/s00766-013-0181-8","journal-title":"Requir Eng"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02494-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-024-02494-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02494-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T10:10:43Z","timestamp":1729937443000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-024-02494-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,5]]},"references-count":55,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["2494"],"URL":"https:\/\/doi.org\/10.1007\/s13198-024-02494-6","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2024,10,5]]},"assertion":[{"value":"27 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest exists among the authors concerning the paper\u2019s publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"This research article complies fully with the ethical standards of writing and publishing","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"No kind of testing has to do with humans or animals.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animal rights"}},{"value":"The authors are informed and agree to the terms of publication for this research work.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}